SEARCH RESULTS

YOU WERE LOOKING FOR :Using Technology to Manage Ethics

Ethics in Accounting Practice: Rules Based Accounting versus the Conceptual Framework

is trying to create accounting standards that are defined in terms of objectives but do not rely on "specific rules" (" A Conversa...

The Family Guy (Ethics Analysis)

censor themselves, from including offensive material? What is okay to air in the name of comedy? To some extent, The Family Guy cr...

Ethics, Society, and the Science of Genetic Testing/Screening and Counseling

including confirmation of a suspected medical diagnosis, as a predictor to an individuals susceptibility to a particular illness a...

INTERNET SECURITY TECHNOLOGIES - AND PREVENTING THEM FROM BEING COMPROMISED

hindrance to productivity. Any employee who has trouble remembering an alpha-numeric password to get onto a system, then has to wa...

THE ETHICS OF EUTHANASIA

becomes a raving lunatic (ask anyone that has experienced the last few months of a beloved family member suffering from terminal b...

BADERMAN ISLAND RESORT AND TECHNOLOGY

in each room? Would the reservations be accessible through the hotels television sets? How would the remote systems work? This wou...

NIKE, GLOBALIZATION AND ETHICS

only among its suppliers and contractors, but also the factories that are subcontracted to. In this paper, well examine a ...

Technology and Culture: The Electronic Media and Our Children

accounts of child abductions, rapes, and murders practically every day. We are kept up-to-date on the violence in Iraq and that u...

Singapore International Airlines and In Flight Business Technology Enhancement

In eight pages the options Singapore International Airlines can pursue in order to attract greater numbers of business travelers a...

20,000 Leagues Under the Sea by Jules Verne and Futuristic Technology

as if it existed at the time. Carter Kaplan notes that "Verne exhibits strict adherence to known science or pseudo-science, a jour...

Constantly Evolving Information Technology

In eight pages this paper examines IT's past, present, and future potential. Six sources are cited in the bibliography....

Police Ethics, Terrorism, Corruption, and Social Stigma

Section 15 of the Act technically allows representatives of the federal government to access private records such as our library t...

Technology and offender motivations in relation to fraud and theft

In addition, these security measures are not particularly effective against fraud which makes use of social engineering: the scams...

TECHNOLOGY AND BUSINESS

one letter. Looking at that same workflow today, we likely have the boss distributing some notes to his or her administrative assi...

The Ethics Involved in Human Cloning

genes are duplicated in a host bacterium" (Pence, 1998, p. 11). Cellular cloning refers to a process in which "copies of a cell ar...

ETHICS IN MANAGEMENT ACCOUNTING

purchasing agent? The answer here is a clear-cut no. He may not be the purchasing agent, but he is the controller. He handles the ...

Ethics in Palliative Care

regarded as creating obligations on others to help her exercise her rights. An inherent theme that is implied in all of the questi...

Negotiation and the Wellington Institute of Technology

means that there are two goals, a short term goals as well as a longer term goals that will help to mitigate the situation so that...

ETHICS OF OIL IN NIGERIA

This 3-page paper provides a brief history of unethical behavior of oil companies in Nigeria. Bibliography lists 3 sources....

"Marketing, the ethic of consumption, and less-developed counties"

identification is (more or less) closely bound up with what one owns or consumes" (Brenkert, 1998; p. 93). These are the people t...

Ethics Values and Foci in Social Work

Social work is often integrally involved with the elderly. There are many facets of the aged individuals life...

Ethics Issues of the Caltex Plant in South Africa

become complex, as the firm has a duty to the shareholders to undertake business to create profit, potential losses and lost oppor...

APA Ethics Code

types of information has been upheld in numerous court cases (Smith-Bell and Winslade, 2008). Confidentiality is about privacy but...

Choosing an Information Technology System

to evaluate the best course of action and to make the decision. This process may take seconds, or may take months, depending on th...

Environmental and Abortion Ethics

on "what all human beings should do if they want to be moral: They should always act in their own self-interest" (Thiroux 37). Ad...

Ethics and Leadership

Ethics are interdependent with values and values are the basis and driver of ethical leadership (Renner & Renner, 2006). Values de...

Ethics and Community Policing

In order to be effective community corrections must be structured around ethical principles and police behavior must reflect that ...

CULTURE AND ETHICS IN MEXICO AND COSTA RICA

Mexico is quite high in the power distance ranking, suggesting a high level of power, wealth and inequality in society (Mexico, 20...

Assessing the Value of an Information Technology Risk Assessment

value would then be assessed as a result of the savings that were created less the costs of putting those savings in place. Increa...

ALCOA CASE STUDY: VALUES IN ETHICS

This is interesting to read about - most organizations have ethics codes and they pay lip service to ethics. But Alcoa is one of t...