SlideShare a Scribd company logo
Chapter 8 Ethics & Technology McGraw-Hill
8-2 “Big Brother is Watching You” George Orwell, ‘1984’,  Part 1, Chapter 1
Ethics & Technology Advantages of technology in the workplace: Intranet – company’s internal website containing information for employee access only Extranet – private piece of a company’s internet network available to customers and/or vendor partners on the basis of secured password Telecommuting – ability to work outside of the office and log in to your company network 8-3
Ethics & Technology Loss of privacy Companies have ability to send customers’ personal data anywhere in the world Employee monitoring – every email sent and every website visited 8-4
The Promise of Increased Worker Productivity The Employer Position: As an employee of the organization, your allotted shift or normal work period are at the discretion of the company.  Other than lunch and any scheduled breaks, all your activity should be work-related, and any monitoring of that activity should not be regarded as an infringement of your privacy.  If you want to do something in private don’t do it at work. It is part of the organization’s obligation to its stakeholders to operate as efficiently as possible. 8-5
The Promise of Increased Worker Productivity The Employee Position: My agreement should not intrude upon my civil rights as an individual – I am an employee, not a servant.  I should be notified of any electronic surveillance and the purpose of that surveillance.  The actions of a small number of employees in breaking company rules should not be used as a justification to take away everyone’s civil rights.  Electronic monitoring implies that we can’t be trusted to do our jobs – and if you can’t trust us, why are you employing us in the first place? 8-6
When Are You “at Work”? Computer technology allows the capability of telecommuting – working from anywhere by logging into your company’s network remotely Computer and Smartphone (iPhone/Blackberry) Availability now being defined as accessibility So, does this flexibility apply to employees “at work”? 8-7
Employee Consent THIN CONSENT     If an employee receives formal notification that the company will be monitoring all email and web activity – either at the time of hire or during employment – and it is made clear in that notification that his or her continued employment with the company will be dependent on the employee’s agreement to abide by that monitoring, then the employee may be said to have given ‘thin’ consent. In other words, there are two options – agree to the monitoring or ‘pursue other employment opportunities’.  8-8
Employee Consent THICK CONSENT If employment conditions are at the other end of the scale – i.e. jobs are plentiful and the employee would have no difficulty in finding another position – then the consent given to the monitoring policy could be classified as ‘thick’ since the employee has a realistic alternative if he or she finds the policy to be unacceptable. 8-9
The Dangers of Leaving a Paper Trail Employers may be able to monitor every keystroke on computers, but the documents written on the machines do the most harm “Offensive” email postings Viewing inappropriate Web sites Internet communication: Damage from electronic trail of emails 8-10
Vicarious Liability “…a legal concept that means that a party may be held responsible for injury or damage, when in reality they were not actively involved in the incident. Parties that may be charged with vicarious liability are generally in a supervisory role over the person or parties personally responsible for the injury/damage. The implications of vicarious liability are that the party charged is responsible for the actions of their subordinates.” 8-11
“A legal concept that employers can be held liable for the actions of their employees in their Internet communications to the same degree as if those employers had written those communications on company letterhead. Cyberliability
Ten Commandments of Computer Ethics 8-13
Big Brother is in the House!     "It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen. The smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself—anything that carried with it the suggestion of abnormality, of having something to hide. In any case, to wear an improper expression on your face… was itself a punishable offense. There was even a word for it in Newspeak: facecrime…"  		George Orwell, Nineteen Eighty-Four, Book 	One,Chapter 5 8-14

More Related Content

What's hot

Marketing Management - Chapter 5
Marketing Management - Chapter 5Marketing Management - Chapter 5
Marketing Management - Chapter 5
Perkha Khan
 
Marketing Management - Chapter 3
Marketing Management - Chapter 3Marketing Management - Chapter 3
Marketing Management - Chapter 3
Perkha Khan
 
Marketing Management - Chapter 6
Marketing Management - Chapter 6Marketing Management - Chapter 6
Marketing Management - Chapter 6
Perkha Khan
 
Marketing Management - Chapter 1
Marketing Management - Chapter 1Marketing Management - Chapter 1
Marketing Management - Chapter 1
Perkha Khan
 
creating-long-term-loyalty-relationships
creating-long-term-loyalty-relationships creating-long-term-loyalty-relationships
creating-long-term-loyalty-relationships
Slide Hub
 
Marketing Management - Chapter 7
Marketing Management - Chapter 7Marketing Management - Chapter 7
Marketing Management - Chapter 7
Perkha Khan
 
MGMT 374 Week 5 Lecture PowerPoint
MGMT 374 Week 5 Lecture PowerPointMGMT 374 Week 5 Lecture PowerPoint
MGMT 374 Week 5 Lecture PowerPointMichael Hill
 
Chapter 3 Market Segmentation
Chapter 3 Market SegmentationChapter 3 Market Segmentation
Chapter 3 Market Segmentation
Avinash Kumar
 
Kotler mm 14e 08 ippt
Kotler mm 14e 08 ipptKotler mm 14e 08 ippt
Kotler mm 14e 08 ippt
Ehab Yousry
 
Marketing Management - Chapter 10
Marketing Management - Chapter 10Marketing Management - Chapter 10
Marketing Management - Chapter 10
Perkha Khan
 
Marketing Management - Chapter 9
Marketing Management - Chapter 9Marketing Management - Chapter 9
Marketing Management - Chapter 9
Perkha Khan
 
Developing Marketing Strategies and Plans / Marketing Management By Kotler K...
Developing Marketing Strategies and Plans / Marketing Management By Kotler K...Developing Marketing Strategies and Plans / Marketing Management By Kotler K...
Developing Marketing Strategies and Plans / Marketing Management By Kotler K...
Choudhry Asad
 
Marketing Management - Chapter 2
Marketing Management - Chapter 2Marketing Management - Chapter 2
Marketing Management - Chapter 2
Perkha Khan
 
Organizational behavior chapter 2
Organizational behavior chapter 2Organizational behavior chapter 2
Organizational behavior chapter 2
Dr. John V. Padua
 
Week 01 marketing creating and capturing customer value
Week 01 marketing creating and capturing customer valueWeek 01 marketing creating and capturing customer value
Week 01 marketing creating and capturing customer value
fayyaz ahmed wagho
 
Why is Ethics and Compliance important
Why is Ethics and Compliance importantWhy is Ethics and Compliance important
Why is Ethics and Compliance important
Good Light Massage Center
 
Kotler mm 14e 07 ippt
Kotler mm 14e 07 ipptKotler mm 14e 07 ippt
Kotler mm 14e 07 ippt
Ehab Yousry
 
Consumer (Buyer) behaviour Chapter 3 Market Segmentation and Strategic Targeting
Consumer (Buyer) behaviour Chapter 3 Market Segmentation and Strategic TargetingConsumer (Buyer) behaviour Chapter 3 Market Segmentation and Strategic Targeting
Consumer (Buyer) behaviour Chapter 3 Market Segmentation and Strategic Targeting
Farman Zakhilwal
 
Schiffman cb10 ppt_10
Schiffman cb10 ppt_10Schiffman cb10 ppt_10
Schiffman cb10 ppt_10ftsutton
 
Defining Marketing for the 21st Century.ppt
Defining Marketing for the 21st Century.pptDefining Marketing for the 21st Century.ppt
Defining Marketing for the 21st Century.ppt
Tribhuvan University
 

What's hot (20)

Marketing Management - Chapter 5
Marketing Management - Chapter 5Marketing Management - Chapter 5
Marketing Management - Chapter 5
 
Marketing Management - Chapter 3
Marketing Management - Chapter 3Marketing Management - Chapter 3
Marketing Management - Chapter 3
 
Marketing Management - Chapter 6
Marketing Management - Chapter 6Marketing Management - Chapter 6
Marketing Management - Chapter 6
 
Marketing Management - Chapter 1
Marketing Management - Chapter 1Marketing Management - Chapter 1
Marketing Management - Chapter 1
 
creating-long-term-loyalty-relationships
creating-long-term-loyalty-relationships creating-long-term-loyalty-relationships
creating-long-term-loyalty-relationships
 
Marketing Management - Chapter 7
Marketing Management - Chapter 7Marketing Management - Chapter 7
Marketing Management - Chapter 7
 
MGMT 374 Week 5 Lecture PowerPoint
MGMT 374 Week 5 Lecture PowerPointMGMT 374 Week 5 Lecture PowerPoint
MGMT 374 Week 5 Lecture PowerPoint
 
Chapter 3 Market Segmentation
Chapter 3 Market SegmentationChapter 3 Market Segmentation
Chapter 3 Market Segmentation
 
Kotler mm 14e 08 ippt
Kotler mm 14e 08 ipptKotler mm 14e 08 ippt
Kotler mm 14e 08 ippt
 
Marketing Management - Chapter 10
Marketing Management - Chapter 10Marketing Management - Chapter 10
Marketing Management - Chapter 10
 
Marketing Management - Chapter 9
Marketing Management - Chapter 9Marketing Management - Chapter 9
Marketing Management - Chapter 9
 
Developing Marketing Strategies and Plans / Marketing Management By Kotler K...
Developing Marketing Strategies and Plans / Marketing Management By Kotler K...Developing Marketing Strategies and Plans / Marketing Management By Kotler K...
Developing Marketing Strategies and Plans / Marketing Management By Kotler K...
 
Marketing Management - Chapter 2
Marketing Management - Chapter 2Marketing Management - Chapter 2
Marketing Management - Chapter 2
 
Organizational behavior chapter 2
Organizational behavior chapter 2Organizational behavior chapter 2
Organizational behavior chapter 2
 
Week 01 marketing creating and capturing customer value
Week 01 marketing creating and capturing customer valueWeek 01 marketing creating and capturing customer value
Week 01 marketing creating and capturing customer value
 
Why is Ethics and Compliance important
Why is Ethics and Compliance importantWhy is Ethics and Compliance important
Why is Ethics and Compliance important
 
Kotler mm 14e 07 ippt
Kotler mm 14e 07 ipptKotler mm 14e 07 ippt
Kotler mm 14e 07 ippt
 
Consumer (Buyer) behaviour Chapter 3 Market Segmentation and Strategic Targeting
Consumer (Buyer) behaviour Chapter 3 Market Segmentation and Strategic TargetingConsumer (Buyer) behaviour Chapter 3 Market Segmentation and Strategic Targeting
Consumer (Buyer) behaviour Chapter 3 Market Segmentation and Strategic Targeting
 
Schiffman cb10 ppt_10
Schiffman cb10 ppt_10Schiffman cb10 ppt_10
Schiffman cb10 ppt_10
 
Defining Marketing for the 21st Century.ppt
Defining Marketing for the 21st Century.pptDefining Marketing for the 21st Century.ppt
Defining Marketing for the 21st Century.ppt
 

Viewers also liked

Chapter 7 review
Chapter 7 reviewChapter 7 review
Chapter 7 reviewpejansen
 
Chapter 6 review
Chapter 6 reviewChapter 6 review
Chapter 6 reviewpejansen
 
Chapter10 review
Chapter10 reviewChapter10 review
Chapter10 reviewpejansen
 
Chapter 3 review
Chapter 3 reviewChapter 3 review
Chapter 3 reviewpejansen
 
Chapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summaryChapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summarypejansen
 
Chapter 5 review
Chapter 5 reviewChapter 5 review
Chapter 5 reviewpejansen
 
Chapter 4 review
Chapter 4 reviewChapter 4 review
Chapter 4 reviewpejansen
 
Chapter 1 review
Chapter 1 reviewChapter 1 review
Chapter 1 reviewpejansen
 
Chapter 2 review
Chapter 2 reviewChapter 2 review
Chapter 2 reviewpejansen
 

Viewers also liked (9)

Chapter 7 review
Chapter 7 reviewChapter 7 review
Chapter 7 review
 
Chapter 6 review
Chapter 6 reviewChapter 6 review
Chapter 6 review
 
Chapter10 review
Chapter10 reviewChapter10 review
Chapter10 review
 
Chapter 3 review
Chapter 3 reviewChapter 3 review
Chapter 3 review
 
Chapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summaryChapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summary
 
Chapter 5 review
Chapter 5 reviewChapter 5 review
Chapter 5 review
 
Chapter 4 review
Chapter 4 reviewChapter 4 review
Chapter 4 review
 
Chapter 1 review
Chapter 1 reviewChapter 1 review
Chapter 1 review
 
Chapter 2 review
Chapter 2 reviewChapter 2 review
Chapter 2 review
 

Similar to Chapter 8 review

Mobile Security Sticks and Carrots
Mobile Security Sticks and CarrotsMobile Security Sticks and Carrots
Mobile Security Sticks and Carrots
Craig Heath
 
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docxMLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
raju957290
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
healdkathaleen
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
Luis R Castellanos
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
susanschei
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
Dr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
Oregon Law Practice Management
 
Augmented reality
Augmented realityAugmented reality
Augmented reality
Abdelrahman Ali
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
Human Resources & Payroll
 
Week 4 grade_4
Week 4 grade_4Week 4 grade_4
Week 4 grade_4
lysamusa1101
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
Mukesh Tekwani
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
Tony Richardson CISSP
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
Wissam Abdel Baki
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
Maran Corporate Risk Associates, Inc.
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
Sumama Shakir
 

Similar to Chapter 8 review (20)

Mobile Security Sticks and Carrots
Mobile Security Sticks and CarrotsMobile Security Sticks and Carrots
Mobile Security Sticks and Carrots
 
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docxMLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Augmented reality
Augmented realityAugmented reality
Augmented reality
 
UK_DE_Survey White Paper
UK_DE_Survey White PaperUK_DE_Survey White Paper
UK_DE_Survey White Paper
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
 
Week 4 grade_4
Week 4 grade_4Week 4 grade_4
Week 4 grade_4
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 
Law w23
Law w23Law w23
Law w23
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 

More from pejansen

Chapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summaryChapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summarypejansen
 
Chapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summaryChapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summarypejansen
 
Chapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summaryChapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summarypejansen
 
Chapter 1,2 and 3 summary
Chapter 1,2 and 3 summaryChapter 1,2 and 3 summary
Chapter 1,2 and 3 summarypejansen
 
Week 5 discussion
Week 5 discussionWeek 5 discussion
Week 5 discussionpejansen
 
Discussion week 4
Discussion week 4Discussion week 4
Discussion week 4pejansen
 
Discussion week 3
Discussion week 3Discussion week 3
Discussion week 3pejansen
 
Discussion week 2
Discussion week 2Discussion week 2
Discussion week 2pejansen
 
Discussion week 1
Discussion week 1Discussion week 1
Discussion week 1pejansen
 

More from pejansen (9)

Chapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summaryChapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summary
 
Chapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summaryChapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summary
 
Chapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summaryChapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summary
 
Chapter 1,2 and 3 summary
Chapter 1,2 and 3 summaryChapter 1,2 and 3 summary
Chapter 1,2 and 3 summary
 
Week 5 discussion
Week 5 discussionWeek 5 discussion
Week 5 discussion
 
Discussion week 4
Discussion week 4Discussion week 4
Discussion week 4
 
Discussion week 3
Discussion week 3Discussion week 3
Discussion week 3
 
Discussion week 2
Discussion week 2Discussion week 2
Discussion week 2
 
Discussion week 1
Discussion week 1Discussion week 1
Discussion week 1
 

Recently uploaded

Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdfBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
daothibichhang1
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Boris Ziegler
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 

Recently uploaded (20)

Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdfBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 

Chapter 8 review

  • 1. Chapter 8 Ethics & Technology McGraw-Hill
  • 2. 8-2 “Big Brother is Watching You” George Orwell, ‘1984’, Part 1, Chapter 1
  • 3. Ethics & Technology Advantages of technology in the workplace: Intranet – company’s internal website containing information for employee access only Extranet – private piece of a company’s internet network available to customers and/or vendor partners on the basis of secured password Telecommuting – ability to work outside of the office and log in to your company network 8-3
  • 4. Ethics & Technology Loss of privacy Companies have ability to send customers’ personal data anywhere in the world Employee monitoring – every email sent and every website visited 8-4
  • 5. The Promise of Increased Worker Productivity The Employer Position: As an employee of the organization, your allotted shift or normal work period are at the discretion of the company. Other than lunch and any scheduled breaks, all your activity should be work-related, and any monitoring of that activity should not be regarded as an infringement of your privacy. If you want to do something in private don’t do it at work. It is part of the organization’s obligation to its stakeholders to operate as efficiently as possible. 8-5
  • 6. The Promise of Increased Worker Productivity The Employee Position: My agreement should not intrude upon my civil rights as an individual – I am an employee, not a servant. I should be notified of any electronic surveillance and the purpose of that surveillance. The actions of a small number of employees in breaking company rules should not be used as a justification to take away everyone’s civil rights. Electronic monitoring implies that we can’t be trusted to do our jobs – and if you can’t trust us, why are you employing us in the first place? 8-6
  • 7. When Are You “at Work”? Computer technology allows the capability of telecommuting – working from anywhere by logging into your company’s network remotely Computer and Smartphone (iPhone/Blackberry) Availability now being defined as accessibility So, does this flexibility apply to employees “at work”? 8-7
  • 8. Employee Consent THIN CONSENT If an employee receives formal notification that the company will be monitoring all email and web activity – either at the time of hire or during employment – and it is made clear in that notification that his or her continued employment with the company will be dependent on the employee’s agreement to abide by that monitoring, then the employee may be said to have given ‘thin’ consent. In other words, there are two options – agree to the monitoring or ‘pursue other employment opportunities’. 8-8
  • 9. Employee Consent THICK CONSENT If employment conditions are at the other end of the scale – i.e. jobs are plentiful and the employee would have no difficulty in finding another position – then the consent given to the monitoring policy could be classified as ‘thick’ since the employee has a realistic alternative if he or she finds the policy to be unacceptable. 8-9
  • 10. The Dangers of Leaving a Paper Trail Employers may be able to monitor every keystroke on computers, but the documents written on the machines do the most harm “Offensive” email postings Viewing inappropriate Web sites Internet communication: Damage from electronic trail of emails 8-10
  • 11. Vicarious Liability “…a legal concept that means that a party may be held responsible for injury or damage, when in reality they were not actively involved in the incident. Parties that may be charged with vicarious liability are generally in a supervisory role over the person or parties personally responsible for the injury/damage. The implications of vicarious liability are that the party charged is responsible for the actions of their subordinates.” 8-11
  • 12. “A legal concept that employers can be held liable for the actions of their employees in their Internet communications to the same degree as if those employers had written those communications on company letterhead. Cyberliability
  • 13. Ten Commandments of Computer Ethics 8-13
  • 14. Big Brother is in the House! "It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen. The smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself—anything that carried with it the suggestion of abnormality, of having something to hide. In any case, to wear an improper expression on your face… was itself a punishable offense. There was even a word for it in Newspeak: facecrime…"  George Orwell, Nineteen Eighty-Four, Book One,Chapter 5 8-14