SlideShare a Scribd company logo
1 of 18
Download to read offline
PRESENTED BY:
AMINATA FAYE
MASSANDJE TOURE
PLAN
INTRODUCTION
I. PRESENTATION OF THE COMPANY
II.ETHICAL EVALUATION OF THE COMPANY
III.ANALYSIS AND RECOMMENDATIONS
CONCLUSION
2
INTRODUCTION
•Ethical behavior is behavior that is based on morals and is the right way to behave. It is
choosing the right and good. It is taking pride in one’s honorable acts.
•It is important for a manager to follow the « golden rule » apply to its working sector.
Every business sector has some ethic principles to respect for the good image of the
company and it can differ from a company to the other.
•So we choose Samsung electronics which involved in the IT industry to make an ethical
evaluation
3
PRESENTATION
4
PRESENTATION
• Samsung Group is a South Korean multinational conglomerate company headquartered in Samsung Town, Seoul.
It comprises numerous subsidiaries and affiliated businesses, most of them united under the Samsung brand, and
is the largest South Korean chaebol (business conglomerate).
• Samsung was founded by Lee Byung-Chull in 1938, as a small trading company with forty employees located in
Su-dong .The meaning of the Korean hanja word Samsung is "tristar" or "three stars". Samsung securities creates
the best product and service based on talent and technology. Also it is the largest technology company measured
by 2011 revenues
5
FOCUS: 4 CORE MARKETS
Home Multimedia Mobile Multimedia
Personal Multimedia Core Components
ETHICAL EVALUATION
8
BUSINESS ETHICS PRINCIPLES
They comply with the
law and ethics
They maintain a
transparent
organizational
culture.
They respect their
customers,
stockholders and
employees
They value
environment, safety
and health
They fulfill their
social responsibility
as a global
corporate citizen
9
IT INDUSTRY
• SAMSUNG ELECTRONIC ONE OF THE LARGEST MULTI-BILLION DOLLAR
CORPORATIONS IN THE WORLD RECENTLY FOUND ITSELF ON THE WRONG SIDE
OF ETHICAL BEHAVIOR
• TECHNOLOGY IS A PRIME TARGET FOR THOSE WISHING TO ABUSE OR MISUSE ITS
VERY ADVANTAGES. UNETHICAL BEHAVIOR BY THESE PEOPLE PRESENT A VERY
REAL THREAT TO SOCIETAL GAINS MADE POSSIBLE BY INFORMATION
TECHNOLOGY
10
GENERAL ETHICAL
BEHAVIOR IN THE
SECTOR
BEHAVIOR IN
SAMSUNG
COMMENTS
PRIVACY To respect each ones
privacy in terms of new
invention.
In the computer ethics
literature, Samsung is
perceived to have a clear
potential to violate the
privacy of users or
competitors
The Samsung and apple
trial show that the company
violate the intellectual right
of apple
HONESTY It is important to take in
account the real need of
consumers and make
sure that they know
everything about the
product even if there are
some default
Samsung show a lack of
honesty when it comes to
patents and copyrights
towards other companies
It isn’t enough to create
good quality products for
customers but they have
also to maintain their
company image
11
GENERAL ETHICAL
BEHAVIOR IN THE
SECTOR
BEHAVIOR IN SAMSUNG COMMENTS
INTEGRITY they have to make hard
decisions to do what is
right for the company and
their consumers.
Therefore it is necessary
to follow their ethical
values to succeed in that.
They compromise their
values with some
unethical actions.
With their outsourcing
they act against some of
their values,
PRINCIPLE OF
TRANSPARENCY
A high level of
transparency has to be
requested.
They maintain a
transparent organizational
culture.
There are no
discriminations in terms of
culture, talent in the
company
12
ANALYSIS AND RECOMMENDATIONS
13
SWOT OF SAMSUNG BUSINESS ETHICS
• Anticorruption
class
• 5 principles
Strengths
• Ethic is a
personal
choice
Weaknesses
• Several
cultures
Opportunities
• Several
accusations
of
plagiarism
Threats
14
RECOMMENDATIONS
•Change people mentality
•Enhance the importance of ethics in the organization
•Take drastic measures against those who act unethically
•follow their business principles and uphold high ethical
standards
15
CONCLUSION
•Ethical behavior is not difficult to define for the usage of information technology; however,
it is difficult to implement standards of ethical behaviors in regards to information
technology usage. In order to protect company assets and the rights of the public, it is
essential to develop a set of standards that include both ethical codes and legal codes that
control the legitimate opportunities that employees have to engage in unethical behaviors.
16
SOURCES
• HTTP://SAMSUNGSECURITIES.COM/CSR/ETHICAL_MANAGEMENT.DO?CMD=LIST&MEN
UCODE=M030101 13/12/13
• HTTP://WWW.SAMSUNG.COM/US/ABOUTSAMSUNG/SUSTAINABILITY/SUSTAINABLEM
ANAGEMENT/DOWNLOAD/SAMSUNGVALUECODE_OFCONDUCT.PDF 13/12/13
• HTTP://THEMACADVOCATE.COM/2012/08/08/SAMSUNGS-UNETHICAL-BEHAVIOR-
MORE-DIVERSIFIED-THAN-ITS-SHARTPHONE-LINEUP/ 13/12/13
• HTTP://WWW.ETHICAL-
PERSPECTIVES.BE/PAGE.PHP?LAN=E&FILE=EP_DETAIL&ID=22&TID=237 13/12/13
• HTTP://WWW.STUDYMODE.COM/ESSAYS/THE-IMPACT-OF-UNETHICAL-PRACTICES-
913443.HTML 13/12/13
17
“
”
A MAN WITHOUT ETHICS IS A WILD
BEAST UPON THE WORLD
ALBERT CAMUS
THANK YOU FOR YOUR ATTENTION
18

More Related Content

What's hot

Market Segmentation of GPS Based Wrist Watches
Market Segmentation of GPS Based Wrist WatchesMarket Segmentation of GPS Based Wrist Watches
Market Segmentation of GPS Based Wrist WatchesHarshit Jhawar
 
Lg presentation (1)
Lg presentation (1)Lg presentation (1)
Lg presentation (1)Amit Jha
 
Apple consumer behaviour
Apple  consumer behaviour Apple  consumer behaviour
Apple consumer behaviour Vijay Bolla
 
Accenture Presentation of HRM
Accenture Presentation of HRMAccenture Presentation of HRM
Accenture Presentation of HRMMimansha Bahadur
 
Management Presentation on Apple Incorporation and SWOT Analysis
Management Presentation on Apple Incorporation and SWOT AnalysisManagement Presentation on Apple Incorporation and SWOT Analysis
Management Presentation on Apple Incorporation and SWOT AnalysisMirza Akbar Ali
 
PESTAL Analysis of LG Electronics
 PESTAL Analysis of LG Electronics PESTAL Analysis of LG Electronics
PESTAL Analysis of LG ElectronicsDheerajRajpurohit2
 
Samsung Segmentation, Targeting & positioning
Samsung Segmentation, Targeting & positioningSamsung Segmentation, Targeting & positioning
Samsung Segmentation, Targeting & positioningAdarshAjish
 
STP(segmentation ,targeting& positioning ) of Apple .
STP(segmentation ,targeting& positioning  ) of Apple .STP(segmentation ,targeting& positioning  ) of Apple .
STP(segmentation ,targeting& positioning ) of Apple .Deepanshu Anand
 
Ge nine(9) cell matrix
Ge nine(9) cell matrixGe nine(9) cell matrix
Ge nine(9) cell matrixHpm India
 
SAMSUNG CSR AND SUSTAINABILITY ACTIVITIES
SAMSUNG CSR AND SUSTAINABILITY ACTIVITIESSAMSUNG CSR AND SUSTAINABILITY ACTIVITIES
SAMSUNG CSR AND SUSTAINABILITY ACTIVITIESMadihaAltaf3
 
Business policy & strategic management
Business policy & strategic managementBusiness policy & strategic management
Business policy & strategic managementShashankdiv
 
Nestle Strategic Model
Nestle Strategic ModelNestle Strategic Model
Nestle Strategic ModelHammad Rasheed
 
Organizational Structure Analysis Apple Inc.
Organizational Structure Analysis Apple Inc.Organizational Structure Analysis Apple Inc.
Organizational Structure Analysis Apple Inc.TyagiAnubhav
 
Important Factors of Samsung Case Study PESTEL Analysis
Important Factors of Samsung Case Study PESTEL AnalysisImportant Factors of Samsung Case Study PESTEL Analysis
Important Factors of Samsung Case Study PESTEL AnalysisInstantAssignmentHelpAustralia
 
Ethical Dilemmas in Business
Ethical Dilemmas in BusinessEthical Dilemmas in Business
Ethical Dilemmas in BusinessShahzad Khan
 
Fundamental analysis of byjus
Fundamental analysis of byjusFundamental analysis of byjus
Fundamental analysis of byjusMd Salman Ashrafi
 
Analyzing a company’s external environment
Analyzing a company’s external environmentAnalyzing a company’s external environment
Analyzing a company’s external environmentM.S. SaHiR
 

What's hot (20)

Market Segmentation of GPS Based Wrist Watches
Market Segmentation of GPS Based Wrist WatchesMarket Segmentation of GPS Based Wrist Watches
Market Segmentation of GPS Based Wrist Watches
 
Ethics in Marketing
Ethics in MarketingEthics in Marketing
Ethics in Marketing
 
Lg presentation (1)
Lg presentation (1)Lg presentation (1)
Lg presentation (1)
 
Apple consumer behaviour
Apple  consumer behaviour Apple  consumer behaviour
Apple consumer behaviour
 
Accenture Presentation of HRM
Accenture Presentation of HRMAccenture Presentation of HRM
Accenture Presentation of HRM
 
Management Presentation on Apple Incorporation and SWOT Analysis
Management Presentation on Apple Incorporation and SWOT AnalysisManagement Presentation on Apple Incorporation and SWOT Analysis
Management Presentation on Apple Incorporation and SWOT Analysis
 
PESTAL Analysis of LG Electronics
 PESTAL Analysis of LG Electronics PESTAL Analysis of LG Electronics
PESTAL Analysis of LG Electronics
 
Samsung Segmentation, Targeting & positioning
Samsung Segmentation, Targeting & positioningSamsung Segmentation, Targeting & positioning
Samsung Segmentation, Targeting & positioning
 
STP(segmentation ,targeting& positioning ) of Apple .
STP(segmentation ,targeting& positioning  ) of Apple .STP(segmentation ,targeting& positioning  ) of Apple .
STP(segmentation ,targeting& positioning ) of Apple .
 
Ge nine(9) cell matrix
Ge nine(9) cell matrixGe nine(9) cell matrix
Ge nine(9) cell matrix
 
SAMSUNG CSR AND SUSTAINABILITY ACTIVITIES
SAMSUNG CSR AND SUSTAINABILITY ACTIVITIESSAMSUNG CSR AND SUSTAINABILITY ACTIVITIES
SAMSUNG CSR AND SUSTAINABILITY ACTIVITIES
 
Apple - Consumer Behaviour
Apple - Consumer BehaviourApple - Consumer Behaviour
Apple - Consumer Behaviour
 
Business policy & strategic management
Business policy & strategic managementBusiness policy & strategic management
Business policy & strategic management
 
Nestle Strategic Model
Nestle Strategic ModelNestle Strategic Model
Nestle Strategic Model
 
Organizational Structure Analysis Apple Inc.
Organizational Structure Analysis Apple Inc.Organizational Structure Analysis Apple Inc.
Organizational Structure Analysis Apple Inc.
 
Infosys 2
Infosys 2Infosys 2
Infosys 2
 
Important Factors of Samsung Case Study PESTEL Analysis
Important Factors of Samsung Case Study PESTEL AnalysisImportant Factors of Samsung Case Study PESTEL Analysis
Important Factors of Samsung Case Study PESTEL Analysis
 
Ethical Dilemmas in Business
Ethical Dilemmas in BusinessEthical Dilemmas in Business
Ethical Dilemmas in Business
 
Fundamental analysis of byjus
Fundamental analysis of byjusFundamental analysis of byjus
Fundamental analysis of byjus
 
Analyzing a company’s external environment
Analyzing a company’s external environmentAnalyzing a company’s external environment
Analyzing a company’s external environment
 

Similar to Ethics: Case of Samsung

An Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsAn Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsMark Jhon Oxillo
 
What-is-Business-Ethics.pptx
What-is-Business-Ethics.pptxWhat-is-Business-Ethics.pptx
What-is-Business-Ethics.pptxcoleinnef
 
What-is-Business-Ethics.pptx
What-is-Business-Ethics.pptxWhat-is-Business-Ethics.pptx
What-is-Business-Ethics.pptxcoleinnef
 
Cyber-Law-and-Professional-Ethicsss.pptx
Cyber-Law-and-Professional-Ethicsss.pptxCyber-Law-and-Professional-Ethicsss.pptx
Cyber-Law-and-Professional-Ethicsss.pptxprabeshxdezo
 
How to solve ethical issues in business
How to solve ethical issues in businessHow to solve ethical issues in business
How to solve ethical issues in businessProsta Osman
 
Apple Ethicall.pptx
Apple Ethicall.pptxApple Ethicall.pptx
Apple Ethicall.pptxIram72585
 
Corporate Ethics
Corporate EthicsCorporate Ethics
Corporate Ethicshimangi24
 
Chap 4 conducting business ethically and responsibly 2
Chap 4 conducting business ethically and responsibly 2Chap 4 conducting business ethically and responsibly 2
Chap 4 conducting business ethically and responsibly 2Pimsat.University.Karachi
 
Ch 4 ethics in international business 1
Ch 4 ethics in international business 1Ch 4 ethics in international business 1
Ch 4 ethics in international business 1lotwalavishal847425
 
MSRA Ethics Training Presentation - Final
MSRA Ethics Training Presentation - FinalMSRA Ethics Training Presentation - Final
MSRA Ethics Training Presentation - FinalLucas Kiragu
 
Business environment PPT INTERNATIONAL BUSINESS MANAGEMENT MBA
Business environment  PPT INTERNATIONAL BUSINESS MANAGEMENT MBABusiness environment  PPT INTERNATIONAL BUSINESS MANAGEMENT MBA
Business environment PPT INTERNATIONAL BUSINESS MANAGEMENT MBABabasab Patil
 
Business environment 1 st module mba Management
Business environment 1 st module  mba Management Business environment 1 st module  mba Management
Business environment 1 st module mba Management Babasab Patil
 
Towards a code of ethics for gamification at enterprise
Towards a code of ethics for gamification at enterpriseTowards a code of ethics for gamification at enterprise
Towards a code of ethics for gamification at enterpriseAlimohammad Shahri
 
Chap4conductingbusinessethicallyandresponsibly2 120305015710-phpapp01
Chap4conductingbusinessethicallyandresponsibly2 120305015710-phpapp01Chap4conductingbusinessethicallyandresponsibly2 120305015710-phpapp01
Chap4conductingbusinessethicallyandresponsibly2 120305015710-phpapp01Pimsat.University.Karachi
 

Similar to Ethics: Case of Samsung (20)

An Overview of Ethics for IT Professionals
An Overview of Ethics for IT ProfessionalsAn Overview of Ethics for IT Professionals
An Overview of Ethics for IT Professionals
 
What-is-Business-Ethics.pptx
What-is-Business-Ethics.pptxWhat-is-Business-Ethics.pptx
What-is-Business-Ethics.pptx
 
What-is-Business-Ethics.pptx
What-is-Business-Ethics.pptxWhat-is-Business-Ethics.pptx
What-is-Business-Ethics.pptx
 
Cyber-Law-and-Professional-Ethicsss.pptx
Cyber-Law-and-Professional-Ethicsss.pptxCyber-Law-and-Professional-Ethicsss.pptx
Cyber-Law-and-Professional-Ethicsss.pptx
 
How to solve ethical issues in business
How to solve ethical issues in businessHow to solve ethical issues in business
How to solve ethical issues in business
 
Apple Ethicall.pptx
Apple Ethicall.pptxApple Ethicall.pptx
Apple Ethicall.pptx
 
Corporate Ethics
Corporate EthicsCorporate Ethics
Corporate Ethics
 
Business ethics
Business ethicsBusiness ethics
Business ethics
 
Chap 4 conducting business ethically and responsibly 2
Chap 4 conducting business ethically and responsibly 2Chap 4 conducting business ethically and responsibly 2
Chap 4 conducting business ethically and responsibly 2
 
Ch 4 ethics in international business 1
Ch 4 ethics in international business 1Ch 4 ethics in international business 1
Ch 4 ethics in international business 1
 
MSRA Ethics Training Presentation - Final
MSRA Ethics Training Presentation - FinalMSRA Ethics Training Presentation - Final
MSRA Ethics Training Presentation - Final
 
Ethics and culture
Ethics and cultureEthics and culture
Ethics and culture
 
Csr of sony
Csr of sonyCsr of sony
Csr of sony
 
UNIT I.ppt
UNIT I.pptUNIT I.ppt
UNIT I.ppt
 
Corporate Ethics
Corporate EthicsCorporate Ethics
Corporate Ethics
 
Business environment PPT INTERNATIONAL BUSINESS MANAGEMENT MBA
Business environment  PPT INTERNATIONAL BUSINESS MANAGEMENT MBABusiness environment  PPT INTERNATIONAL BUSINESS MANAGEMENT MBA
Business environment PPT INTERNATIONAL BUSINESS MANAGEMENT MBA
 
Business environment 1 st module mba Management
Business environment 1 st module  mba Management Business environment 1 st module  mba Management
Business environment 1 st module mba Management
 
Towards a code of ethics for gamification at enterprise
Towards a code of ethics for gamification at enterpriseTowards a code of ethics for gamification at enterprise
Towards a code of ethics for gamification at enterprise
 
Towards a code of ethics for gamification at enterprise po em
Towards a code of ethics for gamification at enterprise po emTowards a code of ethics for gamification at enterprise po em
Towards a code of ethics for gamification at enterprise po em
 
Chap4conductingbusinessethicallyandresponsibly2 120305015710-phpapp01
Chap4conductingbusinessethicallyandresponsibly2 120305015710-phpapp01Chap4conductingbusinessethicallyandresponsibly2 120305015710-phpapp01
Chap4conductingbusinessethicallyandresponsibly2 120305015710-phpapp01
 

Recently uploaded

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 

Recently uploaded (20)

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 

Ethics: Case of Samsung

  • 2. PLAN INTRODUCTION I. PRESENTATION OF THE COMPANY II.ETHICAL EVALUATION OF THE COMPANY III.ANALYSIS AND RECOMMENDATIONS CONCLUSION 2
  • 3. INTRODUCTION •Ethical behavior is behavior that is based on morals and is the right way to behave. It is choosing the right and good. It is taking pride in one’s honorable acts. •It is important for a manager to follow the « golden rule » apply to its working sector. Every business sector has some ethic principles to respect for the good image of the company and it can differ from a company to the other. •So we choose Samsung electronics which involved in the IT industry to make an ethical evaluation 3
  • 5. PRESENTATION • Samsung Group is a South Korean multinational conglomerate company headquartered in Samsung Town, Seoul. It comprises numerous subsidiaries and affiliated businesses, most of them united under the Samsung brand, and is the largest South Korean chaebol (business conglomerate). • Samsung was founded by Lee Byung-Chull in 1938, as a small trading company with forty employees located in Su-dong .The meaning of the Korean hanja word Samsung is "tristar" or "three stars". Samsung securities creates the best product and service based on talent and technology. Also it is the largest technology company measured by 2011 revenues 5
  • 6. FOCUS: 4 CORE MARKETS Home Multimedia Mobile Multimedia Personal Multimedia Core Components
  • 8. 8
  • 9. BUSINESS ETHICS PRINCIPLES They comply with the law and ethics They maintain a transparent organizational culture. They respect their customers, stockholders and employees They value environment, safety and health They fulfill their social responsibility as a global corporate citizen 9
  • 10. IT INDUSTRY • SAMSUNG ELECTRONIC ONE OF THE LARGEST MULTI-BILLION DOLLAR CORPORATIONS IN THE WORLD RECENTLY FOUND ITSELF ON THE WRONG SIDE OF ETHICAL BEHAVIOR • TECHNOLOGY IS A PRIME TARGET FOR THOSE WISHING TO ABUSE OR MISUSE ITS VERY ADVANTAGES. UNETHICAL BEHAVIOR BY THESE PEOPLE PRESENT A VERY REAL THREAT TO SOCIETAL GAINS MADE POSSIBLE BY INFORMATION TECHNOLOGY 10
  • 11. GENERAL ETHICAL BEHAVIOR IN THE SECTOR BEHAVIOR IN SAMSUNG COMMENTS PRIVACY To respect each ones privacy in terms of new invention. In the computer ethics literature, Samsung is perceived to have a clear potential to violate the privacy of users or competitors The Samsung and apple trial show that the company violate the intellectual right of apple HONESTY It is important to take in account the real need of consumers and make sure that they know everything about the product even if there are some default Samsung show a lack of honesty when it comes to patents and copyrights towards other companies It isn’t enough to create good quality products for customers but they have also to maintain their company image 11
  • 12. GENERAL ETHICAL BEHAVIOR IN THE SECTOR BEHAVIOR IN SAMSUNG COMMENTS INTEGRITY they have to make hard decisions to do what is right for the company and their consumers. Therefore it is necessary to follow their ethical values to succeed in that. They compromise their values with some unethical actions. With their outsourcing they act against some of their values, PRINCIPLE OF TRANSPARENCY A high level of transparency has to be requested. They maintain a transparent organizational culture. There are no discriminations in terms of culture, talent in the company 12
  • 14. SWOT OF SAMSUNG BUSINESS ETHICS • Anticorruption class • 5 principles Strengths • Ethic is a personal choice Weaknesses • Several cultures Opportunities • Several accusations of plagiarism Threats 14
  • 15. RECOMMENDATIONS •Change people mentality •Enhance the importance of ethics in the organization •Take drastic measures against those who act unethically •follow their business principles and uphold high ethical standards 15
  • 16. CONCLUSION •Ethical behavior is not difficult to define for the usage of information technology; however, it is difficult to implement standards of ethical behaviors in regards to information technology usage. In order to protect company assets and the rights of the public, it is essential to develop a set of standards that include both ethical codes and legal codes that control the legitimate opportunities that employees have to engage in unethical behaviors. 16
  • 17. SOURCES • HTTP://SAMSUNGSECURITIES.COM/CSR/ETHICAL_MANAGEMENT.DO?CMD=LIST&MEN UCODE=M030101 13/12/13 • HTTP://WWW.SAMSUNG.COM/US/ABOUTSAMSUNG/SUSTAINABILITY/SUSTAINABLEM ANAGEMENT/DOWNLOAD/SAMSUNGVALUECODE_OFCONDUCT.PDF 13/12/13 • HTTP://THEMACADVOCATE.COM/2012/08/08/SAMSUNGS-UNETHICAL-BEHAVIOR- MORE-DIVERSIFIED-THAN-ITS-SHARTPHONE-LINEUP/ 13/12/13 • HTTP://WWW.ETHICAL- PERSPECTIVES.BE/PAGE.PHP?LAN=E&FILE=EP_DETAIL&ID=22&TID=237 13/12/13 • HTTP://WWW.STUDYMODE.COM/ESSAYS/THE-IMPACT-OF-UNETHICAL-PRACTICES- 913443.HTML 13/12/13 17
  • 18. “ ” A MAN WITHOUT ETHICS IS A WILD BEAST UPON THE WORLD ALBERT CAMUS THANK YOU FOR YOUR ATTENTION 18