Saturday, December 7, 2019

The Compound Situations

Question : Dicuss about the Different Topic of Management ? Answer : Introduction The ethical dilemma is one of the compound situations involving the conflicts mainly in between the moral imperatives, and the problems which are hard to solve. However, the case of some international ICT-based companies in the country also elaborates that it is in the best interest to inquire more meaningful culture and how organizations choose to be lesser responsible, socially, to conduct business. The report is about the situation, discussing ICT tools in the small business organization. (Crawford et al., 2016). Due to confidentiality, the organization name cannot be revealed as well as the characters are also kept secret. The XYZ company name will be used for the organization, and a clear description of the business problems will be there. The report is based on the problems so that a solution could be found to avoid the issues in future altogether. Case Description The description for the XYZ organization focuses on the development of a new business idea of garments which has been designed for the unique dresses. The designing information is mainly stored on the computer network database so that any company employee could refer them as and when needed. (Shaw et al., 2014). The design is also stored for the future references, as per the norms of the company. The database system of the network was eventually found to be hacked by one of the competitors of the other organization, and so the designs were also stolen. This is the act of the cyber criminals, where there is no evidence about how the stealing is done. (Ferrell, 2016). Here, it was also seen that the competitor company used the data before and brought the designs in the market. Analysis of the Case What's going on? The XYZ Company includes the conduction of the business in the different phases with the development of new unique designs that are targeting the new customers. The development is based on the customers with the aim to capture a broader market with better designs and product range. The idea is about adverse effects with the ethical issues. The Doing Ethics Technique is for the analysis of the issues and problems related to it: What are the facts? The basic idea is related to the data server of the company being hacked by the criminals and the leakage of the design. (Hall et al., 2016). It also led to the failure of the products and a loss to the company as the data/designs were stolen and used by the competitive company for their development of business and organization. (Brinkmann, 2014). What are the issues? The issues are related to the facts of ethics where the hackers tend to get an entry in the system server of the other company and access the network in an unauthorized manner. It also includes the leakage of the confidential data and the other designs. Who is affected? The employees will have to work on the designs again as well as the stakeholders of the company also need to work for the growth of business, as they have to bear the loss. Along with this, the stakeholders also tend to focus on the priorities of cybercrime, facing a huge loss in the business depending upon the product demands. It includes the advanced network server launch with the previous setup of the company. What are the ethical issues and their implications? The problems are related to the case where the company cannot easily claim about the belongings that have been stolen. For this, the designing is based on the graphics and how the information is copied from one system through computer hacking. The other organization can use the designs of the products as there has been no major evidence for the stealing of the data of the company. Hence, the ethical issue is about the failure of the events and the revenue that has been generated by the designing only. (Hickman et al., 2016). What could have been done about it? It is not possible to change what has already been occurred. The best possible thing is to work on the improvement of the security network options by registering of designs with the government authorities, beforehand, so that the other company could not mark its copyright on it. What are the options? The best choice for this XYZ organization is to work on the improvement of the networking standards with the proper setup of the network security and the protocol process. (Mishra et al., 2016). The practices are based on the modern security standards where the company tends to use the antivirus software which will easily be able to protect the database from other future issues. Which Option is Best and Why? There are other issues which are related to the data hacking under the company base. Hence, the XYZ Company should focus on handling the losses in the market and working on the designs, again. The company has also not been able to claim anything since it lost to provide any evidence that the plans were stolen. The issue could be amended in future by improving the security system of the server. Conclusion While evaluating the companies, it is important to consider what they meant by being socially responsible and their role in it. (Dion et al., 2016). To initiate, the concept of CSR, and remove any dilemma, global companies take a lot of commitment from top to bottom from the government. Therefore, XYZ Corporation should work on their system security network so that the ethical issues could easily be solved. References Brinkmann, S. (2014). Interview. InEncyclopedia of Critical Psychology(pp. 1008-1010). Springer New York. Crawford, T. A. M., Evans, K. (2016). Crime prevention and community safety. Dion, M., Weisstub, D., Richet, J. L. (2016). Financial Crimes: Psychological, Technological, and Ethical Issues. Ferrell, O. C. (2016). Broadening marketings contribution to data privacy.Journal of the Academy of Marketing Science, 1-4. Hall, A., Antonopoulos, G. A. (2016). Introduction. InFake Meds Online(pp. 1-17). Palgrave Macmillan UK. Hickman, M. J., Powell, Z. A., Piquero, A. R., Greene, J. (2016). Exploring the viability of an attitudes toward ethical behavior scale in understanding police integrity outcomes.Policing: An International Journal of Police Strategies Management,39(2), 319-337. Mishra, S., Dhir, S., Hooda, M. (2016). A Study on Cyber Security, Its Issues and Cyber Crime Rates in India. InInnovations in Computer Science and Engineering(pp. 249-253). Springer Singapore. Shaw, W. H., Barry, V. (2015).Moral issues in business. Cengage Learning.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.