Switch to: References

Citations of:

The Ethics of Information Technology and Business

Malden, MA: Wiley-Blackwell (2003)

Add citations

You must login to add citations.
  1. Some information is too dangerous to be on the internet.Vincent C. Müller - 2006 - Acm Sigcas Computers and Society 36 (1):2.
    This paper investigates a problem about freedom of information. Although freedom of information is generally considered desirable, there are a number of areas where there is substantial agreement that freedom of information should be limited. After a certain ordering of the landscape, I argue that we need to add the category of "dangerous" information and that this category has gained a new quality in the context of current information technology, specifically the Internet. This category includes information the use of which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The importance of privacy revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
    James Rachels’ seminal paper “ Why Privacy Is Important ” (1975) remains one of the most influential statements on the topic. It offers a general theory that explains why privacy is important in relation to mundane personal information and situations. According to the theory, privacy is important because it allows us to selectively disclose personal information and to engage in behaviors appropriate to and necessary for creating and maintaining diverse personal relationships. Without this control, it is implied, the diversity of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Epistemic injustice and data science technologies.John Symons & Ramón Alvarado - 2022 - Synthese 200 (2):1-26.
    Technologies that deploy data science methods are liable to result in epistemic harms involving the diminution of individuals with respect to their standing as knowers or their credibility as sources of testimony. Not all harms of this kind are unjust but when they are we ought to try to prevent or correct them. Epistemically unjust harms will typically intersect with other more familiar and well-studied kinds of harm that result from the design, development, and use of data science technologies. However, (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Network ethics: information and business ethics in a networked society.Luciano Floridi - 2009 - Journal of Business Ethics 90 (S4):649 - 659.
    This article brings together two research fields in applied ethics - namely, information ethics and business ethics- which deal with the ethical impact of information and communication technologies but that, so far, have remained largely independent. Its goal is to articulate and defend an informational approach to the conceptual foundation of business ethics, by using ideas and methods developed in information ethics, in view of the convergence of the two fields in an increasingly networked society.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Computer ethics 2013 : From policy vacuum to slow-tech.Norberto Patrignani - 2014 - Mondo Digitale 13 (50):1-4.
    We propose to steer the digital revolution towards a new kind of ICT, by designing and developing technologies that are good, clean, and fair. An ICT that is human-centred, and that takes into account both the limits of the planet and those of human beings.
    Download  
     
    Export citation  
     
    Bookmark  
  • Building theory from consumer reactions to RFID: discovering Connective Proximity.Anna Margulis, Harold Boeck, Ygal Bendavid & Fabien Durif - 2016 - Ethics and Information Technology 18 (2):81-101.
    Academic research into RFID technology has largely neglected ethics. What scarce research was being performed has now dwindled despite having some consumers continue to express their ethical concerns. This article aims at reducing this apparent void by exploring the antecedents that cause the public to react when consumers are targeted by RFID technology. Through the analysis of 11 real RFID implementations used to target consumers, our research indicates that several factors can influence consumer response through the distinct nature of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Capabilities in, capabilities out: overcoming digital divides by promoting corporate citizenship and fair ICT. [REVIEW]Thorsten Busch - 2011 - Ethics and Information Technology 13 (4):339-353.
    This conceptual article discusses strategies of corporations in the information and communication technologies (ICT) sector and their role in the conflict over access to knowledge in the digital environment. Its main hypothesis is that ICT corporations are very capable actors when it comes to bridging digital divides in both developed and developing countries—maybe even the most capable actors. Therefore, it is argued that ICT corporations could use their capabilities to help citizens gain sustainable access to knowledge in order to enable (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations