Corporate Espionage and Workplace Trust/Distrust

The central focus of this research is: The growing corporate espionage activities due to fierce competition lead to highly controlling security measures and intensive employee monitoring which bring about distrust in the workplace. The paper examines various research works on trust and distrust. It...

Full description

Saved in:  
Bibliographic Details
Main Author: Chan, Marjorie (Author)
Format: Electronic Article
Language:English
Check availability: HBZ Gateway
Journals Online & Print:
Drawer...
Fernleihe:Fernleihe für die Fachinformationsdienste
Published: Springer Science + Business Media B. V 2003
In: Journal of business ethics
Year: 2003, Volume: 42, Issue: 1, Pages: 45-58
Further subjects:B corporate espionage
B Agency Theory
B countermeasures
B Distrust
B Trust
B Social Exchange Theory
Online Access: Volltext (JSTOR)
Volltext (lizenzpflichtig)

MARC

LEADER 00000naa a22000002 4500
001 1785618776
003 DE-627
005 20220112043553.0
007 cr uuu---uuuuu
008 220112s2003 xx |||||o 00| ||eng c
024 7 |a 10.1023/A:1021611601240  |2 doi 
035 |a (DE-627)1785618776 
035 |a (DE-599)KXP1785618776 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 1  |2 ssgn 
100 1 |a Chan, Marjorie  |e VerfasserIn  |4 aut 
245 1 0 |a Corporate Espionage and Workplace Trust/Distrust 
264 1 |c 2003 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a The central focus of this research is: The growing corporate espionage activities due to fierce competition lead to highly controlling security measures and intensive employee monitoring which bring about distrust in the workplace. The paper examines various research works on trust and distrust. It highlights the conflictful demands managers face. They have to deter espionage activities, but at the same time, build trusting relationships in the workplace. The paper also describes various operations, personnel, physical and technical countermeasuresto combat corporate espionage together with three espionage case examples which illustrate the importance of some of these countermeasures. Various authors' trust and distrust arguments are used to assess the cases. The paper ends with suggestions for future research. 
650 4 |a Trust 
650 4 |a Social Exchange Theory 
650 4 |a Distrust 
650 4 |a countermeasures 
650 4 |a corporate espionage 
650 4 |a Agency Theory 
773 0 8 |i Enthalten in  |t Journal of business ethics  |d Dordrecht [u.a.] : Springer Science + Business Media B.V, 1982  |g 42(2003), 1, Seite 45-58  |h Online-Ressource  |w (DE-627)270937129  |w (DE-600)1478688-6  |w (DE-576)121465284  |x 1573-0697  |7 nnns 
773 1 8 |g volume:42  |g year:2003  |g number:1  |g pages:45-58 
856 |3 Volltext  |u http://www.jstor.org/stable/25074943  |x JSTOR 
856 4 0 |u https://doi.org/10.1023/A:1021611601240  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mteo 
936 u w |d 42  |j 2003  |e 1  |h 45-58 
951 |a AR 
ELC |a 1 
ITA |a 1  |t 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 403367764X 
LOK |0 003 DE-627 
LOK |0 004 1785618776 
LOK |0 005 20220112043553 
LOK |0 008 220112||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-Tue135)IxTheo#2021-12-30#87B02EED8003996CCB365D9BD0CB8580B89180E2 
LOK |0 040   |a DE-Tue135  |c DE-627  |d DE-Tue135 
LOK |0 092   |o n 
LOK |0 852   |a DE-Tue135 
LOK |0 852 1  |9 00 
LOK |0 866   |x JSTOR#http://www.jstor.org/stable/25074943 
LOK |0 935   |a ixzs  |a ixrk  |a zota 
ORI |a SA-MARC-ixtheoa001.raw 
STA 0 0 |a Trust 
STB 0 0 |a Trust 
STC 0 0 |a Trust 
STD 0 0 |a Trust 
STF 0 0 |a 托拉斯 
STG 0 0 |a Trust 
STH 0 0 |a Trust,Траст 
STI 0 0 |a Τραστ,Trust,Εμπίστευμα