• Aucun résultat trouvé

Slander = Whistle Blowing by Meddra 2k

Dans le document The Environments of the Organization (Page 136-148)

Case Studies in Property and Free Speech

4.2 Biomatrix Case Exercises - Student Module 8

4.2.4 Slander = Whistle Blowing by Meddra 2k

The following is a BXM posting on Yahoo's Finance Bulletin Board. It was posted 4/11/00 and accessed 8/10/2000.

• BMX Police as Whistle-Blowers. The Biomatrix Police presented themselves as social crusaders out to prevent Biomatrix from harming innocent investors. They claimed that Biomatrix would try to undermine their claims by accusing them of slander whereas in truth they (the BMX Police) were altruistically motivated individuals blowing the whistle on internal corporate wrongdoing. In the following, meddra_2k argues that what Biomatrix ocials call slander is really whistle-blowing, i.e., the public revelation of true information designed to avoid a public harm:

• SLANDER = WHISTLE BLOWING

• By meddra_2k

• It all depends which side of the fence you're on. The pusher sees the negative information, factual as it may be, as slander because they feel that anything that might make stock go down is inherently wrong. Thus, they call it slander. The BMX Police know that the TRUTH, as unpleasant as it may be, is NEVER wrong. Indeed, it is our CIVIC DUTY to expose the TRUTH about Biomatrix, its products, and its stock. Thus, we call it whistle blowing.

131

• The readers of this board are free to evaluate both sides, and their motives for posting, and decide what they wish to do. Some will learn that this is a SCAM company peddling a SCAM product and run for the door.

• Others may not mind that it's a SCAM company peddling a SCAM product as long as the stock price goes up. Certainly, there are enough unethical people out there that won't mind investing in a SCAM that hurts people as long as they prot from it.

• This message board is FILLED with such people. Fortunately, it also has a few do-gooders that help balance the EVIL that men do.

4.2.5 What you need to know . . .

4.2.5.1 What you need to know about socio-technical systems

1. STS have seven broad components: hardware, software, physical surroundings, peo-ple/groups/roles, procedures, laws, and data/data structures.

2. Socio-technical systems embody values

• These include moral values like safety, privacy, property, free speech, equity and access, and security.

Non-moral values can also be realized in and through Socio Technical Systems such as eciency, cost-eectiveness, control, sustainability, reliability, and stability.

• Moral values present in Socio Technical Systems can conict with other embedded moral values; for example, privacy often conicts with free speech. Non-moral values can conict with moral values;

developing a safe system requires time and money. And, non-moral values can conict; reliability undermines eciency and cost eectiveness. This leads to three problems that come from dierent value conicts within Socio Technical Systems and between these systems and the technologies that are being integrated into them.

• Mismatches often arise between the values embedded in technologies and the Socio Technical Sys-tems into which they are being integrated. As UNIX was integrated into the University of California Academic Computing STS (see Machado case at Computing Cases), the values of openness and trans-parency designed into UNIX clashed with the needs of students in the Academic Computing STS at UCI for privacy.

• Technologies being integrated into Socio Technical Systems can magnify, exaggerate, or exacerbate existing value mismatches in the STS. The use of P2P software combined with the ease of digital copying has magnied existing conicts concerning music and picture copyrights.

• Integrating technologies into STSs produces both immediate and remote consequences and impacts.

3. Socio-technical systems change

• These changes are bought about, in part, by the value mismatches described above. At other times, they result from competing needs and interests brought forth by dierent stakeholders. For example, bicycle designs, the conguration of typewriter keys, and the design and uses of cellular phones have changed as dierent users have adapted these technologies to their special requirements.

• These changes also exhibit what sociologists call a trajectory, that is, a path of development. Tra-jectories themselves are subject to normative analysis. For example, some STSs and the technologies integrated into them display a line of development where the STS and the integrated technology are changed and redesigned to support certain social interests. The informating capacities of computing systems, for example, provide information which can be used to improve a manufacturing processes can or to monitor workers for enhancing management power. (See Shoshanna Zubo, The Age of the Smart Machine

• Trajectories, thus, outline the development of STSs and technologies as these are inuenced by internal and external social forces.

Available for free at Connexions <http://cnx.org/content/col11447/1.9>

132 CHAPTER 4. CASE STUDIES IN PROPERTY AND FREE SPEECH In this section, you will learn about this module's exercises. The required links above provide information on the frameworks used in each section. For example, the Socio-Technical System module provides background information on socio-technical analysis. The "Three Frameworks" module provides a further description of the ethics tests, their pitfalls, and the feasibility test. These exercises will provide step by step instructions on how to work through the decision points presented above.

For more information see Hu and Jawer below.

Decision Point One:

You are the publicist for the company Biomatrix, a manufacturer of biotechnology products including Synvisc, a promising treatment for osteoarthritis. The CEO, Endre Balazs, and Vice President, Janet Denlinger, come to you. It seems that they are quite upset. Biomatrix and its top level employees have become the victims of cyber-smear. Dozens of messages have appeared in the highly visible Yahoo Financial Bulletin Board that make the following unsubstantiated accusations:

• Synvisc (a product manufactured by Biomatrix) produces seriously harmful side eects

• Biomatrix has deceived its stockholders by suppressing negative nancial and product information

• Biomatrix and its employees have connections to the maa

• Company public releases that the merger between Biomatrix and Genzyme is friendly are false. In fact, the messages allege that the merger will never take place because of Biomatrix's terrible nancial prole

• Biomatrix CEO is under investigation by famous Nazi hunter, Simon Wiesenthal, for crimes he allegedly committed in Germany during the Second World War

• Biomatrix Vice President requires sexual favors from employees under her supervision as a condition for promotion

None of these charges is true. But Balazas and Denlinger are devastated by the personal attacks made upon them. Biomatrix also stands to lose a great deal from the negative publicity. Allegations of side eects from using Synvisc, a promising new produce patented by the company, threaten to drive the product out of the market. The recently announced friendly merger between Biomatrix and Genzyme has produced modest gains in stock prices but the cyber slanderers seem determined to drive Biomatrix stock value down.

You have been charged by Balazs and Denlinger, as publicist, with designing a rapid and eective campaign against this cyber-smear. Several issues have arisen that demand your immediate attention:

1. The identity of the cyber-slanderers is unknown. What can you do, if anything, to nd out who these individuals are?

2. One of the slanderers claims to have worked for Biomatrix in the past. He/she uses this to lend credence to the attacks made on the company and its managers. If true, is there anything that can be done to prevent future employees from resorting to slander as a way of retaliating against the company?

3. If the real identities of the individuals posting the Yahoo messages are revealed, should they be sued?

What are the advantages of defamation lawsuits if those sued do not have the nancial resources to compensate the victim for damages suered?

4. Should the cyber-slanderers be attacked? If so, how? How, in general, should corporations and their managers respond to cyber-slander? By publicly refuting the messages? By ignoring these attacks?

By ignoring them until they produce clear damage? Or by responding quickly and proactively before they produce damage?

Decision Point Two: Defending Against Defamation:

The cat is out of the bag. The BXM Police, those self-styled whistle-blowers against the corporate greed of Biomatrix, have been revealed as Richard and Raymond Costanzo and Ephraim Morris. (Richard Costanzo and Ephraim Morris were former Biomatrix employees.) These are the real world names behind the 23 pseudonyms under which 16,000 anti-Biomatrix emails were posted on the Financial Bulletin Board of Yahoo between April 1999 and August 2000. These messages accused Biomatrix managers of sexual harassment and Nazi war crimes and Biomatrix of corporate greed.

133 Biomatrix managers feel that the company has a problem if its former employees nd the motivation to behave in this manner. You are a human resource ocial in the Biomatrix and it has fallen on you to design a strategy and program to prevent a reoccurrence of this cyber-smear disaster. What should you do?

• Bring a defamatory lawsuit against the three? Would this help to recoup damages? What other benets could a successful defamation lawsuit bring? What would be the downside of such an action?

• Alter the way in which employees are let go. (In other words develop procedures for ring or laying o employees that would defuse the desire to get even.) What could be done to sever a relation with an employee in as good a fashion as possible?

• What steps could be taken to reduce the possibility of a former employee taking a short selling strategy? For example, could steps be taken to restrict the ways in which former employees use the condential information they have about the company? Could risk identication measures be taken to uncover those who could or are beneting from short selling a company's stock?

• Could Human Resources develop an eective program to counter cyber smear by eective communi-cation of true and accurate information? How can a good reputation be established that could serve as a basis for counter-acting defamation?

• In short, design a strategy for Biomatrix that could minimize the risk of future cyber-smear attacks and/or minimize the impact of these attacks. Defend your strategy in the Ethics Bowl debate.

Decision Point Three: How far does free speech go?

You work with a public service organization devoted to the defense of free speech, both o and online. For this reason you immediately noticed a newspaper story that three individuals, Richard Costanzo, Raymond Costanzo, and Ephraim Morris, were found guilty in a summary judgment of defamation. It seems they published, under 23 psuedonyms, some 16,000 messages that made negative claims against Biomatrix and its managers that they were unable to substantiate.

The claims made by these individuals in their emails were pretty strong:

• Biomatrix's most popular product, Synvisc, has produced signicant harmful side eects and the com-pany has taken wrongful measures to suppress this information. Synvisc is a manufactured substance that resembles the natural uids that lubricate knee movements. These uids disappear with age pro-ducing a condition called osteoarthritis. Synvisc has been presented as a highly promising treatment for this problem.

• They also accuse Biomatrix of covering up that fact that they are targets of potentially damaging lawsuits.

• These three individuals, who style themselves the BXM Police, also accuse the company of covering up negative, harmful information about their upcoming merger with Genzyme. The messages claim that inside information reveals that the merger will never take place.

• The BXM police also accuse Biomatrix top management of having committed war crimes and acts of sexual harassment.

During pre-trial depositions, the accused were unable to substantiate any of these claims. While the motives for posting these messages have never been made clear three stand out: revenge, short selling, and the perception that rules of defamation did not apply in cyber space. You have been asked by your organization to contact the BXM Police and propose that they appeal this decision. You and your organization think that there are strong legal and ethical arguments, based on the right to free speech, that need to be put forth in this case. Your job in this decision point is to set forth these legal and moral arguments. In other words, construct a comprehensive defense for the BXM Police.

Important Considerations

• EPIC (Electric Privacy Information Center) and the ACLU (American Civil Liberties Union) present an amici curiae (friend of the court brief) outlining their concerns about the use of John Doe lawsuits to pierce online anonymity. This brief is summarized in the Biomatrix case materials.

Available for free at Connexions <http://cnx.org/content/col11447/1.9>

134 CHAPTER 4. CASE STUDIES IN PROPERTY AND FREE SPEECH

• Perhaps the strongest case for Free Speech is made by John Stuart Mill in On Liberty. Consult this book and nd his argument in the rst chapter. The summary of this argument in the Biomatrix case materials will help. Do defamation lawsuits suppress free speech. Why does Mill think that it is wrong to suppress even completely false speech?

• Did Biomatrix and its management team suer damages as a result of the Yahoo messages? What is this damage? What evidence proves that the damage was caused by the negative speech and not something else? Who bore the burden of proof in the summary judgment against the BXM Police?

• What is the strongest argument that Biomatrix made against the speech of the BXM three? How can you and organization counter this argument?

• The strongest argument the BXM Police oer for their actions is that they are not bound by rules of veracity and defamation while operating pseudonymously online. Should we be held responsible for what we say online? In the same way that we are held responsible o line? Doesn't Yahoo's disclaimer to readers that they should not assume that what they read is true suce to exculpate those who post false speech?

• It has been suggested that the BXM Police were motivated by greed. Their speech was designed to lower the price of Biomatrix stock so they could prot from short selling it. Does this change you defense? There is also inconclusive evidence that they were not acting alone? Does this change your defense?

4.2.6 What you will do ...

In this section, you will learn about this module's exercises. The required links above provide information on the frameworks used in each section. For example, the Socio-Technical System module provides background information on socio-technical analysis. The "Three Frameworks" module provides a further description of the ethics tests, their pitfalls, and the feasibility test. These exercises will provide step by step instructions on how to work through the decision points presented above.

4.2.7 Exercise One: Problem Specication

In this exercise, you will specify the problem using socio-technical analysis. The STS section of the Biomatrix Case narrative (found at Computing Cases) provides a good starting point. In the rst table, enter the information from the Biomatrix case materials pertinent to the general components of a STS, its hardware, software, physical surroundings, people/groups/roles, procedures, laws, data. Some examples taken from the STS description at Computing Cases are provided to get you started. Then, using the second table, identify the values that are embedded in the dierent components of the STS. For example, PICS (platforms for internet content selection) embody the values of security and privacy. Finally, using the data from your socio-technical analysis, formulate a concise problem statement.

Exercise 1a:

Read the socio-technical system analysis of the Biomatrix case at http://computingcases.org. Fill in the table below with elements from this analysis that pertain to your decision point.

Socio-Technical System Table Hardware Software Physical

Surround-ings

People/Groups/RolesProcedures Laws, Codes, Regulations

Data and Data Struc-tures continued on next page

135

1. Go to http://computingcases.org and review the STS description provided for the Biomatrix case.

2. Pull out the elements of the STS description that are relevant to your decision point. List them under the appropriate STS component in the above table.

3. Think about possible ways in which these components of the Biomatrix STS interact. For example, what kinds of legal restrictions govern the way data is collected, stored, and disseminated?

4. Develop your STS table with an eye to documenting possible ethical conicts that can arise and are relevant to your decision point.

Exercise 1b

Examine the values embedded in the STS surrounding this decision point. Locate your values under the appropriate component in the Biomatrix STS. For example, according to the STS description for Biomatrix found at Computing Cases, the Yahoo software that structures the architecture of the bulletin boards embody certain values like free speech. Should this be changed given the threat of defamation? What are Yahoo responsibilities in the context of defamation?

Value Table

1. This module links to another Connexions module, Socio-Technical Systems in Professional Decision-Making. There you will nd short proles of the values listed in the above table: security, privacy, property, justice, and free speech. These proles will help you to characterize the values listed in the above table.

2. Look for value conicts or mismatches. For example, free speech in the Yahoo discussion space could conict with laws that protect against defamation. How are these laws transferred online?

3. Identify those components of the Biomatrix STS that embody or embed value. For example, list the values realized and frustrated by the software components discussed in the Biomatrix case in the STS description.

4. Look for ways in which dierent elements of the STS that embed value can interact and produce value conicts. These conicts are likely sources for problems that you should discuss in your problem statement and address in your solution.

Available for free at Connexions <http://cnx.org/content/col11447/1.9>

136 CHAPTER 4. CASE STUDIES IN PROPERTY AND FREE SPEECH Exercise 1c:

Write out the requirements (ethical and practical) for a good solution. Identify the parts of the STS that need changing. Then, develop a concise summary statement of the central problem your decision point raises. As you design solutions to this problem, you may want to revise this problem statement. Be sure to experiment with dierent ways of framing this problem.

Harris, Pritchard, and Rabins provide a useful approach to problem specication. See refer-ences below.

4.2.8 Exercise Two: Solution Generation

Generate solutions to the problem(s) you have specied in Exercise 1. This requires that...

• each member of your group develop a list of solutions,

• the group combines these individual lists into a group list, and...

• the group reduces this preliminary list to a manageable number of rened and claried solutions for testing in the next stage.

Helpful Hints for Solution Generation

1. Solution generation requires prociency in the skills of moral imagination and moral cre-ativity.

Moral imagination is the ability to open up avenues of solution by framing a problem in dierent ways.

Toysmart could be framed as a technical problem requiring problem-solving skills that integrate ethical considerations into innovative designs. Moral creativity is the ability to formulate non-obvious solutions

Toysmart could be framed as a technical problem requiring problem-solving skills that integrate ethical considerations into innovative designs. Moral creativity is the ability to formulate non-obvious solutions

Dans le document The Environments of the Organization (Page 136-148)