54
Ethical Challenges in Management

1 Ethical Challenges in Management. 2 Ethical Responsibility The use of IT presents major security challenges, poses serious ethical questions, and

Embed Size (px)

Citation preview

Page 1: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

1

Ethical Challenges in Management

Page 2: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

2

Ethical Responsibility

The use of IT presents major security challenges, poses serious ethical questions, and affects society in significant ways.

IT raises ethical issues in the areas of..CrimePrivacyIndividualityEmployment HealthWorking conditions

Page 3: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

3

Ethical Responsibility (continued)

But, IT has had beneficial results as well.

So as managers, it is our responsibility to minimize the detrimental effects and optimize the beneficial effects.

Page 4: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

4

Ethical Responsibility (continued)

Business EthicsBasic categories of ethical issues

Employee privacySecurity of company recordsWorkplace safety

Page 5: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

5

Ethical Responsibility (continued)

Theories of corporate social responsibilityStockholder theory

Managers are agents of the stockholders. Their only ethical responsibility is to increase profit without violating the law or engaging in fraud

Page 6: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

6

Ethical Responsibility (continued)

Theories of corporate social responsibility (continued)Social Contract Theory

Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract

Page 7: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

7

Ethical Responsibility (continued)

Theories of corporate social responsibility (continued)

First condition – companies must enhance economic satisfaction of consumers and employees

Second condition – avoid fraudulent practices, show respect for employees as human beings, and avoid practices that systematically worsen the position of any group in society

Page 8: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

8

Ethical Responsibility (continued)

Theories of corporate social responsibility (continued)Stakeholder theory

Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders.StockholdersEmployeesCustomersSuppliersLocal community

Page 9: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

9

Ethical Responsibility (continued)

Theories of corporate social responsibility (continued)

Sometimes stakeholders are considered to includeCompetitorsGovernment agencies and special

interest groupsFuture generations

Page 10: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

10

Ethical Responsibility (continued)

Technology EthicsFour Principles

ProportionalityGood must outweigh any harm or riskMust be no alternative that achieves the

same or comparable benefits with less harm or risk

Page 11: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

11

Ethical Responsibility (continued)

Technology Ethics (continued)Informed consent

Those affected should understand and accept the risks

JusticeBenefits and burdens should be

distributed fairly

Page 12: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

12

Ethical Responsibility (continued)

Technology Ethics (continued)Minimized Risk

Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk

Page 13: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

13

Ethical Responsibility (continued)

Ethical Guidelines

Page 14: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

14

Ethical Responsibility (continued)

Ethical guidelines (continued)Responsible end users

Act with integrityIncrease their professional competenceSet high standards of personal

performanceAccept responsibility for their workAdvance the health, privacy, and general

welfare of the public

Page 15: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

15

Computer Crime

Association of Information Technology Professionals (AITP) definition includesThe unauthorized use, access, modification,

and destruction of hardware, software, data, or network resources

Unauthorized release of informationUnauthorized copying of software

Page 16: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

16

Computer Crime (continued)

AITP guidelines (continued)Denying an end user his/her own hardware,

software, data, or network resourcesUsing or conspiring to use computer or

network resources to illegally obtain info or tangible property

Page 17: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

17

Computer Crime (continued)

HackingThe obsessive use of computers, or the

unauthorized access and use of networked computer systems

Page 18: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

18

Computer Crime (continued)

Cyber TheftInvolves unauthorized network entry and

the fraudulent alteration of computer databases

Page 19: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

19

Computer Crime (continued)

Unauthorized use at workAlso called time and resource theftMay range from doing private consulting or

personal finances, to playing video games, to unauthorized use of the Internet on company networks

Page 20: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

20

Computer Crime (continued)

Software PiracyUnauthorized copying of software

Software is intellectual property protected by copyright law and user licensing agreements

Page 21: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

21

Computer Crime (continued)

Piracy of intellectual propertyOther forms of intellectual property covered

by copyright lawsMusicVideosImagesArticlesBooksOther written works

Page 22: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

22

Computer Crime (continued)

Computer viruses and wormsVirus

A program that cannot work without being inserted into another program

WormA distinct program that can run unaided

Page 23: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

23

Privacy Issues

IT makes it technically and economically feasible to collect, store, integrate, interchange, and retrieve data and information quickly and easily.Benefit – increases efficiency and

effectivenessBut, may also have a negative effect on

individual’s right to privacy

Page 24: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

24

Privacy Issues (continued)

Examples of important privacy issuesAccessing private e-mail and computer

records & sharing information about individuals gained from their visits to websites and newsgroups

Always knowing where a person is via mobile and paging services

Page 25: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

25

Privacy Issues (continued)

Examples of important privacy issues (continued)Using customer information obtained from

many sources to market additional business services

Collecting personal information to build individual customer profiles

Page 26: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

26

Privacy Issues (continued)

Privacy on the InternetUsers of the Internet are highly visible and

open to violations of privacyUnsecured with no real rulesCookies capture information about you

every time you visit a siteThat information may be sold to third

parties

Page 27: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

27

Privacy Issues (continued)

Privacy on the Internet (continued)Protect your privacy by

Encrypting your messagesAsk your ISP not to sell your information

to mailing list providers and other marketers

Decline to reveal personal data and interests online

Page 28: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

28

Privacy Issues (continued)

Computer matchingComputer profiling and matching personal

data to that profileMistakes can be a major problem

Page 29: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

29

Privacy Issues (continued)

Privacy lawsAttempt to enforce the privacy of computer-

based files and communicationsElectronic Communications Privacy ActComputer Fraud and Abuse Act

Page 30: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

30

Privacy Issues (continued)

Computer Libel and CensorshipThe opposite side of the privacy debate

Right to know (freedom of information)Right to express opinions (freedom of

speech)Right to publish those opinions (freedom

of the press)SpammingFlaming

Page 31: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

31

Other Challenges

EmploymentNew jobs have been created and

productivity has increased, yet there has been a significant reduction in some types of jobs as a result of IT.

Page 32: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

32

Other Challenges (continued)

Computer MonitoringConcerns workplace privacy

Monitors individuals, not just workIs done continually. May be seen as violating

workers’ privacy & personal freedomWorkers may not know that they are being

monitored or how the information is being usedMay increase workers’ stress levelMay rob workers of the dignity of their work

Page 33: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

33

Other Challenges (continued)

Working ConditionsIT has eliminated many monotonous,

obnoxious tasks, but has created others

Page 34: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

34

Other Challenges (continued)

IndividualityComputer-based systems criticized as

impersonal systems that dehumanize and depersonalize activities

Page 35: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

35

Health Issues

Job stressMuscle damageEye strainRadiation exposureAccidentsSome solutions

Ergonomics (human factors engineering)Goal is to design healthy work

environments

Page 36: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

36

Health Issues (continued)

Page 37: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

37

Societal Solutions

Beneficial effects on societySolve human and social problems

Medical diagnosisComputer-assisted instructionGovernmental program planningEnvironmental quality controlLaw enforcementCrime controlJob placement

Page 38: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

38

Section II

Security Management

Page 39: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

39

Tools of Security Management

GoalMinimize errors, fraud, and losses in the e-

business systems that interconnect businesses with their customers, suppliers, and other stakeholders

Page 40: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

40

Tools of Security Management (continued)

Page 41: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

41

Internetworked Security Defenses

EncryptionPasswords, messages, files, and other data is

transmitted in scrambled form and unscrambled for authorized users

Involves using special mathematical algorithms to transform digital data in scrambled code

Most widely used method uses a pair of public and private keys unique to each individual

Page 42: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

42

Internetworked Security Defenses (continued)

FirewallsServes as a “gatekeeper” system that

protects a company’s intranets and other computer networks from intrusionProvides a filter and safe transfer pointScreens all network traffic for proper

passwords or other security codes

Page 43: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

43

Internetworked Security Defenses (continued)

Denial of Service DefensesThese assaults depend on three layers of

networked computer systemsVictim’s websiteVictim’s ISPSites of “zombie” or slave computers

Defensive measures and security precautions must be taken at all three levels

Page 44: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

44

Internetworked Security Defenses (continued)

E-mail Monitoring“Spot checks just aren’t good enough

anymore. The tide is turning toward systematic monitoring of corporate e-mail traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.”

Page 45: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

45

Internetworked Security Defenses (continued)

Virus DefensesProtection may accomplished through

Centralized distribution and updating of antivirus software

Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies

Page 46: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

46

Other Security Measures

Security codesMultilevel password system

Log onto the computer systemGain access into the systemAccess individual files

Page 47: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

47

Other Security Measures (continued)

Backup FilesDuplicate files of data or programsFile retention measuresSometimes several generations of files are

kept for control purposes

Page 48: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

48

Other Security Measures (continued)

Security MonitorsPrograms that monitor the use of computer

systems and networks and protect them from unauthorized use, fraud, and destruction

Page 49: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

49

Other Security Measures (continued)

Biometric SecurityMeasure physical traits that make each individual

uniqueVoiceFingerprintsHand geometrySignature dynamicsKeystroke analysisRetina scanningFace recognition and Genetic pattern analysis

Page 50: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

50

Other Security Measures (continued)

Computer Failure ControlsPreventive maintenance of hardware and

management of software updatesBackup computer systemCarefully scheduled hardware or software

changesHighly trained data center personnel

Page 51: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

51

Other Security Measures (continued)

Fault Tolerant SystemsComputer systems that have redundant

processors, peripherals, and softwareFail-overFail-safeFail-soft

Page 52: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

52

Other Security Measures (continued)

Disaster RecoveryDisaster recovery plan

Which employees will participate and their duties

What hardware, software, and facilities will be used

Priority of applications that will be processed

Page 53: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

53

System Controls and Audits

Information System ControlsMethods and devices that attempt to ensure

the accuracy, validity, and propriety of information system activities

Designed to monitor and maintain the quality and security of input, processing, and storage activities

Page 54: 1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and

54

System Controls and Audits (continued)

Auditing Business SystemsReview and evaluate whether proper and

adequate security measures and management policies have been developed and implemented

Testing the integrity of an application’s audit trail