<< Chapter < Page Chapter >> Page >

Module Activities:

1. Instructor introduces the case based on the abstract and timeline found at www.computingcases.org

2. Students read case abstract, timeline, case decision point, and case analysis exercises.

3. Students do further research into the case by consulting ComputingCases materials which include narratives,histories, supporting documents, and ethical analyses.

4. Students carry out the activities outlined in the accompanying case exercises by (a) specifying the problemraised in the decision point, (b) generating solutions, (c) testing solutions using ethics tests, and (d) developing plans forimplementing the solution over situational constraints.

5. Students prepare their case analyses working in small groups.

6. These groups present their completed analysis to the class in a case-debriefing session.

7. The instructor concludes by discussing the problem-solving issues and intermediate moral concepts raised bythe case.

Machado Abstract:

In September of 1996, 19 year-old Richard Machado sent email to 59 Asian students at his public college,threatening them with phrases like“I will personally make it my life’s career to hunt you down and kill you”and signed by“Asian Hater.”Several of these individuals reported this incident to the Office of Academic computing (OAC). One of the recipients was astudent employee of the OAC. The administrators of the OAC were faced with a decision about how to respond to harassing andthreatening email sent over their system to students of their University, using their facilities.

Machado Timeline

11/16/95 Machado sends email threat to New University paper (UCI) via his roommate’s computer.The email is traced to the roommate’s computer.Roommate later said Machado had access to thecomputerMachado identified as sender.
11/21/95 Warrant for arrest is filed against Machado, issued by Irvine Police Department—the warrant is a“no bail felony warrant.”Machado consents to a property search.Case given up shortly after—Machado’s roommate took the blame so he“wouldn’t be bothered anymore.”
(Between 1/1/96 and 9/20/96) Machado’s older brother murdered in armed robbery prior to following incident;Machado is doing poorly in school, gettingpressure from family to uphold high expectations.
9/20/96(Friday, 10:54 am) Machado sends hate Asians/threat email to about 59 UCI studentsMachado sent message a second time shortly after, when hedid not receive replies to the first email.Incident brought to the attention of Assoc. Director of The Academic Computing Center, by her employees.Machado identified in computer lab and was asked toleave by Core Services manager.
9/21/96 Director of OAC reads Machado’s email and decides that it is a police matter.
9/24/96(Monday) The incident is reported to University Police DepartmentAn officer is assigned to the case.
9/26/96 Retrieval of surveillance video confirmed Machado as the sender.Irving City Police notified and involved in case.
9/27/96 Registrar’s office helps police locate Machado’s address and phone number.
9/28/96 An officer phones Machado’s residence and leaves messageMachado calls back and agrees to meet with an officer thatafternoon at 5pm.Two charges filed after meeting: Machado (1) knowingly and without permission uses computer services and (2)makes telephone calls with intent to annoy.
11/14/96 A stolen vehicle report is filed for Machado’s second roommate’s car.Machado had told one roommate he was borrowing his other roommate’s car.Machado did not have permission to borrow car.
11/18/96 FBI attempts investigation.An agent goes to Machado’s residence; Machado is not there and hasn’t been seen there since 11/13.Machado allegedly left with Young’s keys on 11/14.Other suspicions: $80 missing from roommate’s coin jar; $154 visa charges to roommate’s card, $54 of which were unauthorized; calls on 11/10, 11, and 12.
11/21/96 FBI agent phones Machado’s roommate for confirmation of stolen car/info on Machado’s disappearance.
11/22/96 Roommate interviewed.
11/23/96 Tammy Machado (Machado’s sister) interviewed and said Machado had disappeared on the day his brother called him toinquire about Machado’s name appearing in newspaper regarding Asian hate mails.Machado denied the reports in the paper to his brother;claimed it to be someone else.Tammy is informed that court date is set for 11/25 and if Richard doesn’t show, they would issue a warrant for his arrest.
2/6/97 Machado is arrested when attempting to enter US from Mexico—caught by US Immigration Inspector.Machado is reported as looking homeless, having no possessions, looking for constructionwork in Mexico.
9/16/97 Machado is charged with 10 counts of interfering with a federally protected activity—in this case, students attending a university.Machado is told he will face up to 10 years ifconvicted.
11/12/97 Trial takes place and on this date a recess is granted when new information is uncovered/presented.Questionnaires were revealedin which 9 of the students who got the messages said they were not overtly bothered by Machado’s email.
11/18/97 Jury deadlocked 9 to 3 in favor of acquittal.Case said to have national importance by federal prosecutors, so a second trialwas set for 1/27/98.
2/13/98 Richard Machado is found guilty on 2 counts of civil rights violations.Took only 3 weeks of trial to reach verdict.Followingconviction, Machado is released on a $10,000 bond from custody but is turned over to Irvine police on impending auto theftcharges.Sentencing is postponed until 4/10/98.Possible maximum time Machado could serve would be 1 yr.Machado has already spent 1 yr.in jail awaiting trials, tec.Machado is recommended for anger&racial tolerance counseling, not allowed on UCI campus, and prohibited from having any contact with victims.

Scenario #1:

You are a systems administrator at the Office of Academic Computing at the University of California at Irvine andhave been asked to modify the Unix system to prevent the reoccurrence of the Machado incident

Scenario #2:

You are a systems administrator at the Office of Academic Computing at the University of California at Irvine andhave been asked to develop an orientation program for students who will use university computing laboratories and facilities. Specialemphasis is put on preventing a reoccurrence of the Machado incident.

1. Identify key components of the STS

Part/Level of Analysis Hardware Software Physical Surroundings People, Groups,&Roles Procedures Laws&Regulations Data&Data Structures

2. Specify the problem:

2a. Is the problem a disagreement on facts? What are the facts? What are cost and time constraints onuncovering and communicating these facts?

2b. Is the problem a disagreement on a critical concept? What is the concept? Can agreement be reached byconsulting legal or regulatory information on the concept? (For example, if the concept in question is safety, can disputantsconsult engineering codes, legal precedents, or ethical literature that helps provide consensus? Can disputants agree on positive andnegative paradigm cases so the concept disagreement can be resolved through line-drawing methods?

2c. Use the table to identify and locate value conflicts within the STS. Can the problem be specified as amismatch between a technology and the existing STS, a mismatch within the STS exacerbated by the introduction of the technology,or by overlooked results?

STS/Value Safety (freedom from harm) Justice (Equity&Access) Privacy Property Free Speech
Hardware/software
Physical Surroundings
People, Groups,&Roles
Procedures
Laws
Data&Data Structures

3. Develop a general solution strategy andthen brainstorm specific solutions:

Problem / Solution Strategy Disagreement Value Conflict Situational Constraints
Factual Conceptual Integrate? Tradeoff? Resource?Technical?Interest

3a. Is problem one of integrating values, resolving disagreements, or responding to situationalconstraints?

3b. If the conflict comes from a value mismatch, then can it be solved by modifying one or more of thecomponents of the STS? Which one?

4. Test solutions:

Alternative / Test Reversibility Value: Justice Value: Responsibility Value: Respect Harm Code
A #1
A #2
A #3

5. Implement solution over feasibility constraints

Alternative Constraint Resource Interest Technical
Time Cost Individual Organization Legal/ Social Available Techno-logy Manufacturability
#1
#2
#3

Machado summary

PowerPoint File.

Questions & Answers

A golfer on a fairway is 70 m away from the green, which sits below the level of the fairway by 20 m. If the golfer hits the ball at an angle of 40° with an initial speed of 20 m/s, how close to the green does she come?
Aislinn Reply
cm
tijani
what is titration
John Reply
what is physics
Siyaka Reply
A mouse of mass 200 g falls 100 m down a vertical mine shaft and lands at the bottom with a speed of 8.0 m/s. During its fall, how much work is done on the mouse by air resistance
Jude Reply
Can you compute that for me. Ty
Jude
what is the dimension formula of energy?
David Reply
what is viscosity?
David
what is inorganic
emma Reply
what is chemistry
Youesf Reply
what is inorganic
emma
Chemistry is a branch of science that deals with the study of matter,it composition,it structure and the changes it undergoes
Adjei
please, I'm a physics student and I need help in physics
Adjanou
chemistry could also be understood like the sexual attraction/repulsion of the male and female elements. the reaction varies depending on the energy differences of each given gender. + masculine -female.
Pedro
A ball is thrown straight up.it passes a 2.0m high window 7.50 m off the ground on it path up and takes 1.30 s to go past the window.what was the ball initial velocity
Krampah Reply
2. A sled plus passenger with total mass 50 kg is pulled 20 m across the snow (0.20) at constant velocity by a force directed 25° above the horizontal. Calculate (a) the work of the applied force, (b) the work of friction, and (c) the total work.
Sahid Reply
you have been hired as an espert witness in a court case involving an automobile accident. the accident involved car A of mass 1500kg which crashed into stationary car B of mass 1100kg. the driver of car A applied his brakes 15 m before he skidded and crashed into car B. after the collision, car A s
Samuel Reply
can someone explain to me, an ignorant high school student, why the trend of the graph doesn't follow the fact that the higher frequency a sound wave is, the more power it is, hence, making me think the phons output would follow this general trend?
Joseph Reply
Nevermind i just realied that the graph is the phons output for a person with normal hearing and not just the phons output of the sound waves power, I should read the entire thing next time
Joseph
Follow up question, does anyone know where I can find a graph that accuretly depicts the actual relative "power" output of sound over its frequency instead of just humans hearing
Joseph
"Generation of electrical energy from sound energy | IEEE Conference Publication | IEEE Xplore" ***ieeexplore.ieee.org/document/7150687?reload=true
Ryan
what's motion
Maurice Reply
what are the types of wave
Maurice
answer
Magreth
progressive wave
Magreth
hello friend how are you
Muhammad Reply
fine, how about you?
Mohammed
hi
Mujahid
A string is 3.00 m long with a mass of 5.00 g. The string is held taut with a tension of 500.00 N applied to the string. A pulse is sent down the string. How long does it take the pulse to travel the 3.00 m of the string?
yasuo Reply
Who can show me the full solution in this problem?
Reofrir Reply
Got questions? Join the online conversation and get instant answers!
Jobilize.com Reply

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Business ethics. OpenStax CNX. Sep 04, 2013 Download for free at http://legacy.cnx.org/content/col10491/1.11
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Business ethics' conversation and receive update notifications?

Ask