Manufacturing Social Responsibility Benchmarks in the Competitive Intelligence Age

Manufacturing Social Responsibility Benchmarks in the Competitive Intelligence Age

James Douglas Orton (University of Nevada, USA)
Copyright: © 2002 |Pages: 17
DOI: 10.4018/978-1-931777-15-5.ch016
OnDemand PDF Download:


The themes explored elsewhere in this volume, on the intersection between information technology and social responsibility, take on new shapes when considered in the context of competitive intelligence. Using the (probably) apocryphal Thomson-Raytheon story as a launching point, this chapter will explore the emergence of social responsibility benchmarks in the competitive intelligence age. This analysis is heavily flavored by my own experiences trying to understand the French approach to competitive intelligence. The paper reviews attempts by competitive intelligence agents in the US and France to manufacture Social Responsibility benchmarks in the contexts of covert operations, competitive strategy, corporate intelligence, economic security, economic intelligence, and economic warfare. The conclusion of the paper will argue that the construction of social responsibility is a local-level human accomplishment, not a global-level rational standard. Furthermore, the paper implies that the burden of social responsibility lies more heavily on the successful economic oppressor than the unsuccessful economic resistance.

Complete Chapter List

Search this Book:
Table of Contents
Ali Salehnia
Chapter 1
Gurpreet S. Dhillon, Trevor T. Moores
The phenomenal growth in Internet commerce in recent years has brought privacy concerns to the fore. Although privacy as a concept has been well... Sample PDF
Internet Privacy: Interpreting Key Issues
Chapter 2
Gerald Grant
Managers, IT practitioners, and IS researchers are easily seduced by the latest information technology wave. Consequently, we tend not to question... Sample PDF
One Size Does Not Fit All: Potential Diseconomics in Global Information Systems
Chapter 3
Peter P. Mykytyn Jr.
Not too many years ago, hardly anyone had heard the terms “Web browser,” “Web,” or “electronic commerce.” Today, the World Wide Web, often referred... Sample PDF
Some Internet and E-Commerce Legal Perspectives Impacting the End User
Chapter 4
Mo Adam Mahmood, Gary L. Sullivan, Ray-Lin Tung
Stimulated by recent high-profile incidents, concerns about business ethics have increased over the last decade. In response, research has focused... Sample PDF
A New Approach to Evaluating Business Ethics: An Artificial Neural Networks Application
Chapter 5
Jennifer Kreie, Timothy Paul Cronan
End user acceptable/unacceptable behavior related to computer information systems has caused significant losses to business and society. Some... Sample PDF
Copyright, Piracy, Privacy and Security Issues: Acceptable or Unacceptable Actions for End Users?
Chapter 6
J. Christopher Westland
Internet auction markets offer customers a compelling new model for price discovery. This model places much more power in the hands of the consumer... Sample PDF
Ten Lessons that Internet Auction Markets Can Learn from Securities Market Automation
Chapter 7
Janice M. Burn, Karen D. Loch
Many lessons from history offer strong evidence that technology can have a definite effect on the social and political aspects of human life. At... Sample PDF
The Societal Impact of World Wide Web - Key Challenges for the 21st Century
Chapter 8
Dieter Fink
Under the system of e-commerce, organisations leave themselves open to attack which can have catastrophic consequences. Recent well-publicised... Sample PDF
Method over Mayhem in Managing e-Commerce Risk
Chapter 9
Darryl A. Seale
This study examines predictors of software piracy, a practice estimated to cost the software industry nearly $11 billion in lost revenue annually.... Sample PDF
Why Do We Do It If We Know It's Wrong? A Structural Model of Software Piracy
Chapter 10
Ali Salehnia, Hassan Pournaghshband
The process of software development is usually described in terms of a progression from the project planning to the final code, passing through... Sample PDF
Ethical Issues in Software Engineering Revisited
Chapter 11
Matthew Warren, William Hutchinson
We have seen a rise in computer misuse at a global level and also the development of new policies and strategies to describe organized computer... Sample PDF
Cyberspace Ethics and Information Warfare
Chapter 12
Mark Campbell Williams
Should ethics be a significant importance in information systems educational research? In this chapter, I reflect on my heuristic and... Sample PDF
A Conversation Regarding Ethics in Information Systems Educational Research
Chapter 13
Susan J. Harrington
Despite the existence of laws and much publicity surrounding software piracy, it is widely believed that software piracy is commonplace (Eining &... Sample PDF
Software Piracy: Are Robin Hood and Responsibility Denial at Work?
Chapter 14
Anastasia Papazafeiropoulou, Athanasia Pouloudi
Policy implementation for electronic commerce is a complex process since policy makers, national governments in their majority, have to act in a... Sample PDF
Social Issues in Electronic Commerce: Implications for Policy Makers
Chapter 15
Andrew Ward, Brian Prosser
In the last decade of the twentieth century, with the advent of computers networked through Internet Service Providers and the declining cost of... Sample PDF
Kierkegaard and the Internet: The Role and Formation of Community in Education
Chapter 16
James Douglas Orton
The themes explored elsewhere in this volume, on the intersection between information technology and social responsibility, take on new shapes when... Sample PDF
Manufacturing Social Responsibility Benchmarks in the Competitive Intelligence Age
Chapter 17
Randall C. Reid, Mario Pascalev
Outsourcing of information technology (IT) is the transfer of a company’s information technology functions to external vendors. Ordinarily, such... Sample PDF
Strategic and Ethical Issues in Outsourcing Information Technologies
Chapter 18
Stephen K. Probert
This chapter describes research in progress on the philosophical concept of authenticity – used as a framing device for providing an interpretation... Sample PDF
Ethics Authenticity and Emancipation in Information Systems Development
Chapter 19
Mikko T. Siponen
This chapter argues, following the scholars of the first category, that human morality has a role as a means for ensuring security. But to achieve... Sample PDF
On the Role of Human Morality in Information System Security: From the Problems of Descriptivism to Non-Descriptive Foundations
Chapter 20
Geoffrey A. Sandy
In western tradition information ethics has its origins in Athenian democracy. It was characterised by an oral culture and freedom of speech. Later... Sample PDF
The Government "Downunder" Attempts to Censor the Net
Chapter 21
Atefeh Sadri McCampbell, Linda Moorhead Clare
The following chapter defines the practice of DNA analysis and identifies the ethical considerations of human genetic testing in the workplace and... Sample PDF
The Genetic Revolution: Ethical Implications for the 21st Century
About the Editor