Tuesday, May 5, 2020
Ethical Dilemma Principles of Operations Management
Question: Discuss about the Ethical Dilemma for Principles of Operations Management. Answer: Introduction Ethical Dilemma has been the situation where there is a problem related to the ethical issues and is seen that it is tough to solve the problems associated with it. The paper has been focusing on the ICT tools within a smaller organization. For keeping the confidentially intact, the organization name has been kept as secret. XYZ has been the company which is used as the name for the organization. The business organization sets up a higher problem which relates to the greater losses in the revenue amount. This is due to the problems in an ethical dilemma. The description, difficulties with the useful recommendations are discussed under the different issues. Case Description The organization has been working on the development of the garments with the idea to design the unique dresses which have not been available for the market structure at different times. The plan has been set to handle the database with the working of the computer networking. The pattern has been set with the intellectual property along with the confidentiality. (Heizer et al., 2016). The basis is depending upon system network which is then hacked by the competitors with the design completely stolen by the other company before the development of the same by the business XYZ. Case Analysis The company has been working on the different phases of the business which try to set up the development techniques with the unique designs for the clothing to target the different and the new customers. The basis for a good business is that they have the aim to capture a broader target market which can set the different range of the products for the new designs. The idea of business is negatively affected in this case. (Shapiro et al., 2016). The Doing Ethics Technique has been used for the analysis of the case where the focus has been on the six questions to analyze the problems and the relevant issues to it. Some of the questions discussed are: What are the events taking place and comment on the relevant facts? The server of the company was found to be hacked where the entire data was saved. Hence, the cyber criminals stole the designs of the different products and sold it to the competitor company for their development of business. (Ferrell et al., 2015). Comment on the issues related to accessibility The issues are that there have been ethical problems where the hackers could easily get the entry to the system database with easy access to the networking system, in an unauthenticated manner. The entire accessing led to the confidential leakage of the data for the different designs. Who is affected? Comment on ethical implications? The stakeholders of the company have to face the significant loss with the delivering of the newer products for the customers. The stolen designs have been sued where the XYZ company now has to face a severe loss. The ethical implications are that the company is not able to easily claim on the belongings. The information design is set as per the information through the computer network in the system. (Fried, 2015). There has been no earliest evidence related to the stealing where the company could claim for anything. Hence, the company is failed to generate the revenue from the designs which are stolen. What are the actions possible? Which option is best? Considering the legal implications, there is a need to focus on the things in future and to take care of the data. In the present scenario, nothing productive could be done as there is no proof for the same. Hence, the only thing possible is that the company will have to focus on the improvement of the computer security network so that the cyber hackers are not able to easily attack the system. Also, the copyright for the designs is needed before the functioning of the same which is signed by the related government authorities. The best option which could be considered for the company is to handle the network where the competitors need to focus on the infrastructure along with effectively handling the use of the standardized network security. (Linehan et al., 2016). The possibility is based on the modern safety devices where the company will be using the stronger antivirus with the protection of the firewall to protect the system from the issues. The firewall will set the encryption and the decryption of the passwords and so it will be tough to crack and steal the data in future. Conclusion There have been ethical issues which are discussed in the above case study, related to hacking. The database for the company XYZ needs to handle the huge loss in the market which will be in the business according to the different designs. This has been already used by the other company who has stolen the data. The company is not able to claim the rights as they did not focus on claiming the rights over the designs. (Mintz, 2016). Hence, no evidence could be found for the same. The issues could not be resolved, but the company can always focus on working on the increased strength of the network with the improvement of the security of the system. Reference Heizer, J., Render, B., Munson, C. (2016).Principles of operations management: sustainability and supply chain management. Pearson Higher Ed. Shapiro, J. P., Stefkovich, J. A. (2016).Ethical leadership and decision making in education: Applying theoretical perspectives to complex dilemmas. Routledge. Ferrell, O. C., Fraedrich, J. (2015).Business ethics: Ethical decision making cases. Nelson Education. Fried, J. (2015). Ethical Issues with the Repiphysis Prosthesis. Linehan, C., OBrien, E. (2016). From tell-tale signs to irreconcilable struggles: The value of emotion in exploring the ethical dilemmas of human resource professionals.Journal of Business Ethics, 1-15. Mintz, S. (2016).Ethical obligations and decision-making in accounting: text and cases. McGraw-Hill Higher Education. Ferguson, S., Thornley, C., Gibb, F. (2016). Beyond codes of ethics: how library and information professionals navigate ethical dilemmas in a complex and dynamic information environment.International Journal of Information Management,36(4), 543-556.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.