Skip to main content

Managements of most organizations are of the view that the type of punishment should focus on the behaviour rather than the person. Comment.

The challenge I see in this statement is the idea of "most." It is difficult to speak in a position of "most" companies because of the vast number and the different philosophies present in each. Speaking from the most general of point of views, I do believe that management should be focused on examining the behaviour, rather than the person. I think that it creates a rather hostile and adversarial work policies are focused on punishing individuals, as opposed to overall behaviours. Organizations run into dangerous ground when they focus on punishing the individual workers, who can seek redress in legal or social settings to argue that they are being unfairly targeted or persecuted. In order for codified policies of conduct to be effective and to withstand legal and social scrutiny, management is much better suited in focusing on the behaviour of individuals as opposed to the individuals, themselves.

Comments

Popular posts from this blog

What is the responsibility of business towards society? Why is social responsibility at a low pitch in India?

Responsibility of business towards society
A society consists of individuals, groups, organizations, families etc. They all are the members of the society. They interact with each other and are also dependent on each other in almost all activities. Thus, it has certain responsibilities towards society, which may be as follows:
to help the weaker and backward sections of the societyto preserve and promote social and cultural valuesto generate employmentto protect the environmentto conserve natural resources and wildlifeto promote sports and cultureto provide assistance in the field of developmental research on education, medical science, technology etc.
In other words, the responsibility of business towards society are:
Protection of environment.Better living conditions like housing, transport, canteen, crèches etc.Promotion of sports and culture.Opportunity for better career prospectsRegular supply of goods and servicesProper working conditions and welfare amenitiesGoods and services at…

Explain the meaning, relevance and features of the Competition Act, 2002.

In 1969 Govt. has passed an act and it had given the name monopoly and restrictive trade practices (MRTP). It became popular with the name of MRTP 1969. This act has many provisions to control the monopoly and to promote the competition. It has defined RTP and also explained the powers of MRTP commission. But its scope was very narrow and Govt. of India has made new act called competition act 2002. On the place of MRTP ACT 1969 after this MRTP act 1969 was fully repealed.

Explanation of Competition Act 2002
Competition Act 2002 states that Indian traders must not do any activity for promoting monopoly. If they will do any activity in the form of production, distribution, price fixation for increasing monopoly and this will be against this act and will be void. This act is very helpful for increasing good competition in Indian economy.

Under this act following are restricted practice and these practices are stopped by this act.
Price fixing: If two or more supplier fixes the same price…

How is data and message security ensured in e-business?

The data and message security ensured in e-business via:

Encryption: This technology deploys a public key and a private key infrastructure to ensure security. The public key can be distributed but the private key remains only with the user and the service provider. So, it works just like the username and password system of your e-mail account.Digital signatures: This technology requires a recipient’s password to decode the encrypted data. The sender’s authentication gets confirmed through a digital certificate, issued by credible authorities such as Verisign and Thawte.Secure socket layers (SSL): This process involves both public key and digital certificate technologies to ensure privacy and authentication. To initiate the process, a client asks for authentication from the server, which is done through a digital certificate. Then, both the client and server design session keys for data transfer. The session will expire following any modification or prolonged period of inactivity.Firewa…