Professional Documents
Culture Documents
An Ecologically Sustainable Organization (ESO) is a Web sites with a privacy policy do not necessarily mean that
business that operates consistently with principles of the consumers personal information and online activities are
sustainable development. not being sold to others. New technological advances, like
Radio Frequency
An ESO could continue its activities indefinitely, without Identification (RFID) have increased ways privacy violations
altering the carrying capacity of the earths ecosystem. Such can occur. Increased use of cameras on cell phones has
businesses would not use up natural resources any faster that raised privacy objections.
they could be replenished or substitutes found. They would
make and transport products efficiently, with minimal use of Platform for Privacy Preference Project (P3P) provides users
energy. They would design products that would last a long time with software that enables them to define what information they
and that, when worn out, could be disassembled and recycled. are willing to divulge on the Internet.
They would not produce waste any faster than natural systems
could absorb and disperse it. They would work with other Technological Challenges
businesses, governments, and organizations to meet these Industry and Government Efforts to Manage Privacy
goals. Platform for Privacy Preference Project (P3P) provides users
with software that enables them to define what information they
Organizational elements of many proactive green are willing to divulge on the Internet. Is available free now on
companies some browsers
Some businesses have banded together to support industry
Line manager involvement self- regulation efforts.
The concept is what social scientists call an ideal type, that
is a kind of absolute standard against which real organizations Nineteen Companies, including AT&T, Cisco Systems, IBM,
can be measured. Hewlett-Packard, Microsoft, and Oracle, launched the
Information Technology-Information Sharing and Analysis
ESO needs supportive government policies and widespread Center; through the Center companies share sensitive
movement among many businesses and other social information about cyber attacks.
institutions.
Despite industry efforts, some believe government regulation is
Environmental Management in Practice necessary.
Top management involvement in sustainability
Line manager involvement International management of technology is difficult to achieve.
Codes of environmental conduct Management of Information Security Businesses now acutely
Cross-functional teams aware of maintaining information security.
Rewards and incentives
Track performance through environmental audits Some corporate security lapses have occurred due to human
error. May also be the result of criminal activity.
Publish combined sustainability reports integrating social,
economic and environmental performance Businesses Protecting Privacy
Environmental Management as a Competitive Advantage
Chief Information Officer
Cost Savings Is responsible for managing technology, including its many
Companies that reduce pollution and hazardous waste, reuse security issues, for companies.
or recycle materials, and operate with greater energy efficiency Position has been elevated in recent years, 42% currently
can reap significant cost savings report directly to the CEO. More troubling phenomenon is
decreasing amount of time information technology managers
Product Differentiation have to patch their software before the worm hits
Companies that develop a reputation for environmental
excellence and that produce and deliver products and services Computer hackers are those responsible for these viruses and
with concern for their sustainability can attract environmentally breaching business information security systems.
aware customers
Part of job is enabling or driving business innovation through
Technological innovation it can lead to imaginative new use of technology.
methods for reducing pollution and increasing efficiency
Businesses Responses to Invasions of Information Security
Strategic Planning - Companies that cultivate a vision of Businesses have invested more resources in protecting their
sustainability must adopt sophisticated strategic planning information. By 2006, aggressive company measures seemed
technique to be having positive effect.
TECHNOLOGICAL CHALLENGES
Technology fosters changes. Technological change has raised In 2005, 2 out of 3 computer hacker attacks were intercepted.
ethical and social questions of privacy, security, ownership, Less than 3% of emails contained a virus in 2005, down from
health, and safety. What are the implications of this fast-paced 6% in 2006. Companies now using honeypots, system used
change on our society and those who live in it? Moreover, who by security professionals to lure hackers to a fabricated
is responsible for determining how much technological change website that can track all their movements
should occur or how fast things should change? Should Chief Information Officer (CIO)
technology be controlled, and if so, who should be in charge of
managing technology and the challenges it poses for humans
and cultures in our global community? Is responsible for managing technology, including its many
security issues, for companies.
Employees have access to new technologies at work and Position has been elevated in recent years, 42% currently
companies may be monitoring usage, raising employee report directly to the CEO
concerns about invasions of privacy.
Businesses have adopted privacy policies to explain what use Internet Pornography
of the companys technology is permissible and how it will Is one of the most active and lucrative areas of e-commerce. In
monitor employee activities 2006 4.2M web sites, 35% of downloads, $57B in worldwide
revenues
Privacy Issues in the Business-Consumer Relationship
Debate over protection of privacy vs. government access to Some countries monitor sites for objectionable material.
personal data began in earnest with 9/11 and still goes on. Enforcing underage use is problematic; some blockers or
New technological advances, like Radio Frequency I parental tracking devices have emerged. U.S. passed Child
Online Privacy Protection Act in 1998 Congressional legislation
requires libraries to have Internet filters
The ideas, concepts, and other symbolic creations of the
human mind. Protected in U.S. by copyright, patent and
trademark laws
Software Piracy
The illegal copying of copyrighted software. In U.S., Digital
Millennium Copyright Act (1998) makes it a crime to
circumvent antipiracy measures built into most commercial
software agreements.
In China, taking active steps to reduce piracy. Business
Software Alliance, since 1988, has represented leading
software companies internationally. In the Philippines, the
Optical Media Board is the government arm responsible to stop
software, video, and audio piracy.
Human Genome
In 2000, the Celera Genomics Group announced that it
completed the first sequencing of human DNA makeup.
Technological Challenges
Stem-cell research is research on non-specialized cells that
have the capacity to self-renew and to differentiate into more
mature cells.
Cloning
In 1986, a Danish scientist announced the first successful
cloning of a sheep from fetal cells.
In 2002, the U.S. Senate began debates on a bill to ban human
cloning.
In 2003, U.N. General Assembly started considering cloning
with no consensus.
Bioterrorism
Terrorist groups see the use of deadly bioengineered diseases
and poisons, such as smallpox, anthrax, and bubonic plague,
as effective tools