Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Information Security

Theses/Dissertations

Ethics

Articles 1 - 2 of 2

Full-Text Articles in Business

Crisis Communication And Executive Leadership: Ethical Shortcomings In Government, Daniel Davidoff May 2020

Crisis Communication And Executive Leadership: Ethical Shortcomings In Government, Daniel Davidoff

School of Professional Studies

This research thesis project is an analysis of how and why governments fail in their attempts at crisis communication. The hypotheses tested are: there exists a negative correlation between unethical leadership and successful crisis communication practices. And governments are more likely to experience these failures due to ethical disconnects in modern politics. Research includes a review of relevant academic literature regarding crisis communication theory, as well as the ethical framework that can be applied to that theory. Cases considered are Hurricane Katrina, the choking death of Eric Garner, and the COVID-19 global pandemic. The research project concludes with a recommendation …


Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray Jan 2015

Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray

CCE Theses and Dissertations

Despite an abundance of research on the problem of insider threats, only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be an approach that can be utilized to address this issue. Human factors such as moral considerations impact Information System (IS) design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of information systems workers with those of an organization in order to provide increased protection of IS assets. An individual’s …