Switch to: References

Add citations

You must login to add citations.
  1. Asking for Facebook Logins: An Egoist Case for Privacy.John R. Drake - 2016 - Journal of Business Ethics 139 (3):429-441.
    With the advent of social networking websites, privacy concerns have reached a new high. One particularly problematic concern entails employers requesting login credentials to popular social media platforms. While many people may consider this request unethical, they may not agree on the reasons it is unethical. One reason may be to blame the behavior on egoism. Egoism, however, comes in multiple flavors, not all of which would agree that violating privacy is acceptable. In this paper, we articulate how one egoist (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • A bibliometric analysis of privacy and ethics in IEEE Security and Privacy.Jonathan Tse, Dawn E. Schrader, Dipayan Ghosh, Tony Liao & David Lundie - 2015 - Ethics and Information Technology 17 (2):153-163.
    The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the ethical and technological dimensions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data.Gordon Hull - 2015 - Ethics and Information Technology 17 (2):89-101.
    The “privacy paradox” refers to the discrepancy between the concern individuals express for their privacy and the apparently low value they actually assign to it when they readily trade personal information for low-value goods online. In this paper, I argue that the privacy paradox masks a more important paradox: the self-management model of privacy embedded in notice-and-consent pages on websites and other, analogous practices can be readily shown to underprotect privacy, even in the economic terms favored by its advocates. The (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.
    Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a community about sharing and using (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • The Spread of Digital Intimate Partner Violence: Ethical Challenges for Business, Workplaces, Employers and Management.Jeff Hearn, Matthew Hall, Ruth Lewis & Charlotta Niemistö - 2023 - Journal of Business Ethics 187 (4):695-711.
    In recent decades, huge technological changes have opened up possibilities and potentials for new socio-technological forms of violence, violation and abuse, themselves intersectionally gendered, that form part of and extend offline intimate partner violence (IPV). Digital IPV (DIPV)—the use of digital technologies in and for IPV—takes many forms, including: cyberstalking, internet-based abuse, non-consensual intimate imagery, and reputation abuse. IPV is thus now in part digital, and digital and non-digital violence may merge and reinforce each other. At the same time, technological (...)
    Download  
     
    Export citation  
     
    Bookmark