Doing Ethics Technique
Question 1: Doing Ethics Technique
In December 1999, IBM-GSA had won the tender regarding the IT outsourcing contract for the Department of Health, Aged Care and the Health Insurance Commission along with the EDS and CSC. However, during the process of tender, the IBM-GSA was supplied with the disk that contains an ample amount of critical information regarding the bidding price of the other rival organizations. Therefore, it helped IBM-GSA to get the tender and it can help them to get ahead from their rival organizations. After the retirement of the minister, he admitted the fact that the tender should be cancelled. Therefore, it can be said that the entire process did not maintain the ethical concepts of the bidding process.
Effects of the scenario
As the entire process did not maintain the ethical concept, therefore it can hamper the performance and the business activities of the other organizations. Along with that, it also hampers the ethical practices of IBM-GSA. This kind of practice may lead them to do the same thing that had happened regarding the tender process. In addition to that, it also reduces the morality of the other organizations that took part in the bidding process.
Issues regarding the scenario
As IBM-GSA already got the details of the pricing of their rival bidders, therefore they can easily manipulate their pricing according to their rival’s price. As bidding is a very private business practice, therefore all the organizations need to maintain the ethical concepts of the bidding process. Therefore, it can be considered as the ethical issue from the perspective of the IBM-GSA as they should step down from the tender process after knowing the bidding price of the other organizations.
The primarily affected entity regarding the scenario is the IBM-GSA. As they did not maintain the ethical practice during the tender process, therefore it can hamper their business practice. Maintenance of the ethics could enhance their employee motivation; therefore, this certain aspect could not enhance their business morality. On the other hand, the other organizations that took part in the bidding process also get demoralized after knowing the fact that IBM-GSA already knows their pricing strategy.
According to Parker (2013), maintenance of the ethics in the business organizations or in the different business process is very much essential for a business organization. The main ethical issue regarding the given scenario is the fact that IBM-GSA was aware of the bidding price of the other organizations and still they took part in the bidding process and manipulate their price to won the tender process.
Implication of the issue
The implication regarding the given scenario was very much important in order to maintain the ethical issues in the process of bidding. As IBM-GSA was aware of the bidding prices of the other organizations, therefore they had manipulated their pricing and won the process of bidding by using the unfair means. After winning the bidding process, all the other organizations were thrown out from the bidding process and it provided an ample amount of encouragement in order to perform the same kind of activity for the next time also.
Steps regarding the issue
In order to mitigate the ethical issue, IBM-GSA needs to maintain the ethics in their business process. The organizations need to be ethical in terms of their business process so that they can gain an ample amount of respect from their rival organizations and the customers. After knowing the fact that IBM-GSA has maintained the unethical practice during the tender process, the higher Authority should reject the entire process. However, the process was not stopped and the tender was awarded to them. Therefore, the tender process needs to be very much secure and needs to maintain the privacy concerns. That can reduce the unethical practices regarding the process.
Options regarding the issue
One of the options regarding the maintenance of the ethical issue is to maintain the ethical practice in the organization. IBM-GSA should maintain the ethical practice. On the other hand, the management authority of the bidding process should cancel the candidature of the organizations who utilized the unfair means in order to win the bidding process. Along with this, the other organizations should also step down from the bidding process after knowing the fact that the bidding process was not enough transparent.
Best option of the issue
The best option regarding the maintenance of the ethical issues is the fact that IBM-GSA should maintain the ethics in their business practice. This can enhance their business productivity of the organization.
Reason behind the option is best
The above-mentioned option is considered as the best option because of the fact it can enhance the business functionalities of the organization (Bernoth, Dietsch, Burmeister & Schwartz, 2014). If IBM-GSA maintains the ethical concepts in their business process, then it would become a habit for them and they would never perform this kind of unfair means in order to win a business process. Otherwise, they would regularly perform this sort of unfair activity in order to win the different business processes.
Consideration from the perspective of utilitarianism
Myers & Venable (2014) said that the theory of utilitarianism defines the fact that the taken actions are right if they are very much useful or can provide an ample amount of benefit to the majority of the people. However, this scenario does not match with the perspective of the utilitarianism. Different organisations have filled up the tender process in order to get the tender; therefore, any of them can get the chance to perform the activity. If IBM-GSA had filled, the tender amount that can be considered as much efficient then it could be said that the process provides an ample amount of benefit to a large number of population.
Question 2: Essay
As the technology is getting advanced day by day, therefore the concerns regarding the privacy and the security are also being increased. According to Quinn (2014), the organizations need to be aware of the different privacy and the security issues that can easily harm their business activities. The intruders or the hackers are the people who mainly performs the different unfair means in order to break into another's system, take out all the important set of data, and make the entire organizations a paralysed one. In order to mitigate this sort of risks, some people can also intrude into the system and alter the settings that were done by the hackers. Bowman, West, Berman & Van Wart (2016) said that this people are known as the ethical hacker or the white hat hackers. The primary aim of this study is to evaluate the proper comparison in between the different types of hackers and their functionalities.
Comparison between professional ethics and the other type of ethics
Black hat hackers
The black hat hackers are the person who mainly violates the security options of a workstation for a very small reason that can be beyond the maliciousness or for the personal profit. The black hat hackers mainly intrude into an organization’s system or an individual’s system and can easily take out all the important set of information (Whitman & Zafar, 2014). Along with that, they are also able to gather the credit and debit card details of the online shoppers. Therefore, it can be said that it is an unethical practice in terms of business process.
Grey hat hackers
The grey hat hackers are the people who are the mixture of both black and white hat activities. They mainly look for the different areas of vulnerabilities in a particular system without getting the permission of the owner. If they found the issues, they would report it to the owners. Therefore, it can be said that they are not malicious in terms of their intentions.
White hat hackers
According to Bannister & Connolly (2014), they are also known as the ethical hackers. Sometimes they are the paid employees in the organization in order to provide an ample amount of strength to the security of the organization. The processing of both black hat and white hackers are more or less same. However, there is only a single difference regarding the fact that the white hat hackers take permission from the owner that they black hat hackers does not.
When it comes to the comparison in between the personal and the professional ethics, the personal ethics mainly refers to the proper sense of right and wrong and on the other hand, the professional ethics refers to the ways through which the employees are imposed within the organization. Along with that, Townsend (2013) said that an individual has the choice of changing his or her personal ethics, however not the professional ethics.
Example of professional codes of ethics
The Baylor College of Medicine has defined a code of ethics that defines the different rules. The code mainly instructs the employees to follow the mission statement of Baylor’s along with their compliance program and the conflict of interest policy (Baylor College of Medicine, 2017). The particular code also includes the basic guidelines regarding the fact that how the employees need to handle the business conducts along with the workplace environment and the different medical and financial records.
After summing up the entire study, it can be said that the maintenance of the ethical aspects is very much important for the individuals along with the organizations. Along with that, the study also concludes the proper difference in between the three types of hackers along with their functionalities. Moreover, the study also derives the fact that the different types of ethics are different from each other in terms of their functionalities.