- Business ethics: A helpful hybrid in search of integrity.Edmund F. Byrne - 2002 - Journal of Business Ethics 37 (2):121 - 133.details
|
|
On the autonomy and justification of nanoethics.Fritz Allhoff - 2007 - NanoEthics 1 (3):185-210.details
|
|
The Ethics of Workspace Surveillance.Elin Palm - 2008 - Dissertation, Royal Institute of Technology, Stockholmdetails
|
|
I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg Universitydetails
|
|
An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.details
|
|
Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.details
|
|
Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice.Leigh A. Clark & Sherry J. Roberts - 2010 - Journal of Business Ethics 95 (4):507-525.details
|
|
Public health measures and the rise of incidental surveillance: Considerations about private informational power and accountability.B. A. Kamphorst & A. Henschke - 2023 - Ethics and Information Technology 25 (4):1-14.details
|
|
Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.details
|
|
Ethical issues in electronic comemrce.Bette Stead & Jackie Gilbert - 2001 - Journal of Business Ethics 34 (2):75 - 85.details
|
|
The Ethics of Smart Stadia: A Stakeholder Analysis of the Croke Park Project.Fiachra O’Brolcháin, Simone de Colle & Bert Gordijn - 2019 - Science and Engineering Ethics 25 (3):737-769.details
|
|
A 30-Year Historical Examination of Ethical Concerns Regarding Business Ethics: Who’s Concerned? [REVIEW]Will Drover, Jennifer Franczak & Richard F. Beltramini - 2012 - Journal of Business Ethics 111 (4):431-438.details
|
|
Applying the new software engineering code of ethics to usability engineering: A study of four cases.Oliver K. Burmeister & John Weckert - 2003 - Journal of Information, Communication and Ethics in Society 1 (3):119-132.details
|
|
E-mail, terrorism, and the right to privacy.Stephen Coleman - 2006 - Ethics and Information Technology 8 (1):17-27.details
|
|
Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.details
|
|
An interactive ethical assessment of surveillance‐capable software within the home‐help service sector.Elin Palm - 2013 - Journal of Information, Communication and Ethics in Society 11 (1):43-68.details
|
|
Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract.Kirsten E. Martin - 2012 - Journal of Business Ethics 111 (4):519-539.details
|
|
Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective.Weiyin Hong, Frank K. Y. Chan & James Y. L. Thong - 2019 - Journal of Business Ethics 168 (3):539-564.details
|
|
An Ethical Perspective on Emerging Forms of Ubiquitous IT-Based Control.Aurélie Leclercq-Vandelannoitte - 2017 - Journal of Business Ethics 142 (1):139-154.details
|
|
Securing privacy at work: The importance of contextualized consent. [REVIEW]Elin Palm - 2009 - Ethics and Information Technology 11 (4):233-241.details
|
|
Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns.Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107-123.details
|
|