Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Hacking into harvard case 2.1 answers

14/10/2021 Client: muhammad11 Deadline: 2 Day

"Hacking into Harvard” Please respond to the following:

Read Case 2.1: Hacking into Harvard, located here or on page 71 in your textbook. As applicants began to defend themselves against the penalties handed out by the business schools, they appealed to both consequentialist and no consequentialist criteria to support their actions. Some responded by pointing out that their intentions were never malicious, while others argued they did not think checking their application statuses would cause any real harm

. Review the case study and analyze the actions of the students from a Kantian perspective.

Consider whether the actions taken by the hackers were permissible according the standard of universal acceptability.

chapter two  Normative theories of ethics      71

• the deathbed-promise example (pp. 50–51)

• business as combining self-interest and social good (or egoism and utilitarianism) (pp. 52–53)

• the convenience store owner and acting from a sense of duty (p. 54)

• Martin’s promise as an illustration of the categorical imperative (p. 55)

• hypothetical imperatives vs. the categorical imperative (p. 56)

• two alternative formulations of the categorical imperative (pp. 56–57)

• three features of Kant’s ethics in an organizational context (pp. 57–58)

• three critical inquiries of Kant’s ethics (pp. 58–59)

• how Ross’s theory differs from utilitarianism and from Kant’s categorical imperative (p. 61)

• four important characteristics of human rights (p. 63)

• the difference between negative and positive rights (p. 63)

• how rule utilitarianism differs from act utilitarianism (p. 66)

• the optimal moral code and the analogy with traffic rules (p. 67)

• two objections to rule utilitarianism (p. 67)

• two points drawn from Chapter 1 that can help moral discussions (p. 68)

• two-step procedure for morally evaluating actions and choices (p. 70)

for furtHer refLeCtion

1. What value, if any, do you see in business students studying the basics of ethical theory?

2. Which normative theory or general approach to ethics do you find the most plausible or attractive, and why?

3. Can people who disagree about normative ethical theory still reach agreement on practical ethical questions in the business world? If so, how?

everyone WHo Has ever appLied for admission

to a selective college or who has been interviewed for a highly desired job knows the feeling of waiting impatiently to learn the result of one’s application. So it’s not hard to identify with those applicants to some of the nation’s most prestigious MBA programs who thought they had a chance to get an early glimpse at whether their ambition was to be

fulfilled. While visiting a Businessweek Online message board, they found instructions, posted by an anonymous hacker, explaining how to find out what admission decision the business schools had made in their case. Doing so wasn’t hard. The universities in question—Harvard, Dartmouth, Duke, Carnegie Mellon, MIT, and Stanford—used the same application software from Apply Yourself, Inc. Essentially, all

Case 2.1

Hacking into Harvard

43075_ch02_ptg01_hr_040-079.indd 71 8/13/12 1:01 PM

72 part one moral philosophy aNd busiNess

one had to do was change the very end of the applicant- specific URL to get to the supposedly restricted page contain- ing the verdict on one’s application. In the nine hours it took Apply Yourself programmers to patch the security flaw after it was posted, curiosity got the better of about two hundred applicants, who couldn’t resist the temptation to discover whether they had been admitted.19

Some of them got only blank screens. But others learned that they had been tentatively accepted or tentatively rejected. What they didn’t count on, however, were two things: first, that it wouldn’t take the business schools long to learn what had happened and who had done it and, second, that the schools in question were going to be very unhappy about it. Harvard was perhaps the most outspoken. Kim B. Clark, dean of the business school, said, “This behavior is unethical at best—a serious breach of trust that cannot be countered by rationalization.” In a similar vein, Steve Nelson, the executive director of Harvard’s MBA program, stated, “Hacking into a system in this manner is unethical and also contrary to the behavior we expect of leaders we aspire to develop.”

It didn’t take Harvard long to make up its mind what to do about it. It rejected all 119 applicants who had attempted to access the information. In an official statement, Dean Clark wrote that the mission of the Harvard Business School “is to educate principled leaders who make a difference in the world. To achieve that, a person must have many skills and qualities, including the highest standards of integrity, sound judgment and a strong moral compass—an intuitive sense of what is right and wrong. Those who have hacked into this web site have failed to pass that test.” Carnegie Mellon and MIT quickly followed suit. By rejecting the ethically chal- lenged, said Richard L. Schmalensee, dean of MIT’s Sloan School of Management, the schools are trying to “send a message to society as a whole that we are attempting to produce people that when they go out into the world, they will behave ethically.”

Duke and Dartmouth, where only a handful of students gained access to their files, said they would take a case-by- case approach and didn’t publicly announce their individual- ized determinations. But, given the competition for places in

their MBA programs, it’s a safe bet that few, if any, offending applicants were sitting in classrooms the following semester. Forty-two applicants attempted to learn their results early at Stanford, which took a different tack. It invited the accused hackers to explain themselves in writing. “In the best case, what has been demonstrated here is a lack of judgment; in the worst case, a lack of integrity,” said Derrick Bolton, Stanford’s director of MBA admissions. “One of the things we try to teach at business schools is making good decisions and taking responsibility for your actions.” Six weeks later, however, the dean of Stanford Business School, Robert Joss, reported, “None of those who gained unauthorized access was able to explain his or her actions to our satisfaction.” He added that he hoped the applicants “might learn from their experience.”

Given the public’s concern over the wave of corporate scandals in recent years and its growing interest in corporate social responsibility, business writers and other media com- mentators warmly welcomed Harvard’s decisive response. But soon there was some sniping at the decision by those claiming that Harvard and the other business schools had overreacted. Although 70 percent of Harvard’s MBA students approved the decision, the undergraduate student newspa- per, The Crimson, was skeptical. “HBS [Harvard Business School] has scored a media victory with its hard-line stance,” it said in an editorial. “Americans have been looking for a sign from the business community, particularly its leading educa- tional institutions, that business ethics are a priority. HBS’s false bravado has given them one, leaving 119 victims in angry hands.”

As some critics pointed out, Harvard’s stance overlooked the possibility that the hacker might have been a spouse or a parent who had access to the applicant’s password and per- sonal identification number. In fact, one applicant said that this had happened to him. His wife found the instructions at Businessweek Online and tried to check on the success of his application. “I’m really distraught over this,” he said. “My wife is tearing her hair out.” To this, Harvard’s Dean Clark responds, “We expect applicants to be personally responsible for the access to the website, and for the identification and passwords they receive.”

43075_ch02_ptg01_hr_040-079.indd 72 8/13/12 1:01 PM

chapter two  Normative theories of ethics      73

Critics also reject the idea that the offending applicants were “hackers.” After all, they used their own personal identi- fication and passwords to log on legitimately; all they did was to modify the URL to go to a different page. They couldn’t change anything in their files or view anyone else’s informa- tion. In fact, some critics blamed the business schools and Apply Yourself more than they did the applicants. If those pages were supposed to be restricted, then it shouldn’t have been so easy to find one’s way to them.

In an interview, one of the Harvard applicants said that although he now sees that what he did was wrong, he wasn’t thinking about that at the time—he just followed the hacker’s posted instructions out of curiosity. He didn’t consider what he did to be “hacking,” because any novice could have done the same thing. “I’m not an IT person by any stretch of the imagination,” he said. “I’m not even a great typist.” He wrote the university a letter of apology. “I admitted that I got curious and had a lapse in judgment,” he said. “I pointed out that I wasn’t trying to harm anyone and wasn’t trying to get an advantage over anyone.” Another applicant said that he knew he had made a poor judgment but he was offended by having his ethics called into question. “I had no idea that they would have considered this a big deal.” And some of those posting messages at Businessweek Online and other MBA-related sites believe the offending applicants should be applauded. “Exploiting weaknesses is what good business is all about. Why would they ding you?” wrote one anonymous poster.

Dean Schmalensee of MIT, however, defends Harvard and MIT’s automatically rejecting everyone who peeked “because it wasn’t an impulsive mistake.” “The instructions are reason- ably elaborate,” he said. “You didn’t need a degree in compu- ter science, but this clearly involved effort. You couldn’t do this casually without knowing that you were doing something wrong. We’ve always taken ethics seriously, and this is a seri- ous matter.” To those applicants who say that they didn’t do any harm, Schmalensee replies, “Is there nothing wrong with going through files just because you can?”

To him and others, seeking unauthorized access to restricted pages is as wrong as snooping through your boss’s desk to see whether you’ve been recommended for a raise. Some commentators, however, suggest there

may be a generation gap here. Students who grew up with the Internet, they say, tend to see it as wide-open territory and don’t view this level of web snooping as indicating a character flaw.

disCussion Questions

1. Suppose that you had been one of the MBA applicants who stumbled across an opportunity to learn your results early. What would you have done, and why? Would you have considered it a moral decision? If so, on what basis would you have made it?

2. Assess the morality of what the curious applicants did from the point of view of egoism, utilitarianism, Kant’s ethics, Ross’s pluralism, and rule utilitarianism.

3. In your view, was it wrong for the MBA applicants to take an unauthorized peek at their application files? Explain why you consider what they did morally permissible or imper- missible. What obligations, ideals, and effects should the applicants have considered? Do you think, as some have suggested, that there is a generation gap on this issue?

4. Did Harvard and MIT overreact, or was it necessary for them to respond as they did in order to send a strong message about the importance of ethics? If you were a business-school admissions official, how would you have handled this situation?

5. Assess the argument that the applicants who snooped were just engaging in the type of bold and aggressive behavior that makes for business success. In your view, are these applicants likely to make good business lead- ers? What about the argument that it’s really the fault of the universities for not having more secure procedures, not the fault of the applicants who took advantage of that fact?

6. One of the applicants admits that he used poor judg- ment but believes that his ethics should not be ques- tioned. What do you think he means? If he exercised poor judgment on a question of right and wrong, isn’t that a matter of his ethics? Stanford’s Derrick Bolton distinguishes between a lapse of judgment and a lack of integrity. What do you see as the difference? Based on this episode, what, if anything, can we say about the ethics and the character of the curious applicants?

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Calculation Master
Assignment Hub
ECFX Market
Online Assignment Help
Buy Coursework Help
Instant Assignment Writer
Writer Writer Name Offer Chat
Calculation Master

ONLINE

Calculation Master

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$37 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$45 Chat With Writer
ECFX Market

ONLINE

ECFX Market

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$29 Chat With Writer
Online Assignment Help

ONLINE

Online Assignment Help

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$18 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$15 Chat With Writer
Instant Assignment Writer

ONLINE

Instant Assignment Writer

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$19 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Unisa late submission of assignments - Quality associates inc case problem solution free - Summary of alone together by sherry turkle - Denso 7200 application specifications - 5-2-1/6-1-1 discussion: research plan - Lemov teach like a champion - Feed Back on Blockchain & Cryptocurrency course - Apple watch series 5 target market - Accounting Information Systems SUA project - The time complexity of algorithms. - Parts of a recipe - Gibbs reflective essay on group work - Phenyl trimethicone chemical formula - Pr007 work product - Research methods for the behavioral sciences 5th ed - A cylindrical specimen of stainless steel - What color is ammonia liquid - Application for consent orders kitios app store submission checklist - Maroondah city council ceo - Cedar craft apartments broken arrow ok 74012 - Jacques de molay descendants - Andre yontef cause of death - Blue bank remote deposit capture project - Edinburgh napier student portal - Pleasantville discussion questions - College of will writing - Logistic - Ferrari case study - Operations management issues in toyota - International social work day - IT Forum Reply - Blessed be your name in g - Jeff majors psalms 23 instrumental - Versailles wedding hall disaster - Unit 2 Law discussion - 25) what is the probability that a 100 year flood will occur along the mississippi river this year? - Research Paper - Ntu add drop period 2018 - Diagnostic coding worksheet - 12 bar blues composition project - Shelly cashman excel 2019 module 4 sam project 1a - Hedonic calculus 7 factors - Un2990 'life-saving appliances self-inflating msds - What is the main problem in the book the crossover - Mecu limited asset management arm - Group of bats collective noun - Periodic table structure worksheet - First they came for the jews and i was silent - What are raising agents - Discussion 3 - Components in electronics magazine - Baptist roman road to salvation - Week 3 Word of the week - The "information technology paradox" refers to - Causes of perceptual distortion - Time series analysis notes - Summary of the child is not dead by ingrid jonker - Policy and politics in nursing and health care - Non identifying relationship erd - Journal of inequalities in pure and applied mathematics - 3820 presentation - Hey hey diddly bop bop cadence - Accor strengthening the brand with digital marketing solution - Chintakindi mallesham net worth - What device appears in the vet advice to the narrator - Acme fine furniture brisbane - Eng 121 week 2 assignment critical essay outline - Bituthene liquid membrane sds - Carter v carter coal - Unit of study code - Introduction to type isabel briggs myers pdf - Life cycle of a disposable coffee cup - 25 gatwick road bayswater north - Amarok multi attachment point - NURS-6050N-66/NURS-6050C-66-Policy & Advocacy - U.S. UNIIONS - Yakima roof rack instructions - Homework - James son of alphaeus in the bible - Event planning feasibility study sample - Bohr model electron configuration - Determine whether each phrase describes starch glycogen or cellulose - Deliverable 2 - Tutoring on the Normal Distribution - HR's evolving role and its impact on business strategy - 4 week cycle menu - Bernoulli differential equation solved problems - A conducting loop in the shape of a square - A gong or other effective audible warning - What bread am i quiz - Gate 0 project management - Supplementary bonding conductor size - Tertiary industry of chocolate - Case study develop E.R diagram - Hlr and vlr in mobile computing - Belmont report and its principles quiz answers - Cartoons about sexuality and aging - What substance in msa confers selectivity? why? - Ford motor company case study strategic management - Managerial Economics Discussion Need in 10 hours - First act lola ce140