Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Introduction
Corporate social responsibility for most businesses has been reduced to focus on business ethics. Every company has coined its core values, hence these values have spiraled every aspect of its core functioning including the investors the business deals with. To enhance the business image, ethics have formed a core of business functions. This paper addresses pressures that ensure a business operates ethically. Besides, the paper addresses three major ways in which terrorists may alter the usefulness of the internet and spell out the negative impact of their activities on cyberspace. Lastly, the paper addresses how balance can be established to enhance private communication and measures the governments has to institute in monitoring cyberspace for any potential threat.
Business and Ethics
The roles of investors in relation to changing nature of businesses operations have been altered. More perspective has been shifted on the way they sees business performance. In recognizing, the value of their indolent, ethics has formed a benchmark in assessing performance and aiding in decisions making (Jurinski, 2003, P.98). The competitive labor markets exert undue challenges and compel businesses to act ethically to remain competitive in their core businesses.
Besides, most employees have shifted the attention of not recognizing normal benefits and paycheck. Nevertheless, they are emphasizing businesses whose beliefs and operative practices correspond to their own ethical needs. Hence, businesses are keen on retaining their skilled employees and encouraging prospective employees should embrace ethics in their operations(Jurinski, 2003, P.68).
Further, the stakeholder tendency has grown largely hence they have increasingly recognized businesses activities and firms are making strides in the areas compliant with ethical standards. A code of conduct in relation to employees, suppliers, and the business itself is a sure alternative to retaining the unique image of a business entity.
Patent, Trademark, and Copyright
A patent is an authorization given to a designer or inventor as legitimacy to sojourn anyone from using it or for marketing purposes without his or her consent. Patents largely shield technical development i.e. new processes or products. For any product to be patent, it should meet three thresholds i.e. the product should be innovative, novel, and useful (Jurinski, 2003, P.109). To ascertain these thresholds, people or businesses applying for patents are obliged to publicize a depiction and information, which can facilitate anyone to make effective use of the product or invention.
A trademark is a symbol, phrase, or word that is used to identify a particular product, which distinguishes it from other products. They are commonly used to permit consumers to identify the origin of the product (Jurinski, 2003, P.123). For example, it is easier for a customer to distinguish a Colgate by simply looking at its trademark. Trademark simplifies identification of goods and gives an incentive to manufacture has to invest in quality products.
Copyright is a legal protection given to authors to enhance the creativity of their work. Copyright enhances originality and it largely includes; pieces of literature, music, art, and forms of intellectual innovations. Copyrights applied to either printed or unpublished work (Jurinski, 2003, P.137). However, copyright does not protect ideas, but only safeguard the original expression of an idea.
Forms of Bankruptcy
Bankruptcy or commonly known as insolvency of an organization or a person is a legal standing that safeguards a person or an organization of repaying debts they or he is indebted. Different forms of bankruptcy. They include; corporate bankruptcy, firm reorganization and personal.
Corporate bankruptcy is a legal binding that makes a business entity declare that it cannot meet its obligations and thus seeks legalprotection from its creditors.United states for instance, have twochoices for acting on corporate bankruptcy. It is contained in chapter 7 and 11 in bankruptcy act.Businesses thereforecan contest their bankruptcy by exploiting these legal avenues(Jurinski, 2003, P.120).
Personal bankruptcy denotes a process whereby aperson can free himself or herself from debtburden to facilitate her or him start a new but limited to restriction. Personal bankruptcy caninvolve an individual selling some of his or her assets to offset debts by sharing equally between the people who the money to indebted. Personalbankruptcy is covered in, Chapter 7, 11 and 13 in USbankruptcy code
Farm reorganization is also a form of bankruptcy mostly applicable to farmers who may need to reorganize their debts whereas working on their lands (Jurinski, 2003, P.136).Farm reorganization is essential in assisting farmerswho shows amplitude to reorganize themselves. Farm bankruptcy reprieve farmers from substantial liability whereas paying their creditors what seems reasonable. Its effectiveness and conditionsare ingrained in chapters 12 of bankruptcy code.
Internet Threats
Internet has contributed to a new revolution and transformed communication globally. Negatively, it has provided a platform in which cyber terrorists have exploited to thwart its usefulness and efficiency. One-way in which terrorist have exploited internet is the use of malicious code. Malicious code is an auto-executable code that takes different forms. It can be in form of plug-ins,java applets and ActiveX controls. This hence, makes it complex to fix using antivirus programs (Bhaskar, 1993, p. 36).
Computer sabotage is increasingly daily. It involves intentional blocking,deleting,destruction of programs or information or generally damaging computer systems and associated networks(Bhaskar, 1993, p. 36). Computer sabotage is the gravest terrorism activity because business or organization loses very critical information and hardware which is key in decision-makingand success of any given business entity.
Modification of information is also an act of cyber threat. Criminals sometimes alter information in computer system for selfish gain or monetary gain. Modification of information may cause dire damage to a business entity thus Destroying business or person credibility in making informed decision (Bhaskar, 1993, p. 58).Modification of information is done when terrorists or unauthorized people access unsecured computer systems.
Privacy in relation to internet use should be a priority for any person, business or government entity accessing critical information. Care should be prioritized when opening websites that seems a threat. Moreover, installing updated versions of anti-virus is a secure way of countering threats that terrorists may anticipate to use in harming the computer systems. Besides, government should enforce strict measures to contain cyberspace crimes (Bhaskar, 1993, p. 97). Measures such as; policies in addressing safety online, penalties for cyberspace crimes and data protection policies should be available to the public to ensure safety is upheld in the cyberspace. Besides, hash punitive measures to the culprits should be instituted to deter the vice (Bhaskar, 1993, p. 123).
Conclusion
Businesses, which have a culture of centering their operative practices boost their corporate identity, hence accrue more profit gain. Ethics cements their trust with their customers and investors. Besides, effective measures to contain cyberspace crime such as espionage,malicious codes and theft of information can effectively boost businesses and facilitate decision-making. Governments therefore have an obligations to institute measures aimed at taming the vice.
References list
Bhaskar, K., N., (1993), Computer Security: Threats and Countermeasures.North Carolina: NCC Blackwell.
Jurinski, J., J., (2003), BankruptcyStep by Step. New York: Barrons Educational Series.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.