Vous êtes sur la page 1sur 3

Whistle-Blowing

When an employee in an organization uncovers wrongdoing, a. Lobbying - Lobbyists communicate with and try to
attempts to get it resolved within the organization and are persuade others to support an organizations interest
unable to( either because mechanisms are not in place or or stake as they consider a particular law, policy, or
there is no response), they then choose to report the situation regulation
outside of the organization (e.g. media or government agency) b. Direct Communications with Policymakers -
to achieve resolution. Becoming a whistle-blower is challenging Businesses invite officials to participate in activities
and potentially hazardous to ones career. Examples of that will improve government officials understanding
government protection for whistleblowers around the world are of management and employee concerns.
the following: c. Expert Witness Testimony Businesses provide
facts, anecdotes, or data to educate or influence
Stigmas Against Whistle-blowers. government leaders at public forums like
congressional hearings
Divided Loyalties - In some Asian countries, members of the
company are treated as family members and it is considered The Business Roundtable
wrong to report on family members. One of the most effective organizations for promoting
History - The country may have a tragic history of reporting on direct communication between business and policy
others. makers.
Logistics - Employees of global companies may be faced with Organization of CEOs of leading corporations.
numerous time zones and language differences that could Studies various public policy issues and advocates for
prevent whistle-blowing or make it more difficult. laws it believes foster vigorous economic growth and a
Fear of Retribution - Despite government laws to protect dynamic global economy.
whistle-blowers, many employees of global businesses fear
retaliation. Promoting a Financial Incentive Strategy

Political & Ecological Challenges 1. Political Action Committees - Independently incorporated


organizations that can solicit contributions and then
Businesses face complicated issues in managing their channel those funds to candidates seeking political office
relationships with politicians and government regulators.
Managers must understand the political environment and be 2. Economic Leverage Occurs when a business uses its
active and effective participants in the public policy process. economic power to threaten to leave a city, state, or
They need to ensure that their company is seen as a relevant country unless a desired political action is taken Advocacy
stakeholder when government officials make public policy Advertising
decisions and must be familiar with the many ways that
business can influence these decisions. The opportunities Promoting a Constituency Building Strategy
afforded businesses to participate in the public policy process
differ from nation to nation. Sound business strategies depend 1. Stakeholder Coalitions - Businesses try to influence
on an understanding of these differences, enabling businesses politics by mobilizing organizational stakeholders to
to manage worldwide businessgovernment relations support its political agenda.
effectively. 2. Advocacy Advertising - Advertisements that focus on a
companys views on controversial political issues
Constituency-building Strategy 3. Public Relations - Could be politically charged comment in
a speech by senior executive or a public relations
Businesses seek to gain from other. Affected organizations to campaign.
better influence government policymakers to act in a way that 4. Trade Associations - Coalitions of companies in the same
helps them. or related industries to coordinate their grassroots
mobilization campaigns
Growing public interest in protecting the environment has 5. Legal Challenges - Business seeks to overturn a law after
prompted political and corporate leaders to become it has been passed.
increasingly responsive to environmental issues. Government
policy makers have moved toward greater reliance on market- Levels of Political Involvement
based mechanisms, rather than command and control
regulations, to achieve environmental goals. At the same time, Level 1 : Limited Organizational Involvement indirect and
many businesses have become increasingly proactive and impersonal .
have pioneered new approaches to effective environmental Contribution to political action committee.
management, often conferring a competitive advantage. Support of a trade association or industry activities.
Level 2: Moderate Organizational Involvement indirect yet
Corporate Political Strategy personal
Business leaders and scholars agree that firms must Organizational lobbyist
participate in the political process. Employee grassroots involvement
Stakes are too high for business not to be involved. Stockholders and customers encouraged to become
Government acts on issues that affect basic operations of involved
companies. Level 3 :Aggressive Organizational Involvement
Companies therefore must formulate their Corporate Political
Strategy. Ecologically Sustainable Organization
Involves the activities taken by organizations to acquire, The need for balance between economic and environmental
develop, and use power to obtain an advantage. considerations is captured in the concept of Sustainable
Development. This term refers to development that meets
Three Strategic Types of Corporate Political Strategy the needs of the present without compromising the ability of
1. Information Strategy future generations to meet their own needs.
Businesses seek to provide government policymakers with
information to influence their actions. The concept includes two core ideas:
Examples are lobbying, direct communication, and expert Protecting the environment will require economic development.
witness testimony Poverty is an underlying cause of environmental degradation.
2. Financial-incentives Strategy People who lack food, shelter, and basic amenities misuse
Businesses provide incentives to influence government resources just to survive. For this reason, environmental
policymakers to act in a certain way. protection will require providing a decent standard of living for
Examples are political contributions, economic leverage, all the worlds citizens. But economic development must be
political consulting aid, and office personnel. accomplished sustainably that is, in a way that conserves the
3. Constituency-building Strategy earths resources for future generations. Growth cannot occur
Businesses seek to gain from other affected organizations to at the expense of degrading the forests, farmland, water and
better influence government policymakers to act in a way that air that must continue to support life on this planet. We must
helps them. Examples are stakeholder coalitions, advocacy leave the earth in as good shape or better shape that we
advertising, public relations, and legal challenges. found it.
Political Action Tactics
An Ecologically Sustainable Organization (ESO) is a business not being sold to others. New technological advances, like
that operates consistently with principles of sustainable Radio Frequency
development. Identification (RFID) have increased ways privacy violations
can occur. Increased use of cameras on cell phones has
An ESO could continue its activities indefinitely, without raised privacy objections.
altering the carrying capacity of the earths ecosystem. Such
businesses would not use up natural resources any faster that Platform for Privacy Preference Project (P3P) provides users
they could be replenished or substitutes found. They would with software that enables them to define what information they
make and transport products efficiently, with minimal use of are willing to divulge on the Internet.
energy. They would design products that would last a long time
and that, when worn out, could be disassembled and recycled. Technological Challenges
They would not produce waste any faster than natural systems Industry and Government Efforts to Manage Privacy
could absorb and disperse it. They would work with other Platform for Privacy Preference Project (P3P) provides users
businesses, governments, and organizations to meet these with software that enables them to define what information they
goals. are willing to divulge on the Internet. Is available free now on
some browsers
Organizational elements of many proactive green companies Some businesses have banded together to support industry
self- regulation efforts.
Line manager involvement
The concept is what social scientists call an ideal type, that Nineteen Companies, including AT&T, Cisco Systems, IBM,
is a kind of absolute standard against which real organizations Hewlett-Packard, Microsoft, and Oracle, launched the
can be measured. Information Technology-Information Sharing and Analysis
Center; through the Center companies share sensitive
ESO needs supportive government policies and widespread information about cyber attacks.
movement among many businesses and other social
institutions. Despite industry efforts, some believe government regulation is
necessary.
Environmental Management in Practice
Top management involvement in sustainability International management of technology is difficult to achieve.
Line manager involvement Management of Information Security Businesses now acutely
Codes of environmental conduct aware of maintaining information security.
Cross-functional teams
Rewards and incentives Some corporate security lapses have occurred due to human
Track performance through environmental audits error. May also be the result of criminal activity.

Publish combined sustainability reports integrating social, Businesses Protecting Privacy


economic and environmental performance
Environmental Management as a Competitive Advantage Chief Information Officer
Is responsible for managing technology, including its many
Cost Savings security issues, for companies.
Companies that reduce pollution and hazardous waste, reuse Position has been elevated in recent years, 42% currently
or recycle materials, and operate with greater energy efficiency report directly to the CEO. More troubling phenomenon is
can reap significant cost savings decreasing amount of time information technology managers
have to patch their software before the worm hits
Product Differentiation
Companies that develop a reputation for environmental Computer hackers are those responsible for these viruses and
excellence and that produce and deliver products and services breaching business information security systems.
with concern for their sustainability can attract environmentally
aware customers Part of job is enabling or driving businessinnovation through
use of technology.
Technological innovation it can lead to imaginative new
methods for reducing pollution and increasing efficiency Businesses Responses to Invasions of Information Security
Businesses have invested more resources in protecting their
Strategic Planning - Companies that cultivate a vision of information. By 2006, aggressive company measures seemed
sustainability must adopt sophisticated strategic planning to be having positive effect.
technique

TECHNOLOGICAL CHALLENGES In 2005, 2 out of 3 computer hacker attacks were intercepted.


Technology fosters changes. Technological change has raised Less than 3% of emails contained a virus in 2005, down from
ethical and social questions of privacy, security, ownership, 6% in 2006. Companies now using honeypots, system used
health, and safety. What are the implications of this fast-paced by security professionals to lure hackers to a fabricated
change on our society and those who live in it? Moreover, who website that can track all their movements
is responsible for determining how much technological change Chief Information Officer (CIO)
should occur or how fast things should change? Should
technology be controlled, and if so, who should be in charge of
managing technology and the challenges it poses for humans Is responsible for managing technology, including its many
and cultures in our global community? security issues, for companies.
Position has been elevated in recent years, 42% currently
Employees have access to new technologies at work and report directly to the CEO
companies may be monitoring usage, raising employee
concerns about invasions of privacy.
Internet Pornography
Businesses have adopted privacy policies to explain what use Is one of the most active and lucrative areas of e-commerce. In
of the companys technology is permissible and how it will 2006 4.2M web sites, 35% of downloads, $57B in worldwide
monitor employee activities revenues

Privacy Issues in the Business-Consumer Relationship Some countries monitor sites for objectionable material.
Debate over protection of privacy vs. government access to Enforcing underage use is problematic; some blockers or
personal data began in earnest with 9/11 and still goes on. parental tracking devices have emerged. U.S. passed Child
New technological advances, like Radio Frequency I Online Privacy Protection Act in 1998 Congressional legislation
dentification (RFID) have increased ways privacy violations requires libraries to have Internet filters
can occur. Industry and Government Efforts to Manage Privacy
The ideas, concepts, and other symbolic creations of the
Web sites with a privacy policy do not necessarily mean that human mind. Protected in U.S. by copyright, patent and
the consumers personal information and online activities are trademark laws
Software Piracy
The illegal copying of copyrighted software. In U.S., Digital
Millennium Copyright Act (1998) makes it a crime to
circumvent antipiracy measures built into most commercial
software agreements.
In China, taking active steps to reduce piracy. Business
Software Alliance, since 1988, has represented leading
software companies internationally. In the Philippines, the
Optical Media Board is the government arm responsible to stop
software, video, and audio piracy.

Pirating Copyrighted Music is growing and widespread


epidemic. Recent estimate that one out of every 3 musical
discs sold was pirated, $4.6B in sales.

Recording Industry Association of America (RIAA) launched


series of lawsuits to cut down on this trend.
Trade Associations in other countries are also taking action.
Use of streaming has also cut down on piracy.

Piracy of movies on CDs and DVDs


Study by Motion Picture Association of America found
Hollywood studios lost $6.1B in 2005
FCC ruled U.S.-made digital television receivers have
technology installed to block illegal distribution of copyrighted
material. Hong Kong court ruling severely punished pirates, yet
spread in Asia is still very problematic. U.S. Justice
Department has aggressively pursued illegal activity, in
cooperation with numerous other countries.

Managing Scientific Breakthroughs


Dramatic advances in the biological sciences have propelled
the impact of technology on our lives and business practices.
Biotechnology refers to a technological application that uses
biological systems or living organisms to make or modify
products or processes for specific use. Recent unprecedented
applications of biological science to industry have made
possible new, improved methods of health care and
agriculture, but they have also posed numerous ethical
challenges regarding safety and the quality of life.

Human Genome
In 2000, the Celera Genomics Group announced that it
completed the first sequencing of human DNA makeup.

Biotechnology and Stem Cell Research


Tissue engineering is the growth of tissue in a laboratory dish
for experimental research.

Technological Challenges
Stem-cell research is research on non-specialized cells that
have the capacity to self-renew and to differentiate into more
mature cells.

Cloning
In 1986, a Danish scientist announced the first successful
cloning of a sheep from fetal cells.
In 2002, the U.S. Senate began debates on a bill to ban human
cloning.
In 2003, U.N. General Assembly started considering cloning
with no consensus.

Bioterrorism
Terrorist groups see the use of deadly bioengineered diseases
and poisons, such as smallpox, anthrax, and bubonic plague,
as effective tools

Genetically Engineered Foods


Genetic engineering is altering the natural makeup of a living
organism, allowing scientists to insert any gene in to a plant.
Genetically modified foods are food processed from genetically
engineered crops.
Early on was backlash against genetically modified foods in
Europe, opposition weakened around 2004.
Adoption on other countries has been mixed

Vous aimerez peut-être aussi