Switch to: References

Add citations

You must login to add citations.
  1. Digital sovereignty and smart wearables: Three moral calculi for the distribution of legitimate control over the digital.Niël Henk Conradie & Saskia K. Nagel - 2022 - Journal of Responsible Technology 12 (C):100053.
    Download  
     
    Export citation  
     
    Bookmark  
  • What do you know about me? Digital privacy and online data sharing in the UK insurance sector.Ian R. Blakesley & Anca C. Yallop - 2019 - Journal of Information, Communication and Ethics in Society 18 (2):281-303.
    PurposeIn addition to data transforming the insurance sector from within, insurance consumers and their behaviour has transformed significantly over the past 20 years from traditional retail to, predominantly, online trading. Data are a fundamental part of how the sector operates, and the use of data in insurance is constantly evolving. This paper aims to explore consumer perceptions about digital privacy and their subsequent motivations to disclose personal data for insurance purposes.Design/methodology/approachThe study uses an exploratory research approach based on in-depth interviews (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Information Relevance Model of Customized Privacy for IoT.Wei Zhou & Selwyn Piramuthu - 2015 - Journal of Business Ethics 131 (1):19-30.
    Motivated by advances in mass customization in business practice, explosion in the number of internet of things devices, and the lack of published research on privacy differentiation and customization, we propose a contextual information relevance model of privacy. We acknowledge the existence of individual differences with respect to unique security and privacy protection needs. We observe and argue that it is unfair and socially inefficient to treat privacy in a uniform manner whereby a large proportion of the population remain unsatisfied (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • An enquiry into the ethical efficacy of the use of radio frequency identification technology.David M. Wasieleski & Mordechai Gal-Or - 2008 - Ethics and Information Technology 10 (1):27-40.
    This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology. As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’ privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some of its most prevalent uses, a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Towards an Ethical and Trustworthy Social Commerce Community for Brand Value Co-creation: A trust-Commitment Perspective.Xuequn Wang, Mina Tajvidi, Xiaolin Lin & Nick Hajli - 2020 - Journal of Business Ethics 167 (1):137-152.
    Firms have been increasingly using social commerce platforms to engage with customers and support their brand value co-creation. While social commerce is now bringing a variety of benefits to business, it has also challenged marketing ethics surrounding online consumer privacy. Drawing on the trust-commitment theory, we develop a model that aims to create an ethical and trustworthy social commerce community for brand value co-creation by examining the impacts of online consumer privacy concerns and social interaction constructs on consumers’ psychological reactions. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development.Katie Shilton & Daniel Greene - 2019 - Journal of Business Ethics 155 (1):131-146.
    Privacy is a critical challenge for corporate social responsibility in the mobile device ecosystem. Mobile application firms can collect granular and largely unregulated data about their consumers, and must make ethical decisions about how and whether to collect, store, and share these data. This paper conducts a discourse analysis of mobile application developer forums to discover when and how privacy conversations, as a representative of larger ethical debates, arise during development. It finds that online forums can be useful spaces for (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The perceptions of consumers regarding online retailers' ethics and their relationship with consumers' general internet expertise and word of mouth: A preliminary analysis. [REVIEW]Sergio Román & Pedro J. Cuestas - 2008 - Journal of Business Ethics 83 (4):641 - 656.
    Ethical concerns of Internet users continue to rise. Accordingly, several scholars have called for systematic empirical research to address these issues. This study examines the conceptualization and measurement of consumers' perceptions regarding the ethics of online retailers (CPEOR). Also, this research represents a first step into the analysis of the relationship between CPEOR, consumers' general Internet expertise and reported positive word of mouth (WOM). Results, from a convenience sample of 357 online shoppers, suggest that CPEOR can be operationalized as a (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • The Perceptions of Consumers Regarding Online Retailers’ Ethics and Their Relationship with Consumers’ General Internet Expertise and Word of Mouth: A Preliminary Analysis.Sergio Román & Pedro J. Cuestas - 2008 - Journal of Business Ethics 83 (4):641-656.
    Ethical concerns of Internet users continue to rise. Accordingly, several scholars have called for systematic empirical research to address these issues. This study examines the conceptualization and measurement of consumers' perceptions regarding the ethics of online retailers. Also, this research represents a first step into the analysis of the relationship between CPEOR, consumers' general Internet expertise and reported positive word of mouth. Results, from a convenience sample of 357 online shoppers, suggest that CPEOR can be operationalized as a second-order construct (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Personalized Ad in Your Google Glass? Wearable Technology, Hands-Off Data Collection, and New Policy Imperative.Yong Jin Park & Marko Skoric - 2017 - Journal of Business Ethics 142 (1):71-82.
    This study analyzes the increasing presence and capabilities of wearable computing devices in the cornucopia of personalized digital data. We argue that the institutional data practices typical of Google Glass will pose policy challenges and herald yet another dramatic shift to personalized data marketing. We also highlight the characteristics of Google’s existing synergetic data practices that will shape the development of not only Google Glass, but also all subsequent wearable mobile devices in light of 360-degree data collection. The key organizing (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • The counter‐control revolution: “silent control” of individuals through dataveillance systems.Yohko Orito - 2011 - Journal of Information, Communication and Ethics in Society 9 (1):5-19.
    PurposeThe purpose of this paper is to examine the social impacts of “silent control” of individuals by means of the architecture of dataveillance systems. It addresses the question whether individuals, in reality, can actually determine autonomously the kinds of information that they can acquire and convey in today's dataveillance environments. The paper argues that there is a risk of a “counter‐control revolution” that may threaten to reverse the “control revolution” described by Shapiro.Design/methodology/approachUsing relevant business cases, this paper describes the nature (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Ethics of Smart Stadia: A Stakeholder Analysis of the Croke Park Project.Fiachra O’Brolcháin, Simone de Colle & Bert Gordijn - 2019 - Science and Engineering Ethics 25 (3):737-769.
    The development of “smart stadia”, i.e. the use of “smart technologies” in the way sports stadia are designed and managed, promises to enhance the experience of attending a live match through innovative and improved services for the audience, as well as for the players, vendors and other stadium stakeholders. These developments offer us a timely opportunity to reflect on the ethical implications of the use of smart technologies and the emerging Internet of Things. The IoT has the potential to radically (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.
    Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a community about sharing and using (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract.Kirsten E. Martin - 2012 - Journal of Business Ethics 111 (4):519-539.
    A growing body of theory has focused on privacy as being contextually defined, where individuals have highly particularized judgments about the appropriateness of what, why, how, and to whom information flows within a specific context. Such a social contract understanding of privacy could produce more practical guidance for organizations and managers who have employees, users, and future customers all with possibly different conceptions of privacy across contexts. However, this theoretical suggestion, while intuitively appealing, has not been empirically examined. This study (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?Michele Loi, Christian Hauser & Markus Christen - 2020 - Journal of Business Ethics 175 (1):7-19.
    Clients may feel trapped into sharing their private digital data with insurance companies to get a desired insurance product or premium. However, private insurance must collect some data to offer products and premiums appropriate to the client’s level of risk. This situation creates tension between the value of privacy and common insurance business practice. We argue for three main claims: first, coercion to share private data with insurers is pro tanto wrong because it violates the autonomous choice of a privacy-valuing (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective.Weiyin Hong, Frank K. Y. Chan & James Y. L. Thong - 2019 - Journal of Business Ethics 168 (3):539-564.
    This paper investigates the drivers and inhibitors of Internet privacy concern. Applying the Multidimensional Development Theory to the online environment, we identify the important factors under four dimensions—i.e., environmental, individual, information management, and interaction management. We tested our model using data from an online survey of 2417 individuals in Hong Kong. The results show that the factors under all four dimensions are significant in the formation of Internet privacy concern. Specifically, familiarity with government legislation, Internet knowledge, benefit of information disclosure, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations