Friday, January 31, 2020

Sales Ethics Is an Oxymoron Essay Example for Free

Sales Ethics Is an Oxymoron Essay Conversely, Sales management ethics is the specific component of business ethics that deals with ethically managing the sales function as sales manager’s priorities is to supervise the relationship bonded between the customer and a salesperson by ensuring that the relationship between the customer and salesperson is an honest one. Making the right decision can be very difficult for instance a majority of people would agree that honesty is an important ethical principle. Take in consideration an honest salesperson that have to meet ends of a looming end of month quota and is required to close one big deal to avoid falling short of the number. Will that salesperson fall short or will he or she undertake measures which may be unethical to reach those numbers. Sales Ethics provide aid in helping to shape a beneficial outcome for the concerning parties and stakeholders. Are salespeople more unethical than anyone else? It is proven that Sales managers and salespeople are not more likely to engage in unethical practices than are people with other marketing and management jobs. In reference to (Gene R. Laczniak and Patrick E. Murphy) significant questions are needed to be answered before taking action: is it legal? Will it infringe any regulations or laws enforced by the organisation? Does it contradict moral obligations that are specific to a certain organisation body? It is not always simple to act ethical and to oblige with the regulations denoted by the organisation. ‘It is possible to teach ethics and ethical behaviour; however can these be learnt and be easily enforced within an organisation? ’ You either are or are not (Isnt Business Ethics an Oxymoron? 2008) Hence, some agree that sales ethics is an oxymoron. Acting ethical can be extremely expensive; one of an organisation’s main goals is to maximise profits; if they do not meet breakeven equilibrium point whereby profits equal to costs of production; a loss is incurred dispelling them to be unfit to compete in the market. The organisation making a loss would go bankrupt and would have insufficient capital to fund any operational circumstance unless they borrow the capital from banks which can be very risky depending on the organisation’s liquidity. Striving for a 100% in ethical commitment and regulations in order to be valid is impossible to achieve. Another aim of an organisation is to minimise costs as much as possible, acting ethical may increase costs of production creating a challenge for the company as a whole. When Salespeople are poised with the challenges that may seem impossible to achieve, giving up is the first response. On the other hand, it is not negative to strive for perfection in ethical standards; however to demand a 100% can sometimes bring about an opposite; an uncharted cause of actions that may apply pressure on the employees and stakeholders which may result in a destructive consequence. Additionally; research conveyed that age is positively related to ethical behaviour among sales managers; older sales managers tend to make more ethical decisions and relatively high levels of relativism are associated with less ethical decision making among sales managers. Relativism demonstrates the process whereby an individual reaches moral decisions based on their actions they view to be acceptable when they provided a particular scenario. On the other hand, relatively high levels of idealism are associated with a lower likelihood of hiring a controversial job candidate. Idealism conveys a set of principles where individuals determine morality; a set of standards expected to be abided by with no exceptions or excuses. This is an example of moral philosophy; which deals with systematic methods whereby individuals recognize and resolve decisions having moral content (Hair, J. F, Anderson, R. A, Mehta, R, and Babin, B. J. ) Businesses strive for perfection, an impossible standard which the organisation can only work towards but can never achieve; hence this is the perception viewers may argue upon business ethics being an oxymoron. Conversely; Sales ethics is not an oxymoron because perfection is the impossible to achieve; that doesn’t mean organisations should give up; instead they should strive for the best possible solutions to the obstacles encountered. ‘These solutions aren’t always perfect, but they often represent the best we can achieve. ’ (Johannes, B. 2002) It can be difficult to apply business ethics but nobody and no organisation is perfect; striving to achieve a higher level is the best perception organisations can enact in order to reach several goals set by the organisation. One of the most important stakeholders of sales is the customers. ‘The first sale is always the hardest’ claims (Hair, J. F, Anderson, R. A, Mehta, R, and Babin, B. J. ) if sales people do not sell their product or good, they cannot earn the income to source the needs they require such as shelter, food and water. Therefore the relationship established between the customer and the sales person is vital to the organisation’s employee and employers as a whole. This is where a boundary spanner is introduced; someone to perform his or her job in the boundary between a company and a customer. The salespeople represent the company to the customer and the customer of the company. The sales managers have a unique role in maintain an ethical work and sales climate as it is their duty to make sure morally corrupt individuals are not employed by the firm to put a check on any system providing an incentive for immoral behaviour and are also responsible for the way the firm’s sales force treats its customers. And most importantly; to comply with the sales ethics and standards expected by the organisation. Therefore it is essential to classify the linkage between the customer and organisational company because when making a sale to the customer as they hold certain rights and when there has been a violation of these rights; customers are entitled to claim damages because ‘Customer is always right’ Firstly, customer Vulnerability denotes a fact when customers are at some sort of disadvantage to the company. These include: Ignorance (lack of some vital knowledge, product knowledge, needed to participate in a fair exchange) Naivete (lack of experience or the ability to conduct a transaction or negotiate terms of fair deal) Powerlessness (a lack of either competition within a marketplace or sufficient assets with which to be persuasive) (Hair, J. F, Anderson, R. A, Mehta, R, and Babin, B. J. ) Customers have the right to information and should not be provided with the disadvantages posed by the sales department because this is a breach of sales ethical standards. Consequently, standards conveyed by the company must be enforced and clear to all the stakeholders and the company itself. A code of ethics must be established and enforced within the company; Code of Ethics expresses the values of a firm by specifying in writing specific behaviours that are consistent or inconsistent with those values. These codes must not only be adopted, they must embody the values truly epitomized by the top management sector (Rastogi, Aseem). There are 4 basic types of code of ethics: Company code that defines the ethical boundaries for employees. Professional codes that define ethical boundaries for occupational groups such as advertisers, marketing researchers, sales representatives, doctors, lawyers, accountants. Business association codes that define ethical boundaries for people engage in the same line of business; examples include codes established by direct selling association of America and by the American Association of Advertising Agencies; advisory group codes implemented by the government agencies and other special interest groups for aid purposes. Codes often list employee behaviours that the firm does not condone or accept. Each industry is confronted with somewhat unique ethical situations. Therefore it is extremely important to create an Ethical Work Climate which demonstrates the way employees perceive the organisation culture along with the significant code of ethics. Culture also plays a major role whereby when culture is very strong, employees will tend to share the same perceptions, on the other hand, when a culture is not as strong or identifiable, perceptions may vary considerably from one employee to another. The organisational climate, specifically it’s the way employee’s view their work environment on moral dimensions is extremely significant in achieving the set of moral and sales ethical standards expected. Isnt Business Ethics An Oxymoron? Personally I disagree with the statement of sales ethics being an oxymoron because it is unrealistic to impose such an unrealistic standard on businesses or anything else we do. We should examine each and every ethical policy and question ourselves how do we improve from here? Is the current code of ethics adequate enough? How is the training regime like? Are the stakeholders being treated well enough? I do not believe that sales ethics is an oxymoron due to the fact that we are humans. We all make mistakes, everyone is not perfect; however if we strive for excellence; this is the best outcome we can possibly achieve with fantastic results. We need to extract sophisticated methods which may connect the values we seek to the business organisations; that way school of businesses and top companies are able to support the conceptual framework of continuous improvement in sales management; thus increasing effectiveness and efficiency to boost business ractices. Even if the possible seems impossible, giving up is never an option; there is no dishonour in being less than perfect, if everyone was perfect; this world would never have existed; there is always room for improvement and everyone should strive to get better. The answer is inevitably indeed we can always strive for excellence, sales ethics is not any oxymoron, and it’s an opportunity.

Thursday, January 23, 2020

The Political Climate of the 1950s Essay -- History Historical Politic

The Political Climate of the 1950s With the dropping of the Atomic bomb that ended WWII and the beginning of the Cold War, there was an irony of stability and turmoil in the United States. The start of the 1950s brought about many changes, from the Red Scare and threat of the possible spread of communism in America, to changes in political movements, civil rights movements, and another possible war, there were many significant events and people during this time.   Ã‚  Ã‚  Ã‚  Ã‚  Joseph R. McCarthy was a Republican Senator from Wisconsin with an enormous political agenda. With the fear of communism ignited by the Cold war, McCarthy and his supporters began to instill in the American people the fear that communism was taking root in the United States. In February 1950, McCarthy announced at a speech in Wheeling, West Virginia that he had obtained a list of card-carrying American Communists in the State Department (Davidson et al., 2002). For the next several months, often referred to as the Red Scare, McCarthy led a committee that investigated various government agencies and questioned a large number of people about their political associations. It was later found that the McCarthy’s charges were unsubstantiated, but the effects of this â€Å"witch hunt† would impact the United States even after the charges had settled. One the first impacts of McCarthyism was the win of Republican candidate Dwight Eisenhower in the 1952 presi dential election. The McCarthy campaign, which has accused many democrats including Harry S. Truman of taking a liberal stance on communism, hurt many democrats in the election. The infringement of civil right on the American People was yet another impact of McCarthyism. By 1952, 32 states had laws requiring teachers to take oaths of loyalty and government loyalty boards were wanted to now personal details of their employees such as what newspaper they subscribed to and what music they owned (Davidson et al. 2002). It was not until hearings against those thought to have communist association were aired on ABC and the public had the opportunity to see the badgering and mockery of these proceedings that the McCarthy’s popularity fell quickly and the Red Scare receded as well.   Ã‚  Ã‚  Ã‚  Ã‚  The Eisenhower presidency pursued dynamic conservatism or modern republicanism in his new term. In his own words, Eisenhower declared â€Å"I will be conservative when it ... ...nt, it is without doubt that it is more historically significant. Even though slavery had been abolished, equality was far from typical. The events of the 1950s seemed to say that minorities would no longer tolerate an unequal America. The strategies of the civil right movement made more of a statement than ever before in history and paved a way for civil rights activists to make a real impact on desegregation and equality. No one could have realized that what seemed as an insignificant gesture to partake in training South Vietnamese armies and America’s involvement in Southeast Asia would one day have the impact it did on America. Although at the time when Eisenhower was trying to stop of the spread of communism it seemed the right thing to do, the repercussions of that decision and the war it eventually led to was devastating to America politically, socially, and culturally. Works Cited Davidson, J. W., Gienapp, W. E., Heyrman, C., Lytle M. H., Stoff, M. B. (2002) Nation of Nations . The McGraw-Hill Companies. Schultz, S. (1999) American History 102: Civil War to the Present. Retrieved April 10, 2005 from http://us.history.wisc.edu/hist102/lectures/lecture25.html.

Wednesday, January 15, 2020

Advancement in Science and Technology Research is a peer-reviewed open access journal published quarterly Essay

Advancement in Science and Technology Research aims at providing a platform for researchers, engineers, scientists, and educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal’s objective to promote engineering and technology education. The papers for publication in Advancement in Science and Technology Research are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability. Advances in Science and Technology is a irregular series presenting the Proceedings of CIMTEC, International Cermics Congress and Forum on New Materials. The series is published on behalf of TECHNA GROUP, Faenza, Italy. With the second review conference of the Chemical Weapons Convention (CWC) approaching in April, a raft of studies have appeared making clear that fundamental changes in science and technology are affecting the implementation of the treaty and that it must be adapted to take account of them.[1] The most significant development is the revolution in the life sciences and related technologies, including a growing overlap between chemistry and biology. There is a vastly increased understanding of the functioning of biological systems as a result of the mapping of the human and other genomes as well as of advances in structural biology and the study of proteins (proteomics). Information technology and engineering principles are increasingly integrated into biology. The intersection between chemistry and biology has further expanded thanks in part to the automation of synthesis and screening of chemical compounds enabling laboratories to assess vast numbers of new chemical structures and a much-enhanced understanding of how certain â€Å"chemicals of biological origin† act. Technological advances supplement these trends, for example, providing for more efficient means of delivering biologically active chemicals to target populations or targeting organs and receptors within an organism. These developments are expected to bring many benefits, including new medical treatments and methods of pest control. At the same time, the capacity to discover or design new chemical structures that may have utility as chemical warfare agents has also increased significantly. Novel agents can be created far more quickly than ever before. In addition, advances in manufacturing technology have shortened other time requirements, enabling shortcuts in the progression from research and development to full-scale manufacturing. Changes in the chemical industry have dispersed technology and facilities, complicating verification and traditional nonproliferation strategies. As a result, the time and effort needed to field a new chemical weapon has shrunk, particularly in the early stages, while the capability to detect such actions has not grown significantly. These trends and a recently increased interest in the use of incapacitants for law enforcement purposes raise at least the threat that states could skirt or quickly break out of the CWC prohibitions on developing and acquiring chemical weapons. It has also enlarged the overlap between the two otherwise quite separate treaties governing chemical and biological weapons, the CWC and the Biological Weapons Convention (BWC). States-parties need to adapt the implementation of the CWC to account for these changes or risk diminishing confidence in its effectiveness and endangering its viability.

Tuesday, January 7, 2020

Security Risk Analysis and Assessment Report - 1093 Words

All of the operating system (OS) log files were examined for any suspicious activity. The event logs which were searched were application, security, setup, system, as well as applications and services. According to Sunil Gupta (2013), â€Å"Windows has the ability to generate a detailed audit record of security events on each system. Windows logs events for the two types of security Accounts: Computer and User for their logon and authentication â€Å"(p.21). The application log was searched for errors and events of programs and applications. Security logs were checked for log-ins to the device and the manipulation of files and folders. Setup logs were searched for information on what programs were installed on the device. System logs provided†¦show more content†¦This type of exploitation of web browser technology poses a persistent vulnerability in network security, and for that reason it is important that employees do not become the victim of such an attack. According to Will Dormann and Jason Rafail, â€Å"Not securing your web browser can lead quickly to a variety of computer problems caused by anything from spyware being installed without your knowledge to intruders taking control of your computer† (2008). After this phase of the investigation was completed, the targets were interviewed for their input on why the penetration testers were successful or failed to obtain sensitive information. The risk of a breach due to an insider is something that Cybercom must consider and have measures in place for. Some of the vulnerabilities associated with an insider attach include the setting up of a rogue access point and the use of thumb drives. A rogue WiFi access point setup near an external wall could be used to access the network from outside the facility, and thumb drives can be used to steal data, keeping it in a small, easy to conceal medium. According to Kelly Jackson Higgins, â€Å"The difference with insiders is they can inflict measurable financial, measurable IP, measurable brand and reputation damage -- more so than an outsider can† (2012). Analysis Of the Threats identified, three were deemed to be the most crucial to address;Show MoreRelatedSystem Analysis and Recommendation Report of Natividad Medical Center859 Words   |  3 PagesSystem analysis and recommendation report In this section, I present a system analysis and recommendation report on the Natividad Medical Centers Hospital Computer Information Systems (HCIS) network and its hospital-grade systems infrastructure and technology components. The system analysis report details the findings of the system analysis in the part of system vulnerability/risk assessment as a critical component of the security plan. Why the system vulnerability/risk assessment was carriedRead MoreReport on the Security System at Natividad Medical Center1227 Words   |  5 PagesSecurity plan This final part of the project contains an in-depth and comprehensive report on the security system at Natividad Medical Center. Using relevant peer-reviewed and technical reports, I devise an analysis plan that explains thoroughly, how I will analyze as well as evaluate Natividad Medical Centers Hospital Computer Information Systems (HCIS) network and its hospital-grade systems infrastructure and technology components. In this comprehensive report, the details of what is going toRead MoreManaging Information Security Risks: The Octave Approach1635 Words   |  6 PagesAlberts, C. Dorofee, A.(2003) Managing Information Security Risks: The OCTAVE Approach. New York: Addison Wesley. This work is a descriptive and yet process-oriented book on the concept of security risk assessment with a specific focus on new risk evaluation methodology, OCTAVE. The term OCTAVE is used to denote f Operationally Critical Threat, Asset, and Vulnerability Evaluation SM.It is important that organizations conduct a security risk evaluation in order for them to effectively evaluateRead MoreRisk Analysis : Risk Assessment1647 Words   |  7 Pages Risk Analysis Methodologies By: Cressandra R Dull Professor Hughbank HLSS505 Security Risk Management Throughout the many different types of establishments that currently exist today, there are risk assessments methodologies which are used to estimate or determine risk. According to the Department of Homeland Security (DHS) Risk Lexicon (2010), risk assessment methodologies are defined as, â€Å"set of methods, principles, or rules used to identify and assess risk and to form prioritiesRead MoreElectronic Protected Health Information On The Confidentiality, Integrity, And Availability Of The Electronic Protection Essay865 Words   |  4 PagesI. Purpose To establish guidelines to assess and analyze potential risks and vulnerabilities to the confidentiality, integrity and availability of the electronic protected health information that Topaz Information Solutions, LLC (Topaz) creates, uses, processes and transmits. II. Scope and Limitations This policy applies to all Topaz workforce members. III. Related Policy Names and Numbers Privacy Policy (COM-001) Security Policy (COM-002) Disclosure Policy (COM-003) IV. Definitions ElectronicRead MoreCase Study : Strengths And Weaknesses1447 Words   |  6 Pagesbackup every day Strength Data Security FFC has no formalized security awareness programs related to data security Weakness System Development FFC adopted Structured System Analysis and Design Methodology. Strength Data Security Application programmer could not access the computer room unless the data center personnel have permitted them. Strength Change Management FFC have formal procedure for change management Strength Data Security FFC has an appropriate IT security policy that VP, IS could knowRead MoreA Brief Note On Idaho State University ( Isu ) Essay731 Words   |  3 PagesIdaho State University (ISU) controlled and managed the security for twenty-nine outpatient clinics. Thus, one would expect that all the health information would be protected. Four to eight of these facilities were required to follow HIPAA Privacy and Security Rules. However, they failed to do this efficiently especially at the ISU’s Pocatello Family Medicine Clinic (HHS.gov, 2013a). As a result, ISU reported a breach to their system to the U.S. Department of Health Human Services (HHS) Office ofRead MoreMcdonald s Risk Assessment Policies And Procedures1216 Words   |  5 Pages RISK ASSESSMENT POLICIES AND PROCEDURES DATE: 1-1-201X TO: ASSESSOR FROM: Mr.ABC Introduction: This report is about McDonalds’s risk assessment policies and procedures. We have done technical analysis of policies, procedures, guidelines, strengths, weaknesses, legal and legislation requirements of McDonalds. This report summarizes our work to make it convenient for you to understand McDonalds’s risk assessment plan. MCDONALD’S RISK ASSESSMENTRead MoreCase Study : Area Risk Assessment862 Words   |  4 PagesITGC Area Risk Assessment IT Management Low Systems Development Low Data Security Medium Change Management Low Business Continuity Planning High Alexandra DeHaven IT General Controls ITGC Area Summary of Issue Strength or Weakness IT Management FFC has an IT strategic plan Strength IT Management FFC has an IT Steering Committee Strength IT Management VP Information Security reports to CIO Weakness IT Management FFC plan matches IT plan Strength IT Management VP Applications reports to CIO WeaknessRead MoreWhat Role Does Risk Management Play Within The Homeland Security Enterprise?1186 Words   |  5 PagesWhat role does risk management play within the homeland security enterprise? To answer that question we first have to examine what risk management is. Risk management is an anaclitic approach to figuring out the likelihood that an event will impact a specific assets, person, or function and then implementing steps to mitigate the impact or consequence of the event. (Decker, 2001) The Standard risk management formula that the Department of Homeland Security uses is R=T*V*C or Risk = Threat * Vulnerability