Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Part 1: What Would You Do? Scenario #5

The purpose of this exercise is to practice making management decisions that involve intellectual property. On page 249 of the textbook, review scenario #5.

Describe how you would handle this scenario using the five-step decision-making process provided in the textbook. Your response to Part 1 should be at least one page.

Be sure to reference the specific ethical approaches (see page 22 in the textbook) that inform your answers.

TABLE 1-5 Summary of four common approaches to ethical decision making Source Line:

Virtue ethics approach The ethical choice best reflects moral virtues in yourself and your community.

Utilitarian approach The ethical choice produces the greatest excess of benefits over harm.

Fairness approach The ethical choice treats everyone the same and shows no favoritism or discrimination. Common good approach The ethical choice advances the common good.

5. Your friend is a two-time winner of the IronmanTM Arizona Triathlon (2.4-mile swim, 112-mile bike, and 26.2-mile run). He is also a popular and well-known marathon runner throughout the Southwest. He has asked you to design a Web page to promote the sale of a wide variety of health products, vitamins, food supplements, and clothing targeted at the athletes training to participate in the triathlon. The products will carry his personal trademark.

However, much of the information on the Web page will include discussion of his personal success in various triathlons and marathons in which he has competed. Many of these events have corporate sponsors and carry their own trademark. He has asked you if there are any potential trademark issues with his marketing plans. What would you do?

Part 2: Case #3: Software Errors Lead to Death

The purpose of this exercise is for you to think critically about the ethical considerations for controlling and distributing various types of software. On pages 291-292 of the textbook, analyze Case #3. Answer the discussion questions that follow the case.

Be sure to reference the specific ethical approaches (see page 22 in the textbook) that inform your answers. Your response to Part 2 should be at least one page.

Virtue ethics approach The ethical choice best reflects moral virtues in yourself and your community.

Utilitarian approach The ethical choice produces the greatest excess of benefits over harm.

Fairness approach The ethical choice treats everyone the same and shows no favoritism or discrimination. Common good approach The ethical choice advances the common good.

3. Software Errors Lead to Death

Medical linear accelerators have long been a critical piece of medical equipment in the fight against cancer. Linear accelerators deliver radiation therapy to cancer patients by accelerating electrons to create high-energy beams, which can kill cancer tumors without impacting sur- rounding healthy tissue. Tumors close to the skin can be treated with the accelerated electrons; however, for tumors that are more deeply embedded, the electron beam is converted into an X-ray photon beam, which is diffused using a beam spreader plate.

The Canadian firm Atomic Energy of Canada Limited (AECL) and a French company named CGR collaborated to build two models of medical linear accelerators. One model, the Therac-6, was capable of producing only X-rays that could be used to kill tumors close to the skin. A later model, the Therac-20, was capable of producing both X-ray photons and electrons and thus could kill both shallow and deeply embedded tumors. Computer software was used to simplify the operation of the equipment but not to control and monitor its operation. Instead, industry standard hardware safety features were built into both models.

After the business relationship between the two firms failed, AECL went on to build the Therac-25 based on a new design concept. Unlike the Therac-6 and Therac-20, which operated without significant computer controls, computer software was used to both control and monitor the Therac-25 accelerator.53

The software for the Therac-25 was based on modified code from the Therac-6. The software monitored the machine, accepted technician input for specific patient treatment, initial- ized the machine to administer the defined treatment, and controlled the machine to execute the defined treatment. The machine was enclosed in the patient treatment room to prevent radiation exposure to the technicians. Audio and visual equipment allowed the patient to communicate with the technicians.54

A total of 11 Therac-25 machines were installed in the United States and Canada. Over a 19-month period from June 1985 to January 1987, six serious incidents involving the use of the device occurred. In each of the incidents, the patient received an overdose of radiation. Four of the patients died from the overdose, and another eventually had to have both breasts removed and lost use of her right arm as a result of the overdose. A final patient received burns and was only able to fully recover several years after the incident.55

Following each incident, AECL was contacted and asked to investigate the situation. However, AECL at first refused to believe that its machine could have been responsible for an overdose. Indeed, following the third incident, AECL responded, "After careful consideration, we are of the opinion that this damage could not have been produced by any malfunction of the Therac-25 or by any operator error." AECL made some minor changes to the equipment, but because the company did not address the root cause of the problem, additional incidents occurred.

Finally, a physicist at a hospital where two incidents occurred was able to re-create the malfunction and show that the problem was due to a defect in the machine and its software. A failure occurred when a specific sequence of keystrokes was entered by the operator. Because this sequence of keystrokes was nonstandard, the problem rarely occurred and went undetected for a long time. Entry of this combination of keystrokes within a period of eight seconds did not allow time for the beam spreader plate to be rotated into place. The software did not recognize the error, and the patient was then hit with a high-powered electron beam roughly 100 times the intended dose of radiation.

In early 1987, the Food and Drug Administration (FDA) and Health Canada (the Canadian counterpart to the FDA) insisted that all Therac-25 units be shut down. Within the next six months, AECL implemented numerous code changes, installed independent hardware safety locks, and implemented other changes to correct the problem.58 After these changes, the Therac-25 device continued to be safely used for many years. However, at least three lawsuits were filed against AECL and the hospitals involved in the earlier incidents. The lawsuits were settled out of court, and the results were never revealed.

Discussion Questions

1. What additional measures must be taken in the development of software that, if it fails, can cause loss of human life?

2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?

You will combine both Part 1 and Part 2 together in one document and Ensure you label your responses as Part 1 and Part 2. Cite the textbook in APA on a reference page for this assignment. The reference page does not count toward meeting the total page requirement for this assignment.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92752855

Have any Question?


Related Questions in Management Information System

In this assignment students will review the risk management

In this assignment, students will review the risk management framework (RMF). Provide an overview of the framework in a visual graphic format of the six steps in the process and provide a brief description of what happen ...

Daily life requires us to have access to a lot of

Daily life requires us to have access to a lot of information, and information systems help us access that information. Desktop computers, laptops, and mobile devices keep us connected to the information we need through ...

How information technology has enhanced the use of computer

How information technology has enhanced the use of computer assisted education in the elementary school classroom, and the possible positive and negative impacts this enhancement provides. 3-5 pages does not include titl ...

1 a major hurricane has struck the area where your company

1. A major hurricane has struck the area where your company has its central data center. There offsite backups and hardware at three other centers around the country. 2. Assume that the area is suffering greatly from the ...

Topic1 what major government hit initiatives have been

Topic: 1.) What major government HIT initiatives have been taken by the government over the last several years? (Use current examples) Provide several examples and discuss their importance. 2. Define HIPAA and HITECH. Wh ...

Question briefly explain your understanding of

Question : Briefly explain your understanding of countermeasures and defense mechanisms that could be used to protect an organizations environment. Make sure to cite and reference the sources used for this discussion, as ...

What is the standardized highly portable print job format

What is the standardized, highly portable print job format that is the default format used by the Windows 2000, Windows XP, and Windows Server 2003 print subsystems? What is the printing configuration that offers a singl ...

Assignment erm roadmapthe following material may be useful

Assignment : ERM Roadmap The following material may be useful for the completion of this assignment. You may refer to the documents titled "Embracing Enterprise Risk Management: Practical Approaches for Getting Started" ...

Write a 2 page paper that discusses what policies were

Write a 2 page paper that discusses what policies were missing in the particular case. Do additional research than what was provided in the text. Use APA format Cite your sources. •Private Sector •Target Corporation •1,7 ...

Respectfully please see the structure for the program im

Respectfully, Please see the structure for the program I'm trying to write using Python. Below is how the program should be structured. 1. Program general structure: Function definitions should be at the top of the progr ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As