CINXE.COM
Search results for: ethical hacking
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: ethical hacking</title> <meta name="description" content="Search results for: ethical hacking"> <meta name="keywords" content="ethical hacking"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="ethical hacking" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="ethical hacking"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 824</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: ethical hacking</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">824</span> Approaches to Ethical Hacking: A Conceptual Framework for Research</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lauren%20Provost">Lauren Provost</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethical%20hacking" title="ethical hacking">ethical hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=literature%20review" title=" literature review"> literature review</a>, <a href="https://publications.waset.org/abstracts/search?q=penetration%20testing" title=" penetration testing"> penetration testing</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20engineering" title=" social engineering"> social engineering</a> </p> <a href="https://publications.waset.org/abstracts/136658/approaches-to-ethical-hacking-a-conceptual-framework-for-research" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136658.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">218</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">823</span> The Impact of Religiosity and Ethical Senstivity on Accounting Students’ Ethical Judgement Decision</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Mohamed%20Alteer">Ahmed Mohamed Alteer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is come up with theoretical model through understanding the causes and motives behind the auditors' sensitive to ethical dilemma through Auditing Students. This study considers the possibility of auditing students’ ethical judgement being affected by two individual factors, namely ethical sensitivity and religiosity. The finding of this study that there are several ethical theories a models provide a significant understanding of ethical issues and supported that ethical sensitivity and religiosity may affect ethical judgement decision among accounting students. The suggestion model proposes that student ethical judgement is influenced by their ethical sensitivity and their religiosity. Nonetheless, the influence of religiosity on ethical judgement is expected to be via ethical sensitivity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=asccounting%20students" title="asccounting students">asccounting students</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20sensitivity" title=" ethical sensitivity"> ethical sensitivity</a>, <a href="https://publications.waset.org/abstracts/search?q=religiosity" title=" religiosity"> religiosity</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20judgement" title=" ethical judgement"> ethical judgement</a> </p> <a href="https://publications.waset.org/abstracts/18425/the-impact-of-religiosity-and-ethical-senstivity-on-accounting-students-ethical-judgement-decision" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18425.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">618</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">822</span> Client Hacked Server</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bagul%20Abhijeet">Bagul Abhijeet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hacking" title="Hacking">Hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Vulnerabilities" title=" Vulnerabilities"> Vulnerabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=Dummy%20request" title=" Dummy request"> Dummy request</a>, <a href="https://publications.waset.org/abstracts/search?q=Virus" title=" Virus"> Virus</a>, <a href="https://publications.waset.org/abstracts/search?q=Server%20monitoring" title=" Server monitoring"> Server monitoring</a> </p> <a href="https://publications.waset.org/abstracts/36777/client-hacked-server" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36777.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">821</span> Hacking's 'Between Goffman and Foucault': A Theoretical Frame for Criminology </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tom%C3%A1s%20Speziale">Tomás Speziale</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper aims to analyse how Ian Hacking states the theoretical basis of his research on the classification of people. Although all his early philosophical education had been based in Foucault, it is also true that Erving Goffman’s perspective provided him with epistemological and methodological tools for understanding face-to-face relationships. Hence, all his works must be thought of as social science texts that combine the research on how the individuals are constituted ‘top-down’ (as in Foucault), with the inquiry into how people renegotiate ‘bottom-up’ the classifications about them. Thus, Hacking´s proposal constitutes a middle ground between the French Philosopher and the American Sociologist. Placing himself between both authors allows Hacking to build a frame that is expected to adjust to Social Sciences’ main particularity: the fact that they study interactive kinds. These are kinds of people, which imply that those who are classified can change in certain ways that prompt the need for changing previous classifications themselves. It is all about the interaction between the labelling of people and the people who are classified. Consequently, understanding the way in which Hacking uses Foucault’s and Goffman’s theories is essential to fully comprehend the social dynamic between individuals and concepts, what Bert Hansen had called dialectical realism. His theoretical proposal, therefore, is not only valuable because it combines diverse perspectives, but also because it constitutes an utterly original and relevant framework for Sociological theory and particularly for Criminology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=classification%20of%20people" title="classification of people">classification of people</a>, <a href="https://publications.waset.org/abstracts/search?q=Foucault%27s%20archaeology" title=" Foucault's archaeology"> Foucault's archaeology</a>, <a href="https://publications.waset.org/abstracts/search?q=Goffman%27s%20interpersonal%20sociology" title=" Goffman's interpersonal sociology"> Goffman's interpersonal sociology</a>, <a href="https://publications.waset.org/abstracts/search?q=interactive%20kinds" title=" interactive kinds"> interactive kinds</a> </p> <a href="https://publications.waset.org/abstracts/67919/hackings-between-goffman-and-foucault-a-theoretical-frame-for-criminology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67919.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">343</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">820</span> Attributes of Ethical Leadership and Ethical Guidelines in Malaysian Public Sector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Norazamina">M. Norazamina</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Azizah"> A. Azizah</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20Najihah%20Marha"> Y. Najihah Marha</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Suraya"> A. Suraya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Malaysian Public Sector departments or agencies are responsible to provide efficient public services with zero corruption. However, corruption continues to occur due to the absence of ethical leadership and well-execution of ethical guidelines. Thus, the objective of this paper is to explore the attributes of ethical leadership and ethical guidelines. This study employs a qualitative research by analyzing data from interviews with key informers of public sector using conceptual content analysis (NVivo11). The study reveals eight attributes of ethical leadership which are role model, attachment, ethical support, knowledgeable, discipline, leaders’ spirituality encouragement, virtue values and shared values. Meanwhile, five attributes (guidelines, communication, check and balance, concern on stakeholders and compliance) of ethical guidelines are identified. These identified attributes should become the ethical identity and ethical direction of Malaysian Public Sector. This could enhance the public trust as well as the international community trust towards the public sector. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=check%20and%20balance" title="check and balance">check and balance</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20guidelines" title=" ethical guidelines"> ethical guidelines</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20leadership" title=" ethical leadership"> ethical leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20sector" title=" public sector"> public sector</a>, <a href="https://publications.waset.org/abstracts/search?q=spirituality%20encouragement" title=" spirituality encouragement"> spirituality encouragement</a> </p> <a href="https://publications.waset.org/abstracts/78387/attributes-of-ethical-leadership-and-ethical-guidelines-in-malaysian-public-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78387.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">259</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">819</span> A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Se-Han%20Lee">Se-Han Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Kwang-Woo%20Go"> Kwang-Woo Go</a>, <a href="https://publications.waset.org/abstracts/search?q=Gwang-Hyun%20Ahn"> Gwang-Hyun Ahn</a>, <a href="https://publications.waset.org/abstracts/search?q=Hee-Sung%20Park"> Hee-Sung Park</a>, <a href="https://publications.waset.org/abstracts/search?q=Cheol-Kyu%20Han"> Cheol-Kyu Han</a>, <a href="https://publications.waset.org/abstracts/search?q=Jun-Bo%20Shim"> Jun-Bo Shim</a>, <a href="https://publications.waset.org/abstracts/search?q=Geun-Chul%20Kang"> Geun-Chul Kang</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyun-Jung%20Lee"> Hyun-Jung Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automotive%20security" title="automotive security">automotive security</a>, <a href="https://publications.waset.org/abstracts/search?q=HEAVENS" title=" HEAVENS"> HEAVENS</a>, <a href="https://publications.waset.org/abstracts/search?q=car%20hacking" title=" car hacking"> car hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20model" title=" security model"> security model</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a> </p> <a href="https://publications.waset.org/abstracts/84442/a-study-on-automotive-attack-database-and-data-flow-diagram-for-concretization-of-heavens-a-car-security-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84442.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">362</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">818</span> A Systematic Review of Ethical Leadership in Tourism and Hospitality Settings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Majd%20Megheirkouni">Majd Megheirkouni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this study is to identify empirical studies that explore and investigate ethical leadership in order to assess and synthesize its impacts and outcomes. This study seeks to provide an evidence-informed answer to a set of questions on ethical leadership definition in the field of tourism and hospitality, its investigation, and examination, and its outcome. A systematic literature review, using medical science-based methodology, was conducted to synthesize research by reliable means. Four themes were identified from the analysis. These themes are: Ethical leaders’ characteristics, healthy work environment, ethical leadership effectiveness, and the application of ethical leadership across cultures. This study provides the potential to move hospitality and tourism leadership forward and encourage researchers to investigate new research topics. To the best of the author’s knowledge, this is the first systematic review focusing on ethical leadership in tourism and hospitality settings. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethical%20leadership" title="ethical leadership">ethical leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=approach" title=" approach"> approach</a>, <a href="https://publications.waset.org/abstracts/search?q=outcome" title=" outcome"> outcome</a>, <a href="https://publications.waset.org/abstracts/search?q=tourism" title=" tourism"> tourism</a>, <a href="https://publications.waset.org/abstracts/search?q=hospitality" title=" hospitality"> hospitality</a>, <a href="https://publications.waset.org/abstracts/search?q=systematic%20review" title=" systematic review"> systematic review</a> </p> <a href="https://publications.waset.org/abstracts/164938/a-systematic-review-of-ethical-leadership-in-tourism-and-hospitality-settings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164938.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">100</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">817</span> AI Ethical Values as Dependent on the Role and Perspective of the Ethical AI Code Founder- A Mapping Review</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Moshe%20Davidian">Moshe Davidian</a>, <a href="https://publications.waset.org/abstracts/search?q=Shlomo%20Mark"> Shlomo Mark</a>, <a href="https://publications.waset.org/abstracts/search?q=Yotam%20Lurie"> Yotam Lurie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the rapid development of technology and the concomitant growth in the capability of Artificial Intelligence (AI) systems and their power, the ethical challenges involved in these systems are also evolving and increasing. In recent years, various organizations, including governments, international institutions, professional societies, civic organizations, and commercial companies, have been choosing to address these various challenges by publishing ethical codes for AI systems. However, despite the apparent agreement that AI should be “ethical,” there is debate about the definition of “ethical artificial intelligence.” This study investigates the various AI ethical codes and their key ethical values. From the vast collection of codes that exist, it analyzes and compares 25 ethical codes that were found to be representative of different types of organizations. In addition, as part of its literature review, the study overviews data collected in three recent reviews of AI codes. The results of the analyses demonstrate a convergence around seven key ethical values. However, the key finding is that the different AI ethical codes eventually reflect the type of organization that designed the code; i.e., the organizations’ role as regulator, user, or developer affects the view of what ethical AI is. The results show a relationship between the organization’s role and the dominant values in its code. The main contribution of this study is the development of a list of the key values for all AI systems and specific values that need to impact the development and design of AI systems, but also allowing for differences according to the organization for which the system is being developed. This will allow an analysis of AI values in relation to stakeholders. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20codes" title=" ethical codes"> ethical codes</a>, <a href="https://publications.waset.org/abstracts/search?q=principles" title=" principles"> principles</a>, <a href="https://publications.waset.org/abstracts/search?q=values" title=" values"> values</a> </p> <a href="https://publications.waset.org/abstracts/161826/ai-ethical-values-as-dependent-on-the-role-and-perspective-of-the-ethical-ai-code-founder-a-mapping-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161826.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">107</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">816</span> Terrorist Financing through Ilegal Fintech Hacking: Case Study of Rizki Gunawan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ishna%20Indika%20Jusi">Ishna Indika Jusi</a>, <a href="https://publications.waset.org/abstracts/search?q=Rifana%20Meika"> Rifana Meika</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terrorism financing method in Indonesia is developing at an alarming rate, to the point, it is now becoming more complex than before. Terrorists traditionally use conventional methods like robberies, charities, and courier services to fund their activities; today terrorists are able to utilize modern methods in financing their activities due to the rapid development in financial technology nowadays; one example is by hacking an illegal Fintech Company. Therefore, this research is conducted in order to explain and analyze the consideration behind the usage of an illegal fintech company to finance terrorism activities and how to prevent it. The analysis in this research is done by using the theory that is coined by Michael Freeman about the reasoning of terrorists when choosing their financing method. The method used in this research is a case study, and the case that is used for this research is the terrorism financing hacking of speedline.com in 2011 by Rizki Gunawan. Research data are acquired from interviews with the perpetrators, experts from INTRAC (PPATK), Special Detachment 88, reports, and journals that are relevant to the research. As a result, this study found that the priority aspects in terms of terrorist financing are security, quantity, and simplicity while obtaining funds. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fintech" title="Fintech">Fintech</a>, <a href="https://publications.waset.org/abstracts/search?q=illegal" title=" illegal"> illegal</a>, <a href="https://publications.waset.org/abstracts/search?q=Indonesia" title=" Indonesia"> Indonesia</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism%20financing" title=" terrorism financing"> terrorism financing</a> </p> <a href="https://publications.waset.org/abstracts/130175/terrorist-financing-through-ilegal-fintech-hacking-case-study-of-rizki-gunawan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130175.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">815</span> ‘Ethical Relativism’ in Offshore Business: A Critical Assessment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Biswanath%20Swain">Biswanath Swain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ethical relativism, as an ethical perspective, holds that moral worth of a course of action is dependent on a particular space and time. Moral rightness or wrongness of a course of action varies from space to space and from time to time. In short, ethical relativism holds that morality is relative to the context. If we reflect conscientiously on the scope of this perspective, we will find that it is wide-spread amongst the marketers involved in the offshore business. However, the irony is that most of the marketers gone along with ethical relativism in their offshore business have been found to be unsuccessful in terms of loss in market-share and bankruptcy. The upshot is purely self-defeating in nature for the marketers. GSK in China and Nestle Maggi in India are some of the burning examples of that sort. The paper argues and recommends that a marketer, as an alternative, should have recourse to Kantian ethical perspective to deliberate courses of action sensitive to offshore business as Kantian ethical perspective is logically and methodologically sound in nature. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business" title="business">business</a>, <a href="https://publications.waset.org/abstracts/search?q=course%20of%20action" title=" course of action"> course of action</a>, <a href="https://publications.waset.org/abstracts/search?q=Kant" title=" Kant"> Kant</a>, <a href="https://publications.waset.org/abstracts/search?q=morality" title=" morality"> morality</a>, <a href="https://publications.waset.org/abstracts/search?q=offshore" title=" offshore"> offshore</a>, <a href="https://publications.waset.org/abstracts/search?q=relativism" title=" relativism"> relativism</a> </p> <a href="https://publications.waset.org/abstracts/56151/ethical-relativism-in-offshore-business-a-critical-assessment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56151.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">303</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">814</span> Ethical and Personality Factors and Accounting Professional Judgement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shannon%20Hashemi">Shannon Hashemi</a>, <a href="https://publications.waset.org/abstracts/search?q=Alireza%20Daneshfar"> Alireza Daneshfar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Accounting ethical awareness has been widely promoted in recent years both in academia and in practice. However, the effectiveness of ethical awareness on accountants' judgment and choice of action is still debatable. This study investigates whether Machiavellianism and gender, as significant personality factors, influence the effect of ethical awareness on accountants' decision-making. Using an experiment, the results of ANOVA tests show that although introducing ethical awareness positively influences the accountants' judgment and choice of action, such an effect is significantly moderated by the accountants' Machiavellianism score and gender. Specifically, the test results show that the effect of introducing ethical awareness was higher on males with low Machiavellian score. The results also show that when the Machiavellian scores were high, the effect of ethical awareness was lower for both males and females. Applications of the results are discussed for accounting professionals as well as accounting ethics educators and researchers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethical%20awareness" title="ethical awareness">ethical awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=accounting%20decision%20making" title=" accounting decision making"> accounting decision making</a>, <a href="https://publications.waset.org/abstracts/search?q=Machiavellianism" title=" Machiavellianism"> Machiavellianism</a>, <a href="https://publications.waset.org/abstracts/search?q=ANOVA" title=" ANOVA"> ANOVA</a>, <a href="https://publications.waset.org/abstracts/search?q=ethics" title=" ethics"> ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=accounting%20education" title=" accounting education"> accounting education</a> </p> <a href="https://publications.waset.org/abstracts/150345/ethical-and-personality-factors-and-accounting-professional-judgement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150345.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">114</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">813</span> Ethical Leadership: A Theological and Ethical Alternative to the Culture of Greed in South African Government</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mookgo%20Solomon%20Kgatle">Mookgo Solomon Kgatle</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introductory Statement: The effect of corruption in South Africa has seriously constrained development of the national economy and has significantly inhibited good governance in the country. The significance of this paper is a demonstration that Corruption in a South African government is greatly influenced by the culture of greed by leaders in government. Many leaders in government are not satisfied with what they receive on monthly basis in the form of salaries and allowances. Thus, the quest to accumulate, as many material possessions by cabinet ministers and public servants is what is crippling the annual budget and disadvantaging the poor masses of our people including women, children and the elderly. Basic Methodology: In order to deal with this dilemma, this paper proposes ethical leadership as a theological and ethical alternative and antidote to the culture of greed in government. Research Findings: Ethical leadership is proposed because unlike the culture of greed, it is a leadership that is based on respect for ethical principles and standards and for the dignity and privileges of others. Ethical leadership is synonymous with principles like trust, morality, consideration, equality, and justice. Conclusion: The conclusion is that ethical leadership is one of the solutions that can assist the South African government to deal with the root causes of corruption, that is, the culture of greed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethical%20leadership" title="ethical leadership">ethical leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=theological%20ethics" title=" theological ethics"> theological ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=culture%20of%20greed" title=" culture of greed"> culture of greed</a>, <a href="https://publications.waset.org/abstracts/search?q=corruption" title=" corruption"> corruption</a>, <a href="https://publications.waset.org/abstracts/search?q=governance" title=" governance"> governance</a> </p> <a href="https://publications.waset.org/abstracts/100494/ethical-leadership-a-theological-and-ethical-alternative-to-the-culture-of-greed-in-south-african-government" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/100494.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">186</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">812</span> Engineering the Human Mind: Social Engineering Attack Using Kali Linux</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joy%20Winston%20James">Joy Winston James</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdul%20Kadher%20Jilani"> Abdul Kadher Jilani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pen%20testing" title="pen testing">pen testing</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Kali%20Linux" title=" Kali Linux"> Kali Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20engineering" title=" social engineering"> social engineering</a> </p> <a href="https://publications.waset.org/abstracts/166413/engineering-the-human-mind-social-engineering-attack-using-kali-linux" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166413.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">811</span> Moral Identity and Moral Attentiveness as Predictors of Ethical Leadership in Financial Sector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pilar%20Gamarra%20Gamarra">Pilar Gamarra Gamarra</a>, <a href="https://publications.waset.org/abstracts/search?q=Michele%20Girotto"> Michele Girotto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the expanding field of leaders’ ethical behavior research, little attention has been paid to the association between finance leaders’ ethical traits (beyond personality) and ethical leadership, and more importantly, how these ethical characteristics can be predictors of ethical behavior at the leadership level in the financial sector. In this study, we tested a theoretical model based on uponsocial cognitive theory (Bandura, 1986) and the cognitive-developmental model (Piaget, 1932) to examine leaders’ moral identity and moral attentiveness as antecedents of ethical leadership. After the 2008 economic crisis, the marketplace has awakened to the potential dangers of unethical behavior. The unethical behavior of the leaders of the financial sector was identified as guilty of this economic catastrophe. For that reason, it seems increasingly prudent for organizations to have leaders who are cognitively inclined toward ethical behavior. This evidence suggests that moral attentiveness and moral identity is perhaps one way of identifying those kinds of leaders. For leaders who are morally attentive and have a high moral identity, themes of ethics interventions are consistent with their way of seeing the word. As a result, these leaders could become critical components of change in organizations and could provide the energy and skills necessary for these efforts to be successful. Ethical behavior of leader from the financial sector and marketing sectors must be joined to manage the change. In this study, a leader’s moral identity, leader’s moral attentiveness, and self-importance of Ethical Leadership are measured for financial and marketing leaders to be compared to determine the relationship between the three variables in each sector. Other conclusion related to gender, educational level or generation are obtained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethical%20leadership" title="ethical leadership">ethical leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=moral%20identity" title=" moral identity"> moral identity</a>, <a href="https://publications.waset.org/abstracts/search?q=moral%20attentiveness" title=" moral attentiveness"> moral attentiveness</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20leaders" title=" financial leaders"> financial leaders</a>, <a href="https://publications.waset.org/abstracts/search?q=marketing%20leaders" title=" marketing leaders"> marketing leaders</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20behavior" title=" ethical behavior"> ethical behavior</a> </p> <a href="https://publications.waset.org/abstracts/142171/moral-identity-and-moral-attentiveness-as-predictors-of-ethical-leadership-in-financial-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142171.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">175</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">810</span> Understanding the Basics of Information Security: An Act of Defense</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sharon%20Q.%20Yang">Sharon Q. Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Robert%20J.%20Congleton"> Robert J. Congleton</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybercrimes" title="cybercrimes">cybercrimes</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking%20technologies" title=" hacking technologies"> hacking technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=higher%20education" title=" higher education"> higher education</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=libraries" title=" libraries"> libraries</a> </p> <a href="https://publications.waset.org/abstracts/131942/understanding-the-basics-of-information-security-an-act-of-defense" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131942.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">809</span> The Developmental of Ethical Behavior of Nursing Students in Borommarajonani College of Nursing, Suratthani, Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ubonrattan%20Phophatanachai">Ubonrattan Phophatanachai</a>, <a href="https://publications.waset.org/abstracts/search?q=Phensri%20Thongphet"> Phensri Thongphet</a>, <a href="https://publications.waset.org/abstracts/search?q=Weerawan%20Kerdtong"> Weerawan Kerdtong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purposes of this study were to compare the ethical behavior regarding responsibility and polite manners of nursing students of Boromarajonani College of Nursing, Suratthani, Thailand before and after providing the activity session of ethical behavior development. The samples consisted of 103 sophomores in the academic year 2006. The tools were tested for reliability and content validity. The reliability of the Ethical Behavior Questionnaire measured by Cronbach’s alpha coefficient was 0.94. Data were analyzed using means, standard deviations, and dependent t-test. The findings were as follows: a) after the activity session, the mean scores of ethical behavior regarding responsibility and polite manners of nursing students increased from middle level to high level; b) mean scores of responsibilities and polite manners after the activity session were significantly higher than those before the session (t =28.36, p < .001; t =23.9, p < .001, respectively). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=development%20of%20ethical%20behavior" title="development of ethical behavior">development of ethical behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=nursing%20students" title=" nursing students"> nursing students</a>, <a href="https://publications.waset.org/abstracts/search?q=health" title=" health"> health</a>, <a href="https://publications.waset.org/abstracts/search?q=nursing%20informatics" title=" nursing informatics"> nursing informatics</a> </p> <a href="https://publications.waset.org/abstracts/4362/the-developmental-of-ethical-behavior-of-nursing-students-in-borommarajonani-college-of-nursing-suratthani-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4362.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">808</span> The Ethical and Social Implications of Using AI in Healthcare: A Literature Review</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Deepak%20Singh">Deepak Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> AI technology is rapidly being integrated into the healthcare system, bringing many ethical and social implications. This literature review examines the various aspects of this phenomenon, focusing on the ethical considerations of using AI in healthcare, such as how it might affect patient autonomy, privacy, and doctor-patient relationships. Furthermore, the review considers the potential social implications of AI in Healthcare, such as the potential for automation to reduce the availability of healthcare jobs and the potential to widen existing health inequalities. The literature suggests potential benefits and drawbacks to using AI in healthcare, and it is essential to consider the ethical and social implications before implementation. It is concluded that more research is needed to understand the full implications of using AI in healthcare and that ethical regulations must be in place to ensure patient safety and the technology's responsible use. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AI" title="AI">AI</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=telemedicine" title=" telemedicine"> telemedicine</a>, <a href="https://publications.waset.org/abstracts/search?q=telehealth" title=" telehealth"> telehealth</a>, <a href="https://publications.waset.org/abstracts/search?q=ethics" title=" ethics"> ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=patient" title=" patient"> patient</a>, <a href="https://publications.waset.org/abstracts/search?q=rights" title=" rights"> rights</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a> </p> <a href="https://publications.waset.org/abstracts/167013/the-ethical-and-social-implications-of-using-ai-in-healthcare-a-literature-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167013.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">807</span> Teaching Ethical Behaviour: Conversational Analysis in Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nikhil%20Kewalkrishna%20Mehta">Nikhil Kewalkrishna Mehta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the past researchers have questioned the effectiveness of ethics training in higher education. Also, there are observations that support the view that ethical behaviour (range of actions)/ethical decision making models used in the past make use of vignettes to explain ethical behaviour. The understanding remains in the perspective that these vignettes play a limited role in determining individual intentions and not actions. Some authors have also agreed that there are possibilities of differences in one’s intentions and actions. This paper makes an attempt to fill those gaps by evaluating real actions rather than intentions. In a way this study suggests the use of an experiential methodology to explore Berlo’s model of communication as an action along with orchestration of various principles. To this endeavor, an attempt was made to use conversational analysis in the pursuance of evaluating ethical decision making behaviour among students and middle level managers. The process was repeated six times with the set of an average of 15 participants. Similarities have been observed in the behaviour of students and middle level managers that calls for understanding that both the groups of individuals have no cognizance of their actual actions. The deliberations derived out of conversation were taken a step forward for meta-ethical evaluations to portray a clear picture of ethical behaviour among participants. This study provides insights for understanding demonstrated unconscious human behaviour which may fortuitously be termed both ethical and unethical. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethical%20behaviour" title="ethical behaviour">ethical behaviour</a>, <a href="https://publications.waset.org/abstracts/search?q=unethical%20behavior" title=" unethical behavior"> unethical behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20decision%20making" title=" ethical decision making"> ethical decision making</a>, <a href="https://publications.waset.org/abstracts/search?q=intentions%20and%20actions" title=" intentions and actions"> intentions and actions</a>, <a href="https://publications.waset.org/abstracts/search?q=conversational%20analysis" title=" conversational analysis"> conversational analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20actions" title=" human actions"> human actions</a>, <a href="https://publications.waset.org/abstracts/search?q=sensitivity" title=" sensitivity"> sensitivity</a> </p> <a href="https://publications.waset.org/abstracts/15197/teaching-ethical-behaviour-conversational-analysis-in-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15197.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">249</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">806</span> Ethical Leadership Mediates Subordinates’ Likeness for Leader and Affective Commitment to Squads among Police Cadets</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Odunayo%20O.%20Oluwafemi">Odunayo O. Oluwafemi</a>, <a href="https://publications.waset.org/abstracts/search?q=Valentine%20A.%20Mebu"> Valentine A. Mebu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There is a blur as to whether subordinates’ sheer fondness for a leader or the ethical behaviours demonstrated by such a leader is what engenders subordinates’ affective commitment to the group. This study aimed to depict and clarify that perceived ethical leadership by subordinates outweighs their likeness for a leader in determining their level of affective commitment to the group using a sample of police cadets. Subordinate cadets were asked to rate the ethical leadership behaviours displayed by their cadet Leaders; their likeness for their leaders and also rate their own affective commitment to their squads (N = 252, Mean Age = 22.70, Age range = 17 to 29 years, SD = 2.264, 75% males). A mediation analysis was conducted to test hypotheses. Results showed that there was a significant indirect effect between likeness for leaders and affective commitment through ethical leadership behaviour (b = .734, 95% BCa CI [.413, 1.146], p = .000); and a nonsignificant direct effect between likeness for leader and subordinates’ affective commitment (b = .526, 95% BCa CI [-.106, 1.157], p = .10), this indicated a full mediation. The results strongly suggested that the positive relationship between subordinates’ likeness for their leaders and their affective commitment to the squad is produced by perceived leaders’ ethical behaviours. Therefore, leaders should exhibit and prioritize ethical behaviours over the need to be liked by their subordinates to guarantee their affective commitment to group goals and aspirations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=affective%20commitment" title="affective commitment">affective commitment</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20leadership" title=" ethical leadership"> ethical leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=leader%20cadets" title=" leader cadets"> leader cadets</a>, <a href="https://publications.waset.org/abstracts/search?q=likeness%20for%20leader" title=" likeness for leader"> likeness for leader</a>, <a href="https://publications.waset.org/abstracts/search?q=subordinate%20cadets" title=" subordinate cadets"> subordinate cadets</a> </p> <a href="https://publications.waset.org/abstracts/121986/ethical-leadership-mediates-subordinates-likeness-for-leader-and-affective-commitment-to-squads-among-police-cadets" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/121986.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">179</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">805</span> Ethical Finance and Islamic Finance: Particularities, Possible Convergence and Potential Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Safa%20Ougoujil">Safa Ougoujil</a>, <a href="https://publications.waset.org/abstracts/search?q=Sidi%20Mohamed%20Rigar"> Sidi Mohamed Rigar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Economics is not an exact science. It cannot be from the moment it is a social science that concerns society organization, a human science that depends on the behavior of the men and women who make a part of this society. Therefore, it cannot ignore morality, the instinctive sense of good and evil, the natural order which place us between certain values, and which religion often sheds light on. In terms of finance, the reference to ethics is becoming more popular than ever. This is naturally due to the growing financial crises. Finance is less and less ethical, but some financial practices have continued to do so. This is the case of ethical finance and Islamic finance. After attempting to define the concepts of ethical finance and Islamic finance, in a period when financial innovation seeks to encourage differentiation in order to create more profit margins, this article attempts to expose the particularities, the convergences and the potentialities of development of these two sensibilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=convergences" title="convergences">convergences</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20finance" title=" ethical finance"> ethical finance</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20finance" title=" Islamic finance"> Islamic finance</a>, <a href="https://publications.waset.org/abstracts/search?q=potential%20development" title=" potential development"> potential development</a> </p> <a href="https://publications.waset.org/abstracts/81381/ethical-finance-and-islamic-finance-particularities-possible-convergence-and-potential-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81381.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">194</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">804</span> The Relationship between Citizens’ Perception of Public Officials’ Ethical Performance and Public Trust in the Government in Egypt</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nevine%20Henry%20Wasef">Nevine Henry Wasef</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The research discusses how Egyptian citizens perceive the performance of public sector officials, particularly the ethical values manifested in their behavior. It aims at answering the question of how Egyptian citizens’ perception of public officials affects citizens' trust in the government at large and the process of public service delivery specifically. The hypothesis is that public opinion about civil servants’ ethical values would be proportional to citizens’ trust in the government, which means that the more citizens regard administrators with high ethical standards, the higher trust in the government they would have and vice versa. The research would focus on the independent variable of trust in the government and the dependent variable of public perception of administrators’ ethical performance. The data would be collected through surveys designed to measure the public evaluation of public officials they are interacting with and the quality of services delivered to them. The study concludes that implementing ethical values in public administration has a crucial role in improving citizens’ trust in the government based on various case studies of governments that successfully adopted ethical training programs for their civil servants. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=trust" title="trust">trust</a>, <a href="https://publications.waset.org/abstracts/search?q=distrust" title=" distrust"> distrust</a>, <a href="https://publications.waset.org/abstracts/search?q=ethics" title=" ethics"> ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a>, <a href="https://publications.waset.org/abstracts/search?q=integrity" title=" integrity"> integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=values" title=" values"> values</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20service" title=" public service"> public service</a> </p> <a href="https://publications.waset.org/abstracts/167558/the-relationship-between-citizens-perception-of-public-officials-ethical-performance-and-public-trust-in-the-government-in-egypt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167558.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">88</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">803</span> Students’ Notions About Bioethical Issues - A Comparative Study in Indian Subcontinent</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Astha%20Saxena">Astha Saxena</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present study is based in Indian subcontinent and aims at exploring students’ conceptions about ethical issues related to Biotechnology at both high school and undergraduate level. The data collection methods involved taking classroom notes, recording students’ observations and arguments, and focussed group discussions with students. The data was analysed using classroom discourse analysis and interpretive approaches. The findings depicted different aspects of students’ thinking, meaning making and ethical understanding with respect to complex bioethical issues such as genetically modified crops, in-vitro fertilization (IVF), human genomic project, cloning, etc., at high school as well as undergraduate level. The paper offers a comparative account of students’ arguments with respect to ethical issues in biotechnology at the high school & undergraduate level, where it shows a clear gradation in their ethical understanding from high school to undergraduate level, which can be attributed to their enhanced subject-matter knowledge. The nature of students’ arguments reveal that there is more reliance on the utilitarian aspect of these biotechnologies as against a holistic understanding about a particular bioethical issue. This study has implications for science teachers to delve into students’ thinking and notions about ethical issues in biotechnology and accordingly design appropriate pedagogical approaches. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethical%20issues" title="ethical issues">ethical issues</a>, <a href="https://publications.waset.org/abstracts/search?q=biotechnology" title=" biotechnology"> biotechnology</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20understanding" title=" ethical understanding"> ethical understanding</a>, <a href="https://publications.waset.org/abstracts/search?q=argument" title=" argument"> argument</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20reasoning" title=" ethical reasoning"> ethical reasoning</a>, <a href="https://publications.waset.org/abstracts/search?q=pedagogy" title=" pedagogy"> pedagogy</a> </p> <a href="https://publications.waset.org/abstracts/165215/students-notions-about-bioethical-issues-a-comparative-study-in-indian-subcontinent" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165215.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">80</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">802</span> Ethical Leadership and Individual Creativity: The Mediating Role of Psychological Safety</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hyeondal%20Jeong">Hyeondal Jeong</a>, <a href="https://publications.waset.org/abstracts/search?q=Yoonjung%20Baek"> Yoonjung Baek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study examines the relationship between ethical leadership and individual creativity and focused on mediating effects of psychological safety. In order to clarify the mechanism of ethical leadership, psychological safety of the members was set as a mediator. Using data gathered from a sample of 150 employees. For data analysis, exploratory factor analysis, correlation analysis, hierarchical regression analysis and Sobel-Test were performed. The results showed that ethical leadership had a positive effect on psychological safety and individual creativity, and psychological safety had a positive mediating effect. Since the mediating effect of psychological safety has been confirmed, we need to find ways to improve the psychological safety of the members in terms of organizational management. Psychological safety has a positive effect on individual creativity, which can have a positive impact on innovation throughout the organization. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethical%20leadership" title="ethical leadership">ethical leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=creativity" title=" creativity"> creativity</a>, <a href="https://publications.waset.org/abstracts/search?q=psychological%20safety" title=" psychological safety"> psychological safety</a>, <a href="https://publications.waset.org/abstracts/search?q=ethics%20management" title=" ethics management"> ethics management</a>, <a href="https://publications.waset.org/abstracts/search?q=innovative%20behaviors" title=" innovative behaviors"> innovative behaviors</a> </p> <a href="https://publications.waset.org/abstracts/86913/ethical-leadership-and-individual-creativity-the-mediating-role-of-psychological-safety" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86913.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">249</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">801</span> Corporate Governance and Business Ethical Values in Organisation: AStudyof Unilag Holdings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aribisala%20Oluwadamilare%20Olufolarin">Aribisala Oluwadamilare Olufolarin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objective of this research was to examine how corporate governance and ethical business values impact both the performance of the organization and its employees, as it is essential for any organization to uphold good ethics and corporate governance. The study was conducted at Unilag Holdings Limited (UniHOLDs) to demonstrate that organizations may experience losses if they do not have proper corporate governance and business ethical values in place. The employees' perception of corporate governance and ethics is crucial for the organization. The research indicated a connection between corporate governance and business ethics values, and therefore, correlation analysis was utilized, making it statistically reliable. The results of the test show a strong positive correlation (r=.812, N=94, P<.01) between corporate governance and business ethical values. A questionnaire was distributed to employees at Unilag Holdings Limited (UniHOLDs), with 94 out of 130 completed and returned. The findings indicate that ethical values contribute to employee productivity, and productive employees have a beneficial impact on the organization's performance. Additionally, the study revealed that employees tend to adhere to rules regardless of their ethical nature. To address this, the organization should ensure that top-level managers do not assign unethical tasks to their subordinates. The study recommends that the organization should consistently practice corporate governance and business ethics. The company needs to make sure that its stakeholders continue to support its way of doing things. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business%20ethics" title="business ethics">business ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20ethical%20values" title=" business ethical values"> business ethical values</a>, <a href="https://publications.waset.org/abstracts/search?q=corporate%20governance" title=" corporate governance"> corporate governance</a>, <a href="https://publications.waset.org/abstracts/search?q=organization" title=" organization"> organization</a> </p> <a href="https://publications.waset.org/abstracts/194658/corporate-governance-and-business-ethical-values-in-organisation-astudyof-unilag-holdings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194658.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">10</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">800</span> Corporate Governance and Business Ethical Values in Organisation: A Study of Unilag Holdings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aribisala%20Oluwadamilare%20Olufolarin">Aribisala Oluwadamilare Olufolarin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objective of this research was to examine how corporate governance and ethical business values impact both the performance of the organization and its employees, as it is essential for any organization to uphold good ethics and corporate governance. The study was conducted at Unilag Holdings Limited (UniHOLDs) to demonstrate that organizations may experience losses if they do not have proper corporate governance and business ethical values in place. The employees' perception of corporate governance and ethics is crucial for the organization. The research indicated a connection between corporate governance and business ethics values, and therefore, correlation analysis was utilized, making it statistically reliable. The results of the test show a strong positive correlation (r=.812, N=94, P<.01) between corporate governance and business ethical values. A questionnaire was distributed to employees at Unilag Holdings Limited (UniHOLDs), with 94 out of 130 completed and returned. The findings indicate that ethical values contribute to employee productivity, and productive employees have a beneficial impact on the organization's performance. Additionally, the study revealed that employees tend to adhere to rules regardless of their ethical nature. To address this, the organization should ensure that top-level managers do not assign unethical tasks to their subordinates. The study recommends that the organization should consistently practice corporate governance and business ethics. The company needs to make sure that its stakeholders continue to support its way of doing things. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business%20ethics" title="business ethics">business ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20ethical%20values" title=" business ethical values"> business ethical values</a>, <a href="https://publications.waset.org/abstracts/search?q=corporate%20governance%20and%20organization" title=" corporate governance and organization"> corporate governance and organization</a>, <a href="https://publications.waset.org/abstracts/search?q=corporate%20governance" title=" corporate governance"> corporate governance</a> </p> <a href="https://publications.waset.org/abstracts/194776/corporate-governance-and-business-ethical-values-in-organisation-a-study-of-unilag-holdings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194776.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">9</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">799</span> The Reality of Ethical Finance in Algerian Commercial Banks: A Case Study of a Sample of Banking Agencies in Bordj Bou Arreridj and the Setif States</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asma%20Righi">Asma Righi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After the global financial crisis of 2008, interest in ethical economics increased, particularly in the field of finance in general and commercial banks in particular. Indeed, it has become imperative for them to move from an institution that aims to make a profit to a community partner that takes the environmental aspect into account in its funding, rationalizes its decisions and adheres to ethics in its dealings. This leads it to the need of adopting the concept of ethical finance and standing on its most important principles and dimensions to realize profits on the one hand and to serve its society and its economy on the other hand. The objective of this research is centered on knowing the reality of the Algerian commercial banks’ adoption of the dimensions and principles of ethical finance. The quantitative methodology used is based on a questionnaire survey of twenty-four banking agencies in the states of Bordj Bou Arreridj and Setif. The data obtained were processed using the Statistical Package for the Social Sciences (SPSS) program. This research led to two main results: first, the author observed a limited application of the principles of ethical finance in commercial banks active in Algeria. This application is particularly in line with the implementation of the directives of the Central Bank and the imposed monetary policy. Second, the results showed that there is a significant difference in the application of ethical financial dimensions and principles between government and foreign banks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Algerian%20commercial%20banks" title="Algerian commercial banks">Algerian commercial banks</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20banking" title=" ethical banking"> ethical banking</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20finance" title=" ethical finance"> ethical finance</a>, <a href="https://publications.waset.org/abstracts/search?q=socially%20responsible%20investment" title=" socially responsible investment"> socially responsible investment</a> </p> <a href="https://publications.waset.org/abstracts/142093/the-reality-of-ethical-finance-in-algerian-commercial-banks-a-case-study-of-a-sample-of-banking-agencies-in-bordj-bou-arreridj-and-the-setif-states" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142093.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">798</span> Corporate Governance and Business Ethical Values in Organisation: A Study of Unilag Holdings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ogunmayi%20Bamidele">Ogunmayi Bamidele</a>, <a href="https://publications.waset.org/abstracts/search?q=Aribisala%20Oluwadamilare%20Olufolarin"> Aribisala Oluwadamilare Olufolarin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objective of this research was to examine how corporate governance and ethical business values impact both the performance of the organization and its employees, as it is essential for any organization to uphold good ethics and corporate governance. The study was conducted at Unilag Holdings Limited (UniHOLDs) to demonstrate that organizations may experience losses if they do not have proper corporate governance and business ethical values in place. The employees' perception of corporate governance and ethics is crucial for the organization. The research indicated a connection between corporate governance and business ethics values, and therefore, correlation analysis was utilized, making it statistically reliable. The results of the test show a strong positive correlation (r=.812, N=94, P<.01) between corporate governance and business ethical values. A questionnaire was distributed to employees at Unilag Holdings Limited (UniHOLDs), with 94 out of 130 completed and returned. The findings indicate that ethical values contribute to employee productivity, and productive employees have a beneficial impact on the organization's performance. Additionally, the study revealed that employees tend to adhere to rules regardless of their ethical nature. To address this, the organization should ensure that top-level managers do not assign unethical tasks to their subordinates. The study recommends that the organization should consistently practice corporate governance and business ethics. The company needs to make sure that its stakeholders continue to support its way of doing things. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business%20ethical%20values" title="business ethical values">business ethical values</a>, <a href="https://publications.waset.org/abstracts/search?q=corporate%20governance" title=" corporate governance"> corporate governance</a>, <a href="https://publications.waset.org/abstracts/search?q=organization" title=" organization"> organization</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20ethics" title=" business ethics"> business ethics</a> </p> <a href="https://publications.waset.org/abstracts/191900/corporate-governance-and-business-ethical-values-in-organisation-a-study-of-unilag-holdings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191900.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">16</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">797</span> Social Media and Counseling: Opportunities, Risks and Ethical Considerations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kyriaki%20G.%20Giota">Kyriaki G. Giota</a>, <a href="https://publications.waset.org/abstracts/search?q=George%20Kleftaras"> George Kleftaras</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this article is to briefly review the opportunities that social media presents to counselors and psychologists. Particular attention was given to understanding some of the more important common risks inherent in social media and the potential ethical dilemmas which may arise for counselors and psychologists who embrace them in their practice. Key considerations of issues pertinent to an online presence such as multiple relationships, visibility and privacy, maintaining ethical principles and professional boundaries are being discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20media" title="social media">social media</a>, <a href="https://publications.waset.org/abstracts/search?q=counseling" title=" counseling"> counseling</a>, <a href="https://publications.waset.org/abstracts/search?q=risks" title=" risks"> risks</a>, <a href="https://publications.waset.org/abstracts/search?q=ethics" title=" ethics"> ethics</a> </p> <a href="https://publications.waset.org/abstracts/11221/social-media-and-counseling-opportunities-risks-and-ethical-considerations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11221.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">425</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">796</span> A Cross-Cultural Analysis of Ethical Standards in Social and Behavioral Research</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiwu%20Feng">Xiwu Feng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper is to analyze research ethics in social and behavioral sciences from a cross-cultural perspective. A multi-phase study investigated implementations of ethical standards and guidelines in higher institutions in China. Institutional policies and procedures on human subject research and perceptions of human subject protection were assessed in the Chinese research universities from different regions. The findings of the study indicate that the implementations of ethical standards and guidelines vary from institution to institution and from region to region. Education and cultural backgrounds of the participants influence their perceptions of the welfare and privacy of human subjects. The results of the study reveal great differences and complexities in ethical standards for the protection of human subjects of research in contrast to the Western world. The Chinese collectivistic values and the cooperative-harmonious democracy play a significant role in perceiving and implementing ethical guidelines. Chinese researchers find themselves a long way to go before seeing implementations of regulations and guidelines on human subject research in social and behavioral sciences. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethical%20standards" title="ethical standards">ethical standards</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20subjects" title=" human subjects"> human subjects</a>, <a href="https://publications.waset.org/abstracts/search?q=research%20ethics" title=" research ethics"> research ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20and%20behavioral%20research" title=" social and behavioral research"> social and behavioral research</a> </p> <a href="https://publications.waset.org/abstracts/97181/a-cross-cultural-analysis-of-ethical-standards-in-social-and-behavioral-research" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97181.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">197</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">795</span> The Contribution of Buddhist-Based Mindfulness Practices on Ethical Leadership: A Qualitative Study of Organizational Leaders in Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kunkanit%20Sutamchai">Kunkanit Sutamchai</a>, <a href="https://publications.waset.org/abstracts/search?q=Kate%20E.%20Rowlands"> Kate E. Rowlands</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recent public ethical scandals in many organizations around the world have raised concern about organizational ethics, which have, in turn, made ethical behaviors and conducts on the part of leaders become more critical topics in organizational studies. However, current research on the benefits of mindfulness within the workplace contexts has predominantly focused on stress reduction and work performance enhancement, while the aspects of ethical behavior development have been far less investigated in mindfulness research in the organizational and management fields. Only recently has there been an emerging call for organizational researchers and practitioners to study mindfulness concepts and practices from the original Buddhist perspectives given that ethics is regarded as a foundation for Buddhist mindfulness. Yet little, if any, empirical research on the contributions of mindfulness practices to ethical leadership has been done in Eastern Buddhist contexts. Therefore, this study aims to explore the extent to which and how Buddhist-based mindfulness practices can influence organizational leaders’ ethical values and practices. On this basis, Thailand was selected as a context of study due to a predominantly Buddhist society and culture. Qualitative data were gathered through in-depth semi-structured interviews with twenty executive leaders from various private organizations in Thailand, who practice Buddhist-based mindfulness meditation regularly. The findings from this study shed light on the role Buddhist-based mindfulness practices can play in promoting ethical behavior among executive leaders in Thailand. The results also suggest that ethical values and practices influenced by Buddhist-based mindfulness practices are well aligned with the elements appeared in the inter-disciplinary and cross-cultural ethical leadership framework, namely: humane, justice, sustainability and responsibility, and moderation. This study concludes that the integration of ethical dimensions to mindfulness practices may provide promising opportunities for ethical leadership development, particularly in the context of Thailand. This could contribute significantly to the future development of both organizations and society at large. The study also suggests that mindfulness interventions in organizational contexts should place more explicit emphasis on ethics. This may be done by relating the ethical principles underlying Buddhist-based mindfulness to other ethical systems in different contexts and cultures where they can be aligned. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Buddhism" title="Buddhism">Buddhism</a>, <a href="https://publications.waset.org/abstracts/search?q=ethical%20leadership" title=" ethical leadership"> ethical leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership%20development" title=" leadership development"> leadership development</a>, <a href="https://publications.waset.org/abstracts/search?q=mindfulness" title=" mindfulness"> mindfulness</a>, <a href="https://publications.waset.org/abstracts/search?q=Thailand" title=" Thailand"> Thailand</a>, <a href="https://publications.waset.org/abstracts/search?q=training" title=" training"> training</a> </p> <a href="https://publications.waset.org/abstracts/112860/the-contribution-of-buddhist-based-mindfulness-practices-on-ethical-leadership-a-qualitative-study-of-organizational-leaders-in-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/112860.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">171</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=ethical%20hacking&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=ethical%20hacking&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=ethical%20hacking&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=ethical%20hacking&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=ethical%20hacking&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=ethical%20hacking&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=ethical%20hacking&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=ethical%20hacking&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=ethical%20hacking&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=ethical%20hacking&page=27">27</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=ethical%20hacking&page=28">28</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=ethical%20hacking&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>