Question

Whistleblowing is when a person exposes any kind of information or activity that is deemed illegal,...

Whistleblowing is when a person exposes any kind of information or activity that is deemed illegal, unethical, or not correct within an organization that is either private or public. While whistleblowing is the right thing to do it can often come with repercussions to the whistleblower. Provide a response to the following questions:

  • What moral obligation, beyond the scope of your job, do you have to your employer? Explain your answer.
  • Depending on how a company reacts, discuss how whistleblowing could affect a company’s future?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Beyond the scope of job, an employee has moral obligation to not expose any private information of the company to outsiders, which can harm the company's reputation.

Whistleblowing refers to exposing secret, illegal activities of a company to the public. One recent example of it is an ex-employee of Facebook shared how Facebook is extracting and selling personal information of its users.

This practice negatively impacts a company's future as it exposes all illegal activities being carried out by the company under its good market image and makes users or consumers aware of what is wrong, which decreases consumer confidence in the company.

Add a comment
Know the answer?
Add Answer to:
Whistleblowing is when a person exposes any kind of information or activity that is deemed illegal,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Forrester, NMSU, Exante Financial Services, and Others: Getting Real about Strategic Planning It must be nice...

    Forrester, NMSU, Exante Financial Services, and Others: Getting Real about Strategic Planning It must be nice to be the CIO of a FedEx, or a GE, or a Credit Suisse, where IT and the business are so tightly aligned you can barely tell the two apart. In such companies, corporate leaders understand that IT is a strategic asset and support it as such. These are places where the CIO is encouraged to spend the majority of his time on the...

  • Learn to apply your ethical values using the Giving Voice to Value (GVV) method. There are...

    Learn to apply your ethical values using the Giving Voice to Value (GVV) method. There are multiple GVV documents in this Module. Review them all. You may do the exercises suggested in the documents but you do not have to post them in Canvas. You will learn how to factor your personal values into your ethical decisions from the method, you will still use the IDEA case analysis method when analyzing the GVV case, The Client Who Fell Through The...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • i have the case study question with the answers but i need help to re-write the...

    i have the case study question with the answers but i need help to re-write the answers. please see the attached files Case Study Analysis (CSF3003) Assessment Description and Requirements CLO1: Case Study 1 Ahmad lef home to study master and PhD in Australia. He has fees for the first semester only. After he arrived to Sydney and settled down, he start looking for a part-time job to save money for the next term. Ahmad has some experience on making...

  • Mini Case Building Shared Services at RR Communications4 4 Smith, H. A., and J. D. McKeen....

    Mini Case Building Shared Services at RR Communications4 4 Smith, H. A., and J. D. McKeen. “Shared Services at RR Communications.” #1-L07-1-002, Queen’s School of Business, September 2007. Reproduced by permission of Queen’s University, School of Business, Kingston, Ontario, Canada. Vince Patton had been waiting years for this day. He pulled the papers together in front of him and scanned the small conference room. “You’re fired,” he said to the four divisional CIOs sitting at the table. They looked nervously...

  • Mini Case Building Shared Services at RR Communications4 4 Smith, H. A., and J. D. McKeen....

    Mini Case Building Shared Services at RR Communications4 4 Smith, H. A., and J. D. McKeen. “Shared Services at RR Communications.” #1-L07-1-002, Queen’s School of Business, September 2007. Reproduced by permission of Queen’s University, School of Business, Kingston, Ontario, Canada. Vince Patton had been waiting years for this day. He pulled the papers together in front of him and scanned the small conference room. “You’re fired,” he said to the four divisional CIOs sitting at the table. They looked nervously...

  • Below is the information: It is important to understand the different leadership styles employed by nursing...

    Below is the information: It is important to understand the different leadership styles employed by nursing leaders in healthcare organizations and to understand their significance on nursing practice and patient outcomes, for better or for worse. Objective: Read the articles from Nursing Standard (PDF) and Bradley University (PDF). In -250 words, formulate an opinion on the following: 1. Reflect on an occasion where you experienced ineffective leadership (doesn't have to be in the hospital). What behaviors did they display? What...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

  • What an Executive Summary Is An executive summary is a specific type of document that does...

    What an Executive Summary Is An executive summary is a specific type of document that does two things: it summarizes a research article, and it offers recommendations as to how information from the article can be used. Some long reports can contain an executive summary section, as indicated in the Pearson handbook. Write a 2 pahe Executive Summary In business contexts, an executive summary is always written for a specific purpose: to explain the information in the article to a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT