Ethics and the Conduct of Business

Slides:



Advertisements
Similar presentations
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Advertisements

MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Ethical Behavior 7-12 Conforming to moral standards or conforming to standards of conduct of profession or group Conforming to moral standards or conforming.
Business Plug-In B7 Ethics.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
3 Ethics and Privacy.
Ethics in Information Technology, Second Edition 1 Chapter 1 An Overview of Ethics.
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
METHODS IN BEHAVIORAL RESEARCH NINTH EDITION PAUL C. COZBY Copyright © 2007 The McGraw-Hill Companies, Inc.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Business Law with UCC Applications,13e
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
1 ETHICS. 2 ETHICS AND PROFESSIONAL BEHAVIOR Ethics: Standards of conduct for a profession Some issues cannot be handled by codes alone Courts may decide.
Copyright © 2012 Pearson Education, Inc. All rights reserved. Business Ethics Concepts & Cases Manuel G. Velasquez.
6 Ethics and Privacy.
Copyright © 2007 Pearson Education Canada 7-1 Chapter 7: Audit Planning and Documentation.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Employment Regulation and Labor Law.
Chapter 2 Business Ethics and Social Responsibility Learning Goals Explain the concepts of business ethics and social responsibility. Describe the factors.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Privacy Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
CHAPTER 6 Selecting Employees and Placing Them in Jobs
CHAPTER 5 ETHICS & PRIVACY.
Chapter 8 Business-Government Relations Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Business Ethics and Social Responsibility
Unit 3 Seminar.  Used to predict acceptable or unacceptable behavior  Helps to assess level of skills/knowledge/ characteristics applicants have  Reduce.
Chapter 6 Ethics and Privacy © Ilin Sergey/Age Fotostock America, Inc.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Employees and the Right to Privacy
HUMAN RESOURCE MANAGEMENT
Ethics and the Conduct of Business
Ethics and the Conduct of Business
Law Firm Data Security: What In-house Counsel Need to Know
7 Training Employees What Do I Need to Know?
Ethics and the Conduct of Business
Computer Security Fundamentals
MGMT 452 Corporate Social Responsibility
Ethics and Values for Professionals Chapter 2: Ethical Relativism
Ethics and the Conduct of Business
6 Selecting Employees and Placing Them in Jobs
Chapter 10 Cyberlaw, Social Media, and Privacy
Privacy principles Individual written policies
4 Social Responsibility of Business and Government
4 Social Responsibility of Business and Government
PowerPoint® Slides to Accompany
Chapter # 1 Overview of Ethics
E-Commerce: Regulatory, Ethical, and Social Environments
Business Ethics and Social Responsibility
4 Social Responsibility of Business and Government
Introduction to Health Privacy
INFS 452 – Computer Ethics & Society
Legislative Response to Data Inferences
CHAPTER 3 Ethics and Privacy.
IT and Society Week 2: Privacy.
Presentation transcript:

Ethics and the Conduct of Business Eighth edition Chapter 6 Privacy Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

Modules Introduction: Privacy 6.1: Challenges to Privacy 6.2: Meaning and Value of Privacy 6.3: Privacy Away from Work 6.4: Privacy of Employee Records 6.5: Big Data Analytics 6.6: Using the Internet Conclusion: Privacy Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

Learning Objectives (1 of 2) 6.1: Identify how different business practices challenge the privacy of employees in the workplace and consumers in the marketplace 6.2: Explain the concept of privacy and how the utilitarian and Kantian arguments defend privacy as a necessary right of all individuals 6.3: Evaluate the reasoning that leads a company to monitor its employees and the measures undertaken to limit such monitoring Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

Learning Objectives (2 of 2) 6.4: Determine what ethical issue(s) are associated with a particular handling or use of employee records and whether the action is justified or a violation of the employee’s privacy 6.5: Describe how big data analytics enables companies to profile and target consumers and the potential ethical issues with this process 6.6: Analyze the ethical issues associated with collecting and using information about consumers’ online activities, and the adequacy of the rules and principles created to protect Internet privacy Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

Introduction: Privacy Psychological testing at Dayton Hudson case Telecommunication companies compelled to provide information Internet the most recent challenge to privacy Government surveillance impacts the privacy of individuals Understanding of right to privacy is important Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

6.1: Challenges to Privacy Objective: Identify how different business practices challenge the privacy of employees in the workplace and consumers in the marketplace 6.1.1: Privacy in the Workplace Available tools Why do companies collect personal data? Why is evaluation important? 6.1.2: Privacy in the Marketplace Information gathering Database marketing Issues in database marketing 6.1.1: Privacy in the Workplace Point 1- Available tools Pencil-and-paper test Drug test Employer-issued mobile devices Concealed cameras Point 2- Why do companies collect personal data? Due to changing nature of work Potential for misuse and costly errors To avoid employee theft and stealing trade secrets To provide safe workplace Greater concerns create greater dangers to employee right to privacy Point 3- Why is evaluation important? For predicting job performance For identifying potentially troublesome employees For assessing if the employees meet employer expectations For determining the termination of employee during lay-offs 6.1.2: Privacy in the Marketplace Point 1- Information gathering Corporations use same tools employed for employees Consumers are the main target Point 2- Database marketing Utilization of Internet Provides tailored information Use of database marketing Internet advertising Point 3- Issues in database marketing Control over information Potential misuse Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

6.2: Meaning and Value of Privacy (1 of 2) Objective: Explain the concept of privacy and how the utilitarian and Kantian arguments defend privacy as a necessary right of all individuals 6.2.1: History of the Concept Overview Acceptance 6.2.2: Defining Privacy Right to be left alone Right to control access to personal information Having secrets remain secrets 6.2.1: History of the Concept Point 1- Overview Followed from the nineteenth century No mention in Bill of Rights 1890 article in Harvard Law Review Warren and Brandeis proposed privacy of private life Theory was rejected by court Point 2- Acceptance Privacy declared as constitutionally protected right in 1965 Griswold v. Connecticut 6.2.2: Defining Privacy Point 1- Right to be left alone Warren and Brandeis definition Critics argue it as overly broad Narrow in few situations Privacy involves information Point 2- Right to control access to personal information Control over information about ourselves Too broad and too narrow Privacy cannot be identified with control Point 3- Having secrets remain secrets Certain facts of a person are not known by others Undocumented personal information Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

6.2: Meaning and Value of Privacy (2 of 2) Objective: Explain the concept of privacy and how the utilitarian and Kantian arguments defend privacy as a necessary right of all individuals 6.2.3: Utilitarian Arguments Arguments Drawbacks 6.2.4: Kantian Arguments Two Kantian themes Common utilitarian and Kantian arguments 6.2.3: Utilitarian Arguments Point 1- Arguments Personnel decision making using inaccurate information harms the individuals Employees lives are disrupted Harm continues to occur when employees unable to examine their files Point 2- Drawbacks Appeals to consequences Rests on an unapproved assumption Assumes that more harm than good will result Considers only possible harmful consequences 6.2.4: Kantian Arguments Point 1- Two Kantian themes Autonomy Respect for persons Point 2- Common utilitarian and Kantian arguments Privacy important to dignity and well-being Privacy not absolutely necessary for either one Privacy an important value in our culture Privacy is like luxury that soon becomes necessity Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

6.3: Privacy Away from Work Objective: Evaluate the reasoning that leads a company to monitor its employees and the measures undertaken to limit such monitoring 6.3.1: Justifying Monitoring Personal behavior and ability of employees Cost of doing business 6.3.2: Limits to Monitoring Social media Ways of monitoring Limits applicable for government and business 6.3.1: Justifying Monitoring Point 1- Personal behavior and ability of employees Workers tested for drug use to provide safe workplace Drug use affects workplace performance and environment Testing for drug use benefits employer and employee Point 2- Cost of doing business Direct costs such as smoking and insurance policies Indirect costs such as using social media 6.3.2: Limits to Monitoring Point 1- Social media Employers can access information that is publicly posted Efforts are underway to limit employer use of private information Examples such as Civil Rights Act and National Labor Relations Act Point 2- Ways of monitoring Disclosing how, when, and under what circumstance monitoring takes place Collect important information about citizens Point 3- Limits applicable for government and business Must demonstrate a cause of action Ways of monitoring should be used selectively Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

6.4: Privacy of Employee Records (1 of 4) Objective: Determine what ethical issue(s) are associated with a particular handling or use of employee records and whether the action is justified or a violation of the employee’s privacy 6.4.1: Ethical Issues with Records Issues to be addressed Examples 6.4.1: Ethical Issues with Records Point 1- Issues to be addressed Kind of information collected Use to which information is put Person who accesses the information Disclosure outside the company Means of collecting information Point 2- Examples Maintaining medical records Only medical information should be collected Only people who are monitoring health and safety should have access Must use the information for intended purpose Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

Figure 6.1: Some Privacy Issues with Employee Records Services offered by data aggregators Sell access to data Offer consulting Offer mitigation services Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

6.4: Privacy of Employee Records (2 of 4) Objective: Determine what ethical issue(s) are associated with a particular handling or use of employee records and whether the action is justified or a violation of the employee’s privacy 6.4.2: Justifying a Purpose Examples Resolving disagreements 6.4.3: Disclosure to Outsiders Overview Argument 6.4.2: Justifying a Purpose Point 1- Examples  First three issues Henry Ford’s paternalistic regard was not legitimate DuPont Company screening black applicants Point 2- Resolving disagreements  Specify necessary business conditions Contract model of employer-employee relationship 6.4.3: Disclosure to Outsiders Point 1- Overview Fourth issue Employers should not disclose information without employees’ consent Information should be used for the justified purpose Employer has no justification in giving out information Point 2- Argument  Unrelated use of medical records is prohibited Neither the employer nor the employee own the information Should develop a conceptual model for personal information Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

Figure 6.2 Services offered by data aggregators Sell access to data Offer consulting Offer mitigation services Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

6.4: Privacy of Employee Records (3 of 4) Objective: Determine what ethical issue(s) are associated with a particular handling or use of employee records and whether the action is justified or a violation of the employee’s privacy 6.4.4: Gathering Information Overview More intrusive means 6.4.4: Gathering Information Point 1- Overview Use of certain means may violate an employee’s right to privacy Examples of impermissible means: polygraph testing and pretext interviews Less intrusive means are preferred Point 2- More intrusive means Conducting strip search, constant monitoring, polygraph machines Denies people in creating their own identity Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

Figure 6.3 Services offered by data aggregators Sell access to data Offer consulting Offer mitigation services Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

6.4: Privacy of Employee Records (4 of 4) Objective: Determine what ethical issue(s) are associated with a particular handling or use of employee records and whether the action is justified or a violation of the employee’s privacy 6.4.5: Accuracy, Completeness, and Access Overview Objection to drug test and polygraph machine 6.4.5: Accuracy, Completeness, and Access Point 1- Overview  Employers who maintain inaccurate files are not invading privacy Use of information in unfair ways is the issue Point 2- Objection to drug test and polygraph machine  Unreliable False results obtained in using inexpensive drug tests False results obtained when responses recorded in polygraph are due to different kind of association Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

6.5: Big Data Analytics 6.5.1: Data Collection Objective: Describe how big data analytics enables companies to profile and target consumers and the potential ethical issues with this process 6.5.1: Data Collection Methods of data collection Services provided by aggregators 6.5.2: Ethical Issues with Big Data Lack of awareness Difficulty of protection Loss of privacy 6.5.1: Data Collection Point 1- Methods of data collection Cookies Ad networks Ad networks collaborate with aggregators Point 2- Services provided by aggregators Access to data Consulting services Risk mitigation services 6.5.2: Ethical Issues with Big Data Point 1- Lack of awareness A few people are aware Occurs without much legal oversight Individuals cannot take steps to protect Consumers have little knowledge over the process Point 2- Difficulty of protection Free flow of information between different companies Opting out is not effective with all aggregators Point 3- Loss of privacy Aggregators prepare the whole picture of an individual’s identity It would become impossible for anyone to go online without their identity being known Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

6.6: Using the Internet (1 of 2) Objective: Analyze the ethical issues associated with collecting and using information about consumers’ online activities, and the adequacy of the rules and principles created to protect Internet privacy 6.6.1: Information Collection Google Criticisms of Facebook’s privacy policy 6.6.2: Ethical Issues with Internet Use Overview Two problems Three responses 6.6.1: Information Collection Point 1- Google Collect and utilize information by providing free services Integrates user information from its different services Email sent by Gmail users are used to target advertisements Google instituted a unified privacy policy in 2012 Point 2- Criticisms of Facebook’s privacy policy Information can be viewed by unauthorized users Privacy settings are improper Targets advertisements based on user information Registration protocols help in gaining information away from its own site 6.6.2: Ethical Issues with Internet Use Point 1- Overview Internet is a public arena Many practices of Internet companies violate our rights We give up information to enjoy the benefit Loss of privacy is a trade-off voluntarily made Point 2- Two problems Confining profiles Threat to equality Point 3- Three responses First response made by those who worry about “dossier” society Second response made by those who view personal data as property Third response made by those who want to balance people’s concerns about privacy Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

6.6: Using the Internet (2 of 2) Objective: Analyze the ethical issues associated with collecting and using information about consumers’ online activities, and the adequacy of the rules and principles created to protect Internet privacy 6.6.3: Protecting Privacy Privacy rules Protection principles Implementing principles 6.6.3: Protecting Privacy Point 1- Privacy rules Fair information practices Organization for Economic Cooperation and Development European Union Privacy Directive United States preferred piecemeal legal response California codified the Online Privacy Act Point 2- Protection principles Notice/awareness Choice/consent Access/participation Integrity/security Enforcement/redress Point 3- Implementing principles Internet presents unique challenge in implementation Who should be involved in implementing privacy standards? What means should be used while implementing? Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved

Conclusion: Privacy Privacy a recent topic Finding the right means is a challenge Protecting privacy requires coordinated solution Developing and implementing is a challenge until solutions are found Copyright © 2017, 2012, 2009 Pearson Education, Inc. All Rights Reserved