MGS 3040 CHAPTER 5 DISCUSSION QUESTIONS GROUP B Kimberly Matt Shawn Ashley.

Slides:



Advertisements
Similar presentations
Free will and determinism
Advertisements

Microsoft ® Office Outlook ® 2007 Training Retrieve, back up, or share messages Sweetwater ISD presents:
The Problem of Free Will
Jobs for Montana's Graduates C15L2PP1. Ethics is defined as the specific moral choices made by an individual in his relationship with others. They are.
Perceptions of Risks and Harms. Affect participation in C90s? Judged “Cos when we come yeah you know about, what you are like, piece of paper we write.
Data-Mining and Record-Matching. Whenever you fill out a form for an organisation, business or government, the information usually ends up being stored.
SAFETY Is Everyone’s Responsibility
A Few Simple Rules To Follow At Work You will always succeed.
Created by Liat Rothfeld December 5, 2010 Begin Lily spent a whole class period creating an illustration in MS Paint. She went to File-Save, gave it.
Group E: Brittany Caleb John & Rishi MGS 3040 section 4.
No body said I shouldn’t. Where did Kelly go wrong? Kelly was only hired to the company as field specialist in restoring and backing-up company‘s database.
Database Processing Chapter "No, Drew, You Don’t Know Anything About Report Writing.” Copyright © 2014 Pearson Education, Inc. Publishing as Prentice.
Jeopardy The Sexual Harassment Edition. Definitions Rules, Regulations, Guidelines & Law What Next (or What’s Not Next)? Facts About Sexual Harassment.
RS Exam Revision Stacked, 3-D text at dramatic angle (Intermediate)
Spelling Lists.
Success Spiral Wednesday November 28. Wednesday November 27, "My Hero" Lesson 31, question # 5 1 st period: Work through the question.
HEALING BEGINS WITH FORGIVENESS 9” Which is easier: to say to this paralyzed man, ‘Your sins are forgiven,’ or to say, ‘Get up, take your mat and walk’?
Organizing Your Job Search
Spelling Lists. Unit 1 Spelling List write family there yet would draw become grow try really ago almost always course less than words study then learned.
Data Protection Act. Lesson Objectives To understand the data protection act.
The Family Support Program Presenter: Laurie D. Miller 2012.
ETIQUETTE AND EVIDENCE
Chapter 8 Hypothesis testing 1. ▪Along with estimation, hypothesis testing is one of the major fields of statistical inference ▪In estimation, we: –don’t.
N OBODY SAID I SHOULDN ’ T PAGE 150 & 151- ETHICS C HAPTER FIVE MGS3040-Section 3 Group B Shavone Parris Idalia Fabregas Annette Immella Sergio Martins.
Computer Ethics.
No, Thanks, I’ll Use a Spreadsheet
Alice and her family had just moved from London to Manchester. She had already visited her new school but on her first day, she was feeling quite scared.
Doing It by the Book How to Shepardize a Case Without Using a Computer.
Digital Driver’s License Prove that you are ready for the responsibility of receiving your Digital Driver’s License.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
Section 9.2 Ethical Behavior.
Agency Law. “If you want something done right, do it yourself.” “Many hands make light work.” Anonymous folk sayings.
DIFFICULT CUSTOMERS Scenario Based Learning ENTER.
Take this quiz to determine if you’re the next Bill Gates or whether you should just grin and bear it at your day job.
SharePoint document libraries I: Introduction to sharing files Sharjah Higher Colleges of Technology presents:
Unit 1 – Improving Productivity. 1.1Why did you use a computer? What other systems / resources could you have used? I use a computer because it is quick.
Professional IT Roles Investigate IT professional roles. Find out what each role involves, what the job entails. Identify what personal qualities are needed.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
By Joe Breen.  The self regulation of ethics relies on ways to deter unethical behavior of the members.  The AMC’s first code was enacted in 1972 and.
Ethics in a Computing Culture
Database What is a database? A database is a collection of information that is typically organized so that it can easily be storing, managing and retrieving.
R.A.C.E.R: A Writing Strategy 1. Restate the question Use the words from the question to begin your topic sentence. 2. Answer the question Use the word.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
Mock Trial. Who? What? How? Questions? Samuel decides to take the computer apart to fix it himself. But he couldn’t solve the problem. So five months.
Teaching Ethics Principles through Action Memos Ethics Workshop, October 8, 2004 Christian Wagner.
Data Base Systems Some Thoughts. Ethics Guide–Nobody Said I Shouldn’t Kelly make a backup copy of his company’s database on CD and took it home and installed.
Paradigm in Black Boy. A paradigm is an example serving as a model or pattern (the mold or standard)
By: Beverly Flaxington American Management Association.
The Blind See John 9:1-41 Review Jesus had taught during the Feast of the Tabernacles (Jn 7) –The Jewish leaders had tried to arrest or kill Jesus, but.
My Digital Footprint By Alanya Davignon.
Unit 1 – Improving Productivity Elle-Marie Reid Instructions words per box.
INTERNAL CONTROLS What are they? Why should I care?
NARRATIVE PERSPECTIVE BROUGHT TO YOU BY POWERPOINTPROS.COM.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
I chose to look the other way… Hidden Text to slow the show More of it here.
Chapter 27 Project By: J.T. Brown O.D. Quinn B.M. Scapa K.R. Thomas.
Chapter 9 Workplace EthicsSucceeding in the World of Work Ethical Behavior 9.2 SECTION OPENER / CLOSER INSERT BOOK COVER ART Section 9.2 Ethical Behavior.
“…it will hurt you! In the long term, it won’t be good for you! And I care too much about you! I won’t stop you from doing it, but I will warn you and.
By : Jack Kelenjian. Is a career in computers right for me? To determine if a career in computers is right for someone you need to identify what makes.
Chapter 9 Workplace EthicsSucceeding in the World of Work Ethical Behavior 9.2 SECTION OPENER / CLOSER INSERT BOOK COVER ART Ethical Behavior.
Data Protection GCSE ICT Mrs N Steventon-2005.
BEHIRA POINTS.
Workplace Decision Making
Choose The Right Sober Living Homes
Accepts Responsibility Personal Skills: Integrity
ETHICS: Nobody Said I Shouldn’t
Microsoft Office Access 2003
Your Responsibility As a Leader
I believe the reason students have difficulty learning algebra and that most people have trouble doing math word problems is that although children are.
Presentation transcript:

MGS 3040 CHAPTER 5 DISCUSSION QUESTIONS GROUP B Kimberly Matt Shawn Ashley

1. Where did Kelly go wrong? When he copied the database backups to acd When he brought them home. Also when he began to look through the personal data of his co-workers customer relationships.

2. Do you think it was illegal, unethical, or neither for Kelly to take the database home and query the data? Yes, it was both illegal and unethical for Kelly to take the database home. Unethical because these files were not meant to take home and review during Kelly’s private time. Illegal, because there's personal information stored on the database that shouldn’t be exposed outside of the workplace. Kelly had no rights to look up the personal information he saw whether it was client or employee information.

3. Does the company share culpability with Kelly? If the company knew that Kelly took a copy of the database home, then yes they are partly to blame as well. If the company was unaware Kelly took a copy of the database home, then they shouldn’t be held responsible To prevent such incidents from happening again the company needs to make it so that database’s can not be copied by anyone.

4. What do you think Kelly should have done upon discovering the odd pattern in Jason’s orders? Kelly shouldn’t have mentioned anything to Jason about seeing the discount because he wasn’t suppose to have the database files to begin with. What Kelly should have done once he discovered he was in personal information, was get out of it and get rid of the information. Instead he choose to mention it to Jason, and lost his job because of it.

5. What should the company have done before firing Kelly? Before firing Kelly, the company should have at least confronted him. Find out why he had the database information, and made a decision from that point. Also if Kelly has never had any problems in the past, the company could have gave him some sort of warning as opposed to firing him. Another option would have been to maybe suspend him as a consequence of his actions.

6. Is it possible that someone other than Jason is involved in the arrangement with Valley Appliances? What should Kelly have done in light of that possibility? It could have been possible that there was permission given for Jason to give these discounts to this particular company for unknown reasons to Kelly. Its also possible that Jason was doing this on his own, however the fact remains that Kelly had no business backing up the database and going through personal information. So in light of it, he should have kept quite because he didn’t know what the reason is for those discounts.

7. What should Kelly do now? The first Kelly needs to do is learn from his mistakes! Kelly needs to understand that even though he likes his work and he’s enthused about his career choice. He can’t snoop around in personal information just because he wants to. Lastly Kelly needs to go look for another job involving computers since that’s what he knows best but maybe a job that involves something else other then database files!

“Metadata make databases easy to use-for both authorized and unauthorized purposes.” Explain what organizations should do in light of this fact. Organizations should make it so that metadata isn’t easily accessible for employees to get unauthorized information. If it is necessary for employees to access the information, the should have to get some sort of authorization from a company head. This way they can keep track of whose looking at the information and why. Furthermore they should let it be known that there are severe consequences for tapping into unauthorized databases or any other personal files, without the permission from a company head.