© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

BUSINESS B2 Ethics.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Business & Society Business & Society Ethics, Sustainability, and Stakeholder Management Eighth Edition Archie B. Carroll Ann K. Buchholtz © 2012 South-Western,
1 Business Ethics and Technology Business and Society: Ethics and Stakeholder Management, 7e Carroll & Buchholtz Copyright ©2009 by South-Western, a division.
PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Copyright Atomic Dog Publishing, /18 Social Responsibility and Management Ethics Chapter 3.
Business ethics and technology Technology advances quicker than society government or business can grasp its consequences or ethics. Privacy invasion through.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 Business Ethics and Technology Business and Society: Ethics and Stakeholder Management, 7e Carroll & Buchholtz Copyright ©2009 by South-Western, a division.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Business Plug-In B7 Ethics.
ICAICT202A - Work and communicate effectively in an IT environment
Chapter 161 Information Technology For Management 4 th Edition Turban, McLean, Wetherbe John Wiley & Sons, Inc. Impacts of IT On Organizations, Individuals,
1 Business Ethics and Technology Chapter 9 Professor Craig Diamond BA 385 October 28, 2009.
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Higher Administration
Chapter 2 Business Ethics and Social Responsibility Learning Goals 5 1
© 2015 Cengage Learning1. Chapter 9 Business Ethics and Technology © 2015 Cengage Learning2.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Business & Society Business & Society Ethics, Sustainability, and Stakeholder Management Eighth Edition Archie B. Carroll Ann K. Buchholtz © 2012 South-Western,
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
The U.S. Approach to Consumer Protection in the Online World U.S. Presentation FTAA Joint Government Private Sector Committee on Electronic Commerce 13th.
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
Digital Citizenship By: Miranda Scorver.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Marketing Management Online marketing
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
CHAPTER 10 Technology Issues.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Monitoring Employees on Networks: Unethical or Good Business?
Chapter 15, Stephen P. Robbins, Mary Coulter, and Nancy Langton, Management, Ninth Canadian Edition Copyright © 2009 Pearson Education Canada Contemporary.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
Business in a Global Environment
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
CHAPTER 17 INTERNATIONAL MARKETING IN E-COMMERCE.
Chapter 2 Business Ethics and Social Responsibility Learning Goals Explain the concepts of business ethics and social responsibility. Describe the factors.
Internet Information for Parents. Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety.
Chapter 8-1 Chapter 8 BUSINESS & SOCIETY Ethics and Stakeholder Management Carroll & Buchholtz 6e Business and Society: Ethics and Stakeholder Management,
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
HR: Leading People, Leading Organizations © 2006 SHRM SHRM Weekly Online Survey: September 29, 2006 Workplace Privacy Sample comprised of 442 randomly.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Social and environmental impact
MGMT 452 Corporate Social Responsibility
Information Technology
Consumer Economics Chapter 11
Archie B. Carroll Ann K. Buchholtz
CHAPTER 33 Cyberlaw.
© 2015 Cengage Learning.
© 2015 Cengage Learning.
Chapter 13 Security and Ethical Challenges.
Business Ethics and Technology
– Communication Technology in a Changing World
Computer Programming I
Computers in the Workplace
Presentation transcript:

© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations regarding technology, visit

© 2005 by Nelson, a division of Thomson Canada Limited. 2 Chapter Eight Objectives Identify the role of technology in business Understand the technological environment and its relationship to ethics Identify technological benefits and side effects Realize an appreciation of society’s fascination with technology and its impact Discuss information technology and biotechnology and their ethical implications

© 2005 by Nelson, a division of Thomson Canada Limited. 3 Characteristics of Technology Benefits of Technology Increased production of goods and services Reduced labour to produce these goods and services Reduced injuries in the workplace Increased standard of living

© 2005 by Nelson, a division of Thomson Canada Limited. 4 Characteristics of Technology Side Effects and Challenges of Technology Environmental pollution The depletion of natural resources Technological unemployment Diminished work satisfaction

© 2005 by Nelson, a division of Thomson Canada Limited. 5 Ethics and Technology Concern over the ethical use and implications of technology: –Avoid amoral applications of technology

© 2005 by Nelson, a division of Thomson Canada Limited. 6 Ethics and Technology Society’s Obsession with Technology Favour the quick fix The fear and worshiping technology Blur the distinction between what is real and fake Accept violence as normal Love technology as a toy Live our lives distanced and distracted

© 2005 by Nelson, a division of Thomson Canada Limited. 7 Ethics & Information Technology

© 2005 by Nelson, a division of Thomson Canada Limited. 8 Information Technology Two Key Impact Areas of Information Technology Electronic commerce Computer technology

© 2005 by Nelson, a division of Thomson Canada Limited. 9 Information Technology Issues Concerning Electronic Commerce Scams Invasion of privacy

© 2005 by Nelson, a division of Thomson Canada Limited. 10 Top 10 Online Scams 1.Internet Auction Fraud 2.Internet Service Provider Scams 3.Internet Web Site Design/Promotions - Web Cramming 4.Internet Information and Adult Services - Credit Card Cramming 5.Multi-level Marketing/Pyramid Scams 6.Business Opportunities and Work-At-Home Scams 7.Investment Schemes and Get-Rich-Quick Scams 8.Travel/Vacation Fraud 9.Telephone/Pay-Per-Call Solicitation Frauds (including modem dialers and videotext) 10.Health Care Frauds

© 2005 by Nelson, a division of Thomson Canada Limited. 11 E-Commerce Privacy Issues Identity theft Revealing personal information Dispersing personal information Fraudulent websites Government distribution of information Spying – by employer or spouse or stranger Cyberstalkers

© 2005 by Nelson, a division of Thomson Canada Limited. 12 E-Commerce and Government Protection The Financial Services Modernization Act FOIP Proposed legislation –Consumer Online Privacy and Disclosure Act –Online Consumer Protection Act –Unsolicited Commercial Electronic Mail Act

© 2005 by Nelson, a division of Thomson Canada Limited. 13 E-Commerce and Business Initiatives Ethical leadership Privacy policies Chief privacy officers

© 2005 by Nelson, a division of Thomson Canada Limited. 14 E-Commerce: Questionable Businesses and Practices Pornography Gambling Downloading –Napster.caNapster.ca – Monitoring technology

© 2005 by Nelson, a division of Thomson Canada Limited. 15 The Workplace and Computer Technology – The Good News The Employee’s Impression of Technology Expands job-related knowledge Increases productivity Improves communications with clients Relieves job stress

© 2005 by Nelson, a division of Thomson Canada Limited. 16 The Workplace, Computer Technology and Surveillance The Not-so-good News Types of Monitoring - and Internet usage - fax usage - workers via video camera - cell phone usage - GPS equipped vehicles

© 2005 by Nelson, a division of Thomson Canada Limited. 17 Unethical Workplace Employee Activities Engaging in dangerous activities (cell phones & vehicles don’t mix) Blaming errors on technology Copying company software for home use Accessing corporate files without permission

© 2005 by Nelson, a division of Thomson Canada Limited. 18 More Unethical Workplace Employee Activities Computer shopping Invading a co-worker’s privacy Visiting porn sites and playing games Seeking employment on company time

© 2005 by Nelson, a division of Thomson Canada Limited. 19 Ethics & Biotechnology

© 2005 by Nelson, a division of Thomson Canada Limited. 20 Biotechnology Bioethics deals with ethical issues embedded in the use of biotechnology. Proceduralism deals with elaborate protocols to ensure classical ethical dilemmas do not arise, such as informed consent.

© 2005 by Nelson, a division of Thomson Canada Limited. 21 Biotechnology Genetic Engineering Stem cell research Cloning Genetic testing and profiling

© 2005 by Nelson, a division of Thomson Canada Limited. 22 Biotechnology Genetically Modified Foods Safety issues Labelling issues

© 2005 by Nelson, a division of Thomson Canada Limited. 23 Case Study: Toxic Tacos? (p.645)