Corporate ethics


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Corporate ethics

  1. 1.  Business ethics (also corporate ethics) is a form of applied ethics or professional ethics that examines ethical principles and moral or ethical problems that arise in a business environment. Business ethics reflects the philosophy of business, one of whose aims is to determine the fundamental purposes of a company It applies to all aspects of business conduct and is relevant to the conduct of individuals and entire organizations. There is no question that the use of information technology in e-business operations presents major security challenges, poses serious ethical questions, and affects society in significant ways.
  2. 2. The use of information technology in e-business has major impacts on society, and thus raises serious ethical issues in the areas such as: · Crime · Privacy · Individuality ·Employment · Health · Working Conditions
  3. 3. Business/IT Security, Ethics, and Society:
  4. 4. Ethical Responsibility of Business Professionals: As a business end user, you have a responsibility to promote ethical uses of information technology in the workplace. These responsibilities include properly performing your role as a vital human resource in the e-business systems you help develop and use in your organizations. The AITP code provides guidelines for ethical conduct in the development and use of information technology.
  5. 5. Business Ethics
  6. 6. Business ethics is concerned with the numerous ethical questions that managers must confront as part of their daily business decision-making. Managers use several important alternatives when confronted with making ethical decisions on business issues.
  7. 7. These include: · Stockholder Theory – Holds that managers are agents of the stockholders, and their only ethical responsibility is to increase the profits of the business, without violating the law or engaging in fraudulent practices. · Social Contract Theory - States that companies have ethical responsibility to all members of society, which allow corporations to exist based on a social contract. · Stakeholder Theory - Maintains that managers have an ethical responsibility to manage a firm for the benefit of all of its stakeholders, which are all individuals and groups that have a stake in or claim on a company.
  8. 8. Technological Ethics
  9. 9. Proportionality – The good achieved by the technology must outweigh the harm or risk. Moreover, there must be no alternative that achieves the same or comparable benefits with less harm or risk. Informed Consent – Those affected by the technology should understand and accept the risks. Justice – The benefits and burdens of the technology should be distributed fairly. Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk Minimized Risk – Even it judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk.
  10. 10. Ethical Guidelines
  11. 11. The Association of Information Technology Professionals (AITP), is an organization of professionals in the computing field. Its code of conduct outlines the ethical considerations inherent in the major responsibilities of an IS professional. Business and end users and IS professionals would live up to their ethical responsibilities by voluntarily following such guidelines as those outlined in the AITP standard. You can be a responsible end user by: · Acting with integrity · Increasing your professional competence · Setting high standards of personal performance · Accepting responsibility for your work · Advancing the health, privacy, and general welfare of the public
  12. 12. Computer crime  “computer crime is a criminal activity involving an information technology infrastructure , including illegal access(unauthorized access) , illegal interception, data interference, systems interference , misuse of device, forgery and electronic fraud”
  13. 13. Characteristics of cyber crime: Silent in nature, Large operational canvas, Almost no physical evidence, High impact and intensity, Far away from scene of crime,
  14. 14. Forms of computer or cyber crime: 1. Hacking; 2. Cyber theft; 3. Unauthorized use at work; 4. Piracy Software piracy. piracy of intellectual property computer viruses and worms.
  15. 15. Hacking : Hacking is practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in compute hacking activities are often called hackers .
  16. 16. Example of common hacking tactics are: A. Denial of service, B. Scans, C. Sniffer, D. spoofing., E. Trojan horse, F. Back doors, G. Password crackers. etc.,
  17. 17. Cyber theft: Many computer crime involve the theft of money . In the majority of cases, they are “inside job” that involve unauthorized network entry and fraudulent alternation of computer databases to cover the tracks of the employees involved .
  18. 18. Unauthorized use at work: An organization increase their use of information technology to do business, employees and other insiders are using computers and the internet more and more in their day-to-day work. Although these computing resources can greatly increase worker productivity, they can also be misused.
  19. 19. •Advantages: Can be used to recover lost information where the computer password has been lost. • Disadvantages- Criminals can use it to their advantage.
  20. 20. PIRACY The term „Piracy‟ is generally used to describe the deliberate infringement of copyright on a commercial scale. It is the unauthorized and intentional act of copying, selling, distributing, acquiring or the transferring by any method, means or manner, of entities (like software or any other intellectual property) that are not in the public domain or subject to “fair use”.
  21. 21. There are two types of computer based piracy:  Software piracy  Piracy of intellectual property
  22. 22. Software Piracy Software piracy refers to several practices which involves the unauthorized copying of computer software. This can be done by copying, downloading, sharing, selling, or installing multiple copies onto personal or work computers.
  23. 23. Types of software piracy  Industrial piracy  Corporate piracy  Reseller piracy  Internet piracy  Home piracy
  24. 24. Intellectual Property
  25. 25. Definition: The ownership of ideas. Unlike tangible assets to your business such as computers or your office, intellectual property is a collection of ideas and concepts.
  26. 26. Different Kinds of Intellectual Property Patents A patent is defined as "the grant of a property right to the inventor." A patent grant confers upon the owner "the right to exclude others from making, using, offering for sale, selling, or importing the invention." A patent is granted by PTO for an invention that has been sufficiently documented by the applicant and that has been verified as original by the Patent and Trademark Office( PTO).
  27. 27. A patent is generally valid for 20 years from the date of application .The owner of the patent may then grant a license to others for use of the invention or its design, often for a fee. Trademark: A trademark, as defined as "any word, name, symbol, or device, or any combination, used, or intended to be used, in commerce to identify and distinguish the goods of one manufacturer or seller from goods manufactured or sold by others." Computer-related objects that may be protected by trademarks include corporate brands and operating system logos.
  28. 28. Copyright A copyright is a form of protection granted to the authors of "original works of authorship," both published and unpublished. A copyright protects a tangible form of expression rather than the idea or subject matter itself. Copyright protection generally lasts for the lifetime of the author plus 70 years.
  29. 29. Trade secret A trade secret is proprietary or business-related information that a company or individual uses and has exclusive rights to. To be considered a trade secret, the information must meet the following requirements: •Must be genuine and not obvious •Must provide the owner a competitive or economic advantage and, therefore, have value to the owner •Must be reasonably protected from disclosure
  30. 30. Privacy Issues The power of information technology to store and retrieve information can have a negative effect on the right to privacy of every individual.
  31. 31. For example: · Confidential e-mail messages by employees are monitored by many companies · Personal information is being collected about individuals every time they visit a site on the World Wide Web · Confidential information on individuals contained in centralized computer databases by credit bureaus, government agencies, and private business firms has been stolen or misused, resulting in the invasion of privacy, fraud, and other injustices. · Unauthorized use of information can seriously damage the privacy of individuals. · Errors in databases can seriously hurt the credit standing or reputation of individuals.
  32. 32. Some important privacy issues being debated in business and government include the following: · Accessing individuals’ private e-mail conversations and computer records, and collecting and sharing information about individuals gained from their visits to Internet websites and newsgroups (violation of privacy). · Always “knowing” where a person is, especially as mobile and paging services become more closely associated with people rather than places (computer monitoring) · Using customer information to market additional business services (computer matching). · Collecting telephone numbers and other personal information to build individual customer profiles (unauthorized personal files).
  33. 33. Privacy on the Internet: The Internet is notorious for giving its users a feeling of anonymity, when in actuality; they are highly visible and open to violations of their privacy. Most of the Internet and its World Wide Web and newsgroups are still a wide open, unsecured, electronic frontier, with no tough rules on what information is personal and private. You can protect your privacy in several ways: · Use encryption to send e-mail (both sender and receiver must have encryption software). · Anonymous remailers to protect your identify when you add comments in newsgroup postings. · Ask Internet service provider not to sell your name and personal information to mailing list providers, and other marketers. · Decline to reveal personal data and interest on online service and websites user profiles.
  34. 34. Challenges that arise from the use of information technologies in business  Employment challenges  Individualities  Working Conditions  Health Issues
  35. 35. Employment Challenges  The use of information's technologies has created new jobs and increased productivity while causing significant reduction in some types of job opportunities  The job created by IT may require different types of skills and education  Because lots of tasks have been automated, Computer monitoring causes intrusion in the personal space for workers  Computer Monitoring
  36. 36. Individuality  Computer based systems are criticized as impersonal systems that the dehumanize and depersonalise activities that have been computerized because they eliminate the human relationships present in non computer systems  Another accept of the loss of individuality is the regimentation that seems required by computer based systems  Many business application of IT are designed to minimize depersonalization and regimentation
  37. 37. Working Conditions  IT has eliminated monotonous tasks in the office and factories that formerly had to be performed by people.  It also automates most of the work and gives away more challenging jobs
  38. 38. Health issues  The use of IT in work place rises variety of health issues  Job stress  Damaged armed  Eyestrain  Radiation exposure  Cumulative trauma disorders  Solution to some of these health problems are based on science Ergonomics
  39. 39. Ergonomics  The science of designing user interaction with equipment and work places to fit the user.  It is a study of designing equipment and devices that fit the human body its movements and its cognitive abilities
  40. 40. Cyber Terrorism  It’s the use of internet based attacks in terrorist’s activities, including acts of deliberate large scale disruption of computer networks, especially of personal computers attached to the internet by means of tools such as computer viruses