Answer to Question #199216 in Philosophy for Enam

Question #199216

a) Sexual harassment is any unwelcome sexually-determined behavior that includes a demand or request for sexual favors, physical contact, sexually colored remarks, pornography display, and any other verbal, physical, or non verbal conduct that is of a sexual nature. Briefly explain the concept of third party harassment.


b) Computer ethics can be referred to as a branch of practical philosophy that deals with how computing professionals make decisions regarding professional and social conduct. Using concrete examples, discuss at least two aims of computer ethics.


c) Loyalty does not mean covering up your supervisor for his serious wrongdoings. A whistle-blower may be considered as loyal to the company when he/she blows the whistle on the fellow employee who is stealing from or otherwise harming the company. Examine at least three causes of internal whistle-blowing. 


1
Expert's answer
2021-06-01T15:13:01-0400

Concept of Third-party Sexual Harassment

Third-party sexual harassment occurs when the violation is Accomplish not by a different employee but by a stranger (Alper., (2021). Generally, the bandits of this kind of violation include customers, patrons, and salespersons who come to the area or else interact with the workers, individualistic contractors who toil for the organizations, and the workers or contractors of various organizations (Alper., (2021). Third-party sexual harassment is mandated to reach the description of sexual harassment that means it is required to be adverse or pervasive to an extent it generates a horrible laboring environment. An example is when the delivery driver asks the organization's front desk to go on an engagement that is not considered sexual violations (Alper., (2021). But if the same organization driver keeps insisting on the arrangement, make assumptions of no being a yes. Every moment he made a delivery that would still lie as sexual violations (Alper., (2021). Likewise, suppose the customer touches the worker incorrectly on the arm while on planned lunch. In that case, that will not be assumed as sexual harassment, but if the customer keeps insisting on touching the worker's hand on a business lunch, that will lead to sexual violation. There are various methods of dealing with third-party violations in an organizational environment (Alper., (2021). To deal with third-party violation one is mandated to involve the third party violation into their internal violation policy, encourage the workers on the moments and place to report such incidences of third-party violation, generate reporting mechanism, Involve the workers in an intensive talk, Educating people who have roles of perceiving this type of information and the final method of dealing with the third party harassment is getting InTouch with the counseling team about the issue of third party violations such as discriminations that lie on the secured range (Alper., (2021). The most affected victims here are usually the workers of the organizations. They are never out of content from the violation .it is understood that third-party violations occur in custodial environments mostly.

Discuss at least two aims of computer ethics

The first objectives of computer ethics are to secure the privacy and the security of the computer end users (Pugsee.,2017). This means that the computer end-user is in a secure position to use and operated the computer since computer ethics protects them. Computer ethics protects the information privacy of the end-users from being exposed to outsiders inappropriately. It involves securing the information privacy of a given organization from the public demanded, thus promoting the organization's confidence (Pugsee.,2017). Information privacy security is more challenging to maintain as a result of social techno risk concerns. Consider an organization universal serial bus tool residence for individual convenience flows. The risk of breaching an organization set rules that no organization assets shall be permitted to leave organization environments without any permit. This will help protect the loss of organizational information from leaking.

The second objectives of computer ethics are to ensure that individuals can utilize the computer in the correct and proper ways (Pugsee.,2017). Computer ethics is regulated with rules and instruction that pertains the use of the computer whole wide. These rules and regulations govern the users from exploiting technology tools such as computers or smartphones. Computer ethics, therefore, servers to protect the behaviors and maintain esteemed values of people. Computer ethics is set to protect the public from the post of non-useful information such as pornographic videos that are never necessary but rather deem the morals of the society.

The final objective of computer ethics is to guarantee that the task performed by an individual is not announced by other individualistic. This objective is achieved simply by conducting rules and regulations of privacy control (Pugsee., 2017). Copying the work done by an individual is term as plagiarism, and it may cost a lot if one Is found to have done so. Computer ethics has sensitized the importance of doing personal tasks genuinely.

Explain three reasons for whistleblowing

Numerous factors contribute to the causes of while blowing. Whistleblowing is experiencing in any environment where individuals stay together ( BALTACI & BALCI.,2017). In a different environment where people reside, there is the varying reason for whistleblowing. These reasons are the subject to controversies on the line of interest taking and advantage taking. Reasons for whistleblowing are based on individual, institutional and communal values ( BALTACI & BALCI.,2017). For personal defense, the leading cause for whistleblowing within an institution is the idea of protection. Whistleblowing is performed to secure whistleblowers, and interindividual causes are generally categorized as the psychological requirements ( BALTACI & BALCI.,2017). Whistleblow can also be performed in such a way to attain individual profits of different types that includes courage, self-confidence, and self-control. In an organization, workers can benefit whitlow to shadow different attitudes and behaviors that have been part of their features to overpower individuals.

For institutional reasons, a worker can report varying experiences within the company. It can be announced that the worker might be an average driver to possess such behaviors, having the desire for notoriety. Individual desires can be more of worldly interest. Consider a worker who gives information with the faith of being promoted .by giving out smart keys that will be of value to the company may cause the whistleblower to be in a position to secure the best place in the company also achieve social support from other fellow workers of the company ( BALTACI & BALCI.,2017). Insufficient communication and conflict instances between the workers are also grouped among the organization's causes for whistleblowing.

Social reasons are another contributing factor for whistleblowing in society ( BALTACI & BALCI.,2017). Whistleblowers often possess huge ethical sensitization and retain the community's desires on the ground, with whistleblowing performed to secure the wellbeing of the society.

References

Alper, T. (2021). Third-Party Sexual Harassment: The Challenge of Title IX Obligations for Law School Clinics. Wash. L. Rev.96, 1.

Pugsee, P. (2017, December). The effect of collaborative learning techniques in the flipped classroom learning: Computer ethics course. In 2017 IEEE 6th International Conference on Teaching, Assessment, and Learning for Engineering (TALE) (pp. 381-388). IEEE.

BALTACI, A., & BALCI, A. (2017). Reasons for whistleblowing: A qualitative study. Eğitim Bilimleri Araştırmaları Dergisi7(1), 37-51.



Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

No comments. Be the first!

Leave a comment

LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS