If you order your cheap custom essays from our custom writing service you will receive a perfectly written assignment on Changing Society with IT. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality Changing Society with IT paper right on time.

Out staff of freelance writers includes over 120 experts proficient in Changing Society with IT, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your Changing Society with IT paper at affordable prices with custom essay service!





Do my essay on Changing Society with IT CHEAP !











1. Growing Cybercultures

Week 4. Phillip Mahnken. 18/0/00

Introducing Cyberculture

It was very difficult finding an article on cyberculture. Many search engines and different keyword combinations were used. This journal article was chosen because after many hours of searching, this was the only article that even remotely passed the evaluation criteria. There are a few keywords that are shared in the lecture and the article, for example they both refer to multi-user domains (MUD) “…in a chat room or MOO/MUD…” (00. Mahnken, P). “…a number of virtual environments, including multi-user domains, or MUDs” (000. Silver, D). The main concepts are from two completely different areas of cyberculture. The lecture talks about the origins of not only cyberculture, but also culture in general. It also touches on where technology came from and the misfortunes that have occurred as a result of technology. The journal article is completely about cyberculture. It goes through each stage of cyberculture history, how it came about and how people have studied it. The article seems more relevant to the topic ‘growing cybercultures’ than the actual lecture.

The journal article is quite accurate. It was found through the search edu engine and both the author and editor are affiliated with American Universities. The information appears original, although there is a huge number of works cited. All quotes are properly referenced. These quotes can back up the accuracy of the information in the article, but can question how much of the article is original work. The article is located on the University of Washington’s website and this is the second time this piece of work has been published. The author can easily be contacted through the University and being from the Department of Communication, the author would seem qualified to address this topic. The University would have strict control over what is published on their website. The article has a strong objectivity as it is published to help students of the University of Washington and others to understand cyberculture. The number of works cited listed at the end of this article show that it would be very difficult for the author to have a biased or single point of view. This article was published in 000 and although this is quite recent there may be a lot more information about cybercultures available now. This is a very comprehensive article. All aspects are explored in great depth and all information is provided within this website. There are no outside links, but there are links to other areas of the University’s site.

1.1 Introducing Cyberculture


Looking Backwards, Looking Forward Cyberculture Studies 10-000

� David Silver, Department of Communication, University of Washington

Originally published in Web.studies Rewiring Media Studies for the Digital Age, edited by David Gauntlett (Oxford University Press, 000) 1-0.

While still an emerging field of scholarship, the study of cyberculture flourished throughout the last half of the 10s, as witnessed in the countless monographs and anthologies published by both academic and popular presses, and the growing number of papers and panels presented at scholarly conferences from across the disciplines and around the world. Significantly, the field of study has developed, formed, reformed, and transformed, adding new topics and theories when needed, testing new methods when applicable.

In an attempt to contextualize the chapters found in this volume, this essay traces the major works of scholarship on cyberculture from the last ten years, seen in three stages or generations. The first stage, popular cyberculture, is marked by its journalistic origins and characterized by its descriptive nature, limited dualism, and use of the Internet-as- frontier metaphor. The second stage, cyberculture studies, focuses largely on virtual communities and online identities and benefits from an influx of academic scholars. The third stage, critical cyberculture studies, expands the notion of cyberculture to include four areas of study -- online interactions, digital discourses, access and denial to the Internet, and interface design of cyberspace -- and explores the intersections and interdependencies between any and all four domains.

I. Popular Cyberculture

Our disciplinary lineage begins with what I call popular cyberculture, a collection of essays, columns, and books written by particularly wired journalists and early adapters. Starting in the early 10s, these cultural critics began filing stories on the Internet, cyberspace, and the information superhighway for major American newspapers and magazines. Significantly, what began as an occasional column in a newspapers technology section soon became feature articles appearing on the front page, in the business section, and in lifestyle supplements, as well as within the new media/cyberspace beat of many mainstream magazines. Between 1 and 14, for example, Time magazine published two cover stories on the Internet while Newsweek released the cover story Men, Women, and Computers. Moreover, in 14, the second editions of the popular how-to books The Internet for Dummies and The Whole Internet became bestsellers.

The popular cyberculture writings were generally descriptive. Usually required to follow the term Internet with the parenthetical phrase the global computer network system, these journalists had the unenviable task of introducing non-technical readers to the largely technical, pre-World Wide Web version of cyberspace. Accordingly, much of this work included lengthy descriptions, explanations, and applications of early Net technologies such as file transfer protocol, gopher, lynx, UNIX configurations, telnet, and Usenet.

In addition to being overly descriptive, early popular cyberculture often suffered from a limited dualism. As a number of scholars (Jones 17; Kinney 16; Kling 16; Rosenzweig 1) have noted, early popular cyberculture often took the form of dystopian rants or utopian raves. From one side, cultural critics blamed the Net for deteriorating literacy, political and economic alienation, and social fragmentation. For example, Birkerts (14) warned that the Internet, hypertext, and a host of electronic technologies would produce declining literacy and a less than grounded sense of reality. Sale (15) drove home the points he made in his book Rebels Against the Future The Luddites and Their War on the Industrial Revolution Lessons for the Computer Age by smashing computers while on a promotional tour, and Stoll (15), upon shifting career tracks from a cyber-hyper computer hacker to a cyber-griper Cassandra, begged cybernauts to log off, reminding us that life in the real world is far more interesting, far more important, far richer, than anything youll ever find on a computer screen (1).

Conversely, a vocal group of writers, investors, and politicians loosely refereed to as the technofuturists declared cyberspace a new frontier of civilization, a digital domain that could and would bring down big business, foster democratic participation, and end economic and social inequities. While finding platforms within major American newspapers and popular magazines, among nascent organizations like the Electronic Frontier Foundation, and throughout newsgroups, listservs, and Web sites, their primary pulpit was a new line of technozines -- glossy, visually-impairing magazines with names like Mondo 000, bOing bOing, and Wired. Encapsulating the utopian rhetoric of the technofuturists, Wireds publisher Louis Rossetto likened cyberspace to a new economy, a new counter culture, and beyond politics; the magazines executive editor Kevin Kelly proclaimed technology is absolutely, 100 percent, positive (Keegan 15 -4); and contributing editor John Perry Barlow argued with the development of the Internet, and with the increasing pervasiveness of communication between networked computers, we are in the middle of the most transforming technical event since the capture of fire (What Are We Doing Online? 15 6).

Not surprisingly, many politicians joined their ranks. Speaking at a conference in Buenos Aires, Vice President Al Gore (15) remarked

These highways -- or, more accurately, networks of distributed intelligence -- will allow us to share information, to connect, and to communicate as a global community. From these connections we will derive robust and sustainable economic progress, strong democracies, better solutions to global and local environmental challenges, improved health care, and -- ultimately -- a greater sense of shared stewardship of our small planet.

Finally, in addition to its descriptive nature and rhetorical dualisms, early popular cyberculturalists employed the frontier as its reigning metaphor. William Gibson (184) famously coined the term cyberspace in his groundbreaking novel Neuromancer Cyberspace. A consensual hallucination experienced daily by billions of legitimate operators . . . A graphic representation of data abstracted from the banks of every computer in the human system. Unthinkable complexity (51). In Neuromancer a new frontier emerges, one whose currency rests less in geographic space and more in digital information.

It did not take long for activists, writers, and scholars to latch on to and reify the metaphor. In the now canonical essay Across the Electronic Frontier, Kapor and Barlow (10) described the Net in the following terms In its present condition, cyberspace is a frontier region, populated by the few hardy technologists who can tolerate the austerity of its savage computer interfaces, incompatible communication protocols, proprietary barricades, cultural and legal ambiguities, and general lack of useful maps or metaphors. The frontier metaphor stuck. Rheingold (1a) observed The pioneers are still out there exploring the frontier, the borders of the domain have yet to be determined, or even the shape of it, or the best way to find ones way in it (58). Rushkoff (14) noted, Nowhere has the American pioneer spirit been more revitalized than on the electronic frontier (5). Whittle (17), discussing the future of the Internet, waxes poetic The pioneers, settlers, and squatters of the virgin territories of cyberspace have divided some of that land into plots of social order and plowed it into furrows of discipline -- for the simple reason that is natural resources can only be found in the mind and have great value if shared (40).

II. Cyberculture Studies

Like most generations, mine bleed. Indeed, a significant portion of our second generation of cyberculture scholarship, cyberculture studies, can be characterized by its descriptive nature, binary dualism, and frontier metaphors, and, as such, could easily be referred to as popular cyberculture. Conversely, some of the early journalists made important explorations into and observations about cyberspace, thereby allowing them membership into the second generation. One such journalist was Julian Dibbell, whose provocatively titled A Rape in Cyberspace; or How an Evil Clown, a Haitian Trickster Spirit, Two Wizards, and a Cast of Dozens Turned a Database into a Society, appeared in The Village Voice in 1. In the article, Dibbell presents the now-endlessly-recounted tale of Mr. Bungle, a member of LambdaMOO (a popular multi-user domain, or MUD) who uses a voodoo doll -- a program that allows one user to control the online actions of another -- to rape, violently attack, and force unwanted liaisons upon a number of LambdaMOOers. Dibbell describes the attack, the violated users emotional reactions, the communitys outrage, and the public discussion of Mr. Bungles punishment, including the possibility of toading, a process by which a MUD wizard turns a player into a toad, eliminating the players identity and description. Noting that the chief wizard of the MUD recently revoked the toading process in an attempt to foster self-governance, Dibbell traces the steps of one user, JoeFeedback, who decides on his own to eliminate the Mr. Bungle character. Besides offering readers a provocative glimpse into the online environment, Dibbell brilliantly portrays the complex individual and social negotiations existing within LambdaMOO, negotiations which, when viewed together, constitute very real identities and communities.

Using Dibbell as a starting point, we can characterize our second generation with a single passage by cybertheorist Allucquere Rosanne Stone (11) who defines cyberspace as incontrovertibly social spaces in which people still meet face-to-face, but under new definitions of both meet and face (85). In other words, while cyberspace may lack for the most part the physical geography found in, say, a neighborhood, city, or country, it offers users very real opportunities for collective communities and individual identities. It is upon these twin pillars -- virtual communities and online identities -- that cyberculture studies rests.

One of the earliest and certainly the most referenced articulators of the virtual communities idea is Howard Rheingold (see his chapter in this book). Building upon Stone, Rheingold (1a) defines a virtual community as

A group of people who may or may not meet one another face-to-face, and who exchange words and ideas through the mediation of computer bulletin boards and networks. In cyberspace, we chat and argue, engage in intellectual discourse, perform acts of commerce, exchange knowledge, share emotional support, make plans, brainstorm, gossip, feud, fall in love, find friends and lose them, play games and metagames, flirt, create a little high art and a lot of idle talk. We do everything people do when people get together, but we do it with words on computer screens, leaving our bodies behind (58).

A few months later, Rheingold published The Virtual Community (1b), a significant expansion upon his earlier essay which would quickly become one of the principal texts of cyberculture studies. In the book, Rheingold provides a brief history of the Internet, a social history of a particular online community -- the Whole Earth Lectronic Link (the WELL) -- and countless examples of online interactions which take place within both the WELL and the Internet. Although the author concludes with a cautionary chapter detailing the potential perils of an overly commodified Internet, online surveillance, and cyber-induced hyper-reality, Rheingolds enthusiasm dominates

We temporarily have access to a tool that could bring conviviality and understanding into our lives and might help revitalize the public sphere. The same tool, improperly controlled and wielded, could become an instrument of tyranny. The vision of a citizen-designed, citizen-controlled worldwide communications network is a version of technological utopianism that could be called the vision of the electronic agora (14).

If Rheingolds The Virtual Community is the first pillar of cyberculture studies, the second is Sherry Turkles Life on the Screen Identity in the Age of the Internet (15). Turkle addresses the idea of online identities by exploring ethnographically a number of virtual environments, including Multi-User Domains, or MUDs. She finds that while some users use cyberspace to repress an otherwise less-than-functional real or offline life, most use the digital domain to exercise a more true identity, or a multiplicity of identities. In each case, users are free to pick and choose genders, sexualities, and personalities within what Bruckman (1) labels an identity workshop.

Like Rheingold, Turkles take on cyberspace is largely enthusiastic. Through a number of case studies, the author reveals how users of MUDs create online identities to help navigate their offline lives. For example, Turkle introduces Ava, a graduate student who lost her leg in a car accident. During her recuperation process, Ava began to MUD, and created a one-legged character. Soon after, her character became romantically involved with another, and they began to make virtual love, or, as it was then commonly referred to, have tinysex. According to Turkle, these online interactions led Ava to become more comfortable with her offline body, leading her to note Virtuality need not be a prison. It can be the raft, the ladder, the transitional space, the moratorium, that is discarded after reaching greater freedom. We dont have to reject life on the screen, but we dont have to treat it as an alternate life either (6).

By the mid 10s, cyberculture studies was well underway, focused primarily on virtual communities and online identities. Further, as a result of the enthusiasm found in the work of Rheingold and Turkle, cyberculture was often articulated as a site of empowerment, an online space reserved for construction, creativity, and community. Fortunately, however, this simplification was matched by the richness found in the nascent fields welcoming of interdisciplinarity. With the growing popularity of user-friendly Internet service providers such as AOL and CompuServe and the widespread adoption of Netscape, by the mid 10s, the great Internet rush was on. Significantly, the introduction of the Web was not only a technological breakthrough but also a user breakthrough. Replacing tricky file transfer protocol and burdensome gopher with a simple, point-and-click graphical interface, the Web helped to foster a less technical, more mainstream Internet populace. Coupled with these technological breakthroughs were academic considerations. In addition to a concerted effort on the part of university administrators to get faculty wired, scholarly conferences, papers, archives, and discussions came online, leading all but the most technophobic academics to the Net.

As expected, new scholars brought new methods and theories. For example, while some sociologists approach virtual communities as social networks (Wellman 17; Wellman et al 16), others employ the sociological traditions of interactionism and collective action dilemma theory (Kollock & Smith 16; Smith & Kollock 1). Within anthropology, scholars began formulating a new subfield, cyborg anthropology, devoted to exploring the intersections between individuals, society, and networked computers (Downey & Dumit 18; Escobar 16). Researchers from a related field, ethnography, took their cue from Turkle and began to study what users do within diverse online environments, ranging from online lesbian bars and Usenet newsgroups to Web-based tele-gardens and online cities (Baym 15a, 15b, 17; Correll 15; McLaughlin et al 17; Collins-Jarvis 1; Silver 000).

At the same time, linguists began to study the writing styles, Netiquettes, and (inter)textual codes used within online environments (Danet et al 17; Herring 16a, 16b, 16c). Similarly, feminist and womens studies researchers have used textual analysis and feminist theory to locate, construct, and deconstruct gender within cyberspace (Cherny & Weise 16; Consalvo 17; Dietrich 17; Ebben & Kramarae 1; Hall 16). Further, a collection of community activists and scholars began to explore the intersection of real and virtual communities in the form of community networks, including the Public Electronic Network (PEN) in Santa Monica, California, the Blacksburg Electronic Village (BEV) in Blacksburg, Virginia, and the Seattle Community Network (SCN) in Seattle, Washington (Cisler 1; Cohill & Kavanaugh 17; Schmitz 17; Schuler 14, 16; Silver 16, 1, 000).

III. Critical Cyberculture Studies

By the late 10s, the study of cyberculture had arrived. Indeed, in the second half of the 10s, many academic and popular presses have published dozens of monographs, edited volumes, and anthologies devoted to the growing field of cyberculture. Reflecting this growth, recent scholars take a broader view of what constitutes cyberculture. No longer limiting the field to merely virtual communities and online identities, a third generation of scholarship, or what I call critical cyberculture studies, has emerged. As with all emerging fields of study, the landscape and contours of critical cyberculture studies are, at best, chaotic and difficult to map. That said, I wish to argue that critical cyberculture studies contains four major areas of focus, each, as we will see, interdependent on one another.

As revealed in the last few pages, the perspectives and priorities of the first and second generations of cyberculture scholars differ significantly. Instead of approaching cyberspace as an entity to describe, contemporary cyberculture scholars view it as a place to contextualize and seek to offer more complex, more problematized findings. In general, four dominant areas of focus have emerged. Taken together, these areas serve as the foundation for critical cyberculture studies

· Critical cyberculture studies explores the social, cultural, and economic interactions which take place online;

· Critical cyberculture studies unfolds and examines the stories we tell about such interactions;

· Critical cyberculture studies analyzes a range of social, cultural, political, and economic considerations which encourage, make possible, and/or thwart individual and group access to such interactions;

· Critical cyberculture assesses the deliberate, accidental, and alternative technological decision- and design-processes which, when implemented, form the interface between the network and its users.

Critical cyberculture studies, in its most rich manifestation, explores the intersections between any and all four of these focal points.

Contextualizing Online Interactions

While critical cyberculture studies scholars acknowledge the importance of virtual communities and online identities, they take a step back and contextualize their topics. For example, Jones (15) sets the stage for what could be called the social construction of online reality. Unlike so many cyberculturalists who approach their topic as a brave new world, Jones contextualizes cyberspace within the more traditional paradigms of communication and community studies, including James Careys work on the electronic sublime, James Benigers notions of pseudo-communities, and David Harveys theories of postmodern geographies. From there, the author reminds us of the cultural construction of cyberspace and warns us not to celebrate uncritically its potential. Two years later, Jones (17) continued this necessary process of contextualizing by problematizing some of the key definitions and directions of cyberculture studies. Drawing upon the work of Benedict Anderson, Richard Sennet, and, once again, James Carey, Jones historically locates popular rhetoric heralding the Nets potential to transcend time and space. Next, commenting upon Rheingolds The Virtual Community, he questions the all-too-unproblematized notion of virtual communities. Substituting Neo-Luddism with critical caution, Jones calls for a healthy re-evaluation of cyberspace, noting that the Internet is another in a line of modern technologies that undermine traditional notions of civil society that require unity and shun multiplicity while giving impressions that they in fact re-create such a society (5).

In addition to contextualizing virtual communities and online identities, many scholars have gone beyond merely recanting the findings of Rheingold and Turkle to make critical explorations and discoveries of their own. For example, McLaughlin et al (15) attempt to establish general, online codes of conduct by collecting all messages posted to five newsgroups within a three week period and analyzing them for normative discourse. From the data, they deduce seven categories of reproachable behavior, including novice use of technology, bandwidth waste, ethical violations, and inappropriate language. Next, they note the ways in which rules of conduct on Usenet as currently constituted can be understood as a complex set of guidelines driven by economic, cultural, social-psychological, and discursive factors (107). Much more than a simple set of netiquette, the authors findings trace the intricate parameters and factors that help to support the relative success or failure of online communities. Similar scholarship (Kollock and Smith 16; MacKinnon 18, 17, 15; Phillips 16) focuses on the parameters and punishments that serve to establish acceptable and unacceptable behavior within online environments.

At the same time, Baym (15) has used ethnographic methods to better understand the nature of virtual communities. Baym explores the well-trafficked Usenet newsgroup rec.arts.tv.soaps, or r.a.t.s., and suggests that online communities emerge out of a complex intersection between five factors external contexts, temporal structures, system infrastructure, group purposes, and participant characteristics. Applying such factors to r.a.t.s., Baym concludes that

participants in [computer-mediated communication] develop forms of expression which enable them to communicate social information and to create and codify group-specific meanings, socially negotiate group-specific identities, form relationships which span from the playfully antagonistic to the deeply romantic and which move between the network and face-to-face interaction, and create norms which serve to organize interaction and to maintain desirable social climates (161).

Another important yet largely unexplored element of contextualizing online interactions is to trace the history and development of virtual communities. While past scholars approached online communities as already existing digital environments, critical cyberculture studies scholars (Dibbell 18; Horn 18; Silver 16, 1) have begun to analyze their brief yet crucial histories.

Discoursing Cyberspace

Like all forms of culture, cyberculture is, in part, a product of the stories we tell about it. Indeed, the tales we tell over coffee, read in Wired, Newsweek, and The New York Times, and watch in movies like The Net, The Matrix, and Disclosure inform the ways in which we engage in cyberculture. Further, these stories -- and lack of stories -- can potentially discourage and dissuade would-be cybernauts from going online. Thus, for some scholars (Borsook 16; Sobchack 1; Ross 11), cyberspace is not only a site for communication and community but also a generator of discourse, a very real and very imagined place where a variety of interests claim its origins, its myths, and its future directions. As many third generation cyberculture studies scholars have noted, two disturbing discourses of cyberspace have emerged the Net as frontier and cyberspace as boystown.

For example, Miller (15) notes the ways in which the Net-as-frontier metaphor serves to construct cyberspace as a place of manly hostility, a space unsafe for women and children. She argues the idea that women merit special protections in an environment as incorporeal as the Net is intimately bound up with the idea that womens minds are weak, fragile, and unsuited to the rough and tumble of public discourse (57). Further, as Doheny-Farina (16) argues, the metaphor reinvokes the American myth of the individual and conjures up traditional American images of the individual lighting out from the territories, independent and hopeful, to make a life (16).

In addition to the Net as frontier metaphor, a dominant discourse found in magazines and movies is cyberspace as boystown. Understanding cyberculture to be not only online interactions but also the stories told about such interactions, scholars have performed feminist readings on such technozines as Wired and Mondo 000. For example, Borsook (16) analyzes the ways in which the trendy magazine has appropriated countercultural themes in the name of testosterone-driven commercialism

Wired has consistently and accurately been compared in the national media to Playboy. It contains the same glossy pictures of certified nerd-suave things to buy -- which, since its the nineties, includes cool hand-held scanners as well as audio equipment and cars -- and idolatrous profiles of (generally) male moguls and muckymucks whose hagiography is not that different from what might have appeared in Fortune. It is the wishbook of material desire for young men (6).

Online Access and Barriers

While cyberculture studies celebrates the existence of online communities, critical cyberculture studies seeks to better understand their participants. Although important work in the field of online marginality has begun, much more is needed. Indeed, while scholars from across the disciplines flock to the general topic of cyberculture, few have made their way into the margins to explore issues of race, ethnicity, and sexuality online.

One step in the right direction is the work of the National Telecommunications and Information Administration, or NTIA, an agency of the U.S. Department of Commerce. In a three-part series of studies titled Falling Through the Net, the NTIA examines what they call the digital divide, a growing gap between information haves and have-nots, and the economic, social, cultural, and geographic elements contributing to the gap. For example, in Falling Through the Net A Survey of the Have Nots in Rural and Urban America (15), the NTIA concludes that class, race, age, and education contributed significantly to online access. In Falling Through the Net II New Data on the Digital Divide (18), the NTIA expanded their study to find that although Americans, as a nation, accessed the Internet in increasing numbers,

the digital divide between certain groups of Americans has increased between 14 and 17 so that there is now an even greater disparity in penetration levels among some groups. There is a widening gap, for example, between those at upper and lower income levels. Additionally, even though all racial groups now own more computers than they did in 14, Blacks and Hispanics now lag even further behind Whites in their levels of PC-ownership and on-line access.

Finally, in Falling Through the Net Defining the Digital Divide (1), the NTIA reveals that the digital divide had increased further, leading Larry Irving, assistant secretary of Commerce for Telecommunications, to remark Americas digital divide is fast becoming a racial ravine. As before, the report notes that while Americans, as a nation, continue to flock to the Net, disparities based on race, class, and region contribute to the growing gap between information haves and have-nots.

In addition to the barriers discussed by the National Telecommunications and Information Administration, there are other, more cultural ones. Performance artist and writer Guillermo Gomez-Pena (16) recounts his and his collaborator Roberto Sifuentes 14 entrance into cyberspace, a digital space already largely settled by ethnocentrism

We were also perplexed by the benign (not naive) ethnocentrism permeating the debates around art and digital technology. The unquestioned lingua franca was of course English, the official language of international communications; the vocabulary utilized in these discussions was hyper-specialized and depoliticized; and if Chicanos and Mexicans didnt participate enough in the Net, it was solely because of lack of information or interest (not money or access), or again because we were culturally unfit (178).

Along similar lines, Bailey (16) argues that shared customs such as netiquette and acronyms constitute newbie snobbery, producing an unwelcoming terrain for marginalized cultures. He notes The Net nation deploys shared knowledge and language to unite against outsiders Net jargon extends beyond technical language to acronyms both benign (BTW, By the way) and snippy (RTFM, Read the fucking manual). It includes neologisms, text-graphical hybrids called emoticons, and a thoroughgoing anti-newbie snobbery. Like any other community, it uses language to erect barriers to membership (8).

This is not to suggest that traditionally marginalized cultural groups have not taken to the wires as a means for communication, community, and empowerment. Indeed, a number of contemporary cyberculturalists explore marginalized cultural groups attempts to establish self-defined, self-determined virtual spaces. For example, Mitra (17) analyzes the discursive practices of contributors to the Usenet newsgroup, soc.culture.indian. While acknowledging strong segmenting forces, especially when users crosspost messages to soc.culture.pakistan, Mitra argues that the online community generates centralizing tendencies for Indian users these diasporic people, geographically displaced and distributed across large areas, are gaining access to [internet] technologies and are increasingly using these technologies to re-create a sense of virtual community through a rediscovery of their commonality (58). Other scholars (Shaw 17; Correll 15) make similar arguments regarding gay and lesbian online communities.

As many scholars have noted, males tend to dominate online discussions, regardless of the topic. Recently, however, female users have countered this domination -- not to mention hostility -- by creating online spaces of their own. As Camp (16) recounts, Systers, a mailing list of women in computer science and related disciplines, was established in response to male-dominated discussions about women taking place in Usenet newsgroups like soc.women. The solution was to withdraw to a room of our own -- to mailing lists (115). Able to control and moderate the list, members of Systers discuss the issues most relevant to them. These online spaces also include, of course, the Web. These sites are as diverse as the population they hope to represent, ranging from academic sites like the Womens Studies Database (www.inform.umd.edu/EdRes/Topic/WomensStudies) and the Center for Women and Information Technology (www.umbc.edu/cwit), to hipper, do-it-yourself sites like geekgirl (www.geekgirl.com.au) and AngstGrrl! (www.angstgrrl.com). Not to be left out of growing markets, feminist-leaning Web sites like iVillage.com (www.ivillage.com), Oxygen (www.Oxygen.com), and Women.com (www.Women.com) fuse timely womens issues with targeted cyber-marketing.

Digital Design

Second generation cyberculturalists admirably explored the kinds of communities and identities found on the Internet. Yet too often they all but ignored the ways in which the digital design of online spaces informs the types of interactions made possible. One exception is the significant attention literary scholars paid to hypertext, or what is commonly refereed to as hypertext studies. Focusing more on early hypertext software like HyperCard than on online networks such as the Internet and the Web, hypertext scholars (Bolter 11; Landow 1, 14) compared the new media to contemporary critical theory and considered the ways in which hypertext reconfigures the text, writer, and reader.

More recently, however, conversations between computer scientists, community activists, and ethnographers have produced new insights into the complex relationships between humans and computers. Commonly referred to as human-computer interaction, or HCI, such work approaches the interface as a critical site for interaction. The design of an interface -- as designers have known for years -- can have a substantial impact upon the relative success of a sites intentions. For example, as Kollock (16) notes in Design Principles for Online Communities, online environments should be designed to encourage user cooperation, maintain a community-based institutional memory, and include elements of the physical environment through which users travel. Currently, a number of scholars (Baecker 17, Kim 1) are developing models for discussing and assessing online interfaces. The pursuit has also been one of the key sites of study for a number of research institutes, including the Graphics, Visualization and Usability Center (www.cc.gatech.edu/gvu) at the Georgia Institute of Technology, the Human-Computer Interaction Lab (HCIL) (www.cs.umd.edu/hcil) at the University of Maryland, and the Knowledge Media Design Institute (www.kmdi.org) at the University of Toronto.

Issues of design and participation come together in the relatively new field participatory design, an approach pioneered in Scandinavia and currently making waves in the United States. As Schuler and Namioka (1) note, participatory design represents a new approach towards computer systems design in which the people destined to use the system play a critical role in designing it (xi). With support from the Computer Professionals for Social Responsibility, participatory design has been debated and adopted by both scholars and designers (Muller et al 1; Shneiderman & Rose 17; Trigg et al 14).

Conclusion Bringing it All Together

As previously noted, critical cyberculture studies at its best does not focus simply on one of its four key areas. Instead, it seeks to comprehend the relationships, intersections, and interdependencies between multiple areas. To better understand this point, we turn quickly to the work of Nakamura (1) and Collins-Jarvis (1). Brief yet penetrating, Nakamuras Race In/For Cyberspace Identity Tourism and Racial Passing on the Internet, explores the ways in which race is written within the popular MUD, LambdaMOO. She observes that while users are required to specify their genders, there is no such option for race It is not even on the menu, Nakamura notes (444). Instead, the formation of racial identity is limited to the selection of already-established characters. Focusing specifically on Asian identity formation, Nakamura notes that the vast majority of such characters -- Mr. Sulu, Bruce Lee, Little Dragon, and Akira, for example -- fall within familiar discourses of racial stereotyping The Orientalized male persona, complete with sword, confirms the idea of the male Oriental as potent, antique, exotic, and anachronistic (445).

Countering optimists who view cyberspace as a space where race does not matter, Nakamura argues that not only does it matter, but it has been designed out of the network, or what I call routed around. Significantly, this process is largely a design issue; the interface of LambdaMOO is designed without race-based user identities. Instead, users are forced to assume one of the default identities -- identities which for Asian Americans reinforce stereotypes. Nakamuras work is important, therefore, because it reveals the interdependent relationships between interface design and user identities.

The issues of access, discursive communities, and insider/outsider dynamics come together in an article on one of the first community networks in the world, Santa Monicas Public Electronic Networking system, or PEN. In her article Gender Representation in an Electronic City Hall Female Adoption of Santa Monicas PEN System, Collins-Jarvis examines the reasons why the percentage of female PEN users (0 per cent) was, for the early 10s, unusually high. Significantly, Collins-Jarvis offers three answers PENs public terminals, the availability of socially- and politically-related discussions and forums related to female interests, and the ability for women to take part in the networks design and implementation.

According to Collins-Jarvis, female users of PEN required not only access to get involved, they also needed a reason to participate Computing systems which appeal to womens norms and interests (e.g. by providing a channel to enact participatory political norms) can indeed increase female adoption rates (61). Further, when faced with often hostile flaming and a dearth of women-specific forums, female users of PEN assumed the responsibility of reinventing rather than rejecting the network. This reinvention took the form of creating a number of conference topics and user groups devoted specifically to issues of their own. Like Nakamura, Collins-Jarvis correctly understands online interactions to be a product of many offline factors, including design, content, and outreach.

As Nakamura and Collins-Jarvis suggest, cyberculture is best comprehended as a series of negotiations which take place both online and off. In this light, it is crucial to broach issues of discourse, access, and design. In the new millennium, it is the task of cyberculture scholars to acknowledge, reveal, and critique these negotiations to better understand what takes place within the wires.


BAECKER, R. 17 The web of knowledge media design. Paper delivered at the Knowledge Media Design Institute, Toronto, Canada.

BAILEY, C. 16 Virtual skin Articulating race in cyberspace. In Moser, M. A. (ed.) Immersed in Technology Art and Virtual Environments. Cambridge, MA The MIT Press, -4.

BAYM, N. K. 17 Interpreting soap operas and creating community Inside a computer-mediated fan club. In Kiesler, S. (ed.) Culture of the Internet. Mahwah, NJ Lawrence Erlbaum Associates, Publishers, 10-10.

BAYM, N. K. 15a From practice to culture on usenet. In Star, S. L. (ed.) The Cultures of Computing. Oxford Blackwell Publishers, -5.

BAYM, N. K. 15b The emergence of community in computer-mediated communication. In Jones, S. G. (ed.) CyberSociety Computer-Mediated Communication and Community. Thousand Oaks, CA Sage Publications, 18-16.

BIRKERTS, S. 14 The Gutenberg Elegies The Fate of Reading in an Electronic Age. Winchester, MA Faber and Faber.

BOLTER, J. D. 11 Writing Space The Computer, Hypertext, and the History of Writing. Hillsdale, N.J. L. Erlbaum Associates.

BORSOOK, P. 16 The memoirs of a token An aging Berkeley feminist examines Wired. In Cherney, L. and Weise, E. R. (eds.) Wired Women Gender and New Realities in Cyberspace. Seattle Seal Press, 4-41.

BRAIL, S. 16 The price of admission Harassment and free speech in the wild, wild west. In Cherney, L. and Weise, E. R. (eds.) Wired Women Gender and New Realities in Cyberspace. Seattle Seal Press, 141-157.

BRUCKMAN, A. 1 Identity workshop Emergent social and psychological phenomena in text-based virtual reality.

CAMP, L. J. 16 We are geeks, and we are not guys The systers mailing list. In Cherney, L. and Weise, E. R. (eds.) Wired Women Gender and New Realities in Cyberspace. Seattle Seal Press, 114-15.

CHERNY, L. and WEISE, E. R. (eds.) 16 Wired Women Gender and New Realities in Cyberspace. Seattle Seal Press.

CISLER, S. 1 Community computer networks Building electronic greenbelts.

CLERC, S. 16 Estrogen brigades and big tits threads Media fandom online and off. In Cherney, L. and Weise, E. R. (eds.) Wired Women Gender and New Realities in Cyberspace. Seattle Seal Press, 7-7.

COHILL, A. M. and KAVANAUGH, A. L. (eds.) Community Networks Lessons from Blacksburg, Virginia. Norwood, MA Artech House, Inc.

COLLINS-JARVIS, L. A. 1 Gender representation in an electronic city hall Female adoption of Santa Monicas PEN system. Journal of Broadcasting & Electronic Media 71, 4-66.

CONSALVO, M. 17 Cash cows hit the web Gender and communications technology. Journal of Communication Inquiry 11, 8-115.

CORRELL, S. 15 The ethnography of an electronic bar The lesbian cafe. Journal of Contemporary Ethnography 4, 70-8.

DANET, B., RUEDENBERG-WRIGHT, L., and ROSENBAUM-TAMARI, Y. 17 Hmmm... Wheres that smoke coming from? Writing, play and performance on internet relay chat. Journal of Computer-Mediated Communication 4.

DIBBELL, J. 18 My Tiny Life Crime and Passion in a Virtual World. New York Henry Holt.

DIBBELL, J. 1 A rape in cyberspace; or how an evil clown, a Haitian trickster spirit, two wizards, and a cast of dozens turned a database into a society. The Village Voice, 6-4.

DIETRICH, D. 17 (Re)-Fashioning the techno-erotic woman Gender and textuality in the cybercultural matrix. In Jones, S. G. (ed.) Virtual Culture Identity and Communication in Cybersociety. London Sage Publications, 16-184.

DOHENY-FARINA, S. 16 The Wired Neighborhood. New Haven, CT Yale University Press.

DOWNEY, G. L. and DUMIT, J. (eds.) 18 Cyborgs and Citadels Anthropological Interventions in Emerging Sciences and Technologies. Santa Fe, NM The School of American Research Press.

DOWNEY, G. L., DUMIT, J., and WILLIAMS, S. Cyborg anthropology. Cultural Anthropology 10(), 64-6.

EBBEN, M. and KRAMARAE, C. 1 Women and information technologies Creating a cyberspace of our own. In Taylor, H. J., Kramarae, C., and Ebben, M. (eds) Women, Information Technology, and Scholarship. Urbana, IL Women, Information Technology, and Scholarship Colloquium, 5-7.

ELMER-DEWITT, P. 1 Here come the cyberpunks! Time, 58-65.

ELMER-DEWITT, P. and JACKSON, D. S. 14 Battle for the soul of the internet. Time, 50-56.

ESCOBAR, A. 16 Welcome to cyberia Notes on the anthropology of cyberculture. In Sardar, Z. and Ravetz, J. R. (eds) Cyberfutures Culture and Politics on the Information Superhighway. New York New York University Press, 111-17.

GIBSON, W. 184 Neuromancer. New York Ace Books.

GOMEZ-PENA, G. 16 The virtual barrio @ the other frontier (or the chicano interneta). In Leeson, L. H. (ed.) Clicking In Hot Links to a Digital Culture. Seattle Bay Press, 17-17.

GORE, A. 15 Speech to the international telecommunication union in Buenos Aires.

HALL, K. 16 Cyberfeminism. In Herring, S. C. (ed.) Computer-Mediated Communication Linguistic, Social and Cross-Cultural Perspectives. Amsterdam John Benjamins Publishing Co., 147-170.

HARASIM, L. 1 Networlds Networks as social space. In Harasim, L. M. (ed.) Global Networks Computers and International Communication. Cambridge, MA MIT Press, 15-4.

HERRING, S. 16 Gender and democracy in computer-mediated communication. In Kling, R. (ed.) Computerization and Controversy Value Conflicts and Social Choices. San Diego Academic Press, 476-48.

HERRING, S. 16 Posting in a different voice Gender and ethics in CMC. In Ess, C. (ed.) Philosophical Perspectives on Computer-Mediated Communication. Albany, NY State University of New York Press, 115-146.

HERRING, S. 16 Two variants of an electronic message schema. In Herring, S. C. (ed.) Computer-Mediated Communication Linguistic, Social and Cross-Cultural Perspectives. Amsterdam John Benjamins Publishing Co., 81-106.

HERRING, S. (ed.) 16 Computer-Mediated Communication Linguistic, Social and Cross-Cultural Perspectives. Amsterdam John Benjamins Publishing Co.

HORN, S. 18 Cyberville Clicks, Culture, and the Creation of an Online Town. New York Warner Books.

JONES, S. 17 The internet and its social landscape. In Jones, S. G. (ed.) Virtual Culture Identity & Communication in Cybersociety. London Sage Publications, 7-5.

JONES, S. 15 Understanding community in the information age. In Jones, S. G. (ed.) CyberSociety Computer-Mediated Communication and Community. Thousand Oaks, CA Sage Publications, 10-5.

JONES, S., (ed.) 17 Virtual Culture Identity & Communication in Cybersociety. London Sage Publications.

JONES, S., (ed.) 15 CyberSociety Computer-Mediated Communication and Community. Thousand Oaks, CA Sage Publications.

KANTROWITZ, B. 14 Men, women, and computers. Newsweek, 48-55.

KAPOR, M. and BARLOW, J. P. 10 Across the electronic frontier.

KEEGAN, P. 15 The digerati! The New York Times Magazine, 8-45, 84-88.

KIM, A. J. 1 Community Building on the Web Secret Stategies for Successful Online Communities. Berkeley, CA Peachpit Press.

KINNEY, J. 16 Is there a new political paradigm lurking in cyberspace? In Sardar, Z. and Ravetz, J. R. (eds) Cyberfutures Culture and Politics on the Information Superhighway. New York New York University Press, 18-15.

KLING, R. 16 Hopes and horrors Technological utopianism and anti-utopianism in narratives of computerization. In Kling, R. (ed.) Computerization and Controversy Value Conflicts and Social Choices. San Diego Academic Press, 40-58.

KOLLOCK, P. 16 Design principles for online communities. Paper presented at Harvard Conference on the Internet and Society, Cambridge, MA.

KOLLOCK, P. and M. SMITH. 16 Managing the virtual commons Cooperation and conflict in computer communities. In Herring, S. C. (ed.) Computer-Mediated Communication Linguistic, Social and Cross-Cultural Perspectives. Amsterdam John Benjamins Publishing Co., 10-18.

KRAMARAE, C. and TAYLOR, H. J. 1 Women and men on electronic networks A conversation or a monologue? In Taylor, H. J., Kramarae, C., and Ebben, M. (eds) Women, Information Technology, and Scholarship. Urbana, IL Women, Information Technology, and Scholarship Colloquium, 5-61.

LANDOW, G. P. 1 Hypertext The Convergence of Contemporary Critical Theory and Technology. Baltimore John Hopkins University Press.

LANDOW, G. P., (ed.) 14 Hyper/Text/Theory. Baltimore John Hopkins University Press.

MACKINNON, R. 18 The social construction of rape in virtual reality. In Sudweeks, F., McLaughlin, M., and Rafaeli, S. (eds.) Network and Netplay Virtual Groups on the Internet. Menlo Park, CA/Cambridge, MA AAAI Press/MIT Press, 147-17.

MACKINNON, R. 17 Punishing the persona Correctional strategies for the virtual offender. In Jones, S. G. (ed.) Virtual Culture Identity and Communication in Cybersociety. London Sage Publications, 06-5.

MACKINNON, R. 15 Searching for the leviathan in usenet. In Jones, S. G. (ed.) CyberSociety Computer-Mediated Communication and Community. Thousand Oaks, CA Sage Publications, 11-17.

MCLAUGHLIN, M. L., OSBORNE, K. K., and ELLISON, N. B. 17 Virtual community in a telepresence environment. In Jones, S. G. (ed.) Virtual Culture Identity and Communication in Cybersociety. London Sage Publications, 146-168.

MCLAUGHLIN, M. L., OSBORNE, K. K., and SMITH, C. B. 15 Standards of conduct on Usenet. In Jones, S. G. (ed.) CyberSociety Computer-Mediated Communication and Community. Thousand Oaks, CA Sage Publications, 0-111.

MILLER, L. 15 Women and children first Gender and the settling of the electronic frontier. In Brook, J. and Boal, I. A. (eds.) Resisting the Virtual Life The Culture and Politics of Information. San Francisco City Lights, 4-57.

MITRA, A. 17 Virtual commonality Looking for India on the internet. In Jones, S. G. (ed.) Virtual Culture Identity & Communication in Cybersociety. London Sage Publications, 55-7.

NAKAMURA, Lisa. 1 Race in/for cyberspace Identity tourism and racial passing on the internet. In Vitanza, V. J. (ed.) CyberReader. Boston, MA Allyn and Bacon, 44-45.

NATIONAL TELECOMMUNICATIONS AND INFORMATION ADMINISTRATION. 1 Falling through the net Defining the digital divide.

NATIONAL TELECOMMUNICATIONS AND INFORMATION ADMINISTRATION. 18 Falling through the net II New data on the digital divide.

NATIONAL TELECOMMUNICATIONS AND INFORMATION ADMINISTRATION. 15 Falling through the net A survey of the have nots in rural and urban America.

PHILLIPS, D. S. 16 Defending the boundaries Identifying and countering threats in a usenet newsgroup. The Information Society 1, -6.

POTTER, D. (ed.) 16 Internet Culture. New York Routledge.

RHEINGOLD, H. 1a A slice of life in my virtual community. In Harasim, L. M. (ed.) Global Networks Computers and International Communication. Cambridge, MA MIT Press, 57-80.

RHEINGOLD, H. 1b The Virtual Community Homesteading on the Electronic Frontier. Reading, MA Addison-Wesley Publishing Co.

ROSENZWEIG, R. 1 Live free or die? Death, life, survival, and sobriety on the information superhighway. American Quarterly 51.1, 160-174.

ROSS, A. 11 Strange Weather Culture, Science and Technology in the Age of Limits. London Verso.

RUSHKOFF, D. 14 Media Virus Hidden Agendas in Popular Culture. New York Ballantine.

SALE, K. 15 Rebels Against the Future The Luddites and Their War on the Industrial Revolution Lessons for the Computer Age. Reading, MA Addison-Wesley Publishing Company.

SCHMITZ, J. 17 Structural relations, electronic media, and social change The public electronic network and the homeless. In Jones, S. G. (ed.) Virtual Culture Identity and Communication in Cybersociety. London Sage Publications, 80-101.

SCHULER, D. 16 New Community Networks Wired for Change. Reading, MA Addison-Wesley Publishing Co.

SCHULER, D. 14 Community networks Building a new participatory medium. Communications of the ACM 71, -51.

SHAW, D. F. 17 Gay men and computer communication A discourse of sex and identity in cyberspace. In Jones, S. G. (ed.) Virtual Culture Identity & Communication in Cybersociety. London Sage Publications, 1-145.

SHNEIDERMAN, B. and ROSE, A. 17 Social impact statements Engaging public participation in information technology design. In Friedman, B. (ed.) Human Values and the Design of Computer Technology. Cambridge Cambridge University Press, 117-1.

SILVER, D. Forthcoming Communication, community, consumption An ethnographic exploration of an online city. In Kolko, B. E. (ed.) Virtual Publics Policy and Community in an Electronic Age. New York Columbia University Press.

SILVER, D. 000 Margins in the wires Looking for race, gender, and sexuality in the blacksburg electronic village. In Kolko, B. E., Nakamura, L., and Rodman, G. B. (eds.) Race in Cyberspace Politics, Identity, and Cyberspace. New York Routledge, 1-150.

SILVER, D. 1 Localizing the global village Lessons from the blacksburg electronic village. In Browne, R. B. and Fishwick, M. W. (eds.) The Global Village Dead or Alive? Bowling Green, OH Popular Press, 7-.

SILVER, D. 16 Parameters and priorities The formation of community in the blacksburg electronic village. Unpublished M.A. thesis, Department of American Studies, University of Maryland.

SMITH, M. and KOLLOCK, P. (eds.) 1 Communities in Cyberspace. London Routledge.

SOBCHACK, V. 1 New age mutant ninja hackers Reading Mondo 000. South Atlantic Quarterly .4, 56-584.

STOLL, C. 15 Silicon Snake Oil Second Thoughts on the Information Highway. New York Doubleday.

STONE, A. R. 11 Will the real body please stand up? Boundary stories about virtual cultures. In Benedikt, M. (ed.) Cyberspace First Steps. Cambridge, MA MIT Press, 81-118.

TURKLE, S. 15 Life on the Screen Identity in the Age of the Internet. New York Simon & Schuster.

WELLMAN, B. 17 An electronic group is virtually a social network. In Kiesler, S. (ed.) Culture of the Internet. Mahwah, NJ Lawrence Erlbaum Associates, Publishers, 17-05.

WELLMAN, B., SALAFF, J., DIMITROVA, D., GARTON, L., GULIA, M., and HAYTHORNTHWAITE, C. 16 Computer networks as social networks Collaborative work, telework, and virtual community. Annual Review of Sociology , 1-8.

What Are We Doing Online? Harpers. August 15, 5-46.

WHITTLE, D. B. 17 Cyberspace The Human Dimension. New York W. H. Freeman and Co.

. Ethics and Privacy Responsibility in Knowledge Management

Week 5. Dr John Janzekovic. 5/0/00

Dealing with Ethical Dilemmas While Competing Globally

Both the lecture and article have definitions for ethics. Although the wording is quite different, both definitions mean the same thing. “(1) Careful reflection upon issues of right and wrong and on questions of whether given actions will enhance or diminish human happiness or well-being. () The results of that reflection, expressed as rules or as a code” (001. Smith, D). This definition is far more complex than the one in the lecture. “Ethics are standards of behaviour deemed to be acceptable within a society. ‘Ethics’ does not necessarily mean the same thing to everybody” (00. Janzekovic, J). There are many of the same keywords used because they both describe similar concepts, for example the lecture states “A General Professional Code of Ethics for the workplace Maintain a high standard of professional behaviour in your dealings with your employer, your colleagues, and your clients. Avoid situations that create a conflict of interest. Do not violate the rights or privacy of others…” (00. Janzekovic, J). A simplified version of this from the article is “Key ethical principles for business Honesty Respect for persons (respect for human dignity) Fairness” (001. Smith, D).

This article is from the Business Ethics Organisation’s website and was a speech for the council for Ethics in Economics presented at the Kent State University. All quotes throughout the article are not correctly referenced and there is no bibliography, however because this is a copy of a speech this information would not be expected. It is all original information on the website. There are no actual qualifications listed for the author/speaker, but it can be presumed authoritive because of the audience and organizations affiliated with this speech. This article is biased towards building a better understanding of global business ethics. It sways the audience to think and behave more ethically and to be aware of different ethical expectations in different countries. In this way, the article still holds objectivity. This speech was presented in early 001. It is still very up-to-date and full of useful information. It is a very large article and covers all topics of ethics in business, particularly global business, in great depth.

.1 Dealing with Ethical Dilemmas While Competing Globally


Council for Ethics in Economics �001

Pilliod Lecture Kent State University February 1, 001 David C. Smith

I am honored by the invitation to speak to you this evening about global business ethics. Business leaders in our country and every other part of the world are struggling to realize the vast opportunities opened by the global economy, and to meet the challenges of keen competition that have emerged from the globalization of commerce and capital investment. Within the fast-changing relationships of the global economy, finding agreement on ethical standards and principles presents important opportunities and problems. What shall count as ethically acceptable business practice in a global economy on a fragile planet? How shall ethical practices be implemented when national or international enforcement mechanisms are weak and not everyone is playing by the same ethical rules?

In both economic and human terms, much is at stake in how these issues are resolved. As commerce and capital are globalized, will the benefits of a global economy enhance the prospects for the vast majority of the world’s people? Or will patterns of exploitation be exacerbated? If we can establish a global economy marked by rising opportunity, justice, and respect for human dignity, we can hope that social and international tensions will be reduced. On the other hand, if corruption, coercion, exploitation, and dishonesty triumph, we can anticipate that mistrust, social unrest, and calls for authoritarian remedies will increase.

As managers and leaders of companies doing business in a global economy, most of you will face decisions that have�in small or not-so-small ways�significant consequences for the present or future welfare of persons. That is to say, you will face ethical choices in your economic life. (I’ll return in a moment to the definition I just introduced.) While companies that have been successful in the long run have always valued integrity and high standards of ethics, I believe that, in the global economy, successful managers will, more than ever, need good ethical imagination and solid analytic skills �not for the sake of appearance but as essential management skills. So, in addressing you this evening about global business ethics, I hope that I am not just speaking “about” some important issues or developments of our times, but introducing a framework that you will find useful in developing or teaching these important competencies.


To create this framework, we must try to cover a good deal of territory. Here’s a quick road map of my presentation.

Global Business Ethics

I. Definition of ethics

II. An ethical framework for global business

III. Examples of ethical issues

IV. Corporate policies, reporting, building consensus

We begin by offering a general definition of ethics�as ethics applies to all of us in our relationships with others. Then I’ll move quickly to an ethical framework that comes into play when we’re addressing issues of global business. This involves (1) some key ethical concepts and () several intermediate steps in moving from individual to organizational responsibility. Third, I’ll offer a few illustrations of ethics problems in global business, attempting to show how key principles apply to typical situations�you will be familiar with many of the issues. I then want to look in more detail at what businesses are doing to promote ethics in a time of globalization� in terms of company policies, social reporting, and building ethical consensus.


(1) Careful reflection upon issues of right and wrong and on questions of whether given actions will enhance or diminish human happiness or well-being.

() The “results” of that reflection, expressed as rules or as a code.

Broadly speaking, I understand ethical choices to be those that have positive or harmful consequences for persons, including ourselves.

Our careful thinking is framed by our values personal, professional, organizational. Ethics, as a form of think-Business ethics application of ethical reflection and principles to business situations.

Business ethics is not a different system of ethics!

Key ethical principles for business

• Honesty

• Respect for persons (respect for human dignity)

• Fairness

This broad definition means that many business decision-issues are ethical issues.

Others include the Japanese concept of kyosei, which means, “working and living together for the common good.” The “payoff” of ethics is trust.

The Foundations of Trust

Decisions and actions that advance the norms (standards) of fairness, honesty, and respect for intrinsic human dignity build trust.

Decisions and actions that are not in accord with these norms hurt others and ourselves.

TRUST = Fairness, Honesty, and Respect for Human Dignity.

So, this is my basic model of ethics.

Transition to a framework for global business ethics

We then move rather quickly to the application of these principles to global business. There are a number of important intermediate steps, to which I cannot do justice in this brief interval. Let me simply mention five such issues.

Ethics and Global Business

• Personal ethical competency

• Ethical and legal responsibility

• Individual and organizational responsibility

• Stakeholder theory of ethical obligation

• Human rights as ethical mandates

(1) Ethics and character. When I address a group about business ethics, I occasionally get the comments Why do we need ethics experts. Why don’t we all just “Do the right thing?” This criticism is directed against business people who seem to have good technical skills but are ethical idiots.

Well, of course it’s not really that simple. Naturally, doing the right thing is important, but “the right thing” is not always obvious. For example an employee has broken a key rule of an organization. Some discipline is in order, but what? Dismissal? Reprimand? What is fair? This requires judgment, imagining consequences.

Personal Ethical Competency

Character Decision-making skills

Together, character and analytic skills create ethical competency.

() Ethics and the law. They are not the same. Both have a role in building good global business conduct. Both have advantages and disadvantages.

Global Business Conduct Legal Ethical

1. Adequate decisions and policies Compliance Exercise ethical responsibility

. Resources for global business conduct U.N. Declaration on Human Rights Foreign Corrupt Practices Act (U.S.) Corporate codes, values Please note that this sample paper on Changing Society with IT is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on Changing Society with IT, we are here to assist you. Your cheap research papers on Changing Society with IT will be written from scratch, so you do not have to worry about its originality.

Order your authentic assignment from custom essay service and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!


Leave a Reply

Note: Only a member of this blog may post a comment.