Preview

Octopus and Privacy: Business Ethics

Powerful Essays
Open Document
Open Document
2406 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Octopus and Privacy: Business Ethics
Octopus and Privacy: Business Ethics

Table of Content Introduction 3 The Objective 3 Research Methods 3 Background of the Company 3 Background of the Issue 5 Identification of Issue 7 Analysis of Issues 8 Recommendation 10 Conclusion 11 Appendix 12 List of Reference 12

Introduction
Hong Kong has one of the most highly successful e-purse programs, the Octopus card. The Octopus card, which began in the niche transportation industry and extended outward to retailers, has been widely adopted by consumers and a diverse number of merchants. More than 95 percent of Hong Kong’s residents aged 15 – 65 carry the card.
The Objective
Our purpose is to develop some insights by investigating the management issue of the Octopus card company. We would identify the issue and analyse the problem in this paper. Lastly, we would suggest some recommendations to the organization for improvement. The major issue is protecting the privacy of personal information, which continues to pose significant challenges for organizations. Because consumers are vulnerable in their dealings with businesses due to a lack of information about and an inability to control the subsequent use of their personal information, we argue that organizations have a moral responsibility to these individuals to avoid causing harm and to take reasonable precautions toward that end.
Research Methods
We adopted the secondary data research for conducting research as it is an efficient way to search for information. We have collected some existing research result and data from published, such as, the newspaper clipping from internet, article related and journals etc.

Background of the Company
Octopus Holdings Limited is a holding company based in Hong Kong jointly owned by five major transport companies (54.4% by the MTR Corporation, 22.1% by the Kowloon-Canton Railway Corporation, 12.4% by Kowloon Motor Bus, 5% by Citybus, and 3.1% by New World First Bus.) in the city. Its subsidiaries, which are all

You May Also Find These Documents Helpful

  • Powerful Essays

    Mkt 441 Week 3

    • 1156 Words
    • 4 Pages

    Another important source of secondary information is online search. However, online research is very risky and should be done with great caution and responsibility and must be referenced in the report. However, online secondary information should be handled with care. If information is gathered from a website, it must be referenced in the report. It is very important to use websites of great and positive reputation and have great recognition. “In several cases, it is important to check the authenticity of website by phoning the professional body related to the source of information and checking with them”…

    • 1156 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    IFSM Paper B1

    • 476 Words
    • 2 Pages

    You have the duty to respect the privacy of customers’ personal information and buying habits.…

    • 476 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Primary and secondary sources of data would be used for the study. Surveys will the primary method of data collection. Internet surveys would be the primary source of data. Internet surveys have been both hyped for their capabilities and criticized for the security issues it brings. Internet surveys would also require less time for the researchers and the respondents. Secondary source of data would involve the use of books and journals.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Best Essays

    The aim of this essay is to provide a supportive argument – “for” the notion that an individual’s privacy is more important than any other considerations in the workplace. Workplace scenarios will be outlined including job applications, storage of personal information, Internet and email, information technology effects on privacy, workplace policies and procedures and medical privacy. Differing ethical theories will be applied to both sides of the argument.…

    • 2391 Words
    • 10 Pages
    Best Essays
  • Best Essays

    There was used a secondary research so that to create this individual report paper. The secondary data that was used in this document was found in the required textbook, in the seminar material, in journals and in the Internet. For the full list of all sources, please see the enclosed references and bibliography.…

    • 3537 Words
    • 15 Pages
    Best Essays
  • Best Essays

    The problem to be investigated in this paper is the challenges associated with the ethical usage of Information Technology (IT) within modern corporations and the mitigating factors associated with protecting Personal Identifiable Information (PII) within society.…

    • 3978 Words
    • 16 Pages
    Best Essays
  • Best Essays

    The first part of the report tackles the effects of the different bacteria and fungi-related infestation found in hogs. These adverse effects range from diseases that can be contracted by humans as well as the hogs which may result to a lower meat and offspring production.…

    • 3135 Words
    • 13 Pages
    Best Essays
  • Good Essays

    The major issues concerning ethics with Information technology are: Privacy and Confidentiality, Freedom of Speech, Security, and Computer. When it comes to communicating on the web ones conversation are subject to another person listening or seeing the transmitted message. “Browsers track activities in history files, while Cookies dumped by web sites into information about a person and the things they look at. With the information collected by cookies from online e-commerce sites trace the purchasing patterns of the consumer.” (Introna) The information gathered can give specifics on the identities of individual consumers and this information can be sold whereas leading to a breach of privacy and confidentially. If one can respect others PRIVACY on Internet or just in general the activity on the Internet can limit the chances for identity theft or other criminal activities.…

    • 467 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Leak of octopus card

    • 752 Words
    • 3 Pages

    In Hong Kong, the Octopus Card is not only treated as a means of electric payment. The Octopus Card interacts a lot with our daily life, like entering our apartments, registering students’ attendance in schools, recognizing our membership of certain organizations, etc.…

    • 752 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Marketing strategies for international corporations may not mainly focus on local residents, but travelers and mainland visitors in Hong Kong who usually not got Octopus card in hand. It is too much for them to set up Octopus network.…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    In terms of technical Issue, Octopus card is a rechargeable contactless stored value smart card used widely in transportation and retail business. How can it transfer the money without contact? It is because it used the technique of Radio Frequency Identification (RFID).…

    • 1033 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Isom Case

    • 705 Words
    • 3 Pages

    Have you ever counted the number of membership cards are there in your wallet? For mine, there are at least five. Membership reward program is now becoming more and more prevalent in the Hong Kong and is controversial. It brings huge benefits to the customers since they are rewarded considerably in some way by joining the membership, as the companies claimed. However, there are two sides of the same coin. Privacy related issues, like the Octopus Card Company scandal in 2010, are generated by the programs. In this paper, I will briefly introduce how the programs work and issues generated in the process, followed by reasons why I think the benefits of the programs outweigh privacy related issues.…

    • 705 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Smart Card

    • 2960 Words
    • 12 Pages

    The MTR charges less for journeys made using an Octopus card instead of conventional single-journey tickets. For example, the adult fare of a single journey from Chai Wan to Tung Chung is HK$20.70 with an Octopus card, and HK$23.50 with a single journey ticket.[38] Other public transport operators also offer intermittent discounts for using Octopus cards on higher fares and round-trip transits on select routes.[39]…

    • 2960 Words
    • 12 Pages
    Good Essays
  • Good Essays

    Technology and Risks

    • 775 Words
    • 3 Pages

    Most consumers are wary of using their credit or debit cards on the internet in fear of their information being stolen; because of this some consumers steer clear of internet transactions. Yet, these same consumers have no problem handing a credit or debit card to a stranger in a brick and mortar establishment. Somehow, consumers feel safer and secure with their information in someone else’s hands.…

    • 775 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    SBMT 2010

    • 4413 Words
    • 13 Pages

    Personal information is an essential part of our identification and is useful in many aspects of our life. However, it's also becoming more and more vulnerable in contemporary society with a multitude of approaches for collecting and using people’s information emerges. The leak and abuse of personal information can cause serious troubles to people’s life and selling others’ information for commercial purposes has long been regarded as unethical behaviour in business world. With the backdrop of the recent privacy violations committed by the Octopus Card Company ,wherein they sold the personal information of users to corporations, we thought it was of the utmost importance to increase awareness about the severity of the issue by providing users’ with thorough research on the issue as well as means to minimise the harm. By researching the current condition of personal information security and providing people with useful information on how to protect their personal data, we hope that our project can help people cope with this ethic issue. We believe that knowledge is power and an alert consumer is a safe consumer. Hence, we created a research-oriented website wherein research was conducted using academic reports, personal surveys, in-person meetings and interactions with decision making authorities like the Privacy Commissioner of Personal Data of Hong Kong. Then, we compiled this research together and disseminated it by uploading it onto our website (http://businessethics07.wix.com/information-security) and marketing that website through in-person meetings with individuals off-campus, various online consumer forums in Hong Kong, social networks like Facebook and Twitter and by conducting a talk on the campus of the Hong Kong University of Science and Technology.…

    • 4413 Words
    • 13 Pages
    Powerful Essays

Related Topics