Đang chuẩn bị liên kết để tải về tài liệu:
Lecture Management information systems (10/e): Chapter 13 - James A. O'Brien, George M. Marakas
Không đóng trình duyệt đến khi xuất hiện nút TẢI XUỐNG
Tải xuống
In this chapter, the learning objectives are: Identify several ethical issues regarding how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems; identify several types of security management strategies and defenses and explain how they can be used to ensure the security of business applications of information technology;. | Security and Ethical Challenges Chapter 13 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Multimedia Lecture Support Package to Accompany Basic Marketing Lecture Script 6- Learning Objectives Identify several ethical issues regarding how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems. Identify several types of security management strategies and defenses and explain how they can be used to ensure the security of business applications of information technology. Learning Objectives Propose several ways that business managers and professionals can help lessen the harmful effects and increase the beneficial effects of the use of information technology. Corporate Social Responsibility Theories Stockholder Theory Managers are agents of the stockholders Only responsible to increase profits without violating the law or fraud Social . | Security and Ethical Challenges Chapter 13 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Multimedia Lecture Support Package to Accompany Basic Marketing Lecture Script 6- Learning Objectives Identify several ethical issues regarding how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems. Identify several types of security management strategies and defenses and explain how they can be used to ensure the security of business applications of information technology. Learning Objectives Propose several ways that business managers and professionals can help lessen the harmful effects and increase the beneficial effects of the use of information technology. Corporate Social Responsibility Theories Stockholder Theory Managers are agents of the stockholders Only responsible to increase profits without violating the law or fraud Social Contract Theory Responsible to all of society Stakeholder Theory Responsible to anyone affected by company Stockholder Theory Managers are agents of the stockholders Their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices Social Contract Theory Companies have ethical responsibilities to all members of society, who allow corporations to exist Stakeholder Theory Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders Stakeholders are all individuals and groups that have a stake in, or claim on, a company Principles of Technology Ethics Proportionality Good must outweigh the harm or risk Informed Consent Those affected should understand and accept risks Justice Benefits and burdens distributed fairly Minimized Risk Avoid all unnecessary risk Proportionality The good achieved by the technology must outweigh the harm or risk; there must be no alternative that .