1 Business Ethics and Technology Chapter 9 Professor Craig Diamond BA 385 October 28, 2009.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Business & Society Business & Society Ethics, Sustainability, and Stakeholder Management Eighth Edition Archie B. Carroll Ann K. Buchholtz © 2012 South-Western,
1 Business Ethics and Technology Business and Society: Ethics and Stakeholder Management, 7e Carroll & Buchholtz Copyright ©2009 by South-Western, a division.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Business ethics and technology Technology advances quicker than society government or business can grasp its consequences or ethics. Privacy invasion through.
4-1. Business in a Changing World McGraw-Hill/Irwin Copyright © 2009 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Managing Information.
© 2009 South-Western, Cengage LearningMARKETING 1 Chapter 2 SOCIALLY RESPONSIVE MARKETING 2-1The Impact of Marketing 2-2Criticisms of Marketing 2-3Increasing.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
1 Business Ethics and Technology Business and Society: Ethics and Stakeholder Management, 7e Carroll & Buchholtz Copyright ©2009 by South-Western, a division.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Chapter 10 Technology Issues
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
3 Ethics and Privacy.
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
E-Commerce: Regulatory, Ethical, and Social Environments
J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
© 2015 Cengage Learning1. Chapter 9 Business Ethics and Technology © 2015 Cengage Learning2.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Business & Society Business & Society Ethics, Sustainability, and Stakeholder Management Eighth Edition Archie B. Carroll Ann K. Buchholtz © 2012 South-Western,
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
C4- Social, Legal, and Ethical Issues in the Digital Firm
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computer Programming I
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CHAPTER 10 Technology Issues.
Unethical use of Computers and Networks
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
Lecture 8 Ethics in Information Technology,
Computer Ethics Chapter 14 – Computers: Understanding Technology.
CHAPTER 17 INTERNATIONAL MARKETING IN E-COMMERCE.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Ethical and Legal Issues in Educational Technology Professional Educator Diploma Graduate School of Education – American University in Cairo (AUC) Spring.
Chapter 8-1 Chapter 8 BUSINESS & SOCIETY Ethics and Stakeholder Management Carroll & Buchholtz 6e Business and Society: Ethics and Stakeholder Management,
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Social and environmental impact
PRIVACY AND SECURITY (CCI410) PERTEMUAN 5 IR. NIZIRWAN ANWAR, MT
Archie B. Carroll Ann K. Buchholtz
Five Unethical Uses of Computers
E-Commerce: Regulatory, Ethical, and Social Environments
© 2015 Cengage Learning.
© 2015 Cengage Learning.
Business Ethics and Technology
– Communication Technology in a Changing World
Computer Programming I
INFS 452 – Computer Ethics & Society
Presentation transcript:

1 Business Ethics and Technology Chapter 9 Professor Craig Diamond BA 385 October 28, 2009

2 Outline of Topics  Technology and the Technological Environment  Technology Benefits and Downsides  Ethics and Technology  Information Technology E-commerce (focus on privacy issues) Computers in the workplace  Biotechnology Genetic engineering Genetically modified foods

3 Technology and the Technological Environment Technology The totality of the means employedto provide objects necessary forhuman sustenance and comfort Technological environment – one of the four segments of the macroenvironment (Ch.1) in society (other three are social, economic, political)

4 Benefits of Technology  Increased production of goods and services  Reduced amount of labor needed to produce goods and services  Made labor easier and safer  Increased productivity  Increased standard of living  Increased life expectancy

5 Side Effects and Challenges of Technology  Environmental pollution  Depletion of natural resources  Technological unemployment machines replacing humans  Creation of unsatisfying jobs Monotonous tasks, and handling data rather than actual things

6 Ethics and Technology Key Issues Technological Determinism Ethical Lag

7 Society’s Intoxication with Technology 1. We need the quick fix 2. We fear and worship technology 3. We blur the distinction between what is real and fake 4. We accept violence as normal 5. We love technology as a toy 6. We live our lives distanced and distracted From the book, High Tech, High Touch...

8 Electronic Commerce Key Issues in e-Commerce Ethics  Access (“Digital Divide”)  Intellectual property  Privacy and informed consent  Protection of children  Security of information 90% of e-commerce is business-to-business

9 Potential Threats to Privacy Posed by the Internet  Identity theft  Unintentionally revealing information  Lost / stolen personal information  Fake Web sites  Government distribution of information  Broadcasting information over the Internet  Victim of spying  Cyberstalker 2001 public poll: 24% of consumers were “very concerned” and 49% “somewhat concerned” about Internet privacy.

10 Invasion of Privacy Posed by the Internet  Cookies 2001 poll: only 10% of users blocked cookies, and over 50% did not know what cookies were  Spam  Identity Theft

11  Governing legislation Financial Services Modernization Act of 1999 Fair Credit Reporting Act Children’s Online Privacy Protection Act  1999 Act Included “opt-out” Many groups lobbied for “opt-in” Many intentional barriers to “opt-out”  Federal Trade Commission Main agency that deals with consumer privacy issues Government’s Involvement

12 Business Initiatives to Protect Privacy Ethical leadership Privacy policies Chief privacy officers Data security Protecting privacy of customers...

13  Pornography  Gambling  Web-based music services  Downloading movies and other intellectual property  Monitoring technology  “Phishing” Questionable Businesses and Practices

14 Employee Views of Technology is Positive The Workplace and Computer Technology  Expands job-related knowledge  Increases productivity during work and commuting times  Improves communication with clients and customers  Relieves job stress  Improved time management  Expanded professional networks  Development of a competitive edge  Balance of work and family needs

15 Surveillance Computers  Monitoring website employee computer files  Blocking access to inappropriate websites  Storing and reviewing Telephone  Monitoring time spent, numbers called  Taping phone conversations Video  Video surveillance against theft  Video surveillance to monitor employee performance

16 Driving while Using Cell Phone  Many studies have shown it is dangerous  Should companies have policies that limit or prohibit cell phone use while driving?

17 Unethical Employee Activities  Created a dangerous situation by using new technology while driving (19%)  Blamed error on technological glitch (14%)  Copied company software for home use (13%)  Used office equipment to shop on the Internet (13%)  Used office equipment to search for job (11%)  Accessed private files without permission (6%)  Intruded on co-workers’ privacy (6%)  Visited porn Web sites (5%) Survey results...

18 Biotechnology Bioethics Ethical issues related tothe use of biotechnology

19 Realms of Biotechnology Genetically Modified Foods Genetic Engineering

20 Genetic Engineering Stem cell research Cloning Genetic testing and profiling

21 Stem Cell Research  Controversy surrounds the use of embryonic stem cells in research involves destruction of human embryo  Bush Administration severely limited research using embryonic stem cells, even though public opinion favored it  Obama issued executive order reversing Bush decision (March 2009)

22 Cloning  Animal and plant cloning Cloning animals for food is controversial  Human cloning (controversial) Therapeutic cloning – used to create stem cells as source of replacement tissue Fear of two class society – those who can afford to be “perfected” and those that cannot

23 Genetic Testing and Profiling  Involves having DNA information on people potential for invasion of privacy in how the information can be used

24 Genetically Modified Foods Safety issues Labeling issues