Download presentation
Presentation is loading. Please wait.
Published byReina Woolson Modified over 9 years ago
1
Business & Society Business & Society Ethics, Sustainability, and Stakeholder Management Eighth Edition Archie B. Carroll Ann K. Buchholtz © 2012 South-Western, a part of Cengage Learning 1
2
Chapter 9 Business Ethics and Technology © 2012 South-Western, a part of Cengage Learning 2
3
Learning Outcomes © 2012 South-Western, a part of Cengage Learning 1.Identify the role that technology plays in our business lives. 2.Gain an understanding of the technological environment and the characteristics of technology that influence business ethics and stakeholders. 3.Identify the benefits and side effects of technology in business. 4.Gain an appreciation of society’s intoxication with technology and the consequences of this intoxication. 5.Learn to differentiate between information technology and biotechnology and their ethical implications for management. 6.Identify the ethical issues involved in biotechnology and present arguments on both sides of the issues. 3
4
Chapter Outline Technology and the Technological Environment Characteristics of Technology Technology and Ethics Information Technology Biotechnology Summary Key Terms 4 © 2012 South-Western, a part of Cengage Learning
5
Technology The new generation of young people is called the iGeneration– technology is part of their DNA. Young people have no technological off switch New technologies to benefit businesses like social networking Security issues like in-store surveillance cameras to monitor customers © 2012 South-Western, a part of Cengage Learning 5
6
Technology and the Technological Environment Technology The totality of the means employed to provide objects necessary for human sustenance and comfort. A scientific method used to achieve a practical purpose. Technological environment The total set of technology-based advancements or progress taking place in society. 6 © 2012 South-Western, a part of Cengage Learning
7
Characteristics of Technology Benefits of Technology Increase production of goods and services Reduce amount of labor needed to produce goods and services Make labor easier and safer Increased productivity Higher standard of living Increased life expectancy It can be difficult to spread the benefits of technology beyond the developed world. 7 © 2012 South-Western, a part of Cengage Learning
8
Challenges of Technology Side Effects of Technology Environmental pollution Depletion of natural resources Technological unemployment Creation of unsatisfying jobs 8 © 2012 South-Western, a part of Cengage Learning
9
Technology and Ethics Two Key Issues Technological determinism What can be developed will be developed. Ethical lag Occurs when the speed of technological change far exceeds that of ethical development. 9 © 2012 South-Western, a part of Cengage Learning
10
Symptoms of Society’s Technology Intoxication 1.We favor the quick fix. 2.We fear and worship technology. 3.We blur the distinction between what is real and fake. 4.We accept violence as normal. 5.We love technology as a toy. 6.We live our lives distanced and distracted. Find the right balance! 10 © 2012 South-Western, a part of Cengage Learning
11
Information Technology 11 © 2012 South-Western, a part of Cengage Learning
12
Electronic Commerce Electronic commerce Also called e-commerce, e-business, or Web- based marketing. The Internet has reshaped the way business is conducted. Key issues in e-commerce ethics Access Intellectual property Privacy and informed consent Protection of children Security of information Trust 12 © 2012 South-Western, a part of Cengage Learning
13
Invasion of Privacy via E-Commerce Identity theft Unintentionally revealing information Lost/stolen personal information Fake Web sites Government distribution of information Broadcasting information over the Internet Victim of spying Cyberstalking 13 © 2012 South-Western, a part of Cengage Learning
14
Invasion of Privacy via E-Commerce (continued) Cookies Identification tags that Web sites drop on our personal computer hard drives so they can recognize repeat visitors the next time we visit their Web sites. Spam Unsolicited commercial e-mail. It is sent through "open-relays" to millions of persons. Identity Theft Tampering with one’s financial accounts. 14 © 2012 South-Western, a part of Cengage Learning
15
Government’s Involvement The Financial Services Modernization Act of 1999 Made it possible for consumers to get all financial services from one company. Convenient, but empowered these companies to develop detailed portraits of their customers Other legislation FTC Act Gramm-Leach-Bliley Act Fair Credit Reporting Act Children’s Online Privacy Protection Act The government has been criticized for not doing enough to protect consumers. 15 © 2012 South-Western, a part of Cengage Learning
16
Business Initiatives with Privacy Protection 16 © 2012 South-Western, a part of Cengage Learning
17
Questionable Businesses and Practices Electronic commerce has made possible many questionable businesses and practices. Pornography Gambling Illegal Web-based downloading of music, movies, books, and other copyrighted materials Problems with intellectual property protection Monitoring technology “Phishing” 17 © 2012 South-Western, a part of Cengage Learning
18
The Workplace and Computer Technology Employees generally like technology in the workplace Expands job-related knowledge Increases productivity during normal work hours and commuting time Improves communication with clients and customers Relieves job stress Improved time management Expanded professional networks Development of a competitive edge Balance of work and family needs 18 © 2012 South-Western, a part of Cengage Learning
19
Surveillance Surveillance raises questions about privacy violations. Computers Monitoring website connections Storing and reviewing employee computer files Blocking access to inappropriate websites Telephone Monitoring time spent, numbers called Taping phone conversations Video Video surveillance against theft Surveillance to monitor employee performance 19 © 2012 South-Western, a part of Cengage Learning
20
Social Media and Surveillance Employers may monitor social media usage and check employee’s social media pages. Some employers even monitor employees’ Internet access from hotel rooms while on business trips. Employees have been terminated: After employers read their Facebook and MySpace pages. For posting inappropriate videos on websites like YouTube. 20 © 2012 South-Western, a part of Cengage Learning
21
Biometrics The use of body measurements, such as eye scans, fingerprints, or palm prints for determining and confirming identity. An explosion of applications in the commercial use of biometrics. Not much focus on the legal ethical risks yet. 21 © 2012 South-Western, a part of Cengage Learning
22
Unethical Employee Activities Related to Technology Created a dangerous situation by using new technology while driving Wrongly blamed error on technological glitch Copied company software for home use Used office equipment to shop on the Internet Used office equipment to search for job Accessed private files without permission Intruded on co-workers’ privacy Visited porn Web sites 22 © 2012 South-Western, a part of Cengage Learning
23
Ten Commandments of Computer Ethics 23 © 2012 South-Western, a part of Cengage Learning
24
Biotechnology Involves using biology to discover, develop, manufacture, market, and sell products and services. Bioethics A field that deals with the ethical issues embedded in the commercial use of biotechnology. Proceduralism is a primary tool for bioethicists. It is using protocols to ensure that classical safeguards are not violated. 24 © 2012 South-Western, a part of Cengage Learning
25
Realms of Biotechnology 25 © 2012 South-Western, a part of Cengage Learning Genetic Engineering Genetically Modified Foods
26
Genetic Engineering 26 © 2012 South-Western, a part of Cengage Learning
27
Genetically Modified Foods Also referred to as genetically engineered foods (GEFs). Fear over health and environmental effects. Major U.S. crops that are genetically modified: Sugar beets (95%) Soybeans (91%) Cotton (88%) Corn (85%) Most Americans consume genetically modified foods every day. 27 © 2012 South-Western, a part of Cengage Learning
28
Labeling of GMFs One of the most frequently discussed issues with GMFs is labeling. FDA does not mandate GMF labeling in the U.S. The Non-GMO Project believes that people have the right to make informed choices about whether they consume GMF products. 28 © 2012 South-Western, a part of Cengage Learning
29
Key Terms Bioethics Biometrics Biotechnology Chief Privacy Officer Cloning Cookies Electronic commerce Embryonic stems cells Ethical lag Genetic engineering Genetic profiling Genetic testing Genetically engineered foods (GEFs) Genetically modified foods (GMFs) Information technology Phishing Spam Surveillance Technological determinism Technological environment Technology Therapeutic cloning © 2012 South-Western, a part of Cengage Learning 29
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.