企业伦理学(原书第5版)教案指导 第7章 道德决策制定:工作场所中的技术和隐私_第1页
企业伦理学(原书第5版)教案指导 第7章 道德决策制定:工作场所中的技术和隐私_第2页
企业伦理学(原书第5版)教案指导 第7章 道德决策制定:工作场所中的技术和隐私_第3页
企业伦理学(原书第5版)教案指导 第7章 道德决策制定:工作场所中的技术和隐私_第4页
企业伦理学(原书第5版)教案指导 第7章 道德决策制定:工作场所中的技术和隐私_第5页
已阅读5页,还剩26页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Chapter07-EthicalDecision-Making:TechnologyandPrivacyintheWorkplace

PAGE

Copyright©McGraw-HillEducation.Allrightsreserved.NoreproductionordistributionwithoutthepriorwrittenconsentofMcGraw-HillEducation.

IMChapter7:

EthicalDecision-Making:TechnologyandPrivacyintheWorkplace

ChapterObjectives

Afterreadingthischapter,youshouldbeableto:

Explainanddistinguishthetwodefinitionsofprivacy.

Describetheethicalsourcesofprivacyasafundamentalvalue.

Identifythelegalsourcesofprivacyprotection,includingtheconceptofa“reasonableexpectationofprivacy.”

Discussrecentdevelopmentinconnectionwithemployeemonitoring.

Identifyandexplaintherisksinvolvedinafailuretounderstandtheimplicationsoftechnologyanditsuse.

Enumeratethereasonswhyemployerschoosetomonitoremployees’work.

Discusstheethicsofmonitoringasitappliestodrugtesting.

Discusstheethicsofmonitoringasitappliestopolygraphs,genetictesting,andotherformsofsurveillance.

Explaintheinterestsofanemployerinregulatinganemployee’sactivitiesoutsideofwork.

Discusstheimplicationsofworldevents,likerecentimmigrationpolicychanges,onbusinessdecisionsaboutprivacy.

OpeningDecisionPoint

BeingSmartAboutSmartphones

ThisDecisionPointchallengesstudentstoimaginethemselvesinthepositionofanemployeewhousesasmartphonetotakenotesduringameetingwithanimportantclient.Theclient’sCFOispresentatthemeetingandmisinterpretsthisbehavior,assumingthattheemployeeis“fiddlingaroundwiththeirphone.”TheCFOcomplainstotheemployee’ssupervisor.Whileinthesupervisor’sofficetodiscusstheproblem,theemployee’sphonevibrateswithacallfromanotherimportantclient.Theclientdoesnotliketobekeptwaitingandtheemployeeisawarethatafterthreevibratingalerts,thephoneissettoring.

Studentsareaskedtoidentifyasmanyethicalissuesraisedbytheuseofsmartphonesintheworkplaceastheycan,thenconsiderthefollowingquestions:

Pleaselistasmanyethicalissuesasyoucanidentifythatareraisedbytheuseofsmartphonesintheworkplace.

Didyoudoanythingwrongthismorninginthemeeting?

Recallthat,clearly,yourclientwasoffended.Atwhatpointdoesimpolitebehavior—forinstance,actionsthatmightoffendothers,suchasansweringe-mailsduringameetingorevenplayinggames—crossthelineintounethicalbehavior?

Whattypeofpolicywouldyousuggestforanorganizationregardingtheuseofsmartphonesintheworkplace,ifany?

Shouldtherulesbedifferentforusingsmartphonesduringin-housemeetings,ononehand,andduringmeetingswithclientsorsuppliers,ontheother?

Howmightyouhaveacteddifferentlyduringthemeetingdescribedheretohaveachievedadifferentresultwithyourclient?

Whatareyouabouttosaytoyourboss?

Introduction

FlatWorld:ThomasFriedman’sbook,TheWorldisFlat,describesthehasteningpaceofglobalizationandhowsignificantlythebusiness,economicandpoliticallandscapehaschangedinjustthefirstdecadeofthe21stcentury.

Theimageofa“flatworld”isusedtoconveytheideathatdistance,time,geography,andnationalboundariesnolongercreateartificialbarrierstobusinessandtrade.

Infact,9ofthe10forcesthatFriedmanidentifiesascreatingthisflatworldarethedirectresultofcomputerandInternet-relatedtechnologies.

Reference:RealityCheck“PrivacyoftheFuture-Itisnow!”

GlobalBusinessWorld:Thetechnicalrevolutionisnodoubtlargelyresponsiblefortoday’sglobaleconomy,thoughitcomeswithchallengesliketheimpactofemployeeandconsumerprivacy.

Privacy:Privacyissuesintheworkplaceraiseethicalissuesinvolvingindividualrightsaswellasthoseinvolvingutilitarianconsequences.

Workplaceprivacyissuesevokeaninherentconflictbetweentherightsofemployerstoprotecttheirinterests,andtherightsofemployeestobefreefromwrongfulintrusionsintotheirpersonalaffairs.

Conflictscanariseintheworkplaceenvironmentthroughtheregulationofpersonaactivitiesorpersonalchoices,orthroughvariousformsofmonitoring.

Monitoring:Contrastingutilitarianargumentscanbeofferedontheethicsofmonitoringemployees.

TheRighttoPrivacy

ProtectionofPrivacyRights:Withthetremendousincreaseincomputertechnologyinrecentdecades,callsforgreaterprotectionofprivacyrightshaveincreased.

Thereiswidespreadconfusionconcerningthenature,extent,andvalueofprivacy.

SomeWesterncountriesdonotacknowledgealegalrighttoprivacyasitisrecognizedintheUnitedStates(thoughrecallthattheU.S.Constitutionmakesnoexplicitmentionoftherighttoprivacy),whileothersseemfarmoresophisticatedintheircentralizedandconsistentapproachestopersonalprivacyissues.

DefiningPrivacy:

*ChapterObjective1AddressedBelow*

Twogeneralandconnectedunderstandingsofprivacyare:

Privacyasarighttobe“leftalone”withinapersonalzoneofsolitude.

Privacyastherighttocontrolinformationaboutoneself.

Privacyisimportantbecauseitestablishestheboundarybetweenindividualsandtherebyservestodefineone’sindividuality.

Therighttocontrolcertainextremelypersonaldecisionsandinformationhelpsdeterminethekindofpersonweareandthepersonwebecome.

ConflictingBeliefsaboutPrivacy:

Manypeoplebelievethatarighttobeletaloneismuchtoobroadtoberecognizedasamoralright.(i.e.employeesataworkplacearenotgoingtobeleftalone)

Othershaveconcludedthatabetterunderstandingfocusesonprivacyasinvolvingthecontrolofpersonalinformation.

Fromthisperspective,theclearestcaseofaninvasionofprivacyoccurswhenotherscometoknowpersonalinformationaboutus,aswhenastrangerreadsyoure-mailoreavesdropsonapersonalconversation.

Yet,theclaimthatarightofprivacyimpliesarighttocontrolallpersonainformationmightalsobetoobroad.

PhilosophicalArgument:PhilosopherGeorgeBrenkerthasarguedthattheinformationalsenseofprivacyinvolvesarelationshipbetweentwoparties,AandB,andpersonalinformationXaboutA.

PrivacyisonlyviolatedwhenBcomestoknowXandnorelationshipexistsbetweenAandBthatwouldjustifyBknowingX.

Limitingaccessofpersonalinformationonlytothosewithwhomonehasapersonalrelationshipisoneimportantwaytopreserveone’sownpersonalintegrityandindividuality.

Itisperhapsthatchoiceoflimitationorcontrolthatisthesourceofone’ssenseofprivacy.

**TeachingNote:Todrivehometherelevanceofprivacytotoday’sstudents,sometimesitisimportanttofindtopicsonwhichtheyfeelvulnerable.Oneofthosetopicsmightbehowlongsomethingcanfollowthemintothefuture.Considerdiscussingwhetherauniversityshouldidentifythereasonbehindadismissal(expulsion)ofastudentifitwasforacademicintegrityreasons.Shouldauniversitydisclosethisinformationonthestudent’stranscriptsuchthatitwouldfollowherorhimtherestoftheirlives?

EthicalSourcesofaRighttoPrivacy:

*ChapterObjective2DiscussedBelow*

SocialContract:Therighttoprivacyisfoundedintheindividual’sfundamental,universalrighttoautonomy.Thisrightisrestricted,byasocialcontractinourculturethatpreventsusfrominfringingonsomeoneelse’srighttoherorhispersonalautonomy.

PhilosopherPatriciaWerhanedescribesthisboundaryasa“reciprocalobligation”;thatis,foranindividualtoexpectrespectforherorhispersonalautonomy,thatindividualhasareciprocalobligationtorespecttheautonomyofothers.

Appliedtotheworkplace:reciprocalobligationimpliesthat,whileanemployeehasanobligationtorespectthegoalsandpropertyoftheemployer,theemployerhasreciprocalobligationtorespecttherightsoftheemployeeaswell,includingtheemployee’srighttoprivacy.

Kantlinksthemoralworthofindividualsto“thesupremevalueoftheirrationalcapacitiesfornormativeself-determination”andconsidersprivacyacategoricalmoralimperative.

Hypernorms:EthicistsThomasDonaldsonandThomasDunfeehavedevelopedanapproachtoethicalanalysisthatseekstodifferentiatebetweenthosevaluesthatarefundamentalacrosscultureandtheory,“hypernorms,”andthosevaluesthataredeterminedwithin“moralfreespace”andthatarenothypernorms.

Theyproposethatwelooktotheconvergenceofreligious,cultural,andphilosophicalbeliefsaroundcertaincoreprinciplesasacluetotheidentificationofhypernorms.(Examples:therighttopersonalfreedom,therighttoinformedconsent)

Individualprivacyisatthecoreofmanyofthesebasicminimalrightsandisanecessaryprerequisitetomanyofthem.Ultimately,thefailuretoprotectprivacymayleadtoaninabilitytoprotectpersonalfreedomandautonomy.

AdiscussionofprivacyinthecontextoflibertyandautonomymaybejustNorth-Americanbased.AEuropeanfoundationwouldbebasedontheprotectionofhumandignity.

*Reference:RealityCheck“Privacy:EuropeComparedtotheUnitedStates”

PropertyRights:Legalanalysisofprivacyusingapropertyrightsperspectiveyieldsinsightintopersonalfreedomsandrights.

“Property”isanindividual’slifeandallnonprocreativederivatives,suchasthoughts,ideasandpersonalinformation,ofherorhislife.

Theconceptofpropertyrightsinvolvesadeterminationofwhomaintainscontrolovertangiblesandintangibles,includingpersonalinformation.

Propertyrightsrelatingtopersonalinformationthusdefineactionsthatindividualscantakeinrelationtootherindividualsregardingtheirpersonalinformation.

Privatepropertyrightsdependupontheexistenceandenforcementofasetofrulesthatdefinewhohasarighttoundertakewhichactivitiesontheirowninitiativeandhowthereturnsfromthoseactivitieswillbeallocated.

LegalSourcesofaRighttoPrivacyintheUnitedStates:

*ChapterObjective3AddressedBelow*

Thelawhasnotyetcaughtupwiththetechnologyinvolvedinemployeeprivacy.Asaresult,thisisoneareawheresimplyobeyingthelawmayfallfarshortofresponsiblemanagementpractice.(i.e.Whilethelawmaybeveryclearwithregardtotappingaworker’stelephone,itislessclearwithmonitoringaworker’se-mailortextmessagesonahandhelddevice)

PrivacycanbelegallyprotectedintheUnitedStatesinthreeways:bytheconstitution(federalorstate),byfederaland/orstatestatutes,andbythecommonlaw.

Commonlawreferstothebodyoflawcomprisedofthedecisionhandeddownbycourts,ratherthanspecifiedinanyparticularstatutesorregulations.

TheU.S.Constitution’sFourthAmendmentprotectionagainstanunreasonablesearchandseizuregovernsonlythepublicsectorworkplacebecausetheConstitutionappliesonlytostateaction.Therefore,unlesstheemployeristhegovernmentorotherrepresentativeofthestate,theConstitutiongenerallywillnotapply.

Statutesalsoofferlittle,ifany,protectionfromworkplaceintrusions.

TheElectronicCommunicationsPrivacyActof1986(ECPA)prohibitsthe"interception"orunauthorizedaccessofstoredcommunications.

Thecourtshaverulethat“interception”appliesonlytomessagesintransitandnottomessagesthathaveactuallyreachedcompanycomputers.ThereforetheimpactofECPAistopunishelectronicmonitoringonlybythirdpartiesandnotbyemployers.

TheECPAallowsinterceptionwhereconsenthasbeengranted.AfirmthatsecuresemployeeconsenttomonitoringatthetimeofhireisimmunefromECPAliability.

*Reference:“RealityCheck–EyesintheSky”*

Somestatesrelyonstatutoryprotectionsratherthancommonlaw.Othersprovideconstitutionalrecognitionandprotectionofprivacyrights.

InallstatesexceptCalifornia,applicationofthisprovisiontoprivatesectororganizationsislimited,uncertain,ornotincludedatall.

“Intrusionintoseclusion”isaninvasionofprivacylegalviolationoccurswhensomeoneintentionallyintrudesontheprivateaffairsofanotherwhentheintrusionwouldbe“highlyoffensivetoareasonableperson.”

EXAMPLE:InCityofOntariov.Quon(2010),theU.S.SupremeCourtaddressedtheissueofemployermonitoringforthefirsttime.

TwoCaliforniapoliceofficersweredisciplinedafteranauditoftextmessagesoncity-issuesdevicesfoundthatmanyoftheofficers'textswerepersonalinnature.Thoughtheofficershadbeenassuredbytheirsupervisorthatanauditwouldnotbeperformed,theCourtdeterminedthattheauditwaspermissiblenonethelessbecausethereviewofthemessageswasreasonably"work-related."

However,relyingontheQuoncaseasprecedentforprotectioninregardstoelectronicsurveillanceofemployeesisadouble-edgedsword.

UndertheQuonprecedent,howmuchprotectionforelectroniccommunicationstheFourthAmendmentwillprovidetoemployeesremainsunclear.

Aswell,thoseprotectionsdonotextendtotheprivatesector.RememberthattheemployerinQuonwasagovernmentagency.

Inasubsequentcase,Rileyv.California,theU.S.SupremeCourtunanimouslyfoundexplicitprotectionundertheFourthAmendmentofcellphonesandothersimilardevices.

Employersmaywishtoconsidermorecarefullythenatureandextentofsearchestheymayconductonthesedevices,butalsowhethertheirpoliciesaredraftedclearlyenoughtoalertemployeesofthepotentialscopeofsuchsearchesandthelevelofprivacyemployeescanexpect.

Notice:ManyrecentU.S.courtprivacydecisionsseemtodependonwhethertheworkerhadnoticethatthemonitoringmightoccur.

Anemployee’slegitimateandreasonableexpectationofprivacyisthebasisforfindinganinvasionofprivacy.Ifanemployeehasactualnotice,thentheretrulyisnorealexpectationofprivacy.

ThisconclusionwassupportedinK-Martv.Trotti,wherethecourtheldthatsearchofanemployee’scompany-ownedlockerwasunlawfulinvasionsincetheemployeeusedhisownlock.However,inSmythv.Pillsbury,thecourtheldthatmonitoringisallowedevenwhenafirmpromisednottomonitor.

Evidenceoftheimpactofthisdecisionisthefactthatonlytwostates,ConnecticutandDelaware,requireemployerstonotifyworkerswhentheyarebeingmonitored.

Increasingly,however,statesareenactinglawstolimitemployermonitoringpowers.Asof2018,26states(plusGuam)prohibitemployersfromobtainingsocialmediapasswordsfromprospectiveorcurrentemployees.

*ReferenceTable7.1Here*

GlobalApplications:TheunpredictableregimeofprivacyprotectionisallthemoreproblematictomaintainwhenoneconsiderstheimplicationsoftheEuropeanUnion’sGeneralDataProtectionRegulation(GDPR).

TheGDPRprovidesthatpersonalinformationcannotbecollectednorsharedbycompanieswithoutindividuals’permission.Informationaboutwhoisusingthedataandforwhatpurposeitisbeingcollectedmustbeprovidedinaclear,easilyunderstandablemanner.Further,consumershavetherighttoreviewthedata,correctinaccuraciesandrequestthattheybeerased.

Allcompanies–regardlessoftheirsizeorlocation–arerequiredtocomplywithGDPRiftheyofferfreeorpaidgoodsorservicestoEUresidentsandcollecttheconsumer'spersonalinformation.(i.e.evensmallcompaniesbasedintheU.S.canstillbesubjecttothislaw)

TheEuropeanUniondoesnotallowthetransferofdataonitscitizensoutsideofthecountryunlessthecountryisdeemedtohaveadequatedataprivacylaws.Unfortunately,theEUhasdeemedthattheUSdoesnothaveadequatedataprivacylaws,butorganizationscannavigatethisbyadheringsomethingcalledthe"PrivacyShield.Underthisagreement,U.S.companiesmustadheretoadetailedsetofstandards,whichsurpasswhatU.S.lawtypicallyrequires.

*Reference:Table7.2here*

LegalUncertainty:Ethicsisperhapstheonlysourceofananswertothelegaluncertaintyorinstabilityconcerningthechallengingareasofinformationgathering.

BusinessImplications:Whataretheimplicationsofthisunderstandingofprivacyforbusinessesandforbusinessethicsanalysis?

Onewouldarguethatpersonalinformationshouldremainprivateunlessarelationshipexistsbetweenthebusinessandtheindividualthatlegitimatescollectingandusingpersonalinformationaboutthatindividual.

Thenatureoftheemploymentrelationshiphelpsdeterminetheappropriateboundarybetweenemployersandemployeesandthereforetheinformationthatoughttoremainrightfullyprivatewithintheworkplace.

Ifweadoptsomethinglikeacontractualmodelofemployment,wheretheconditionsandtermsofemploymentaresubjecttothemutualandinformedconsentofbothparties,thenemployeeconsentwouldbecomeonemajorconditiononwhatinformationemployerscancollect.

Employeeprivacyisviolatedwhenever:

Employersinfringeuponpersonaldecisionthatarenotrelevanttotheemploymentcontract(whetherthecontractisimpliedorexplicit)

Personalinformationthatisnotrelevanttothatcontractiscollected,stored,orusedwithouttheinformedconsentoftheemployee.

Theburdenofproof:restsontheemployertoestablishtherelevancyofpersonaldecisionsandinformationatissue.

DecisionPoint

InquiringEmployersWanttoKnow

ThisDecisionPointaddressestheboundariesofprivacywithinanemploymentapplication.Thefollowinginformationissometimesrequestedonstandardemploymentapplications,thoughcandidatesmightconsidersomeofittobeprivateorpersonal.Whichofthefollowingitemsaboutanemployeemightanemployerhavealegitimateclaimtoknow,andwhy?Whatinformationmightleadtounreasonableintrusionsordiscriminatorypractices,andwhy?

Ajobapplicant’ssocialsecuritynumber

Anapplicant’sarrestrecord

Anemployee’smedicalrecords

Anemployee’smaritalstatus

Whetherajobapplicantsmokes

Anemployee’spoliticalaffiliation

Anemployee’ssexualorientation

Anemployee’screditrating

Anemployee’spriorsalary

Studentsshouldconsiderthefollowingquestionsintheirassessmentofthisscenario:

Whatfactsarerelevanttoyourdecisions?

Whatwouldtheconsequencesbeofrefusingtoansweranyquestionsonanemploymentapplication?

Areyoubasingyourdecisiononparticularrightsoftheemployeeortheemployer?

Aretherepeopleotherthantheemployerandemployeewhomighthaveastakeinwhatinformationisreleasedtoemployers?

LinkingtheValueofPrivacytotheEthicalImplicationsofTechnology

ChallengingPrivacy:Theadventofnewtechnologychallengesprivacyinwayswecouldneverbeforeimagine.Considertheimplicationstechnologyhasfor:

Employeeandemployerexpectationsregardingtheuseoftime.

Thedistinctionbetweenworkuseandpersonaluseoftechnology.

Theprotectionofproprietaryinformation.

Performancemanagement.

Privacyinterests.

Accessibilityissuesrelatedtothedigitaldivide.

IncreasedOpportunitiesandChallenges:

Technologyallowsforin-homeoffices,raisingextraordinaryopportunitiesaswellaschallenges,issuesofsafety,andprivacyconcerns.

Becausetechnologyallowseachofustobemoreproductive,itprovidesusbenefitsandallowsemployerstoaskmoreofeachemployee.

Advancesintechnologyseemtoblurboundariesbetweenleisureandworktime,aswellasbetweenourplacesofworkandourhomes.

ValueJudgments:Newtechnologydoesnotnecessarilyimpactourvaluejudgmentsbutinsteadsimplyprovidesnewwaystogathertheinformationonwhichtobasethem.

ConsidertheattacksofSeptember11,2001,onaU.S.employer’sdecisiontosharepersonalemployeeinformationorcustomerinformationwithlawenforcement.Privatefirmsmaybemorewilling,orlesswilling,todaytoshareprivateinformationthantheywouldhavebeenpreviously.

NewTechnologyMeansNewChallenges:Firmsoftenexperience,andfindthemselvesill-preparedfor,unanticipatedchallengesstemmingfromnewtechnology.

EXAMPLE:AnemployeeatPhoneDog,acompanythatprovidesmobiledevicenewsandreviews,createdawork-relatedTwitteraccountthatamassed17,000followers.Whenheleftthecompany,hekeptcontroloftheaccountanduseditashispersonalaccount.Thecompanysued,buttheemployeeclaimedthattheaccountbelongedtohim.Thecaseisongoing,butregardlessoftheoutcome,itillustratesthedangersoffailingtoestablishclearpoliciesgoverningtheusenewtechnologiesastheyariseintheworkplace.

NewEthicsforaNewEconomy?

Thesamevaluesoneheldunderpreviouscircumstances,iftheyaretrueandjustified,shouldpermeateandrelatetolatercircumstances.

Perspectivesareimpactedbytheunderstandinganduseofnewtechnology.

Aneconomist,AntonioArgandona,cautionsaboutthechangeinvaluesthatmaybecausedbyopportunitiescreatedbytechnology,buthealsopointstothegoodthatnewtechnologycoulddo,includingdevelopingdepressedareas,defendinghumanrights,andincreasingcitizenshipparticipation.

InformationandPrivacy:

Businessesneedtobeabletoanticipatetheperceptionsofitsstakeholdersinordertobeabletomakethemosteffectivedecisionsforitslong-termsustainability.Newtechnologycanbeconfusingforthepublicsoithelpstoplanaheadfortechnologicalchanges.

Trustisthekeyissuewiththeintroductionofnewtechnology.

EXAMPLE:ThemottoatGoogle,theInternet-basedsearchengine,is“don’tbeevil”(originallyusedasitscoremotto,nowretainedasthelastsentenceofitsCodeofConduct).Thecompanyissensitivetostakeholderconcernsasitdevelopsnewtechnology(suchasachoicenottoallowgunads.)

Whenconsumersrelyontechnologyprovidedbyabusiness,theymighteasilyassumethatthebusinesswillrespecttheirprivacy.Theywouldliketobelievethatthoseresponsibleforthetechnologyare,themselves,accountabletotheuser.

*ReferenceDecisionPoint:“TechnologyDilemmas”

DecisionPoint

TechnologyDilemmas

ThisDecisionPointaddressesquestionsaboutusingtechnologyfor“good”or“evil”raisedbyananonymousWebpostingbyanemployeewhohasbeendirectedbymanagementtouseacomputerprogramtospyonacolleague.Theemployeeseeksgeneralthoughtsandadviceregardinglegalprotectionagainstliabilityforfollowingthisdirective.

Studentsshouldconsiderthefollowingquestionsinassessingthisscenario:

Whatarethekeyfactsrelevanttoyourresponse?

Whatistheethicalissueinvolvedinpeerspyingintheworkplace?

Whoarethestakeholders?

Whatalternativeswouldyousuggesttothisindividual,andwhatalternativesexistforemployerswhowishtogatherinformationaboutemployeessurreptitiously?

Howdothealternativescompare;howdothealternativesaffectthestakeholders?

ShouldMoralRequirementsBeImposed?

EconomistAntonioArgandonacontendsthatifnewtechnologyisdependentonandhasasitssubstanceinformationanddata,thensignificantmoralrequirementsshouldbeimposedonthatinformation.Hesuggeststhefollowingnecessaryelements:

Truthfulnessandaccuracy:Thepersonprovidingtheinformationmustensurethatitistruthfulandaccurate,atleasttoareasonabledegree.

Respectforprivacy:Thepersonreceivingoraccumulatinginformationmusttakeintoaccounttheethicallimitsofindividuals’(andorganizations’)privacy.Thiswouldincludeissuesrelatingtocompanysecrets,espionage,andintelligencegathering.

Respectforpropertyandsafetyrights:Areasofpotentialvulnerability,includingnetworksecurity,sabotage,theftofinformationandimpersonation,areenhancedandmustthereforebeprotected.

Accountability:Technologyallowsforgreateranonymityanddistance,requiringaconcurrentincreasedexigencyforpersonalresponsibilityandaccountability.

Howmightfirmsrespondtothiscallforresponsibilityinthedevelopment,manufacture,marketingandservicerelatedtonewproductionorothercorporateactivities?Whatethicalissuesdoesthisproposalraise?

ManagingEmployeesthroughMonitoring

*ChapterObjective4AddressedBelow*

MonitoringintheWorkplace:Oneofthemostprevalentformsofinformationgatheringintheworkplaceisemployermonitoringofemployees’work;andtechnologyhasaffordedemployersenormousabilitiestodothiseffectivelyatlowcosts.

DATA:Accordingtoonesurvey,88percentofemployeesusesocialmediaatleastonceduringtheworkdayand18percentcheckmorethan10timeseachday.

DATA:Thereisanincreasingtrendwithinmid-tolarge-sizedU.S.firmswithregardtoemployeee-mailandinternetmonitoring.

AsurveyconductedbytheAmericanAcademyofManagementfoundthatnearly80percentoflargecompaniesmonitortheiremployees’useofemail,internet,andphone.Thatnumberrisesto90percentforfirmsinparticularlysensitiveindustries.

Productivityisaprimaryconcernforemployerswhofeeltheiremployeesbringtoomuchoftheirpersonallivestotheworkplace.OneCareerBsurveyfoundthat41percentofworkersnamed"theInternet"asthelargestproductivitykilleratwork,while37percentnamed"socialmedia.

Employeemonitoringhasevencrossedthethresholdfromcomputerusetobodyautonomy.

Biotrackingtechnologyallowemployerstorecordthenumberofstepsthatemployeestakesinaday,theirheartrate,whattheyeatanddrink,howmuchsleeptheygetand

eventheirhormonelevels.Theinformationgatheredfromthistechnologyoftenisincorporatedintoemployeewellnessprograms.Oneemployerhasevenbeguntestingtrackingimplantsinemployees.

*ChapterObjective5AddressedBelow*

HiddenEthicalIssues:Manyoftheethicalissuesthatariseintheareaofmanaginginformationarenotreadilyvisible.

Whenwedonotcompletelyunderstandthetechnology,wemightnotunderstandtheethicalimplicationsofourdecisionsandwearenotableeffectivelytoprotectourowninformation.

Whenwemistakenlybelievethatnooneiswatching,wemayengageinactivitiesthatwewouldotherwiserefrainfromdoing,suchasdeletingane-mailmessagethatwedonotwantanyonetoread.

Aknowledgegapexistsbetweenpeoplewhounderstandthetechnologyandotherswhoareunabletoprotectthemselvesbecausetheydonotunderstand.

Access:Technologyallowsforaccesstoinformationthatwasneverbeforepossible.

Accesscantakeplaceunintentionally,suchasasupervisordiscoveringpersonalinformationduringaroutinebackgroundcheck.

Technologyallowsustoworkfromalmostanywhereontheplanet,sowea

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

最新文档

评论

0/150

提交评论