- Too Much Info: Data Surveillance and Reasons to Favor the Control Account of the Right to Privacy.Jakob Thrane Mainz & Rasmus Uhrenfeldt - 2020 - Res Publica 27 (2):287-302.details
|
|
An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.details
|
|
Mass Surveillance: A Private Affair?Kevin Macnish - 2020 - Moral Philosophy and Politics 7 (1):9-27.details
|
|
Highway to (Digital) Surveillance: When Are Clients Coerced to Share Their Data with Insurers?Michele Loi, Christian Hauser & Markus Christen - 2020 - Journal of Business Ethics 175 (1):7-19.details
|
|
Conditional shared confidentiality in mental health care.Axel Liégeois & Marc Eneman - 2015 - Medicine, Health Care and Philosophy 18 (2):261-266.details
|
|
First, do no harm.Sanford Leikin - 1995 - Ethics and Behavior 5 (2):196 – 199.details
|
|
Theory of Mind and Concealing vs. Forthcoming Communication in Adolescence.Jennifer Lavoie & Victoria Talwar - 2022 - Frontiers in Psychology 13.details
|
|
The moral trial: on ethics and economics.Alessandro Lanteri - 2008 - Erasmus Journal for Philosophy and Economics 1 (1):188.details
|
|
Effect of Perceived Negative Workplace Gossip on Employees’ Behaviors.Ming Kong - 2018 - Frontiers in Psychology 9:320893.details
|
|
Do I Hear the Whistle…? A First Attempt to Measure Four Forms of Employee Silence and Their Correlates.Michael Knoll & Rolf Dick - 2013 - Journal of Business Ethics 113 (2):349-362.details
|
|
Do I Hear the Whistle…? A First Attempt to Measure Four Forms of Employee Silence and Their Correlates.Michael Knoll & Rolf van Dick - 2013 - Journal of Business Ethics 113 (2):349-362.details
|
|
Intentions to Report Questionable Acts: An Examination of the Influence of Anonymous Reporting Channel, Internal Audit Quality, and Setting.Steven E. Kaplan & Joseph J. Schultz - 2007 - Journal of Business Ethics 71 (2):109-124.details
|
|
Authenticity in Political Discourse.Ben Jones - 2016 - Ethical Theory and Moral Practice 19 (2):489-504.details
|
|
Ethical tension points in whistleblowing.J. Vernon Jensen - 1987 - Journal of Business Ethics 6 (4):321 - 328.details
|
|
Respecting privacy in an information society: A journalist's dilemma.L. Paul Husselbee - 1994 - Journal of Mass Media Ethics 9 (3):145 – 156.details
|
|
The epistemological evaluation of oppositional secrets.Catherine Hundleby - 2000 - Hypatia 20 (4):44-58.details
|
|
The Epistemological Evaluation of Oppositional Secrets.Catherine Hundleby - 2000 - Hypatia 20 (4):44-58.details
|
|
The journalist and privacy.Louis Hodges - 1994 - Journal of Mass Media Ethics 9 (4):197 – 212.details
|
|
Was Snowden virtuous?Clive Harfield - 2021 - Ethics and Information Technology 23 (3):373-383.details
|
|
Choosing silence: A case of reverse agenda setting in depression era news coverage.Sandra Haarsager - 1991 - Journal of Mass Media Ethics 6 (1):35 – 46.details
|
|
Mitigating Ethical Conflicts in Dual Mission Government Agencies.Valerie George & Robert Boruch - 1988 - Science, Technology, and Human Values 13 (1-2):27-44.details
|
|
"Fruit of the Poisonous Tree": Journalistic Ethics and Voice-Mail Surveillance.Cecilia Friend & Donald Challenger - 2001 - Journal of Mass Media Ethics 16 (4):255-272.details
|
|
A Greater Means to the Greater Good: Ethical Guidelines to Meet Social Movement Organization Advocacy Challenges.Carrie Packwood Freeman - 2009 - Journal of Mass Media Ethics 24 (4):269-288.details
|
|
"You Had to Be There" : The Problem With Reporter Reconstructions.Russell Frank - 1999 - Journal of Mass Media Ethics 14 (3):146-158.details
|
|
Caution in leaping from functional imaging to functional neurosurgery.Paul J. Ford & Cynthia S. Kubu - 2005 - American Journal of Bioethics 5 (2):23 – 25.details
|
|
Applying the rules of just war theory to engineers in the arms industry.Aaron Fichtelberg - 2006 - Science and Engineering Ethics 12 (4):685-700.details
|
|
Bibliographical essay / privacy and criminal justice policies.Ferdinand D. Schoeman - 1983 - Criminal Justice Ethics 2 (2):71-82.details
|
|
Unnamed Sources: A Utilitarian Exploration of their Justification and Guidelines for Limited Use.Matt J. Duffy & Carrie P. Freeman - 2011 - Journal of Mass Media Ethics 26 (4):297-315.details
|
|
Should Internet Researchers Use Ill-Gotten Information?David M. Douglas - 2018 - Science and Engineering Ethics 24 (4):1221-1240.details
|
|
Doxing: a conceptual analysis.David M. Douglas - 2016 - Ethics and Information Technology 18 (3):199-210.details
|
|
Secrets vs. Lies: Is There A Moral Asymmetry?Mahon James - 2018 - In Lying: Language, Knowledge, Ethics, and Politics. Oxford: Oxford University Press. pp. 161-182.details
|
|
Al-Fārābī Metaphysics, and the Construction of Social Knowledge: Is Deception Warranted if it Leads to Happiness?Nicholas Andrew Oschman - unknowndetails
|
|
Experimental Design: Ethics, Integrity and the Scientific Method.Jonathan Lewis - 2020 - In Ron Iphofen (ed.), Handbook of Research Ethics and Scientific Integrity. Cham, Switzerland: pp. 459-474.details
|
|
I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg Universitydetails
|
|
The Presumption of Veracity in Testimony and Gossip.Fred J. Kauffeld & John E. Fields - unknowndetails
|
|
Government Secrecy, the Ethics of Wikileaks, and the Fifth Estate.Edward H. Spence - 2012 - International Review of Information Ethics 17:07.details
|
|