Skip to main content
Top
Published in: Journal of Business Ethics 2/2013

01-08-2013

Technology Regulation Policy for Business Ethics: An Example of RFID in Supply Chain Management

Authors: Wei Zhou, Selwyn Piramuthu

Published in: Journal of Business Ethics | Issue 2/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the increase in use of a technology, its misuse possibility also increases in general. Moreover, there are instances where new technologies are implemented without thoroughly testing for vulnerabilities. We consider RFID, a disruptive technology, and related vulnerabilities in existing supply chain applications from an ethics perspective. We develop an extended ethics model to incorporate the effects of emerging information and communication technologies, specifically that of RFID systems, including technology selection, social consequences, and practitioners’ rationality. We introduce a set of matrices for technology regulation development based on this model to serve as a communication tool for the policy maker for policy design regulation. We use the case of RFID to illustrate the model and matrices.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Bommer, M., Gratto, C., Gravander, J., & Tuttle, M. (1987). A behavioral model of ethical and unethical decision making. Journal of Business Ethics, 6, 265–280.CrossRef Bommer, M., Gratto, C., Gravander, J., & Tuttle, M. (1987). A behavioral model of ethical and unethical decision making. Journal of Business Ethics, 6, 265–280.CrossRef
go back to reference Boynton, A. C., Zmud, R. W., & Jacobs, G. (1994). The influence of IT management practice on IT use in large organizations. MIS Quarterly, 18(3), 299–318.CrossRef Boynton, A. C., Zmud, R. W., & Jacobs, G. (1994). The influence of IT management practice on IT use in large organizations. MIS Quarterly, 18(3), 299–318.CrossRef
go back to reference Calluzzo, V. J., & Cante, C. J. (2004). Ethics in information technology and software use. Journal of Business Ethics, 51(3), 301–312.CrossRef Calluzzo, V. J., & Cante, C. J. (2004). Ethics in information technology and software use. Journal of Business Ethics, 51(3), 301–312.CrossRef
go back to reference Clarke, R. V. (1983). Situational crime prevention: Its theoretical basis and practical scope. Crime and Justice, 4, 225–256.CrossRef Clarke, R. V. (1983). Situational crime prevention: Its theoretical basis and practical scope. Crime and Justice, 4, 225–256.CrossRef
go back to reference Clarke, R. V. (1995). Situational crime prevention. Crime and Justice, 19, 91–150.CrossRef Clarke, R. V. (1995). Situational crime prevention. Crime and Justice, 19, 91–150.CrossRef
go back to reference De George, R. T. (2000). Business ethics and the challenge of the information age. Business Ethics Quarterly, 10(1), 63–72.CrossRef De George, R. T. (2000). Business ethics and the challenge of the information age. Business Ethics Quarterly, 10(1), 63–72.CrossRef
go back to reference Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issues. Journal of Public Policy & Marketing, 12(1), 106–119. Foxman, E. R., & Kilcoyne, P. (1993). Information technology, marketing practice, and consumer privacy: Ethical issues. Journal of Public Policy & Marketing, 12(1), 106–119.
go back to reference Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. The Academy of Management Review, 16(2), 366–395. Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. The Academy of Management Review, 16(2), 366–395.
go back to reference Kaler, J. (1999). What’s the good of ethical theory? Business Ethics: A European Review, 8(4), 206–213.CrossRef Kaler, J. (1999). What’s the good of ethical theory? Business Ethics: A European Review, 8(4), 206–213.CrossRef
go back to reference Khazanchi, D. (1995). Unethical behavior in information systems: The gender factor. Journal of Business Ethics, 14(9), 741–749.CrossRef Khazanchi, D. (1995). Unethical behavior in information systems: The gender factor. Journal of Business Ethics, 14(9), 741–749.CrossRef
go back to reference Laudon, K. C. (1995). Ethical concepts and information technology. Communications of The ACM, 38(12), 33–39. Laudon, K. C. (1995). Ethical concepts and information technology. Communications of The ACM, 38(12), 33–39.
go back to reference Lee, H., Padmanabhan, P., & Whang, S. (1997). Information distortion in a supply chain. Management Science, 43(4), 546–558. Lee, H., Padmanabhan, P., & Whang, S. (1997). Information distortion in a supply chain. Management Science, 43(4), 546–558.
go back to reference Levi, M. (1988). The prevention of fraud. Crime Prevention Unit Paper 17, London: Home Office. Levi, M. (1988). The prevention of fraud. Crime Prevention Unit Paper 17, London: Home Office.
go back to reference Mitrokotsa, A., Rieback, M. R., & Tanenbaum, A. S. (2010). Classifying RFID attacks and defenses. Information Systems Frontier, 12, 491–505.CrossRef Mitrokotsa, A., Rieback, M. R., & Tanenbaum, A. S. (2010). Classifying RFID attacks and defenses. Information Systems Frontier, 12, 491–505.CrossRef
go back to reference Moir, L. (2001). What do we mean by corporate social responsibility? Corporate Governance, 1(2), 16–22. Moir, L. (2001). What do we mean by corporate social responsibility? Corporate Governance, 1(2), 16–22.
go back to reference Murphy, P. E. (1988). Implementing business ethics. Journal of Business Ethics, 7(12), 907–915. Murphy, P. E. (1988). Implementing business ethics. Journal of Business Ethics, 7(12), 907–915.
go back to reference Nolan, R., & McFarlan, F. W. (2005). Information technology and the board of directors. Harvard Business Review, 83(10), 96–106. Nolan, R., & McFarlan, F. W. (2005). Information technology and the board of directors. Harvard Business Review, 83(10), 96–106.
go back to reference Payne, D., & Dimanche, F. (1996). Towards a code of conduct for the tourism industry: An ethics model. Journal of Business Ethical Standards, 15(9), 997–1007. Payne, D., & Dimanche, F. (1996). Towards a code of conduct for the tourism industry: An ethics model. Journal of Business Ethical Standards, 15(9), 997–1007.
go back to reference Trevino, L. K. (1986). Ethical decision making in organizations: A person–situation interactionist model. The Academy of Management Review, 11(3), 601–617. Trevino, L. K. (1986). Ethical decision making in organizations: A person–situation interactionist model. The Academy of Management Review, 11(3), 601–617.
go back to reference Weaver, G. R. (1993). Corporate codes of ethics: Purpose, process and content issues. Business and Society, 32, 44–58. Weaver, G. R. (1993). Corporate codes of ethics: Purpose, process and content issues. Business and Society, 32, 44–58.
go back to reference Welsh, B. C., & Farrington, D. P. (2000). Costs and benefits of crime prevention programs. Crime and Justice, 27, 305–361. Welsh, B. C., & Farrington, D. P. (2000). Costs and benefits of crime prevention programs. Crime and Justice, 27, 305–361.
Metadata
Title
Technology Regulation Policy for Business Ethics: An Example of RFID in Supply Chain Management
Authors
Wei Zhou
Selwyn Piramuthu
Publication date
01-08-2013
Publisher
Springer Netherlands
Published in
Journal of Business Ethics / Issue 2/2013
Print ISSN: 0167-4544
Electronic ISSN: 1573-0697
DOI
https://doi.org/10.1007/s10551-012-1474-4

Other articles of this Issue 2/2013

Journal of Business Ethics 2/2013 Go to the issue