CHAPTER 2 (ETHICS FOR IT WORKERS AND IT USERS)
Question 1: Your old roommate from college was recently let
go from his firm during a wave of employee terminations to reduce a cost. You
have to kept in touch over the six years since school, and he has asked you to
help him get a position in the IT organization where you work. You offered to
review his resume, make sure that it gets to the right “right persons,” and
even put in a good word for him. However, as you read the resume, it is obvious
that your friend has greatly exaggerated his accomplishment at his former place
of work and even added some IT- related certifications that you are sure he
never earned. What would you do? Explain briefly.
Answer 1: If I review the resume I have seen wrong there
maybe I will not help him because you might lose your job. Because he might
have done incorrectly I am responsible there because I helped him enter the
company .maybe I say there is no vacant in our company, its better than help
him that I knew there was something wrong in his resumes I myself put in danger
situation if in case he is already in the company maybe there would do him he
does not know, that is a big issue for him and especially me because I helped
him get into company. I can also talk to him to change his resume because it’s better than to lie because
when the company will accept you there is no danger cause you tell the truth
during you are an applicant and also much confident to introduce in my
organization without doubt because you are truly true.
Answer 2: In the person’s of human resources contact actually the decision is not mine because except me may decide to work on that to have a good decisions for the organization. And also it depends on her qualification if she passes that interview will I guess I might not choose people who are not very well that interview in order to have a good assessment with her if she could pass for an entry-position in the organization. If she passes in for an entry will the salary bases and on her performance and skills.
Question 2: You are the human resources contact for your
firm’s IT organization. The daughter of the firm’s CIO is scheduled to
participate in job interview for an entry-level position in the IT organization
next week. It will be your responsibility to meet with the three people who
will interview her to form an assessment and make a group decision about
whether or not offered the position and, if so, at what salary? How do you this
situation?
Answer 2: In the person’s of human resources contact actually the decision is not mine because except me may decide to work on that to have a good decisions for the organization. And also it depends on her qualification if she passes that interview will I guess I might not choose people who are not very well that interview in order to have a good assessment with her if she could pass for an entry-position in the organization. If she passes in for an entry will the salary bases and on her performance and skills.
CHAPTER 3 (COMPUTER AND INTERNET CRIME)
Question 1: You are a member of IT security support group of large manufacturing company. You have been awakened late at night and informed that someone has defaced your organization’s Web sites and also attempted to gain access to computer files containing information about a new product currently under development. What are your next steps? How much effort would you spend in tracking down the identity of the hacker?
You cannot trace a hacker because
usually hackers use fake IP addresses that lead u to other people's computers.
What u can do is use a program that changes your IP address to a fake one,
which makes it impossible for a hacker to track you or hack you.
Question 2: It appears that someone is using you firm’s corporate
directory – which includes job titles and e-mail addresses-to contact senior
managers and directors via e-mail. The message requests that they click on a
URL that takes them to a Web site that looks as if it were designed by you HR
organization. Once at this phony Web Site, they are asked to confirm the bank
and account number the bank and account number to be used for electronic
deposit of their annual bonus check. You are a member of IT security for the
firm. What can you do?
Answer 2: Before I confirmed them I'll
just make sure them that they are not hacker’s maybe they followed us to get
the files in the company but because they are fake or phony websites I know
that their purposes to get files that are confidential in order to get money so
I will not confirm them to trust our bank account..They are keeping tracking so
that they can catch files along us if they are customer I will confirm them and
give their requests the said bank account number for their electronic deposit
of annual bonus check.
CHAPTER 4 (PRIVACY)
Question 1: You are a writer for a tabloid magazine and want to get some healing-grabbing news about the stars of a popular TV shows. You decide to file a separate Freedom of Information Act request for each of the show’s stars with FBI. Would you consider this an ethical approach to getting the information you want? Do you think that the FBI honor you request?
Answer 1: I
think so, this is an ethical approach than to grab headline that are not legal
for you to get/put some information of popular TV shows and also
there is to be followed lawsuits for that case for filing Freedom of Information Act and also
as a writer you have to be initiatives to you career. I think the FBI will
honor my request as long I followed their rules and also I know my boundaries’
as a writer magazine.
Question 2:You company is rolling out a training program to ensure that
everyone is familiar with the company’s IT usage policy. As a member of the
Human resources organization, you have been asked to develop a key piece of the
training relating to why this policy is needed. What kind of concerns can you expect
your audience to raise? How can you deal with this anticipated resistance to
the policy?
Answer 2: One
of the audience may I expect to rise is if the effectiveness of an IT usage
policy will care/ shield for us as a worker in the company? Or maybe I expect
to them if effectiveness of an IT usage policy will not implement if someone or
others neglect it…it’s too simple if they are not practice then they commit
sin, full-out to his/her job’s is the answers in order to remind them the power
of the policy is being implemented of the company and may others learned and disciplined.
No comments:
Post a Comment