Thursday, February 20, 2020

Who benefits from whistleblowing Essay Example | Topics and Well Written Essays - 2250 words

Who benefits from whistleblowing - Essay Example One of the biggest beneficiaries of whistle blowing is the public because it is through the activities of whistleblowers that they come to attain knowledge concerning what is going on in their lives. Whistle blowing allows the public to make an assessment of the activities that are taking place in their societies and to take action to prevent any negative effects of the said activities from affecting them. In most instances, whistleblowers, especially in the public sector, provide information to the public, not for their own benefit, but as a means of doing the right thing (Wilkey 2003, p.331). When whistle blowing takes place, it is for the benefit of the public because it makes the public aware of incidents that might be going on secretly and causing them harm. For example, a whistleblower might bring to light information concerning a drug from a pharmaceutical company that while it is officially believed to be effective, is in fact having negative side effects on its users. The in formation gained from the whistleblower leads to investigations whose results, if they are found to be true, end up helping the public a great deal. Not only does such information ensure the safety of patients who might have used the drug, but it also helps those patients who had negative side effects to successfully sue the company involved and receive compensation. Therefore, in this case, a major beneficiary of whistle blowing activities is the public since it is the audience of the information and it is the only one which can put pressure on the government to act in bringing accountability to public institutions. Business organisations can also be beneficiaries of whistle blowing and this is especially based on preserving their reputations. Businesses that encourage a culture of internal whistle blowing make it possible for information to be given to management

Tuesday, February 4, 2020

Aviation Security and al Qaeda in Yemen Case Study

Aviation Security and al Qaeda in Yemen - Case Study Example This pragmatic and preventive practice had been discontinued. An illustration of this change was the failure to interrogate the Christmas Day bomber. This individual had been provided with a lawyer and informed that he was entitled to remain silent (Thiessen, 2011, p. 133). Aggressive interrogation of terrorists is essential for obtaining information about future terrorist attacks. Consequently, the Obama Administration’s reluctance to engage in such interrogation has rendered the nation vulnerable to terrorist attacks. There is a major lacuna in the strategy of the US. It relies upon Yemen to assist it in identifying and neutralizing al Qaeda terrorists. However, the Yemeni government employs, harbors and relies upon these terrorists for political support and perhaps even its very existence. There is a marked reluctance among the Yemeni authorities to wage a serious war against the al Qaeda terrorists, who reside in their country (Rollins, 2010, p. 12). It was discovered by the National Commission on Terrorists Attacks Upon the United States that the weaknesses inherent in the aviation security system had been used by the al Qaeda terrorists to conduct the September 11 attacks. Some of the weaknesses identified by this commission were first, a preliminary screening process that concentrated upon identifying likely aircraft bombers (Elias, 2004). However, this process had ignored potential hijackers. Second, slipshod screening at checkpoints and the prevalence of permissive rules with regard to small knives. Third, the absence of in-flight security measures, such as the presence of air marshals and reinforced cockpit doors. Fourth, the adoption of a non – confrontational strategy, across the industry, while addressing hijackers. Fifth, the absence of capabilities and protocols for executing a synchronized Federal Aviation Administration and military response to suicidal hijackers and multiple hijackings (Elias, 2004).Â