<span>She should apply the same principles that would be applied to any other employee. To do otherwise would be to run afoul of the entire ethos of the company. It would set a bad example for the employees and would cause those in management to lose respect (and possibly lead to some sort of ethical investigation by those with the proper authority to do so).</span>
Answer:
Option (A)
Explanation:
If a corporation is found guilty of committed a crime. Then the corporation likely to face a hefty fines for committing a crime. This means the owners of the corporation and its stake holders are responsible for this crime if any of the employee of the corporation commits a crime. Hence at last the owners of the corporation and the stake holders are end up being punished.
Answer:
Moral decision
Explanation:
Utilitarianism is the notion of ethics that is an action is considered good if it results in the greatest good of all the others. It considers the single action and decided on that basis whether the certain thing is right or wrong. The utility increases at one particular action and when the other action arrives its utility diminishes. It does not show the moral decision that has been taken for the other reasons.
Answer:
c. Optimum replacement interval (ORI)
Explanation:
Optimum replacement interval used to estimate the most cost effective time to replace an asset on the basis of their replacement cost.
There needs to be a balance between the replacement cost and the value that is being lost by changing the asset.
The useful value must be low to justify replacement cost.
For example if the cost of maintaining a machine has increased a lot as a result of wear and tear, it will be more cost effective to make a replacement in order to minimise cost and increase efficiency
Answer:
The answer is "Develop and implement security and resilience programs for the critical infrastructure under their control, while taking into consideration the public good as well".
Explanation:
In the past, industrial control systems were generally not connected to IT networks and did not contain complex computing capabilities; therefore, they could be adequately protected using physical security measures like locks and fences. However, as OT has become more integrated with IT, such physical measures are becoming less adequate in securing the underlying critical assets.