{"id":145,"date":"2020-12-17T12:01:27","date_gmt":"2020-12-17T12:01:27","guid":{"rendered":"https:\/\/gustavs.se\/intra\/?p=145"},"modified":"2021-01-11T09:46:48","modified_gmt":"2021-01-11T09:46:48","slug":"nine-perspectives-on-the-intrapreneur-as-an-insider-threat","status":"publish","type":"post","link":"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/","title":{"rendered":"Nine perspectives on the intrapreneur as an insider threat"},"content":{"rendered":"\n<p>Risk is acknowledged as a salient or even inherent feature of innovation and exploration in organizations<span id='easy-footnote-1-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-1-145' title='Antoncic, B. &amp;amp; Hisrich, R. D. (2003) \u201dClarifying the intrapreneurship concept\u201d, &lt;em&gt;Journal of Small Business and Enterprise Development&lt;\/em&gt;, 10:1, 2003, pp. 7-24, &lt;a href=&quot;https:\/\/doi.org\/10.1108\/14626000310461187&quot;&gt;DOI&lt;\/a&gt;, p. 17'><sup>1<\/sup><\/a><\/span><span id='easy-footnote-2-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-2-145' title='Schumpeter, J. A. (2003), &lt;em&gt;Capitalism, Socialism &amp;amp; Democracy&lt;\/em&gt;, Routledge, &lt;a href=&quot;https:\/\/www.worldcat.org\/title\/capitalism-socialism-and-democracy\/oclc\/1191049227?referer=di&amp;amp;ht=edition&quot;&gt;URL&lt;\/a&gt; (Original work published in 1942)'><sup>2<\/sup><\/a><\/span><span id='easy-footnote-3-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-3-145' title='Antoncic, B. (2003), \u201dRinsiisk taking in intrapreneurship: translating the individual level risk aversion into the organizational risk taking&amp;#8221;, &lt;em&gt;Journal of Enterprising Culture&lt;\/em&gt;, 11:1, March 2003, p. 1-23, &lt;a href=&quot;https:\/\/doi.org\/10.1142\/S0218495803000020&quot;&gt;DOI&lt;\/a&gt;'><sup>3<\/sup><\/a><\/span>. However, the risks\u2019 nature and consequences are often less explored than other features of intrapreneurship and intra-organizational innovation. <br><br>In fact, my main reason for starting this blog is to find more research on the risks involved in intrapreneurship and how they can be understood.<\/p>\n\n\n\n<p>Below, I have compiled nine different conceptual frameworks \u2013 or perspectives \u2013 that might facilitate the understanding of the intrapreneur as an insider threat.<\/p>\n\n\n\n<p>Before we proceed, I would like to define the two most central terms:<br><strong>Insider threat: <\/strong><em>\u201dSomeone who, through authorized access to an organization\u2019s resources, has the potential to negatively affect the organization, its purpose and\/or its stakeholders, and risk doing so.\u201d<\/em><br><strong>Intrapreneurs:<\/strong> <em>\u201dPeople who use their entrepreneurial spirit for the benefit of their employers, and whilst supported by sponsors higher up in their organization also tend to evade their organizations&#8217; control systems and\/or resource management to achieve their missions.\u201d<\/em><\/p>\n\n\n\n<p>So, to be clear, insider threats \u2013 in my definition \u2013 need not be harmful or malicious to pose a threat.<\/p>\n\n\n\n<p>Also, as this is part of my thesis work in <a href=\"https:\/\/www.svet.lu.se\/en\/about-us\/three-subjects-one-building\/intelligence-analysis\" target=\"_blank\" rel=\"noopener\">intelligence analysis<\/a>, I am particularly interested in how these questions apply to the intelligence services in general and more specifically to the U.S. intelligence community (USIC). Later, I&#8217;ll explore <a href=\"https:\/\/en.wikipedia.org\/wiki\/Intellipedia\" target=\"_blank\" rel=\"noopener\">Intellipedia<\/a> as a typical case of intrapreneurship in this context.<\/p>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">Before and after each presentation of a perspective, you&#8217;ll see my personal comments on how this perspective relate to the question of intrapreneurs in a grey box.<\/p>\n\n\n\n<p>As a short guide to the nine perspectives, here are a short summary:<\/p>\n\n\n\n<p><strong><a href=\"#intrapreneur-risk\">Personal risk vs. organizational risk<\/a> <\/strong><br>Here, four potential approaches to risks in intrapreneurial ventures are explored.<\/p>\n\n\n\n<p><a href=\"#Negative spillover from intrapreneurship\"><strong>Negative spillover: Brain drain<\/strong> <\/a><br>This was the only negative spillover from intrapreneurship that I could find any elaborate research on: how intrapreneurs might be recruited by competing organizations, how that risk might be mitigated legally and the potential consequences of such legal measures.<\/p>\n\n\n\n<p><a href=\"#Infosec threatened by intrapreneurship\"> <strong>Information security \u2013 a compromise<\/strong> <\/a><br>As I investigate the USIC and the intelligence sharing platform Intellipedia, this is a central question. However, I would argue that the perspective offered here is applicable to most intrapreneurial ventures, even if the relevance is particularly strong for intelligence services.<\/p>\n\n\n\n<p><strong><a href=\"#ambidextrous-organizations-and-shadow-innovation-intrapreneurship\">Ambidextrous organizations and shadow innovation<\/a><\/strong><br>The balance between exploration (innovation) and exploitation in organization can be described as an ambidextrous act. In this section, I describe how recent findings suggest that the balance is not (entirely) in the two hands of upper management but enacted through shadow innovation (exploration) and efficiency creep (exploitation) in lower levels of the organization.<\/p>\n\n\n\n<p><strong><a href=\"#Evasive-entrepreneurship\">Evasive entrepreneurship<\/a><\/strong><br>I suggest some parallells between the concepts of (threatening) evasive entrepreneurship and shadow innovation or \u201dintrapreneurship after dark\u201d.<\/p>\n\n\n\n<p><strong><a href=\"#Digital transformation &amp; intrapreneurship\">Transformational intrapreneurship<\/a><br><\/strong>Intrapreneuring might be regarded as an existential threat by incumbent players in an organization if its effects are transformational. In studying how adoption of digital tools transforms organizations (and how organizations transform to enable such tools), such a threat perception might be better understood.<\/p>\n\n\n\n<p><strong><a href=\"#Entrepreneurs as deviant employees\">Employee Deviance in organizations<\/a><br><\/strong>Intrapreneuring are more or less \u201dbehavioral departures from norms of a reference group\u201d, a definition of employee deviance. This, in turn, is more or less the definition of the insider threat of \u201dcounterproductive work behaviors\u201d (CWB). Here, a way to distinguish between constructive and destructive deviance is offered.<br><br><strong><a href=\"#Sub-cultures on the tactical\/operative level &amp; Intrapreneurship\">Tactical-level subcultures<\/a><\/strong><br>Intrapreneurial behaviour in war \u2013 i.e. deviations from rules of engagement or other protocol to achieve a tactical advantages \u2013 is explained as a form of street-level bureaucracy depending on tactical-level subcultures. This concept might also be applicable under less chaotic circumstances than the fog of war.<br><br><strong><a href=\"#Ethics of Espionage &amp; Intrapreneuring\">Ethics of Espionage<\/a><\/strong><br>Finally, some industry-specific deliberations on right and wrong are considered for guidance on how to assess whether intrapreneurial transgressions are justified or not.<\/p>\n\n\n\n<p class=\"has-text-align-center\">\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013<\/p>\n\n\n\n<h3 id=\"intrapreneur-risk\">Personal risk vs. organizational risk<\/h3>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">Intrapreneurship is pitched to employees \u201das a way to capture the creativity and excitement of entrepreneurship, albeit with more resources and less risk\u201d<span id='easy-footnote-4-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-4-145\" title=\"Pinchot, G. &amp;amp; Soltanifar, M. (2021) \u201cDigital Intrapreneurship: The Corporate Solution to a Rapid Digitalisation\u201d. In: Soltanifar M., Hughes M., G\u00f6cke L. (eds) &lt;em&gt;Digital Entrepreneurship. Future of Business and Finance&lt;\/em&gt;, Springer, &lt;a href=&quot;https:\/\/doi.org\/10.1007\/978-3-030-53914-6_12&quot;&gt;DOI&lt;\/a&gt;\"><sup>4<\/sup><\/a><\/span><em>. <\/em>But are intrapreneurs really less prone to put themselves at risk than their organization and its assets, or more so compared to entrepreneurs? Whilst this study fails to answer that question, it does contribute with several useful ways to understand and explain intrapreneurships relations to risk<em>.<\/em><\/p>\n\n\n\n<p>Recognizing that risk is \u201dan inherent characteristic of innovativeness\u201d<span id='easy-footnote-5-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-5-145\" title=\"Antoncic, B. (2003), \u201dRisk taking in intrapreneurship: translating the individual level risk aversion into the organizational risk taking&#8221;, &lt;em&gt;Journal of Enterprising Culture&lt;\/em&gt;, 11:1, March 2003, p. 3, &lt;a href=&quot;https:\/\/doi.org\/10.1142\/S0218495803000020&quot;&gt;DOI&lt;\/a&gt;\"><sup>5<\/sup><\/a><\/span>, <a href=\"http:\/\/bostjanantoncic.si\/\" target=\"_blank\" rel=\"noopener\"><strong>Bostjan Antoncic<\/strong><\/a> \u2013 a <a href=\"https:\/\/scholar.google.com\/citations\" target=\"_blank\" rel=\"noopener\">prolific publisher<\/a> of research on intrapreneuring \u2013 investigated <a href=\"https:\/\/doi.org\/10.1142\/S0218495803000020\" target=\"_blank\" rel=\"noopener\"><em>Risk taking in intrapreneurship: Translating the individual level risk aversion into the organizational risk taking<\/em><\/a> (2003). He proposed a method for examining his question \u201dhow is it possible that risk averse individuals act in such a way that an organization exercises risk taking behavior in terms of intrapreneurship\u201d based on four \u201dcongruent and complementary&#8221;<span id='easy-footnote-6-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-6-145\" title=\"Antoncic, B. (2003), \u201dRisk taking in intrapreneurship: translating the individual level risk aversion into the organizational risk taking&#8221;, &lt;em&gt;Journal of Enterprising Culture&lt;\/em&gt;, 11:1, March 2003, p. 16, &lt;a href=&quot;https:\/\/doi.org\/10.1142\/S0218495803000020&quot;&gt;DOI&lt;\/a&gt;\"><sup>6<\/sup><\/a><\/span> theories around information processing (and excisting intrapreneurship literature):<\/p>\n\n\n\n<ol><li><strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Theory_of_planned_behavior\" target=\"_blank\" rel=\"noopener\">Theory of planned behavior<\/a>:<\/strong> Individuals base their decisions on salient beliefs.<\/li><li><strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Prospect_theory\" target=\"_blank\" rel=\"noopener\">Prospect theory<\/a>: <\/strong>Individuals base their decisions on perceptions of information.<\/li><li><strong><a href=\"https:\/\/www.investopedia.com\/terms\/a\/agencytheory.asp\" target=\"_blank\" rel=\"noopener\">Agency theory<\/a>: <\/strong>Individuals base their decisions on information availability related to financial relationships in their organizations.<\/li><li><strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Organizational_culture\" target=\"_blank\" rel=\"noopener\">Organizational culture perspective<\/a>: <\/strong>Individuals base their decisions on information availability related to non-financial relationships in their organizations.<\/li><\/ol>\n\n\n\n<p>Antoncic concluded that his model shows that:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p><em>risk taking propensity as a general enduring psychological characteristic tends not to impact context specific risk-related cognitions and behaviours<\/em><\/p><cite>Bostjan Antoncic, \u201dRisk taking in intrapreneurship: Translating the individual level risk aversion into the organizational risk taking\u201d<span id='easy-footnote-7-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-7-145\" title=\"Antoncic, B. (2003), \u201dRisk taking in intrapreneurship: translating the individual level risk aversion into the organizational risk taking&#8221;, &lt;em&gt;Journal of Enterprising Culture&lt;\/em&gt;, 11:1, March 2003, p. 17, &lt;a href=&quot;https:\/\/doi.org\/10.1142\/S0218495803000020&quot;&gt;DOI&lt;\/a&gt;\"><sup>7<\/sup><\/a><\/span><\/cite><\/blockquote>\n\n\n\n<p>In essence, a careful person needn&#8217;t be careful in all situations. <\/p>\n\n\n\n<p>Antoncic opens for the possibility that the premise for his article is not to be found: <em>\u201dA radical conclusion [\u2026] might be that the risk paradox does not exist, since it apparently disappeared through the conceptual analysis&#8221;<\/em>, but suggests the <em>&#8220;more moderate explanation, that seems more plausible\u201d<\/em> that there is indeed a paradox, but that it doesn&#8217;t disturbe or harm organizational life or performance.<\/p>\n\n\n\n<p>Antoncic recognizes that his approach (as its underlying theories) stipulate that individuals are \u201drelatively rational decision-makers in bounds of available information that shapes their cognitions and in turn their behaviours\u201d<span id='easy-footnote-8-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-8-145\" title=\"Antoncic, B. (2003), \u201dRisk taking in intrapreneurship: translating the individual level risk aversion into the organizational risk taking&#8221;, &lt;em&gt;Journal of Enterprising Culture&lt;\/em&gt;, 11:1, March 2003, p. 16, &lt;a href=&quot;https:\/\/doi.org\/10.1142\/S0218495803000020&quot;&gt;DOI&lt;\/a&gt;\"><sup>8<\/sup><\/a><\/span>.<\/p>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">The question of organizational risk vs. personal risk is very interesting from an insider threat-perspective. However, the premise of this thesis might not that relevant to study the insider threat-perspective. Whether or not there is, generally, a paradox between organizational risk taking propensity and personal risk aversion is &#8211; to me &#8211; less relevant than the perception of organizational risk taking. However, as Antoncic notes, one can argue that <em>\u201drisk taking behavior basically resides at the level of an individual even if it is finally translated into the firm&#8217;s risk taking behavior\u201d<\/em>. The fact that the paradox does not seem to be <em>\u201ddisturbing and harmful for organizational life and performance\u201d<\/em> might, if it stands, suggest that is doesn&#8217;t matter that much.<\/p>\n\n\n\n<p class=\"has-text-align-center\">\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013<\/p>\n\n\n\n<h3 id=\"Negative spillover from intrapreneurship\">Negative spillover: Brain drain<\/h3>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">Since this is the only example I have found that explicitly adresses a threat from intrapreneurship, this contribution a given item on my list of concepts and conceptual frameworks:<\/p>\n\n\n\n<p>Law Professor <strong><a href=\"https:\/\/scholar.google.com\/citations?user=rVUsExMAAAAJ&amp;hl=en\" target=\"_blank\" rel=\"noopener\">Mirit Eyal-Cohen<\/a><\/strong><span id='easy-footnote-9-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-9-145\" title=\"Eyal-Cohen, M. (2019): \u201cInnovation Agents\u201d, &lt;em&gt;Washington &amp;amp; Lee Law Review&lt;\/em&gt;, &lt;a href=&quot;https:\/\/scholarlycommons.law.wlu.edu\/wlulr\/vol76\/iss1\/6&quot;&gt;URL&lt;\/a&gt;\"><sup>9<\/sup><\/a><\/span> has explored the negative spillovers of intrapreneurial activities by &#8220;<a href=\"https:\/\/scholarlycommons.law.wlu.edu\/wlulr\/vol76\/iss1\/6\" target=\"_blank\" rel=\"noopener\">Innovation Agents<\/a>&#8220;. She identified the loss of intrapreneurial talent and intellectual property either to incumbent competitors or new ventures, and the subsequent restrictive and wasteful arrangements to mitigate such risks, as potential negative spillovers of intrapreneurial firms.<\/p>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">This perspective is perhaps most interesting from a recruitment opportunity perspective for intelligence services. Apart from the threat of loosing resources like competence when employees leave an organization, an embittered intrapreneur could perhaps be recruited to a competing organization or state. To a host organization, managing expectations, needs and failures of intrapreneurs could be a matter of security. To a competing actor, areas of conflict around failed or threatening intrapreneurial ventures might present opportunities. Also, the fact that Bulmash &amp; Winokur<span id='easy-footnote-10-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-10-145\" title=\"Bulmash, B and Winokur, M. (2020) &#8220;Entrepreneurial passion and turnover intentions: The role of intrapreneurship opportunities and risk tolerance&#8221;, 2020 &lt;em&gt;IEEE International Conference on Industrial Technology (ICIT)&lt;\/em&gt;, p. 1205-1209, &lt;a href=&quot;https:\/\/doi.org\/10.1109\/ICIT45562.2020.9067259&quot;&gt;DOI&lt;\/a&gt;\"><sup>10<\/sup><\/a><\/span> didn&#8217;t mention Eyal-Cohen in their article, might serve as proof that the research field of intrapreneurship is still fragmented. Bulmash &amp; Winokur <a href=\"https:\/\/doi.org\/10.1109\/ICIT45562.2020.9067259\" target=\"_blank\" rel=\"noopener\">linked intrapreneurship opportunities with employers to lower employee turnover intention<\/a>.<\/p>\n\n\n\n<p class=\"has-text-align-center\">\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013<\/p>\n\n\n\n<h3 id=\"Infosec threatened by intrapreneurship\">Information Security &#8211; a compromise<\/h3>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">Information security is one feature of the U.S. Intelligence Community identified as competing with intrapreneurial endeavours. It is specifically relevant to the Intellipedia case as well.<\/p>\n\n\n\n<p>Javorsek et al.<span id='easy-footnote-11-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-11-145\" title=\"Javorsek, D. II, Rose, J., Marshall, C. &amp;amp; Leitner, P. (2015) \u201dA Formal Risk-Effectiveness Analysis Proposal for the Compartmentalized Intelligence Security Structure\u201d, &lt;em&gt;International Journal of Intelligence and CounterIntelligence&lt;\/em&gt;, 28:4, 734-761, &lt;a href=&quot;https:\/\/doi.org\/10.1080\/08850607.2015.1051830&quot;&gt;DOI&lt;\/a&gt;\"><sup>11<\/sup><\/a><\/span> recognized that \u201dthe scientific advantage upon which U.S. military dominance relies\u201d is threatened by the costs of compartmentalization. Javorsek et al.<span id='easy-footnote-12-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-12-145\" title=\"Javorsek, D. II, Rose, J., Marshall, C. &amp;amp; Leitner, P. (2015) \u201dA Formal Risk-Effectiveness Analysis Proposal for the Compartmentalized Intelligence Security Structure\u201d, &lt;em&gt;International Journal of Intelligence and CounterIntelligence&lt;\/em&gt;, 28:4, 734-761, &lt;a href=&quot;https:\/\/doi.org\/10.1080\/08850607.2015.1051830&quot;&gt;DOI&lt;\/a&gt;, p. 736\"><sup>12<\/sup><\/a><\/span> identifies four major repercussions with \u201dover-compartmentalization\u201d of knowledge:<\/p>\n\n\n\n<ol><li>Intelligence consumers must rely on sub-optimal intelligence products for foreign policy decisions, as analysts are denied access to compartmented information.<\/li><li>Resources are wasted on parallel but independent development projects.<\/li><li>It limits the collective intellectual ability for problem solving.<\/li><li>It inhibits communication between the tactical and strategic level, preventing effective knowledge sharing during development and employment.&nbsp;&nbsp;<\/li><\/ol>\n\n\n\n<p>Quoting Kitrosser<span id='easy-footnote-13-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-13-145\" title=\"Kitrosser, H., \u201dCongressional Oversight of National Security Activities: Improving Information Funnels\u201d, &lt;em&gt;Cardozo Law Review&lt;\/em&gt;, 29:3, January 2008, pp. 1049-1090, &lt;a href=&quot;https:\/\/ssrn.com\/abstract=995014&quot;&gt;URL&lt;\/a&gt;\"><sup>13<\/sup><\/a><\/span>, Javorsek et al. recognizes that \u201dsecurity compartmentalization has both costs and associated benefits&#8221;. The candor argument brought forward by Kitrosser<span id='easy-footnote-14-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-14-145\" title=\"Kitrosser, H., \u201dCongressional Oversight of National Security Activities: Improving Information Funnels\u201d, &lt;em&gt;Cardozo Law Review&lt;\/em&gt;, 29:3, January 2008, pp. 1049-1090, &lt;a href=&quot;https:\/\/ssrn.com\/abstract=995014&quot;&gt;URL&lt;\/a&gt;, p. 1064\"><sup>14<\/sup><\/a><\/span> \u2013 that secrecy can further openness since \u201dcandor may more likely emerge in a closed, confidential conversation than in a public one\u201d \u2013 is seemingly ignored by Javorsek et al. when they conclude that compartmentalization equals \u201dincreasing costs in research and development\u201d<span id='easy-footnote-15-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-15-145\" title=\"Javorsek, D. II, Rose, J., Marshall, C. &amp;amp; Leitner, P. (2015) \u201dA Formal Risk-Effectiveness Analysis Proposal for the Compartmentalized Intelligence Security Structure\u201d, &lt;em&gt;International Journal of Intelligence and CounterIntelligence&lt;\/em&gt;, 28:4, 734-761, &lt;a href=&quot;https:\/\/doi.org\/10.1080\/08850607.2015.1051830&quot;&gt;DOI&lt;\/a&gt;, p. 736\"><sup>15<\/sup><\/a><\/span>. It\u2019s worth noting that Kitrosser\u2019s article addresses congressional oversight of national security activities, and not intra-organzational development per se. One might assume that Javorsek et al. considers the candor-argument less applicable to technological R&amp;D than intelligence analysis and intelligence operations, the fact that increased psychological safety affects team learning behavior<span id='easy-footnote-16-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-16-145\" title=\"Edmondson, A., (1999), \u201dPsychological Safety and Learning Behavior in Work Teams\u201d, &lt;em&gt;Administrative Science Quarterly&lt;\/em&gt;, 44:2, pp. 350-383, &lt;a href=&quot;http:\/\/www.jstor.org\/stable\/2666999&quot;&gt;URL&lt;\/a&gt;\"><sup>16<\/sup><\/a><\/span> aside. Kitrosser also concludes that \u201dThe purpose and utility of funneling have been under-explored, and funneling&#8217;s propriety and implications thus are poorly understood.\u201d<span id='easy-footnote-17-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-17-145\" title=\"Kitrosser, H., \u201dCongressional Oversight of National Security Activities: Improving Information Funnels\u201d, &lt;em&gt;Cardozo Law Review&lt;\/em&gt;, 29:3, January 2008, pp. 1049-1090, &lt;a href=&quot;https:\/\/ssrn.com\/abstract=995014&quot;&gt;URL&lt;\/a&gt;, p. 1050\"><sup>17<\/sup><\/a><\/span>.<\/p>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">The conflict between information sharing and information security is old but accentuated by digitalization. In the case of Intellipedia, it&#8217;s been central. <\/p>\n\n\n\n<p class=\"has-text-align-center\">\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013<\/p>\n\n\n\n<h3 id=\"ambidextrous-organizations-and-shadow-innovation-intrapreneurship\">Shadow innovation &#8211; intrapreneuring after dark<\/h3>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">In defining an insider threat as someone who, through authorized access to an organization\u2019s resources, has the potential to negatively affect that organization, its purpose and\/or its stakeholders (and risk doing so),  I want to highlight that a conflict about scarce resources  may not only be a competition for the use of such resources,  but also a conflict around the consequences of using them. The conceptual framework around \u201dAmbidextrous organizations\u201d and particularly the concepts of \u201defficiency creep\u201d and \u201dshadow innovation\u201d can be useful to understand the integration of information security, and information resource management\/enactment.<\/p>\n\n\n\n<p>Since the early 1990s, one popular approach to study and describe the balance between innovation and efficiency within organizations has been the notion of \u201dAmbidextrous organizations\u201d: where <em>exploration<\/em> is handled with one hand and <em>exploitation<\/em> with the other. March<span id='easy-footnote-18-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-18-145\" title=\"March, J. G. (1991). \u201dExploration and exploitation in organizational learning\u201d, &lt;em&gt;Organization Science&lt;\/em&gt;, 2:1, p. 71-87 (Institute of Management Sciences), &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/2634940&quot;&gt;URL&lt;\/a&gt;\"><sup>18<\/sup><\/a><\/span> concluded that <em>\u201d<\/em>Both exploration and exploitation are essential for organizations, but they compete for scarce resources\u201d.&nbsp;<\/p>\n\n\n\n<p>More recently, Magnusson, Koutsikouria &amp; P\u00e4iv\u00e4rinta<span id='easy-footnote-19-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-19-145\" title=\"Magnusson, J., Koutsikouria, D. &amp;amp; P\u00e4iv\u00e4rinta, T. (2020), \u201dEfficiency creep and shadow innovation: enacting ambidextrous IT Governance in the public sector\u201d, &lt;em&gt;European Journal of Information Systems&lt;\/em&gt;, &lt;a href=&quot;https:\/\/doi.org\/10.1080\/0960085X.2020.1740617&quot;&gt;DOI&lt;\/a&gt;\"><sup>19<\/sup><\/a><\/span> found in studying IT governance in the Swedish Tax Authority (Skatteverket) a \u201dsubstantial misalignment of the tactical vs. the strategic and operative layers\u201d. Whereas the strategic intent and the actual outcome aligned fairly well, project goals set by middle management all but eradicated exploration in favour of exploitation.The authors explained this as <em>enactment<\/em> (rather than management or design) of ambidextrous IT Governance, where \u201defficiency creep\u201d in the middle layer is balanced by \u201dshadow innovation\u201d in the bottom layer in the organization\u2019s hierarchy.<\/p>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">This could indicate that there is indeed need for exploration intent to \u201dgo through the \u2018clay layer\u2019 of middle managers who are usually driven so hard to achieve short-term goals in established systems that they have no time for new ideas\u201d, as Pinchot &amp; Soltanifar suggests<span id='easy-footnote-20-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-20-145\" title=\"Pinchot, G. &amp;amp; Soltanifar, M. (2021) \u201cDigital Intrapreneurship: The Corporate Solution to a Rapid Digitalisation\u201d. In: Soltanifar M., Hughes M., G\u00f6cke L. (eds) &lt;em&gt;Digital Entrepreneurship&lt;\/em&gt;, Future of Business and Finance, Springer, &lt;a href=&quot;https:\/\/doi.org\/10.1007\/978-3-030-53914-6_12&quot;&gt;DOI&lt;\/a&gt;, p. 240\"><sup>20<\/sup><\/a><\/span><em>.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013<\/p>\n\n\n\n<h3 id=\"Evasive-entrepreneurship\">Evasive entrepreneurship<\/h3>\n\n\n\n<p>A related field of research is that of evasive entrepreneurship. This pertains to companies&#8217; relations to societies.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p>We define evasive entrepreneurship as profit-driven business activity in the market aimed at circumventing the existing institutional framework by using innovations to exploit contradictions in that framework.<\/p><cite>Niklas Elert &amp; Magnus Henrekson<span id='easy-footnote-21-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-21-145\" title=\"Elert, N., Henrekson, M. (2016), \u201dEvasive entrepreneurship\u201d, &lt;em&gt;Small Business Economics&lt;\/em&gt;, 47, 95\u2013113, &lt;a href=&quot;https:\/\/doi.org\/10.1007\/s11187-016-9725-x&quot;&gt;DOI&lt;\/a&gt;\"><sup>21<\/sup><\/a><\/span><\/cite><\/blockquote>\n\n\n\n<p>(A complementary definition, one that I joted down and now can&#8217;t find the source of, is <em>\u201dit&#8217;s when a company circumvents a society&#8217;s institutional framework (by exploiting regulatory vacuum, vagueness or incompetence) in order to achieve its goals.\u201d<\/em>)<\/p>\n\n\n\n<p>Giving a number of examples, Elert &amp; Henrekson concludes that while evasive entrepreneurship can be either productive, unproductive or destructive, it can also challenge status quo through disruption.<\/p>\n\n\n\n<p>Just this April, US libertarian think tank Cato Institute <a href=\"https:\/\/www.cato.org\/books\/evasive-entrepreneurs-future-governance\" target=\"_blank\" rel=\"noopener\">published a paperback in praise of evasive entrepreneurship<\/a>, but these thoughts aren&#8217;t new \u2013 overt evasion has been labeled and studied as <a href=\"https:\/\/www.jstor.org\/stable\/pdf\/23862385.pdf\" target=\"_blank\" rel=\"noopener\">corporate disobedience<\/a><span id='easy-footnote-22-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-22-145\" title=\"Dennis, M., Rowan, K., Feinberg, R., Widdows, R., &amp;amp; Crable, R. (1994), \u201dCorporate civil disobedience in the consumer interest\u201d, Advancing the Consumer Interest, 6:2, p. 16-20, &lt;a href=&quot;https:\/\/www.jstor.org\/stable\/23862385&quot;&gt;URL&lt;\/a&gt;\"><sup>22<\/sup><\/a><\/span>, for example.<\/p>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">As observations and findings on evasive intrapreneurship or corporate civil disobedience might, at least in some cases, translate to intrapreneurs&#8217; relations to their organizations, this could be a rewarding field to explore for someone interested in intrapreneurial shadow innovation(i.e. unsanctioned innovation activities<span id='easy-footnote-23-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-23-145\" title=\"as defined by: Magnusson, J., Koutsikouria, D. &amp;amp; P\u00e4iv\u00e4rinta, T., \u201dEfficiency creep and shadow innovation: enacting ambidextrous IT Governance in the public sector\u201d, &lt;em&gt;European Journal of Information Systems&lt;\/em&gt;, &lt;a href=&quot;https:\/\/doi.org\/10.1080\/0960085X.2020.1740617&quot;&gt;DOI&lt;\/a&gt;\"><sup>23<\/sup><\/a><\/span>).  One can be tempted to use a term like \u201dEvasive intrapreneurship\u201d to describe shadow innovation. That might  be a tautology though. Pinchot, who coined the term intrapreneur, recognized that intrapreneurs \u201droutinely bootleg company resources or &#8216;steal&#8217; company time to work on their own missions\u201d<span id='easy-footnote-24-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-24-145\" title=\"Pinchot, G. (1985) &lt;em&gt;Intrapreneuring: Why you don\u2019t have to leave the corporation to become an entrepreneur&lt;\/em&gt;, Harper &amp;amp; Row, ISBN: 0060913355, p. xi, &lt;a href=&quot;https:\/\/www.worldcat.org\/title\/intrapreneuring\/oclc\/951297915&amp;amp;referer=brief_results&quot;&gt;URL&lt;\/a&gt;\"><sup>24<\/sup><\/a><\/span>.<\/p>\n\n\n\n<p class=\"has-text-align-center\">\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013<\/p>\n\n\n\n<h3 id=\"Digital transformation &amp; intrapreneurship\">Transformational intrapreneurship<\/h3>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">This conceptual framework can help understand the effects of intrapreneurship, and how a digital intrapreneurial venture can threaten existing organizational life. Digital transformation is particularly relevant in contemporary research of intelligence services as \u201dIt is only a small exaggeration to say that software has eaten just about everything in the [U.S. intelligence community]\u201d<span id='easy-footnote-25-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-25-145\" title=\"STAR, U.S. House Permanent Select Committee on Intelligence&#8217;s Subcommittee on Strategic Technologies and Advanced Research (2020), &lt;em&gt;Rightly Scaled, Carefully Open, Infinitely Agile: Reconfiguring to Win the Innovation Race in the Intelligence Community&lt;\/em&gt;, accessed December 5, 2020, &lt;a href=&quot;https:\/\/intelligence.house.gov\/uploadedfiles\/final_start_report_v4.pdf&quot;&gt;URL&lt;\/a&gt;\"><sup>25<\/sup><\/a><\/span>.<\/p>\n\n\n\n<p>Hinings, Gegenhuber &amp; Greenwood<span id='easy-footnote-26-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-26-145\" title=\"Hinings, B., Gegenhuber, T. &amp;amp; Greenwood, R. (2018), \u201dDigital innovation and transformation: An institutional perspective\u201d, &lt;em&gt;Information and Organization&lt;\/em&gt;, 28:1, p. 52-61, &lt;a href=&quot;https:\/\/doi.org\/10.1016\/j.infoandorg.2018.02.004&quot;&gt;DOI&lt;\/a&gt;\"><sup>26<\/sup><\/a><\/span> recognizes that digital transformation \u2013 \u201dthe combined effects of several digital innovations bringing about novel actors (and actor constellations), structures, practices, values, and beliefs\u201d \u2013 can threaten the existing \u201drules of the game\u201d in and for organizations. However, they also question the idea of total disruption, and suggest that existing literature on institutional change rather suggests that if and how new arrangements are accepted depend on already existing institutional arrangements.<\/p>\n\n\n\n<p>Hinings, Gegenhuber &amp; Greenwood, in citing Bitektine<span id='easy-footnote-27-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-27-145\" title=\"Bitektine, A. (2011), \u201dToward a theory of social judgments of organizations: the case of legitimacy, reputation, and status\u201d, &lt;em&gt;Academy of Management Review&lt;\/em&gt;, 36:1, p 151\u2013179, &lt;a href=&quot;https:\/\/doi.org\/10.5465\/amr.2009.0382&quot;&gt;DOI&lt;\/a&gt;\"><sup>27<\/sup><\/a><\/span> and Suchman<span id='easy-footnote-28-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-28-145\" title=\"Suchman, M. (1995), \u201dManaging legitimacy: Strategic and institutional approaches\u201d, &lt;em&gt;Academy of Management Review&lt;\/em&gt;, 20:3, p. 571\u2013610, &lt;a href=&quot;https:\/\/doi.org\/10.2307\/258788&quot;&gt;DOI&lt;\/a&gt;\"><sup>28<\/sup><\/a><\/span> among others, recognizes that both accommodation marketplace Airbnb and crowdsourcing platform GalaxyZoo (now Zoouniverse) were accepted by existing institutions because they were developed and promoted \u201dusing language that aligned them with [&#8230;] organizations\/industries that already had legitimacy\u201d<span id='easy-footnote-29-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-29-145\" title=\"Hinings, B., Gegenhuber, T. &amp;amp; Greenwood, R. (2018), \u201dDigital innovation and transformation: An institutional perspective\u201d, &lt;em&gt;Information and Organization&lt;\/em&gt;, 28:1, p. 52-61, &lt;a href=&quot;https:\/\/doi.org\/10.1016\/j.infoandorg.2018.02.004&quot;&gt;DOI&lt;\/a&gt;\"><sup>29<\/sup><\/a><\/span>. They propose that radical digital transformers, to be successful, seek legitimacy through and in the institutions that they challenge, often by imitating them to some extent.<\/p>\n\n\n\n<p>To exemplify how \u201d<em>the difficulties of radical change spring from what is taken-for-granted in socio-cultural terms and the ways in which the legitimacy of particular ways of organizing become tied to issues of existing logics, power and interests<\/em>\u201d, the authors mention NASA&#8217;s shift towards \u201dopen innovation\u201d by crowdsourcing (citing Chesbrough<span id='easy-footnote-30-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-30-145\" title=\"Chesbrough, H. W. (2006), \u201dOpen innovation: A new paradigm for industrial organization\u201d, in Chesbrough, Vanhaverbeke, &amp;amp; West (Eds.), &lt;em&gt;Open innovation&lt;\/em&gt; (p. 1\u201312), Oxford University Press, &lt;a href=&quot;https:\/\/global.oup.com\/academic\/product\/open-innovation-9780199290727&quot;&gt;URL&lt;\/a&gt;\"><sup>30<\/sup><\/a><\/span>, Lakhani et al.<span id='easy-footnote-31-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-31-145\" title=\"Lakhani, K. R., Lifshitz-Assaf, H., &amp;amp; Tushman, M. L. (2013), \u201dOpen innovation and organizational boundaries: The impact of task decomposition and knowledge distribution on the locus of innovation\u201d, in A. Grandori (Ed.). &lt;em&gt;Handbook of economic organization: Integrating economic and organization theory&lt;\/em&gt;, p. 355\u2013382, MA: Edward Elgar Publishing, &lt;a href=&quot;https:\/\/www.e-elgar.com\/shop\/gbp\/handbook-of-economic-organization-9781782540250.html&quot;&gt;URL&lt;\/a&gt;\"><sup>31<\/sup><\/a><\/span>, and last but not least Lifshitz-Assaf<span id='easy-footnote-32-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-32-145\" title=\"Lifshitz-Assaf, H. (2017) \u201dDismantling Knowledge Boundaries at NASA: The Critical Role of Professional Identity in Open Innovation\u201d, &lt;em&gt;Administrative Science Quarterly&lt;\/em&gt;, 63:4, p: 746-782, &lt;a href=&quot;https:\/\/doi.org\/10.1177\/0001839217747876&quot;&gt;DOI&lt;\/a&gt;\"><sup>32<\/sup><\/a><\/span>). Lifshitz-Assaf concluded that \u201d<em>Only R&amp;D professionals who underwent identity refocusing work dismantled their boundaries, truly adopting the knowledge from outside and sharing their internal knowledge<\/em>\u201d, illustrating \u201d<em>the critical role of professional identity work in changing knowledge-work boundaries<\/em>\u201d<span id='easy-footnote-33-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-33-145\" title=\"Lifshitz-Assaf, H. (2017) \u201dDismantling Knowledge Boundaries at NASA: The Critical Role of Professional Identity in Open Innovation\u201d, &lt;em&gt;Administrative Science Quarterly&lt;\/em&gt;, 63:4, p: 746-782, &lt;a href=&quot;https:\/\/doi.org\/10.1177\/0001839217747876&quot;&gt;DOI&lt;\/a&gt;\"><sup>33<\/sup><\/a><\/span>.<\/p>\n\n\n\n<p>Earlier, Selander &amp; Jarvenpaa<span id='easy-footnote-34-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-34-145\" title=\"Selander, L. &amp;amp; Jarvenpaa, S. J. (2011), \u201dDigital Action Repertoires &amp;amp; Transforming a Social Movement Organization\u201d, &lt;em&gt;MIS Quarterly&lt;\/em&gt;, 40:2, p. 331-352, &lt;a href=&quot;https:\/\/doi.org\/10.25300\/MISQ\/2016\/40.2.03&quot;&gt;DOI&lt;\/a&gt;\"><sup>34<\/sup><\/a><\/span> have studied <em>the SMO of SMOs<\/em>: how Social Movement Organizations (SMOs) have changed their digital action repertoires for Social Media Optimization (SMO). They studied how those changes challenged the existing organization (Amnesty International) and observed a fraction between local team members and digital supporters of the organization, and how senior management and digital media employees tried to bridge that divide.<\/p>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">Of course, digital transformation of organizations is &#8211; like the other concepts explored here \u2013 not exclusive to intrapreneurship, neither is intrapreneurship necessarily digital. Digital innovations has however <em>\u201dopened the path for new intrapreneurial opportunities\u201d<\/em><span id='easy-footnote-35-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-35-145\" title=\"Pinchot G., Soltanifar M. (2021) \u201dDigital Intrapreneurship: The Corporate Solution to a Rapid Digitalisation\u201d, In: Soltanifar M., Hughes M., G\u00f6cke L. (eds) &lt;em&gt;Digital Entrepreneurship &#8211; Future of Business and Finance&lt;\/em&gt;, Springer, &lt;a href=&quot;https:\/\/doi.org\/10.1007\/978-3-030-53914-6_12&quot;&gt;DOI&lt;\/a&gt;\"><sup>35<\/sup><\/a><\/span><em> <\/em>and can be assumed to play a part in many contemporary intrapreneurial ventures, in and outside of the intelligence services.<\/p>\n\n\n\n<p class=\"has-text-align-center\">\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013<\/p>\n\n\n\n<h3 id=\"Entrepreneurs as deviant employees\">Employee deviance in organizations<\/h3>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">Intrapreneurial ventures are deviations from organizational comme il faut. If successful, they help their hosts and can be deemed beneficial or constructive. If not, they might be harmful or destructive. This makes Warren&#8217;s article very interesting.<\/p>\n\n\n\n<p>Danielle E. Warren<span id='easy-footnote-36-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-36-145\" title=\"Warren, D. E., (2003), \u201dConstructive and destructive deviance in organizations\u201d, &lt;em&gt;Academy of Management Review&lt;\/em&gt;, 28:4, p. 622\u2013632, &lt;a href=&quot;https:\/\/doi.org\/10.2307\/30040751&quot;&gt;DOI&lt;\/a&gt;\"><sup>36<\/sup><\/a><\/span> defined employee deviance as &#8220;behavioral departures from norms of a reference group&#8221; and noted that it can cause &#8220;disastrous consequences for not only organizations but also entire industries and society\u201d, as well as bring about constructive change and help evade organizational failure or societal disaster, in 2003. She stressed the need for three advancements in the field of employee deviance for better scientific debate on the subject:<\/p>\n\n\n\n<ol><li><strong>Specify the reference group: <\/strong>Who or what is the behavior studied a deviation from? \u201dUltimately, the question &#8216;Deviant compared to what?&#8217; must be answered\u201d<span id='easy-footnote-37-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-37-145\" title=\"Warren, D. E., (2003), \u201dConstructive and destructive deviance in organizations\u201d, &lt;em&gt;Academy of Management Review&lt;\/em&gt;, 28:4, p. 623, &lt;a href=&quot;https:\/\/doi.org\/10.2307\/30040751&quot;&gt;DOI&lt;\/a&gt;\"><sup>37<\/sup><\/a><\/span>. <em>The reference group<\/em> is the social group associated with the formal (e.g. protocol) or informal (e.g. routines) norms from which a deviation is made. Warren hoped that better speficiation can benefit the second point on her wishlist, and also facilitate \u201didentification of conflicts between norms of multiple reference groups\u201d<span id='easy-footnote-38-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-38-145\" title=\"Warren, D. E., (2003), \u201dConstructive and destructive deviance in organizations\u201d, &lt;em&gt;Academy of Management Review&lt;\/em&gt;, 28:4, p. 623, &lt;a href=&quot;https:\/\/doi.org\/10.2307\/30040751&quot;&gt;DOI&lt;\/a&gt;\"><sup>38<\/sup><\/a><\/span>.<\/li><li><strong>Study a broader concept of deviant behaviours<\/strong>: Most existing literature on employee deviance was focused on <em>either<\/em> constructive <em>or<\/em> destructive deviance. According to Warren, this dichotomy is an obstruction towards more integrated contributions to science: <em>\u201dthe behaviors share a fundamental similarity: both require a departure from norms whereby employees must resist social pressure to conform. Further similarities appear in the theories and recommendations prescribed by proponents of the two views of deviance. For example, autonomy plays a role in both views.\u201d<\/em><span id='easy-footnote-39-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-39-145\" title=\"Warren, D. E., (2003), \u201dConstructive and destructive deviance in organizations\u201d, &lt;em&gt;Academy of Management Review&lt;\/em&gt;, 28:4, p. 622-623, &lt;a href=&quot;https:\/\/doi.org\/10.2307\/30040751&quot;&gt;DOI&lt;\/a&gt;\"><sup>39<\/sup><\/a><\/span><\/li><li><strong>Be explicit about on what normative foundations behavior is judged<\/strong>: Is national security, personnel safety, adherence to the rule of law or something else entirely the primary concern when deviance is evaluated? Warren refutes the idea that all departures from norms are destructive, claiming that \u201dsuch logic results in moral relativism, whereby the reference group dictates morality independent of all other outside groups\u201d (a counter argument to this might connect to Matt LeMay&#8217;s <em>\u201dChange the rules, don&#8217;t brake the rules\u201d<\/em>-principle of product management<span id='easy-footnote-40-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-40-145\" title=\"LeMay, M. (2017), &lt;em&gt;Product Management in Practice&lt;\/em&gt;, O&#8217;Reilly, ISBN: 9781491982273, &lt;a href=&quot;https:\/\/www.oreilly.com\/library\/view\/product-management-in\/9781491982266\/&quot;&gt;URL&lt;\/a&gt;\"><sup>40<\/sup><\/a><\/span>, which I&#8217;ll return to in a later post.) <br><br>Judging what departures are destructive or constructive (or simply unproductive) requires a clear and detailed position, Warren argues in her third appeal for advancements in the research field. For example: simply saying that illegal behavior is to be deemed destructive overlooks the complexity in firms that operate in many and sometimes conflicting legislations (the same can of course be said for most intelligence services). The argument that societal values should define what constitutes constructive deviance or not faces the same problem: what society&#8217;s norms and values should define this? And how are those values agreed upon in the first place?<br><br>To facilitate future judgment, Warren suggest using hypernorms, i.e. \u201dglobally held beliefs and values\u201d. In contrast to \u201duniversal norms\u201d, where a person or a group decides what the rest of the world should agree on, hypernorms could be explained as the \u201dleast common denominators\u201d of what all people want and need: food, freedom, and physical security for example.<\/li><\/ol>\n\n\n\n<blockquote class=\"wp-block-quote\"><p>In essence, these metanorms provide a global standard for evaluating behavior that extends beyond organizational and country-specific boundaries. The appeal of using hypernorms as a standard for judging workplace deviance lies in their inclusiveness and ease of empirical application.<\/p><cite>Danielle E. Warren<span id='easy-footnote-41-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-41-145\" title=\"Warren, D. E., (2003), \u201dConstructive and destructive deviance in organizations\u201d, &lt;em&gt;Academy of Management Review&lt;\/em&gt;, 28:4, p. 622-623, &lt;a href=&quot;https:\/\/doi.org\/10.2307\/30040751&quot;&gt;DOI&lt;\/a&gt;\"><sup>41<\/sup><\/a><\/span><\/cite><\/blockquote>\n\n\n\n<p>Hypernorms capture more than one normative approach to ethical theory, as they can encompass rights, justice, utilitarianism, duties, and virtue. They can be found by studying international organizations and practices, Warren argues.<\/p>\n\n\n\n<p>By mapping deviance and conformance with both a defined reference group (e.g. an intelligence community) and hypernorms (e.g. human rights), Warren comes up with a four field matrix consisting of constructive and destructive deviance, as well as constructive and destructive conformity:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"565\" height=\"190\" src=\"https:\/\/media6.gustavs.se\/2021\/01\/bild.png\" alt=\"\" class=\"wp-image-290\" srcset=\"http:\/\/media6.gustavs.se\/2021\/01\/bild.png 565w, http:\/\/media6.gustavs.se\/2021\/01\/bild-300x101.png 300w\" sizes=\"(max-width: 565px) 100vw, 565px\" \/><\/figure>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">To me, this is gold. If I was surprised that there wasn&#8217;t much research on intrapreneurs as insider threats, I am amazed to not find any research on the relation between intrapreneurship and employee deviance of any sort, let alone on the duality in destructive and constructive deviance in regards to intrapreneurship.  A common perspective of insider threat is that of \u201dcounterproductive work behaviors\u201d (CWB) that can be directed against the organization (CWB-O) or fellow individuals in it (CWB-I)<span id='easy-footnote-42-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-42-145\" title=\"INSA (2017) \u201dAssessing the mind of the malicious insider: using a behavioral model and data analytics to improve continuous evaluation\u201d, Intelligence and national security alliance, Security policy reform council, Insider threat subcommittee, &lt;a href=&quot;https:\/\/www.insaonline.org\/assessing-the-mind-of-the-malicious-insider-using-a-behavioral-model-and-data-analytics-to-improve-continuous-evaluation\/&quot;&gt;URL&lt;\/a&gt;\"><sup>42<\/sup><\/a><\/span><em>. <\/em>CWB can be defined as \u201demployee behavior that goes against the legitimate interests of the workplace\u201d<span id='easy-footnote-43-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-43-145\" title=\"INSA quoting Paul R. Sackett, P. R. &amp;amp; DeVore, C. J. (2005) \u201cCounterproductive Behaviors at Work\u201d, in &lt;em&gt;Handbook of Industrial, Work &amp;amp; Organizational Psychology, Volume 1: Personnel Psychology&lt;\/em&gt;, Eds. Anderson, N., Ones, D. S., Sinangil, H. K., &amp;amp; Viswesvaran, C., SAGE Publications, p. 145-164, &lt;a href=&quot;http:\/\/dx.doi.org\/10.4135\/9781848608320.n9&quot;&gt;DOI&lt;\/a&gt;\"><sup>43<\/sup><\/a><\/span><em> <\/em>and one of its dimensions is \u201ddeviance from accepted behavioral norms\u201d<span id='easy-footnote-44-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-44-145\" title=\"INSA (2017) \u201dAssessing the mind of the malicious insider: using a behavioral model and data analytics to improve continuous evaluation\u201d, Intelligence and national security alliance, Security policy reform council, Insider threat subcommittee, p. 5, &lt;a href=&quot;https:\/\/www.insaonline.org\/assessing-the-mind-of-the-malicious-insider-using-a-behavioral-model-and-data-analytics-to-improve-continuous-evaluation\/&quot;&gt;URL&lt;\/a&gt;\"><sup>44<\/sup><\/a><\/span>. <\/p>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">Oh, and please note that destructive conformity is not the same as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Malicious_compliance\" target=\"_blank\" rel=\"noopener\">malicious compliance<\/a> (not mentioned by Warren), as the latter describes employees carrying out orders with the knowledge and\/or intent that the consequences from their compliance will cause harm to their employer. Destructive conformity might serve the organization perfectly well, but it brakes hypernormative standards (e.g. by severely polluting a river).<\/p>\n\n\n\n<p class=\"has-text-align-center\">\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013<\/p>\n\n\n\n<h3 id=\"Sub-cultures on the tactical\/operative level &amp; Intrapreneurship\">Sub-cultures on the tactical\/operative level<\/h3>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">Intrapreneurial ventures, and institutional resistance against them, can only be designed and managed to a degree. Other factors might apply in the enactment of organizational floor, what the military calls the tactical level and civilian business calls the operative level. One such factor can be local subcultures.<\/p>\n\n\n\n<p>Ingesson<span id='easy-footnote-45-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-45-145\" title=\"Ingesson, T. (2016) \u201dThe politics of combat : the political and strategic impact of tactical-level subcultures, 1939-1995\u201d, &lt;em&gt;Lund University Publications&lt;\/em&gt;, &lt;a href=&quot;https:\/\/lup.lub.lu.se\/record\/f527e088-c68e-49f8-a6c8-13cfffcfb248&quot;&gt;URL&lt;\/a&gt;\"><sup>45<\/sup><\/a><\/span> argues that decisions of lower-level military commanders can have \u201dmajor political and strategic impact\u201d, and that these decisions are shaped by \u201dtactical-level subcultures\u201d. Ingesson suggests that the likelyhood of deviance or conformity can be predicted by measuring how well (or not) such subcultures align with official strategy and policy.<\/p>\n\n\n\n<p>The theory is developed as an alternative to \u2013 or perhaps synthesis of \u2013  two conflicting views prevailant in describing military dynamics:<\/p>\n\n\n\n<ol><li>That the rigid and unique military organization structure limits individual freedom<span id='easy-footnote-46-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-46-145\" title=\"As exemplified with \u201dFiner (&lt;a href=&quot;https:\/\/www.questia.com\/library\/7301219\/the-man-on-horseback-the-role-of-the-military-in&quot;&gt;1962&lt;\/a&gt;, p. 9), Huntington (&lt;a href=&quot;https:\/\/www.hup.harvard.edu\/catalog.php?isbn=9780674817364&quot;&gt;1985&lt;\/a&gt;, p. 59\u201360) or Abrahamsson (&lt;a href=&quot;https:\/\/www.worldcat.org\/title\/militarer-makt-och-politik\/oclc\/977135432&quot;&gt;1972&lt;\/a&gt;, p. 83)\u201d\"><sup>46<\/sup><\/a><\/span>, <\/li><li>That the military is shaped by the agency of non-conformant leaders<span id='easy-footnote-47-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-47-145\" title=\"As exemplified with \u201dSmedberg (&lt;a href=&quot;https:\/\/www.worldcat.org\/title\/krigforing-fran-austerlitz-till-bagdad\/oclc\/185184388&quot;&gt;2005&lt;\/a&gt;, p. 44), van Creveld (&lt;a href=&quot;https:\/\/www.worldcat.org\/title\/command-in-war\/oclc\/10949797&quot;&gt;1985&lt;\/a&gt;, p. 192) or Frankson and Zetterling (&lt;a href=&quot;https:\/\/www.worldcat.org\/title\/slaget-om-kursk-historiens-storsta-pansarslag\/oclc\/54098253&quot;&gt;2002&lt;\/a&gt;, p. 36\u201337\u201d\"><sup>47<\/sup><\/a><\/span>, \u201dtypically described as individualists and innovators\u201d, who are \u201dready to defy conventions and break old patterns\u201d.<span id='easy-footnote-48-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-48-145\" title=\"The latter perspective is exemplified with the narrative of Admiral Rodney&#8217;s \u201ddefiance of rules and norms\u201d in &lt;a href=&quot;https:\/\/en.wikipedia.org\/wiki\/Battle_of_the_Saintes&quot;&gt;1782&lt;\/a&gt;, when he had the audacity to deliberately disobey the Royal Navy&#8217;s &lt;em&gt;Permanent Fighting Instructions&lt;\/em&gt; and instead adapt to the tactical situation, resulting in \u201dmost successful British naval action in nearly eighty years\u201d.\"><sup>48<\/sup><\/a><\/span><\/li><\/ol>\n\n\n\n<blockquote class=\"wp-block-quote\"><p><em>The apparent clash between the automaton of the ideal type organization and the free agent of the military leader ideal illustrates the problematic dimensions inherent in both ideal types.<\/em><\/p><cite>Tony Ingesson, <a href=\"https:\/\/lup.lub.lu.se\/record\/f527e088-c68e-49f8-a6c8-13cfffcfb248\" target=\"_blank\" rel=\"noopener\">The politics of combat<\/a> (2016)<\/cite><\/blockquote>\n\n\n\n<p>Ingesson argues that both these perspectives are both problematic and suggests instead to see military leaders on the tactical level as street-level bureaucrats. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Street-level_bureaucracy\" target=\"_blank\" rel=\"noopener\">Street-level bureaucracy<\/a> is a concept introduced by Lipsky in 1980<span id='easy-footnote-49-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-49-145\" title=\"Lipsky, M. (2010). &lt;em&gt;Street-Level Bureaucracy: Dilemmas of the Individual in Public Services&lt;\/em&gt; (30th anniversary edition), Russell Sage Foundation, &lt;a href=&quot;https:\/\/www.russellsage.org\/publications\/street-level-bureaucracy&quot;&gt;URL&lt;\/a&gt;\"><sup>49<\/sup><\/a><\/span> where the street-level bureaucrat is defined as \u201da public service worker who interacts directly with citizens in the course of his or her job\u201d and through their \u201dsubstantial discretion in the execution\u201d and relative autonomy from organizational authority can \u201dmake policy\u201d.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p><em>In this manner, political policies with clearly expected results can be altered by the implementation of the street-level bureaucrats in such a manner that the outcome can diverge significantly from the expectations of the political decision-makers<\/em><\/p><cite>Tony Ingesson, <a href=\"https:\/\/lup.lub.lu.se\/record\/f527e088-c68e-49f8-a6c8-13cfffcfb248\" target=\"_blank\" rel=\"noopener\">The politics of combat<\/a> (2016)<\/cite><\/blockquote>\n\n\n\n<p>Because decision-making in war (fighting hostile, life-threatening adversaries with limited information, time to decide and other resources, but \u201dan infinity of petty circumstances\u201d<span id='easy-footnote-50-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-50-145\" title=\"Clausewitz cited by Ingesson; Clausewitz, C. (1832) [1997] \u201dOn war\u201d, Wordsworth (p. 66\u201367), &lt;a href=&quot;https:\/\/www.worldcat.org\/title\/on-war\/oclc\/723150635&quot;&gt;URL&lt;\/a&gt;\"><sup>50<\/sup><\/a><\/span> adding friction) is stressful and \u201dextraordinary difficult\u201d the street-level bureaucrats lean on subcultures, Ingesson argues<span id='easy-footnote-51-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-51-145\" title=\"Ingesson, T. (2016) \u201dThe politics of combat : the political and strategic impact of tactical-level subcultures, 1939-1995\u201d, &lt;em&gt;Lund University Publications&lt;\/em&gt;, p. 26, &lt;a href=&quot;https:\/\/lup.lub.lu.se\/record\/f527e088-c68e-49f8-a6c8-13cfffcfb248&quot;&gt;URL&lt;\/a&gt;\"><sup>51<\/sup><\/a><\/span>:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p><em>A tactical-level subculture is, in essence, a set of cultural norms, ideas and priorities, which are shared by the members of a military unit.<\/em><\/p><cite>Tony Ingesson, <a href=\"https:\/\/lup.lub.lu.se\/record\/f527e088-c68e-49f8-a6c8-13cfffcfb248\" target=\"_blank\" rel=\"noopener\">The politics of combat<\/a> (2016) <\/cite><\/blockquote>\n\n\n\n<p>An effective tactical-level subculture is coherrent (i.e. straightforward and without inherent contradictions) and agreed upon by its members. This is achieved through <em>focal points<\/em> such as a role model or tradition: \u201dWhen the members of a unit become confused as to how they should act, the focal point provides clarity\u201d<span id='easy-footnote-52-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-52-145\" title=\"Ingesson, T. (2016) \u201dThe politics of combat : the political and strategic impact of tactical-level subcultures, 1939-1995\u201d, &lt;em&gt;Lund University Publications&lt;\/em&gt;, p. 26, &lt;a href=&quot;https:\/\/lup.lub.lu.se\/record\/f527e088-c68e-49f8-a6c8-13cfffcfb248&quot;&gt;URL&lt;\/a&gt;\"><sup>52<\/sup><\/a><\/span>. As one example, Ingesson details how Swedish troops in Bosnia, 1993, had a \u201da strong heritage of formalized autonomy\u201d<span id='easy-footnote-53-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-53-145\" title=\"Ingesson, T. (2016) \u201dThe politics of combat : the political and strategic impact of tactical-level subcultures, 1939-1995\u201d, &lt;em&gt;Lund University Publications&lt;\/em&gt;, p. 237, &lt;a href=&quot;https:\/\/lup.lub.lu.se\/record\/f527e088-c68e-49f8-a6c8-13cfffcfb248&quot;&gt;URL&lt;\/a&gt;\"><sup>53<\/sup><\/a><\/span>, citing their tactical manual: <em>\u201cIndecisiveness and lack of action usually has more severe implications than if a commander makes a mistake regarding how to proceed\u201d<\/em><span id='easy-footnote-54-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-54-145\" title=\"&lt;em&gt;Arm\u00e9reglemente del 2: Taktik&lt;\/em&gt; (1982). M7741-100611, Chefen f\u00f6r arm\u00e9n och F\u00f6rsvarets l\u00e4romedelscentral, 6:12\"><sup>54<\/sup><\/a><\/span>. This helped build a \u201d<a href=\"https:\/\/thestrategybridge.org\/the-bridge\/2017\/9\/20\/trigger-happy-autonomous-and-disobedient-nordbat-2-and-mission-command-in-bosnia\" target=\"_blank\" rel=\"noopener\">Trigger-Happy, Autonomous, and Disobedient<\/a>\u201d tactical-level subculture that in turn help save civilian lives in spite of complicated and complicating rules of engagement.<\/p>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">Although intrapreneurship is routinely described as a individual activity, cultural factors are studied (e.g. Yun<span id='easy-footnote-55-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-55-145\" title=\"Yun, J.J.; Zhao, X.; Jung, K.; Yigitcanlar, T. (2020) \u201dThe Culture for Open Innovation Dynamics\u201d, &lt;em&gt;Sustainability&lt;\/em&gt;, 12:12, &lt;a href=&quot;https:\/\/doi.org\/10.3390\/su12125076&quot;&gt;DOI&lt;\/a&gt;\"><sup>55<\/sup><\/a><\/span>, Hashmi<span id='easy-footnote-56-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-56-145\" title=\"Hashmi,  K.A. &amp;amp; Siddiqui, D.A. (2020), \u201dAntecedents of Employees\u2019 Entrepreneurial Orientation: The  role of Organizational Culture and the Enabling Environment\u201d, &lt;em&gt;Business and Economic Research&lt;\/em&gt;, 10:3, &lt;a href=&quot;https:\/\/doi.org\/10.5296\/ber.v10i3.17398&quot; data-type=&quot;URL&quot; data-id=&quot;https:\/\/doi.org\/10.5296\/ber.v10i3.17398&quot;&gt;DOI&lt;\/a&gt;\"><sup>56<\/sup><\/a><\/span>, and Benitez\u2010Amado<span id='easy-footnote-57-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-57-145\" title=\"Benitez\u2010Amado, J., Llorens\u2010Montes, F.J. and Nieves Perez\u2010Arostegui, M. (2010), &#8220;Information technology\u2010enabled intrapreneurship culture and firm performance&#8221;, &lt;em&gt;Industrial Management &amp;amp; Data Systems&lt;\/em&gt;, 110:4, p. 550-566, &lt;a href=&quot;https:\/\/doi.org\/10.1108\/02635571011039025&quot;&gt;DOI&lt;\/a&gt;\"><sup>57<\/sup><\/a><\/span>), and although most intrapreneurs fortunately aren&#8217;t exposed to the atrocities and fog of war, other uncertainties<span id='easy-footnote-58-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-58-145\" title=\"H\u00f6yss\u00e4, M. &amp;amp; Hyysalo, S. (2009) \u201dThe fog of innovation: Innovativeness and deviance in developing new clinical testing equipment\u201d, &lt;em&gt;Research Policy&lt;\/em&gt;, 38:6,  p. 984-993, &lt;a href=&quot;https:\/\/doi.org\/10.1016\/j.respol.2009.02.003&quot;&gt;DOI&lt;\/a&gt;\"><sup>58<\/sup><\/a><\/span> and stressors might apply. It is also worth noting that Street-level Bureaucracy (<a href=\"https:\/\/www.worldcat.org\/title\/street-level-bureaucracy-dilemmas-of-the-individual-in-public-services\/oclc\/469372423\" target=\"_blank\" rel=\"noopener\">1980<\/a>) and Intrapreneuring (<a href=\"https:\/\/www.worldcat.org\/title\/intrapreneuring-why-you-dont-have-to-leave-the-corporation-to-become-an-entrepreneur\/oclc\/463919496\" target=\"_blank\" rel=\"noopener\">1985<\/a>) were both written by members of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Silent_Generation\" target=\"_blank\" rel=\"noopener\">&#8220;lucky few\u201d<\/a> generation in their late thirties and early forties (Lipsky was born in 1940, and Pinchot in 1942). It would be interesting to study how the times, its progressive politics and booming economy, and the authors&#8217; generational place in it shaped their analyses and descriptions of autonomous, almost defiant, professionals.   <\/p>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">Disclosure: One of the original inspiration for this thesis research was <a href=\"https:\/\/thestrategybridge.org\/the-bridge\/2017\/9\/20\/trigger-happy-autonomous-and-disobedient-nordbat-2-and-mission-command-in-bosnia\" target=\"_blank\" rel=\"noopener\">Ingesson&#8217;s article about the Nordbat 2 mission to Bosnia<\/a> in the early nineteen-nineties<span id='easy-footnote-59-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-59-145\" title=\"Ingesson, T. (2017). \u201dTrigger-Happy, Autonomous, and Disobedient: Nordbat 2 and Mission Command in Bosnia\u201d, &lt;em&gt;The Strategy Bridge&lt;\/em&gt;, September 20, 2020, accessed December 10, 2020, &lt;a href=&quot;https:\/\/thestrategybridge.org\/the-bridge\/2017\/9\/20\/trigger-happy-autonomous-and-disobedient-nordbat-2-and-mission-command-in-bosnia&quot;&gt;URL&lt;\/a&gt;\"><sup>59<\/sup><\/a><\/span> as I saw it as an potential example of intrapreneurship. (Perhaps because it was shared by an old intrapreneurial sponsor of mine, fond of quoting <a href=\"https:\/\/quoteinvestigator.com\/2018\/06\/19\/forgive\/\" target=\"_blank\" rel=\"noopener\">Grace Hopper<\/a>. This year, I realized that it was written by one of my teachers, and quite possibly the one who will grade my thesis.<\/p>\n\n\n\n<p class=\"has-text-align-center\">\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013<\/p>\n\n\n\n<h2 id=\"Ethics of Espionage &amp; Intrapreneuring\">The ethics of espionage<\/h2>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">In trying to do the right things regarding intrapreneurship, most conscientious people will run into ethical dilemmas. The examples given by Warren on Employee Deviance highlights that these questions can be particularly hairy in organizations operating in different or vague jurisdiction. Like an intelligence service for example.<\/p>\n\n\n\n<p>Pfaff &amp; Tiel<span id='easy-footnote-60-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-60-145\" title=\"Pfaff, T. &amp;amp; Tiel, J. R. (2004) \u201dThe Ethics of Espionage\u201d, Journal of Military Ethics, 3:1, p. 1-15, &lt;a href=&quot;https:\/\/doi.org\/10.1080\/15027570310004447&quot;&gt;DOI&lt;\/a&gt;\"><sup>60<\/sup><\/a><\/span> tried to help intelligence professionals determine <em>\u201dwhen it is appropriate to set aside the usual prohibitions in order to achieve national objectives\u201d<\/em>. They provided a framework inspired by Kant &amp; Locke to find a balance between <em>\u201dethical restraint and intelligence effectiveness\u201d<\/em>.<\/p>\n\n\n\n<p>They concluded that modern liberal republics are built on the grounds that all persons are created equal, and that acting against this principle \u201dwould be an act of betrayal\u201d<span id='easy-footnote-61-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-61-145\" title=\"Pfaff, T. &amp;amp; Tiel, J. R. (2004) \u201dThe Ethics of Espionage\u201d, Journal of Military Ethics, 3:1, p. 1-15, &lt;a href=&quot;https:\/\/doi.org\/10.1080\/15027570310004447&quot;&gt;DOI&lt;\/a&gt;\"><sup>61<\/sup><\/a><\/span>. They added that although this should constrain the actions of intelligence professionals, they don&#8217;t have the same obligations to citizens of other nations as they do to citizens of their own. In seeking what Warren would call hypernorms, Pfaff &amp; Tiel agree that two salient features appear to be critical to human value:<br><strong>1. Metaphysical freedom: <\/strong>Humans can reflect upon and decide their actions independently.<br><strong>2. Rationality. <\/strong>Humans can recognize that they are humans among humans, and that we share our freedom for choosing with the other persons we identify as humans. <br>From this follows the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Golden_Rule\" target=\"_blank\" rel=\"noopener\">Golden Rule<\/a>, similar to what Kantians refer to as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Categorical_imperative\" target=\"_blank\" rel=\"noopener\">Categorical Imperative<\/a> and Lockeans call <a href=\"https:\/\/plato.stanford.edu\/entries\/locke-political\/#NatuLawNatuRigh\" target=\"_blank\" rel=\"noopener\">Natural Rights<\/a>. <\/p>\n\n\n\n<p>Pfaff &amp; Tiell goes on to argue that in line with there hypernorms, it is ethical to respect humans accordingly \u201d<em>unless<\/em> they consent to be constrained by something in addition to these boundaries\u201d, as we must respect other humans&#8217; right to choose for themselves. This logic justifies killing a soldier in the battlefield, as that person \u201daccepts the training and equipment of a soldier\u201d and not only poses a threat but is a player in the game of war<span id='easy-footnote-62-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-62-145\" title=\"Pfaff, T. &amp;amp; Tiel, J. R. (2004) \u201dThe Ethics of Espionage\u201d, Journal of Military Ethics, 3:1, p. 5, &lt;a href=&quot;https:\/\/doi.org\/10.1080\/15027570310004447&quot;&gt;DOI&lt;\/a&gt;\"><sup>62<\/sup><\/a><\/span>.<\/p>\n\n\n\n<p>Recognizing that people can participate more or less willingly to different degrees in a spy game, Pfaff &amp; Tiell then goes on to sort actors in five categories of \u201dlegitimate targets of espionage\u201d \u2013 from the ordinary, uninformed citizen to the informed intelligence professional \u2013 specifying what different actions can be justified taking against the different categories of \u201dplayers\u201d in the spy game, and why.<\/p>\n\n\n\n<p>The authors recognize the problem of collateral damage: \u201dintelligence operations directed against legitimate targets might have nonconsensual consequences for illegitimate targets\u201d. Their solution proposed to this problem is the<strong> doctrine of double effect<\/strong>, attributed to Christopher (1994)<span id='easy-footnote-63-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-63-145\" title=\"Christopher, P. (1994). &lt;em&gt;The ethics of war and peace: an introduction to legal and moral issues&lt;\/em&gt;. Englewood Cliffs, Prentice Hall, &lt;a href=&quot;https:\/\/www.worldcat.org\/title\/ethics-of-war-and-peace-an-introduction-to-legal-and-moral-issues\/oclc\/925093449&quot;&gt;URL&lt;\/a&gt;\"><sup>63<\/sup><\/a><\/span>: that there is \u201da moral difference between the consequences of our actions that we intend and those we do not intend, but still foresee\u201d, and that it is permissible to do something good that (also) have bad consequences, given that four conditions are met:<\/p>\n\n\n\n<ol><li>Nastiness is not intended,<\/li><li>Nastiness is proportional to the good effect&#8217;s worth,<\/li><li>Nastiness is not a direct means to the good effect and,<\/li><li>Nasty effects are mitigated, even at more high-risk expenses.<\/li><\/ol>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:100%\">\n<p class=\"has-subtle-background-background-color has-background\">The doctrine of double effect could help in assessing intrapreneurial transgressions, such as unsanctioned risk taking, midnight resource allocation, or other evasive innovation activities. It also relates to the concepts of <strong>acceptable loss<\/strong> and <strong>acceptable risk<\/strong>, all too present and pressing in today&#8217;s debate on <a href=\"https:\/\/doi.org\/10.1097\/ccm.0000000000004452\" target=\"_blank\" rel=\"noopener\">Coronavirus<\/a>.<br><br>The doctrine of double effect might also give perfectly well-intentioned people reason to \u2013 knowingly and deliberately \u2013 cause harm.<br><br>Also, I am not suggesting that official or popular judgement on intrapreneurial transgressions will ever be made solely on moral grounds (practicalities and politics apply).<br><br>Pfaff &amp; Tiell published their article in 2004, as western intelligence professionals were involved in very controversial activities during the \u201d<a href=\"https:\/\/en.wikipedia.org\/wiki\/War_on_terror\" target=\"_blank\" rel=\"noopener\">War on Terror<\/a>\u201d, after Al-Qaeda&#8217;s attack on U.S. civilian and military targets in September 11, 2001. Although the timing might put their proposal in an unfavourable light, it&#8217;s worth to consider their contribution.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center\">\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013<\/p>\n\n\n\n<p class=\"has-accent-background-color has-background\">Still with me? If you have by any chance read this far, <a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#respond\"><strong>please comment<\/strong><\/a> or <strong><a href=\"mailto:gustav@gustavs.se?subject=I read your (too) humongous blog post\">email<\/a> <\/strong>me!<\/p>\n\n\n\n<p class=\"has-text-align-center\">\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013\u2013<\/p>\n\n\n\n<p class=\"has-subtle-background-background-color has-background\">And one last thing: Only after writing this post, I found Elert &amp; Stenkula&#8217;s article on Productive and Non-Productive intrapreneurship<span id='easy-footnote-64-145' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href=\"https:\/\/gustavs.se\/intra\/nine-perspectives-on-the-intrapreneur-as-an-insider-threat\/#easy-footnote-bottom-64-145\" title=\"Elert, N., &amp;amp; Stenkula, M. (2020). \u201dIntrapreneurship: Productive and Non-Productive\u201d, &lt;em&gt;Entrepreneurship Theory and Practice&lt;\/em&gt;, &lt;a href=&quot;https:\/\/doi.org\/10.1177\/1042258720964181&quot;&gt;DOI&lt;\/a&gt;\"><sup>64<\/sup><\/a><\/span>, which I will return to in a later post.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Risk is acknowledged as a salient or even inherent feature of innovation and exploration in organizations. However, the risks\u2019 nature and consequences are often less explored than other features of intrapreneurship and intra-organizational innovation. In fact, my main reason for starting this blog is to find more research on the risks involved in intrapreneurship and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":173,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/gustavs.se\/intra\/wp-json\/wp\/v2\/posts\/145"}],"collection":[{"href":"https:\/\/gustavs.se\/intra\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gustavs.se\/intra\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gustavs.se\/intra\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gustavs.se\/intra\/wp-json\/wp\/v2\/comments?post=145"}],"version-history":[{"count":46,"href":"https:\/\/gustavs.se\/intra\/wp-json\/wp\/v2\/posts\/145\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/gustavs.se\/intra\/wp-json\/wp\/v2\/posts\/145\/revisions\/291"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gustavs.se\/intra\/wp-json\/wp\/v2\/media\/173"}],"wp:attachment":[{"href":"https:\/\/gustavs.se\/intra\/wp-json\/wp\/v2\/media?parent=145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gustavs.se\/intra\/wp-json\/wp\/v2\/categories?post=145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gustavs.se\/intra\/wp-json\/wp\/v2\/tags?post=145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}