Fear Commerce: Inflationary Effects of Global Security Initiatives

ABSTRACT In the execution of their stewardship, governments and organizations gather information to identify people of interest and ensure that only authorized persons have access to only those locations and resources to which they are authorized. Historically, in most democratic societies, there have been relatively few restrictions placed on access to resources (Benería & Bisnath, 2004). More recently, there has been a migration towards broader information gathering by governmental and civil authorities beyond the identification of persons, and a greater emphasis placed on controls that restrict access, along with increasing regulation and legislation for processes, procedures, and requirements for permits (D'Urso, 2006). In this manuscript, we synthesize a theory that links governmental with commercial initiatives to draw some implications for managers to consider relative to the organizational impacts.

[1]  Charles S. Taber,et al.  Threat, Anxiety, and Support of Antiterrorism Policies , 2005 .

[2]  John F. Canny,et al.  The Future of Human-Computer Interaction , 2006, ACM Queue.

[3]  Anja J E Dirkzwager,et al.  The role of the media and media hypes in the aftermath of disasters. , 2005, Epidemiologic reviews.

[4]  J. Braithwaite,et al.  Global Business Regulation , 2001 .

[5]  Keven G. Ruby,et al.  The Insider Threat to Information Systems , 2022 .

[6]  L. Benería,et al.  Global tensions : challenges and opportunities in the world economy , 2004 .

[7]  Thomas Keneally,et al.  The Fear , 1965 .

[8]  Inspector General,et al.  Program and Management Improvement Recommendations Department of Health and Human Services Office of Inspector General The Orange Book , 2000 .

[9]  Yaman Akdeniz,et al.  The Internet, Law and Society , 2001 .

[10]  Brian H. Kleiner,et al.  Electronic surveillance in the workplace , 2003 .

[11]  L. Cranor,et al.  Rethinking Rights and Regulations: Institutional Responses to New Communications Technologies , 2003 .

[12]  Scott C. D'Urso,et al.  Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations , 2006 .

[13]  John R. Aiello,et al.  Computer‐Based Work Monitoring: Electronic Surveillance and Its Effects , 1993 .

[14]  S. Kozlowski,et al.  A Typology of Virtual Teams , 2002 .

[15]  Stefan Linnhoff,et al.  The Emergence of Biometrics and Its Effect on Consumers , 2005 .

[16]  N. Fairweather Surveillance in Employment: The Case of Teleworking , 1999 .

[17]  Peter Fischer,et al.  Terror salience and punishment: Does terror salience induce threat to social order? , 2007 .

[18]  M. A. Sey,et al.  Mobile Communication and Society: A Global Perspective (Information Revolution & Global Politics) , 2006 .

[19]  W. Sine,et al.  Revisiting Burns And Stalker: Formal Structure And New Venture Performance In Emerging Economic Sectors , 2006 .

[20]  Jeffrey M. Stanton,et al.  Analysis of end user security behaviors , 2005, Comput. Secur..

[21]  Pramod K. Nayar,et al.  Human rights in the global information society , 2007, J. Assoc. Inf. Sci. Technol..

[22]  John S. Seiter,et al.  Persuasion: Social Inflence and Compliance Gaining , 2015 .

[23]  National Identification System : Do We Need One ? , 2005 .

[24]  Joy L. Hart,et al.  Workplace Surveillance and Managing Privacy Boundaries , 2007 .

[25]  David Holman,et al.  The Effects of Performance Monitoring on Emotional Labor and Well-Being in Call Centers , 2002 .

[26]  D. Davis,et al.  Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America , 2004 .

[27]  Mark R. Joslyn,et al.  Sociotropic Concerns and Support for Counterterrorism Policies , 2007 .

[28]  Charles Oppenheim,et al.  Legal aspects of the web , 2005, Annu. Rev. Inf. Sci. Technol..

[29]  Dhavan V. Shah,et al.  Expressive Responses to News Stories about Extremist Groups: a Framing Experiment , 2022 .