DOC PREVIEW
UConn COMM 1000 - ethics part 2

This preview shows page 1 out of 3 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Comm 1000 1st edition Lecture 1310/23Outline of last lecture l. Relationshipsll. Lying and Relationshipslll. Intimates and lie detection lV. EthicsV. Lying and Misrepresentation Outline of current lectureVl. Lippard-Five Reasons for lyingVll. Bok- Moral Excuses for lying Vlll. Disclosing secrets also has ethical dimensionslX. Technology creates more ethical complexity X. Whistleblowing Xl. Leaks are secrets made known to others by an anonymous source Current lectureVl. Lippard-Five Reasons for lyingA. To protect/acquire material resourcesB. To decrease/increaseC. To avoid conflictD. To protect Vll. Bok-Moral Excuses for LyingA. To avoid harmB. To produce benefitsC. For fairnessD. For sake of unknown truth Vlll. Disclosing secrets also has ethical dimensionsA. Should one disclose behaviors of others when it would cause them or others harm?B. School shootings involve issues of loyalty C. Ethical considerations for biographers (Nadine Gordimer example)D. Can tapes of patient therapy session be released after his/her death? (Anne Sexton example)E. When do rights to privacy outweigh the public’s right to know?F. Concealment of victim identities - Information about Kobe Bryant’s accuser was published- She was identified again after filling a civil law suit G. Information in the political realm- Kennedy’s illness- Reagan’s injury- Elizabeth Edwards’ illness- Cheney health concernsComm 1000 1st editionH. Technology raises privacy issues- Cookies allow internet activity to be traced - Electronic monitoring on the job may invade privacy - Public opinion after 9/11 was divided concerning monitoring lX. Technology creates more ethical complexityA. Students- Papers available online (and a lot more)- Technology also makes catching plagiarism easier B. People misrepresent themselves online C. “Hate sites” foster online bigotry- Offer dangerous advice- Protect anonymity of message posters- One estimate puts the number of hate sites in the U.S. at 803 in 2005X. Whistleblowing A. Identifying ethical violations in one’s group B. Bok identifies three elements of whistleblowing:- Dissent from group- Breach of loyalty to the group - Specific individuals are accused of responsibility D. Whistleblowing cases- Special Agent Coleen Rowley’s letter to FBI Director Muller- Expressed concerns about failure to deal with warnings of terrorist activity prior to 9/11- Acknowledged whistleblowing so “whistleblower protection” would apply- Sherron Watkins of Enron and Cynthia Cooper of WorldCom illustrate unique role of women - Insider/outsider needed to blow the whistle on corporations - Women are perhaps more likely to be insiders/outsider- The insider is based on the case of Jeffery Wigand, an employee-turned-witness against Brown & Williamson- Peter Rost’s actions against PfizerXl. Leaks are secrets made known to others by an anonymous sourceA. The source avoids responsibility for the information B. Leaks can seriously impact businessC. Shadow pages are web pages created to attack another person, corporation or siteD. Dr. We Ho Lee’s reputation was destroyed by leaks E. Timing of leaks is often manipulated F. Freedom of the press and source confidentiality require difficult ethical judgmentsG. Rhetorical frames can vary with culture, making these issues even more complex - Sacredness of all human life proposed as a basic, universal principle - Respect for human dignity, truth telling and non violence follow from this principle.Comm 1000 1st


View Full Document

UConn COMM 1000 - ethics part 2

Download ethics part 2
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view ethics part 2 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view ethics part 2 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?