EBK MANAGEMENT INFORMATION SYSTEMS
16th Edition
ISBN: 9780135192047
Author: LAUDON
Publisher: VST
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4, Problem 9HMP
Explanation of Solution
Calculating the total amount of time spend by each employee and the total amount of time used by the computers:
The chart below indicates each employee in the insurance company and their respective time spent on the web versus the time spend for company purposes.
Employee Name | Weekly Online Minutes | Actual Company Minutes |
Kelleher, Claire | 248 | 141 |
McMahon, Patricia | 127 | 44 |
Milligan, Robert | 155 | 0 |
Olivera, Ernesto | 40 | 0 |
Talbot, Helen | 260 | 125 |
Wright... |
Explanation of Solution
Ethical problems created by the employees:
- Understanding the report, there is a clear indication that employees are using the web for their personal uses also during the time of work.
- This personal usage can be social networking sites or other company websites, which do not have relevance to their function or the insurance company’s interests.
- This personal work results in loss of productivity of the employees to the company, seriously affecting the profitability of the small firm.
- This private use of web can also make them to lose their working hours, necessitating them to work extra hours with extra pay, to complete a project on the scheduled deadline...
Program Plan Intro
Guidelines for ethical analysis:
To conduct an ethical analysis, we must follow the below mentioned guidelines:
- Identifying and describing the facts correctly
- A company must perform all the necessary checks.
- Need to distinguish and check between actual problem and the reports on paper.
- Identifying the truth will only help to solve the problem.
- Identify the higher values and the conflict of interest
- Important to solve this dilemma so that the higher values are retained such as privacy, freedom, and intellectual property rights.
- Addressing the problem while upholding the values is needed.
- Identify the stakeholders
- Stakeholders involve all those who are interested in the outcome of their situation and understanding the opinions of those is required.
- Identify the reasonable options that can be taken
- Options can be accepted by all or only a few.
- Also, the suitable choices can be either effective for most or a few only.
- Understanding all possible ways of action is needed.
- Identify the potential consequences of the options taken
- Every action taken will have a consequence and it is needed that ethical value is retained.
- Also, the option chosen should be able to work consistently over time.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
(15 pts) Task 2: Consider a system of nonlinear equations given by,
X1 X2 X3 = 0
x² + x + x = 2
(x₁(x2+x3) = −1
Please write down the expression of the elements in vector F and the matrix J, respectively, in
the following pseudocode of Newton's method (in matrix/vector form) for solving this system.
Please help me translate the following Jack code into its XML parse tree (using the Jackgrammar).
please help me see how many tokens will be generated
Chapter 4 Solutions
EBK MANAGEMENT INFORMATION SYSTEMS
Ch. 4.4 - Prob. 1.1CQCh. 4.4 - Prob. 1.2CQCh. 4.4 - Prob. 2.1CQCh. 4.4 - Prob. 2.2CQCh. 4.4 - Prob. 2.3CQCh. 4 - Prob. 1IQCh. 4 - Prob. 2IQCh. 4 - Prob. 3IQCh. 4 - Prob. 4IQCh. 4 - Prob. 5IQ
Ch. 4 - Prob. 1RQCh. 4 - Prob. 2RQCh. 4 - Prob. 3RQCh. 4 - Prob. 4RQCh. 4 - Prob. 5DQCh. 4 - Prob. 6DQCh. 4 - Prob. 7DQCh. 4 - Prob. 8HMPCh. 4 - Prob. 9HMPCh. 4 - Prob. 11HMPCh. 4 - Prob. 12CTPCh. 4 - Prob. 13CSQCh. 4 - Prob. 14CSQCh. 4 - Prob. 15CSQCh. 4 - Prob. 16CSQCh. 4 - Prob. 17MLMCh. 4 - Prob. 18MLM
Knowledge Booster
Similar questions
- please help me translate the following Jack code into its tokenized XML code.arrow_forward(a). Consider that you are working as Data Analyst in an organization. The HR department needs you to carry out following operation on existing list of 10 employees name (you can assume 10 names in a list here). Split the list into two sub-list namely subList1 and subList2, each containing 5 names. A new employee (assume the name “Kriti Brown”) joins, and you must add that name in subList2. Remove the second employee's name from subList1. Merge both the lists. Assume there is another list salaryList that stores salary of these employees. Give a rise of 4% to every employee and update the salaryList. Sort the SalaryList and show top 3 salaries. Write the Python code and output for the same. (b). Design a program such that it converts a sentence into wordlist. Reverse the wordlist then. Write the code and output for the same. Note: The code and its output must be explained technically. The explanation can be provided before or after the code, or in the form of…arrow_forwardJelaskan perbedaan antara negasi, konjungsi, dan disjungsi dalam logika proposisi.arrow_forward
- Perform the analysis workflow of the Chocoholics Anonymous product described in Appendix A.arrow_forwardEncrypted email Assignment Download a software called pgp here: OpenPGP Email encryption. For all operating systems. Standing the test of time. OpenPGP Explain the process of creating a public and private key in the software in 2 paragraphs. In this assignment you will encrypt the body of an e-mail message and send me the encrypted message. I will decrypt the message providing you include a specific piece of information (what information should you also send with the email? Explain it in the email you encrypt. I will send you an encrypted response to the email and you will decrypt the message and upload it to black board along with the answers to the questions for this assignment. This is my public key: -----BEGIN PGP PUBLIC KEY BLOCK----- mQINBGVt7ioBEADBklX65xazdnhFZhMCs9bNzGVeVFggomPzx8xe/XtJ2infqb2d bEGICa5gLhDDP06ogACbRwpcuEFR8Fu4lO2jigWRvwrQ4eXiEVQIqTBxLFC7ClPz K0vCzQp5CXXBVk3MskkvDaF2yjVEkSGosjFKVZx76oe0+98AzJuMCDJujidy0pOW…arrow_forwardPlease help me Matlab don't use AIarrow_forward
- please write Hack ALU Assembly program that will display the letters "C", "S", and the number 220 ( all formed by pixels ) in the nand2tetris CPU Emulator in the center of the screen in thecolor black. Please thanksarrow_forwardPlease help me do this exercisearrow_forwardDear expert already got wrong chatgpt answer No chatgpt will upvotearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education