Although we have always recognized that raising awareness of social responsibility issues in the information age is essential, there has been only a sketchy review of the inherent concerns and challenges. Today some companies have even appointed chief privacy officers and their ilk to develop policies and programs to facilitate social responsibility in the information age.
Understanding Social Responsibility Issues in the
Information Age
ISSUES OF PRIVACY AND CONFIDENTIALITY
ACCESSIBILITY TO TECHNOLOGY ISSUES
PROPERTY RIGHTS AND OWNERSHIP ISSUES
Third, where an individual copies software for commercial gain, and if the software were not available for copying, the individual would purchase it. According to Weckert, the owner of the software is clearly injured in the third case.
FREEDOM OF SPEECH ISSUES
QUALITY AND RELIABILITY OF INFORMATION AND RELATED SYSTEMS
Following unethical information systems project management best practices, the baggage handling systems of Chek Lap Kok Airport in Hong Kong and Denver Airport in the US resulted in disaster. Department of Motor Vehicles systems in Nevada, California and Oregon suffered a similar fate because corners were cut and basic guidelines for software development and project management were not followed.
OVERVIEW
The authors consider various threats in the information age and identify the related ethical challenges. It is hoped that this will enable individuals, organizations and the wider community to meet diverse challenges presented in the information age.
The author argues that entering the lives of self-employed and small business people who use computers reveals that there are complex webs of interrelated factors that influence their behavior with computers. The author argues that descriptivism (including the doctrine of cultural relativism) leads to various problems and contradictions and causes adverse consequences for our well-being (and security); therefore, an alternative approach to the use of ethics in reducing security breaches is proposed.
The Societal Impact of the World Wide Web–
Key Challenges for the 21 st Century
INTRODUCTION
There is an underlying assumption in the popular belief that the Internet can be the savior for the developing countries of the world. In the first section we document the current state of information technology diffusion and connectivity, and related factors such as GDP, population density, and cultural attitudes.
INFORMATION TECHNOLOGY ACCESS
The IT market has remained concentrated within the G7 countries at approximately 88%, with the United States accounting for 46% of the market. The difference between the United States and Latin American and some Asian countries is even more striking.
The Haves and the Have-Nots
The data reveal that the digital divide—the differences in access to phones, personal computers, and the Internet across certain demographic groups—still exists and, in many cases, has widened significantly. This may have been exacerbated by the apparent lack of women in decision-making positions in industry and relevant departments.” The latest data from the Australian Bureau of.
HOW CAN THE INTERNET ADDRESS THE CHALLENGE?
Sam Pitroda, advisor to the Indian government, says: “IT is not a luxury, but vital for basic activities such as bringing food to the market, preventing drought, an important source of new jobs and prosperity.” The mystery is that sustainable development is an enormously complex process that has its roots in the construction of education and infrastructure; what then is the role of the internet in this process? The use of the systems will probably have to be heavily, if not completely, subsidized, at least initially.
SUMMARY OBSERVATIONS
THE REAL CHALLENGE?
One could argue that the development of global networks only serves to strengthen the more developed countries and support the most dominant values, leading to increased exploitation of the less developed countries and the more disadvantaged sectors of society (Castells, 2000 ). A world that anyone can enter without privilege or prejudice based on race, economic power, military power or place of birth.
ENDNOTE
May it be more humane and just than the world your governments have made before” (Barlow, 1996) will remain empty rhetoric. Retrieved on the World Wide Web: http://www.cse.unsw.edu.au/dblp/db/indices/a-tree/b/Barlow:John_.
Structural Model of Software Piracy
Even in the more conservative business space, estimates show that 25% of all installed apps in the US are pirated. Many advocates of stronger copyright and patent protection argue that property rights should be strictly enforced, arguing that piracy is an affront to hard-working inventors and essential to fostering innovation in one of the world's largest value-added industries (Schuler, 1998).
THEORY AND MODEL DEVELOPMENT
We begin by examining previous studies reporting correlations of software piracy behavior and computer use. The model that emerges integrates previous research on correlates of piracy behavior and a rational action perspective on moral behavior with several defining characteristics of software and other forms of intellectual property.
Computer Usage and Demographic Factors
Although these studies provide some insight into different motivations for piracy, a more comprehensive and plausible model of software piracy has yet to emerge. An important objective of this chapter is to develop a model that both predicts and explains incidents of software piracy.
Morality, Ethics and Reasoned Action
Here we turn to the theory of reasoned action (Fishbein & Ajzen, 1975) and two important extensions: the theory of planned behavior (Ajzen, 1985) and the theory of reasoned action as applied to moral behavior (Vallerand et al., 1992). . . A central feature in the theory of reasoned action is the individual's intention to perform a certain behavior.
Modeling Conceptual Differences in Software and Intellectual Property
We would also expect that attitudes, such as one's sense of proportional value, may have consequences in the formation of social norms. So far, we have identified likely predictors of software piracy and suggested a possible temporal order for many of the variables.
Sample
Survey Design
Procedure
RESULTS
Descriptive Statistics
Indicators of the Measurement Model
Empirical Assessment of the Measurement Model
Items marked with (R*) were reversed to coincide with the remaining items in the factor. In addition, the individual indicators of deterrence and non-exclusivity were found to be unrelated to software piracy and were not included in the structural model.
Empirical Assessment of the Structural Model
Of these five direct effects, the standardized coefficients suggest that the strongest effects come from social norms and expertise. The significant direct effect on expertise required (sc = -0.426, p
DISCUSSION
The greater this perceived difference, the more likely the individual was to report social norms in favor of software piracy. For example, software piracy is much more common in foreign countries with weak legal protection of intellectual property rights (Weisband & Goodman, 1992).
Statistical Methods
The multi-contextual character of the survey, although it remains a cross-sectional design, is significant as it provides the opportunity to empirically discern whether some of these perceptions relate only to work/personal settings or are more general in nature. Measures of skewness and kurtosis do not appear to demonstrate any dramatic departures from normality (Hayduk, 1987).
APPENDIX
As can be seen in the table, each of the coefficients is several times larger than its standard error. Furthermore, proportionality represents a dimension that affects the relative fairness of the profits and costs associated with computer software.
Empirical Assessment of the Structural Model Predicting Piracy
Furthermore, age is the only measure that significantly affects all four factors in the analysis. The only other measure that approaches this impact is opportunity, which significantly affects three of the four factors.
Component-Based Development: Issues of
Data Protection
This characteristic of component-based development has interesting ramifications in ethical terms, which are strongly related to the concept of data protection. The chapter focuses on the issues of data protection and the social considerations that arise for system development and integration when component-based development is used.
DATA PROTECTION IN THE UK
As a result, the Information Commissioner, the person responsible for promoting good information handling and encouraging related codes of practice (formerly known as the Data Protection Registrar), has published relevant guidance and advice (available at www.dataprotection.gov.uk) to further interpret and facilitate passage of the law. Regardless of the current difficulties in adapting the use of information systems to the new legislation, companies should prepare for and adopt the Personal Data Protection Act.
COMPONENT-BASED DEVELOPMENT
This means that the consumer organization will have to trust:. a) that the component does exactly what it says it does. However, given the above points, ethical data protection concerns may need to be included in these perspectives.
COMPONENT-BASED DEVELOPMENT AND DATA PROTECTION
DISCUSSION AND FUTURE TRENDS
Confidentiality, Integrity and Availability in Component- Based Development
Given the dynamics of a component's lifecycle within an organizational context, commitments and assurances must also be made that changes in a component's specification or behavior over time will not result in system-level dependency problems. This is important as it indicates that significant investment is required if confidence is to be achieved at the market level.
Future Trends
More generally, in the era of electronic commerce, there are several actions that can be taken to respond to users' uncertainty (Johnston, 1999). However, it is also important to recognize the limitations of technology when addressing safety issues as there are also organizational and social aspects to consider (Dhillon, 1997).
CONCLUSIONS
World Data Flows, Elektroniese Handel, en die Europese Privaatheidsrichtlijn, Brookings Institution Press, Washington, D.C. Komponentsagteware - Beyond Object-Oriented Programming. Red.), Special Issues in Object-Oriented Programming: Workshop Reader of the 10th European Conference on Object-Oriented Programming ECOOP’96, Linz, July, dpunkt.verlag, Heidelberg, 177-183.
Internet Privacy
Interpreting Key Issues
INTERNET PRIVACY
If an individual feels that, despite procedural fairness, the social contract in the exchange of private information is not maintained, this would clearly lead to a loss of trust and integrity of the organization. On the other hand, if an individual willingly provides private information in exchange for some social or economic benefit, but the procedure used in collecting and storing the information is not fair, it would still lead to concerns about breach of privacy, trust and integrity. of the process. .
STUDY DESIGN
The argument used in defining the means' targets was that any target that was not the most important issue clearly contributed in some way to one of the most important issues. The remaining 80 questions from the 1st phase were subjectively evaluated in order to formulate the goals of the funds.
DISCUSSION OF RESEARCH FINDINGS
While the use of personal information to further companies' causes has become a competitive necessity, the issue raised here suggests that the burden is on online companies to ensure that the confidentiality of the personal information collected is maintained. There were clearly concerns about maintaining the privacy of personal information when connected via a cable modem, from viruses to Trojan horses.
CONCLUSION
In the US, the FTC has also placed due trust in the protection of personal financial information. According to the participants in this study, spam is considered a sufficiently disturbing phenomenon that there are calls for spam to be outlawed.
Privacy and the Internet
The Case of
DoubleClick, Inc
However, since the Internet is in general use, the question arises, is accessing the Internet an act of giving up the right to privacy? What's more, the future of internet privacy is completely unknown and reveals an unwritten chapter in this nation's history.
THE CASE OF DOUBLECLICK, INC
Summary of DoubleClick Legal Actions
Judnick sought relief in an injunction to stop such conduct and destruction of all information wrongly obtained without knowledge of consent. On February 29, 2000, EPIC's complaint was joined by the Center for Democracy and Technology (CDT) which filed a statement of additional facts and grounds for relief with the FTC.
DoubleClick’s Position
In an effort to assuage public concern about the lawsuit, DoubleClick CEO Kevin O'Connor said on March 2, 2000: "We are committing today that we will not call until there is agreement between the government and industry on privacy standards are not.personally identifiable information to anonymous user activity across websites”.
Opponent’s Position
Status of the Case
Commentary on the DoubleClick Cases
This will allow consumer confidence to blossom, facilitating full participation in the Internet market.
DISCUSSION: RIGHT TO PRIVACY AND THE INTERNET
The issues highlighted below address general concerns and solutions addressed in the DoubleClick case. They are all related, however, because as the door opens wider, more and more rights escape, even if it's all in the name of free enterprise;.
Technological Issues
The problem we are facing now surrounds the ability of technology to change in an instant. The task of the legal community in this country is to have the foresight and knowledge to develop a system that can regulate known and unknown technologies: a task proven impossible.
Legal Issues
Initiatives issued by both the administrative branches of government, such as the FTC, and the Executive Office of the President have increased significantly over the past decade. Choice/Consent: Choice means giving consumers choices about how any personal information collected from them may be used, specifically related to secondary use of the information.
Solutions to Consider
It is difficult to say whether they will ever be able to control the violation of rights on the Internet. News website. Retrieved November 30, 2000, from World Wide Web: http://www.cdt.org/privacy/issues/.
Electronic Commerce and Data Privacy: The Impact of
Privacy Concerns on Electronic Commerce Use
COMMERCE
The two most common forms of e-commerce are labeled business-to-consumer (B2C) e-commerce and business-to-business (B2B) e-commerce. B2B e-commerce has many of the same advantages that B2C e-commerce organizations have, such as the ability to increase the services they can offer their business customers.
PRIVACY
Even with the satisfactory outcome of the EU-US negotiations, consumers and the Federal Trade Commission (FTC) have pressed and will continue to focus on the issue of data protection in the US as rumors emerge that the FTC is ready to recommend new rules to protect online privacy (Schwartz, 2000).
Online Privacy
RESEARCH MODEL AND HYPOTHESES
PRIVACY CONCERNS
ACTUAL E-COMMERCE ACTIVITY
This study also used a variable that measures a consumer's propensity to purchase goods (PH) sight unseen. H3: The more likely a consumer is to purchase goods or services by mail, telephone, or over the Internet during the past year, the higher the level of actual e-commerce use.
IMPORTANCE OF PRIVACY POLICY
Culnan (1993) included a variable to measure whether respondents had shopped by mail or telephone in the previous year.
REGULATORY PREFERENCE
ANTECEDENTS
Sample and Procedure
Questionnaire Development
Measures
Technology literacy (TK) was assessed by asking respondents to rate their level of expertise with computer and Internet technology. EQS was used to determine the relationships between the variables shown in the path diagram shown in the model in Figure 1 .
Overall Goodness of Fit
Finally, the root mean square error of approximation (RMSEA) index measures the discrepancy in the population between the observed and estimated covariance matrices per degree of freedom. The added covariances are supported by the significant correlations between the antecedent variables (see Table 1 ).
Tests of Hypotheses
0.948 AGFI 0.789 0.886
However, higher levels of technology knowledge tend to significantly increase actual e-commerce use (H8b; . coefficient = .185, t = 2.681). The most surprising finding was that higher levels of privacy concern (H1) did not have a significant impact on actual e-commerce activity.
Limitations
Implications and Directions for Future Research
Consumers have lost all control over how personal data is collected and used by companies. Most companies handle the personal information they collect about customers in a proper and confidential manner.*.
Privacy Concerns
Companies should take several steps to ensure that unauthorized individuals cannot access personal information on their computers. Industries should rely on self-regulation to protect personal information collected on Internet sites.
Regulatory Preferences
Importance of Privacy Policies
Internet Activity
Purchasing Habits
Perceived Usefulness
Technology Knowledge
Prior Privacy Invasion Experience
Demographic Information
Retrieved from the World Wide Web: http://www.ita.doc.gov/td/ecomm/LaRussaLetJune2000.htm. Retrieved September 7, 2000, from the World Wide Web: http://www.ita.doc.gov/td/ecom/EUletter27JulyHeader.htm.
Aggression on the Networks
An Australian Viewpoint
Website to gauge the attitudes of (mostly) US executives towards non-passive strategies against hackers. The survey described in this article seeks to specifically examine the attitudes of Australian IT managers towards this "offensive".
BACKGROUND
The table indicates the consequences of the incidents in terms of financial losses (which may have arisen directly or indirectly as a result of the incidents). As an aside, it is worth noting that the significant increases in the number of "total events" in the 1994 and 1998 studies are largely due to the widespread emergence of the virus problem.
Rationale and Drawbacks of Cyber-Vigilantism
Because some questions were of a sensitive nature, it was believed that this anonymity would increase the validity of the data. Information on the variety of respondents by type of organization is shown in Table 2, and the size (determined by staff numbers) in Table 3.
Rationale for Each Question
RESULTS AND DISCUSSION
Attitude Toward Aggressive Response
The contradiction in the answers is also highlighted in the answers to the 5th question, which talks about the suitability of the "authority" for dealing with hackers. It may reflect a desired state rather than the practical aspects of the situation.
Organizational Awareness, Threats and Response
The perceived lack of attacks could also result in most respondents not investigating "malware". A small number of respondents confused the context of the word "offensive," assuming it meant things like pornography or viruses. Of course, lack of exposure to the techniques may have resulted in under-consideration of the options.
System Integrity
These reactions may stem from a limited view of what a competitor is, but they do imply a lack of attention to potential aggressors. For example, statements such as 'Maybe, but not yet possible' and 'No competitors but malicious individuals' indicate that the threat is not considered to be great.
General Comments
Many comments expressed that Internet sites should be free of all opinions and that without this the system would be compromised. However, the contrast between the answers to questions 6 and 7 shows potential dilemmas and justifications for attacking certain websites.
Recent Events in Australia
This range of new powers will allow ASIO to engage in offensive online activities to protect Australia's national interests. Perhaps the most important point is whether the protection of Australia's interests includes the protection of Australia's business interests.
Cyberspace Ethics and Information Warfare
COMPUTER HACKERS
Steven Levy's book Hackers: Heroes of the Computer Revolution (1984) suggests that hackers operate according to a code of ethics. This newer code of ethics is based more on the view that hackers help develop the information society and contribute to its character.
INFORMATION WARFARE
The use of information warfare techniques can be seen as just one factor of business behavior. The perception of information warfare at the state or corporate level is to gain as much advantage as possible and inflict as much damage as possible on the 'enemy'.
SOME SPECIFIC TECHNIQUES IN INFORMATION WARFARE
FUTURE TRENDS
According to our position: Viewing information warfare as a use of force prohibited by Article 2(4) of the UN Charter.
Policies for the Prevention of Repetitive Strain Injury
Moral Analysis
REPETITIVE STRAIN INJURY (RSI)
RSI is most closely associated with keyboard use, and there are suggestions that keyboard use may decrease, leading to the general assumption that RSI as a problem will decrease (e.g. Richardson, 1999). If RSI is associated with technologies that can be expected to replace keyboard use to some extent, the issues raised will be just as relevant when transferred to the new contexts.
BAD ADVICE
Some authors such as Lucire (undated) argue that RSI is "an epidemic of a new disorder. However, there is also evidence that alternatives to keyboard use can cause RSI in some cases.
The Responsibility of Employers
There are particular problems in the field of RSI prevention: individuals may or may not adopt, to a large extent, work practices that reduce the possibility of RSI, regardless of the formal actions of their employers. By producing RSI prevention materials, all the organizations studied implicitly acknowledge that they have a duty in this area.
The Policies
At the same time, the extent to which the individual employee does this may be determined by factors that are more clearly the employer's responsibility than that of an individual employee. These factors include job security, promotion and reward regimes and less tangible factors such as workplace culture.
THE MOUSE
The University of Wisconsin-Milwaukee (1999) does not mention managers at all in its "advice" and apparently puts the entire responsibility on the individual. However, it must be recognized that the documents examined in the last two cases were not official regulations.
COMPUTER GAMES
I would strongly recommend that software vendors stop including this particular type of game "bundled" with other software. With this realistic perspective, it would be better if employees could be directed towards the less harmful games, which could mean that while more harmful games are removed from systems, less harmful games are intentionally allowed to remain (perhaps with warnings about the risk of RSI ) attached to them).
WORK PRESSURE
Given this, and the fact that computer games are often available over the Internet or as hidden features of other software (I've heard of a game hidden deep in word processing software), it may be impossible for employers to prohibit employees from playing computer games. The importance of line managers allowing, enabling, encouraging or implementing appropriate time off (when all of these may be appropriate in some contexts) is generally not recognized in the policies studied (although the University of Glasgow (1993) and, to a lesser extent minor, University of Wolverhampton (no date) are exceptions).
MONITORING
The increased risks that arise during these peak periods can be avoided through long-term planning of resources and organization of tasks,” without relating this to the academic environment and culture. Nevertheless, it does not provide advice on the practical difficulties that might hinder the instruction to 'Take regular breaks'. Again, no mention is made of the responsibilities of line managers in this regard.
SHARED WORKSTATIONS
In contrast, the University of Bristol (undated) makes an implicit acknowledgment of the academic environment (but not that it has duties to students). Retrieved September 20, 2000 from World Wide Web: http://www.iro.umontreal.ca/~coter/karoshi.html and http://www.workhealth.org/whatsnew/lpkarosh.htm.
Social Issues in Electronic Commerce: Implications for
Policy Makers
In Section 3 we discuss these concerns in light of several policy issues arising from the use of network technologies, and in Section 4 we present their implications for electronic commerce policymaking. The article concludes with the importance of a holistic approach to policymaking and suggestions for further research.
SOCIAL CONCERNS
Trust
Digital Democracy
EMERGENT POLICY ISSUES
Policy Issues at Six Levels of Internet Policy
Because electronic commerce is an international phenomenon, it is impossible for policymakers to control the content of information transferred online. Another substantive issue in electronic commerce is the protection of copyright and intellectual property rights.
IMPLICATIONS FOR POLICY MAKERS
On the one hand, educating the public can help the electronic trading market reach a critical mass of users. Policymakers have recognized the viability of electronic commerce and the opportunities it offers for businesses and citizens.
ACKNOWLEDGMENTS
A Balanced Perspective and Options for Resolution
ISSUES IN ELECTRONIC COMMERCE TAXATION
An argument has also been made that while net taxation may help the internet to spread more quickly, it is poor social policy because the people who shop on the internet are disproportionately from the upper rungs of the economic ladder and need the least' a tax reduction. In fact, Reinhardt suggests that such a policy seems too generous a helping hand, especially when it is the poor who bear the burden (2000).
THE ADVISORY COMMISSION ON ELECTRONIC COMMERCE
THE NATIONAL GOVERNORS ASSOCIATION’S PERSPECTIVE
The overall concept of the streamlined system is to reduce the costs and burden of sales tax compliance for participating sellers by shifting sales tax administration to a technology-driven business model operated by trusted third parties (TTPs) by simplified sales and use tax laws and administrative procedures and states assuming responsibility for system costs under which a seller would not be charged for participating in the effective system. The effective system would be implemented by a combination of uniform legislation and multi-state agreements between participating states.
THE E-COMMERCE COALITION PERSPECTIVE
The second step would be for all state and local governments to adopt the same classification systems, definitions and revisions. In order for states to collect sales taxes, states would have to comply with the uniform nationwide system, and those that did not comply would be denied the ability to collect taxes on distance sales until they adopted the uniform system.
GOVERNOR JAMES GILMORE’S PERSPECTIVE
RADIOSHACK CORPORATION’S PERSPECTIVE
RadioShack believes that the existing moratorium on taxes on Internet access fees should be extended indefinitely. No more than one sales tax rate per state may be applied to Internet sales.
INTERNET TAXATION ISSUES IN TEXAS
Sales tax should be applied to Internet/remote commerce in a manner consistent with brick-and-mortar retailers. No new federal gross receipts tax on Internet sales should be imposed and no new federal agency to collect Internet taxes should be created.
SUMMARY OF OPTIONS FOR RESOLUTION OF INTERNET TAXATION ISSUES
Another key element of the solution will involve intergovernmental standardization and simplification of key functions of sales and use tax systems. State Taxation of the Internet: State-by-state tax treatment of Internet access, sales, and software.
Manufacturing Social
Responsibility Benchmarks in the Competitive
Intelligence Age
At the beginning of the two-day conference, one of the presentations was given by a part-time instructor from Marne-la-Vallee. The conclusion of the paper will argue that the construction of social responsibility is a human achievement at the local level and not a rational standard at the global level.
COVERT OPERATIONS
She worked for Thomson Electronics and felt that the US government had interfered in the negotiations by releasing NSA-purchased wiretapping data to the Brazilian government to manage the contract against the US company Raytheon. Moreover, the paper suggests that the burden of social responsibility lies more heavily on the successful economic oppressor than the unsuccessful economic resistance.
Threshold Four: Extreme Options
Threshold Three: High-Risk Options
Threshold Two: Modest Intrusions
Threshold One: Routine Operations
COMPETITIVE STRATEGY
Harvard Business School combined the Allison case with the Chandler cases to create the field of business strategy. In 1980, Michael Porter crystallized an industrial/organizational economics view of business strategy in his book Competitive Strategy.
CORPORATE INTELLIGENCE
How would you define the problem if you were on the other side of the fence. To whom and to what do you give your loyalty as a member of the company.
ECONOMIC SECURITY
The collective wisdom of the intelligence community's think tanks quickly agreed with a collective opinion: the US government's involvement in microeconomic intelligence was a very bad idea. (2) Economic benefits are not black and white, but interwoven between countries, as in the case of a Honda plant in the United States that creates jobs for Americans; this idea is coded after the title of an article by Robert Reich, “Who Is 'Us'?”.
ECONOMIC INTELLIGENCE
Admiral Lacoste (of Rainbow Warrior fame) started a DESS d'ingenierie de l'intelligence economique (a graduate program in the engineering of economic intelligence) at the Université de Marne-la-Vallee, east of Paris. A number of regional economic intelligence initiatives were created throughout France to sensitize French leaders to the importance of creating a national competitive intelligence culture.
COMPETITIVE INTELLIGENCE
Fuld's The New Competitor Intelligence: The complete resource for finding, analyzing and using information about your competitors. From years of experience attempting to conduct competitive intelligence, Fuld & Company (1995) created "the ten commandments of legal and ethical intelligence gathering":.
ECONOMIC WARFARE
Penalties for trade secret theft include up to 10 years in prison, individual fines of up to $500,000, and corporate fines of up to $5 million. If the theft benefits a foreign entity, the penalty can rise to 15 years in prison and a corporate-level fine of up to $10 million.
CONCLUSION: MANUFACTURING SOCIAL RESPONSIBILITY BENCHMARKS
So no matter how many times we try to rule out the chaos of competing intelligence ethics, it will always depend on whether or not individuals can construct an ethical framework that allows themselves to feel good when they look in the mirror. And, in an example of how easy it is for people to feel good about themselves when they look in the mirror, 75% of American men think they are in the top 25% of athletic ability.
Strategic and Ethical Issues in Outsourcing Information
Technologies