Bus ethics and tech


Published on


Published in: Education, Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Chapter 9 Business Ethics and Technology
  • Playboy and ESPN
  • Chapter 9 Business Ethics and Technology
  • Bus ethics and tech

    1. 1. Business Ethics and Technology
    2. 2. Ethics <ul><li>eth•ic Pronunciation: (eth'ik), [key] — n. 1. the body of moral principles or values governing or distinctive of a particular culture or group: the Christian ethic; the tribal ethic of the Zuni. 2. a complex of moral precepts held or rules of conduct followed by an individual: a personal ethic. </li></ul><ul><li>Webster ’s Dictionary </li></ul>
    3. 3. So what is ethics? <ul><li>“ According to John Rawls . . . ‘ethics is how we decide to behave when we decide we belong together,’ the study of ethics has to do with developing standards for judging the conduct of one party whose behavior affects another” (Gini, 2010, p. 347). </li></ul><ul><ul><li>Gini, A. (2010). Moral Leadership and Business Ethics (2nd ed.) (G. R. Hickman, Ed.). Thousand Oaks, CA: Sage. </li></ul></ul>
    4. 4. Definition of Ethics <ul><li>Professor John Chaffee states, </li></ul><ul><ul><li>“ ethics and morals are terms that refer to the principles that govern our relationships with other people: the ways we ought to behave . . . standards that we should employ in the decisions we make” (Chaffee, 2009, p.307) </li></ul></ul><ul><ul><li>Chaffee, J. (2009). Thinking Critically (9th ed.). Boston: Cengage Learning. </li></ul></ul>
    5. 5. Ethics <ul><li>is the ability “to qualify for moral consideration; you must be able to use the power of reason to derive and understand the moral law, and you must follow the law because you recognize it as moral imperative” (Waller, 2008, p. 140). </li></ul><ul><ul><li>Waller, B. (2008). Consider Ethics: Theory, Readings, and Contemporary Issues (2nd ed.). New York: Pearson Longman.  </li></ul></ul>
    6. 6. Business Ethics <ul><li>“ business ethics examines moral controversies relating to the social responsibilities of capitalist business practices, the moral status of corporate entities, deceptive advertising, insider trading, basic employee rights, job discrimination, affirmative action, drug testing, and whistle blowing” (Fieser, 2003) </li></ul><ul><ul><li>Fieser, J. (2003). Ethics. In Internet Encyclopedia of Philosophy . Retrieved September 4, 2010, from http:/​/​www.iep.utm.edu/​ethics/​ </li></ul></ul>
    7. 7. Business Ethics <ul><li>Ethics is: </li></ul><ul><ul><li>“ how we treat each other, every day, person to person. If you want to know about a company’ ethics, look at how it treats people ---- customers, suppliers, and employees (Gini, 2010, p. 349). </li></ul></ul><ul><ul><li>“ Business is about people . . . Ethics is about how customers and employees' are treated” (Gini, 2010, p. 349). </li></ul></ul><ul><ul><li>Gini, A. (2010). Moral Leadership and Business Ethics (2nd ed.) (G. R. Hickman, Ed.). Thousand Oaks, CA: Sage. </li></ul></ul>
    8. 8. Break Time!
    9. 9. Learning Outcomes <ul><li>Identify the role that technology plays in business. </li></ul><ul><li>Gain an understanding of the technological environment and its characteristics that influence business ethics and stakeholders. </li></ul><ul><li>Identify the benefits and side effects of technology in business. </li></ul><ul><li>Gain an appreciation of society ’s intoxication with technology and the consequences of this intoxication. </li></ul><ul><li>Learn to differentiate between information technology and biotechnology and their ethical implications. </li></ul><ul><li>Identify the ethical issues involved in biotechnology and present arguments on both sides of the issues. </li></ul>0
    10. 10. Introduction <ul><li>This lecture explores questions surrounding technology and business ethics, including: </li></ul><ul><li>What does technology mean? </li></ul><ul><li>What are the benefits and challenges of technology? </li></ul><ul><li>How does ethics relate to technology? </li></ul><ul><li>What are the ethical issues surrounding the major realms of technology: computers and information technology, and biotechnology? </li></ul>0
    11. 11. Technology and the Technological Environment 0 Technology The totality of the means employed to provide objects necessary for human sustenance and comfort
    12. 12. Characteristics of Technology <ul><li>Increased production of goods and services </li></ul><ul><li>Reduced amount of labor needed to produce goods and services </li></ul><ul><li>Made labor easier and safer </li></ul><ul><li>Increased productivity </li></ul><ul><li>Increased standard of living </li></ul><ul><li>Increased life expectancy </li></ul>Benefits of Technology 0
    13. 13. Side Effects and Challenges of Technology <ul><li>Environmental pollution </li></ul><ul><li>Depletion of natural resources </li></ul><ul><li>Technological unemployment </li></ul><ul><li>Creation of unsatisfying jobs </li></ul>Side Effects of Technology 0 http://www.ethix.org @
    14. 14. Ethics and Technology Key Issues Technological Determinism Ethical Lag 0
    15. 15. Symptoms of Society ’s Intoxication with Technology <ul><li>We favor the quick fix </li></ul><ul><li>We fear and worship technology </li></ul><ul><li>We blur the distinction between what is real and fake </li></ul><ul><li>We accept violence as normal </li></ul><ul><li>We love technology as a toy </li></ul><ul><li>We live our lives distanced and distracted </li></ul>Find the Right Balance! 0
    16. 16. Information Technology 0 Biotechnology Electronic Commerce Computer technology in the workplace Information Technology
    17. 17. Electronic Commerce <ul><li>Access </li></ul><ul><li>Intellectual property </li></ul><ul><li>Privacy and informed consent </li></ul><ul><li>Protection of children </li></ul><ul><li>Security of information </li></ul><ul><li>Trust </li></ul>0 Key Issues in e-Commerce Ethics
    18. 18. Potential Threats to Privacy Posed by the Internet <ul><li>Identity theft </li></ul><ul><li>Unintentionally revealing information </li></ul><ul><li>Lost / stolen personal information </li></ul><ul><li>Fake Web sites </li></ul><ul><li>Government distribution of information </li></ul><ul><li>Broadcasting information over the Internet </li></ul><ul><li>Victim of spying </li></ul><ul><li>Cyberstalker </li></ul>Figure 9-1 0
    19. 19. Invasion of Privacy Posed by the Internet <ul><li>Cookies </li></ul><ul><li>Spam </li></ul><ul><li>Identity Theft </li></ul>0
    20. 20. <ul><li>The Financial Services Modernization Act of 1999 </li></ul><ul><ul><li>“ Opt in” to having personal information used </li></ul></ul><ul><li>Governing legislation </li></ul><ul><ul><li>Financial Services Modernization Act </li></ul></ul><ul><ul><li>Fair Credit Reporting Act </li></ul></ul><ul><ul><li>Children ’s Online Privacy Protection Act </li></ul></ul>Government ’s Involvement 0
    21. 21. Challenges: Privacy <ul><li>Privacy issues are at the top of the list in regards to ethical use of information. </li></ul><ul><ul><ul><li>Loss of control </li></ul></ul></ul><ul><ul><ul><li>Misuse of information </li></ul></ul></ul><ul><ul><ul><li>Risk to physical privacy </li></ul></ul></ul><ul><ul><ul><li>Risk of identity theft (video) </li></ul></ul></ul><ul><ul><ul><li>Unwanted intrusions into daily life </li></ul></ul></ul><ul><li>USA Patriot Act (post 9/11) </li></ul><ul><ul><ul><li>Efforts to detect and deter terrorist activity </li></ul></ul></ul><ul><ul><ul><li>Datamining corporate data </li></ul></ul></ul><ul><ul><ul><li>Loss of business and risk of lawsuits due customers being outraged at their loss of data privacy </li></ul></ul></ul><ul><li>Cookies </li></ul><ul><li>Privacy policies </li></ul>
    22. 22. <ul><li>Creating a national Do-Not-Call List </li></ul><ul><li>Beefing up enforcement against spam </li></ul><ul><li>Helping victims of identity theft </li></ul><ul><li>Stopping pretexting </li></ul><ul><li>Encouraging accuracy in credit reporting and compliance with Fair Credit Reporting Act </li></ul><ul><li>Enforcing privacy promises </li></ul><ul><li>Increasing enforcement and outreach on children ’s online privacy </li></ul><ul><li>Encouraging consumers ’ privacy complaints </li></ul><ul><li>Enforcing the telemarketing sales rules </li></ul><ul><li>Restricting use of pre-acquired account information </li></ul><ul><li>Enforcing Gramm-Leach-Bliley Act </li></ul><ul><li>Holding workshops </li></ul>Privacy Agenda of the FTC Figure 9-2 0
    23. 23. Business Initiatives to Protect Privacy 0 Ethical leadership Privacy policies Chief privacy officers Data security
    24. 24. <ul><li>Pornography </li></ul><ul><li>Gambling </li></ul><ul><li>Web-based music services </li></ul><ul><li>Intellectual property </li></ul><ul><li>Monitoring technology </li></ul><ul><li>“ Phishing” </li></ul>Questionable Businesses and Practices 0
    25. 25. The Workplace and Computer Technology <ul><li>Expands job-related knowledge </li></ul><ul><li>Increases productivity during work and commuting times </li></ul><ul><li>Improves communication with clients and customers </li></ul><ul><li>Relieves job stress </li></ul><ul><li>Improved time management </li></ul><ul><li>Expanded professional networks </li></ul><ul><li>Development of a competitive edge </li></ul><ul><li>Balance of work and family needs </li></ul>0 Employee Impression of Technology
    26. 26. Surveillance <ul><li>Computers </li></ul><ul><li>Monitoring website employee computer files </li></ul><ul><li>Blocking access to inappropriate websites </li></ul><ul><li>Storing and reviewing e-mail </li></ul><ul><li>Telephone </li></ul><ul><li>Monitoring time spent, numbers called </li></ul><ul><li>Taping phone conversations </li></ul><ul><li>Video </li></ul><ul><li>Video surveillance against theft </li></ul><ul><li>Video surveillance to monitor employee performance </li></ul>0
    27. 27. Unethical Employee Activities <ul><li>Created a dangerous situation by using new technology while driving </li></ul><ul><li>Blamed error on technological glitch </li></ul><ul><li>Copied company software for home use </li></ul><ul><li>Used office equipment to shop on the Internet </li></ul><ul><li>Used office equipment to search for job </li></ul><ul><li>Accessed private files without permission </li></ul><ul><li>Intruded on co-workers ’ privacy </li></ul><ul><li>Visited porn Web sites </li></ul>0
    28. 28. Challenges: Workplace <ul><li>Accessibility </li></ul><ul><li>Ergonomics </li></ul><ul><li>Outsourcing </li></ul><ul><li>Telecommuting </li></ul><ul><li>Customer relationships – Vendor relationships </li></ul><ul><li>Should IT professionals be in the ethics business or should other areas of the business handle these issues? </li></ul><ul><li>Monitoring </li></ul><ul><ul><li>Should your employer have the right to monitor private email messages? </li></ul></ul><ul><ul><li>What are the two most popular Web sites for American workers? Playboy and ESPN </li></ul></ul>
    29. 29. Challenges: Workplace <ul><li>62% of employers monitor employees' eMail and Internet use. </li></ul><ul><li>68% cite legal liability as the primary reason to monitor. </li></ul><ul><li>87% of companies that monitor have a written eMail Policy, </li></ul><ul><li>83.1% an Internet Policy, </li></ul><ul><li>68% a Software Policy. </li></ul><ul><li>51% of employers have disciplined or terminated employees for violating ePolicy. </li></ul><ul><li>35% of organizations have eMail retention & deletion policies in place. </li></ul><ul><li>10% of companies have been ordered by courts to turn over employee eMail related to workplace lawsuits. </li></ul><ul><li>8.3% of organizations have battled sexual harassment and/or sexual discrimination claims stemming from employee e-mail and/or Internet use. </li></ul><ul><li>Source: The 2001 Electronic Policies & Practices Survey from The American Management Association, US News & World Report, and The ePolicy Institute-Click Here for Survey Results . </li></ul>
    30. 30. Ten Commandments of Computer Ethics Figure 9-3 0
    31. 31. Challenges: Speech <ul><li>Net Etiquette </li></ul><ul><li>Email privacy </li></ul><ul><ul><li>Email privacy policy </li></ul></ul><ul><ul><li>“ Flaming” – insulting, argumentative or chastising replies to messages </li></ul></ul><ul><li>Free Speech </li></ul><ul><ul><li>Accountability and responsibility for web content </li></ul></ul><ul><ul><ul><li>Abortion sites </li></ul></ul></ul><ul><ul><ul><li>Outdated information </li></ul></ul></ul><ul><ul><ul><li>Accurate information </li></ul></ul></ul><ul><ul><ul><li>Privacy and security policies </li></ul></ul></ul><ul><ul><li>Porn </li></ul></ul><ul><ul><ul><li>Professors pc – filled with porn, found by pc maintenance workers </li></ul></ul></ul><ul><ul><ul><li>Visa – won ’t give permission to be used on offensive or pornographic sites </li></ul></ul></ul><ul><ul><li>Hate </li></ul></ul><ul><ul><ul><li>MACHADO CASE </li></ul></ul></ul><ul><ul><li>Internet Filters </li></ul></ul><ul><ul><ul><li>Should filters be in schools or libraries, and /or should they be mandated by law? </li></ul></ul></ul><ul><ul><ul><li>Filters can also be set up to filter out other subjects, would this be an ethical violation? </li></ul></ul></ul><ul><li>Chain Letters </li></ul>
    32. 32. Challenges: Computing Resource Abuse <ul><li>Computers in the Workplace and the Classroom </li></ul><ul><ul><li>Use or Abuse </li></ul></ul><ul><ul><li>Internet Access </li></ul></ul><ul><ul><li>Instant Messenger </li></ul></ul><ul><ul><li>Laptop use in the classroom </li></ul></ul><ul><ul><li>Email </li></ul></ul><ul><ul><ul><li>Legal document </li></ul></ul></ul><ul><ul><ul><li>Can be modified </li></ul></ul></ul><ul><ul><ul><li>Flaming </li></ul></ul></ul><ul><ul><li>Access </li></ul></ul><ul><ul><li>Computer Usage policy </li></ul></ul><ul><ul><li>Email policy </li></ul></ul>
    33. 33. Challenges: Computing Resource Abuse <ul><li>Computer Crime </li></ul><ul><ul><li>Viruses </li></ul></ul><ul><ul><li>Hackers </li></ul></ul><ul><ul><li>Theft </li></ul></ul><ul><ul><li>“ These cyber swindles and dot-cons present new challenges to law enforcement” said John Ashcroft </li></ul></ul><ul><ul><li>US Charges 135 With Net Crimes </li></ul></ul>
    34. 34. Challenges: Intellectual Property <ul><li>Electronic Copyright </li></ul><ul><li>Licensing </li></ul><ul><li>Interoperability </li></ul><ul><li>Licensing </li></ul><ul><ul><li>Cyberlicenses </li></ul></ul><ul><ul><li>Shrinkwrap </li></ul></ul><ul><ul><li>Shareware </li></ul></ul><ul><ul><li>Freeware </li></ul></ul><ul><li>MP3 </li></ul><ul><ul><li>RIAA court case against college students </li></ul></ul><ul><ul><li>University Internet Usage policies </li></ul></ul><ul><li>Internet Downloads </li></ul><ul><ul><li>Files </li></ul></ul><ul><ul><li>Graphics </li></ul></ul><ul><ul><li>Text </li></ul></ul>