Importance of Ethics in Business Management Practice

To put in simple words, ethics is the principle of moral values which helps you to take actions that are considered as the right thing to do. However, doing what is ‘right’ is not that straightforward. Since everyone has different backgrounds and cultures, we therefore possess different conceptions and perceptions. This causes complication in the process of understanding the meaning of ethics as each person’s point of view on what is ethical varies significantly.

Ethics is not a set of rules that should be followed inevitably but is a guideline to lead you to behave with integrity. It includes values such as equity, responsibility, honesty, and fairness. The importance of ethics can be seen from the fact that many of what were considered as ethical behaviors in the past has developed into law today. For example, stealing is known as an unethical act and is against the law as it is an infringement of human rights and justice.

Ethics in our daily life and in business management practice is slightly different. The ethics which apply in the business world are not just simply a matter of the fact that lying and stealing is wrong. It helps the organizations to act responsibly to all their stakeholders, including the environment surrounding them. It contributes to the process of decision making, giving a sense of ethical reasoning to the managers and employees how they should act in a situation of dilemma. Being ethical in a business activity may not seem so relevant to the prosperity of the business in the short term however, it brings great long-run benefits to the organization in the end and this is the reason why successful businesses try to act ethically even when the process may turn out to be costly.… Read the rest

The Importance of Corporate Governance in Business

Corporate Governance can be defined as the organizational structure of a company. It encompasses the overall processes, operations and policies by which a company is controlled and functions. Corporate governance is most often viewed as both the structure and the relationships which determine corporate direction and performance.

Within the governing body of a corporation there are various stakeholders. Stakeholders are individuals which are of great importance to the company because they contribute directly or indirectly to its economic activity. Stakeholders retain different degrees of importance within an organization depending on their title or function which are some of the following: shareholders, the board of directors, employees, customers, creditors and suppliers. All together this group of individuals defines a corporate community in which day to day business is conducted and must be sustained in order for the company to survive. Similar to any other community, where there are conflicts of interests, miscommunication, or other organizational problems it affects the entire community and others around it. However is this applicable to the business world? Is corporate governance important for business?

Firstly corporate governance implies the notion of hierarchy. As mentioned above the rights and importance of any stakeholders involved in the economic life of the company varies in function of the roles the individual holds. Following this logic we can identify the key actors within the governing structure of a company: shareholders who own shares of stock and have a right of ownership over the dividends which they receive from their stock and the right to vote on company matters such as electing the board of directors.… Read the rest

Ethical Issues in the Banking Industry

Over the years, banks have undergone tremendous growth in many aspects of their operations, starting with the type of customers they deal with to the manner in which information is received, recorded, transformed, and finally used. Ultimately, banks have unraveled the whole mystery of discrimination as to what customers to offer services to or not by categorizing their clients in terms of their income structure. This classifying of customers is meant to assist in the decision making process as to what customer receives what treatment, but it is also meant to assist the banks in understanding the type of customers to offer better services to. Therefore, regulated by their policy of information non-disclosure, banks would obtain very crucial information about various customers (their age, sex, race, employment status, as well as income level) with a notion that they are adhering to the Know Your Customer policy. This information is supposed to be private and confidential. However, on close examination, one would realize that banks need such information to make decisions aimed at enabling them to remain in the global market while at the same time, maintaining their traditional banking principles.

Consequently, the objective of this article is to analyze the various unethical practices the employees of the bank practice, and their relevance to the community at large. Moreover, the unethical practices will be addressed in a manner that relates to ethical dilemma and decisions regarding management. Banks operate in an economy that is very volatile, and they need to ensure that various practices are done in the traditional banking manner, provision of financial services in a legal manner.… Read the rest

Ethical Hackers and Ethical Hacking

An ethical hacker is a security professional who helps organization to take defensive measures against malicious attacks and usually the process he doing to find those vulnerable point is called Ethical Hacking. Sometimes this is also known as Penetration Testing or Intuition Testing. In this case, the ethical hackers are getting into the minds of computer criminals; think like them to find about innovative ways the hackers may use to get into the systems. Then organizations can take required actions to avoid those vulnerabilities.

It has identified that the almost all computer systems have vulnerabilities that can be exploited by a hacker to come to do damages. This can be due to an unpatched application, a misconfigured router or a rough network device and it will be not able to detect unless penetrate the networks and assess the security posture for vulnerabilities and exposures regular basis. As the hacking is a felony in most of the countries, ethical hackers should only operate having required permission and knowledge of the organization that they are trying to defend. In some cases, to check the effectiveness of their security teams, an organization will not inform their teams of the ethical hacker’s activities. This situation is referred to as operating in a double blind environment.

To perform productive penetration testing, the ethical hackers who are going to conduct the testing must have to have variety of in-depth computer skills. They should know how to look for the weaknesses and vulnerabilities in target systems and need to have the knowledge of the tools a malicious hackers use on system hacking.… Read the rest

Social Engineering Attacks

The rise of 21st century marked the transition phase of the most global businesses towards a paperless office environment, where the focus shifted the manual to the computerized form of work culture. But at the same time, change brought a number of threats and menace in terms of one of the biggest issues of the current businesses, the social engineering used among the hackers for cracking techniques that rely more on human weaknesses rather than technology itself. The aim or motive of such attacks was getting access to passwords or other relevant information by tricking people for carrying out illegal or criminal activities. FBI and other security experts hold a firm view that majority of threats originate from the internal working environment or employees who have been granted additional privileges or authorities to company’s information. People who have an urge for power and control over other individuals exhibit the social engineering skills. Computer hacking is the modern form of social engineering and the most hi tech of all. The fundamental problem with online social networking services especially is that there are no criteria or authentication for evidence or proof of an individuals identity, which keeps at stake both our privacy and information.

Social engineering attacks are driven by financial needs where hackers try to obtain confidential information about the users to access accounts. Social engineering is the root cause to ideas behind phishing and pretexting where hackers gain confidence of people who are careless or blindly trust others helping them to take undue advantage.… Read the rest

Industrial Espionage

The Federal Bureau of Investigation (FBI) defines industrial espionage as “an individual or private business entity sponsorship or coordination of intelligence activity conducted for the purpose of enhancing their advantage in the marketplace.” While this definition may imply Industrial Espionage to be more or less the same as business or competitive intelligence, but there is an essential difference between the two – while business intelligence is generally under private sponsorship using an “open” methodology, espionage may be either government or privately sponsored and clandestine.

Industrial Espionage is the process of collecting information and data for the purpose of generating revenue. Generating revenue is very important aspect for these people. They are not thrill seeker, if the compensation does not justify the reward they will not bother attempting to collect the required information. Individuals who commit Industrial Espionage are not looking for information for information sake, but for information that will produce a big payday when acquired by a second party or when the information is viewed by unauthorized personnel the value of the information is no longer valuable. Money and power are motivators and the stakes in today’s billion dollar business environment the rewards far exceeds risks.

In the highly competitive and globalized business environment, proprietary intellectual property and economic information is considered the most valuable commodity by all nations, particularly the advanced ones. Businesses and/or governments involve in espionage activities for the purpose of unlawfully or clandestinely obtaining sensitive financial, trade or economic policy information, proprietary/sensitive economic information; or critical technologies including but not limited to data, plans, tools, mechanisms, compounds, designs, formulae, processes, procedures, programs, codes or commercial strategies, whether tangible or intangible, for competitive business advantage.… Read the rest