Module 11: Teamwork and Communication
What you'll learn to do: identify common risks and ethical issues associated with electronic communication in businessIn this section we'll touch on some of the risks and ethical issues business face when they rely on electronic communication.
- Identify common risks associated with electronic communication
- Identify common ethical issues associated with electronic communication in business
Risks of Electronic Communication
Electronic communication and eCommerce have presented businesses with exciting opportunities that couldn't have existed even a couple decades ago. At the same time, they've brought unexpected challenges. Some of the biggest risks of using modern digital and electronic technology for communication and commerce are identity theft, unauthorized credit card or bank account use, and even demand for ransom for the return of stolen data.
When businesses allow customers to shop online, receive discounts by providing personal information, use live chat to communicate with customer service, they are hoping to enhance their image and provide a customer experience that is superior to the competition. But, what happens when the information a customer shares with a business is compromised or stolen by a third party? Consider what Home Depot endured when their customer database was breached in 2014:
- Viruses, worms, and Trojan horses. A computer virus is a type of malicious software program ("malware") that, when executed, replicates by reproducing itself (copying its own source code) and/or infecting other computer programs by modifying them. A computer worm is a stand-alone malware computer program that replicates itself in order to spread to other computers. A Trojan horse, or Trojan, is any malicious computer program or phony site that is used to hack into computers by misleading users about its true intent or identity.
- Spoofing or phishing. Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons. Often the sender of the electronic communication is disguised as a trustworthy entity.
- Denial-of-service attacks. A denial-of-service attack (DoS attack) is a cyber attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting the services of a host connected to the Internet.
The low cost and rapid delivery of electronic communication makes it the preferred method of communication for both business and consumers, but there can be hidden hazards and costs. The following are common ones:
- Electronic communications are forever. Electronic messages are permanent (this includes communications such as email and also audio recordings such as voice mail). Even if a person deletes the communications from his or her own server or account, there are generally other servers that still hold this information. One way that these types of communications live in perpetuity is when they are sent or forwarded to multiple individuals.
- Someone may be watching. In many cases, confidential information is leaked by someone else sifting through his or her messages. The culprit may be a disgruntled employee or even a competitor. Workstations left unattended, employees remaining logged on to networks and email accounts when they are away from their desk, and even sharing passwords with coworkers all make it easy for prying eyes to see information not intended to be shared.
- Innocent messages can still harm you. Civil litigation lawyers will warn you that even innocent messages can get you in trouble you if they are taken out of context. When a person writes an email or text, he or she may have only one intent or meaning in mind. However, messages can be misconstrued to apply to a completely different scenario.
- Email avalanche. Managers, in particular, are vulnerable to relying on email too heavily for communication. People use email because it's quick and easy, and they can send the same information to a lot of people at the same time. This can lead to information overload and misunderstandings by recipients, however. Words alone account for only 7 percent of communication, so it's important for managers to be aware of the limitations of email in getting their messages across.
Ethical Issues in Electronic Communication
Employers want to use technology to help them screen applicants and verify information about their workforce, which is understandable. In the module on Human Resource Management you learned about the cost of recruiting, hiring, and training employees. However, what if the company believes that one of the quickest ways to gather information about an employee is to access their social media accounts? A company would never ask for your login credentials for Facebook, Twitter, Instagram, LinkedIn . . . or would they? And if they did, is it legally and ethically justified? What would you do if you found yourself in the situation presented in the following video?
The fact is that technology has put our information at the fingertips of businesses—there for the taking and, in some cases, the selling. Is it ethical for a business to collect data about a person and then sell that information to another business? Many organizations collect data for their own purposes, but they also realize that your data has value to others. As a result, selling data has become an income stream for many organizations. If you didn't realize that your data was collected by Company A, it's even less likely you knew that it was sold to Company B.