Security StrategiesNetwork World's Security Strategies Newsletter, 09/06/07Ethical decision-making: Principles, rights and duties, and intuitive cuesBy M. E. KabayIn my last three columns, I've been discussing the July 30 column by Vauhini Vara of the _Wall Street Journal_ entitled, "Ten Things Your IT Department Won't Tell You." The author provides detailed information on how to violate acceptable-use policies for corporate computer equipment. In this last column in the series, I want to finish applying Kallman and Grillo's ethical decision-making methodology. Again, the essential points of the method are: 1. Identify the ethical problem in operational terms.
I've been analyzing the case of Bob, an employee who signed an appropriate-use agreement with his employer but who chooses to follow Vara's suggestions for cheating his employer of useful work - and then concealing his violations of policy. I covered the first two points of the methodology in previous newsletters; now we move to the final three. Some of the principles that anyone can apply when deciding whether a proposed action is right or wrong can be represented as questions about the proposed course of action: * Does it break a promise? I think Bob's cheating would generate "Yes" answers for several of these questions. From a contractual point of view, the stakeholders at Bob's place of employment have a right (a claim or an entitlement) to Bob's honest provision of work for pay, just as he has the right to be paid for his work. Reciprocally (which is the usual relationship between rights and duties), Bob has a duty to provide an honest day's work for his pay. Watching sports programs while being paid to do work does not count as fulfilling his duty. Finally, some of the intuitive indicators that help us choose between right and wrong are as follows: * Does it feel wrong? (The "smell test") Again, I think it must be clear that at least several of these questions should raise alarm bells for any normal person. What about Vara and the WSJ? I leave evaluation of the answers to questions raised by these guidelines to the readers as an exercise. Perhaps they will make interesting discussion points over lunch. I'm sending these articles to Vauhini Vara and to the editors of the WSJ and maybe they will respond - I'll let you know.
|
Contact the author: M. E. Kabay, Ph.D., CISSP-ISSMP, is Associate Professor of Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site. ARCHIVEArchive of the Security Strategies Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment