You are on page 1of 3

IST 524: Ethical Scenarios Week #: 7 Team Name: Team 2

Recorder: Umer Coordinator: Nina


Elaborator: Zia, Larry Explorer A: Harold Explorer B: Nina

IST 524: Week 7 – Ethical Scenarios


Scenario 1:
Contrary Colleagues. You are a corporate training designer (or teacher) who is a
committed adherent of behaviorism according to B.F. Skinner and his followers. You
strongly feel that your colleagues who don’t follow these principles are hopelessly out
of touch with sound principles of professional practice. In your everyday conversations
you are candid with them; you politely but firmly urge them to change their
practices. They are not showing any signs of changing, so you are considering publicly
criticizing their perceived faults in front of trainees (students) and your supervisor.
How should you proceed?

The contrary colleagues’ scenario definitely presents a few ethical considerations.


The teacher is an advocate of behaviorism and strongly feels that his colleagues
should hold the same position. It is generally unprofessional and unethical to publicly
criticize the perceived faults of anyone in front of students and supervisors. In cases
like this, the golden rule would apply: Do not do unto others as you would not have
done unto you.
The AECT Code of Professional Ethics, Section 1, Item#9 sates an employee should
“refrain from any behavior that would be judged to be discriminatory, harassing,
insensitive, or offensive and, thus, is in conflict with valuing and promoting each
individual's integrity, rights, and opportunity within a diverse profession and society.”
Furthermore, in fulfilling obligations to the profession, the member shall accord just
and equitable treatment to all member of the profession in terms of professional
rights and responsibilities, including being actively committed to providing
opportunities for culturally and intellectually diverse points of view in publications
and conferences.
I should not denounce the other employee in front of the supervisor and other
trainees in any case as it is contrary to the ethical values. In order to follow B.F.
Skinner, one possible suggestion is to keep reinforcing the positive stimuli in order to
get positive response from the employees. There may be contingent punishment if the
rules are not followed; for example, the concerned employees may be referred to the
human resources department through the policies in place for extensive remedial
training. Another option is be a committed adherent to a professional code of ethics
by competently sharing and explaining my position, while respecting the opinions of
others in encouraging thoughtful, constructive dialog and respectful debate of
important issues.

1
IST 524: Ethical Scenarios Week #: 7 Team Name: Team 2
Recorder: Umer Coordinator: Nina
Elaborator: Zia, Larry Explorer A: Harold Explorer B: Nina

Obviously, taking the ethical high road to encourage calm, reasoned debate through
respectful interactions builds diversity of thought, new ideas, and better, more open
relationships with everyone in a learning community. It is also the right thing to do.

Reference:

(n.d.). Retrieved October 08, 2017, from http://aect.site-


ym.com/members/group_content_view.asp?group=91131&id=309963

Scenario 8:
Sharing Information. Tony is a media specialist at a school, and also happens to be
network coordinator. He was concerned with some network security breaches he had
heard about and mentioned it to Principal Jackson at their weekly briefings meeting.
After discussing the possible threat, Principal Jackson agreed to allow Tony to attend
a conference on the matter so he can better prepare his knowledge on an area he
admitted knew very little of. Upon his return, he was to prepare a workshop for the
faculty and students on all that he learned about network security. Tony was beside
himself and unsure of how to share about all the things one would “not do” in regard
to network security, that he learned at the conference. Principal Jackson reiterated
having the workshop for the faculty and students, even though it would reveal how to
create security breaches in the network. Tony was not comfortable with proceeding.
How should he approach this issue and proceed with his required duty?

This scenario illustrates an ethical dilemma for Tony. Generally, the enacting of laws
often lags the advent, widespread use and abuse of many technological
advancements. Similarly, our notions of right and wrong, coupled with behaviors
manifested by our respective moral beliefs, often give rise to new laws meant to
deter future wrongdoings.
In the ACET Code of Professional Ethics, Section 1, Item 7 states a member “shall
promote current and sound professional practices in the use of technology in
education.” Furthermore, Section 1, Item 6 states, the member “shall make
reasonable efforts to protect the individual from conditions harmful to health and
safety, including harmful conditions cause by technology itself.” Section 2, item 6
states the member “shall promote positive and minimize negative environmental
impacts of educational technologies.”

2
IST 524: Ethical Scenarios Week #: 7 Team Name: Team 2
Recorder: Umer Coordinator: Nina
Elaborator: Zia, Larry Explorer A: Harold Explorer B: Nina

Options for this case include sharing no information in an attempt to avoid disclosure
of possible, exploitable security weaknesses by users. This could, however, lead to
general exposure to unprotected security threats due to ignorance and apathy. On
the other hand, telling users too much could inadvertently provide them with the keys
to defeat or exploit systems. Tony may consider what information is pertinent to the
faculty and students to eliminate security breaches and to strike a balance wherein
users are provided information and training sufficient for their safe use of vital
institutional resources. Tony may design the workshop in such a way that all
participants will have the motivation to solve the problem together. He my consider a
plan to grant authority and access based on users’ respective roles, positions,
qualifications and needs to minimize security threats.
Tony could develop training focusing on the issues necessary to prevent network
breached without exposing information detrimental to the network and make a plan
to grant authority and access based on users’ respective roles, positions,
qualifications and needs. It will help ensure that each user knows and understands
their respective roles and responsibilities in maintaining professional, safe and secure
technology practices for their own good, along with that of the institution.

References:

(N.D.). Retreived October 8, 2017, From http://aect.site-


ym.com/members/group_content_view.asp?group=91131&id=309963

(n.d.). Retrieved October 08, 2017, from http://aasa.org/content.aspx?id=1390

You might also like