Sie sind auf Seite 1von 15

11: THE ROLE OF TECHNOLOGY

12: REGULATING AND MANAGING


INFORMATION TECHNOLOGY
MARTECA SOLER-BODDEN
INTERNATIONAL COLLEGE OF THE CAYMAN ISLANDS
SEMINAR: BUSINESS & SOCIETY
13 NOVEMBER 2017
MS. MELISA BENT-HAMILTON
11: LEARNING OBJECTIVES
11.1 Defining technology and its characteristics

Recognising how technology has evolved throughout


11.2
history and what fuels technological innovations
Recognizing how technology impacts organisations and
11.3
individuals
Recognising the benefits, ethical and social challenges
11.4
of technology
11.5
Examining how technology changes how organizations
operate
11.6 Evaluating the emerging ethical challenges from technology
11.1: DEFINE TECHNOLOGY
What is technology?*
Technology:
has sped up globalization and lowered communication costs (p. 234).
Has widespread effects.
is self-reinforcing.
11.2: THE HISTORY OF TECHNOLOGY AND THE FUEL OF
INNOVATION
The 6 phases of development of technology are the non-agrarian, agrarian,
industrial, service, information, and semantic (p. 235).
Government and businesses are the greatest contributors. The greatest
contributor is the desire for more.
11.3: THE IMPACTS OF TECHNOLOGY
More internet access (p. 235). Internet Use by Country, 2014, p. 237
More information and Spain
Italy
electronics (p. 236). Turkey
Vietnam

Smart phones have been Korea


Egypt
created (p. 240). Philippines
Iran
More unwanted internet threats. Mexico
Indonesia
Ex: Spam and phishing (p. France
United
238). Nigeria

Germany
What is spam and phishing?* Russia
Japan
M-ecommerce, E-commerce, Brazil
India
and social-networking (p. 240- United

241). China
0 100 200 300 400 500 600 700
11.4: BENEFITS, ETHICAL, AND SOCIAL
CHALLENGES OF TECHNOLOGY
More ethical and social challenges (p. 242).
The biggest challenges are 1) genetically
modified foods, 2) the sequencing of human
genome and the use of genetic information, and
3) biotechnology (p. 242).
What is human genome?*
GM foods began in the 1980s and their
popularity increased until the 2010s (p. 243).
Is the sequencing of human genomes more
helpful or harmful? (p. 245).
Biotechnology raises many arguments with
religious groups (245-246).
11.5: HOW TECHNOLOGY CHANGES HOW
ORGANISATIONS OPERATE
E-business sales have increased Global E-business Sales Growing (p. 247)
dramatically (p. 247). 1200

Customers can do everything 1000

online. 248).
Most customers expect
800

businesses to have websites 600

where they can view all in store


products and prices (p. 248). 400

Robots increase productivity 200

and replace dangerous (p.


249). 0
2010 2011 2012 2013 2014
Years
11.6: DEALING WITH ETHICAL CHALLENGES

Ethical challenges include social networking and data collecting


applications / experiments (p. 250).
Smarter cars, GPS systems, high-definition street cameras also add
to this (p. 250).
The right to free speech on the internet is another issue. (p. 251).
12: LEARNING OBJECTIVES
12.1
Understanding why the management of technology is
challenging for governments and businesses
12.2
Identifying the technology interventions undertaken by
governments
Examining business challenges in managing information
12.3
about key stakeholders
12.4 Knowing the causes and remedies of cybercrime
Assessing the responsibilities of the CIO and how to
12.5
ensure information security
12.6
Identifying the international and national governments efforts
to combatting cybercrime
12.1: WHY MANAGING TECHNOLOGY IS
CHALLENGING FOR GOVERNMENTS AND BUSINESSES

Technology is
quick, widespread,
and self-
reinforcing (p.
258).
Governments and
businesses find it
difficult to work
together (p. 258).
12.2: GOVERNMENT INTERVENTIONS OF
INFORMATION AND IDEAS

Internet censorship as a way of control is active in


China, Pakistan, Iran, and North Korea. (p. 259-260).
Some governments are faced with the option of
protecting citizens or respecting their privacy. Those
who chose to protect citizens tapped cell phones, read
e-mails, and searched through subscriber
communications (p. 261-262).
12.3: CHALLENGES IN MANAGING INFORMATION
ABOUT KEY STAKEHOLDERS

There is an ongoing debate There is also an n debate about


about whether monitoring whether collecting data consumer
employees internet usage is is necessary or wrong (p. 263-
necessary or wrong (p. 263- 264).
264).
12.4: THE CAUSES AND REMEDIES OF CYBERCRIME

What is cybercrime?*
Cost of cybercrime per U.S. business organization was $12.7 million in 2014 (p.
266).
Global estimates of the costs of cybercrime range between $300 billion to $1 trillion
in annual global losses (p. 266).
Some hackers do it for profit, some for political reasons, and some to gain media
attention (p. 268-269).
What are grey hatters and white hatters?
Business are spending more money on
security systems and are hiring Chief
Information Officers (p. 270). Some of their
12.5: THE CIO responsibilities include:
AND Ensuring that everyone clearly
ENSURING understands the businesss objectives,
INFORMATION processes and timetables for technology
projects.
SECURITY
Providing structure to welcome inventive
thinking.
Ensuring that innovative ideas have a
meaningful impact, and many more.
12.6: GOVERNMENT EFFORTS IN COMBATTING
CYBERCRIME

Governments have been


working together to The efforts of government
prevent cybercrime (p. coordination have so far
272-273). established (p. 272-273):

A non-profit organisation
Data Privacy Day on where people can sign The 2014 change of A new centre to
28 January up for free security the NATO collective quickly deter cyber
checks, check their defence attacks on the U.S.
privacy settings.
REFERENCES
(n.d.). In Business and Technology. Retrieved from http://66.201.44.162/ojs/index.php/BAT

Carter, J. (2017). Resources on Bioethics. In The Ethics and Religious Liberty Commission of the Southern Baptist Convention. Retrieved
from https://erlc.com/resource-library/topic-index/bioethics

Kagan, J. (2017). Why We Should Care More About Who's Watching. In E-Commerce Times. Retrieved from
https://www.ecommercetimes.com/story/84793.html

Kumar, M. (2017). Proposed Bill Would Legally Allow Cyber Crime Victims to Hack Back. In The Hacker News. Retrieved from
https://thehackernews.com/2017/03/hacking-back-hackers.html

Lawrence, A. T., & Weber, J. (2017). Business and Society: Stakeholders, Ethics, Public Policy (15th ed.).

The Mobile Future: What to Expect? (2016). In The Mobile Chronicles. Retrieved from
https://themobilechronicles.com/2016/02/21/the-mobile-future/

Das könnte Ihnen auch gefallen