Chapter 8- 1 Chapter 8


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Chapter 8- 1 Chapter 8

  1. 1. Business and Society: Ethics and Stakeholder Management, 6e • Carroll & Buchholtz Copyright ©2006 by South-Western, a division of Thomson Learning.  All rights reserved Prepared by Deborah Baker Texas Christian University <ul><li>BUSINESS ETHICS and TECHNOLOGY </li></ul>Chapter 8 BUSINESS & SOCIETY Ethics and Stakeholder Management Carroll & Buchholtz 6e
  2. 2. Benefits of Technology <ul><li>Human labor easier & safer </li></ul><ul><li>Increased productivity </li></ul><ul><li>Increased standard of living </li></ul><ul><ul><ul><li>Raised life expectancy </li></ul></ul></ul>
  3. 3. Side Effects of Technology <ul><li>Environmental pollution </li></ul><ul><li>Depletion of natural resources </li></ul><ul><li>Technological unemployment </li></ul><ul><li>Creation of unsatisfying jobs </li></ul><ul><ul><li>Example: Automobile 1900 </li></ul></ul>
  4. 4. Ethics and Technology Key Issues Technological Determinism “ What can be developed will be developed” (without consideration for ethics or side effects) Ethical Lag Speed of T. change exceeds speed of ethical development
  5. 5. Business Ethics & Technology Biotechnology E-Commerce Computer technology in the workplace Information Technology
  6. 6. Issues in E- Commerce Technology <ul><li>Access (rich vs. poor) </li></ul><ul><li>Downloading intellectual property </li></ul><ul><li>Invasion of privacy* </li></ul><ul><li>Protection of children </li></ul><ul><li>Security of personal information </li></ul><ul><li>Unsolicited ads </li></ul><ul><li>Who do we trust (online scams ) ? </li></ul>
  7. 7. Invasion of Privacy (via Internet) <ul><li>Identity theft </li></ul><ul><li>Unintentionally revealing information </li></ul><ul><li>Fake Web sites </li></ul><ul><li>Access to & distribution of information </li></ul><ul><ul><ul><li>Article on hospitals accessing credit reports </li></ul></ul></ul><ul><li>Victim of spying (employer, spouse, hackers) </li></ul><ul><li>Cyberstalking </li></ul><ul><li>Sales/ sharing of customer databases . </li></ul>
  8. 8. <ul><li>The Financial Services Modernization Act of 1999 </li></ul><ul><ul><li>Allowed banks, insurers, brokers to join forces so consumer can get all services from one company </li></ul></ul><ul><ul><li>Convenient but… </li></ul></ul><ul><ul><li>We used to have to “opt in” to have personal information used for purposes other than original intent </li></ul></ul><ul><ul><li>Now we have to “opt out” </li></ul></ul><ul><ul><ul><li>(business lobbyists pushed for this). </li></ul></ul></ul>Government’s Involvement
  9. 9. Proposed legislation to Protect Consumer Privacy <ul><ul><li>Consumer Online Privacy and Disclosure Act </li></ul></ul><ul><ul><li>Online Consumer Protection Act of 2001 </li></ul></ul><ul><ul><li>Unsolicited Commercial Electronic Mail Act of 2001 </li></ul></ul><ul><ul><li>Gramm-Leach-Bliley Act </li></ul></ul><ul><ul><li>Fair Credit Reporting Act </li></ul></ul><ul><ul><li>Children’s Online Privacy Protection Act </li></ul></ul><ul><ul><li>Privacy Agenda of the FTC (creation of do-not call list, enforcement against scams, enforcement of telemarketing rules) </li></ul></ul><ul><ul><li>Ethical lag- FYI </li></ul></ul>
  10. 10. Business Efforts to Protect Privacy Ethical leadership Privacy policies (“opt-in”) <ul><li>Chief privacy officers </li></ul><ul><li>Develop Internet policies </li></ul><ul><li>Assess risk of privacy invasion </li></ul><ul><li>Handle customer complaints </li></ul><ul><li>Help firm avoid litigation </li></ul>
  11. 11. Employee Surveillance <ul><li>Monitoring: e-mail, Internet, cell phone, photocopier & fax </li></ul><ul><li>Monitoring workers via video camera (secret shoppers) </li></ul><ul><li>Online background checks </li></ul><ul><li>Tracking badges & GPS. </li></ul><ul><li>Why are we doing this? </li></ul><ul><li>Consequences? </li></ul><ul><li>Do employees have right to privacy or </li></ul><ul><li>employers a right to monitor for unethical behavior? </li></ul><ul><li>Wal-Mart article </li></ul>
  12. 12. Unethical Employee Activities <ul><li>Engaged in dangerous activities (using T. while driving) </li></ul><ul><li>Copied company software for home use </li></ul><ul><li>Revealing co. information to competitors (blogs) </li></ul><ul><li>Used office equipment to Internet shop or search for job </li></ul><ul><li>Accessed private files without permission </li></ul><ul><li>Intruded on coworkers’ privacy </li></ul><ul><li>Visited porn Web sites. </li></ul>
  13. 13. Cell Phone Issues <ul><li>Racking up billable hours </li></ul><ul><li>Use of cell phones (texting) while driving </li></ul><ul><ul><ul><li>68% of population admits it </li></ul></ul></ul><ul><ul><ul><li>Employers pressuring employees to work harder </li></ul></ul></ul><ul><ul><ul><li>Accident liability issues: Is company liable? </li></ul></ul></ul>
  14. 14. Biotechnology Bioethics Ethical issues embedded in the use of biotechnology - Hiring bioethethists Proceduralism The use of elaborate protocols to ensure that ethical dilemmas do not arise (informed consent). - “Leftover” blood use for research -Use of cadaver parts
  15. 15. Biotechnology Genetically Modified Foods Genetic Engineering
  16. 16. Ethical Issues with Genetic Engineering Stem cell research (Umbilical cord blood banks) Cloning (Technological determinism) Genetic testing & profiling (DNA chips) (Use in workplace)
  17. 17. Issues with GMFs Safety issues Are consumers informed enough? Labeling issues Mandatory GMO label? Non-GMO labels popular . @
  18. 18. <ul><li>For next class  </li></ul><ul><ul><ul><li>Read case 24: Firestone and Ford </li></ul></ul></ul><ul><ul><ul><li>What are some of the challenges multinational corporations face when they exist in less developed countries? </li></ul></ul></ul><ul><ul><ul><li>What are some of the actions (strategies) multinational corporations can take to improve international business ethics? </li></ul></ul></ul>