Business & Society Ethics, Sustainability, and Stakeholder Management Eighth Edition Archie B. Carroll Ann K. Buchholtz © 2012 South-Western, a part of Cengage Learning 1 Chapter 9 Business Ethics and Technology © 2012 South-Western, a part of Cengage Learning 2 Learning Outcomes 1. Identify the role that technology plays in our business lives. 2. Gain an understanding of the technological environment and the characteristics of technology that influence business ethics and stakeholders. 3. Identify the benefits and side effects of technology in business. 4. Gain an appreciation of society’s intoxication with technology and the consequences of this intoxication. 5. Learn to differentiate between information technology and biotechnology and their ethical implications for management. 6. Identify the ethical issues involved in biotechnology and present arguments on both sides of the issues. © 2012 South-Western, a part of Cengage Learning 3 Chapter Outline • • • • • • • Technology and the Technological Environment Characteristics of Technology Technology and Ethics Information Technology Biotechnology Summary Key Terms © 2012 South-Western, a part of Cengage Learning 4 Technology The new generation of young people is called the iGeneration– technology is part of their DNA. • Young people have no technological off switch • New technologies to benefit businesses like social networking • Security issues like in-store surveillance cameras to monitor customers © 2012 South-Western, a part of Cengage Learning 5 Technology and the Technological Environment Technology • The totality of the means employed to provide objects necessary for human sustenance and comfort. • A scientific method used to achieve a practical purpose. Technological environment • The total set of technology-based advancements or progress taking place in society. © 2012 South-Western, a part of Cengage Learning 6 Characteristics of Technology Benefits of Technology Increase production of goods and services Reduce amount of labor needed to produce goods and services Make labor easier and safer Increased productivity Higher standard of living Increased life expectancy It can be difficult to spread the benefits of technology beyond the developed world. © 2012 South-Western, a part of Cengage Learning 7 Challenges of Technology Side Effects of Technology Environmental pollution Depletion of natural resources Technological unemployment Creation of unsatisfying jobs © 2012 South-Western, a part of Cengage Learning 8 Technology and Ethics Two Key Issues • Technological determinism • What can be developed will be developed. • Ethical lag • Occurs when the speed of technological change far exceeds that of ethical development. © 2012 South-Western, a part of Cengage Learning 9 Symptoms of Society’s Technology Intoxication 1. We favor the quick fix. 2. We fear and worship technology. 3. We blur the distinction between what is real and fake. 4. We accept violence as normal. 5. We love technology as a toy. 6. We live our lives distanced and distracted. Find the right balance! © 2012 South-Western, a part of Cengage Learning 10 Information Technology Electronic commerce Information Technology Computer technology in the workplace Biotechnology © 2012 South-Western, a part of Cengage Learning 11 Electronic Commerce Electronic commerce • • Also called e-commerce, e-business, or Webbased marketing. The Internet has reshaped the way business is conducted. Key issues in e-commerce ethics Access Intellectual property Privacy and informed consent Protection of children Security of information Trust © 2012 South-Western, a part of Cengage Learning 12 Invasion of Privacy via E-Commerce • Identity theft • Unintentionally revealing information • Lost/stolen personal information • Fake Web sites • Government distribution of information • Broadcasting information over the Internet • Victim of spying • Cyberstalking © 2012 South-Western, a part of Cengage Learning 13 Invasion of Privacy via E-Commerce (continued) Cookies • Identification tags that Web sites drop on our personal computer hard drives so they can recognize repeat visitors the next time we visit their Web sites. Spam • Unsolicited commercial e-mail. It is sent through "open-relays" to millions of persons. Identity Theft • Tampering with one’s financial accounts. © 2012 South-Western, a part of Cengage Learning 14 Government’s Involvement The Financial Services Modernization Act of 1999 • Made it possible for consumers to get all financial services from one company. • Convenient, but empowered these companies to develop detailed portraits of their customers Other legislation • • • • FTC Act Gramm-Leach-Bliley Act Fair Credit Reporting Act Children’s Online Privacy Protection Act The government has been criticized for not doing enough to protect consumers. © 2012 South-Western, a part of Cengage Learning 15 Business Initiatives with Privacy Protection Ethical leadership Privacy policies Chief privacy officers Data security © 2012 South-Western, a part of Cengage Learning 16 Questionable Businesses and Practices Electronic commerce has made possible many questionable businesses and practices. Pornography Gambling Illegal Web-based downloading of music, movies, books, and other copyrighted materials Problems with intellectual property protection Monitoring technology “Phishing” © 2012 South-Western, a part of Cengage Learning 17 The Workplace and Computer Technology Employees generally like technology in the workplace Expands job-related knowledge Increases productivity during normal work hours and commuting time Improves communication with clients and customers Relieves job stress Improved time management Expanded professional networks Development of a competitive edge Balance of work and family needs © 2012 South-Western, a part of Cengage Learning 18 Surveillance Surveillance raises questions about privacy violations. Computers • • • Monitoring website connections Storing and reviewing employee computer files Blocking access to inappropriate websites Telephone • • Monitoring time spent, numbers called Taping phone conversations Video • • Video surveillance against theft Surveillance to monitor employee performance © 2012 South-Western, a part of Cengage Learning 19 Social Media and Surveillance • Employers may monitor social media usage and check employee’s social media pages. • Some employers even monitor employees’ Internet access from hotel rooms while on business trips. • Employees have been terminated: After employers read their Facebook and MySpace pages. For posting inappropriate videos on websites like YouTube. © 2012 South-Western, a part of Cengage Learning 20 Biometrics Biometrics • The use of body measurements, such as eye scans, fingerprints, or palm prints for determining and confirming identity. • An explosion of applications in the commercial use of biometrics. Not much focus on the legal ethical risks yet. © 2012 South-Western, a part of Cengage Learning 21 Unethical Employee Activities Related to Technology Created a dangerous situation by using new technology while driving Wrongly blamed error on technological glitch Copied company software for home use Used office equipment to shop on the Internet Used office equipment to search for job Accessed private files without permission Intruded on co-workers’ privacy Visited porn Web sites © 2012 South-Western, a part of Cengage Learning 22 Ten Commandments of Computer Ethics © 2012 South-Western, a part of Cengage Learning 23 Biotechnology Biotechnology • Involves using biology to discover, develop, manufacture, market, and sell products and services. Bioethics • A field that deals with the ethical issues embedded in the commercial use of biotechnology. • Proceduralism is a primary tool for bioethicists. It is using protocols to ensure that classical safeguards are not violated. © 2012 South-Western, a part of Cengage Learning 24 Realms of Biotechnology Genetic Engineering Genetically Modified Foods © 2012 South-Western, a part of Cengage Learning 25 Genetic Engineering Stem cell research Cloning Genetic testing and profiling © 2012 South-Western, a part of Cengage Learning 26 Genetically Modified Foods • Also referred to as genetically engineered foods (GEFs). • Fear over health and environmental effects. • Major U.S. crops that are genetically modified: • • • • Sugar beets (95%) Soybeans (91%) Cotton (88%) Corn (85%) Most Americans consume genetically modified foods every day. © 2012 South-Western, a part of Cengage Learning 27 Labeling of GMFs • One of the most frequently discussed issues with GMFs is labeling. • FDA does not mandate GMF labeling in the U.S. • The Non-GMO Project believes that people have the right to make informed choices about whether they consume GMF products. © 2012 South-Western, a part of Cengage Learning 28 Key Terms • • • • • • • • • • • • • Bioethics Biometrics Biotechnology Chief Privacy Officer Cloning Cookies Electronic commerce Embryonic stems cells Ethical lag Genetic engineering Genetic profiling Genetic testing Genetically engineered foods (GEFs) • Genetically modified foods (GMFs) • Information technology • Phishing • Spam • Surveillance • Technological determinism • Technological environment • Technology • Therapeutic cloning © 2012 South-Western, a part of Cengage Learning 29