Switch to: References

Add citations

You must login to add citations.
  1. Ethical Considerations in International Nursing Research: a report from the international centre for nursing ethics.Chair Douglas P. Olsen - 2003 - Nursing Ethics 10 (2):122-137.
    Ethical issues in international nursing research are identified and the perspectives of the International Centre for Nursing Ethics are offered in an effort to develop an international consensus of ethical behaviour in research. First, theoretical issues are reviewed, then initial conditions for ethical conduct are defined, and protocol design and procedure considerations are examined. A concerted effort is made to identify and avoid a western bias. Broad guiding principles for designing and reviewing research are offered: (1) respect for persons; (2) (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Trust and testimony.Philip J. Nickel - 2012 - Pacific Philosophical Quarterly 93 (3):301-316.
    Some recent accounts of testimonial warrant base it on trust, and claim that doing so helps explain asymmetries between the intended recipient of testimony and other non-intended hearers, e.g. differences in their entitlement to challenge the speaker or to rebuke the speaker for lying. In this explanation ‘dependence-responsiveness’ is invoked as an essential feature of trust: the trustor believes the trustee to be motivationally responsive to the fact that the trustor is relying on the trustee. I argue that dependence-responsiveness is (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Recommendations for Hosting Audience Comments Based on Discourse Ethics.Yu Zhang & Mark Cenite - 2010 - Journal of Mass Media Ethics 25 (4):293-309.
    As a result of simultaneous developments, including the proliferation of opportunities for online feedback, the application of discourse ethics to journalism, and a greater emphasis on journalistic accountability, the time is ripe for revisiting opportunities that online mechanisms provide for holding journalists accountable to audiences. This paper proposes recommendations to guide hosting online comments in light of the Habermasian framework of discourse ethics developed by Glasser and Ettema (2008). It also explores the limits of such approaches in nations with different (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The model of the principled advocate and the pathological Partisan: A virtue ethics construct of opposing archetypes of public relations and advertising practitioners.Sherry Baker - 2008 - Journal of Mass Media Ethics 23 (3):235 – 253.
    Drawing upon contemporary virtue ethics theory, The Model of The Principled Advocate and The Pathological Partisan is introduced. Profiles are developed of diametrically opposed archetypes of public relations and advertising practitioners. The Principled Advocate represents the advocacy virtues of humility, truth, transparency, respect, care, authenticity, equity, and social responsibility. The Pathological Partisan represents the opposing vices of arrogance, deceit, secrecy, manipulation, disregard, artifice, injustice, and raw self-interest. One becomes either a Principled Advocate or a Pathological Partisan by habitually enacting or (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Loyalty in public relations: When does it cross the line between virtue and vice?Kevin Stoker - 2005 - Journal of Mass Media Ethics 20 (4):269 – 287.
    Public relations practitioners place a premium on loyalty - particularly in terms of cultivating relationships. However, little scholarly research has been done on the subject. This essay analyzes loyalty in terms of organizational deterioration and decline. The ethical dimensions of Hirschman's concept of "exit, voice, and loyalty, " and Royce's notion about loyalty, are explored, as is the concept of "loyalty to loyalty. " The essay concludes with a 7-step model intended to help practitioners determine the demands of ethical loyalty.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • “Secret” Casualties: Images of Injury and Death in the Iraq War Across Media Platforms.B. William Silcock, Carol B. Schwalbe & Susan Keith - 2008 - Journal of Mass Media Ethics 23 (1):36 – 50.
    This study examined more than 2,500 war images from U.S. television news, newspapers, news magazines, and online news sites during the first five weeks of the U.S.-led invasion of Iraq in 2003 and found that only 10% showed injury or death. The paper analyzes which media platforms were most willing to show casualties and offers insights on when journalists should use gruesome war images or keep them secret.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Truthfulness and Business.Lubomira Radoilska - 2008 - Journal of Business Ethics 79 (1-2):21 - 28.
    According to a common assumption, truthfulness cannot have an intrinsic value in business. Instead, it is considered only instrumentally valuable for business, because it contributes to successful trust-building. Some authors deny truthfulness even this limited role by claiming that truth-telling is not an essential part of business, which is a sui generis practice like poker. In this article, I argue that truthfulness has indeed an intrinsic value in business and identify the conceptual confusions underlying the opposite view. My account of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Bearing witness, animal rights and the slaughterhouse vigil.Steve Cooke - forthcoming - European Journal of Political Theory.
    Animal activists sometimes engage in vigils and acts of witnessing as forms of political protest. For example, the Animal Save Movement, a global activist network, regards witnessing the suffering of non-human animals as a moral duty of veganism. The act of witnessing is intended to non-violently communicate both attitudes and principles. These forms of activism are unlike other forms of protest, relying for much of their force upon passive, non-confrontational actions. This article explores the ethical character of vigils and witnessing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Street Photography Ethics.John Hadley - 2022 - Ethical Theory and Moral Practice 25 (4):529-540.
    In this paper I examine the ethics of street photography. I firstly discuss the close-up ‘in-your-face’ style street photography made famous by American photographer, Bruce Gilden. In close-up street photography, the proximity of the camera to the subject and the element of surprise work in tandem to produce a striking and evocative picture. Close-up street photography is shown to be ethically contentious on wellbeing-related and autonomy-related grounds. I next examine the more orthodox ‘respectable distance’ kind of street photography. In orthodox (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
    Download  
     
    Export citation  
     
    Bookmark  
  • The Curious Case of the Excellent Gossiper.Alkis Kotsonis - 2021 - Philosophia 50 (3):1207-1222.
    My main aim in this paper is to examine whether gossip should be categorized as an epistemically valuable character trait. Gossip satisfies the necessary and jointly sufficient conditions for an acquired character trait to be classified as an intellectual virtue under the responsibilist understanding of the concept of virtue. The excellent gossiper is motivated to acquire epistemic goods through gossiping, reliably successful in acquiring epistemic goods through gossiping, competent at the activity of gossiping and good at judging when, with whom (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Was Snowden virtuous?Clive Harfield - 2021 - Ethics and Information Technology 23 (3):373-383.
    Professor Shannon Vallor’s theoretical framework of technomoral virtue ethics identifies character traits that can be cultivated to foster a future worth wanting in an environment of emerging technologies. Such technologies and increased citizen participation in the new digital environment have reconfigured what is possible in policing and intelligence-gathering more quickly, perhaps, than sober and sensible policy reflection and formulation can keep pace with. Sensational and dramatic, seismic and devastating, the Snowden disclosures represent a particular expression of dissent against American intelligence (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Glass Panels and Peepholes: Nonhuman Animals and the Right to Privacy.Angie Pepper - 2020 - Pacific Philosophical Quarterly 101 (4):628-650.
    In this paper, I defend the claim that many sentient nonhuman animals have a right to privacy. I begin by outlining the view that the human right to privacy protects our interest in shaping different kinds of relationships with one another by giving us control over how we present ourselves to others. I then draw on empirical research to show that nonhuman animals also have this interest, which grounds a right to privacy against us. I further argue that we can (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?Michele Loi, Christian Hauser & Markus Christen - 2020 - Journal of Business Ethics 175 (1):7-19.
    Clients may feel trapped into sharing their private digital data with insurance companies to get a desired insurance product or premium. However, private insurance must collect some data to offer products and premiums appropriate to the client’s level of risk. This situation creates tension between the value of privacy and common insurance business practice. We argue for three main claims: first, coercion to share private data with insurers is pro tanto wrong because it violates the autonomous choice of a privacy-valuing (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Technology as Terrorism: Police Control Technologies and Drone Warfare.Jessica Wolfendale - 2021 - In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke (eds.), Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21.
    Debates about terrorism and technology often focus on the potential uses of technology by non-state terrorist actors and by states as forms of counterterrorism. Yet, little has been written about how technology shapes how we think about terrorism. In this chapter I argue that technology, and the language we use to talk about technology, constrains and shapes our understanding of the nature, scope, and impact of terrorism, particularly in relation to state terrorism. After exploring the ways in which technology shapes (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.
    In this paper, we argue that there is at least a pro tanto reason to favor the control account of the right to privacy over the access account of the right to privacy. This conclusion is of interest due to its relevance for contemporary discussions related to surveillance policies. We discuss several ways in which the two accounts of the right to privacy can be improved significantly by making minor adjustments to their respective definitions. We then test the improved versions (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Secret Law Revisited.Benjamin L. S. Nelson - 2019 - Ratio Juris 32 (4):473-486.
    What follows is an attempt to do some conceptual housekeeping around the notion of secret law as provided by Christopher Kutz (2013). First I consider low-salience (or merely obscure) law, suggesting that it fails to capture the legal and moral facts that are at stake in the case which Kutz used to motivate it. Then I outline a theoretical contrast between mere obscurity and secrecy, in contrast to the 'neutral' account of secrecy provided by Sissela Bok (1989). The upshot of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • On Peer Review as the ‘Gold Standard’ in Measuring Research Excellence: From Secrecy to Openness?Penny Enslin & Nicki Hedge - 2018 - Journal of Philosophy of Education 52 (3):379-396.
    As universities in the United Kingdom gear themselves up for the next Research Excellence Framework, REF2021, with peer review at its core, we critically re-visit the idea of peer review as a gold standard proxy for research excellence. We question the premise that anonymous peer review is a necessary and enabling condition for impartial, expert judgement. We argue that the intentions and supposed benefits underlying peer review and its associated concepts have become congealed in received discourse about research quality. Hence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Experimental Design: Ethics, Integrity and the Scientific Method.Jonathan Lewis - 2020 - In Ron Iphofen (ed.), Handbook of Research Ethics and Scientific Integrity. Springer. pp. 459-474.
    Experimental design is one aspect of a scientific method. A well-designed, properly conducted experiment aims to control variables in order to isolate and manipulate causal effects and thereby maximize internal validity, support causal inferences, and guarantee reliable results. Traditionally employed in the natural sciences, experimental design has become an important part of research in the social and behavioral sciences. Experimental methods are also endorsed as the most reliable guides to policy effectiveness. Through a discussion of some of the central concepts (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Secrecy and conspiracy.Matthew R. X. Dentith & Martin Orr - 2017 - Episteme 15 (4):433-450.
    In the literature on conspiracy theories, the least contentious part of the academic discourse would appear to be what we mean by a “conspiracy”: a secretive plot between two or more people toward some end. Yet what, exactly, is the connection between something being a conspiracy and it being secret? Is it possible to conspire without also engaging in secretive behavior? To dissect the role of secrecy in con- spiracies – and thus contribute to the larger debate on the epistemology (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Does Type of Wrongdoing Affect the Whistle-Blowing Process?Janet P. Near, Michael T. Rehg, James R. Van Scotter & Marcia P. Miceli - 2004 - Business Ethics Quarterly 14 (2):219-242.
    Abstract:We analyzed data from a survey of employees of a large military base in order to assess possible differences in the whistle-blowing process due to type of wrongdoing observed. Employees who observed perceived wrongdoing involving mismanagement, sexual harassment, or unspecified legal violations were significantly more likely to report it than were employees who observed stealing, waste, safety problems, or discrimination. Further, type of wrongdoing was significantly related to reasons given by employees who observed wrongdoing but did not report it, across (...)
    Download  
     
    Export citation  
     
    Bookmark   47 citations  
  • Authenticity in Political Discourse.Ben Jones - 2016 - Ethical Theory and Moral Practice 19 (2):489-504.
    Judith Shklar, David Runciman, and others argue against what they see as excessive criticism of political hypocrisy. Such arguments often assume that communicating in an authentic manner is an impossible political ideal. This article challenges the characterization of authenticity as an unrealistic ideal and makes the case that its value can be grounded in a certain political realism sensitive to the threats posed by representative democracy. First, by analyzing authenticity’s demands for political discourse, I show that authenticity has greater flexibility (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The most important thing about climate change.John Broome - 2010 - In Jonathan Boston, Andrew Bradstock & David L. Eng (eds.), Public policy: why ethics matters. Acton, A.C.T.: ANUE Press. pp. 101-16.
    This book chapter is not available in ORA, but you may download, display, print and reproduce this chapter in unaltered form only for your personal, non-commercial use or use within your organization from the ANU E Press website.
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • The Place of Knowledge A Methodological Survey.Adi Ophir & Steven Shapin - 1991 - Science in Context 4 (1):3-22.
    A generation ago scientific ideas floated free in the air, as historians gazed up at them in wonder and admiration. From time to time, historians agreed, the ideas that made up the body of scientific truth became incarnate: they were embedded into the fleshly forms of human culture and attached to particular times and places. How this incarnation occurred was a great mystery. How could spirit be made flesh? How did the transcendent and the timeless enter the forms of the (...)
    Download  
     
    Export citation  
     
    Bookmark   55 citations  
  • Do I Hear the Whistle…? A First Attempt to Measure Four Forms of Employee Silence and Their Correlates.Michael Knoll & Rolf Dick - 2013 - Journal of Business Ethics 113 (2):349-362.
    Silence in organizations refers to a state in which employees refrain from calling attention to issues at work such as illegal or immoral practices or developments that violate personal, moral, or legal standards. While Morrison and Milliken (Acad Manag Rev 25:706–725, 2000) discussed how organizational silence as a top-down organizational level phenomenon can cause employees to remain silent, a bottom-up perspective—that is, how employee motives contribute to the occurrence and maintenance of silence in organizations—has not yet been given much research (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Newsgathering and Privacy: Expanding Ethics Codes to Reflect Change in the Digital Media Age.Ginny Whitehouse - 2010 - Journal of Mass Media Ethics 25 (4):310-327.
    Media ethics codes concerning privacy must be updated considering the ease with which information now can be gathered from social networks and disseminated widely. Existing codes allow for deception and privacy invasion in cases of overriding public need when no alternate means are available but do not adequately define what constitutes need or alternate means, or weigh in the harm such acts do to the public trust and the profession. Building on the ethics theories of Sissela Bok and Helen Nissenbaum, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Applying the rules of just war theory to engineers in the arms industry.Aaron Fichtelberg - 2006 - Science and Engineering Ethics 12 (4):685-700.
    Given the close relationship between the modern arms industry and the military, engineers and other professionals who work in the arms industry should be held accountable to the principles of just war theory. While they do not deploy weapons on the battlefield and are not in the military chain of command, technical professionals nonetheless have a moral duty to abide by principles of jus ad bellum and jus in bello. They are morally responsible both for choosing the companies that employ (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
    I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues provides a (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Transparency: An assessment of the Kantian roots of a key element in media ethics practice.Patrick Lee Plaisance - 2007 - Journal of Mass Media Ethics 22 (2-3):187 – 207.
    This study argues that the notion of transparency requires reconsideration as an essence of ethical agency. It provides a brief explication of the concept of transparency, rooted in the principle of human dignity of Immanuel Kant, and suggests that it has been inadequately appreciated by media ethics scholars and instructors more focused on relatively simplistic applications of his categorical imperative. This study suggests that the concept's Kantian roots raise a radical challenge to conventional understandings of human interaction and, by extension, (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • The epistemological evaluation of oppositional secrets.Catherine Hundleby - 2000 - Hypatia 20 (4):44-58.
    : Although political values guide people who take advice from standpoint epistemologies in deciding whether to reveal secrets used to resist oppression, these decisions can also be understood and evaluated in purely cognitive or epistemological terms. When political considerations direct us to preserve a secret, the cognitive value progressively diminishes because the view of the world projected by the secret is increasingly vulnerable.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Hypocrisy and Epistemic Injustice.Brian Carey - forthcoming - Ethical Theory and Moral Practice:1-18.
    In this article I argue that we should understand some forms of hypocritical behaviour in terms of epistemic injustice; a type of injustice in which a person is wronged in their capacity as a knower. If each of us has an interest in knowing what morality requires of us, this can be undermined when hypocritical behaviour distorts our perception of the moral landscape by misrepresenting the demandingness of putative moral obligations. This suggests that a complete theory of the wrongness of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • An Egalitarian Perspective on Information Sharing: The Example of Health Care Priorities.Jenny Lindberg, Linus Broström & Mats Johansson - 2024 - Health Care Analysis 32 (2):126-140.
    In health care, the provision of pertinent information to patients is not just a moral imperative but also a legal obligation, often articulated through the lens of obtaining informed consent. Codes of medical ethics and many national laws mandate the disclosure of basic information about diagnosis, prognosis, and treatment alternatives. However, within publicly funded health care systems, other kinds of information might also be important to patients, such as insights into the health care priorities that underlie treatment offers made. While (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy for the weak, transparency for the powerful: the cypherpunk ethics of Julian Assange.Patrick D. Anderson - 2020 - Ethics and Information Technology 23 (3):295-308.
    WikiLeaks is among the most controversial institutions of the last decade, and this essay contributes to an understanding of WikiLeaks by revealing the philosophical paradigm at the foundation of Julian Assange’s worldview: cypherpunk ethics. The cypherpunk movement emerged in the early-1990s, advocating the widespread use of strong cryptography as the best means for defending individual privacy and resisting authoritarian governments in the digital age. For the cypherpunks, censorship and surveillance were the twin evils of the computer age, but they viewed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.
    Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.This paper argues that automated mass surveillance does not involve a significant loss of privacy. Through providing a definition (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Why states have no right to privacy, but may be entitled to secrecy: a non-consequentialist defense of state secrecy.Dorota Mokrosinska - 2020 - Critical Review of International Social and Political Philosophy 23 (4):415-444.
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Pay Secrecy, Discrimination, and Autonomy.Matthew Caulfield - 2020 - Journal of Business Ethics 171 (2):399-420.
    A question facing nearly all private firms is whether they may keep employee pay secret. Many think it is obvious that firms are obligated to disclose a good deal of pay information once we properly appreciate the severity of pay discrimination in our economy and the autonomy-related interests that would be served by pay disclosure. This article puts forth a dissenting voice against the vast majority of recent commentary. It exploits a fissure between reasons we have to support certain coercive (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Intelligence and Social Epistemology - Toward a Social Epistemological Theory of Intelligence.Giangiuseppe Pili - 2019 - Social Epistemology 33 (6):574-592.
    ABSTRACTEvidence, beliefs, and knowledge are words that are currently used in the intelligence community. The primary goal of intelligence is to provide knowledge and foreknowledge of an enemy’s in...
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • "Fruit of the Poisonous Tree": Journalistic Ethics and Voice-Mail Surveillance.Cecilia Friend & Donald Challenger - 2001 - Journal of Mass Media Ethics 16 (4):255-272.
    A 1998 Cincinnati Enquirer investigation into the Central American labor practices of Chiquita Brands International was substantiated by the taped words of company officials themselves. Yet, soon after publication, the Enquirer ran a stunning front-page retraction and disavowed the report without challenging its claims. The Gannett Corporation, the paper's owner, paid Chiquita $14 million to avoid a suit. The resultant outcry by journalists was directed not at Gannett, but at lead reporter Michael Gallagher, who had surreptitiously accessed Chiquita voice mail (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Care to Share? Children's Cognitive Skills and Concealing Responses to a Parent.Jennifer Lavoie & Victoria Talwar - 2018 - Topics in Cognitive Science 12 (2):485-503.
    Lavoie and Talwar examine the phenomenon of prosocial lie telling: lying with the intention to benefit others. They investigate how well children aged 4 to 11 are able to conceal information about a surprise gift from their parents based on these children’s responses to their parents’ questions. Lavoie and Talwar conclude that, as children’s theory of mind abilities and working memory improve, their ability to conceal information from others also develops.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Effect of Perceived Negative Workplace Gossip on Employees’ Behaviors.Ming Kong - 2018 - Frontiers in Psychology 9:320893.
    Negative workplace gossip generates social undermining and great side effects to employees. But, the damage of negative gossip is mainly aimed at the employee who perceived being targeted. The purpose of this study is to develop a conceptual model in which perceived negative workplace gossip influences employees’ in-role behavior and organizational citizenship behavior differentially by changing employees’ self-concept (organizational based self-esteem and perceived insider status). 336 employees from 7 Chinese companies were investigated for empirical analysis on proposed hypotheses, and results (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • When is a lie more of a lie? Moral judgment mediates the relationship between perceived benefits of others and lie-labeling.Piotr Szarota & Katarzyna Cantarero - 2017 - Polish Psychological Bulletin 48 (2):315-325.
    Lay perceptions of lying are argued to consist of a lie prototype. The latter was found to entail the intention to deceive, belief in falsity and falsity. We proposed and found that the perceptions of the benefits of others are also an important factor that influences the extent, to which an act of intentional misleading someone to foster a false belief is labeled as a lie. Drawing from the intuitionist model of moral judgments we assumed that moral judgment of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Should non-disclosures be considered as morally equivalent to lies within the doctor–patient relationship?Caitriona L. Cox & Zoe Fritz - 2016 - Journal of Medical Ethics 42 (10):632-635.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Doxing: a conceptual analysis.David M. Douglas - 2016 - Ethics and Information Technology 18 (3):199-210.
    Doxing is the intentional public release onto the Internet of personal information about an individual by a third party, often with the intent to humiliate, threaten, intimidate, or punish the identified individual. In this paper I present a conceptual analysis of the practice of doxing and how it differs from other forms of privacy violation. I distinguish between three types of doxing: deanonymizing doxing, where personal information establishing the identity of a formerly anonymous individual is released; targeting doxing, that discloses (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • A justification of whistleblowing.Daniele Santoro & Manohar Kumar - 2017 - Philosophy and Social Criticism 43 (7):669-684.
    Whistleblowing is the act of disclosing information from a public or private organization in order to reveal cases of corruption that are of immediate or potential danger to the public. Blowing the whistle involves personal risk, especially when legal protection is absent, and charges of betrayal, which often come in the form of legal prosecution under treason laws. In this article we argue that whistleblowing is justified when disclosures are made with the proper intent and fulfill specific communicative constraints in (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Should Internet Researchers Use Ill-Gotten Information?David M. Douglas - 2018 - Science and Engineering Ethics 24 (4):1221-1240.
    This paper describes how the ethical problems raised by scientific data obtained through harmful and immoral conduct may also emerge in cases where data is collected from the Internet. It describes the major arguments for and against using ill-gotten information in research, and shows how they may be applied to research that either collects information about the Internet itself or which uses data from questionable or unknown sources on the Internet. Three examples demonstrate how researchers address the ethical issues raised (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Political surplus of whistleblowing: a case study.Abraham Mansbach - 2007 - Business Ethics, the Environment and Responsibility 16 (2):124-131.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Conditional shared confidentiality in mental health care.Axel Liégeois & Marc Eneman - 2015 - Medicine, Health Care and Philosophy 18 (2):261-266.
    Because of the development towards community care, care providers not only exchange information in a team, but increasingly also in networks. This is a challenge to confidentiality. The ethical question is how care providers can keep information about the care receiver confidential, whilst at the same time exchanging information about that care receiver in a team or network? Can shared confidentiality be extended from a team to a network? To clarify this question, the article refers to the advice of an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Civic Sights: Theorizing Deliberative and Photographic Publicity in the Visual Public Sphere.E. Cram, Melanie Loehwing & John Louis Lucaites - 2016 - Philosophy and Rhetoric 49 (3):227-253.
    Foundational theories of the public sphere prioritize civic speech while distrusting forms of visuality. As a corrective to this model of the public sphere, rhetorical theorists have recently emphasized visuality as a constitutive mode of contemporary public culture, but they nevertheless tend to prioritize the civic actor over the civic spectator. A productive alternative would begin to distinguish an emerging shift from “deliberative publicity” to “photographic publicity.” The bourgeois public sphere innovated verbal communicative practices that produced a specifically deliberative publicity, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation