Sunday, January 26, 2020

Adaptation To Climate Change In Mauritius Environmental Sciences Essay

Adaptation To Climate Change In Mauritius Environmental Sciences Essay Climate change has been the most debated environmental issue in the political ecology arena in the last two decades. After initiating global discussions in 1992 United Nations Conference on Environment and Development in Rio, the United Nations established the Framework Convention in 1994 on Climate Change (UNFCCC). Subsequently, the Kyoto protocol was signed in 1997 by nations except the United States. Many rounds of negotiations have been going on to combat climate change since then. Among other problems resulting from climate change, sea temperature rise in addition to modifications in the intensity and extremes of precipitation patterns and storms are of great importance. Consequent floods and droughts as well as rises in sea level are affecting water quality and aggravating water pollution. Observational records and climate projections provide abundant evidence that freshwater resources are vulnerable and have the potential to be strongly impacted by climate change, with wide-ranging consequences for human societies and ecosystems.(Bates et al., 2008, p.3). Mauritius forms part of the Small Island Developing States (SIDS) which are among the least responsible for climate change (UNFCCC, 2005, p.2.) but are more prone to suffer from its adverse effects. The UNFCC report also reveals that 60 per cent of the water supply for domestic, industrial and agricultural purposes in Mauritius comes from groundwater and boreholes found near the coast might be adversely impacted by saltwater intrusion (UNFCCC, 2005, p.17). Current solutions to climate change impacts vary from mitigation, which implies reducing the level of human activities that cause climate change, to adaptation, namely by finding ways to lessen vulnerability and minimise harm caused by the impacts. While mitigation is the most suitable solution, it will not bring immediate results and adaptation is consequently a heavily discussed option. As an institutional endeavour to handle adaptation to climate change in Mauritius, the government has an ongoing project under the Africa Adaptation Program, the ultimate goal being revision of policies and identification of adaptation measures for further implementation. However, for successful achievement of policy measures about adaptation to climate change, much public acceptance, understanding and participation is needed. The aim of this research is an understanding and analysis of the perception of undergraduates in Mauritius regarding climate change and adaptation to it, principally with regard to the water resources sector. The findings are meant to help the ongoing governmental program of adaptation to climate change in Mauritius by exploring in particular the perception of young academics with regard to the water sector, identifying their preferred adaptation options and assessing their willingness of participation in implementing measures. Introduction The threat from further global warming has catapulted the environment to the summit of the political agenda with climate change as a major concern. The environment envelops an extended range of inter-reliant troubles: flood, drought, desertification, water shortage, deforestation, storm surges, food and malnutrition, species extinction, human health, soil erosion and waste to name a few. As such, the link between the natural and social magnitude of environmental problems can be clearly made. The degree of impact of climate change upon different bionetwork and state economies will depend not only on the sensitivity of those systems to the problem, but also on their aptitude to climate change adaptation. Climate change in itself is a massive crisis and encapsulates several spheres such as impact on Food and Agriculture, Land usage for settlement, tourism, the fisheries sector, Human health, and water resources among others. Water is indispensable to human life and many activities. Our climate, our biosphere and our socio-economic systems are interconnected in an intricate fashion, such that a change in any one of these induces a change in another. Anthropogenic climate change adds a major pressure to nations that are already tackling the issue of sustainable freshwater use. The challenges related to freshwater are: having too much water, having too little water, and having too much pollution. Each of these problems may be aggravated by climate change. For that reason, the correlation between climate change and water resources is of primary concern and significance. So far, water resource issues with respect to climate change have not been adequately tackled pertaining to policy formulations. Consequently, adjusting to or dealing with climate change will become necessary in certain regions and for certain socioeconomic and ecological systems. The need for adaptation may be scaled by ever growing populations especially in areas susceptible to these extreme events. Adaptation now appears to emerge as a new potential solution to the climate change but is not always very comprehensive. From definitions, adaptation refers to adjustments in ecological, social, or economic systems in response to actual or expected climatic stimuli and their effects or impacts (IPCC, 2007). In other words, it refers to changes in normal processes, customary practices, and structures to restrain likely damages or to profit from opportunity related with climate change. It should be however highlighted that adaptation to environmental change is not a new concept. Our civilization has demonstrated throughout History a strong adaptation capability to different weather conditions and natural changes. T his recent global and local issue of adaptation requires a scientific, economic, political, social and cultural approach and is a multifaceted situation that calls for understanding and recognition by all stakeholders, including decision-makers and the society in general. The island of Mauritius forms part of the Small Island Developing States (SIDS) with special needs and concerns and is highly vulnerable to the adverse impacts of climate change. Human induced climate change such as global warming as well as natural disasters like tsunami and storms have a direct impact on the water resources of SIDS. Being categorized as high priority, freshwater quality and quantity in addition to management and planning demands urgent adaptation action and financial resources to support such action. (WGII TAR Chapter 17). According to the Least Developed Countries Fund (LDFC) established under the United Nations Framework Convention on Climate Change (UNFCCC), countries should prepare and submit a National Adaptation Programme of Action (NAPA) which enumerates ranked priority adaptation activities and projects to facilitate the development of proposals for implementation. Under the Water Sector priority, SIDS which have already submitted their NAPA (as at Septembe r 2008) have been taken into consideration, to be able to derive similarities and consequent adaptation and mitigation actions to climate change planned by them. This will be used as a basis to analyse their applicability in Mauritius, which has not yet documented its NAPA. SIDS taken into consideration are : In the region of Africa: Cape Verde, Comoros, Guinea Bissau, and Sao Tome e Principe In the region of Asia and the Pacific: Kiribati, Maldives, Samoa, Tuvalu, Vanuatu In the region of Latin America and the Carribean: Haiti Analysis have resulted into specific key problem areas namely, the unavailability or limited availability of drinkable water due to changing weather conditions and the lack of proper infrastructures to manage and sustain water resources, the deterioration of the quality of potable water owing to several factors (for e.g. saline intrusion from sea level rise, soil erosion, unplanned sewerage development, bad waste water management amongst others in underground water sources), poor agricultural production and the negative effects on food security (for e.g production shortages, disruption in the vegetative growing, traditional irrigation methods etc) and other problem factors related to water specific to each SIDS (for example airports of Maldives suffered significant damages due to flooding in addition to impending threat of sea level rise, tsunami caused destruction of the poor sewerage systems, use of traditional sources of water for eg in Sao Tome e Principe) Various global and SIDS adaptation options being either implemented or proposed and which can be considered for implementations in the local context are listed below: Development of water harnessing, collection and storage infrastructures by building reservoirs and dams, encouraging use of individual water-saving devices and promoting safe rainwater harvesting through ground catchment and roof catchment systems, Elaboration of decentralized management plans on water production and distribution infrastructures, Elaboration and implementation of legislation and regulation, with practical modalities of application very defined, Design and construction of suitable sewage treatment and disposal systems to safeguard water resources, Establishing modeling maps and an information and monitoring system on water resources Institutionalization of management system, with the purpose of putting in practice the national politics of the water resources, Reducing leakage in supply systems, Carrying out participatory research on the knowledge of traditional practices of adaptation to the variations of the water cycle. As an institutional endeavour to handle adaptation to climate change in Mauritius, the government also has an ongoing documentation project under the Africa Adaptation Program, the ultimate goal being revision of policies and identification of adaptation measures for further implementation. However, according to Breton et al. (p.15), political measures regarding climate change will require a certain degree of acceptance and public understanding to be able to be implemented. What is climate change in the eyes of the public? What do citizens believe can be done to lessen damages caused by adverse impacts? A study by Leiserowitz in 2007 on international public perception states that social scientists have found that public risk perceptions strongly influence the way people respond to hazards (p.1). Thus, comprehension of how the public perceives climate change and adaptation is a key element in directing the actions that enable both raising awareness and motivating behavioral changes in the population at large. The study of public perception on climate change is of major importance nowadays, as Leiserowitz confirms Since 1988, numerous public opinion polls have found that Americans, Europeans, and Japanese are increasingly aware of and concerned about global climate change and supportive of a wide range of mitigation and adaptation policies (2007, p.3) and different international studies agree on the point that citizens concern for climate change is high. If we look again at the study carried out by Leiserowitz, the conclusion is that large majorities worldwide already believe that climate change is a very serious problem and are growing more concerned (2007, p.34). Globescan (2000 cited in Leiserowitz 2007, p.29) adds that on rating the seriousness of eight environmental issues, water resources ranks first and the results of a survey of 34 countries demonstrate very high levels of public concern about a wide range of environmental issues, from local problems like water and air pollution to global problems like ozone depletion and climate change. In a new survey of 30 countries, Globescan (2001 cited in Leiserowitz 2007, p.11) also finds that Worldwide, the potential impacts of climate change on human health were the single most cited, followed by drought and water shortages, species loss, and extreme weather events whereby drought and water shortages hold a second place as being one possible impact most concerning people personally. According to findings of another survey carried out on climate change belief in Britain (Poortinga et al., 2006, p.19) in 2005, an overwhelming majority of respondents (91%) believe that the worlds climate is changing. The survey concludes that a clear majority of respondents (62%) also indicate that every possible action should be taken against climate change (2006, p. 19), and almost half of the respondents would be prepared to take part in a public discussion or hearing about climate change (2006, p.13). A study by Maddison in 2007 of the public perception of agriculturalists in 11 African countries regarding climate change mentions that When temperatures change farmers à ¢Ã¢â€š ¬Ã‚ ¦ practice increased water conservation (p. 2). This research will be focusing on the perception of Mauritian university undergraduates on the topic of climate change and adaptation to it, particularly with regard to the water resources sector. The findings of the research would be made available to policy-makers to enable them to propose more practical, focused policies and measures and to deal with the priority level that academics give to adaptation. The background of the proposed study is of great interest because the university students will be required in the future to participate in the implementation of various adaptation and mitigation measures both as citizens and decision makers. Aims and objectives The aim of this research is an understanding and analysis of the perception of undergraduates in Mauritius regarding climate change and adaptation to it, principally with regard to the water resources sector. This research is meant to help an ongoing governmental program of adaptation to climate change in Mauritius by exploring in particular the issue of perception of young academics. Awareness of the perception of climate change and adaptation as well as attitudes and preferences of young academics in Mauritius can help in setting up adaptation priorities specific to the island. Fostering the involvement of young people can facilitate better design of guidelines to adapt to the concerns of the population and aid in producing more effective communication policies. The objective of the study is to discover the view of the university students with regard to climate change and its associated events and whether they perceive implementation of any adaptation measure in the water resources sector to have taken place by now. Another objective will be to ascertain the preferences of those youngsters on the subject of adaptation and mitigation options with respect to the water resources area. The paper will also target to find out whether academic youngsters notice any obstruction to adaptation and will attempt to discover the proportion of youngsters that are aware of climate change but have not yet reacted. Matters considered would be whether they believe climate change to be a very serious problem, their extent of concern for climate change, their view on the duty of institutions to overcome barriers to adaptation, their level of knowledge and information and their preferences regarding different adaptation options. Their rating of seriousness of wa ter resources compared to a range of environmental issues will also be assessed in addition to which extent they consider droughts and water shortages to be a personal concern. The research therefore endeavors to improve our understanding of the links between undergraduates perceptions on climate change and its impacts with regards to water-related issues on one hand, as well as adaptation and mitigation response options preferred by those youngsters, on the other hand. The research will also be carried out in an attempt to inform policymakers and stakeholders about the implications of climate change and climate change response options for water resources, in order to facilitate better design of guidelines to adapt to the concerns of the population and aid in producing more effective awareness campaigns and education policies if necessary. . List of hypotheses Based on several researches that have been done at global level regarding the public perception of climate change and adaptation in the field of water resources, our first hypothesis for this study is that large majorities worldwide already believe that climate change is a very serious problem and are growing more concerned (Leiserowitz, 2007, p.34). The second hypothesis of our study is that when rating the seriousness of a range of environmental issues, water resources problem is ranked first, as confirmed by the findings of the survey of 34 countries carried out by Globescan (2000 cited in Leiserowitz 2007, p.29). The third hypothesis is based on the survey of 30 countries carried out by Globescan (2001 cited in Leiserowitz 2007, p.11) whereby among a list of possible impacts of climate change, drought and water shortages ranked first and second respectively, as being one most possible impact concerning people personally. Methodology The study will be based on a structured questionnaire survey to be carried out at the University of Technology, Mauritius, and the University of Mauritius. The targeted respondents would include some 240 fulltime students, equally divided between each university. A batch of 60 undergraduates studying environment and sustainable development subjects at Level 1 will be selected, as well as a group of 60 level 1 students following other courses, as a pre-survey tactic. To get data on their level of knowledge, another set of level 3 students, 60 learning environment and sustainable development subjects and 60 studying other subjects will also be interrogated. The respondents will be selected considering gender equality and there will be no age limit, so long that the students are either at Level 1 or level 3 of their studies. The questionnaire will be prepared by considering the significance of the knowledge of the academics and to ensure that our objectives will be met. The feedback form will be in English language, which undergraduates will have no difficulty to understand. The interviewers will assist the participants by discussing all questions in the survey document. Survey questions will cover several topics linked to climate change and adaptation in the water resources sector, including: Awareness of climate change and its associated events; Awareness of adaptation measures that exist or can be proposed in the water sector; Perception that implementation of any adaptation measure in the water resources sector has already occurred; preferences regarding adaptation and mitigation options with respect to the water resources area; perceived obstruction to adaptation; Perception of the duty of institutions to overcome barriers to adaptation; Perception on degree of availability of knowledge and information on the matter; Degree of agreement to participate in public debates on the issue of water resources, and Proportion of youngsters that are aware of climate change but have not yet reacted to that, including grounds for action and non action. Open-ended questions will be used regarding grounds for action and non action as well as to gather any personal adaptation proposal not listed in the feedback form. The data obtained during the questionnaire survey will be summarized by making use of computer software for statistical analysis. Benefits of the research Policy-makers at the level of the State and local Government and local authorities will benefit from the findings of the research as they will be able to propose more practical, focused policies and measures which will help in solving the problem of adaptation to climate change in the water resources sector locally. The study will also help in setting up adaptation priorities specific to the island. The Ministry of Renewable Energy and Public Utilities, the Central Water Authority and the Waste Water Management Authority will benefit from the findings of the study when drafting their policy document regarding water resource and its sustainable management. The undergraduates themselves and the academic society in general would benefit from the findings which will indicate the priority level tertiary level students give to this question of adaptation in the field of water resources. Fostering the involvement of young people can also facilitate better design of guidelines to adapt to the concerns of the whole population and aid in producing more effective communication policies, which will be advantageous to the general public. The future generation would gain from the study as the findings would help the current generation in devising practical solutions which will foster sustainable development, given that adverse climate change impacts, if not mitigated, prevent a country from succeeding in the implementation of its sustainable development goals. Time plan The duration of the project is of 12 weeks starting as from Saturday 13 March 2010 till the Saturday 29 May 2010. Figure 1 shows a Gantt chart that has been prepared in this respect to illustrate the project task duration against time. The Gantt chart allows up to date monitoring of the project at any point in time and should the project digress against final plan, remedial actions can thus be taken without delay. Figure 1: Gantt chart for research project Cost Estimates Project Component Total Costs 1 Questionnaire Printing: Photocopy costs Rs 1500 2 Questionnaire distribution and Collection: Transport costs Rs 1000 3 Communications Rs 3000 4 Miscellaneous costs (stationery and others) Rs 500 Total costs estimates Rs 6000

Saturday, January 18, 2020

Online Privacy as a Corporate Social Responsibility- an Empirical Study

Business Ethics: A European Review Volume 20 Number 1 January 2011 Online privacy as a corporate social responsibility: an empirical study Irene Pollach Aarhus School of Business, University of Aarhus, Aarhus, Denmark Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility (CSR) agenda: online privacy. While theory suggests that online privacy is a CSR, only very few studies in the business ethics literature have connected these two.Based on a study of CSR disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a CSR. The ? ndings indicate that only a small proportion of the companies have comprehensive privacy programs, although more than half of them voice moral or relational motives for addressing online privacy. The privacy measures they have taken are primarily compliance measures, while measures that stimulate a stakeholder dialogu e are rare.Overall, a wide variety of approaches to addressing privacy was found, which suggests that no institutionalization of privacy practices has taken place as yet. The study therefore indicates that online privacy is rather new on the CSR agenda, currently playing only a minor role. Introduction Since the 1990s, companies striving to be good corporate citizens have had to devise strategies to address issues such as pollution, energy use, waste production, animal testing, child labor, sweatshops, workforce diversity, or advertising to children.It has become a de-facto standard for very large corporations to publish social reports documenting how they address these issues in the marketplace, the workplace, the supply chain, and the community in order to ful? ll their role as good corporate citizens (Snider et al. 2003). The advent of the Internet has not only revolutionized many business models but has also rede? ned what it means to be a good corporate citizen (Post 2000), as most of the above issues are of little relevance to companies dealing with data and technology.One issue of public concern that has become highly relevant for IT companies is online privacy (De George 2000, Johnson 2006). doi: 10. 1111/j. 1467-8608. 2010. 01611. x Information privacy denotes an individual’s right to decide what information is made available to others (Westin 1967). Privacy is thus guaranteed only if individuals know that data are collected about them and if they have control over this data collection and the subsequent use of the data (Foxman & Kilcoyne 1993, Caudill & Murphy 2000). In the United States, privacy-related legislation exists only for health care, ? ancial services, and children on the Internet (Bowie & Jamal 2006), while many aspects of data collection and user control in electronic commerce are still unregulated (Fernback & Papacharissi 2007). Countries of the European Union, meanwhile, protect privacy more strictly (Baumer et al. 2004), which has proven to be a hurdle for US technology companies operating in Europe. In 2008, for example, technology giant Google encountered problems in several European countries with its data handling practices (O’Brien 2008).Despite legislative efforts in Europe, data privacy violations have occurred in a number of 88 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. , 9600 Garsington Road, Oxford, OX4 2DQ, UK and 350 Main St, Malden, MA 02148, USA Business Ethics: A European Review Volume 20 Number 1 January 2011 large organizations, including, for example, the largest German bank, DeutscheBank (Neate 2009), or T-Mobile UK (Wray 2009). The problems with privacy legislation are that it is dif? ult to identify violations of these laws and that the law may lag behind what is technologically feasible. For the above reasons, global companies have some discretion over how much privacy they grant users and how much they reveal about their data handlin g practices to their users. This discretion adds extra complexity to the moral issue of whether companies take advantage of their powerful position by collecting and using data from users to further their own business interests, for example by sending out unsolicited promotional e-mails or selling user data (Pollach 2005).The discretion companies can exercise when it comes to information privacy and the ethical implications of this discretion entail that information privacy is a question of corporate morality. While theoretical work on corporate social responsibility (CSR) suggests that privacy could be a meaningful addition to a corporate CSR program, little is known about corporate practices. This paper therefore sets out to explore whether and how companies whose core business is based on data and technology are embracing information privacy as a CSR. The ? dings suggest that information privacy is emerging as an element of CSR programs, but that there is a great deal of variety regarding the adoption of privacy as a CSR. The paper ? rst discusses the moral issues behind information privacy on the Internet, reviews the literature on corporate responses to people’s privacy concerns, and then looks at the literature on privacy as a CSR. After describing the sample and the methodology underlying this study, the results are presented and their implications are discussed. The ethics of information privacyThe very core of electronic and mobile commerce revolves around technology, digitization, and the exchange of information, which poses a number of ethical problems (Zonghao 2001). A particular challenge to information handling in electronic commerce is the trade-off between collecting data for the sake of transparency and not collecting data for the sake of privacy (Introna & Pouloudi 1999). Another challenge is the trade-off between collecting data for the sake of pro? ts and not collecting data for the sake of privacy.As commercial transactions on the I nternet or through mobile phones are commonly based on credit-card payments and the shipment of goods to the buyer’s home address, the balance is tipped towards the need for disclosure rather than the safeguard of privacy. However, companies collect not only personally identifying information (PII) from transactions but also collect PII when users register themselves, use online services, participate in sweepstakes or surveys, or send inquiries to the company. In addition to PII, companies collect anonymous click-stream 1/2 data and compile anonymous user pro? es when Internet users navigate the companies’ websites (Kelly & Rowland 2000). Through the collection of IP addresses, PII can also be combined with anonymous click-stream data in order to obtain very comprehensive user pro? les (Payne & Trumbach 2009). The easier access to and increased mobility of data have made information a commodity that is bought and sold by data brokers (Spinello 1998). It is therefore al so possible for companies to buy datasets of user information from data brokers and merge them with the data they have collected themselves.Companies may use the data they collect from customers and visitors on their websites merely to execute transactions, recognize users when they return to the site, and improve their website design based on users’ interests. But companies may equally use such data for purposes other than those they were collected for. For example, they may target banner ads at users, harass users with unsolicited commercial e-mails, or share this information with third parties (Han & Maclaurin 2002). A growing body of literature documents people’s concerns about privacy violations in online transactions (e. . Culnan & Armstrong 1999, Phelps et al. 2000, Sheehan 2002, Norberg & Horne 2007, Norberg et al. 2007). Essentially, these concerns stem from the imbalance in power between companies as data collectors and users as data providers. While companie s have superior knowledge of what user data are collected and how they are r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 89 Business Ethics: A European Review Volume 20 Number 1 January 2011 handled, users may not even be aware that data are collected, let alone that they are combined into user pro? les. hus not suited to enhance user privacy or engender trust among Internet users. Corporate response to privacy At the turn of the century, some companies began to introduce chief privacy of? cers (Awazu & Desouza 2004). Their tasks include gathering information about social and legal aspects of privacy, devising the company’s privacy strategy, disseminating information about corporate data handling practices to internal and external stakeholders, and representing the company’s commitment to privacy (Kayworth et al. 2005). Another corporate response to information privacy is privacy policies posted on commercial websites (Sama & Sho af 2002).The original idea behind privacy policies on websites was that companies would disclose how they handle the data they collect from users, while users would carefully read through the explanation of the company’s data handling practices, understand their consequences, and then make an informed decision about divulging personal data or not (Ciocchetti 2007). In reality, privacy policies contain legalese, tech-speak, and other obfuscating language patterns that obscure questionable data handling practices (Pollach 2005, Fernback & Papacharissi 2007).Internet users have been found not to read privacy policies for the above reasons (Milne & Culnan 2004). Privacy policies are sometimes supplemented with privacy seals awarded by private-sector institutions (e. g. BBBOnline, TRUSTe, WebTrust) or accounting ? rms. These seals indicate that companies comply with responsible standards of data handling, as de? ned by the awarding institution (Smith & Rupp 2004). Consumers still have to read and understand the privacy policy, as the seal alone does not guarantee that the data handling practices of the company comply with an individual’s privacy preferences (Rifon et al. 2005).The problem with privacy seals is also that they do not effectively protect users from privacy breaches. The sealawarding institution may not know about a privacy breach or, if it does learn about it, can only revoke the seal, but has no means to help people regain lost privacy (Shapiro & Baker 2001). These measures are Information privacy as a CSR Carroll (1979) categorized corporate social responsibilities into economic, legal, ethical, and philanthropic responsibilities, arguing that making a pro? t is the quintessential responsibility of companies, together with their adherence to legal regulations. According to this classi? ation, information privacy can be categorized as an ethical responsibility, given that legislation is insuf? cient to govern corporate decision making i n all areas of data handling. This is elaborated on by Mintzberg (1983), who suggested that areas where CSR comes into play are those ‘where existing legislation needs compliance with its spirit as well as its letter [and] where the corporation can fool its customers or suppliers or the government through its superior knowledge’ (p. 12). If a company decides to address information privacy, it may not just do so because privacy is an ethical corporate responsibility. Rather, Aguilera et al. 2007) argue that companies accept responsibility for social issues for three different reasons: (1) moral reasons determined by morality-driven values; (2) relational reasons driven by the company’s concern about stakeholder relationships; and (3) instrumental reasons driven by corporate self-interest. Moral motives are enacted particularly by individuals with organizational decision-making power who have strong morality-based values. Relational motives are grounded in a compan y’s desire to promote and balance stakeholder interests, thereby building trust, maximizing stakeholder wealth, and gaining social legitimacy (Aguilera et al. 007). Instrumental approaches are self-interest driven, seeking to achieve greater competitiveness and protecting the corporate reputation (Aguilera et al. 2007). The latter approach corresponds to Jones’ (1995) argument that companies that manage to earn the trust of their stakeholders will be able to secure a competitive advantage through savings on monitoring costs, bonding costs, transaction costs, and search costs arising from managing the various corporate stakeholder groups. Instrumental motives 90 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd.Business Ethics: A European Review Volume 20 Number 1 January 2011 can also be driven by the desire to preempt costly government regulations (Aguilera et al. 2007). The strategy literature follows the instrumental approach to CS R, arguing that companies to which a particular responsibility is highly relevant can bene? t from integrating this responsibility into their overall strategies. Burke & Logsdon (1996) list the following conditions in order for CSR to bring strategic advantages to the ? rm: the chosen CSR issue is central to the company’s mission, is voluntarily embraced, brings bene? s to both the ? rm and to the public at large, is addressed in a proactive manner, and is visible to external stakeholders. It has also been argued that CSR initiatives can bring sustainable competitive advantages in the form of a ? rst-mover advantage (Lieberman & Montgomery 1998). However, for this advantage to emerge, the company must not only be the ? rst one to address a particular CSR comprehensively but must also continuously seek to enhance what it has achieved in order to secure this advantage (Tetrault Sirsly & Lamertz 2008).The strategy literature therefore suggests that companies in the information t echnology industry could bene? t from embracing online privacy as a CSR, especially if they make this commitment visible to external audiences. Although theory suggests that privacy could be a relevant CSR theme for particular companies, very few empirical studies have addressed the link between information privacy and CSR. They include Sharfman et al. ’s (2000) survey among managers on how important they consider a number of social issues, including the protection of privacy.However, in the exploratory factor analysis they conducted, privacy was eliminated from further analyses. Fukukawa & Moon (2004) included information privacy as an indicator of CSR in their study of CSR activities reported by companies in Japan. In addition, Chaudhri’s (2006) case study of global citizenship at Hewlett-Packard mentions privacy as one area the company has included in its CSR agenda. In previous theoretical work, Carroll (1998) has highlighted the protection of online privacy rights as one area where the law lags behind ethical thinking and morality comes into play.Finally, Post (2000) examined the changing role of corporate citizenship in the 21st century and pointed to customer privacy as a new issue of CSR. To date, there is no article that empirically studies in what ways information privacy is actually addressed as a CSR. Research design This study explores whether and how companies are embracing online privacy as a social responsibility, focusing on what measures they claim to have taken and how they communicate these to their external stakeholders in their CSR disclosures.In view of the lack of previous research in this area, this study is exploratory in nature. Accordingly, its goal is to identify the variety of corporate practices rather than to compare and contrast companies. The starting point for the analysis are the three processes of CSR included in Basu & Palazzo’s (2008) process model of sense-making: (1) the reasons a company states for engaging in speci? c CSR activities, (2) the kind of behavior a company displays to live up to its CSR commitments, and (3) the way in which a company regards its relationships with its stakeholders.This section ? rst describes the sample and the data and then goes on to explain the methodology that was applied to analyze the data. Sample The sample consists of the largest companies from IT-related industries, as they are most closely intertwined with information through the hardware, software, or services they provide. To them, information privacy could be a meaningful strategic element of their CSR programs in two different ways. First, they may embrace privacy as a social responsibility in the way they collect and use data.Second, technology does not just violate privacy, it can also enhance privacy. Accordingly, IT companies may engage in corporate social innovation and develop privacy-enhancing products or commit themselves to educating consumers about privacy protection. Clea rly, other large companies, such as retailers, operate online as well, but were not considered for this study, as data and information are not at the core of their activities. Large companies were chosen, as these companies are believed to serve as lead innovators in their industries. All IT-related companies from Europe 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 91 Business Ethics: A European Review Volume 20 Number 1 January 2011 and the United States listed among the Fortune Global 500 and the ? rst 1,000 companies of the Forbes 2000 company rankings were included in the sample. Neither of the two rankings includes ‘information technology’ as an industry. Rather, both include a number of industries that deal with information and technology. These include Computer and Data Services, Computer Software, Computers & Of? e Equipment, Network and Other Communications Equipment, and Telecommunications from the Fortune Global 500 list and Software & Services, Technology Hardware & Equipment, and Telecommunications Services from the Forbes 2000 list. A few IT companies listed in these two rankings could not be included in the analysis, as they had been acquired by another company since the publication of the rankings. Also, the two rankings overlap to a substantial extent, so that the ? nal sample amounted to a total of 95 IT companies. On each company’s website, the CSR section was accessed.If there was no such section, sections dedicated to the company background, mission and values, or ethics were accessed. The goal was to download all texts pertaining at least loosely to CSR and, if available, the latest CSR report. An important criterion was that privacy-related information was collected only if it was framed as a CSR issue. Privacy policies, which are a standard element of every commercial website, were not collected, as their existence alone does not represent a commitment to social responsibility. Of the 95 companies in the initial sample, 30 companies mention privacy in their CSR discourse.The analysis is thus based on these companies (see Appendix A). Their texts range from 21 to 2,367 words in length. Methods This exploratory study draws on both a positivist approach and a constructivist approach in order to look at the data as holistically as possible (cf. Jick 1979). When studying textual data, the fundamental difference between the two traditions is that the positivist tradition sees language as a transmitter of information, while the social constructionist tradition holds that people consciously and unconsciously create social realities when they use language. Accordingly, the textual data were ? st studied using quantitative content analysis, which systematically records the frequency of particular content features. Because of its quantitative, systematic nature, content analysis de-contextualizes the words from the discourse that is examined and therefore has no mean s to interpret its ? ndings within a wider context. The ? ndings of the content analysis were therefore combined with a discourse analysis and are presented together. The combination of content analysis and discourse analysis has also been suggested by researchers in linguistics (van Dijk 1985, Herring 2004), sociology (Markoff et al. 974), and information systems (Trauth & Jessup 2000). In this study, the results of both analyses together provide a much richer picture of corporate practices than one analysis alone could furnish. This is important, given the absence of previous research on privacy and CSR. Content analysis systematically condenses texts into content categories by applying a coding scheme that produces quantitative indices of textual content (Krippendorff 1980, Weber 1985, Kolbe & Burnett 1991, Neuendorf 2002).The content analysis conducted as part of this study records in a systematic and exhaustive manner which companies in the sample have implemented which measure s to improve user privacy. The approach chosen for this analysis uses factual codes, which capture precisely de? ned facts, as opposed to thematic codes, which capture themes addressed in a prede? ned textual unit (Kelle & Laurie 1995). The factual codes pertain to privacy measures companies have actually taken, but exclude those that companies plan to implement in the future.With no existing coding scheme available, a preliminary coding scheme was developed from the data by examining the texts in the sample inductively (cf. Strauss & Corbin 1990) for measures that companies have taken to secure user privacy. Overall, 41 different measures were identi? ed. The measures were recorded dichotomously as being either present (1) or absent (0). They are listed in Table 2 together with the results. The qualitative approach chosen here was discourse analysis, following a social constructionist tradition, which views discourse as a social action that is shaped by and shapes the context in wh ich it occurs (van Dijk 1997a).Discourse analysis is a 92 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. Business Ethics: A European Review Volume 20 Number 1 January 2011 method of textual analysis that focuses on how and why language is used in a particular way (van Dijk 1997b). It is based on the premise that people intentionally and unintentionally construct social realities when they engage in discourse. They use language in their roles as members of particular social groups, professions, institutions, or communities but also construct such roles when they use language in social situations (van Dijk 1997a).Similarly, organizational texts can be constructive and constitutive of realities just like text or speech of individuals (Fairclough 2005). Discourse analysis typically pays attention to language features such as repetitions, pronouns, passive voice, nominalizations, modal verbs, agent–patient relations in sentences, and attitudi nal lexis in order to study the roles assigned to the participants in the discourse, the power relations between them, and the foregrounding or the backgrounding of concepts and events.The discourse analysis conducted here examines how companies present themselves as responsible companies when it comes to privacy and data handling. Basu & Palazzo’s (2008) process model of CSR has guided the analysis and therefore also provides the structure of the results section. Accordingly, the results section starts with the companies’ reasons for including privacy in their CSR programs, then presents privacy measures companies have taken as part of their CSR initiatives, and ultimately studies the relationships with the various stakeholders that are affected by the company’s privacy practices.The reasons for including privacy and the stakeholder relationships are analyzed in the form of a discourse analysis. The analysis of the privacy measures is based on a content analysi s, but enhanced with qualitative insights, as needed. Aguilera et al. ’s (2007) classi? cation of moral, relational, and instrumental CSR motives. Table 1 shows this categorization together with the text passages where these motives were expressed.The moral motives found include the understanding that Internet users have privacy rights, which the company wants to observe, and the acknowledgement that the company has the responsibility to protect the data they gather from Internet users. Relational motives include the recognition that customers have a desire for privacy, which the company seeks to meet, and the expectation that privacy protection will help the company win customers’ trust. Ultimately, one company expects to bene? t from its privacy program in that it expects to gain a reputational advantage from privacy protection. CSR behaviorThe content analysis revealed 41 different measures companies had taken to support user privacy (see Table 2). They have been gr ouped into four categories, which are discussed below. One company has implemented 19 of these measures, and nine companies have implemented eight, nine, or 10 different measures. At the other end of the spectrum, there are two companies that have not implemented a single measure, but still talk about privacy in the context of CSR. Further, eight companies have implemented one or two measures, and nine companies have implemented between three and seven measures.Most commonly, a measure was taken by only one company (19 measures) or two companies (six measures). The measure taken most frequently was taken by 15 companies. Thus, there is a broad variety in how companies address privacy. It is also worth noting that it is not necessarily the biggest companies in the industry that have taken lead roles in protecting user privacy. When ranking all companies according to their ranks on the Forbes 2000 and the Fortune Global 500 lists, one can see that the company with the highest number o f privacy measures ranks among the top three on both the Forbes and the Fortune list.The other two companies among the top three in the Fortune and Forbes rankings have implemented only one and three measures, respectively. The three companies Results Reasons for privacy as CSR The texts were examined for indications of why the companies include privacy in their CSR programs. Only 13 companies voiced their motivation for engaging in privacy protection, presenting different reasons why they engage in CSR. The communicated motives have been grouped according to r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 3 Business Ethics: A European Review Volume 20 Number 1 January 2011 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Table 1: Communicated motives for corporate privacy programs Motive Moral Explanation Three companies acknowledge that people have a right to privacy Quotations ‘To us, the right to privacy includes the right of individuals to have a voice in the use and dissemination of their personal information. ‘A person has the right to control what information about him or her is collected and to determine how that information is used. ’ ‘Con? dentiality and security of consumer data . . . are areas safeguarded by PT in order to respect the freedom and basic rights of each individual’ ‘We feel a strong responsibility to help ensure a safer, more enjoyable Internet, while addressing the challenges to privacy and security posed by today’s new media. ’ ‘Companies have a responsibility to ensure that the information they hold about their customers and employees is protected, stored, transferred, and used i n a responsible manner. ‘Microsoft takes seriously its responsibility to help address the security and privacy challenges of the information-based society, from viruses and spyware to spam and online identity theft. ’ ‘Respect for privacy is part of our commitment to observe high standards of integrity and ethical conduct in all our operations’ ‘Protecting our customers’ privacy is a priority. We understand and respect your desire to protect your personal information. ’ ‘The protection of personal information is a very high expectation among our customers, and to meet it, we . . .. ‘Externally, Sabre is committed to building customer relationships based on trust, and that includes recognizing the importance of protecting personal information. ’ ‘Consumer trust and con? dence is critical to Cisco’s business and to any technology and Internet-related business; as a result, the industry must protect citizensà ¢â‚¬â„¢ privacy. ’ ‘[We] have to acquire a ‘license to operate’ by conducting our business in a decent and responsible way. ’ ‘Security and reliability form the basis of Telekom Austria Group’s stable and successful customer relationships.The Group therefore gives top priority to protecting the integrity and con? dentiality of sensitive data. ’ ‘Main opportunities: Enhance customer and employee trust, . . . support brand/reputation. ’ Four companies hold that they have a responsibility to protect the data they gather from Internet users Relational Two companies recognize that customers have a desire for privacy that needs to be met Four companies view privacy protection as a means to winning customer trust InstrumentalOne company states that it expects to gain a reputational advantage from its privacy program †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. that have implemented the second highest number of privacy measures occupy ranks #77, #87, and #173 on the Fortune Global 500 list and ranks #49, #518, and #782 on the Forbes 2000 list, which indicates that it is not necessarily the biggest companies in the IT industries that embrace information privacy.An investigation of the relationship between the number of measures taken and length of the privacy text on the corporate website revealed a correlation of 0. 77. This suggests that text length is an indicator of how important the issue is to a company. At the same time, it also shows that the companies generally do not talk at length about privacy without having taken relevant measures. One category of measures pertains to the companies’ internal affairs. They address processes, employee conduct, and, to a small extent, suppliers.The measures mentioned most frequently are the 94 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. Business Ethics: A European Review Volume 20 Number 1 January 2011 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Table 2: The content of corporate privacy programs Internal Physical protection of data Procedural/administrative protection of data Electronic/technical protection of data Privacy policy Privacy is part of the code of conduct Privacy of? e(r) Privacy board/working group Employee training Disciplinary action for employee misconduct Privacy newsletter for employees Employee monitoring Privacy included in employment contract Onl ine resources for employees Ethics hotline for privacy questions Internal privacy campaign Limited employee access to data Online reporting of privacy incidents Regular review of systems and processes Regular review of privacy policy Binding third parties to privacy agreements Reviewing third-party privacy practices Privacy newsletter for customers Guidance/information for consumers Resources for parental control & child safety Privacy e-mail address Integrating privacy into product development Privacy blog Involving stakeholders in design of privacy policy Supporting IS education at schools and universities Publishing privacy research papers Supporting law making Supporting industry self-regulation Working with industry Working with governments Working with NGOs, think tanks Political action committee (PAC) Compliance with laws Exceeding laws Compliance with Safe Harbor Compliance with GRI Privacy seal 6 2 3 15 8 7 3 9 1 1 1 1 1 1 1 3 1 5 3 5 2 1 10 5 2 8 1 1 1 1 2 1 5 6 10 1 11 1 4 1 4 79 External 30 Collaborations 25 Compliance 21 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. existence of a privacy policy and privacy training, privacy being part of the code of conduct, privacy of? cers, physical data protection, and regular review of systems and processes. All other measures taken internally were taken by one, two, or three companies each, for example measures encouraging employees to report privacy violations and to comply with relevant guidelines. Two different measures pertaining to suppliers or other third parties were identi? ed, namely that the company reviews privacy practices of those partners and that these outsiders are bound to a privacy agreement.The second category of measures contains those directed towards external stakeholders. They include r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 95 Business Ethics: A European Review Volume 20 Number 1 January 2011 primarily guidance for consumers regarding Internet privacy. Five companies take measures that address parents’ concerns about their children’s privacy. In addition to providing information, companies also solicit consumer feedback on privacy matters. Two companies highlight that they have an e-mail address to which people can send privacy concerns and inquiries, and one company involves stakeholders in the design of its privacy policy.The inclusion of privacy considerations in product development was embraced by eight companies. Another group of measures pertain to the participation in industry initiatives and collaborations. Ten companies mention a variety of privacy forums, centers, associations, think tanks, and institutes in which they are involved, in cluding for example, the Electronic Privacy Group, the European Privacy Of? cers Forum, or the Liberty Alliance. Some of them also state that they cooperate with other companies and governments. However, the nature of this cooperation remains unclear, and in some places, the cooperating institutions are not even mentioned.Ultimately, a few US companies express their views on privacy legislation. As part of the measures they have taken, three companies take an active stance for either privacy legislation or self-regulation. Both of these viewpoints are visions at this point, as there is neither privacy legislation nor a functioning model of self-regulation in the United States. The two viewpoints are as follows: ‘We also believe that governments must ? nd improved ways to enforce laws against data breach, misuse and fraud, and help consumers pursue those who mishandle their personal information. . . . HP was one of the ? rst companies to embrace the idea of a comprehensive U. S . privacy law. ‘Because disparate and multiple privacy rules place a heavy burden on global companies, we support a model of industry self-regulation (as opposed to government intervention) in which innovative tools give consumers greater choice in both protecting their personal data and understanding how it may be collected and used. ’ they comply with all relevant privacy laws. As compliance with laws is a legal rather than an ethical responsibility according to Carroll’s (1979) classi? cation of corporate responsibilities, only going beyond the law can qualify as a CSR initiative. Dressing up a legal responsibility as an ethical responsibility casts doubt over the sincerity of these efforts.In fact, one of these 11 companies has implemented no other privacy measure apart from legal compliance. There is only one company that vows to exceed legal requirements: ‘HP is pioneering an approach to the protection and responsible use of personal information. This effort goes beyond compliance with the law. ’ Only a minority of companies have adopted the privacy standards of outside organizations, such as GRI or privacy seal programs. Stakeholder relationships The measures identi? ed above relate to a number of internal and external stakeholder groups, including employees, consumers, parents, industry, suppliers, governments, advocacy groups, and the community at large.However, the analysis of the measures does not reveal anything about the relationships with stakeholders, and in some cases, the stakeholder group to which a particular measure was addressed was not even mentioned. This section therefore focuses speci? cally on the stakeholder groups to which the companies express some form of consideration. This could be in the form of protection measures, information provision, cooperation, or merely by expressing an awareness of their stakes in privacy. In addition to an account of these overt commitments to stakeholders, a discourse analysis is used to uncover discursively constructed relationships with stakeholders. Table 3 lists the various stakeholder groups identi? d, together with their stake in privacy, the number of companies that made a commitment toward each stakeholder group, and an example of such a commitment. This table is different from the results presented in Table 2 in that it was not concrete actions that guided this analysis, but the awareness of stakeholder concerns. We ? nd that companies recognize primarily the stakes of their customers and employees, who exercise a direct and economic in? uence on the company and can therefore be labeled Even companies that do not take a stance on the legislation vs. self-regulation debate emphasize compliance with legislation. Eleven companies state that 96 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. Business Ethics: A European Review Volume 20 Number 1 January 2011 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Table 3: Addressing stakeholder concerns Stakeholder GroupStake # Primary Customers/ Protection of 25 Users their data Employees Suppliers/ Vendors Training Guidelines 14 6 Example ‘In order to help our customers address these issues, we have begun to develop guidance documents to help customers understand which parts of our technology may have privacy applications. ‘We work hard to ensure that Sun employees have the information they need to apply our privacy protection standards in their work. ’ ‘When it is necessary for business reasons to share a person’s information with third parties such as network service providers and marketing campaign partners, we work together to ensure that we main tain the highest privacy standards. ’ ‘We met with government of? cials and regulators in all regions to understand their concerns and initiatives and to help them fully appreciate the potential implications for privacy of new technologies. ’ ‘We are working with other industry participants . . . to develop solutions that help us reach both of these objectives. ‘In 2007, we formed our Stakeholder Advisory Council (SAC) comprising respected experts from a variety of nongovernmental organizations. ’ ‘Symantec is committed to helping parents keep their kids cybersafe. We believe that in the same way that we educate our children about the risks of drugs, smoking, or violence, it is critical that we educate them about the importance of safe computing. ’ ‘We tap this internal resource to offer programs that bene? t our local schools and communities. We are also in the process of implementing an employee-led education program. †™ Secondary Government Industry Advocacy groups Parents Compliance with laws; expertise in data handling Cooperation Cooperation 6 6 3 Protection of 5 their children’s data Expertise 1 Schools/ communities †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ‘primary stakeholders’ according to Ansoff (1965). However, there are also companies that talk about privacy in a CSR context, but do not voice a commitment to these two primary stakeholder groups. Of the 30 companies, ? ve do not state that they do anything to improve the privacy situation of their customers and 16 do not make such a commitment toward their employees. Suppliers, who are also primary stakeholders, are addressed to a smaller extent. We can also see that the companies in the sample largely neglect their secondary stakeholders, i. e. those groups who do not directly in? uence a company’s core business (Ansoff 1965).Only a maximum of six companies interact with each secondary stakeholder group, such as parents or governments. On the surface, all companies studied engage in a discourse characterized by care and concern for privacy. In particular, emotion-laden words like help, understand, respect, concern, and safe abound across all texts studied. For example: ‘Protecting our customers’ privacy is a priority. We understand and respect your desire to protect your personal information. ’ ‘And as the 24 A 7 demands of the Internet Age threaten to overwhelm customers with complexity, they need trusted and reliable companies to help them make sense of technology and put it to use to make their lives better. ’The tone becomes even more concerned when companies address their relationship with parents and children: ‘We understand the responsibility and concern of parents who worry about their children’s exposure to inappropriate content and potentially dangerous interactions on the Web. ’ ‘Protecting our children . . . We believe that in the same way that we educate our children about the risks of drugs, smoking, or violence, it is critical r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 97 Business Ethics: A European Review Volume 20 Number 1 January 2011 that we educate them about the importance of safe computing. ’ In the second example, the pronoun ‘we/our’ adds to the concerned tone by promoting a sense of collegiality and shared affection.The same is also achieved in other places, when companies use this inclusive form of ‘we’ to reduce the distance between themselves and their outside stakeholders: ‘Our individual sensitivities about how our information is tr eated . . . are not uniform’ or ‘Sun is committed to investigating and addressing the privacy challenges . . . associated with our increasingly digital way of life. ’ In such statements, companies reduce the power distance between themselves and their stakeholders. The inclusive ‘we’ is also an indicator of positive politeness (Brown & Levinson 1987), indicating how writers conceptualize their audiences and what kind of distance writers create between themselves and their audience.While some companies use the inclusive ‘we,’ others talk about companies in general, e. g. ‘all businesses are responsible for . . . ,’ which includes themselves only implicitly and distances themselves from these events. Mostly, though, companies make themselves the causal agents: ‘we must address these concerns by helping to protect . . .. ’ Notably, one company draws its audiences into the discourse by always addressing them directl y, e. g. ‘We understand and respect your desire to protect . . .. ’ All together, the different voices present in these texts suggest that companies have different levels of self-awareness and different understandings of their role in this process.Less variety exists in the distance to the audience, which is – apart from one exception – not explicitly present in the discourse. This suggests that companies do not consider their CSR activities to be dialogic in nature. Another kind of discourse is found in 10 of the companies’ texts studied. This discourse reveals that some companies are actually interested in ? nding a balance between users’ privacy interests and their own business interests rather than protecting privacy unconditionally. They seek to achieve a balance between customers’ privacy interests and ‘business priorities,’ ‘business requirements,’ ‘business needs,’ their ‘values,â₠¬â„¢ or their ‘ability . . . to reap the bene? ts of online interactions. Business interests are also communicated implicitly: ‘our goal is simple: to balance the interests and concerns of our customers’ private information with their interest in receiving quality service and information about useful new products. ’ Alternatively, one company mentions only one weight of the balance, without saying what the other weight is: ‘that we are striking the right balance for our customers’ and ‘to reach balanced results. ’ The discourse of balance is a manifestation of the companies’ power, given that it is they who decide when this balance is reached. Interestingly, this kind of discourse has nothing to do with the motivations they express.Two companies, for example, have voiced moral motives, but also engage in this discourse of balance, as does the one company that has indicated an instrumental motive. It is also worth noting that not a single European company in the sample engages in this discourse of balance. Discussion The literature review has highlighted that users are concerned about privacy and that companies do not respond in a manner that eases stakeholder concerns. The companies chosen for this study are all active in the hardware, software, or telecommunications industries, in which data play a crucial role. Thus, information privacy, and in particular online privacy, is a central issue in their business conduct.The content analysis has revealed that only a small proportion of the largest IT companies comprehensively address privacy as a social responsibility. In the sample, we ? nd both companies that have taken a number of relevant actions to address user privacy and companies that have only taken one or two concrete measures, but nevertheless present privacy as part of their CSR program. A substantial proportion of the measures they have taken fall into the area of compliance and employee condu ct (e. g. guidelines, policies, monitoring, and reporting), while measures that stimulate a stakeholder dialogue or represent corporate social innovation are found less frequently.Further, some companies reveal that they seek to strike a balance between their own business interests and their stakeholders’ privacy needs. The sample even contains companies that 98 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. Business Ethics: A European Review Volume 20 Number 1 January 2011 voice moral motives for framing online privacy as a CSR, while at the same time indicating that they are interested in striking a balance between users’ privacy interests and their own business interests. We have also seen that some of the privacy measures are actually intended to ful? ll legal responsibilities rather than ethical ones.Thus, some companies in the sample voice concerns and a commitment to help, but do not take privacy to the level of an ethical responsibility (cf. Carroll 1991). At the same time, companies load their privacy discourse with emotive terms suggesting concern, commitment, and a desire to help. While this kind of language is typical of CSR messages and can almost be expected (cf. Pollach 2003), it is still in contrast to the results of the content analysis, which has shown that comprehensive privacy programs are for the most part non-existent. The ? ndings also indicate that companies have chosen a wide variety of approaches to information privacy. In fact, many of the different measures denti? ed were taken by one, two, or three companies only. Thus, little mimicry and no institutionalized practices have emerged yet. In uncertain environments, companies have a tendency to model themselves after other companies that are more successful or more respected. This mimicry leads to institutionalized practices that help companies to obtain legitimacy (DiMaggio & Powell 1983). The environment in which the sample compan ies operate can be characterized as uncertain, as there is no comprehensive privacy legislation as yet and privacy is, to some extent, at each company’s discretion. For mimicry behavior to occur, it must be clear to the ? m that adopting a certain practice brings competitive advantages (DiMaggio & Powell 1983). In the case of privacy, an institutionalization of voluntary privacy practices could mean that privacy regulation is preempted. However, as not every company in the sample, and maybe in the industry as a whole, is pro self-regulation, some companies may decide not to adopt privacy practices voluntarily, despite the fact that they care about user privacy. Privacy may be on its way to mature from the ethics/compliance focus to a more responsive, proactive focus, but at the moment, it plays a minor role as a CSR. This point is also re? ected in the ? nding that companies address primarily consumer oncerns and step up employee training, while all other stakeholder groups i n privacy play a subordinate role. Companies may not have recognized the bene? ts to be gained from engaging with secondary stakeholder groups, e. g. from cooperating with industry partners. At the same time, companies may have been too occupied with implementing privacy standards internally, so that their privacy efforts do not involve secondary stakeholders as yet. These internal compliance measures are clearly the sine qua non for a company’s external privacy activities, such as participation in industry initiatives. This study is not without limitations. One clear limitation is that the data stem from corporate selfreports, which are problematic (cf.Podsakoff & Organ 1986) in that they are based on what the company reveals rather than what is actually true. This could mean that companies overstate their activities. At the same time, companies may not have mentioned the particular measures they have taken, because they did not consider them important enough. Also, the samp le size could have been larger, but the small sample size also serves to illustrate that privacy is just about to begin to play a role in CSR programs of technology-oriented companies. APPENDIX A: COMPANIES Adobe Agilent ATT Belgacom British Telecom Cisco Computer Associates Dell Deutsche Telekom Electronic Data Systems France Telecom HP IBM Microsoft Motorola Nokia Oracle IN THE SAMPLE 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 99 Business Ethics: A European Review Volume 20 Number 1 January 2011 Portugal Telekom Royal KPN Sabre Sprint Sun Symantec Telefonica Telekom Austria Telia Sonera Verizon Virgin Vodafone Xerox References Aguilera, R. V. , Rupp, D. , Williams, C. A. and Ganapathi, J. 2007. ‘Putting the S back in CSR: a multilevel theory of social change in organizations’. Academy of Management Review, 32:3, 836–863. Ansoff, I. 1965. Corporate Strategy. New York, NY: McGraw-Hill. Awazu, Y. and Desouza, K. C. 2004. â €˜The knowledge chiefs: CKOs, CLOs and CPOs’. European Management Journal, 22:3, 339–344. Basu, K. and Palazzo, G. 2008. Corporate social responsibility: a process model of sensemaking’. Academy of Management Review, 33:1, 122–136. Baumer, D. L. , Earp, J. B. and Poindexter, J. C. 2004. ‘Internet privacy law: a comparison between the United States and the European Union’. Computers and Security, 23:5, 400–412. Bowie, N. and Jamal, K. 2006. ‘Privacy rights on the internet: self-regulation or government regulation? ’. Business Ethics Quarterly, 16:3, 323–342. Brown, P. and Levinson, S. C. 1987. Politeness. Cambridge: Cambridge University Press. Burke, L. and Logsdon, J. M. 1996. ‘How corporate social responsibility pays off’. Long Range Planning, 29:4, 495–502. Carroll, A. B. 1979. A three-dimensional conceptual model of corporate performance’. Academy of Management Review, 4:4, 497â€⠀œ505. Carroll, A. B. 1991. ‘The pyramid of corporate social responsibility: toward the moral management of organizational stakeholders’. Business Horizons, 34:4, 39–48. Carroll, A. B. 1998. ‘The four faces of corporate citizenship’. Business and Society Review, 100:1, 1–7. Caudill, E. M. and Murphy, P. E. 2000. ‘Consumer online privacy: legal and ethical issues’. Journal of Public Policy and Marketing, 19:1, 7–19. Chaudhri, V. A. 2006. ‘Organising global CSR: a case study of Hewlett-Packard’s e-inclusion initiative’. Journal of Corporate Citizenship, 23, 39–51. Ciocchetti, C. A. 2007. E-commerce and information privacy: privacy policies as personal information protectors’. American Business Law Journal, 44:1, 55–126. Culnan, M. J. and Armstrong, P. K. 1999. ‘Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation’. Organizatio n Science, 10:1, 104–115. De George, R. T. 2000. ‘Business ethics and the challenge of the information age’. Business Ethics Quarterly, 10:1, 63–72. DiMaggio, P. J. and Powell, W. W. 1983. ‘The iron cage revisited: the institutional isomorphism and collective rationality in organizational ? elds’. American Sociological Review, 48:2, 147–160. Fairclough, N. 2005. Critical discourse analysis, organizational discourse, and organizational change’. Organization Studies, 26:6, 915–939. Fernback, J. and Papacharissi, Z. 2007. ‘Online privacy as legal safeguard: the relationship among consumer, online portal, and privacy policies’. New Media and Society, 9:5, 715–734. Foxman, E. R. and Kilcoyne, P. 1993. ‘Information technology, marketing practice, and consumer privacy: ethical issues’. Journal of Public Policy and Marketing, 12:1, 106–119. Fukukawa, K. and Moon, J. 2004. ‘A Japanese m odel of corporate social responsibility? A study of website reporting’. Journal of Corporate Citizenship, 16, 45–59. Han, P. and Maclaurin, A. 2002. Do consumers really care about online privacy? ’. Marketing Management, 11:1, 35–38. Herring, S. C. 2004. ‘Computer-mediated discourse analysis: an approach to researching online behavior’. In Barab, S. A. , Kling, R. and Gray, J. H. (Eds. ), Designing For Virtual Communities in the Service of Learning: 338–376. New York, NY: Cambridge University Press. Introna, L. D. and Pouloudi, A. 1999. ‘Privacy in the information age: stakeholders, interests and values’. Journal of Business Ethics, 22:1, 27–38. 100 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. Business Ethics: A European Review Volume 20 Number 1 January 2011 Jick, T. D. 1979. Mixing qualitative and quantitative methods: triangulation in action’. Administrative Science Quarterly, 24, 602–611. Johnson, D. 2006. ‘Corporate excellence, ethics, and the role of IT’. Business and Society Review, 111:4, 457–475. Jones, T. M. 1995. ‘Instrumental stakeholder theory: a synthesis of ethics and economics’. Academy of Management Review, 20:2, 404–437. Kayworth, T. , Brocato, L. and Whitten, D. 2005. ‘What is a chief privacy of? cer? ’. Communications of AIS, 16, 110–126. Kelle, U. and Laurie, H. 1995. ‘Computer use in qualitative research and issues of validity’. In Kelle, U. (Ed. ), Computer-Aided Qualitative Data Analysis. Theory, Methods and Practice: 19–28. London: Sage. Kelly, E. P. nd Rowland, H. C. 2000. ‘Ethical and online privacy issues in electronic commerce’. Business Horizons, 43:3, 3–12. Kolbe, R. H. and Burnett, M. S. 1991. ‘Contentanalysis research: an examination of applications with directives for improving research reliability and objectivity’. Journal of Consumer Research, 18:2, 243–250. Krippendorff, K. 1980. Content Analysis: An Introduction to its Methodology. Beverly Hills, CA: Sage. Lieberman, M. B. and Montgomery, D. B. 1998. ‘Firstmover (dis)advantages: retrospective and link with the resource-based view’. Strategic Management Journal, 19:12, 1111–1125. Markoff, J. , Shapiro, G. and Weitman, S. R. 1974. Toward the integration of content analysis and general methodology’. In D. Heise (Ed. ), Sociological Methodology: 1–58. San Francisco, CA: Jossey-Bass. Milne, G. R. and Culnan, M. J. 2004. ‘Strategies for reducing online privacy risks: why consumers read (or don’t read) online privacy notices’. Journal of Interactive Marketing, 18:3, 15–29. Mintzberg, H. 1983. ‘The case for corporate social responsibility’. Journal of Business Strategy, 4:2, 3–15. Neate, R. 2009. ‘Deutsche Bank admits possible privacy breaches. ’ The Telegraph, July 23. Neuendorf, K. A. 2002. The Content Analysis Guidebook. Thousand Oaks, CA: Sage. Norberg, P. A. and Horne, D. R. 2007. ‘Privacy attitudes and privacy-related behavior’.Psychology and Marketing, 24:10, 829–847. Norberg, P. A. , Horne, D. R. and Horne, D. A. 2007. ‘The privacy paradox: personal information disclosure intentions versus behaviors’. Journal of Consumer Affairs, 41:1, 100–126. O’Brien, K. J. 2008. ‘Privacy laws trip up Google’s expansion in parts of Europe. ’ New York Times, November 18. Payne, D. and Trumbach, C. C. 2009. ‘Data mining: proprietary rights, people and proposals’. Business Ethics: A European Review, 18:3, 241–252. Phelps, J. , Nowak, G. and Ferrell, E. 2000. ‘Privacy concerns and consumer willingness to provide personal information’. Journal of Public Policy and Marketing, 19:1, 27–41. Podsakoff, P.M. and Orga n, D. W. 1986. ‘Self-reports in organizational research: problems and prospects’. Journal of Management, 12:4, 531–544. Pollach, I. 2003. Communicating Corporate Ethics on the World Wide Web: A Discourse Analysis of Selected Company Websites. Frankfurt: Peter Lang. Pollach, I. 2005. ‘A typology of communicative strategies in online privacy policies: ethics, power and informed consent’. Journal of Business Ethics, 62:3, 221–235. Post, J. E. 2000. ‘Moving from geographic to virtual communities: global corporate citizenship in a dot. com world’. Business and Society Review, 105:1, 27–46. Rifon, N. J. , LaRose, R. and Choi, S. M. 2005. Your privacy is sealed: effects of web privacy seals on trust and personal disclosures’. Journal of Consumer Affairs, 39:2, 339–362. Sama, L. M. and Shoaf, V. 2002. ‘Ethics on the web: applying moral decision making to the web’. Journal of Business Ethics, 36:1–2 , 93–103. Shapiro, B. and Baker, C. R. 2001. ‘Information technology and the social construction of information privacy’. Journal of Accounting and Public Policy, 20:4, 295–322. Sharfman, M. P. , Pinkston, T. S. and Sigerstad, T. D. 2000. ‘The effects of managerial values on social issues evaluation: an empirical examination’. Business and Society, 39:2, 144–182. Sheehan, K. B. 2002. ‘Toward a typology of internet users and online privacy concerns’.The Information Society, 18:1, 21–32. Smith, A. D. and Rupp, W. T. 2004. ‘Online privacy policies and diffusion theory perspectives: security or chaos? ’. Services Marketing Quarterly, 25:3, 53–75. r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 101 Business Ethics: A European Review Volume 20 Number 1 January 2011 Snider, J. , Hill, R. P. and Martin, D. 2003. ‘Corporate social responsibility in the 21st centu ry: a view from the world’s most successful ? rms’. Journal of Business Ethics, 48:2, 175–187. Spinello, R. A. 1998. ‘Privacy rights in the information economy’. Business Ethics Quarterly, 8:4, 723–742. Strauss, A. L. nd Corbin, J. 1990. Basics of Qualitative Research: Grounded Theory Procedures and Techniques. Newbury Park, CA: Sage. Tetrault Sirsly, C. A. and Lamertz, K. 2008. ‘When does a corporate social responsibility initiative provide a ? rst-mover advantage? ’. Business and Society, 47:3, 343–369. Trauth, E. M. and Jessup, L. M. 2000. ‘Understanding computer-mediated discussions: positivist and interpretive analyses of group support system use’. MIS Quarterly, 24:1, 43–79. van Dijk, T. A. 1985. ‘Levels and dimensions of discourse analysis’. In van Dijk, T. A. Handbook of Discourse Analysis, Vol. 2: 1–12. London: Academic Press. van Dijk, T. A. 1997a. Discourse as interaction in society’. In van Dijk, T. A. Discourse as Social Interaction: 1–37. London: Sage. van Dijk, T. A. 1997b. ‘The study of discourse’. In van Dijk, T. A. Discourse as Structure and Process, Vol. 1: 1–34. London: Sage. Weber, R. P. 1985. Basic Content Analysis. Beverly Hills, CA: Sage. Westin, A. F. 1967. Privacy and Freedom. New York, NT: Atheneum. Wray, R. 2009. ‘T-Mobile con? rms biggest phone customer data breach. ’ The Guardian, November 17. Zonghao, B. 2001. ‘An ethical discussion on the network economy’. Business Ethics: A European Review, 10:1, 108–112. 102 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell

Friday, January 10, 2020

Heart Dissection Practical Report Essay

Introduction On the of July 2002, a sheep’s heart was examined by dissection. The heart is a muscle in all mammalian bodies that is used to pump blood and nutrients throughout the body. A sheep’s heart was used in this prac because like the human heart it has four chambers and is similar in size. Two of these chambers are receiving chambers called the left and right atrium. The other two are pumping chambers called the right and left ventricle. The reliability of the cycle of blood through the body depends on the sequence of contractions from the atrium and the ventricle. When ever the atriums contract it is called the systolic phase. And when ever the ventricles contract, it is called the diastolic phase. These sequences ensure the blood flow through the heart. These occur one after the other to create a heart beat. The blood flow through the heart starts when the right atrium takes the blood that flows through the superior or inferior vena cava. The right atrium then fills with blood and the pressure of the blood causes the tricuspid valve to open. The blood then travels through into the right ventricle where it pusses the blood into the pulmonary arteries. After this the blood is pumped into the lungs where it is oxygenated, the oxygenated blood travels through the left ventricle then pushes the blood through the aorta, which provides the body with blood. Aims The aims and goals of this procedure was to: 1.Dissect and examine a mammalian heart 2.Develop dissection skills 3.An in-depth investigation into how the heart works. Materials Materials used in this dissection were: 1.Sheep’s heart 2.Scalpel 3.Rubber gloves 4.Dissection tray 5.Paper Procedure The first step in the dissection is to put on the rubber gloves before handling the raw hearts. Next was to place the sheep heart on the dissection tray. After that an exterior examination happened to detect the mail valves. Next was to locate a fatty area on the heart to help guide the first incision into the heart. Two incisions were required during the procedure. The first one was to be parallel to the right ventricle. The incision must be deep enough to cut into the ventricle to be able to get a proper view. The second was opposite the first to examine the other side of the heart, to be able to view the chordae tendinae. After the dissection is completed, the heart must be properly disposed along with the gloves and hands must be washed. Results diagram of heart valve system Discussion During the dissection of the sheep heart, features of the muscle were detected. One of these was that the left ventricle wall was thicker then the right ventricles. This is because it uses this extra muscle to propel the blood through the aorta to the rest of the body. Also some stringy substances holding a kind of flap was found, this was soon made clear that it was the chordae tendinae. It is attached to the bicuspid valve and capillary muscle and had a remarkable strength because it had to work hard in a high-pressure area and hold the heart tougher. Also in this region, the heart wall was wetter and slipperier then the rest of the heart. This was for extra lubrication. The flow of blood was made clearer when the heart was opened up. Diagram of path of blood flow through the heart. The direction of blood flow through the heart starts from superior or inferior vena cava to the right atrium. Then it passes through the tricuspid valve into the right ventricle to the pulmonary arteries. The blood then goes to the lungs where it is oxygenated comes back down to the pulmonary veins to the left atrium, then passes through the bicuspid valve into the left ventricle where it is propelled through the aorta into the body.

Thursday, January 2, 2020

Sexual Identity Development - 1056 Words

D’Augelli’s Model of Lesbian, Gay and Bisexual Development There are several theorists that have presented models on sexual identity development. Many of the models have stages of sexual identity development suggesting that certain characteristics are present during a specific period. However, Anthony D’Augelli presents a model that suggests processes rather than stages. These processes take place over the span of one’s life and not necessarily in any specific order or fashion. D’Augelli’s (1994a) life span model of lesbian, gay and bisexual (LGB) identity development takes into account â€Å"the complex factors that influence the development of people in context over historical time† (Evans et al, 2010). According to D’Augelli’s (1994)†¦show more content†¦Ã¢â‚¬Å"The exiting heterosexual identity process requires a realization that one’s feelings and attractions are not heterosexual as well as informing others that one is lesbian, gay or bisexual. Developing a personal LGB id entity status involves determining for oneself the unique meaning being gay lesbian or bisexual will have in one’s life. Developing an LGB social identity consists of creating a support network of people who know and accept one’s sexual orientation. Becoming an LGB offspring involves disclosing one’s identity to parents and redefining one’s relationship after such disclosure. Developing an LGB intimacy status is the process of establishing an intimate relationship. When individuals enter an LGB community they make varying degrees of commitment to social and political action† (Evans et al, 2010). It’s important to note that individuals can experience any of these phases at any given time during one’s life. A number of researchers have documented many different patterns of LGBShow MoreRelatedThe Importance Of Sexual Identity Development1243 Words   |  5 Pages The sexual orientation identity development is a theoretical model that conceptualized the resolution of internal conflict related to the formation of individual sexual identity. For sexual minority people, it is commonly known as the coming-out process (Bilodeau Renn 2005). There have been many different models elaborated to explain such process. All of them share similar stages: awareness, crisis, and acceptance (Loiacano 1989). When individuals become aware of their queer feelings and attractionRead MoreSexual Identity And Adolescent Development Essay1464 Words   |  6 PagesAcquiring a sexual identity is very important and critical to the development of adolescents. While neither sexual or gender identity has anything to do with an individuals’ physical anatomy itself, both have separate, individual meanings. According to genderspectrum.org, gender identity is a reflection and realization of â€Å"one’s internal sense of self as male, female, both or neither†. On the other hand, in regards to sexual identity and adolescents, this involves figuring out whom they find themselvesRead MoreSexual Orientation Identity And Its Influence On Student Development1376 Words   |  6 Pagesremain aware of how students and their identities are evolving. Higher education is constantly evolving, which is why it is extremely important to take sexual orientation identity and its influence on student development into account. In this paper, I will explore Fassinger’s (1998) sexual orientation identity model and provide an analysis of the theory. I will also share my findings from three interviews with students who are in different stages of sexual identity formation. Finally, I will addressRead MoreEssay on Impact the Development of Sexual and Gender Identity2122 Words   |  9 PagesImpact the Development of Sexual and Gender Identity Introduction It is hard for me to pinpoint the beginning of my sexual awareness. Throughout my rearing, questions about sex were never brought to my parents. However, my parents, family, media, social/educational, past relationships and religious upbringing had an impacted on the development of my sexual and gender identity. Looking back over my life, I realize my initial ideas and influences about my sexual and gender identity developedRead MoreSexual Identity And Development : The Lesbian, Gay, Bisexual, And Transgender1542 Words   |  7 PagesSexual Identity Development The lesbian, gay, bisexual, and transgender (LGBT) community has never received as much attention as they are right now. Much of this attention is stemming from this population struggling to obtain the same rights given to the remainder of the population. The LGBT community faces many challenges in their personal system, social environment, and then in the public system. In working with the LGBT population, the social worker needs to examine how the individual viewsRead MoreHormones And Levels Of These Hormones1583 Words   |  7 Pagesinfluences our sexual orientation. To bolster these findings Bailey et al. (2000) cite researchers who have explored regions of the brain that are sexually dimorphic (areas that are notably different in men and women). Bailey et al. (2000) cites that in 1976 Dorner identified two brain regions in rats that he implicated in sexual behavior for rats. In males he credited the medial pre-optic anterior hypothalamus (mPOA) and in female rats the area he be lieved to be responsible for normal sexual behaviorRead MorePerceptions And Understanding Of Self And Others, By Laura Wade And Crouch, Touch, Pause,2808 Words   |  12 Pageson some level or another, all of us answer, either discursively or through day- to-day† (Giddens, 1991, p.80). Identity is a powerful umbrella radiating through the ever more challenging, fast paced living, and diversification of the present contemporary world, under which humanity ‘categorises’ individuals. More specifically, the current state of personal, political and social identity as depicted through recent plays such as ‘Posh’ by Laura Wade and ‘Crouch, Touch, Pause, Engage’ by Robin SoanRead MoreThe Concept Of Sexual Orientation1293 Words   |  6 Pagesconcept of sexual orientation, especially as it is studied and presented in large, population-based and school-based adolescent survey literature. Specifically, the study examined methodology and instrumen tation used for the assessment and measurement of youth sexual orientation present in refereed literature. Of the forty-eight empirical studies, five included items that assessed all three dimensions of sexual orientation. The majority of studies used surveys that exclusively assessed sexual orientationRead MoreGay, Straight, And The Reason About Sexual Orientation1236 Words   |  5 Pagesvariations of human sexual orientation. More same-sex couples have fostered children than ever before in our nation s history. Institutions such as military and professional sports have (slowly but surely) began to accept openly gay members. Most importantly, a recent amendment to the Marriage Act of 1961 now defines marriage as a union of two people; an amendment which removed the prohibition of same-sex marriages. These landmarks in the progression of social awareness surrounding sexual orientationRead MoreThe Role Of Self Identity For Adolescents939 Words   |  4 Pagesclassified as one of the most challenging and significant stage during life transition. In this phrase, the individuals not only developing physical and sexual maturation but also experiencing the development of identity and transitions into social and economic independence (WHO, 2014). This essay will discuss the different concept of self-identity for adolescents, the important predictable and unpredictable elements during the transition, as well as the nurses’ role in relation to adolescence care