Part Two Ethical Issues and the Institutionalization of Business Ethics Chapter 3 Emerging Business Ethics Issues © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 1 An ethical issue is a problem, situation, or opportunity that requires an individual or group to choose among actions New ethical issues are emerging constantly Can be difficult to recognize ethical issues Failure to do so puts corporations at risk Is a problem in industries where winning is perceived to be a game © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 2 Specific Types of Observed Misconduct Behavior 2009 (%) Misuse of company time 33 n/a Abusive behavior 21 22 Lying to employees 20 19 Company resource abuse 20 23 Violating company Internet use policies 16 n/a Discrimination 15 14 Conflicts of interest 15 16 Inappropriate social networking 14 n/a Health or safety violations 13 11 Lying to outside stakeholders 12 12 Stealing 12 9 Falsifying time reports or hours worked 12 n/a Employee benefit violations 12 11 Sexual harassment 11 7 © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Source: Ethics Resource Center, 2011 National Business Ethics Survey: Workplace Ethics in Transition (Arlington, VA: Ethics Resource Center, 2012), 39. 2011 (%) 3 Integrity: Uncompromising adherence to ethical values One of the most important terms relating to virtue © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 4 Honesty: Truthfulness or trustworthiness Telling the truth to the best of your knowledge Dishonesty: A lack of integrity, incomplete disclosure, or an unwillingness to tell the truth Issues related to honesty arise when people perceive business as something where normal rules do not apply © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 5 Fairness: The quality of being just, equitable, and impartial Equality: How wealth or income is distributed Reciprocity: Occurs when an action that has an effect upon another is returned Optimization: The tradeoff between equity and efficiency © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 6 An ethical dilemma is a problem, situation, or opportunity that requires an individual or group to chose among several wrong or unethical actions There is no ethical choice © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 7 Shareholder Issues 1. Core values 2. Shareholder participation in electing directors 3. Executive compensation 4. Legal compliance 5. Lobbying and political activities 6. Reputation management 7. Integrity in collecting and managing data 8. Supply chain relationships and human rights © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 8 The leading form of observed misconduct Can range from unauthorized use of equipment and computers to embezzling company funds Time theft costs organizations hundreds of billions in lost productivity annually © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9 One of the most common ethical problems Can be physical threats, false accusations, profanity, insults, harshness, ignoring someone, or unreasonableness Intent is important in determining abuse Bullying is a growing problem Is associated with a hostile workplace © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 10 Actions Associated with Bullies 1. Spreading rumors to damage others 2. Blocking others’ communication in the workplace 3. Flaunting status or authority to take advantage of others 4. Discrediting others’ ideas and opinions 5. Use of e-mails to demean others 6. Failing to communicate or return communication 7. Insults, yelling, and shouting 8. Using terminology to discriminate by gender, race, or age 9. Using eye or body language to hurt others or their reputations 10. Taking credit for others’ work or ideas Source: Adapted from Cathi McMahan, “Are You a Bully?” Inside Seven , California Department of Transportation Newsletter, June 1999, 6. © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 11 Three types of lies Joking without malice Commission lying is creating a false perception with words that deceive the receiver Creating noise Omission lying is intentionally not informing channel members of problems relating to a product that affects awareness, intention, or behavior © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 12 Exist when an individual must choose whether to advance his/her personal interests, those of the organization, or some other group Individuals must separate personal interests from business dealings © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 13 The practice of offering something in order to gain an illicit advantage Different types of bribery Active bribery: The person who promises or gives the bribe commits the offense Passive bribery: An offense committed by the official who receives the bribe Facilitation payments: Legal as long as they are small © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 14 The collection and analysis of information on… Markets Technologies Customers and competitors Socioeconomic and external political trends © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 15 Three intelligence models Passive monitoring system for early warning Tactical field support Support dedicated to top management strategy © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 16 Hacking System hacking Remote hacking Physical hacking Social engineering Shoulder surfing Password guessing Dumpster diving Whacking Phone eavesdropping © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 17 Is illegal in the U.S. A company can be sued for discrimination if it… Refuses to hire an individual for discriminatory reasons Unreasonably excludes an individual from employment Unreasonably discharges an individual Discriminates against an individual with respect to hiring, employment terms, promotion, or privileges © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 18 Equal Employment Opportunity Commission (EEOC) The Age Discrimination in Employment Act Affirmative Action Programs Efforts to recruit, hire, train, and promote qualified individuals from groups that have traditionally been discriminated against © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 19 A repeated, unwanted behavior of a sexual nature perpetrated upon an individual by another Hostile work environment The conduct was unwelcome The conduct was severe, pervasive, and regarded by claimant as hostile/offensive The conduct was such that a reasonable person would find it hostile or offensive © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 20 A personal, loving, and/or sexual relationship with someone with whom you share professional responsibilities A key ethical issue in sexual harassment Unethical dual relationship: The relationship causes a conflict of interest or impairment of professional judgment © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 21 1. Statement of policy 2. Definition of sexual harassment 3. Non-retaliation policy 4. Specific procedures for prevention 5. Establish, enforce, and encourage victims to report 6. Establish a reporting procedure 7. Timely reporting requirements to the proper authorities © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 22 Any purposeful communication that deceives, manipulates, or conceals facts in order to create a false impression Accounting fraud Misrepresentation of company’s financial reports Dramatic changes in accounting field Increased competition and pressures to perform can create opportunities for misconduct Accountants should abide by a strict code of ethics © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 23 Initial Detection of Operational Frauds Source: Association of Certified Fraud Examiners, Report to the Nations on Occupational Fraud and Abuse: 2012 Global Fraud Study , 14. © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 24 The process of dishonestly creating, distributing, promoting, and pricing products Puffery: Exaggerated advertising claims, blustering, and boasting Can be difficult to distinguish from fraud Implied falsity: An advertising message that misleads, confuses, or deceives the public Literally false: Claims can be divided into tests prove (establishment claims) and bald assertions (non-establishment claims) © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 25 When consumers attempt to deceive businesses for personal gain Price tag switching, item switching, or lying to obtain discounts Collusion involves an employee who helps a consumer commit fraud Duplicity involves a consumer duping a store Guile is associated with a person who uses tricks to obtain an unfair advantage © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 26 The failure to understand and manage ethical risks was a key problem in the recent financial crisis Many firms rewarded risk-taking Difficult-to-understand financial instruments and murky accounting played roles Government calls for reform Stricter controls on hedge funds and other instruments Greater transparency Dodd-Frank Wall Street Reform and Consumer Protection Act © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 27 Two types of insider trading Legal insider trading: Involves legally buying and selling stock in an insider’s own company, but not all the time Illegal insider trading: The buying or selling of stocks by insiders who possess material that is not public © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 28 Involve the legal protection of intellectual properties Books, movies, software Many privacy issues in the business world Employee use of technology Consumer privacy Can be challenging for businesses today to meet the needs of consumers while protecting privacy Identity theft is a growing problem © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 29 Most ethical issues become visible through stakeholder concerns Determining ethical issues is a challenge Changing societal standards over time The ethical decision making process starts when ethical issue awareness occurs and a discussion begins © 2015 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 30
© Copyright 2026 Paperzz