Professional Documents
Culture Documents
Case Study
Name & Number:
Step Process/Step Issues/Results
Step 1: Analyze - The Given we have several options open to us, it is important to consider the possible positive and negative
Consequences consequences attached to each action:
- Who will be helped by the action? Will only the individual benefit or will it help the people he
associates with?
- Who will it hurt? Will the action come at a cost to others?
- What are the possible benefits and harms ?
- What are short run and long run consequences .
One looks at all the options to select on that produces the best trade off of benefits over harms.
In our case study there are two plausible actions. Either George gives Gagan the information or he doesnt.
Action one provides company level data. As a result The company including its employees will benefit.
Knowledge of areas of overall weakness will help understand concern area and allow for focused changes.
Employees will improve on the relevant skills and in turn through the trickle effect this improved expertise
will help the company.
However, action 2 comes with an additional consequence. While the company as a whole will benefit,
individuals will lose out. Gagan might use the individual level information to remove weak workers.
Workers will loose their jobs and livelihood. Overall, this lay off of weak workers may reduce morale and in
turn reduce firm level productivity. The impact of which will be largely negative in the future.
Step 2: Analyze - The This approach observes actions against moral standards of honesty, fairness, equality, dignity among
Actions others. One should question if the action seeps into the vulnerability of people around us. Does it take
advantage of the less fortunate or less informed. Often there is a conflict between the action makers
principles and the rights of other people involved. It is important to separate the two and see if their rights
are more important than the action makers principles.
Identify the appropriate ACS Code of Professional Conduct values along with the relevant sub-paragraph topics by number and sub-paragraph
(e.g. 1.2.6 (g) – endeavour to extend public knowledge and understanding of ICT). Group each by value and appropriate corresponding sub-
paragraphs relevant to your case study.
Case Study:
5B George
ACS Code of Professional Conduct Value & Section: 1.2.3
HONESTY:
This ACS code of professional conduct focuses on establishing trust among worker, associates and clients. While working, public trust or the
trust of specific stakeholders but not be breached. Circumstances for deception will arise, however it is the duty of each individual to maintain
the trust of all individuals associated.
In our case study this is the most important code of conduct. Workers at George’s firm give out individual level private information in
confidence. They trust George and trust him to not let out individual level.
In accordance with the same, the values that George must uphold are :
1.2.3(g) not attempt to enhance your own reputation at the expense of another person’s reputation.
In order to get adhere with Gagan and not get into his good books, George should not let out information of the weaker cohort of
workers, given his understanding of the repercussions.
1.2.3(c) distinguish between your professional and personal opinions and advice.
As a professional George knows his restrictions, to improve his standing with the Vice president he must not let out sensitive
information.
1.2.3(a) reject, and will not make, any offer of bribery or inducement.
To improve his position, George must not breach privacy policies.
Identify the appropriate Australian Legislation (e.g. Fair Work Act; Privacy Act). Identify and list relevant Australian/International Organization
for Standardization/International Electrotechnical Commission (AS ISO/IEC) (e.g. AS ISO/IEC 38500:2016). Provide at least four items in each
category in the boxes below.
Case Study:
Australian Legislation
AS/ISO/IEC Standards
1. What were the most important professional ethics issues/dilemmas for you in your scenario? (Reference at least two core issues)
1. Corporate Governance: In this study, the company is accountable for using individual level data at firm level to determine firm weaknesses.
By focusing on the individual level data there is a problem of unaccountability. The company is working in a grey area with limited control over
ethics.
2.misusing/mismanagement of data. George is aware of the confidentiality clause associated with the study. He and his senior management
are allowed to use the study to implement company level changes, no individual data can we used. If George lets out information on “who did
well in the study” he is opening himself up to breach of legislation.
2. What do you believe are the most appropriate decisions to be made here for management, organisation and employees?
Management: The decision of considering individual level data : breach of legislation or within the ethical boundaries of the study.
Organisation: The areas of weakness/lack of expertise that need to be worked on to improve company level results and individual level
productivity.
Employees: Degree of subjectivity; if they should lie given the fear of letting out individual data which may be used against them or should
they say the truth and gain assistance in improving their degree of competence.
3. Who is responsible for taking what action here and why? (Name names!)
Gagan: responsible for stopping himself and acting ethically. As VP he is responsible for using the data as firm level data to implement firm
level changes rather than focusing on “individual “ level changes
George: responsible for securing the data collected during the study and deciding whether it is within ethically boundaries to provide Gagan
with information on specific employees.
4. What can be done, or what strategies can be implemented to ensure that a similar situation does not occur again?
George knows that Gagan is working against the law and against company jurisdiction. To avoid a similar situation George must:
a) Deny Gagan access to individual data.
b) Collect relevant information to show breach of conduct.