Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Business ethics case study analysis
How Does Social Media Effect Business Communication
Case study assignment in business ethics
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Business ethics case study analysis
Statement of Facts Friends since college, Mr. Slater and Mr. Morris are top salespersons at a car dealership; both were recently in competition for a promotion to Assistant Sales Manager along with a third top salesperson, Kelly Kapowski. On Monday August 25, sales manager Brett Belding informed Mr. Slater that his interview was cancelled citing that Mr. Slater was not “manager material,” and referenced Mr. Slater’s behavior via Facebook as irresponsible. Mr. Slater often used Facebook for marketing his car sales but never connected with Mr. Belding. Mr. Morris and Mr. Slater often logged into each other’s Facebook accounts to play pranks on each other. When Mr. Slater confronted Mr. Morris on the issue of a “friend request” sent to Mr. Belding, Mr. Morris admitted to sending the request the previous Saturday …show more content…
from Mr. Slater’s account. Mr. Slater recalls seeing Mr. Morris on his account as the pair did “all the time” and thought nothing of it. However, Mr. Slater believes the “friend request” sent on his behalf by Mr. Morris caused him damage by losing the opportunity for a promotion and pay raise. Discussion In Wisconsin, the crime of identity theft must satisfy four elements. The elements are: (I) Intentional Use of Personal Identifying Information, (II) Use of Information to Obtain Benefit or Cause Harm, (III) Use of Information Without Authorization or Consent, and (IV) Intentional Representation that He/She is the Other Person. WIS. STAT. § 943.201(2)(2015). I. Intentional Use of Personal Identifying Information Zach Morris’s act of using Alex Slater’s Facebook page almost certainly satisfies the first element of Wisconsin’s identity theft statute as defined by WIS. STAT. § 943.201. The first element required for identity theft is defined as such a person “intentionally uses” information that is considered “personal identifying information.” Id. (2). Moreover, “personal identifying information” is considered “an individual's code or account number” or “any other means of account access” that can be “used … to obtain money, goods, services, or any other thing of value or benefit.” WIS. STAT. § 943.201(1). Because a person’s Facebook access information can be used as a “means of account access”, under the Wisconsin definition, Facebook access information likely qualifies as “personal identifying information.” On the matter of use, in State v. Ramirez, the court held that an illegal alien using a social security number to hold employment satisfied the intentional use element. State v. Ramirez 246 Wis.2d 802. Moreover, a social security number constitutes “personal identifying information” as defined by WIS. STAT. § 943.201(1). Similarly, Mr. Slater explained the pair uses each other’s Facebook access information “all the time.” Slater also confirms that Morris admitted, when confronted, to intentionally using Slater’s Facebook access information to send the “friend request” to their boss. In all, Morris both possessed Slater’s personal identifying information (in the form of Facebook access information) for several years leading up to the situation at hand and did intentionally use this personal identifying information to access Slater’s Facebook account and send a friend request to Slater and Morris’s boss. II. Use of Information to Obtain Benefit or Harm the Victim The applicable portion of the second element of identity theft has two subelements that potentially apply to Mr. Slater’s claim: (a) use of information to obtain a benefit and (2) use to harm the victim. WIS. STAT. § 943.201 (b). A. To Obtain a Benefit Mr. Slater’s case most likely meets the first subelement of the statute, the use “to obtain … employment, or … benefit.” WIS. STAT. § 943.201 (2) (a). Although the court has not ruled explicitly on the “To Obtain a Benefit” subelement, the court has ruled that the word “harm” (in subelement (B), discussed further below) refers to any “intent to harm” that “may be inferred from conduct.” State v. Peck, 315 Wis.2d 769 ¶ 12-13. The court ruled that a man who subscribed to adult-themed magazines on behalf of his wife did possess intent to harm as a jury “reasonably could have inferred.” State v. Peck, 315 Wis.2d 769. Because these two subelements fall under one element, the court’s opinion on one should readily apply to the other. Therefore, use of the word “benefit” can be inferred to mean “intent to benefit.” Although Mr. Morris has not benefitted in the form of a new position, the claim most likely meets the criteria on this subelement on the basis that Mr. Morris’s actions involved an intent to benefit that “reasonably could have been inferred” due to Mr. Slater’s dismissal from the potential promotion. State v. Peck, 315 Wis.2d 769 B. To Harm the Victim Mr.
Slater’s case likely satisfies the other subelement of use to “harm the reputation, property, person, or estate of the individual.” WIS. STAT. § 943.201 (2) (c). As discussed in the section on subelement (A), the court has ruled that the word “harm” here refers to the “intent to harm” that “may be inferred from conduct.” State v. Peck, 315 Wis.2d 769 ¶ 12-13. Mr. Morris’s use of Mr. Slater’s information, his “friend request” to Mr. Belding with full knowledge of the risks to Mr. Slater’s reputation and employment opportunities (i.e., due to inappropriate photos on his Facebook account that would be visible to Mr. Belding), shows that Mr. Morris possessed the “intent to harm” Mr. Slater’s reputation. A counter to this intent claim could arise from the past use of each other’s Facebook access to play pranks. However, in this specific case of Mr. Morris engaging Mr. Slater’s boss via Facebook from Mr. Slater’s account, a reasonable person could assume his intent to harm Mr. Slater given the potential for Mr. Morris benefitting from the harmed reputation. Because of this, the second subelement, and, therefore, the second element as a whole is likely
satisfied. III. Use of Information Without Authorization or Consent Mr. Slater’s case likely succeeds in meeting the standard of the “authorization or consent” element of identity theft. In order to fulfill the third element, the defendant must be proven to have used the information “without the authorization or consent of the individual.” WIS. STAT. § 943.201 (2). In State v. Peck, the court implicitly held that information originally obtained with consent that is later used for purposes outside the scope of the original authorization could be considered to be used without consent. State v. Peck, 315 Wis.2d 769. In that case, the court held that the third element was satisfied when a divorced husband used personal information, obtained with consent during marriage, against his ex-wife in a manner that would damage her reputation as a schoolteacher. Id. Similarly here, the extended friendship between Mr. Morris and Mr. Slater reveals implicit consent to possess and use each other’s Facebook access information. Also similar is a use of the information that could be reasonably determined to be outside of the original scope of consent (i.e., to damage Mr. Slater’s reputation). One potential counterargument is that Mr. Slater witnessed Mr. Morris using his Facebook account on the day the “friend request” was sent and failed to stop it. However, Mr. Slater’s lack of knowledge that the information was being used outside of the scope to which he originally consented likely extinguishes this counterargument. Because of the analogous relationship between this case and State v. Peck, the third element is likely satisfied. IV. Intentional Representation that He/She is the Other Person. Lastly, Mr. Slater’s claim most likely satisfies the fourth element in regards to intentionally representing himself as the other person. WIS. STAT. § 943.201 (2). The statute states the use of information “without the authorization or consent of the individual and by representing that he or she is the individual” is part of the burden for identity theft. When a stolen credit card was used, the courts ruled, “signing the receipt is a representation that the individual … is authorized.” State v. Clacks, 338 Wis.2d 486 ¶19. Similarly, by logging in using Mr. Slater’s access information, Mr. Morris essentially signed an electronic signature and represented himself as Mr. Slater. In accordance with Clacks, Mr. Morris represented himself as Mr. Slater by utilizing his Facebook profile to send a “friend request” to Mr. Slater’s boss, and, therefore, most likely satisfies the fourth element.
Henry Adams, a famous historian, once said “Friends are born, not made.” Is this true? One curious woman, author Kate Dailey, wrote “Friends with Benefits: Do Facebook Friends Provide the Same Support as Those in Real Life?” published in 2009 in the Newsweek, and she argues that Facebook is able to provide and create “friends”. Dailey argues that while Facebook serves as a great alternative for real world’s social life, Facebook is not a replacement to the same support as those in actuality. Dailey starts building her credibility by incorporating personal stories and using reliable sources, quoting convincing facts and statistics, and successfully using emotional appeals; however, towards the end of the article, her attempt to summarize the other side of the debate ultimately undermines her platform.
Ever since Mark Zuckerberg created Facebook in 2004, millions of people have flocked to the website, resulting in “1.49 billion active users” (Facebook). Facebook allows users to not only reconnect with old friends, but also share whatever the user deems necessary. Facebook has many privacy settings that enable users to prevent anyone from seeing what they post. Even so, skeptics out in the world strongly attest that Facebook, and similar social media websites, aren’t all they’re cracked up to be. In the essay Why Asking for a Job Applicant’s Facebook Password Is Fair Game, Alfred Edmond Jr. addresses the false security Facebook provides to its users, and uses that notion to support his claim that bosses should
Alfred Edmond Jr. wrote the article, Why Asking for a Job Applicant’s Facebook Password is Fair Game. In the article he assessed and argued that you should provide your potential employer with your Facebook password because nothing is ever really private. Edmond effectively persuades the reader to agree with him by uniting his audience and establishing his credibility, providing scenarios that toy with the reader’s emotions, and by making logical appeals. In addition to making these appeals he successfully incorporates an informal tone that further sways the reader to grasp the essence of his argument. These are the elements that make Edmond’s argument valid and persuasive. He is able to convince us that providing a possible employer with something that is private such as our password will ultimately be beneficial for everyone in the situation.
Fleming begins her argument by paralleling the transformative properties of the invention of the telephone years ago to social networks today (Fleming). But, Fleming states that “students’ online identities and friendships come at a price, as job recruiters, school administrators, law enforcement officers and sexual predators sign on and start searching” (Fleming). Social networking websites like MySpace and Facebook are frequented favorites, especially by college students. These sites have become so popular that “friending” a person is now a dictionary verb. However, Fleming believes that students are not as cautious as they should be. In fact, “thirty percent of students report accepting ‘friend’ reques...
In the beginning, Facebook was a free for all. It is my impression that everyone was so excited about this new mediated public and therefore wanted to use the application to its fullest, trying out every function it offered. My younger brother, unripe and fresh out of high school did not know the repercussions of his publications as most people didn’t really think about it. It wasn’t until a very incriminating photo was posted by his now ex-girlfriend, of Rob, smiling in a tree, that he thought twice about what he shared online. The photo was so big you had to scroll down to see the whole image. He was actually climbing a tree with his pants down around his ankles. The photo was taken from ground level, and in fact he was very high up. He bent slightly forward holding on to the sturdy trunk to steady...
This paper will analyze an ATT commercial according to audience, purpose, context, ethics, and stance. The focus will emphasize the audience which the aid is trying to reach and how they do so.
Francesca, in 2014, argues that people in growing numbers are worried about how their personal privacies are infringed by social networks. She cites a case in California . In that case, some Facebook users claimed that Facebook violated their statutory rights by misappropriating their names and likenesses for revenue without their consent. Then she interprets two laws(common-law for commercial misappropriation and one under California Civil Code section 3344)and takes a closer look at two of the major issues the Farely court focused on: (1)whether the plaintiffs’ information met the “newsworthiness” exception; (2) whether there is no fraud or mistake involved in the decision-making. In the end, she draws the conclusion that social networks should obtain the genuine consent from its users and gives some practical
...appens in real life too; you can’t just be someone’s friend—they have to let you in. Yet, even though he is the creator of Facebook he cant just be “friends” with her so he just refreshes the page constantly. Zuckerberg’s obsessive refreshing of the page places such significance on the almost minute importance of having the friend request “accepted”. This act mirrors we can see ourselves in, and we can see what happens to us as consumers of social networking sites.
An analysis of the signs and symbols used in Patek Philippe Geneve's "Begin your own tradition" advert.
Television commercials are television programming produced by any organisation to provide message in the market about their product or services. It is one of the most popular methods to attract customer and provide them information about their products or services.
Riches, L 2011 ‘Facebook and the office: Drawing a line’ Sydney Morning Herald, 1 March, viewed on April 3 2011
... altered concepts of “how to share information” and “what is public or private”. This is valuable because it connects the Social Penetration theory to social media. It also outlines the effects Facebook has on relationships.
and family, and also “meet like-minded people” ( Metz, par. 1). In some cases, business people such as Ron West, claim that he uses Facebook “to become acquainted with new customers”( par. 8). Yes, these types of websites are great tools to stay in touch with old classmatesand faraway family members. It is a great source of communication, but there is always a con to every pro. Even though users are connecting with others, users of social networks never know exact...
Advertisements are located everywhere. No one can go anywhere without seeing at least one advertisement. These ads, as they are called, are an essential part of every type of media. They are placed in television, radio, magazines, and can even be seen on billboards by the roadside. Advertisements allow media to be sold at a cheaper price, and sometimes even free, to the consumer. Advertisers pay media companies to place their ads into the media. Therefore, the media companies make their money off of ads, and the consumer can view this material for a significantly less price than the material would be without the ads. Advertisers’ main purpose is to influence the consumer to purchase their product. This particular ad, located in Sport magazine, attracts the outer-directed emulators. The people that typically fit into this category of consumers are people that buy items to fit in or to impress people. Sometimes ads can be misleading in ways that confuse the consumer to purchase the product for reasons other than the actual product was designed for. Advertisers influence consumers by alluding the consumer into buying this product over a generic product that could perform the same task, directing the advertisement towards a certain audience, and developing the ad where it is visually attractive.
Most social networks make it possible for individuals to upload their entire life to a public profile. You’re not only sharing personal information with your friends but also the friends of your friends. Personal information spreads rapidly on a Social Networking Site than through a real-life network and sometimes provides more information than we would have thought. A social networking site is defined as a network of individuals related to each other based on a common interest or a real-life connection. The popularity of these sites introduces the use of a new and easy form of communication. People spend countless hours interacting with their ‘friends’ on these sites with the help of a ‘comment’ and a ‘like’ button.