SlideShare a Scribd company logo
1 of 79
GLOBAL ETHICAL ISSUES
 Integration of the national economy in to
world economy
 Organisations who have established business
in more than one country, are called
multinational corporation. The headquarters
are in the home country and the business is
extended in many host countries.
 Apple
 Wall Mart
 Coca-Cola
 IBM
 Microsoft
 Companies are interested in Profit
 Threat to small scale industries
 Potential abuse of workers
 Interference in political matters
 Ten international Rights are also called
Donaldson Right.
 It explains the moral responsibilities and
obligations of MNC’s operating in the host
countries.
 Right to fair trial on products
 MNC should
 Respect human rights
 Economic and technical benefits
 Promote morally justified institutions
 Respect laws and promote culture
 Fair remuneration to employees
 Provide safety to workers
 It is a process of moving technology to a new
setting and implementing it there.
 Technology includes hardware (machines and
installations) and the techniques (technical,
organizational, and managerial skills and
procedures).
 It may mean moving the technology applications
from laboratory to the field/factory or from one
country to another. This transfer is effected by
governments, organizations, universities, and
MNCs.
 Identification, transfer, and implementation
of most suitable technology for a set of new
situations, is called appropriate technology.
 Environmental ethics is the study of
 (a) moral issues concerning the environment,
and
 (b) moral perspectives, beliefs, or attitudes
concerning those issues.
 Plastic waste, or plastic pollution, is ‘the
accumulation of plastic objects (e.g.: plastic
bottles and much more) in the Earth’s
environment that adversely affects wildlife,
wildlife habitat, and humans.’
 E-waste is generated when electronic and
electrical equipment become unfit for their
originally intended use or have cross the
expiry date.
 Unwanted or residual materials from
industrial operations.
 Industrial Solid Waste
 Toxic or Hazardous waste
 Chemical Waste
 Ozone layer depletion is the gradual thinning
of the earth’s ozone layer in the upper
atmosphere caused due to the release
of chemical compounds containing gaseous
bromine or chlorine from industries or other
human activities.
 Steady temperature rise on our planet.
 Global warming, the gradual heating of
Earth's surface, oceans and atmosphere, is
caused by human activity, primarily the
burning of fossil fuels that pump carbon
dioxide (CO2), methane and other
greenhouse gases into the atmosphere.
 When atmosphere pollutants like oxides of
nitrogen and sulphur react with rain water
and come down with rain water and results
in acid rain
 It emphasis on the investment, orientation of
technology, development and functioning of
organisations to meet the present needs of
people and at the same time ensuring the
future generation to meet their needs.
 Environmental Impact Assessment
 Establish Standards
 Counter Measures
 Environmental awareness
 Environmental impact assessment(EIA) is an
assessment of the possible positive and
negative impact that a proposed project may
have on the environment.
 Studying how industry and technology
affecting the environment.
 Study and to fix the tolerable and actual
pollution levels.
 Study what are the protective and eliminating
measures available for immediate
implementation.
 Study on how to educate people on
environmental practices, issues and possible
remedies.
 Computer ethics is defined as (a) study and
analysis of nature and social impact of
computer technology, (b) formulation and
justification of policies, for ethical use of
computers.
 Computer Ethics is a set of moral principles
that regulates the use of computers.
 It deals with how the professionals should
make decisions regarding the professional
and social problems arising out of the use of
computers.
 Computer as the instrument of Unethical acts
 Computer as an object of Unethical Act
 Problems due to the autonomous nature of
computers
 The usage of computer replaces the job
positions.
 Breaking privacy.
 Defraud a bank or a client
 It limits the skills of the employees.
 The use of computers led to accessing or
erasing the information or data of individuals.
 Defraud a bank or a client, by accessing and
withdrawing money from other’s bank
account.
 Hacking
 Spreading virus
 Health hazard
 It is the unlawful intrusion in to a computer
or a network.
 The software is stolen or information is
accessed from other computers.
 This may cause financial loss to the business
or violation of privacy rights of the individuals
or business.
 In case of defense information being hacked,
this may endanger the security of the nation.
 A computer virus is a computer program that
can replicate itself and infect a computer.
 A computer virus is a type of malicious code
or program written to alter the way a
computer operates and is designed to spread
from one computer to another.
 Through mail or otherwise, other computers
are accessed and the files are erased or
contents changed altogether.
 A Trojan horse is a type of malware that is
often disguised as legitimate software.
Trojans can be employed by cyber-thieves
and hackers trying to gain access to users'
systems.
 The computers pose threat during their use
as well as during disposal.
 Carpal Tunnel Syndrome
 Back Pain
 Eye Strain
 Security risk
 Loss of human lives
 In flexible manufacturing systems, the
autonomous computer is beneficial in
obtaining continuous monitoring and
automatic control.
 A small error can lead to big loss
 An unexpected error in the software or
hardware may trigger a serious attack and
cause irreparable human loss before the error
is traced.
 Computer performs very important role in
defense. Computers are used to track
incoming missiles target to destroy them.
Computers are used in tanks and planes and
ships to target enemy forces, help diagnose
any problems with the platforms. Computers
are used to hold documents, maintenance
records and records of events.
 Elimination of routine and manual jobs
 Health and safety
 Computer failure
 Impacts upon health and job satisfaction of
workers who will use it. It is possible, for
example, that such workers will feel stressed
trying to keep up with high-speed computerized
devices.
 They may be injured by repeating the same
physical movement over and over
 Their health may be threatened by radiation
emanating from computer monitors. These are
just a few of the social and ethical issues that
arise when information technology is introduced
into the workplace.
 Failure in computers may be due to errors in
the hardware or software.
 Hardware errors are rare and they can be
solved easily and quickly. But software errors
are very serious as they can stop the entire
network.
 Testing and quality systems for software have
gained relevance and importance in the
recent past, to avoid or minimize these
errors.
 Anonymity means absence of identity.
GLOBAL ETHICAL ISSUES AND THEIR IMPACT

More Related Content

Similar to GLOBAL ETHICAL ISSUES AND THEIR IMPACT

FUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxFUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxPaulRomanoBenavidesR
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1MuhammedTalha7
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxSATYAJIT58
 
Ergonomic Hazard Assessment Machine ShopReagan
Ergonomic Hazard Assessment Machine ShopReagan Ergonomic Hazard Assessment Machine ShopReagan
Ergonomic Hazard Assessment Machine ShopReagan TanaMaeskm
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)ChristopherAntonius
 
51803561 disadvantages-of-information-technology
51803561 disadvantages-of-information-technology51803561 disadvantages-of-information-technology
51803561 disadvantages-of-information-technologyMuntaquir Hasnain
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment Jenny Coloma
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Industrialization and Control Impact on Occupational Safety and Health.pptx
Industrialization and  Control Impact on  Occupational Safety  and Health.pptxIndustrialization and  Control Impact on  Occupational Safety  and Health.pptx
Industrialization and Control Impact on Occupational Safety and Health.pptxArsalKhan53
 
The literature and write report on information system security part 1 of 5 p...
The literature and write report on information system security  part 1 of 5 p...The literature and write report on information system security  part 1 of 5 p...
The literature and write report on information system security part 1 of 5 p...raufik tajuddin
 

Similar to GLOBAL ETHICAL ISSUES AND THEIR IMPACT (20)

FUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxFUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
 
CREATIVE TECHNOLOGY 7 QI-L4
CREATIVE TECHNOLOGY 7 QI-L4CREATIVE TECHNOLOGY 7 QI-L4
CREATIVE TECHNOLOGY 7 QI-L4
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Essay On It Security
Essay On It SecurityEssay On It Security
Essay On It Security
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Social Experimentation
Social ExperimentationSocial Experimentation
Social Experimentation
 
0857290053.pdf
0857290053.pdf0857290053.pdf
0857290053.pdf
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
Ergonomic Hazard Assessment Machine ShopReagan
Ergonomic Hazard Assessment Machine ShopReagan Ergonomic Hazard Assessment Machine ShopReagan
Ergonomic Hazard Assessment Machine ShopReagan
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 
51803561 disadvantages-of-information-technology
51803561 disadvantages-of-information-technology51803561 disadvantages-of-information-technology
51803561 disadvantages-of-information-technology
 
Lecture 8 privacy, security, ergonomics and the environment
Lecture 8   privacy, security, ergonomics and the environment Lecture 8   privacy, security, ergonomics and the environment
Lecture 8 privacy, security, ergonomics and the environment
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Industrialization and Control Impact on Occupational Safety and Health.pptx
Industrialization and  Control Impact on  Occupational Safety  and Health.pptxIndustrialization and  Control Impact on  Occupational Safety  and Health.pptx
Industrialization and Control Impact on Occupational Safety and Health.pptx
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Ppt lesson 17
Ppt lesson 17Ppt lesson 17
Ppt lesson 17
 
Computer in Society
Computer in SocietyComputer in Society
Computer in Society
 
The literature and write report on information system security part 1 of 5 p...
The literature and write report on information system security  part 1 of 5 p...The literature and write report on information system security  part 1 of 5 p...
The literature and write report on information system security part 1 of 5 p...
 
LESSON 2 OHS.pptx
LESSON 2 OHS.pptxLESSON 2 OHS.pptx
LESSON 2 OHS.pptx
 

Recently uploaded

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

GLOBAL ETHICAL ISSUES AND THEIR IMPACT

  • 2.
  • 3.
  • 4.  Integration of the national economy in to world economy
  • 5.  Organisations who have established business in more than one country, are called multinational corporation. The headquarters are in the home country and the business is extended in many host countries.
  • 6.
  • 7.  Apple  Wall Mart  Coca-Cola  IBM  Microsoft
  • 8.
  • 9.
  • 10.  Companies are interested in Profit  Threat to small scale industries  Potential abuse of workers  Interference in political matters
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.  Ten international Rights are also called Donaldson Right.  It explains the moral responsibilities and obligations of MNC’s operating in the host countries.
  • 22.
  • 23.  Right to fair trial on products
  • 24.  MNC should  Respect human rights  Economic and technical benefits  Promote morally justified institutions  Respect laws and promote culture  Fair remuneration to employees  Provide safety to workers
  • 25.
  • 26.  It is a process of moving technology to a new setting and implementing it there.  Technology includes hardware (machines and installations) and the techniques (technical, organizational, and managerial skills and procedures).  It may mean moving the technology applications from laboratory to the field/factory or from one country to another. This transfer is effected by governments, organizations, universities, and MNCs.
  • 27.  Identification, transfer, and implementation of most suitable technology for a set of new situations, is called appropriate technology.
  • 28.
  • 29.
  • 30.  Environmental ethics is the study of  (a) moral issues concerning the environment, and  (b) moral perspectives, beliefs, or attitudes concerning those issues.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.  Plastic waste, or plastic pollution, is ‘the accumulation of plastic objects (e.g.: plastic bottles and much more) in the Earth’s environment that adversely affects wildlife, wildlife habitat, and humans.’
  • 36.  E-waste is generated when electronic and electrical equipment become unfit for their originally intended use or have cross the expiry date.
  • 37.  Unwanted or residual materials from industrial operations.  Industrial Solid Waste  Toxic or Hazardous waste  Chemical Waste
  • 38.  Ozone layer depletion is the gradual thinning of the earth’s ozone layer in the upper atmosphere caused due to the release of chemical compounds containing gaseous bromine or chlorine from industries or other human activities.
  • 39.  Steady temperature rise on our planet.  Global warming, the gradual heating of Earth's surface, oceans and atmosphere, is caused by human activity, primarily the burning of fossil fuels that pump carbon dioxide (CO2), methane and other greenhouse gases into the atmosphere.
  • 40.  When atmosphere pollutants like oxides of nitrogen and sulphur react with rain water and come down with rain water and results in acid rain
  • 41.  It emphasis on the investment, orientation of technology, development and functioning of organisations to meet the present needs of people and at the same time ensuring the future generation to meet their needs.
  • 42.
  • 43.  Environmental Impact Assessment  Establish Standards  Counter Measures  Environmental awareness
  • 44.  Environmental impact assessment(EIA) is an assessment of the possible positive and negative impact that a proposed project may have on the environment.  Studying how industry and technology affecting the environment.
  • 45.  Study and to fix the tolerable and actual pollution levels.
  • 46.  Study what are the protective and eliminating measures available for immediate implementation.
  • 47.  Study on how to educate people on environmental practices, issues and possible remedies.
  • 48.
  • 49.
  • 50.  Computer ethics is defined as (a) study and analysis of nature and social impact of computer technology, (b) formulation and justification of policies, for ethical use of computers.
  • 51.  Computer Ethics is a set of moral principles that regulates the use of computers.
  • 52.  It deals with how the professionals should make decisions regarding the professional and social problems arising out of the use of computers.
  • 53.  Computer as the instrument of Unethical acts  Computer as an object of Unethical Act  Problems due to the autonomous nature of computers
  • 54.  The usage of computer replaces the job positions.  Breaking privacy.  Defraud a bank or a client
  • 55.  It limits the skills of the employees.
  • 56.  The use of computers led to accessing or erasing the information or data of individuals.
  • 57.  Defraud a bank or a client, by accessing and withdrawing money from other’s bank account.
  • 58.  Hacking  Spreading virus  Health hazard
  • 59.
  • 60.  It is the unlawful intrusion in to a computer or a network.
  • 61.  The software is stolen or information is accessed from other computers.  This may cause financial loss to the business or violation of privacy rights of the individuals or business.  In case of defense information being hacked, this may endanger the security of the nation.
  • 62.
  • 63.  A computer virus is a computer program that can replicate itself and infect a computer.
  • 64.  A computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.  Through mail or otherwise, other computers are accessed and the files are erased or contents changed altogether.
  • 65.
  • 66.
  • 67.  A Trojan horse is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems.
  • 68.  The computers pose threat during their use as well as during disposal.  Carpal Tunnel Syndrome  Back Pain  Eye Strain
  • 69.  Security risk  Loss of human lives  In flexible manufacturing systems, the autonomous computer is beneficial in obtaining continuous monitoring and automatic control.
  • 70.  A small error can lead to big loss
  • 71.
  • 72.  An unexpected error in the software or hardware may trigger a serious attack and cause irreparable human loss before the error is traced.
  • 73.  Computer performs very important role in defense. Computers are used to track incoming missiles target to destroy them. Computers are used in tanks and planes and ships to target enemy forces, help diagnose any problems with the platforms. Computers are used to hold documents, maintenance records and records of events.
  • 74.  Elimination of routine and manual jobs  Health and safety  Computer failure
  • 75.
  • 76.  Impacts upon health and job satisfaction of workers who will use it. It is possible, for example, that such workers will feel stressed trying to keep up with high-speed computerized devices.  They may be injured by repeating the same physical movement over and over  Their health may be threatened by radiation emanating from computer monitors. These are just a few of the social and ethical issues that arise when information technology is introduced into the workplace.
  • 77.  Failure in computers may be due to errors in the hardware or software.  Hardware errors are rare and they can be solved easily and quickly. But software errors are very serious as they can stop the entire network.  Testing and quality systems for software have gained relevance and importance in the recent past, to avoid or minimize these errors.
  • 78.  Anonymity means absence of identity.