Read the following passage and answer the question. Managers at a New York City import-export company suspected that two employees were robbing it. Corporate Defense Strategies (CDS) of Maywood, New Jersey, advised the firm to install a software program that could secretly log every single stroke of the suspects’ computer keys and send an encrypted e-mail report to CDS. Investigators revealed that the two employees were deleting orders from the corporate books after processing them, pocketing the revenues, and building their own company from within. The programme picked up on their plan to return to the office late one night to steal a large shipment of electronics. Police hid in the rafters of the firm’s warehouse, and when the suspects entered, they were arrested. The pair was charged with embezzling 3 million over two and a half years, a sizable amount of revenue for a 25 million-a-year firm. |
The passage reveals that the firm installed a software program that could secretly log every single stroke of the suspect's computer keys. According to you, which function of management is being performed in the above paragraph? |
Planning Organising Staffing Controlling |
Controlling |
The correct answer is option 4- Controlling. This function involves monitoring and regulating organizational processes to ensure that goals are being met and to address any deviations. In the scenario described, the software program used to secretly log keystrokes and report suspicious activity is a control mechanism aimed at identifying and addressing unauthorized and unethical behavior by employees. It helps the company to detect and prevent theft and fraud, thus managing and controlling potential deviations from expected conduct. |