Upload
shelly38
View
366
Download
0
Tags:
Embed Size (px)
Citation preview
1
Business Ethics and Technology
Business and Society: Ethics and Stakeholder Management, 7e • Carroll & BuchholtzCopyright ©2009 by South-Western, a division of Cengage Learning. All rights reserved
Prepared by Deborah BakerTexas Christian University
Chapter 9
2
Chapter 9 Outline
Technology and the Technological Environment Characteristics of Technology Ethics and Technology Information Technology Biotechnology
3
Technology and the Technological Environment
TechnologyThe totality of the means employed to provide objects necessary for human sustenance and comfort
4
Characteristics of Technology
Benefits of Technology
Increased production of goods and services Reduced amount of labor needed to produce
goods and services Made labor easier and safer Increased productivity Increased standard of living Increased life expectancy
5
Side Effects of Technology
Side Effects and Challenges of Technology
Environmental pollution Depletion of natural resources Technological unemployment Creation of unsatisfying jobs
http://www.ethix.org@
6
Ethics and Technology
Key IssuesKey Issues
Technological Determinism – “What can be developed will be developed.”
Ethical Lag – Occurs when the speed of technological
change far exceeds that of ethical development.
7
Symptoms of Society’s Intoxication with Technology
1. We favor the quick fix
2. We fear and worship technology
3. We blur the distinction between what is real and fake
4. We accept violence as normal
5. We love technology as a toy
6. We live our lives distanced and distracted
Find the Right Balance!
8
Information Technology
BiotechnologyBiotechnology
Electronic CommerceElectronic Commerce
Computer technologyin the workplace
Computer technologyin the workplace
Information TechnologyInformation Technology
9
Electronic Commerce
Key Issues in e-Commerce Ethics
Access Intellectual property Privacy and informed consent Protection of children Security of information Trust
10
Potential Threats to PrivacyPosed by the Internet
Identity theft Unintentionally revealing information Lost / stolen personal information Fake Web sites Government distribution of information Broadcasting information over the Internet Victim of spying Cyberstalker
Figure 9-1
11
Invasion of PrivacyPosed by the Internet
Cookies: Identification tags that websites drop on our personal computer hard drives so they can recognize repeat visitors.
Spam: Unsolicited commercial email.
Identity Theft: Tampering with one’s financial accounts.
12
The Financial Services Modernization Act of 1999
Governing legislation• Financial Services Modernization Act• Fair Credit Reporting Act• Children’s Online Privacy Protection Act
Government’s Involvement
13
Creating a national Do-Not-Call List
Beefing up enforcement against spam
Helping victims of identity theft
Encouraging consumers’ privacy complaints
Enforcing the telemarketing sales rules
Privacy Agenda of the FTC
Figure 9-2
14
Business Initiatives to Protect Privacy
Ethical leadershipEthical leadership
Privacy policiesPrivacy policies
Chief privacy officersChief privacy officers
Data securityData security
15
Pornography Gambling Web-based music services Intellectual property Monitoring technology “Phishing”
Questionable Businesses and Practices
16
Employee Impression of Technology Employee Impression of Technology
The Workplace and Computer Technology
Expands job-related knowledge
Increases productivity during work and commuting times
Improves communication with clients and customers
Relieves job stress
Improved time management
Expanded professional networks
Development of a competitive edge
Balance of work and family needs
17
Surveillance
Computers
Monitoring website employee computer files Blocking access to inappropriate websites Storing and reviewing e-mail
Telephone
Monitoring time spent, numbers called Taping phone conversations
Video
Video surveillance against theft Video surveillance to monitor employee performance
18
Unethical Employee Activities
Created a dangerous situation by using new technology while driving
Copied company software for home use
Used office equipment to shop on the Internet
Used office equipment to search for job
Accessed private files without permission
Intruded on co-workers’ privacy
Visited porn Web sites
19
Biotechnology
BioethicsA field that has emerged to deal with ethical issues embedded in the use of biotechnology
Proceduralism
The use of elaborate protocols to ensure that classical safeguards, such as informed consent, are notviolated
20
Realms of Biotechnology
GeneticallyModified Foods
GeneticallyModified Foods
Genetic EngineeringGenetic Engineering
21
Genetic Engineering
Stem cell researchStem cell research
CloningCloning
Genetic testing and profilingGenetic testing and profiling
22
Genetically Modified Foods
Safety issuesSafety issues
Labeling issuesLabeling issues