Preview

business ethiccs

Powerful Essays
Open Document
Open Document
6260 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
business ethiccs
Vidhya Shikshak Seva Mandal Government Registered
INDIAN INSTITUTE OF
MANAGEMENT RESEARCH AND TECHNOLOGY
Government Recognized
An ISO 9001: 2008 International B-School

SUB : BUSINESS ETHICS

N. B. 1) Attempt any Four Cases 2) All cases carries equal marks.
No : 1
PUBLIUS
Although many people believe that the World Wide Web is anonymous and secure from censorship, the reality is very different. Governments, law courts, and other officials who want to censor, examine, or trace a file of materials on the Web need merely go to the server (the online computer) where they think the file is stored. Using their subpoena power, they can comb through the server’s drives to find the files they are looking for and the identify of the person who created the files. On Friday June 30, 2000, however, researches at AT & T Labs announced the creation of Publius, a software program that enables Web users to encrypt (translate into a secret code) their files – text, pictures, or music – break them up like the pieces of a jigsaw puzzle, and store the encrypted pieces on many different servers scattered all over the globe on the World Wide Web. As a result, any one wanting to examine or censor the files or wanting to trace the original transaction that produced the file would find it impossible to succeed because they would have to examine the contents of dozens of different servers all over the world, and the files in the servers would be encrypted and fragmented in a way that would make the pieces impossible to identify without the help of the person who created the file. A person authorized to retrieve the file, however, would look through a directory of his files posted on a Publius – affiliated website, and the Publius network would reassemble the file for him at his request. Researchers published a description of Publius at www.cs.nyu.edu/waldman/publius.

Although many people welcomed the

You May Also Find These Documents Helpful

  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Business Ethics

    • 2743 Words
    • 11 Pages

    Galen McDowell was a good salesperson who knew how to purchase the higher performances out of the salespeople under him. Bob wanted to sign a big contract with Kinan Motor who was his potential client, so he gave this assignment to Galen, and Galen got this opportunity to promote his value to the organisation. Then he made the plan to take them to a strip club which is called Red Ruby.…

    • 2743 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Business Ethics

    • 2424 Words
    • 10 Pages

    Chandler, D. (2009). The perfect storm of leaders’ unethical behavior: A conceptual framework. Retrieved from http://www.regent.edu/acad/global/publications/ijls/new/vol5iss1/IJLS_Vol5Is1_Chandler (2).pdf…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Individuals who are engaged in international business transactions have reported a cultural component to ethics. You are working on opening a branch of a food distribution operation in a foreign country, and a local official suggests that a little cash would help your company get started.…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Business Ethics

    • 1334 Words
    • 6 Pages

    Crisp makes a credible argument that the Pongo Peach and Grecian Formula 16 ads were guilty of overriding the consumers' autonomy because they deceived the consumer by leading them to believe that the products were better than what they were. They used the consumer’s insecurities about themselves to make their products more appealing, causing the consumer to act on desires, rather than rationality. The problem with this type of advertising is that when people take a chance on something based on impulse, rather than facts. They risk their autonomy, which makes them want to purchase the product. I believe that Crisp’s rebuttal of Arrington’s four notions is valid. Autonomous desire is the first desire and fulfills the second desire, which is rational desire and choice. Free choice is the third desire, and finally, the fourth desire is control or manipulation. When it comes to the morality of “subliminal” advertising, my opinion is that it is simply business, and if business are going to profit, they have to use whatever tactic necessary to sell their product.…

    • 1334 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Business Ethics

    • 1977 Words
    • 8 Pages

    Three general principles will guide the move towards sustainability. Firms and industries must become more efficient in using natural resources; they should model their entire production process on biological processes; and they should emphasize the production of services rather than products. Versions of the first principle, sometimes called eco- efficiency, have long been a part of the environmental movement. "Doing more with less" has been an environmental guideline for decades.…

    • 1977 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Because the wide world of technology has developed at such an astounding pace, there are many problems for victims as well as investigators of cyber crime and computer-related crimes. First, we must familiarize ourselves with the definitions of cyber crime and computer-related crime. For this paper, we will define cyber crime as the use of a computer as a tool to commit a crime or as a crime committed where a computer is the target. We will define computer-related crime as a traditional crime where a computer is used to carry out, record actions, or provide evidence of a crime. The beginnings of the problem of investigating cyber crime come in the form of reporting. For many reasons cyber crimes tend to go unreported or severely underreported. Another problem is that law enforcement officials (as well as parents and their children) do not have adequate training, allocation of funds, coordination with other agencies, or proper understanding of applicable laws that pertain to cyber crime. From all angles cyber crime is a difficult problem to tackle, and there is a definite need for law enforcement to catch up with the technology of cyber space, which is quickly becoming a feeding ground for illegal and illicit activity.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Business Ethics

    • 3082 Words
    • 13 Pages

    The Custom Woodworking Company is a small-to-medium sized custom furniture and cabinet making company, with head-office and a spacious plant site at Industrial Estates, Someplace, BC. Its Chairman and Chief Executive Officer is Ron Carpenter now in his late-sixties. His wife Mrs. Emelia Carpenter, being an aggressive business woman and somewhat younger than her husband, now effectively runs the company. Ron Carpenter is affectionately known to all as "Woody" and so the company is generally known as "Woody's". Woody, after an apprenticeship as a cabinet maker, started his small furniture manufacturing business back in 1954 and he and his wife moved to their present location in 1959. The company quickly gained a reputation for attractively designed and well constructed furniture, using imported hardwoods and indigenous softwoods for its products. Woody's now produces custom furniture to order, several lines of furniture for wholesaler/retailers, and a number of variations of standard kitchen and bathroom cabinets, including units made to order. Over the years the Carpenters continued to prosper and built up a loyal staff and work force. More recently their son, John Carpenter, has joined the company's management after having obtained a commerce degree at the local university. At John Carpenter's insistence, lured by longer production runs and higher and more consistent mark-ups, the company has moved into subcontract work supplying and installing counter-tops, cabinets and similar fixtures for new commercial construction. To date, Woody's has established a well-founded reputation for supplying millwork to the construction industry.…

    • 3082 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Thousands of people are constantly using digital platforms where privacy is disregarded by eager companies, or even by the digitizing of classified documents. Anne Klinefelter and David Adria, two professors of law, discuss the invasion of privacy caused by the digitizing of court records stating that “In “State v. Bright,” for example, a brief filed by the State of North Carolina describes the abduction and rape of a ten-year-old girl, naming the child in full on the first page…” Once these documents were placed on-line, the privacy of the victim was instantly invaded. This explains how cases similar to this has caused people to suffer the loss of their anonymity, causing privacy risks for the victims. Once court records were digitized, any ounce of privacy these people had was stripped away, providing the public with personal details.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Pub Case Study

    • 473 Words
    • 2 Pages

    On Friday, June 30, 2000, however, researchers at AT&T Labs announced the creation Publius, a software program that enables Web users to encrypt (translate into a secret code) their files – text, pictures or music – break them up like the pieces of a jigsaw puzzle, and store the encrypted pieces on many different servers scattered all over the globe on the World Wide Web. As a result, anyone wanting to examine or censor the files or wanting to trace the original transaction that produced the file would find it impossible to succeed because they would have to examine the contents of dozens of different servers all over the world, and the files in the servers would be encrypted and fragmented in a way that would make the pieces impossible to identify without the help of the person who created the file. A person authorized to retrieve the file, however, would look through a directory of his files posted on a Publius-affiliated website, and the Publius network would reassemble the file for him at his request. Researchers published a description of Publius at www.cs.nyu.edu/waldman/publius.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Business Ethics

    • 394 Words
    • 2 Pages

    I would not continue to do business with a factory who does not improve working conditions. If changes that need to be made have been made clear and no progress has occurred, I would not continue to do business because safe and healthy working conditions are a basic human right. No…

    • 394 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Meeks, B., (2000). “Is Privacy possible in Digital Age: if isn’t dead, then it’s hanging on by a…

    • 1263 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Invisible Web: What It Is, Why It Exists, How to Find It, and Its Inherent…

    • 891 Words
    • 4 Pages
    Better Essays
  • Better Essays

    The creation and development of computers is one of the most amazing technological advances our society has made. The amount of potential that computers and computing devices whether they 're desktops, laptops, or even mobile smart phones is nearly, if not, infinite. Because of said possibilities, almost anything, good and bad can come from the use of computer technology. Computers in today 's society, with current technological advances, provide us with countless benefits. However, despite these benefits, there are also a wide array of consequences associated with their use. Two of the biggest issues our society faces today in modern-day computing includes the invasion of privacy of individuals and their information by big corporations and the government and copyright infringement of intellectual property, also known as piracy.…

    • 1339 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Business Ethics

    • 888 Words
    • 4 Pages

    Business Ethics An Introduction to Business Ethics and Social Responsibility Lecture Etiquette • Try to be on time • Quietly enter and leave the lecture theatre • Be respectful to lecturers and other stude• Lecturers: Course objectives  To introduce students to ethical and political debates regarding the social responsibilities of businesses and corporations  To introduce students to ethical concerns that surround businesses and their treatment of a variety of stakeholders (e.g. consumers, investors, employees, suppliers…)…

    • 888 Words
    • 4 Pages
    Satisfactory Essays