SlideShare a Scribd company logo
1 of 14
Chapter 8 Ethics & Technology McGraw-Hill
8-2 “Big Brother is Watching You” George Orwell, ‘1984’,  Part 1, Chapter 1
Ethics & Technology Advantages of technology in the workplace: Intranet – company’s internal website containing information for employee access only Extranet – private piece of a company’s internet network available to customers and/or vendor partners on the basis of secured password Telecommuting – ability to work outside of the office and log in to your company network 8-3
Ethics & Technology Loss of privacy Companies have ability to send customers’ personal data anywhere in the world Employee monitoring – every email sent and every website visited 8-4
The Promise of Increased Worker Productivity The Employer Position: As an employee of the organization, your allotted shift or normal work period are at the discretion of the company.  Other than lunch and any scheduled breaks, all your activity should be work-related, and any monitoring of that activity should not be regarded as an infringement of your privacy.  If you want to do something in private don’t do it at work. It is part of the organization’s obligation to its stakeholders to operate as efficiently as possible. 8-5
The Promise of Increased Worker Productivity The Employee Position: My agreement should not intrude upon my civil rights as an individual – I am an employee, not a servant.  I should be notified of any electronic surveillance and the purpose of that surveillance.  The actions of a small number of employees in breaking company rules should not be used as a justification to take away everyone’s civil rights.  Electronic monitoring implies that we can’t be trusted to do our jobs – and if you can’t trust us, why are you employing us in the first place? 8-6
When Are You “at Work”? Computer technology allows the capability of telecommuting – working from anywhere by logging into your company’s network remotely Computer and Smartphone (iPhone/Blackberry) Availability now being defined as accessibility So, does this flexibility apply to employees “at work”? 8-7
Employee Consent THIN CONSENT     If an employee receives formal notification that the company will be monitoring all email and web activity – either at the time of hire or during employment – and it is made clear in that notification that his or her continued employment with the company will be dependent on the employee’s agreement to abide by that monitoring, then the employee may be said to have given ‘thin’ consent. In other words, there are two options – agree to the monitoring or ‘pursue other employment opportunities’.  8-8
Employee Consent THICK CONSENT If employment conditions are at the other end of the scale – i.e. jobs are plentiful and the employee would have no difficulty in finding another position – then the consent given to the monitoring policy could be classified as ‘thick’ since the employee has a realistic alternative if he or she finds the policy to be unacceptable. 8-9
The Dangers of Leaving a Paper Trail Employers may be able to monitor every keystroke on computers, but the documents written on the machines do the most harm “Offensive” email postings Viewing inappropriate Web sites Internet communication: Damage from electronic trail of emails 8-10
Vicarious Liability “…a legal concept that means that a party may be held responsible for injury or damage, when in reality they were not actively involved in the incident. Parties that may be charged with vicarious liability are generally in a supervisory role over the person or parties personally responsible for the injury/damage. The implications of vicarious liability are that the party charged is responsible for the actions of their subordinates.” 8-11
“A legal concept that employers can be held liable for the actions of their employees in their Internet communications to the same degree as if those employers had written those communications on company letterhead. Cyberliability
Ten Commandments of Computer Ethics 8-13
Big Brother is in the House!     "It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen. The smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself—anything that carried with it the suggestion of abnormality, of having something to hide. In any case, to wear an improper expression on your face… was itself a punishable offense. There was even a word for it in Newspeak: facecrime…"  		George Orwell, Nineteen Eighty-Four, Book 	One,Chapter 5 8-14

More Related Content

What's hot

Marketing Management - Chapter 3
Marketing Management - Chapter 3Marketing Management - Chapter 3
Marketing Management - Chapter 3Perkha Khan
 
kotler Marketing management chapter 4.PPT
kotler Marketing management chapter 4.PPTkotler Marketing management chapter 4.PPT
kotler Marketing management chapter 4.PPTHadi Khan
 
MGMT 374 Week 5 Lecture PowerPoint
MGMT 374 Week 5 Lecture PowerPointMGMT 374 Week 5 Lecture PowerPoint
MGMT 374 Week 5 Lecture PowerPointMichael Hill
 
Marketing Management - Chapter 6
Marketing Management - Chapter 6Marketing Management - Chapter 6
Marketing Management - Chapter 6Perkha Khan
 
MGMT 374 Week 7 Lecture Powerpoint
MGMT 374 Week 7 Lecture PowerpointMGMT 374 Week 7 Lecture Powerpoint
MGMT 374 Week 7 Lecture PowerpointMichael Hill
 
What is a Business model?
What is a Business model?What is a Business model?
What is a Business model?Vivek Deshmukh
 
business ethics Ch.2 by ferrell
business ethics Ch.2 by ferrellbusiness ethics Ch.2 by ferrell
business ethics Ch.2 by ferrellHassan Janjua
 
Daniels ib15inppt 18
Daniels ib15inppt 18Daniels ib15inppt 18
Daniels ib15inppt 18Moises Cielak
 
Chapter 4 customer buying behavior (original)
Chapter 4 customer buying behavior (original)Chapter 4 customer buying behavior (original)
Chapter 4 customer buying behavior (original)jayvee galicia
 
Chapter 3 Ethics and Social Responsibility 2014
Chapter 3 Ethics and Social Responsibility 2014Chapter 3 Ethics and Social Responsibility 2014
Chapter 3 Ethics and Social Responsibility 2014Earlene McNair
 
International Marketing Chapter 1
International Marketing Chapter 1International Marketing Chapter 1
International Marketing Chapter 1Dr. John V. Padua
 
International marketing mix: global products and services
International marketing mix: global products and servicesInternational marketing mix: global products and services
International marketing mix: global products and servicesluispachon
 
Creating long term loyality relationships.Chapter 5,Marketing Managment by Ph...
Creating long term loyality relationships.Chapter 5,Marketing Managment by Ph...Creating long term loyality relationships.Chapter 5,Marketing Managment by Ph...
Creating long term loyality relationships.Chapter 5,Marketing Managment by Ph...Shujaat Ali
 
Chapt 3 evaluating business ethics
Chapt 3   evaluating business ethicsChapt 3   evaluating business ethics
Chapt 3 evaluating business ethicsLùn Tê Giác
 
Chapter 2 Stakeholder Relationships, Social Responsibility, & Corporate Gover...
Chapter 2 Stakeholder Relationships, Social Responsibility, & Corporate Gover...Chapter 2 Stakeholder Relationships, Social Responsibility, & Corporate Gover...
Chapter 2 Stakeholder Relationships, Social Responsibility, & Corporate Gover...Firdaus Fitri Zainal Abidin
 
Ferrell 8e ch01
Ferrell 8e ch01Ferrell 8e ch01
Ferrell 8e ch01jreid15
 
Institutionalism of Business ethics.ppt
Institutionalism of Business ethics.pptInstitutionalism of Business ethics.ppt
Institutionalism of Business ethics.pptNehaAgrawal744616
 
Marketing Management - Chapter 10
Marketing Management - Chapter 10Marketing Management - Chapter 10
Marketing Management - Chapter 10Perkha Khan
 
International Business_Chapter 4_International Trade Theory_Charles W. Hill
International Business_Chapter 4_International Trade Theory_Charles W. HillInternational Business_Chapter 4_International Trade Theory_Charles W. Hill
International Business_Chapter 4_International Trade Theory_Charles W. HillMd. Bellal Hossain Raju
 

What's hot (20)

Marketing Management - Chapter 3
Marketing Management - Chapter 3Marketing Management - Chapter 3
Marketing Management - Chapter 3
 
kotler Marketing management chapter 4.PPT
kotler Marketing management chapter 4.PPTkotler Marketing management chapter 4.PPT
kotler Marketing management chapter 4.PPT
 
MGMT 374 Week 5 Lecture PowerPoint
MGMT 374 Week 5 Lecture PowerPointMGMT 374 Week 5 Lecture PowerPoint
MGMT 374 Week 5 Lecture PowerPoint
 
Marketing Management - Chapter 6
Marketing Management - Chapter 6Marketing Management - Chapter 6
Marketing Management - Chapter 6
 
MGMT 374 Week 7 Lecture Powerpoint
MGMT 374 Week 7 Lecture PowerpointMGMT 374 Week 7 Lecture Powerpoint
MGMT 374 Week 7 Lecture Powerpoint
 
Chapter 1: The Importance of Business Ethics
Chapter 1: The Importance of Business Ethics�Chapter 1: The Importance of Business Ethics�
Chapter 1: The Importance of Business Ethics
 
What is a Business model?
What is a Business model?What is a Business model?
What is a Business model?
 
business ethics Ch.2 by ferrell
business ethics Ch.2 by ferrellbusiness ethics Ch.2 by ferrell
business ethics Ch.2 by ferrell
 
Daniels ib15inppt 18
Daniels ib15inppt 18Daniels ib15inppt 18
Daniels ib15inppt 18
 
Chapter 4 customer buying behavior (original)
Chapter 4 customer buying behavior (original)Chapter 4 customer buying behavior (original)
Chapter 4 customer buying behavior (original)
 
Chapter 3 Ethics and Social Responsibility 2014
Chapter 3 Ethics and Social Responsibility 2014Chapter 3 Ethics and Social Responsibility 2014
Chapter 3 Ethics and Social Responsibility 2014
 
International Marketing Chapter 1
International Marketing Chapter 1International Marketing Chapter 1
International Marketing Chapter 1
 
International marketing mix: global products and services
International marketing mix: global products and servicesInternational marketing mix: global products and services
International marketing mix: global products and services
 
Creating long term loyality relationships.Chapter 5,Marketing Managment by Ph...
Creating long term loyality relationships.Chapter 5,Marketing Managment by Ph...Creating long term loyality relationships.Chapter 5,Marketing Managment by Ph...
Creating long term loyality relationships.Chapter 5,Marketing Managment by Ph...
 
Chapt 3 evaluating business ethics
Chapt 3   evaluating business ethicsChapt 3   evaluating business ethics
Chapt 3 evaluating business ethics
 
Chapter 2 Stakeholder Relationships, Social Responsibility, & Corporate Gover...
Chapter 2 Stakeholder Relationships, Social Responsibility, & Corporate Gover...Chapter 2 Stakeholder Relationships, Social Responsibility, & Corporate Gover...
Chapter 2 Stakeholder Relationships, Social Responsibility, & Corporate Gover...
 
Ferrell 8e ch01
Ferrell 8e ch01Ferrell 8e ch01
Ferrell 8e ch01
 
Institutionalism of Business ethics.ppt
Institutionalism of Business ethics.pptInstitutionalism of Business ethics.ppt
Institutionalism of Business ethics.ppt
 
Marketing Management - Chapter 10
Marketing Management - Chapter 10Marketing Management - Chapter 10
Marketing Management - Chapter 10
 
International Business_Chapter 4_International Trade Theory_Charles W. Hill
International Business_Chapter 4_International Trade Theory_Charles W. HillInternational Business_Chapter 4_International Trade Theory_Charles W. Hill
International Business_Chapter 4_International Trade Theory_Charles W. Hill
 

Viewers also liked

Chapter 7 review
Chapter 7 reviewChapter 7 review
Chapter 7 reviewpejansen
 
Chapter 6 review
Chapter 6 reviewChapter 6 review
Chapter 6 reviewpejansen
 
Chapter10 review
Chapter10 reviewChapter10 review
Chapter10 reviewpejansen
 
Chapter 3 review
Chapter 3 reviewChapter 3 review
Chapter 3 reviewpejansen
 
Chapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summaryChapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summarypejansen
 
Chapter 5 review
Chapter 5 reviewChapter 5 review
Chapter 5 reviewpejansen
 
Chapter 4 review
Chapter 4 reviewChapter 4 review
Chapter 4 reviewpejansen
 
Chapter 1 review
Chapter 1 reviewChapter 1 review
Chapter 1 reviewpejansen
 
Chapter 2 review
Chapter 2 reviewChapter 2 review
Chapter 2 reviewpejansen
 

Viewers also liked (9)

Chapter 7 review
Chapter 7 reviewChapter 7 review
Chapter 7 review
 
Chapter 6 review
Chapter 6 reviewChapter 6 review
Chapter 6 review
 
Chapter10 review
Chapter10 reviewChapter10 review
Chapter10 review
 
Chapter 3 review
Chapter 3 reviewChapter 3 review
Chapter 3 review
 
Chapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summaryChapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summary
 
Chapter 5 review
Chapter 5 reviewChapter 5 review
Chapter 5 review
 
Chapter 4 review
Chapter 4 reviewChapter 4 review
Chapter 4 review
 
Chapter 1 review
Chapter 1 reviewChapter 1 review
Chapter 1 review
 
Chapter 2 review
Chapter 2 reviewChapter 2 review
Chapter 2 review
 

Similar to Chapter 8 review

Mobile Security Sticks and Carrots
Mobile Security Sticks and CarrotsMobile Security Sticks and Carrots
Mobile Security Sticks and CarrotsCraig Heath
 
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docxMLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docxraju957290
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxhealdkathaleen
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxsusanschei
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Human Resources & Payroll
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Tony Richardson CISSP
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)Wissam Abdel Baki
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 

Similar to Chapter 8 review (20)

Mobile Security Sticks and Carrots
Mobile Security Sticks and CarrotsMobile Security Sticks and Carrots
Mobile Security Sticks and Carrots
 
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docxMLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Augmented reality
Augmented realityAugmented reality
Augmented reality
 
UK_DE_Survey White Paper
UK_DE_Survey White PaperUK_DE_Survey White Paper
UK_DE_Survey White Paper
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
 
Week 4 grade_4
Week 4 grade_4Week 4 grade_4
Week 4 grade_4
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 
Law w23
Law w23Law w23
Law w23
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 

More from pejansen

Chapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summaryChapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summarypejansen
 
Chapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summaryChapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summarypejansen
 
Chapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summaryChapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summarypejansen
 
Chapter 1,2 and 3 summary
Chapter 1,2 and 3 summaryChapter 1,2 and 3 summary
Chapter 1,2 and 3 summarypejansen
 
Week 5 discussion
Week 5 discussionWeek 5 discussion
Week 5 discussionpejansen
 
Discussion week 4
Discussion week 4Discussion week 4
Discussion week 4pejansen
 
Discussion week 3
Discussion week 3Discussion week 3
Discussion week 3pejansen
 
Discussion week 2
Discussion week 2Discussion week 2
Discussion week 2pejansen
 
Discussion week 1
Discussion week 1Discussion week 1
Discussion week 1pejansen
 

More from pejansen (9)

Chapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summaryChapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summary
 
Chapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summaryChapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summary
 
Chapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summaryChapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summary
 
Chapter 1,2 and 3 summary
Chapter 1,2 and 3 summaryChapter 1,2 and 3 summary
Chapter 1,2 and 3 summary
 
Week 5 discussion
Week 5 discussionWeek 5 discussion
Week 5 discussion
 
Discussion week 4
Discussion week 4Discussion week 4
Discussion week 4
 
Discussion week 3
Discussion week 3Discussion week 3
Discussion week 3
 
Discussion week 2
Discussion week 2Discussion week 2
Discussion week 2
 
Discussion week 1
Discussion week 1Discussion week 1
Discussion week 1
 

Recently uploaded

TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 

Recently uploaded (20)

TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 

Chapter 8 review

  • 1. Chapter 8 Ethics & Technology McGraw-Hill
  • 2. 8-2 “Big Brother is Watching You” George Orwell, ‘1984’, Part 1, Chapter 1
  • 3. Ethics & Technology Advantages of technology in the workplace: Intranet – company’s internal website containing information for employee access only Extranet – private piece of a company’s internet network available to customers and/or vendor partners on the basis of secured password Telecommuting – ability to work outside of the office and log in to your company network 8-3
  • 4. Ethics & Technology Loss of privacy Companies have ability to send customers’ personal data anywhere in the world Employee monitoring – every email sent and every website visited 8-4
  • 5. The Promise of Increased Worker Productivity The Employer Position: As an employee of the organization, your allotted shift or normal work period are at the discretion of the company. Other than lunch and any scheduled breaks, all your activity should be work-related, and any monitoring of that activity should not be regarded as an infringement of your privacy. If you want to do something in private don’t do it at work. It is part of the organization’s obligation to its stakeholders to operate as efficiently as possible. 8-5
  • 6. The Promise of Increased Worker Productivity The Employee Position: My agreement should not intrude upon my civil rights as an individual – I am an employee, not a servant. I should be notified of any electronic surveillance and the purpose of that surveillance. The actions of a small number of employees in breaking company rules should not be used as a justification to take away everyone’s civil rights. Electronic monitoring implies that we can’t be trusted to do our jobs – and if you can’t trust us, why are you employing us in the first place? 8-6
  • 7. When Are You “at Work”? Computer technology allows the capability of telecommuting – working from anywhere by logging into your company’s network remotely Computer and Smartphone (iPhone/Blackberry) Availability now being defined as accessibility So, does this flexibility apply to employees “at work”? 8-7
  • 8. Employee Consent THIN CONSENT If an employee receives formal notification that the company will be monitoring all email and web activity – either at the time of hire or during employment – and it is made clear in that notification that his or her continued employment with the company will be dependent on the employee’s agreement to abide by that monitoring, then the employee may be said to have given ‘thin’ consent. In other words, there are two options – agree to the monitoring or ‘pursue other employment opportunities’. 8-8
  • 9. Employee Consent THICK CONSENT If employment conditions are at the other end of the scale – i.e. jobs are plentiful and the employee would have no difficulty in finding another position – then the consent given to the monitoring policy could be classified as ‘thick’ since the employee has a realistic alternative if he or she finds the policy to be unacceptable. 8-9
  • 10. The Dangers of Leaving a Paper Trail Employers may be able to monitor every keystroke on computers, but the documents written on the machines do the most harm “Offensive” email postings Viewing inappropriate Web sites Internet communication: Damage from electronic trail of emails 8-10
  • 11. Vicarious Liability “…a legal concept that means that a party may be held responsible for injury or damage, when in reality they were not actively involved in the incident. Parties that may be charged with vicarious liability are generally in a supervisory role over the person or parties personally responsible for the injury/damage. The implications of vicarious liability are that the party charged is responsible for the actions of their subordinates.” 8-11
  • 12. “A legal concept that employers can be held liable for the actions of their employees in their Internet communications to the same degree as if those employers had written those communications on company letterhead. Cyberliability
  • 13. Ten Commandments of Computer Ethics 8-13
  • 14. Big Brother is in the House! "It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen. The smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself—anything that carried with it the suggestion of abnormality, of having something to hide. In any case, to wear an improper expression on your face… was itself a punishable offense. There was even a word for it in Newspeak: facecrime…"  George Orwell, Nineteen Eighty-Four, Book One,Chapter 5 8-14