SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
152 Chapter 4 Addressing Individuals’ Common Ethical
Problems
employee’s wrongdoing by supplying
an unfavorable reference? Why or
why not? Discuss the conflict between
community
responsibility and self‐ protection.
11 What conditions would have to be
present for you to blow the whistle
about unethical conduct you
observed at work? How would you
go about it?
12 If Sherron Watkins had blown the
whistle to the Houston Chronicle and
not to Enron’s CEO Ken Lay, do you
think she would have kept her
job at Enron?
13 Research a story about whistle‐
blowing. Relate what “your” whistle‐
blower did with the seven steps
recommended in the chapter. What
have you learned from the
comparison?
14 Do you think that “paying” whistle‐
blowers encourages people to look
for ethical misdeeds or to “game up”
ethical misdeeds? Do you think
people should be willing to report
unethical activities because it is the
right thing to do? What role could
money play in that decision?
SHORT CASES
Think about what you most value. For each
of the ethical dilemmas below, describe at
least two courses of action you might take
and state the pros and cons of each course.
Describe your actions out loud to some-
one else in class or to a friend. What can
you say or do that would be consistent with
your personal values?
Values Issue
You’re a trader who joined a large invest­
ment bank two years ago. Pat, one of
your fellow traders, is well known on the
Street for being a big risk taker and a big
money maker for the firm. Consequently,
he is popular among your firm’s senior
management. You see him at a party one
night and notice that he surreptitiously
used cocaine several times. Several weeks
later in the office, you notice that he seems
exceptionally high‐ spirited and that his
pupils are extremely dilated—you know
that both are signs of drug use. You’re
thinking of mentioning something about
it to his managing director, Bob, when Pat
makes a particularly impressive killing in
the market for your firm’s own account.
Bob jokes that he doesn’t know how Pat
does it, but he doesn’t care. “However he
is pulling this off, it’s great for the firm,”
Bob laughs. You feel strongly that this is
a problem and that it places your firm at
risk. You’ve already raised the issue to Pat’s
manager, Bob, who ignored the issue. Do
you raise it further? How can you voice
your values in this case?
People Issue
Your division has formed a committee of
employees to examine suggestions and
create a strategy for how to reward good
employee ideas. The committee has five
members, but you are the only one who is a
member of a minority group. You’re pleased
to be part of this effort since appointments
to committees such as this one are viewed
generally as a positive reflection on job
performance. At the first meeting, tasks
are assigned, and all the other committee
members think you should survey minority
members for their input. Over the next few
weeks, you discover that several committee
meetings have been held without your
knowledge. When you ask why you weren’t
notified, two committee members tell you
that survey information wasn’t needed at
Notes 153
the meetings and you’d be notified when
a general meeting was scheduled. When
you visit one committee member in his
office, you spot a report on the suggestion
program that you’ve never seen before.
When you ask about it, he says it’s just a
draft he and two others have produced.
Conflict of Interest Issue
You’ve just cemented a deal between a $100
million pension fund and Green Company,
a large regional money manager. You and
your staff put in long hours and a lot of
effort to close the deal and are feeling very
good about it. As you and three of your
direct reports are having lunch in a fancy
restaurant to celebrate a promotion, the
waiter brings you a phone. A senior account
executive from Green is calling and wants
to buy you lunch in gratitude for all your
efforts. “I’ll leave my credit card number
with the restaurant owner,” he says. “You
and your team have a great time on me.”
Customer Confidence Issue
You’re working the breakfast shift at a fast‐
food restaurant when a delivery of milk,
eggs, and other dairy products arrives.
There’s a story in the local newspaper
about contaminated milk distributed by
the dairy that delivers to your restaurant.
Upon reading the article more closely,
you discover that only a small portion of
the dairy’s milk is contaminated, and the
newspaper lists the serial numbers of the
affected containers. When you point out
the article to your manager, he tells you to
forget it. “If you think we’ve got time to go
through every carton of milk to check serial
numbers, you’re crazy,” he says. “The article
says right here that the chances are minus-
cule that anyone has a contaminated car-
ton.” He also explains that he doesn’t have
the workers to check the milk, and what’s
more, destroying the milk would require
him to buy emergency milk supplies at the
retail price. So he tells you to get back to
work and forget about the milk. He says, “I
don’t have the time or the money to worry
about such minor details.”
Use of Corporate Resources Issue
You work for Red Company. You and a col-
league, Pat Brown, are asked by your man-
ager to attend a weeklong conference in Los
Angeles. At least 25 other employees from
Red Co. are attending, as well as many cus-
tomers and competitors from other institu-
tions. At the conference, you attend every
session and see many of the Red Co. peo-
ple, but you never run into Pat. Although
you’ve left several phone messages for her,
her schedule doesn’t appear to allow room
for a meeting. However, when you get
back to the office, the department secre-
tary, who is coordinating expense reports,
mentions to you that your dinner in L.A.
must have been quite the affair. When you
ask, “What dinner?” she describes a dinner
with 20 customers and Red Co. employees
that Pat paid for at a posh L.A. restaurant.
When you explain that you didn’t attend,
she shows you the expense report with your
name listed as one of the attendees.
Notes
1. Mary C. Gentile, “Giving Voice to Values,”
The Aspen Institute, www.aspencbe.org/
teaching/gvv/ index.html.
2. B. George, P. Sims, A. N. McLean, and D.
Mayer, “Discovering Your Authentic Lead­
ership,” Harvard Business Review 85, no. 2
(2007): 1–8.
3. J. Q. Wilson, The Moral Sense (New York: Free
Press, 1993), 55–78.
4. E. A. Lind and T. R. Tyler, The Social Psychol-
ogy of Procedural Justice (New York: Plenum
Press, 1988).
5. B. Sheppard, R. Lewicki, and J. W. Minton,
Organizational Justice: The Search for Fairness in
154 Chapter 4 Addressing Individuals’ Common Ethical
Problems
the Workplace (New York: Lexington Books,
1992).
6. Eduardo Porter, “UBS Ordered to Pay
$29 Million in Sex Bias Lawsuit,” New York
Times, April 7, 2005, www.nytimes.com.
7. Insider Exclusive, “Wall Street Women Win
$70 Million Against Morgan Stanley,” 2013,
http://www.insiderexclusive.com/j ustice‐
in‐ america/legal‐ wall‐ street‐ women‐ win‐ 70‐
million‐ against‐ morgan‐ stanley.
8. Jenny Anderson, “After She Sued Merrill,
It’s Back on the Job,” New York Times, July
22, 2005, www.nytimes.com.
9. “Charges Alleging Sexual Harassment
FY2010–FY2015,” Equal Employment Oppor­
tunity Commission. n.d. Retrieved from
https://www.eeoc.gov/eeoc/statistics/
enforcement/sexual_harassment_new.cfm.
10. D. Schawble, “Daniel Goleman on Lead­
ership and the Power of Emotional Intel-
ligence,” Forbes, September 15, 2011, www.
forbes.com
11. E. Francis, “$168 Million Awarded in Cali­
fornia Sexual Harassment Suit,” ABC News.
March 2, 2012. Retrieved from http://
abcnews.go.com/US/LegalCenter/168‐
million‐ awarded‐ woman‐ harassed‐ raunchy‐
cardiac‐ surgery/story?id=15835342.
12. J. Lever, G. Zellman, and S. J. Hirschfeld,
“Office Romance: Are the Rules Changing?”
Across the Board, March–April 2006, 33–37.
13. C. DeJong, T. Aguilar, C. Tseng, G. A. Lin,
W. J. Boscardin, and R. A. Dudley, “Phar­
maceutical Industry–Sponsored Meals and
Physician Prescribing Patterns for Medi-
care Beneficiaries,” JAMA Internal Medicine
176, no. 8 (2016): 1114–20.
14. J. D. Glater, “University of Texas Fires
Director of Financial Aid,” New York Times,
May 14, 2007.
15. C. Dowd, “Investors Beware: Devil May Be
in the Details of Annuities,” Fox Business.
May 19, 2016. Retrieved from www.foxbusi-
ness.com/features/2016/05/19/investors‐
beware‐ devil‐ may‐ be‐ in‐ details‐ annuities.
html.
16. Paul Sullivan, “In Search of Competent
(and Honest) Advisers,” New York Times,
August 1, 2009, www.nytimes.com.
17. J. Hechinger and S. Craig, “SEC Tells
Fidelity Probe May Yield Civil Com-
plaint,” Wall Street Journal, July 26, 2005, A3.
18. J. A. Byrne, “No Excuses for Enron’s
Board,” Businessweek, July 29, 2002, 50.
19. I. J. Dugan, “Auditing Old‐ Timers Recall
when Prestige Was the Bottom Line,” Wall
Street Journal, July 15, 2002.
20. A. Samuel, “Meet your newest management
headache: the co‐ branded employee,” Wall
Street Journal Online. October 29, 2012.
21. K. Reardon, “Courage as a Skill,” Harvard
Business Review, January 2007, 2–7.
22. H. Wee, “Corporate Ethics: Right Makes
Might,” Businessweek, April 11, 2002.
23. R. Webber, “Whistle Blowing,” Executive Ex-
cellence, July 1989, 9–10.
24. Ibid.
25. A. Dunkin, “Blowing the Whistle without
Paying the Piper,” Businessweek, June 3, 1991,
138–39.
26. W. M. Hoffman and J. M. Moore, Business
Ethics: Readings and Cases in Corporate Morality
(New York: McGraw‐ Hill, 1984), 257.
27. F. Pellegrini, “Person of the Week: ‘Enron
Whistleblower’ Sherron Watkins,” Time,
January 18, 2002.
28. R. Rothracker, “Whistle‐ blower Law Reap
Big Payoffs for U.S. Treasury.” Legi‐ Slate,
August 29, 1997, 1; S. McDonough, “Want­
ed: Snitch for Good Pay.” Centre Daily Times,
November 29, 2004, B9; D. B. Caruso,
“Whistleblowers Help Feds to Build Cases.”
Centre Daily Times, August 25, 2004, B9.
29. K. Thomas and M. Schmidt, “Glaxo Agrees
to Pay $3 Billion in Fraud Settlement,” New
York Times, July 2, 2012, www.nytimes.com
30. P. Dryer, and D. Carney, “Year of the Whistle­
blower,” Businessweek, December 16, 2002,
107–10. T. Wilkinson, “After Eight Years, An
Insider Gets His Reward Thanks to Whistle-
blower’s Efforts, U.S. Government Reaps
You are the first Chief Information Security Officer (CISO) for
your organization, and on your first day, you realize there are
no impactful cybersecurity practices established or
implemented, and decide to submit a white paper to the CEO,
calling for action. Develop a project plan to stand up a brand
new cybersecurity program in the form of a 10-13 page White
Paper, referencing the course material, industry best practices,
and NIST guidance.
Guidelines:
· 10-13 pages of content. In lieu of an abstract, write an
executive summary. The executive summary, title page, and
references page, are not included in the total.
· At a minimum, 10 references should be used. All cited
articles, journals, books, and research, should be from credible
sources and current within the last five years. Note: Wikipedia
or personal blogs are not credible.
· Tables and graphics, if used, will count for no more than 1
page in the total. Anything more is welcome, but the space used
will be deducted from the total page count. Remember that
tables and graphics require in-text citations.
· APA formatting is required throughout - running head, page
numbers, appropriate font, citations, etc.
Content Tips:
· Understand the scope and value of your project.
· Describe the problem you are fixing by proposing this new
cybersecurity program. This would include potential threat,
financial loss, etc, that the organization faces due to lack of
cybersecurity.
· Reference the NIST Cybersecurity Framework (v1.1) to build
the structure of your program. This framework details each vital
function of cybersecurity – Identify, Protect, Detect, Respond,
and Recover – and will guide your research.
· Specifically, incorporate the steps detailed in section 3.2:
Establishing or Improving a cybersecurity program.
· Keep in mind NIST is a starting point, but other resources are
required (see Guidelines below).
· Be sure to include the following details:
· Include methods and best practices that satisfy each function
in the framework. The categories and sub-categories offer more
details for ensuring your program is robust. You do not have to
list out and talk to every single sub-category; view them as data
points to drive your vision.
· Write a security policy for your organization. The purpose of a
security policy is to safeguard the confidentiality, integrity, and
availability, of the organization’s systems and information. Be
sure to include objectives, scope, specific goals, and
consequences in the event of noncompliance.
· Create a team. Define roles and responsibilities of all
stakeholders, including those of the CISO.
· Describe the access control methods you would implement for
your building and network.
· Develop a method to track performance and report metrics.
Use the following references below as 5 sources and add an
additional 5 to make 10 sources
1. The importance on cybersecurity is displayed in this peered
review article, providing a firsthand look at organizations who
have faltered by not having the proper procedures implemented
within their database.
BEDERNA, Z., RAJNAI, Z., & SZADECZKY, T. (2021).
Business Strategy Analysis of Cybersecurity Incidents. Revista
Academiei Fortelor Terestre, 26(2), 139–148. https://doi-
org.library3.webster.edu/10.2478/raft-2021-0020
2. This article presents in depth analysis of distinct
cybersecurity compliance standards and statistics of cyber-
attacks. Evaluations and requirements between the frameworks,
tools, and software available for OS compliance testing.
HAMDANI, S. W. A., ABBAS, H., IEEE, S. M., JANJUA, A.
R., BIN SHAHID, W., AMJAD, M. F., MALIK, J., MURTAZA,
M. H., ATIQUZZAMAN, M., & KHAN, A. W. (2021).
Cybersecurity Standards in the Context of Operating System:
Practical Aspects, Analysis, and Comparisons. ACM Computing
Surveys, 54(3), 1–36. https://doi-
org.library3.webster.edu/10.1145/3442480
3. The article below provides a basic understanding on what a
white paper contains and all aspects that need to be included in
order to provide the most applicable call to action.
Leading Age. (2021). Cybersecurity White Paper.
https://leadingage.org/white-papers/cybersecurity-white-paper.
4. The book provides verbiage that relates to designing proper
cybersecurity program for the CEO
Mattord, H., & Whitman, M. (2018). Introduction to
Cybersecurity (6th ed.). Cengage Learning.
5. This article discusses how build a foundation of trust in
embedded systems within an organization.
Paultre, A. (2020). Establishing Trust in Cybersecurity for
Embedded Systems. EE: Evaluation Engineering, 59(10), 20–23.

More Related Content

DOCX
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
DOCX
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
PPTX
Blowing the whistle on it! May 2012
DOCX
Creating an Ethically Strong OrganizationCATHERINE BAILEY AN.docx
PPT
BUSINESS ETHICS
DOCX
1.Question on Case Study· You’re a manager for ABC Company·.docx
PPTX
Week 5 & 6 - Emerging Business Ethics Issues.pptx
PPTX
Organizational behavior
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
COMMON ETHICAL PROBLEMS OF INDIVIDUALSBA 354COLLEG.docx
Blowing the whistle on it! May 2012
Creating an Ethically Strong OrganizationCATHERINE BAILEY AN.docx
BUSINESS ETHICS
1.Question on Case Study· You’re a manager for ABC Company·.docx
Week 5 & 6 - Emerging Business Ethics Issues.pptx
Organizational behavior

Similar to 152 Chapter 4 Addressing Individuals’ Common Ethical Problems (20)

PPT
Ethics And Sarbanes Oxley 2009 Gary Wheeler
PPTX
John Sarno's landmark presentation on HR Ethics: NJSHRM - 2012
PPT
Business Ethics for competitive Advantage
PPTX
PPTX
Conflict of interests 1
DOCX
Summary paper
DOCX
Business Ethicsand the HR RolePast, Present, and Future
PPT
Unehtical behaviour 06 05-2018 for the ssc class at bpatc
PDF
6.01. a personal_struggle_with_the_definition_of_success.stud.9.2008.last
DOCX
5LESSONS LEARNED – MISTAKES REPEATED – Vol. 4
DOCX
REL134 v6Religion AnalysisREL134 v6Page 2 of 2Religion Ana.docx
PPT
Handling ethics issues in the workplace
DOCX
84 Module 2 Workplace Basics84 Module 2 Workplace Basics.docx
DOC
Top 5 Ethical Issues In Hr
PPT
BA 15 Chapter 5
 
PPT
Week 3 Powerpoint
PPTX
Introduction to Engineering Management Lecture 3 (EM) Fall 2023.pptx
PPT
Ethics in management
PPTX
PPT
Class Lecture: Corporate Culture, Abuse of Power, Whistleblowing and Ethics
Ethics And Sarbanes Oxley 2009 Gary Wheeler
John Sarno's landmark presentation on HR Ethics: NJSHRM - 2012
Business Ethics for competitive Advantage
Conflict of interests 1
Summary paper
Business Ethicsand the HR RolePast, Present, and Future
Unehtical behaviour 06 05-2018 for the ssc class at bpatc
6.01. a personal_struggle_with_the_definition_of_success.stud.9.2008.last
5LESSONS LEARNED – MISTAKES REPEATED – Vol. 4
REL134 v6Religion AnalysisREL134 v6Page 2 of 2Religion Ana.docx
Handling ethics issues in the workplace
84 Module 2 Workplace Basics84 Module 2 Workplace Basics.docx
Top 5 Ethical Issues In Hr
BA 15 Chapter 5
 
Week 3 Powerpoint
Introduction to Engineering Management Lecture 3 (EM) Fall 2023.pptx
Ethics in management
Class Lecture: Corporate Culture, Abuse of Power, Whistleblowing and Ethics
Ad

More from AnastaciaShadelb (20)

DOCX
You will submit your proposal as a text-based Word or PDF file.   
DOCX
What is Family Resource Management and why is it important to t
DOCX
What can you do as a teacher to manage the dynamics of diversity
DOCX
Week 4 APN Professional Development Plan PaperPurpose The pur
DOCX
TopicTransitions of Care in Long- Term Care (LTC)Discuss C
DOCX
Topic Hepatitis B infection Clinical Practice Presen
DOCX
The Fresh Detergent CaseEnterprise Industries produces Fresh,
DOCX
tables, images, research tools, mail merges, and much more. Tell us
DOCX
TBSB NetworkThe Best Sports Broadcasting Network is home to al
DOCX
Sheet1For the accounts below 1Calculate the variance, making sure
DOCX
SU_NSG6430_week2_A2_Pandey_Rby Ram PandeySubmissi
DOCX
Sheet1Risk Register for Project NameDateProject NameID No.RankRis
DOCX
12Final Project TopicFinal Project TopicI selec
DOCX
12Capstone ProjectOlivia TimmonsDepartment of
DOCX
12First Name Last NamePlaza CollegeMGT1003 Sec
DOCX
12Epic EMR ImplementationComment by Author 2 Need a
DOCX
12Facebook WebsiteAdriana C. HernandezRasmussen Un
DOCX
12Experience During my clinical placem
DOCX
12Dissertation Topic ApprovalDissertation Topic App
DOCX
12Essay TitleThesis Statement I. This is the topic
You will submit your proposal as a text-based Word or PDF file.   
What is Family Resource Management and why is it important to t
What can you do as a teacher to manage the dynamics of diversity
Week 4 APN Professional Development Plan PaperPurpose The pur
TopicTransitions of Care in Long- Term Care (LTC)Discuss C
Topic Hepatitis B infection Clinical Practice Presen
The Fresh Detergent CaseEnterprise Industries produces Fresh,
tables, images, research tools, mail merges, and much more. Tell us
TBSB NetworkThe Best Sports Broadcasting Network is home to al
Sheet1For the accounts below 1Calculate the variance, making sure
SU_NSG6430_week2_A2_Pandey_Rby Ram PandeySubmissi
Sheet1Risk Register for Project NameDateProject NameID No.RankRis
12Final Project TopicFinal Project TopicI selec
12Capstone ProjectOlivia TimmonsDepartment of
12First Name Last NamePlaza CollegeMGT1003 Sec
12Epic EMR ImplementationComment by Author 2 Need a
12Facebook WebsiteAdriana C. HernandezRasmussen Un
12Experience During my clinical placem
12Dissertation Topic ApprovalDissertation Topic App
12Essay TitleThesis Statement I. This is the topic
Ad

Recently uploaded (20)

PDF
IGGE1 Understanding the Self1234567891011
PDF
1_English_Language_Set_2.pdf probationary
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
HVAC Specification 2024 according to central public works department
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
advance database management system book.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Computer Architecture Input Output Memory.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
IGGE1 Understanding the Self1234567891011
1_English_Language_Set_2.pdf probationary
My India Quiz Book_20210205121199924.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
Paper A Mock Exam 9_ Attempt review.pdf.
HVAC Specification 2024 according to central public works department
What if we spent less time fighting change, and more time building what’s rig...
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
advance database management system book.pdf
Introduction to pro and eukaryotes and differences.pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
History, Philosophy and sociology of education (1).pptx
B.Sc. DS Unit 2 Software Engineering.pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Computer Architecture Input Output Memory.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc

152 Chapter 4 Addressing Individuals’ Common Ethical Problems

  • 1. 152 Chapter 4 Addressing Individuals’ Common Ethical Problems employee’s wrongdoing by supplying an unfavorable reference? Why or why not? Discuss the conflict between community responsibility and self‐ protection. 11 What conditions would have to be present for you to blow the whistle about unethical conduct you observed at work? How would you go about it? 12 If Sherron Watkins had blown the whistle to the Houston Chronicle and not to Enron’s CEO Ken Lay, do you think she would have kept her job at Enron? 13 Research a story about whistle‐ blowing. Relate what “your” whistle‐ blower did with the seven steps recommended in the chapter. What have you learned from the comparison? 14 Do you think that “paying” whistle‐ blowers encourages people to look for ethical misdeeds or to “game up” ethical misdeeds? Do you think
  • 2. people should be willing to report unethical activities because it is the right thing to do? What role could money play in that decision? SHORT CASES Think about what you most value. For each of the ethical dilemmas below, describe at least two courses of action you might take and state the pros and cons of each course. Describe your actions out loud to some- one else in class or to a friend. What can you say or do that would be consistent with your personal values? Values Issue You’re a trader who joined a large invest­ ment bank two years ago. Pat, one of your fellow traders, is well known on the Street for being a big risk taker and a big money maker for the firm. Consequently, he is popular among your firm’s senior management. You see him at a party one night and notice that he surreptitiously used cocaine several times. Several weeks later in the office, you notice that he seems exceptionally high‐ spirited and that his pupils are extremely dilated—you know that both are signs of drug use. You’re thinking of mentioning something about it to his managing director, Bob, when Pat makes a particularly impressive killing in the market for your firm’s own account. Bob jokes that he doesn’t know how Pat
  • 3. does it, but he doesn’t care. “However he is pulling this off, it’s great for the firm,” Bob laughs. You feel strongly that this is a problem and that it places your firm at risk. You’ve already raised the issue to Pat’s manager, Bob, who ignored the issue. Do you raise it further? How can you voice your values in this case? People Issue Your division has formed a committee of employees to examine suggestions and create a strategy for how to reward good employee ideas. The committee has five members, but you are the only one who is a member of a minority group. You’re pleased to be part of this effort since appointments to committees such as this one are viewed generally as a positive reflection on job performance. At the first meeting, tasks are assigned, and all the other committee members think you should survey minority members for their input. Over the next few weeks, you discover that several committee meetings have been held without your knowledge. When you ask why you weren’t notified, two committee members tell you that survey information wasn’t needed at Notes 153 the meetings and you’d be notified when a general meeting was scheduled. When you visit one committee member in his
  • 4. office, you spot a report on the suggestion program that you’ve never seen before. When you ask about it, he says it’s just a draft he and two others have produced. Conflict of Interest Issue You’ve just cemented a deal between a $100 million pension fund and Green Company, a large regional money manager. You and your staff put in long hours and a lot of effort to close the deal and are feeling very good about it. As you and three of your direct reports are having lunch in a fancy restaurant to celebrate a promotion, the waiter brings you a phone. A senior account executive from Green is calling and wants to buy you lunch in gratitude for all your efforts. “I’ll leave my credit card number with the restaurant owner,” he says. “You and your team have a great time on me.” Customer Confidence Issue You’re working the breakfast shift at a fast‐ food restaurant when a delivery of milk, eggs, and other dairy products arrives. There’s a story in the local newspaper about contaminated milk distributed by the dairy that delivers to your restaurant. Upon reading the article more closely, you discover that only a small portion of the dairy’s milk is contaminated, and the newspaper lists the serial numbers of the affected containers. When you point out the article to your manager, he tells you to forget it. “If you think we’ve got time to go
  • 5. through every carton of milk to check serial numbers, you’re crazy,” he says. “The article says right here that the chances are minus- cule that anyone has a contaminated car- ton.” He also explains that he doesn’t have the workers to check the milk, and what’s more, destroying the milk would require him to buy emergency milk supplies at the retail price. So he tells you to get back to work and forget about the milk. He says, “I don’t have the time or the money to worry about such minor details.” Use of Corporate Resources Issue You work for Red Company. You and a col- league, Pat Brown, are asked by your man- ager to attend a weeklong conference in Los Angeles. At least 25 other employees from Red Co. are attending, as well as many cus- tomers and competitors from other institu- tions. At the conference, you attend every session and see many of the Red Co. peo- ple, but you never run into Pat. Although you’ve left several phone messages for her, her schedule doesn’t appear to allow room for a meeting. However, when you get back to the office, the department secre- tary, who is coordinating expense reports, mentions to you that your dinner in L.A. must have been quite the affair. When you ask, “What dinner?” she describes a dinner with 20 customers and Red Co. employees that Pat paid for at a posh L.A. restaurant. When you explain that you didn’t attend, she shows you the expense report with your name listed as one of the attendees.
  • 6. Notes 1. Mary C. Gentile, “Giving Voice to Values,” The Aspen Institute, www.aspencbe.org/ teaching/gvv/ index.html. 2. B. George, P. Sims, A. N. McLean, and D. Mayer, “Discovering Your Authentic Lead­ ership,” Harvard Business Review 85, no. 2 (2007): 1–8. 3. J. Q. Wilson, The Moral Sense (New York: Free Press, 1993), 55–78. 4. E. A. Lind and T. R. Tyler, The Social Psychol- ogy of Procedural Justice (New York: Plenum Press, 1988). 5. B. Sheppard, R. Lewicki, and J. W. Minton, Organizational Justice: The Search for Fairness in 154 Chapter 4 Addressing Individuals’ Common Ethical Problems the Workplace (New York: Lexington Books, 1992). 6. Eduardo Porter, “UBS Ordered to Pay $29 Million in Sex Bias Lawsuit,” New York Times, April 7, 2005, www.nytimes.com. 7. Insider Exclusive, “Wall Street Women Win $70 Million Against Morgan Stanley,” 2013,
  • 7. http://www.insiderexclusive.com/j ustice‐ in‐ america/legal‐ wall‐ street‐ women‐ win‐ 70‐ million‐ against‐ morgan‐ stanley. 8. Jenny Anderson, “After She Sued Merrill, It’s Back on the Job,” New York Times, July 22, 2005, www.nytimes.com. 9. “Charges Alleging Sexual Harassment FY2010–FY2015,” Equal Employment Oppor­ tunity Commission. n.d. Retrieved from https://www.eeoc.gov/eeoc/statistics/ enforcement/sexual_harassment_new.cfm. 10. D. Schawble, “Daniel Goleman on Lead­ ership and the Power of Emotional Intel- ligence,” Forbes, September 15, 2011, www. forbes.com 11. E. Francis, “$168 Million Awarded in Cali­ fornia Sexual Harassment Suit,” ABC News. March 2, 2012. Retrieved from http:// abcnews.go.com/US/LegalCenter/168‐ million‐ awarded‐ woman‐ harassed‐ raunchy‐ cardiac‐ surgery/story?id=15835342. 12. J. Lever, G. Zellman, and S. J. Hirschfeld, “Office Romance: Are the Rules Changing?” Across the Board, March–April 2006, 33–37. 13. C. DeJong, T. Aguilar, C. Tseng, G. A. Lin, W. J. Boscardin, and R. A. Dudley, “Phar­ maceutical Industry–Sponsored Meals and Physician Prescribing Patterns for Medi- care Beneficiaries,” JAMA Internal Medicine 176, no. 8 (2016): 1114–20.
  • 8. 14. J. D. Glater, “University of Texas Fires Director of Financial Aid,” New York Times, May 14, 2007. 15. C. Dowd, “Investors Beware: Devil May Be in the Details of Annuities,” Fox Business. May 19, 2016. Retrieved from www.foxbusi- ness.com/features/2016/05/19/investors‐ beware‐ devil‐ may‐ be‐ in‐ details‐ annuities. html. 16. Paul Sullivan, “In Search of Competent (and Honest) Advisers,” New York Times, August 1, 2009, www.nytimes.com. 17. J. Hechinger and S. Craig, “SEC Tells Fidelity Probe May Yield Civil Com- plaint,” Wall Street Journal, July 26, 2005, A3. 18. J. A. Byrne, “No Excuses for Enron’s Board,” Businessweek, July 29, 2002, 50. 19. I. J. Dugan, “Auditing Old‐ Timers Recall when Prestige Was the Bottom Line,” Wall Street Journal, July 15, 2002. 20. A. Samuel, “Meet your newest management headache: the co‐ branded employee,” Wall Street Journal Online. October 29, 2012. 21. K. Reardon, “Courage as a Skill,” Harvard Business Review, January 2007, 2–7. 22. H. Wee, “Corporate Ethics: Right Makes Might,” Businessweek, April 11, 2002.
  • 9. 23. R. Webber, “Whistle Blowing,” Executive Ex- cellence, July 1989, 9–10. 24. Ibid. 25. A. Dunkin, “Blowing the Whistle without Paying the Piper,” Businessweek, June 3, 1991, 138–39. 26. W. M. Hoffman and J. M. Moore, Business Ethics: Readings and Cases in Corporate Morality (New York: McGraw‐ Hill, 1984), 257. 27. F. Pellegrini, “Person of the Week: ‘Enron Whistleblower’ Sherron Watkins,” Time, January 18, 2002. 28. R. Rothracker, “Whistle‐ blower Law Reap Big Payoffs for U.S. Treasury.” Legi‐ Slate, August 29, 1997, 1; S. McDonough, “Want­ ed: Snitch for Good Pay.” Centre Daily Times, November 29, 2004, B9; D. B. Caruso, “Whistleblowers Help Feds to Build Cases.” Centre Daily Times, August 25, 2004, B9. 29. K. Thomas and M. Schmidt, “Glaxo Agrees to Pay $3 Billion in Fraud Settlement,” New York Times, July 2, 2012, www.nytimes.com 30. P. Dryer, and D. Carney, “Year of the Whistle­ blower,” Businessweek, December 16, 2002, 107–10. T. Wilkinson, “After Eight Years, An Insider Gets His Reward Thanks to Whistle- blower’s Efforts, U.S. Government Reaps
  • 10. You are the first Chief Information Security Officer (CISO) for your organization, and on your first day, you realize there are no impactful cybersecurity practices established or implemented, and decide to submit a white paper to the CEO, calling for action. Develop a project plan to stand up a brand new cybersecurity program in the form of a 10-13 page White Paper, referencing the course material, industry best practices, and NIST guidance. Guidelines: · 10-13 pages of content. In lieu of an abstract, write an executive summary. The executive summary, title page, and references page, are not included in the total. · At a minimum, 10 references should be used. All cited articles, journals, books, and research, should be from credible sources and current within the last five years. Note: Wikipedia or personal blogs are not credible. · Tables and graphics, if used, will count for no more than 1 page in the total. Anything more is welcome, but the space used will be deducted from the total page count. Remember that tables and graphics require in-text citations. · APA formatting is required throughout - running head, page numbers, appropriate font, citations, etc. Content Tips: · Understand the scope and value of your project. · Describe the problem you are fixing by proposing this new cybersecurity program. This would include potential threat, financial loss, etc, that the organization faces due to lack of cybersecurity. · Reference the NIST Cybersecurity Framework (v1.1) to build the structure of your program. This framework details each vital function of cybersecurity – Identify, Protect, Detect, Respond, and Recover – and will guide your research. · Specifically, incorporate the steps detailed in section 3.2: Establishing or Improving a cybersecurity program. · Keep in mind NIST is a starting point, but other resources are
  • 11. required (see Guidelines below). · Be sure to include the following details: · Include methods and best practices that satisfy each function in the framework. The categories and sub-categories offer more details for ensuring your program is robust. You do not have to list out and talk to every single sub-category; view them as data points to drive your vision. · Write a security policy for your organization. The purpose of a security policy is to safeguard the confidentiality, integrity, and availability, of the organization’s systems and information. Be sure to include objectives, scope, specific goals, and consequences in the event of noncompliance. · Create a team. Define roles and responsibilities of all stakeholders, including those of the CISO. · Describe the access control methods you would implement for your building and network. · Develop a method to track performance and report metrics. Use the following references below as 5 sources and add an additional 5 to make 10 sources 1. The importance on cybersecurity is displayed in this peered review article, providing a firsthand look at organizations who have faltered by not having the proper procedures implemented within their database. BEDERNA, Z., RAJNAI, Z., & SZADECZKY, T. (2021). Business Strategy Analysis of Cybersecurity Incidents. Revista Academiei Fortelor Terestre, 26(2), 139–148. https://doi- org.library3.webster.edu/10.2478/raft-2021-0020 2. This article presents in depth analysis of distinct cybersecurity compliance standards and statistics of cyber- attacks. Evaluations and requirements between the frameworks, tools, and software available for OS compliance testing. HAMDANI, S. W. A., ABBAS, H., IEEE, S. M., JANJUA, A.
  • 12. R., BIN SHAHID, W., AMJAD, M. F., MALIK, J., MURTAZA, M. H., ATIQUZZAMAN, M., & KHAN, A. W. (2021). Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons. ACM Computing Surveys, 54(3), 1–36. https://doi- org.library3.webster.edu/10.1145/3442480 3. The article below provides a basic understanding on what a white paper contains and all aspects that need to be included in order to provide the most applicable call to action. Leading Age. (2021). Cybersecurity White Paper. https://leadingage.org/white-papers/cybersecurity-white-paper. 4. The book provides verbiage that relates to designing proper cybersecurity program for the CEO Mattord, H., & Whitman, M. (2018). Introduction to Cybersecurity (6th ed.). Cengage Learning. 5. This article discusses how build a foundation of trust in embedded systems within an organization. Paultre, A. (2020). Establishing Trust in Cybersecurity for Embedded Systems. EE: Evaluation Engineering, 59(10), 20–23.