• Tidak ada hasil yang ditemukan

Social Responsibility in the Information Age - untag-smd.ac.id

N/A
N/A
Protected

Academic year: 2024

Membagikan "Social Responsibility in the Information Age - untag-smd.ac.id"

Copied!
283
0
0

Teks penuh

Although we have always recognized that raising awareness of social responsibility issues in the information age is essential, there has been only a sketchy review of the inherent concerns and challenges. Today some companies have even appointed chief privacy officers and their ilk to develop policies and programs to facilitate social responsibility in the information age.

Understanding Social Responsibility Issues in the

Information Age

ISSUES OF PRIVACY AND CONFIDENTIALITY

ACCESSIBILITY TO TECHNOLOGY ISSUES

PROPERTY RIGHTS AND OWNERSHIP ISSUES

Third, where an individual copies software for commercial gain, and if the software were not available for copying, the individual would purchase it. According to Weckert, the owner of the software is clearly injured in the third case.

FREEDOM OF SPEECH ISSUES

QUALITY AND RELIABILITY OF INFORMATION AND RELATED SYSTEMS

Following unethical information systems project management best practices, the baggage handling systems of Chek Lap Kok Airport in Hong Kong and Denver Airport in the US resulted in disaster. Department of Motor Vehicles systems in Nevada, California and Oregon suffered a similar fate because corners were cut and basic guidelines for software development and project management were not followed.

OVERVIEW

The authors consider various threats in the information age and identify the related ethical challenges. It is hoped that this will enable individuals, organizations and the wider community to meet diverse challenges presented in the information age.

The author argues that entering the lives of self-employed and small business people who use computers reveals that there are complex webs of interrelated factors that influence their behavior with computers. The author argues that descriptivism (including the doctrine of cultural relativism) leads to various problems and contradictions and causes adverse consequences for our well-being (and security); therefore, an alternative approach to the use of ethics in reducing security breaches is proposed.

The Societal Impact of the World Wide Web–

Key Challenges for the 21 st Century

INTRODUCTION

There is an underlying assumption in the popular belief that the Internet can be the savior for the developing countries of the world. In the first section we document the current state of information technology diffusion and connectivity, and related factors such as GDP, population density, and cultural attitudes.

INFORMATION TECHNOLOGY ACCESS

The IT market has remained concentrated within the G7 countries at approximately 88%, with the United States accounting for 46% of the market. The difference between the United States and Latin American and some Asian countries is even more striking.

Figure 1: Share of OECD member countries in world population, GDP and IT market, 1987–1994
Figure 1: Share of OECD member countries in world population, GDP and IT market, 1987–1994

The Haves and the Have-Nots

The data reveal that the digital divide—the differences in access to phones, personal computers, and the Internet across certain demographic groups—still exists and, in many cases, has widened significantly. This may have been exacerbated by the apparent lack of women in decision-making positions in industry and relevant departments.” The latest data from the Australian Bureau of.

Figure 6: Percent of US households with a telephone, computer and Internet use
Figure 6: Percent of US households with a telephone, computer and Internet use

HOW CAN THE INTERNET ADDRESS THE CHALLENGE?

Sam Pitroda, advisor to the Indian government, says: “IT is not a luxury, but vital for basic activities such as bringing food to the market, preventing drought, an important source of new jobs and prosperity.” The mystery is that sustainable development is an enormously complex process that has its roots in the construction of education and infrastructure; what then is the role of the internet in this process? The use of the systems will probably have to be heavily, if not completely, subsidized, at least initially.

SUMMARY OBSERVATIONS

THE REAL CHALLENGE?

One could argue that the development of global networks only serves to strengthen the more developed countries and support the most dominant values, leading to increased exploitation of the less developed countries and the more disadvantaged sectors of society (Castells, 2000 ). A world that anyone can enter without privilege or prejudice based on race, economic power, military power or place of birth.

ENDNOTE

May it be more humane and just than the world your governments have made before” (Barlow, 1996) will remain empty rhetoric. Retrieved on the World Wide Web: http://www.cse.unsw.edu.au/dblp/db/indices/a-tree/b/Barlow:John_.

Structural Model of Software Piracy

Even in the more conservative business space, estimates show that 25% of all installed apps in the US are pirated. Many advocates of stronger copyright and patent protection argue that property rights should be strictly enforced, arguing that piracy is an affront to hard-working inventors and essential to fostering innovation in one of the world's largest value-added industries (Schuler, 1998).

THEORY AND MODEL DEVELOPMENT

We begin by examining previous studies reporting correlations of software piracy behavior and computer use. The model that emerges integrates previous research on correlates of piracy behavior and a rational action perspective on moral behavior with several defining characteristics of software and other forms of intellectual property.

Computer Usage and Demographic Factors

Although these studies provide some insight into different motivations for piracy, a more comprehensive and plausible model of software piracy has yet to emerge. An important objective of this chapter is to develop a model that both predicts and explains incidents of software piracy.

Morality, Ethics and Reasoned Action

Here we turn to the theory of reasoned action (Fishbein & Ajzen, 1975) and two important extensions: the theory of planned behavior (Ajzen, 1985) and the theory of reasoned action as applied to moral behavior (Vallerand et al., 1992). . . A central feature in the theory of reasoned action is the individual's intention to perform a certain behavior.

Modeling Conceptual Differences in Software and Intellectual Property

We would also expect that attitudes, such as one's sense of proportional value, may have consequences in the formation of social norms. So far, we have identified likely predictors of software piracy and suggested a possible temporal order for many of the variables.

Sample

Survey Design

Procedure

RESULTS

Descriptive Statistics

Indicators of the Measurement Model

Empirical Assessment of the Measurement Model

Items marked with (R*) were reversed to coincide with the remaining items in the factor. In addition, the individual indicators of deterrence and non-exclusivity were found to be unrelated to software piracy and were not included in the structural model.

Table 1: Means, standard deviations, skewness and kurtosisof measurement model indicators
Table 1: Means, standard deviations, skewness and kurtosisof measurement model indicators

Empirical Assessment of the Structural Model

Of these five direct effects, the standardized coefficients suggest that the strongest effects come from social norms and expertise. The significant direct effect on expertise required (sc = -0.426, p

Table 3: Measurement model of software pirating perceptions (N=523; chi- chi-square=157.11; d
Table 3: Measurement model of software pirating perceptions (N=523; chi- chi-square=157.11; d

DISCUSSION

The greater this perceived difference, the more likely the individual was to report social norms in favor of software piracy. For example, software piracy is much more common in foreign countries with weak legal protection of intellectual property rights (Weisband & Goodman, 1992).

Statistical Methods

The multi-contextual character of the survey, although it remains a cross-sectional design, is significant as it provides the opportunity to empirically discern whether some of these perceptions relate only to work/personal settings or are more general in nature. Measures of skewness and kurtosis do not appear to demonstrate any dramatic departures from normality (Hayduk, 1987).

APPENDIX

As can be seen in the table, each of the coefficients is several times larger than its standard error. Furthermore, proportionality represents a dimension that affects the relative fairness of the profits and costs associated with computer software.

Empirical Assessment of the Structural Model Predicting Piracy

Furthermore, age is the only measure that significantly affects all four factors in the analysis. The only other measure that approaches this impact is opportunity, which significantly affects three of the four factors.

Component-Based Development: Issues of

Data Protection

This characteristic of component-based development has interesting ramifications in ethical terms, which are strongly related to the concept of data protection. The chapter focuses on the issues of data protection and the social considerations that arise for system development and integration when component-based development is used.

DATA PROTECTION IN THE UK

As a result, the Information Commissioner, the person responsible for promoting good information handling and encouraging related codes of practice (formerly known as the Data Protection Registrar), has published relevant guidance and advice (available at www.dataprotection.gov.uk) to further interpret and facilitate passage of the law. Regardless of the current difficulties in adapting the use of information systems to the new legislation, companies should prepare for and adopt the Personal Data Protection Act.

COMPONENT-BASED DEVELOPMENT

This means that the consumer organization will have to trust:. a) that the component does exactly what it says it does. However, given the above points, ethical data protection concerns may need to be included in these perspectives.

Figure 1: Component-based development in a business context
Figure 1: Component-based development in a business context

COMPONENT-BASED DEVELOPMENT AND DATA PROTECTION

DISCUSSION AND FUTURE TRENDS

Confidentiality, Integrity and Availability in Component- Based Development

Given the dynamics of a component's lifecycle within an organizational context, commitments and assurances must also be made that changes in a component's specification or behavior over time will not result in system-level dependency problems. This is important as it indicates that significant investment is required if confidence is to be achieved at the market level.

Future Trends

More generally, in the era of electronic commerce, there are several actions that can be taken to respond to users' uncertainty (Johnston, 1999). However, it is also important to recognize the limitations of technology when addressing safety issues as there are also organizational and social aspects to consider (Dhillon, 1997).

CONCLUSIONS

World Data Flows, Elektroniese Handel, en die Europese Privaatheidsrichtlijn, Brookings Institution Press, Washington, D.C. Komponentsagteware - Beyond Object-Oriented Programming. Red.), Special Issues in Object-Oriented Programming: Workshop Reader of the 10th European Conference on Object-Oriented Programming ECOOP’96, Linz, July, dpunkt.verlag, Heidelberg, 177-183.

Internet Privacy

Interpreting Key Issues

INTERNET PRIVACY

If an individual feels that, despite procedural fairness, the social contract in the exchange of private information is not maintained, this would clearly lead to a loss of trust and integrity of the organization. On the other hand, if an individual willingly provides private information in exchange for some social or economic benefit, but the procedure used in collecting and storing the information is not fair, it would still lead to concerns about breach of privacy, trust and integrity. of the process. .

STUDY DESIGN

The argument used in defining the means' targets was that any target that was not the most important issue clearly contributed in some way to one of the most important issues. The remaining 80 questions from the 1st phase were subjectively evaluated in order to formulate the goals of the funds.

DISCUSSION OF RESEARCH FINDINGS

While the use of personal information to further companies' causes has become a competitive necessity, the issue raised here suggests that the burden is on online companies to ensure that the confidentiality of the personal information collected is maintained. There were clearly concerns about maintaining the privacy of personal information when connected via a cable modem, from viruses to Trojan horses.

Table 2: Internet privacy means objectives
Table 2: Internet privacy means objectives

CONCLUSION

In the US, the FTC has also placed due trust in the protection of personal financial information. According to the participants in this study, spam is considered a sufficiently disturbing phenomenon that there are calls for spam to be outlawed.

Privacy and the Internet

The Case of

DoubleClick, Inc

However, since the Internet is in general use, the question arises, is accessing the Internet an act of giving up the right to privacy? What's more, the future of internet privacy is completely unknown and reveals an unwritten chapter in this nation's history.

THE CASE OF DOUBLECLICK, INC

Summary of DoubleClick Legal Actions

Judnick sought relief in an injunction to stop such conduct and destruction of all information wrongly obtained without knowledge of consent. On February 29, 2000, EPIC's complaint was joined by the Center for Democracy and Technology (CDT) which filed a statement of additional facts and grounds for relief with the FTC.

DoubleClick’s Position

In an effort to assuage public concern about the lawsuit, DoubleClick CEO Kevin O'Connor said on March 2, 2000: "We are committing today that we will not call until there is agreement between the government and industry on privacy standards are not.personally identifiable information to anonymous user activity across websites”.

Opponent’s Position

Status of the Case

Commentary on the DoubleClick Cases

This will allow consumer confidence to blossom, facilitating full participation in the Internet market.

DISCUSSION: RIGHT TO PRIVACY AND THE INTERNET

The issues highlighted below address general concerns and solutions addressed in the DoubleClick case. They are all related, however, because as the door opens wider, more and more rights escape, even if it's all in the name of free enterprise;.

Technological Issues

The problem we are facing now surrounds the ability of technology to change in an instant. The task of the legal community in this country is to have the foresight and knowledge to develop a system that can regulate known and unknown technologies: a task proven impossible.

Legal Issues

Initiatives issued by both the administrative branches of government, such as the FTC, and the Executive Office of the President have increased significantly over the past decade. Choice/Consent: Choice means giving consumers choices about how any personal information collected from them may be used, specifically related to secondary use of the information.

Solutions to Consider

It is difficult to say whether they will ever be able to control the violation of rights on the Internet. News website. Retrieved November 30, 2000, from World Wide Web: http://www.cdt.org/privacy/issues/.

Electronic Commerce and Data Privacy: The Impact of

Privacy Concerns on Electronic Commerce Use

COMMERCE

The two most common forms of e-commerce are labeled business-to-consumer (B2C) e-commerce and business-to-business (B2B) e-commerce. B2B e-commerce has many of the same advantages that B2C e-commerce organizations have, such as the ability to increase the services they can offer their business customers.

PRIVACY

Even with the satisfactory outcome of the EU-US negotiations, consumers and the Federal Trade Commission (FTC) have pressed and will continue to focus on the issue of data protection in the US as rumors emerge that the FTC is ready to recommend new rules to protect online privacy (Schwartz, 2000).

Online Privacy

RESEARCH MODEL AND HYPOTHESES

PRIVACY CONCERNS

ACTUAL E-COMMERCE ACTIVITY

This study also used a variable that measures a consumer's propensity to purchase goods (PH) sight unseen. H3: The more likely a consumer is to purchase goods or services by mail, telephone, or over the Internet during the past year, the higher the level of actual e-commerce use.

IMPORTANCE OF PRIVACY POLICY

Culnan (1993) included a variable to measure whether respondents had shopped by mail or telephone in the previous year.

REGULATORY PREFERENCE

ANTECEDENTS

Sample and Procedure

Questionnaire Development

Measures

Technology literacy (TK) was assessed by asking respondents to rate their level of expertise with computer and Internet technology. EQS was used to determine the relationships between the variables shown in the path diagram shown in the model in Figure 1 .

Overall Goodness of Fit

Finally, the root mean square error of approximation (RMSEA) index measures the discrepancy in the population between the observed and estimated covariance matrices per degree of freedom. The added covariances are supported by the significant correlations between the antecedent variables (see Table 1 ).

Tests of Hypotheses

0.948 AGFI 0.789 0.886

However, higher levels of technology knowledge tend to significantly increase actual e-commerce use (H8b; . coefficient = .185, t = 2.681). The most surprising finding was that higher levels of privacy concern (H1) did not have a significant impact on actual e-commerce activity.

Limitations

Implications and Directions for Future Research

Consumers have lost all control over how personal data is collected and used by companies. Most companies handle the personal information they collect about customers in a proper and confidential manner.*.

Privacy Concerns

Companies should take several steps to ensure that unauthorized individuals cannot access personal information on their computers. Industries should rely on self-regulation to protect personal information collected on Internet sites.

Regulatory Preferences

Importance of Privacy Policies

Internet Activity

Purchasing Habits

Perceived Usefulness

Technology Knowledge

Prior Privacy Invasion Experience

Demographic Information

Retrieved from the World Wide Web: http://www.ita.doc.gov/td/ecomm/LaRussaLetJune2000.htm. Retrieved September 7, 2000, from the World Wide Web: http://www.ita.doc.gov/td/ecom/EUletter27JulyHeader.htm.

Aggression on the Networks

An Australian Viewpoint

Website to gauge the attitudes of (mostly) US executives towards non-passive strategies against hackers. The survey described in this article seeks to specifically examine the attitudes of Australian IT managers towards this "offensive".

BACKGROUND

The table indicates the consequences of the incidents in terms of financial losses (which may have arisen directly or indirectly as a result of the incidents). As an aside, it is worth noting that the significant increases in the number of "total events" in the 1994 and 1998 studies are largely due to the widespread emergence of the virus problem.

Rationale and Drawbacks of Cyber-Vigilantism

Because some questions were of a sensitive nature, it was believed that this anonymity would increase the validity of the data. Information on the variety of respondents by type of organization is shown in Table 2, and the size (determined by staff numbers) in Table 3.

Rationale for Each Question

RESULTS AND DISCUSSION

Attitude Toward Aggressive Response

The contradiction in the answers is also highlighted in the answers to the 5th question, which talks about the suitability of the "authority" for dealing with hackers. It may reflect a desired state rather than the practical aspects of the situation.

Table 4: Survey questions and percentage responses
Table 4: Survey questions and percentage responses

Organizational Awareness, Threats and Response

The perceived lack of attacks could also result in most respondents not investigating "malware". A small number of respondents confused the context of the word "offensive," assuming it meant things like pornography or viruses. Of course, lack of exposure to the techniques may have resulted in under-consideration of the options.

System Integrity

These reactions may stem from a limited view of what a competitor is, but they do imply a lack of attention to potential aggressors. For example, statements such as 'Maybe, but not yet possible' and 'No competitors but malicious individuals' indicate that the threat is not considered to be great.

General Comments

Many comments expressed that Internet sites should be free of all opinions and that without this the system would be compromised. However, the contrast between the answers to questions 6 and 7 shows potential dilemmas and justifications for attacking certain websites.

Recent Events in Australia

This range of new powers will allow ASIO to engage in offensive online activities to protect Australia's national interests. Perhaps the most important point is whether the protection of Australia's interests includes the protection of Australia's business interests.

Cyberspace Ethics and Information Warfare

COMPUTER HACKERS

Steven Levy's book Hackers: Heroes of the Computer Revolution (1984) suggests that hackers operate according to a code of ethics. This newer code of ethics is based more on the view that hackers help develop the information society and contribute to its character.

INFORMATION WARFARE

The use of information warfare techniques can be seen as just one factor of business behavior. The perception of information warfare at the state or corporate level is to gain as much advantage as possible and inflict as much damage as possible on the 'enemy'.

SOME SPECIFIC TECHNIQUES IN INFORMATION WARFARE

FUTURE TRENDS

According to our position: Viewing information warfare as a use of force prohibited by Article 2(4) of the UN Charter.

Policies for the Prevention of Repetitive Strain Injury

Moral Analysis

REPETITIVE STRAIN INJURY (RSI)

RSI is most closely associated with keyboard use, and there are suggestions that keyboard use may decrease, leading to the general assumption that RSI as a problem will decrease (e.g. Richardson, 1999). If RSI is associated with technologies that can be expected to replace keyboard use to some extent, the issues raised will be just as relevant when transferred to the new contexts.

BAD ADVICE

Some authors such as Lucire (undated) argue that RSI is "an epidemic of a new disorder. However, there is also evidence that alternatives to keyboard use can cause RSI in some cases.

The Responsibility of Employers

There are particular problems in the field of RSI prevention: individuals may or may not adopt, to a large extent, work practices that reduce the possibility of RSI, regardless of the formal actions of their employers. By producing RSI prevention materials, all the organizations studied implicitly acknowledge that they have a duty in this area.

The Policies

At the same time, the extent to which the individual employee does this may be determined by factors that are more clearly the employer's responsibility than that of an individual employee. These factors include job security, promotion and reward regimes and less tangible factors such as workplace culture.

THE MOUSE

The University of Wisconsin-Milwaukee (1999) does not mention managers at all in its "advice" and apparently puts the entire responsibility on the individual. However, it must be recognized that the documents examined in the last two cases were not official regulations.

COMPUTER GAMES

I would strongly recommend that software vendors stop including this particular type of game "bundled" with other software. With this realistic perspective, it would be better if employees could be directed towards the less harmful games, which could mean that while more harmful games are removed from systems, less harmful games are intentionally allowed to remain (perhaps with warnings about the risk of RSI ) attached to them).

WORK PRESSURE

Given this, and the fact that computer games are often available over the Internet or as hidden features of other software (I've heard of a game hidden deep in word processing software), it may be impossible for employers to prohibit employees from playing computer games. The importance of line managers allowing, enabling, encouraging or implementing appropriate time off (when all of these may be appropriate in some contexts) is generally not recognized in the policies studied (although the University of Glasgow (1993) and, to a lesser extent minor, University of Wolverhampton (no date) are exceptions).

MONITORING

The increased risks that arise during these peak periods can be avoided through long-term planning of resources and organization of tasks,” without relating this to the academic environment and culture. Nevertheless, it does not provide advice on the practical difficulties that might hinder the instruction to 'Take regular breaks'. Again, no mention is made of the responsibilities of line managers in this regard.

SHARED WORKSTATIONS

In contrast, the University of Bristol (undated) makes an implicit acknowledgment of the academic environment (but not that it has duties to students). Retrieved September 20, 2000 from World Wide Web: http://www.iro.umontreal.ca/~coter/karoshi.html and http://www.workhealth.org/whatsnew/lpkarosh.htm.

Social Issues in Electronic Commerce: Implications for

Policy Makers

In Section 3 we discuss these concerns in light of several policy issues arising from the use of network technologies, and in Section 4 we present their implications for electronic commerce policymaking. The article concludes with the importance of a holistic approach to policymaking and suggestions for further research.

SOCIAL CONCERNS

Trust

Digital Democracy

EMERGENT POLICY ISSUES

Policy Issues at Six Levels of Internet Policy

Because electronic commerce is an international phenomenon, it is impossible for policymakers to control the content of information transferred online. Another substantive issue in electronic commerce is the protection of copyright and intellectual property rights.

IMPLICATIONS FOR POLICY MAKERS

On the one hand, educating the public can help the electronic trading market reach a critical mass of users. Policymakers have recognized the viability of electronic commerce and the opportunities it offers for businesses and citizens.

ACKNOWLEDGMENTS

A Balanced Perspective and Options for Resolution

ISSUES IN ELECTRONIC COMMERCE TAXATION

An argument has also been made that while net taxation may help the internet to spread more quickly, it is poor social policy because the people who shop on the internet are disproportionately from the upper rungs of the economic ladder and need the least' a tax reduction. In fact, Reinhardt suggests that such a policy seems too generous a helping hand, especially when it is the poor who bear the burden (2000).

THE ADVISORY COMMISSION ON ELECTRONIC COMMERCE

THE NATIONAL GOVERNORS ASSOCIATION’S PERSPECTIVE

The overall concept of the streamlined system is to reduce the costs and burden of sales tax compliance for participating sellers by shifting sales tax administration to a technology-driven business model operated by trusted third parties (TTPs) by simplified sales and use tax laws and administrative procedures and states assuming responsibility for system costs under which a seller would not be charged for participating in the effective system. The effective system would be implemented by a combination of uniform legislation and multi-state agreements between participating states.

THE E-COMMERCE COALITION PERSPECTIVE

The second step would be for all state and local governments to adopt the same classification systems, definitions and revisions. In order for states to collect sales taxes, states would have to comply with the uniform nationwide system, and those that did not comply would be denied the ability to collect taxes on distance sales until they adopted the uniform system.

GOVERNOR JAMES GILMORE’S PERSPECTIVE

RADIOSHACK CORPORATION’S PERSPECTIVE

RadioShack believes that the existing moratorium on taxes on Internet access fees should be extended indefinitely. No more than one sales tax rate per state may be applied to Internet sales.

INTERNET TAXATION ISSUES IN TEXAS

Sales tax should be applied to Internet/remote commerce in a manner consistent with brick-and-mortar retailers. No new federal gross receipts tax on Internet sales should be imposed and no new federal agency to collect Internet taxes should be created.

SUMMARY OF OPTIONS FOR RESOLUTION OF INTERNET TAXATION ISSUES

Another key element of the solution will involve intergovernmental standardization and simplification of key functions of sales and use tax systems. State Taxation of the Internet: State-by-state tax treatment of Internet access, sales, and software.

Figure 1: State taxation of the Internet
Figure 1: State taxation of the Internet

Manufacturing Social

Responsibility Benchmarks in the Competitive

Intelligence Age

At the beginning of the two-day conference, one of the presentations was given by a part-time instructor from Marne-la-Vallee. The conclusion of the paper will argue that the construction of social responsibility is a human achievement at the local level and not a rational standard at the global level.

COVERT OPERATIONS

She worked for Thomson Electronics and felt that the US government had interfered in the negotiations by releasing NSA-purchased wiretapping data to the Brazilian government to manage the contract against the US company Raytheon. Moreover, the paper suggests that the burden of social responsibility lies more heavily on the successful economic oppressor than the unsuccessful economic resistance.

Threshold Four: Extreme Options

Threshold Three: High-Risk Options

Threshold Two: Modest Intrusions

Threshold One: Routine Operations

COMPETITIVE STRATEGY

Harvard Business School combined the Allison case with the Chandler cases to create the field of business strategy. In 1980, Michael Porter crystallized an industrial/organizational economics view of business strategy in his book Competitive Strategy.

CORPORATE INTELLIGENCE

How would you define the problem if you were on the other side of the fence. To whom and to what do you give your loyalty as a member of the company.

ECONOMIC SECURITY

The collective wisdom of the intelligence community's think tanks quickly agreed with a collective opinion: the US government's involvement in microeconomic intelligence was a very bad idea. (2) Economic benefits are not black and white, but interwoven between countries, as in the case of a Honda plant in the United States that creates jobs for Americans; this idea is coded after the title of an article by Robert Reich, “Who Is 'Us'?”.

ECONOMIC INTELLIGENCE

Admiral Lacoste (of Rainbow Warrior fame) started a DESS d'ingenierie de l'intelligence economique (a graduate program in the engineering of economic intelligence) at the Université de Marne-la-Vallee, east of Paris. A number of regional economic intelligence initiatives were created throughout France to sensitize French leaders to the importance of creating a national competitive intelligence culture.

COMPETITIVE INTELLIGENCE

Fuld's The New Competitor Intelligence: The complete resource for finding, analyzing and using information about your competitors. From years of experience attempting to conduct competitive intelligence, Fuld & Company (1995) created "the ten commandments of legal and ethical intelligence gathering":.

ECONOMIC WARFARE

Penalties for trade secret theft include up to 10 years in prison, individual fines of up to $500,000, and corporate fines of up to $5 million. If the theft benefits a foreign entity, the penalty can rise to 15 years in prison and a corporate-level fine of up to $10 million.

CONCLUSION: MANUFACTURING SOCIAL RESPONSIBILITY BENCHMARKS

So no matter how many times we try to rule out the chaos of competing intelligence ethics, it will always depend on whether or not individuals can construct an ethical framework that allows themselves to feel good when they look in the mirror. And, in an example of how easy it is for people to feel good about themselves when they look in the mirror, 75% of American men think they are in the top 25% of athletic ability.

Strategic and Ethical Issues in Outsourcing Information

Technologies

Referensi

Dokumen terkait