Lecture Note 3 Fundamentals of Business Ethics
Lecture Note 3 Fundamentals of Business Ethics
ETHICS MORALS
Ethics refers to the rules that a SOCIAL system Morals are OUR OWN principles; personal
provides us with. philosophies that define right and wrong.
It is the moral principles that govern a person's These are concerned with the principles of
behavior or the conducting of an activity. right and wrong behavior and the goodness
or badness of human character.
LAWS
▪ The system of rules that a particular country or community recognizes as regulating the actions
of its members and may enforce by the imposition of penalties.
BUSINESS ETHICS
▪ Business ethics refers to the organizational principles, values, and norms that may originate from
individuals, organizational statements, or from the legal system that primarily guide individual
and group behavior in business.
MORAL DILEMMA
▪ Two or more morals in conflict with one another.
▪ Where you have to decide what is right and what is wrong.
▪ The answer is often not clean and different people will have different opinions.
▪ Examples:
a) The classic “lifeboat dilemma”, where there are only 10 spaces in the lifeboat, but there are
11 passengers on the sinking ship. A decision must be made as to who will stay behind. A
train with broken brakes is speeding towards a fork in the tracks.
b) Doctor-assisted suicide
VALUE DILEMMA
▪ Two or more beliefs/ideals in conflict with one another.
ETHICAL CULTURE
▪ Organizational principles, values, and norms that are adhered to by the company and its
personnel.
▪ It is the acceptable behavior as defined by the company and industry.
▪ Its goal is to minimize the need for enforced compliance of rules and maximize the use of
principles that contribute to ethical reasoning in difficult or new situations.
▪ It describes the component of corporate culture that captures the values and norms than an
organization defines as appropriate conduct.
- Creates shared vaues
STAKEHOLDERS
▪ They are people who have interest in a company’s organization’s affairs.
▪ They can either affect or be affected by the business.
▪ They broaden the pool of people who care about the well-being of your company, making you
less alone in your entrepreneurial work.
▪ Classification of Stakeholders:
1) Internal and External Stakeholders:
A. Internal stakeholers
- Employees
- Manager
- Owners
B. External stakeholers
- Suppliers
- Society
- Government
- Creditors
- Shareholders
- Customers
2) Primary, Secondary and Other Stakeholders
A. Primary stakeholders
- Those whose continued association and resources are absolutely necessary for a
firm’s survival.
- Examples: customers, shareholders, employees, suppliers
B. Secondary stakeholders
- Those who are not typically engaged directly in transactions with a company and are
therefore not essential to its survival.
- Examples: government agencies (BIR, SEC), communities (general public)
C. Other stakeholders
- Others who have a “stake” or claim in some aspect of a company’s products,
operations, markets, industry, and outcomes.
- Example: Trade Associations, Mass Media, Special Interest Groups
- Examples of trade associations: Aircargo Forwarders of the Philippines (AFPI),
Association of Filipino Franchisers, Inc. (AFFI), and Cement Manufacturer's
Association of the Philippines .
STAKEHOLDERS RELATIONSHIP
▪ Relationships are associated with both organizational success and misconduct.
▪ Businesses exist because of organizational relationships between employees, customers,
shareholders, and the community.
ORGANIZATIONAL EFFECTIVENESS
▪ The concept of how effective an organization is in achieving the outcomes the organization
intends to produce.
STAKEHOLDER MANAGEMENT
▪ It is the process by which an entity organize, monitor and improve its relationships with its
stakeholders.
▪ It involves systematically identifying stakeholders;
analyzing their needs and expectations; and
planning and implementing various tasks to
engage with them.
▪ A good stakeholder management process will be
the means through which an entity are able to
coordinate its interactions and assess the status
and quality of its relationship with various
stakeholders.
STAKEHOLDER'S THEORY
▪ It is a view of capitalism that stresses the interconnected relationships between a business and
its stakeholders (like customers, suppliers, employees, investors, communities and others who
have a stake in the organization).
▪ The theory argues that a firm should create value for all stakeholders, not just shareholders.
▪ In order to succeed and be sustainable over time, executives must keep the interests of
customers, suppliers, employees, communities and shareholders aligned and going in the same
direction.
▪ The Body Shop is a classic stakeholder theory case study.
- The natural cosmetics manufacturer and retailer became defined by the activism of its
founder.
-
The company adopted a social activist purpose, establishing recycling measures, refusing to
test its products on animals and sponsoring various social-change programs. When the
company’s commitment to these goals was questioned, the Body Shop's management
provided detailed reports to its shareholders, suppliers, customers and other stakeholders to
assure them that the company's conduct fulfilled the promise of its brand image.
STAKEHOLDER ANALYSIS
▪ It is a systematic way to analyze stakeholders by their power and interest.
- High power, high interest stakeholders are Key Players.
- Low power and low interest stakeholders are Least Important.
Source: Stakeholder Analysis | Definition and best
method https://www.stakeholdermap.com/stakeholder-analysis.html
▪ The table (quadrant) shows an example of engagement strategy based on the interest/influence
stakeholder map.
▪ Another way of analysis is by listing the stakeholders and mark its interest in the impact on
certain concern within an organiztaion.
STAKEHOLDER FRAMEWORK
▪ Stakeholder framework identifies the internal and external stakeholders who agree, collaborate,
and engage in confrontations on ethical issues.
- Allows organizations to identify, monitor, and respond to the needs and expectations of
stakeholder groups.
- Three attributes:
1) Power
2) Legitimacy
3) Urgency
▪ Classification of stakeholders:
1) Latent stakeholders
- One attribute is present, low salience.
- Two attributes are missing.
- Managers may do nothing about these stakeholders and may not even recognise them
as stakeholders.
- These stakeholders are the following:
a) Dormant Stakeholders
- Possess power to impose their will through coercive, utilitarian or symbolic
means, but have little or no interaction /involvement as they lack legitimacy or
urgency.
b) Discretionary Stakeholders
- Likely to be recipients of corporate philanthropy. No pressure on managers to
engage with this group, but they may choose to do so. Examples are
beneficiaries of charity.
c) Demanding Stakeholders
- Those with urgent claims, but no legitimacy or power. Irritants for management,
but not worth considering. Examples are people with unjustified grudges, serial
complainers or low return customers.
2) Expectant Stakeholders
- Two attributes are present, moderate salience.
- One attribute is missing.
- Active rather passive.
- Seen by managers as 'expecting something'.
- Likely higher level engagement with these stakeholders.
- These stakeholders are the following:
a) Dominant Stakeholders
- The group that many theories position as the only stakeholders of an
organization or project.
- Likely to have a formal mechanism in place acknowledging the relationship with
the organization or project e.g. Boards of directors, HR department, public
relations.
b) Dangerous stakeholder
- Those with powerful and urgent claims will be coercive and possibly violent.
- For example employee sabotage or coercive/unlawful tactics used by activists.
c) Dependent Stakeholder
- Stakeholders who are dependent on others to carry out their will, because they
lack the power to enforce their stake.
-
For example local residents & animals impacted by the BP oil spill. Advocacy of
their interests by dominant stakeholders can make them definitive stakeholders.
3) Definitive Stakeholder
- All three attributes are present, high salience.
- Managers give immediate priority to these stakeholders.
- An expectant stakeholder who gains the relevant missing attribute. Often dominant
stakeholders with an urgent issue, or dependent groups with powerful legal support.
Finally those classed as dangerous could gain legitimacy e.g. democratic legitimacy
achieved by a nationalist party.
ETHICAL AWARENESS
▪ Recognizing and ethical issue.
▪ The ability to perceive whether a situation or decision has an ethical dimension.
▪ It is the eagerness and ability to
1) designate moral situations and dilemmas;
2) critically analyze, evaluate, and additionally change one's own moral esteems; and
3) look up the effects of one's own attitude for the lives of others.
▪ A person is ethically aware if he/she realizes that a problem he/she experiences incorporates an
ethical problem
▪ Lying
1) Joking without malice.
2) Commission lying - Creating a perception or belief by words that intentionally deceive the
receiver of the message.
3) Omission lying - Intentionally not informing others of any differences, problems, safety
warnings, or negative issues relating to the product or company that significantly affect
▪ Conflict of Interest
- Individual chooses either to advance his or her own interests, those of the organization, or
those of some other group.
- Examples include the following:
a) Nepotism - giving favors to relatives and close friends.
b) Self-dealing - When someone acts in their own interest rather than the interest of the
organization.
c) Private businesses - If a company has proof that a board member profited from their role
on the board, the board member can be taken to court.
▪ Bribery
- Offering something (often money) in order to gain an illicit advantage from someone in
authority.
- This includes the following types:
1) Active bribery: The person who promises or gives the bribe commits the offense.
- Not an offense if the advantage was permitted or required by the written law or
regulation of the foreign public official’s country, including case law.
2) Passive bribery: Offense committed by an official who receives the bribe.
- Not an offense if the advantage was permitted or required by the written law or
regulation of the foreign public official’s country, including case law.
3) Small facilitation payments: Payments made to obtain or retain business or other
improper advantages—do not constitute bribery payments for U.S. companies in some
- Often made to induce public officials to perform their functions.
- Illegal in the United Kingdom.
▪ Corporate Intelligence
- The collection and analysis of information on markets, technologies, customers, and
competitors, as well as on socioeconomic and external political trends.
- It involves in-depth discovery of information from corporate and court documents, regulatory
filings, and press releases.
2) Social engineering
What is Social Engineering | Attack Techniques & Prevention Methods | Imperva
- The term used for a broad range of malicious activities accomplished through human
interactions. information.
- It uses psychological manipulation to trick users into making security mistakes or
giving away sensitive
- The tricking of individuals into revealing their passwords or other valuable corporate
information.
3) Dumspter diving
What is dumpster diving? (techtarget.com)
- looking for treasure in someone else's trash.
- In the world of information technology (IT), dumpster diving is a technique used to
retrieve information that could be used to carry out an attack or gain access to a
computer network from disposed items.
4) Whacking
- A wireless hacking.
- To eavesdrop on wireless networks, all a CI agent needs is the right kind of radio
and to be within range of a wireless transmission. Once tapped into a wireless
network, an intruder can easily access anything on both the wired and wireless
networks because the data sent over networks is usually unencrypted.
- If a company is not using wireless networking, an attacker can pose as a janitor and
insert a rogue wireless access node into a supposedly secure hard-wired network.
5) Phone Eavesdropping
- A person with a digital recording device can monitor and record a fax line.
-
By playing the recording back an intruder can reproduce an exact copy of a message
without anyone’s knowledge. Even without monitoring a fax line, a fax sent to a
“communal” fax machine can be read or copied. By picking up an extension or by
tapping a telephone, it is possible to record the tones that represent someone’s
account number and password using a tape recorder. The tape recording can then
be replayed over the telephone to gain access to someone else’s account.
By playing the recording back an intruder can reproduce an exact copy of a message
without anyone’s knowledge. Even without monitoring a fax line, a fax sent to a
“communal” fax machine can be read or copied. By picking up an extension or by
tapping a telephone, it is possible to record the tones that represent someone’s
account number and password using a tape recorder. The tape recording can then
be replayed over the telephone to gain access to someone else’s account.
▪ Discrimination
- The unfair treatment of different groups of people and things depending on the basis of
race, color, religion, sex, marital status, sexual orientation, public assistance status,
disability, age, national origin, or veteran status.
▪ Sexual Harassment
- Any repeated, unwanted behavior of a sexual nature perpetrated upon one individual by
another.
- May be verbal, visual, written, or physical.
- Can occur between people of different genders or those of the same gender.
- Section of of RA 7877 "Anti-Sexual Harassment At of 1995" - An Act Declaring sexual
harassment unlawful in the employment, education or training environment, and for other
purposes.
▪ Fraud
- Any purposeful communication that deceives, manipulates, or conceals facts in order to
harm others.
- Can be a crime; convictions may result in fines, imprisonment, or both.
a) Accounting fraud: Usually involves a corporations’ financial reports.
b) Fraud triangle: Pressure, opportunity, and rationalization.
c)
Marketing fraud: Dishonestly creating, distributing, promoting, and pricing products.
d) Puffery: Exaggerated advertising, blustering, and boasting upon which no
reasonable buyer would rely upon and is not actionable under the Lanham Act.
e) Implied falsity: The message has a tendency to mislead, confuse, or deceive the
public.
- Literally true but imply a false message.
f) Literally false
- Tests prove (establishment claims): Advertisement cites a study or test that
establishes the claim.
- Bald assertions (non-establishment claims): Advertisement makes a claim that
cannot be substantiated.
g) Labeling Issues
- Kroger agreed to remove “raised in a humane environment” from its packages of
chicken.
h) Consumer Fraud: When consumers attempt to deceive businesses for their own
gain.
- Shoplifting
- Collusion: An employee assists the consumer in fraud.
- Duplicity: Consumer stages an accident in a store and then seeks damages
against the store for its lack of attention to safety.
- Guile: A person who is crafty or understands right/wrong behavior but uses tricks
to obtain an unfair advantage.
▪ Insider Trading
- An insider is any officer, director, or owner of 10 percent or more of a class of a
company’s securities.
a) Illegal insider trading: The buying or selling of stocks by insiders who possess
information that is not yet public.
b) Legal insider trading: Legally buying and selling stock in an insider’s own company,
but not all the time. Insiders are required to report their insider transactions within
two business days of the date the transaction occurred.