1 Business Ethics and Technology Business and Society: Ethics and Stakeholder Management, 7e Carroll & Buchholtz Copyright ©2009 by South-Western, a division.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Business & Society Business & Society Ethics, Sustainability, and Stakeholder Management Eighth Edition Archie B. Carroll Ann K. Buchholtz © 2012 South-Western,
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Business ethics and technology Technology advances quicker than society government or business can grasp its consequences or ethics. Privacy invasion through.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 Business Ethics and Technology Business and Society: Ethics and Stakeholder Management, 7e Carroll & Buchholtz Copyright ©2009 by South-Western, a division.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Business Plug-In B7 Ethics.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
1 Business Ethics and Technology Chapter 9 Professor Craig Diamond BA 385 October 28, 2009.
E-Commerce: Regulatory, Ethical, and Social Environments
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
© 2015 Cengage Learning1. Chapter 9 Business Ethics and Technology © 2015 Cengage Learning2.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Business & Society Business & Society Ethics, Sustainability, and Stakeholder Management Eighth Edition Archie B. Carroll Ann K. Buchholtz © 2012 South-Western,
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
Digital Citizenship By: Miranda Scorver.
PART THREE E-commerce in Action Norton University E-commerce in Action.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computer Programming I
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Internet Security & Safety. What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits.
CHAPTER 10 Technology Issues.
Unethical use of Computers and Networks
Lecture 8 Ethics in Information Technology,
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Federal Agencies and Laws for Consumer Rights
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Chapter 8-1 Chapter 8 BUSINESS & SOCIETY Ethics and Stakeholder Management Carroll & Buchholtz 6e Business and Society: Ethics and Stakeholder Management,
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Chapter 17-1 Chapter 17 BUSINESS & SOCIETY Ethics and Stakeholder Management Carroll & Buchholtz 6e Business and Society: Ethics and Stakeholder Management,
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Learn how to protect yourself against common attacks
Archie B. Carroll Ann K. Buchholtz
CHAPTER 33 Cyberlaw.
Protect Your Computer Against Harmful Attacks!
Five Unethical Uses of Computers
E-Commerce: Regulatory, Ethical, and Social Environments
© 2015 Cengage Learning.
© 2015 Cengage Learning.
Business Ethics and Technology
Computer Programming I
Social Issues in Computing
Social Issues in Computing
INFS 452 – Computer Ethics & Society
Security in mobile technologies
Presentation transcript:

1 Business Ethics and Technology Business and Society: Ethics and Stakeholder Management, 7e Carroll & Buchholtz Copyright ©2009 by South-Western, a division of Cengage Learning. All rights reserved Prepared by Deborah Baker Texas Christian University Chapter 9

2 Quote of the Day  It has become appallingly obvious that our technology has exceeded our humanity. ~Albert Einstein

3 Technology and the Technological Environment Technology The totality of the means employedto provide objects necessary forhuman sustenance and comfort

4 Characteristics of Technology Benefits of Technology  Increased production of goods and services  Reduced amount of labor needed to produce goods and services  Made labor easier and safer  Increased productivity  Increased standard of living  Increased life expectancy

5 Side Effects of Technology Side Effects and Challenges of Technology  Environmental pollution  Depletion of natural resources  Technological unemployment  Creation of unsatisfying jobs

6 Ethics and Technology Key Issues Technological Determinism Ethical Lag

7 Symptoms of Society’s Intoxication with Technology 1. We favor the quick fix 2. We fear and worship technology 3. We blur the distinction between what is real and fake 4. We accept violence as normal 5. We love technology as a toy 6. We live our lives distanced and distracted Find the Right Balance!

8 Information Technology Biotechnology Electronic Commerce Computer technology in the workplace Information Technology

9 Electronic Commerce Key Issues in e-Commerce Ethics  Access  Intellectual property  Privacy and informed consent  Protection of children  Security of information  Trust

10 Potential Threats to Privacy Posed by the Internet  Identity theft  Unintentionally revealing information  Lost / stolen personal information  Fake Web sites  Government distribution of information  Broadcasting information over the Internet  Victim of spying  Cyberstalker Figure 9-1

11  Creating a national Do-Not-Call List  Beefing up enforcement against spam  Helping victims of identity theft  Stopping pretexting  Encouraging accuracy in credit reporting and compliance with Fair Credit Reporting Act  Enforcing privacy promises  Increasing enforcement and outreach on children’s online privacy  Encouraging consumers’ privacy complaints  Enforcing the telemarketing sales rules  Restricting use of pre-acquired account information  Enforcing Gramm-Leach-Bliley Act  Holding workshops Privacy Agenda of the FTC Figure 9-2

12 Business Initiatives to Protect Privacy Ethical leadership Privacy policies Chief privacy officers Data security

13  Pornography  Gambling  Web-based music services  Intellectual property  Monitoring technology  “Phishing” Questionable Businesses and Practices

14 Phishing “trip”  May 19th 2008 International 'Phishing' Scam Busted A Romanian-based organized crime ring aimed at defrauding Internet users of Social Security and credit card data has been busted, resulting in charges against 38 people, officials said Monday. The so-called phishing scams sought to rip off thousands of consumers and hundreds of financial institutions, according to indictments unsealed in Los Angeles and New Haven, Conn. The two related cases marked the latest example of what the Justice Department describes as a growing worldwide threat posed by organized crime. The practice known as phishing typically involves sending fraudulent s that include links directing recipients to fake Web sites where they are asked to input sensitive data. Phishers may also include attachments that, when clicked, secretly install "spyware" that can capture personal information and send it to third parties over the Internet.

15 Employee Impression of Technology The Workplace and Computer Technology  Expands job-related knowledge  Increases productivity during work and commuting times  Improves communication with clients and customers  Relieves job stress  Improved time management  Expanded professional networks  Development of a competitive edge  Balance of work and family needs

16 Surveillance Computers  Monitoring website employee computer files  Blocking access to inappropriate websites  Storing and reviewing Telephone  Monitoring time spent, numbers called  Taping phone conversations Video  Video surveillance against theft  Video surveillance to monitor employee performance

17 Unethical Employee Activities  Created a dangerous situation by using new technology while driving  Blamed error on technological glitch  Copied company software for home use  Used office equipment to shop on the Internet  Used office equipment to search for job  Accessed private files without permission  Intruded on co-workers’ privacy  Visited porn Web sites

18 Ten Commandments of Computer Ethics Figure 9-3

19 Biotechnology Bioethics A field that has emerged to dealwith ethical issues embedded inthe use of biotechnology Proceduralism The use of elaborate protocols toensure that classical safeguards,such as informed consent, are notviolated

20 Examples: Genetic Engineering Human Ear

21 Cloned Kitty $50K kitten

22 Cost to USA  (map of stem cell centers and policies)  Leading centers: South Korea (Dog), China…. Jerusalem…

23 Realms of Biotechnology Genetically Modified Foods Genetic Engineering

24 Biotechnology: Genetically Modified Foods

25 Genetic Engineering Stem cell research Cloning Genetic testing and profiling

26 Genetically Modified Foods Safety issues Labeling issues