企業(yè)倫理學(xué)(原書第5版)教案指導(dǎo) 第7章 道德決策制定:工作場所中的技術(shù)和隱私_第1頁
企業(yè)倫理學(xué)(原書第5版)教案指導(dǎo) 第7章 道德決策制定:工作場所中的技術(shù)和隱私_第2頁
企業(yè)倫理學(xué)(原書第5版)教案指導(dǎo) 第7章 道德決策制定:工作場所中的技術(shù)和隱私_第3頁
企業(yè)倫理學(xué)(原書第5版)教案指導(dǎo) 第7章 道德決策制定:工作場所中的技術(shù)和隱私_第4頁
企業(yè)倫理學(xué)(原書第5版)教案指導(dǎo) 第7章 道德決策制定:工作場所中的技術(shù)和隱私_第5頁
已閱讀5頁,還剩26頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

Chapter07-EthicalDecision-Making:TechnologyandPrivacyintheWorkplace

PAGE

Copyright?McGraw-HillEducation.Allrightsreserved.NoreproductionordistributionwithoutthepriorwrittenconsentofMcGraw-HillEducation.

IMChapter7:

EthicalDecision-Making:TechnologyandPrivacyintheWorkplace

ChapterObjectives

Afterreadingthischapter,youshouldbeableto:

Explainanddistinguishthetwodefinitionsofprivacy.

Describetheethicalsourcesofprivacyasafundamentalvalue.

Identifythelegalsourcesofprivacyprotection,includingtheconceptofa“reasonableexpectationofprivacy.”

Discussrecentdevelopmentinconnectionwithemployeemonitoring.

Identifyandexplaintherisksinvolvedinafailuretounderstandtheimplicationsoftechnologyanditsuse.

Enumeratethereasonswhyemployerschoosetomonitoremployees’work.

Discusstheethicsofmonitoringasitappliestodrugtesting.

Discusstheethicsofmonitoringasitappliestopolygraphs,genetictesting,andotherformsofsurveillance.

Explaintheinterestsofanemployerinregulatinganemployee’sactivitiesoutsideofwork.

Discusstheimplicationsofworldevents,likerecentimmigrationpolicychanges,onbusinessdecisionsaboutprivacy.

OpeningDecisionPoint

BeingSmartAboutSmartphones

ThisDecisionPointchallengesstudentstoimaginethemselvesinthepositionofanemployeewhousesasmartphonetotakenotesduringameetingwithanimportantclient.Theclient’sCFOispresentatthemeetingandmisinterpretsthisbehavior,assumingthattheemployeeis“fiddlingaroundwiththeirphone.”TheCFOcomplainstotheemployee’ssupervisor.Whileinthesupervisor’sofficetodiscusstheproblem,theemployee’sphonevibrateswithacallfromanotherimportantclient.Theclientdoesnotliketobekeptwaitingandtheemployeeisawarethatafterthreevibratingalerts,thephoneissettoring.

Studentsareaskedtoidentifyasmanyethicalissuesraisedbytheuseofsmartphonesintheworkplaceastheycan,thenconsiderthefollowingquestions:

Pleaselistasmanyethicalissuesasyoucanidentifythatareraisedbytheuseofsmartphonesintheworkplace.

Didyoudoanythingwrongthismorninginthemeeting?

Recallthat,clearly,yourclientwasoffended.Atwhatpointdoesimpolitebehavior—forinstance,actionsthatmightoffendothers,suchasansweringe-mailsduringameetingorevenplayinggames—crossthelineintounethicalbehavior?

Whattypeofpolicywouldyousuggestforanorganizationregardingtheuseofsmartphonesintheworkplace,ifany?

Shouldtherulesbedifferentforusingsmartphonesduringin-housemeetings,ononehand,andduringmeetingswithclientsorsuppliers,ontheother?

Howmightyouhaveacteddifferentlyduringthemeetingdescribedheretohaveachievedadifferentresultwithyourclient?

Whatareyouabouttosaytoyourboss?

Introduction

FlatWorld:ThomasFriedman’sbook,TheWorldisFlat,describesthehasteningpaceofglobalizationandhowsignificantlythebusiness,economicandpoliticallandscapehaschangedinjustthefirstdecadeofthe21stcentury.

Theimageofa“flatworld”isusedtoconveytheideathatdistance,time,geography,andnationalboundariesnolongercreateartificialbarrierstobusinessandtrade.

Infact,9ofthe10forcesthatFriedmanidentifiesascreatingthisflatworldarethedirectresultofcomputerandInternet-relatedtechnologies.

Reference:RealityCheck“PrivacyoftheFuture-Itisnow!”

GlobalBusinessWorld:Thetechnicalrevolutionisnodoubtlargelyresponsiblefortoday’sglobaleconomy,thoughitcomeswithchallengesliketheimpactofemployeeandconsumerprivacy.

Privacy:Privacyissuesintheworkplaceraiseethicalissuesinvolvingindividualrightsaswellasthoseinvolvingutilitarianconsequences.

Workplaceprivacyissuesevokeaninherentconflictbetweentherightsofemployerstoprotecttheirinterests,andtherightsofemployeestobefreefromwrongfulintrusionsintotheirpersonalaffairs.

Conflictscanariseintheworkplaceenvironmentthroughtheregulationofpersonaactivitiesorpersonalchoices,orthroughvariousformsofmonitoring.

Monitoring:Contrastingutilitarianargumentscanbeofferedontheethicsofmonitoringemployees.

TheRighttoPrivacy

ProtectionofPrivacyRights:Withthetremendousincreaseincomputertechnologyinrecentdecades,callsforgreaterprotectionofprivacyrightshaveincreased.

Thereiswidespreadconfusionconcerningthenature,extent,andvalueofprivacy.

SomeWesterncountriesdonotacknowledgealegalrighttoprivacyasitisrecognizedintheUnitedStates(thoughrecallthattheU.S.Constitutionmakesnoexplicitmentionoftherighttoprivacy),whileothersseemfarmoresophisticatedintheircentralizedandconsistentapproachestopersonalprivacyissues.

DefiningPrivacy:

*ChapterObjective1AddressedBelow*

Twogeneralandconnectedunderstandingsofprivacyare:

Privacyasarighttobe“l(fā)eftalone”withinapersonalzoneofsolitude.

Privacyastherighttocontrolinformationaboutoneself.

Privacyisimportantbecauseitestablishestheboundarybetweenindividualsandtherebyservestodefineone’sindividuality.

Therighttocontrolcertainextremelypersonaldecisionsandinformationhelpsdeterminethekindofpersonweareandthepersonwebecome.

ConflictingBeliefsaboutPrivacy:

Manypeoplebelievethatarighttobeletaloneismuchtoobroadtoberecognizedasamoralright.(i.e.employeesataworkplacearenotgoingtobeleftalone)

Othershaveconcludedthatabetterunderstandingfocusesonprivacyasinvolvingthecontrolofpersonalinformation.

Fromthisperspective,theclearestcaseofaninvasionofprivacyoccurswhenotherscometoknowpersonalinformationaboutus,aswhenastrangerreadsyoure-mailoreavesdropsonapersonalconversation.

Yet,theclaimthatarightofprivacyimpliesarighttocontrolallpersonainformationmightalsobetoobroad.

PhilosophicalArgument:PhilosopherGeorgeBrenkerthasarguedthattheinformationalsenseofprivacyinvolvesarelationshipbetweentwoparties,AandB,andpersonalinformationXaboutA.

PrivacyisonlyviolatedwhenBcomestoknowXandnorelationshipexistsbetweenAandBthatwouldjustifyBknowingX.

Limitingaccessofpersonalinformationonlytothosewithwhomonehasapersonalrelationshipisoneimportantwaytopreserveone’sownpersonalintegrityandindividuality.

Itisperhapsthatchoiceoflimitationorcontrolthatisthesourceofone’ssenseofprivacy.

**TeachingNote:Todrivehometherelevanceofprivacytotoday’sstudents,sometimesitisimportanttofindtopicsonwhichtheyfeelvulnerable.Oneofthosetopicsmightbehowlongsomethingcanfollowthemintothefuture.Considerdiscussingwhetherauniversityshouldidentifythereasonbehindadismissal(expulsion)ofastudentifitwasforacademicintegrityreasons.Shouldauniversitydisclosethisinformationonthestudent’stranscriptsuchthatitwouldfollowherorhimtherestoftheirlives?

EthicalSourcesofaRighttoPrivacy:

*ChapterObjective2DiscussedBelow*

SocialContract:Therighttoprivacyisfoundedintheindividual’sfundamental,universalrighttoautonomy.Thisrightisrestricted,byasocialcontractinourculturethatpreventsusfrominfringingonsomeoneelse’srighttoherorhispersonalautonomy.

PhilosopherPatriciaWerhanedescribesthisboundaryasa“reciprocalobligation”;thatis,foranindividualtoexpectrespectforherorhispersonalautonomy,thatindividualhasareciprocalobligationtorespecttheautonomyofothers.

Appliedtotheworkplace:reciprocalobligationimpliesthat,whileanemployeehasanobligationtorespectthegoalsandpropertyoftheemployer,theemployerhasreciprocalobligationtorespecttherightsoftheemployeeaswell,includingtheemployee’srighttoprivacy.

Kantlinksthemoralworthofindividualsto“thesupremevalueoftheirrationalcapacitiesfornormativeself-determination”andconsidersprivacyacategoricalmoralimperative.

Hypernorms:EthicistsThomasDonaldsonandThomasDunfeehavedevelopedanapproachtoethicalanalysisthatseekstodifferentiatebetweenthosevaluesthatarefundamentalacrosscultureandtheory,“hypernorms,”andthosevaluesthataredeterminedwithin“moralfreespace”andthatarenothypernorms.

Theyproposethatwelooktotheconvergenceofreligious,cultural,andphilosophicalbeliefsaroundcertaincoreprinciplesasacluetotheidentificationofhypernorms.(Examples:therighttopersonalfreedom,therighttoinformedconsent)

Individualprivacyisatthecoreofmanyofthesebasicminimalrightsandisanecessaryprerequisitetomanyofthem.Ultimately,thefailuretoprotectprivacymayleadtoaninabilitytoprotectpersonalfreedomandautonomy.

AdiscussionofprivacyinthecontextoflibertyandautonomymaybejustNorth-Americanbased.AEuropeanfoundationwouldbebasedontheprotectionofhumandignity.

*Reference:RealityCheck“Privacy:EuropeComparedtotheUnitedStates”

PropertyRights:Legalanalysisofprivacyusingapropertyrightsperspectiveyieldsinsightintopersonalfreedomsandrights.

“Property”isanindividual’slifeandallnonprocreativederivatives,suchasthoughts,ideasandpersonalinformation,ofherorhislife.

Theconceptofpropertyrightsinvolvesadeterminationofwhomaintainscontrolovertangiblesandintangibles,includingpersonalinformation.

Propertyrightsrelatingtopersonalinformationthusdefineactionsthatindividualscantakeinrelationtootherindividualsregardingtheirpersonalinformation.

Privatepropertyrightsdependupontheexistenceandenforcementofasetofrulesthatdefinewhohasarighttoundertakewhichactivitiesontheirowninitiativeandhowthereturnsfromthoseactivitieswillbeallocated.

LegalSourcesofaRighttoPrivacyintheUnitedStates:

*ChapterObjective3AddressedBelow*

Thelawhasnotyetcaughtupwiththetechnologyinvolvedinemployeeprivacy.Asaresult,thisisoneareawheresimplyobeyingthelawmayfallfarshortofresponsiblemanagementpractice.(i.e.Whilethelawmaybeveryclearwithregardtotappingaworker’stelephone,itislessclearwithmonitoringaworker’se-mailortextmessagesonahandhelddevice)

PrivacycanbelegallyprotectedintheUnitedStatesinthreeways:bytheconstitution(federalorstate),byfederaland/orstatestatutes,andbythecommonlaw.

Commonlawreferstothebodyoflawcomprisedofthedecisionhandeddownbycourts,ratherthanspecifiedinanyparticularstatutesorregulations.

TheU.S.Constitution’sFourthAmendmentprotectionagainstanunreasonablesearchandseizuregovernsonlythepublicsectorworkplacebecausetheConstitutionappliesonlytostateaction.Therefore,unlesstheemployeristhegovernmentorotherrepresentativeofthestate,theConstitutiongenerallywillnotapply.

Statutesalsoofferlittle,ifany,protectionfromworkplaceintrusions.

TheElectronicCommunicationsPrivacyActof1986(ECPA)prohibitsthe"interception"orunauthorizedaccessofstoredcommunications.

Thecourtshaverulethat“interception”appliesonlytomessagesintransitandnottomessagesthathaveactuallyreachedcompanycomputers.ThereforetheimpactofECPAistopunishelectronicmonitoringonlybythirdpartiesandnotbyemployers.

TheECPAallowsinterceptionwhereconsenthasbeengranted.AfirmthatsecuresemployeeconsenttomonitoringatthetimeofhireisimmunefromECPAliability.

*Reference:“RealityCheck–EyesintheSky”*

Somestatesrelyonstatutoryprotectionsratherthancommonlaw.Othersprovideconstitutionalrecognitionandprotectionofprivacyrights.

InallstatesexceptCalifornia,applicationofthisprovisiontoprivatesectororganizationsislimited,uncertain,ornotincludedatall.

“Intrusionintoseclusion”isaninvasionofprivacylegalviolationoccurswhensomeoneintentionallyintrudesontheprivateaffairsofanotherwhentheintrusionwouldbe“highlyoffensivetoareasonableperson.”

EXAMPLE:InCityofOntariov.Quon(2010),theU.S.SupremeCourtaddressedtheissueofemployermonitoringforthefirsttime.

TwoCaliforniapoliceofficersweredisciplinedafteranauditoftextmessagesoncity-issuesdevicesfoundthatmanyoftheofficers'textswerepersonalinnature.Thoughtheofficershadbeenassuredbytheirsupervisorthatanauditwouldnotbeperformed,theCourtdeterminedthattheauditwaspermissiblenonethelessbecausethereviewofthemessageswasreasonably"work-related."

However,relyingontheQuoncaseasprecedentforprotectioninregardstoelectronicsurveillanceofemployeesisadouble-edgedsword.

UndertheQuonprecedent,howmuchprotectionforelectroniccommunicationstheFourthAmendmentwillprovidetoemployeesremainsunclear.

Aswell,thoseprotectionsdonotextendtotheprivatesector.RememberthattheemployerinQuonwasagovernmentagency.

Inasubsequentcase,Rileyv.California,theU.S.SupremeCourtunanimouslyfoundexplicitprotectionundertheFourthAmendmentofcellphonesandothersimilardevices.

Employersmaywishtoconsidermorecarefullythenatureandextentofsearchestheymayconductonthesedevices,butalsowhethertheirpoliciesaredraftedclearlyenoughtoalertemployeesofthepotentialscopeofsuchsearchesandthelevelofprivacyemployeescanexpect.

Notice:ManyrecentU.S.courtprivacydecisionsseemtodependonwhethertheworkerhadnoticethatthemonitoringmightoccur.

Anemployee’slegitimateandreasonableexpectationofprivacyisthebasisforfindinganinvasionofprivacy.Ifanemployeehasactualnotice,thentheretrulyisnorealexpectationofprivacy.

ThisconclusionwassupportedinK-Martv.Trotti,wherethecourtheldthatsearchofanemployee’scompany-ownedlockerwasunlawfulinvasionsincetheemployeeusedhisownlock.However,inSmythv.Pillsbury,thecourtheldthatmonitoringisallowedevenwhenafirmpromisednottomonitor.

Evidenceoftheimpactofthisdecisionisthefactthatonlytwostates,ConnecticutandDelaware,requireemployerstonotifyworkerswhentheyarebeingmonitored.

Increasingly,however,statesareenactinglawstolimitemployermonitoringpowers.Asof2018,26states(plusGuam)prohibitemployersfromobtainingsocialmediapasswordsfromprospectiveorcurrentemployees.

*ReferenceTable7.1Here*

GlobalApplications:TheunpredictableregimeofprivacyprotectionisallthemoreproblematictomaintainwhenoneconsiderstheimplicationsoftheEuropeanUnion’sGeneralDataProtectionRegulation(GDPR).

TheGDPRprovidesthatpersonalinformationcannotbecollectednorsharedbycompanieswithoutindividuals’permission.Informationaboutwhoisusingthedataandforwhatpurposeitisbeingcollectedmustbeprovidedinaclear,easilyunderstandablemanner.Further,consumershavetherighttoreviewthedata,correctinaccuraciesandrequestthattheybeerased.

Allcompanies–regardlessoftheirsizeorlocation–arerequiredtocomplywithGDPRiftheyofferfreeorpaidgoodsorservicestoEUresidentsandcollecttheconsumer'spersonalinformation.(i.e.evensmallcompaniesbasedintheU.S.canstillbesubjecttothislaw)

TheEuropeanUniondoesnotallowthetransferofdataonitscitizensoutsideofthecountryunlessthecountryisdeemedtohaveadequatedataprivacylaws.Unfortunately,theEUhasdeemedthattheUSdoesnothaveadequatedataprivacylaws,butorganizationscannavigatethisbyadheringsomethingcalledthe"PrivacyShield.Underthisagreement,U.S.companiesmustadheretoadetailedsetofstandards,whichsurpasswhatU.S.lawtypicallyrequires.

*Reference:Table7.2here*

LegalUncertainty:Ethicsisperhapstheonlysourceofananswertothelegaluncertaintyorinstabilityconcerningthechallengingareasofinformationgathering.

BusinessImplications:Whataretheimplicationsofthisunderstandingofprivacyforbusinessesandforbusinessethicsanalysis?

Onewouldarguethatpersonalinformationshouldremainprivateunlessarelationshipexistsbetweenthebusinessandtheindividualthatlegitimatescollectingandusingpersonalinformationaboutthatindividual.

Thenatureoftheemploymentrelationshiphelpsdeterminetheappropriateboundarybetweenemployersandemployeesandthereforetheinformationthatoughttoremainrightfullyprivatewithintheworkplace.

Ifweadoptsomethinglikeacontractualmodelofemployment,wheretheconditionsandtermsofemploymentaresubjecttothemutualandinformedconsentofbothparties,thenemployeeconsentwouldbecomeonemajorconditiononwhatinformationemployerscancollect.

Employeeprivacyisviolatedwhenever:

Employersinfringeuponpersonaldecisionthatarenotrelevanttotheemploymentcontract(whetherthecontractisimpliedorexplicit)

Personalinformationthatisnotrelevanttothatcontractiscollected,stored,orusedwithouttheinformedconsentoftheemployee.

Theburdenofproof:restsontheemployertoestablishtherelevancyofpersonaldecisionsandinformationatissue.

DecisionPoint

InquiringEmployersWanttoKnow

ThisDecisionPointaddressestheboundariesofprivacywithinanemploymentapplication.Thefollowinginformationissometimesrequestedonstandardemploymentapplications,thoughcandidatesmightconsidersomeofittobeprivateorpersonal.Whichofthefollowingitemsaboutanemployeemightanemployerhavealegitimateclaimtoknow,andwhy?Whatinformationmightleadtounreasonableintrusionsordiscriminatorypractices,andwhy?

Ajobapplicant’ssocialsecuritynumber

Anapplicant’sarrestrecord

Anemployee’smedicalrecords

Anemployee’smaritalstatus

Whetherajobapplicantsmokes

Anemployee’spoliticalaffiliation

Anemployee’ssexualorientation

Anemployee’screditrating

Anemployee’spriorsalary

Studentsshouldconsiderthefollowingquestionsintheirassessmentofthisscenario:

Whatfactsarerelevanttoyourdecisions?

Whatwouldtheconsequencesbeofrefusingtoansweranyquestionsonanemploymentapplication?

Areyoubasingyourdecisiononparticularrightsoftheemployeeortheemployer?

Aretherepeopleotherthantheemployerandemployeewhomighthaveastakeinwhatinformationisreleasedtoemployers?

LinkingtheValueofPrivacytotheEthicalImplicationsofTechnology

ChallengingPrivacy:Theadventofnewtechnologychallengesprivacyinwayswecouldneverbeforeimagine.Considertheimplicationstechnologyhasfor:

Employeeandemployerexpectationsregardingtheuseoftime.

Thedistinctionbetweenworkuseandpersonaluseoftechnology.

Theprotectionofproprietaryinformation.

Performancemanagement.

Privacyinterests.

Accessibilityissuesrelatedtothedigitaldivide.

IncreasedOpportunitiesandChallenges:

Technologyallowsforin-homeoffices,raisingextraordinaryopportunitiesaswellaschallenges,issuesofsafety,andprivacyconcerns.

Becausetechnologyallowseachofustobemoreproductive,itprovidesusbenefitsandallowsemployerstoaskmoreofeachemployee.

Advancesintechnologyseemtoblurboundariesbetweenleisureandworktime,aswellasbetweenourplacesofworkandourhomes.

ValueJudgments:Newtechnologydoesnotnecessarilyimpactourvaluejudgmentsbutinsteadsimplyprovidesnewwaystogathertheinformationonwhichtobasethem.

ConsidertheattacksofSeptember11,2001,onaU.S.employer’sdecisiontosharepersonalemployeeinformationorcustomerinformationwithlawenforcement.Privatefirmsmaybemorewilling,orlesswilling,todaytoshareprivateinformationthantheywouldhavebeenpreviously.

NewTechnologyMeansNewChallenges:Firmsoftenexperience,andfindthemselvesill-preparedfor,unanticipatedchallengesstemmingfromnewtechnology.

EXAMPLE:AnemployeeatPhoneDog,acompanythatprovidesmobiledevicenewsandreviews,createdawork-relatedTwitteraccountthatamassed17,000followers.Whenheleftthecompany,hekeptcontroloftheaccountanduseditashispersonalaccount.Thecompanysued,buttheemployeeclaimedthattheaccountbelongedtohim.Thecaseisongoing,butregardlessoftheoutcome,itillustratesthedangersoffailingtoestablishclearpoliciesgoverningtheusenewtechnologiesastheyariseintheworkplace.

NewEthicsforaNewEconomy?

Thesamevaluesoneheldunderpreviouscircumstances,iftheyaretrueandjustified,shouldpermeateandrelatetolatercircumstances.

Perspectivesareimpactedbytheunderstandinganduseofnewtechnology.

Aneconomist,AntonioArgandona,cautionsaboutthechangeinvaluesthatmaybecausedbyopportunitiescreatedbytechnology,buthealsopointstothegoodthatnewtechnologycoulddo,includingdevelopingdepressedareas,defendinghumanrights,andincreasingcitizenshipparticipation.

InformationandPrivacy:

Businessesneedtobeabletoanticipatetheperceptionsofitsstakeholdersinordertobeabletomakethemosteffectivedecisionsforitslong-termsustainability.Newtechnologycanbeconfusingforthepublicsoithelpstoplanaheadfortechnologicalchanges.

Trustisthekeyissuewiththeintroductionofnewtechnology.

EXAMPLE:ThemottoatGoogle,theInternet-basedsearchengine,is“don’tbeevil”(originallyusedasitscoremotto,nowretainedasthelastsentenceofitsCodeofConduct).Thecompanyissensitivetostakeholderconcernsasitdevelopsnewtechnology(suchasachoicenottoallowgunads.)

Whenconsumersrelyontechnologyprovidedbyabusiness,theymighteasilyassumethatthebusinesswillrespecttheirprivacy.Theywouldliketobelievethatthoseresponsibleforthetechnologyare,themselves,accountabletotheuser.

*ReferenceDecisionPoint:“TechnologyDilemmas”

DecisionPoint

TechnologyDilemmas

ThisDecisionPointaddressesquestionsaboutusingtechnologyfor“good”or“evil”raisedbyananonymousWebpostingbyanemployeewhohasbeendirectedbymanagementtouseacomputerprogramtospyonacolleague.Theemployeeseeksgeneralthoughtsandadviceregardinglegalprotectionagainstliabilityforfollowingthisdirective.

Studentsshouldconsiderthefollowingquestionsinassessingthisscenario:

Whatarethekeyfactsrelevanttoyourresponse?

Whatistheethicalissueinvolvedinpeerspyingintheworkplace?

Whoarethestakeholders?

Whatalternativeswouldyousuggesttothisindividual,andwhatalternativesexistforemployerswhowishtogatherinformationaboutemployeessurreptitiously?

Howdothealternativescompare;howdothealternativesaffectthestakeholders?

ShouldMoralRequirementsBeImposed?

EconomistAntonioArgandonacontendsthatifnewtechnologyisdependentonandhasasitssubstanceinformationanddata,thensignificantmoralrequirementsshouldbeimposedonthatinformation.Hesuggeststhefollowingnecessaryelements:

Truthfulnessandaccuracy:Thepersonprovidingtheinformationmustensurethatitistruthfulandaccurate,atleasttoareasonabledegree.

Respectforprivacy:Thepersonreceivingoraccumulatinginformationmusttakeintoaccounttheethicallimitsofindividuals’(andorganizations’)privacy.Thiswouldincludeissuesrelatingtocompanysecrets,espionage,andintelligencegathering.

Respectforpropertyandsafetyrights:Areasofpotentialvulnerability,includingnetworksecurity,sabotage,theftofinformationandimpersonation,areenhancedandmustthereforebeprotected.

Accountability:Technologyallowsforgreateranonymityanddistance,requiringaconcurrentincreasedexigencyforpersonalresponsibilityandaccountability.

Howmightfirmsrespondtothiscallforresponsibilityinthedevelopment,manufacture,marketingandservicerelatedtonewproductionorothercorporateactivities?Whatethicalissuesdoesthisproposalraise?

ManagingEmployeesthroughMonitoring

*ChapterObjective4AddressedBelow*

MonitoringintheWorkplace:Oneofthemostprevalentformsofinformationgatheringintheworkplaceisemployermonitoringofemployees’work;andtechnologyhasaffordedemployersenormousabilitiestodothiseffectivelyatlowcosts.

DATA:Accordingtoonesurvey,88percentofemployeesusesocialmediaatleastonceduringtheworkdayand18percentcheckmorethan10timeseachday.

DATA:Thereisanincreasingtrendwithinmid-tolarge-sizedU.S.firmswithregardtoemployeee-mailandinternetmonitoring.

AsurveyconductedbytheAmericanAcademyofManagementfoundthatnearly80percentoflargecompaniesmonitortheiremployees’useofemail,internet,andphone.Thatnumberrisesto90percentforfirmsinparticularlysensitiveindustries.

Productivityisaprimaryconcernforemployerswhofeeltheiremployeesbringtoomuchoftheirpersonallivestotheworkplace.OneCareerBsurveyfoundthat41percentofworkersnamed"theInternet"asthelargestproductivitykilleratwork,while37percentnamed"socialmedia.

Employeemonitoringhasevencrossedthethresholdfromcomputerusetobodyautonomy.

Biotrackingtechnologyallowemployerstorecordthenumberofstepsthatemployeestakesinaday,theirheartrate,whattheyeatanddrink,howmuchsleeptheygetand

eventheirhormonelevels.Theinformationgatheredfromthistechnologyoftenisincorporatedintoemployeewellnessprograms.Oneemployerhasevenbeguntestingtrackingimplantsinemployees.

*ChapterObjective5AddressedBelow*

HiddenEthicalIssues:Manyoftheethicalissuesthatariseintheareaofmanaginginformationarenotreadilyvisible.

Whenwedonotcompletelyunderstandthetechnology,wemightnotunderstandtheethicalimplicationsofourdecisionsandwearenotableeffectivelytoprotectourowninformation.

Whenwemistakenlybelievethatnooneiswatching,wemayengageinactivitiesthatwewouldotherwiserefrainfromdoing,suchasdeletingane-mailmessagethatwedonotwantanyonetoread.

Aknowledgegapexistsbetweenpeoplewhounderstandthetechnologyandotherswhoareunabletoprotectthemselvesbecausetheydonotunderstand.

Access:Technologyallowsforaccesstoinformationthatwasneverbeforepossible.

Accesscantakeplaceunintentionally,suchasasupervisordiscoveringpersonalinformationduringaroutinebackgroundcheck.

Technologyallowsustoworkfromalmostanywhereontheplanet,sowea

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論