Switch to: References

Add citations

You must login to add citations.
  1. E-mail, terrorism, and the right to privacy.Stephen Coleman - 2006 - Ethics and Information Technology 8 (1):17-27.
    This paper discusses privacy and the monitoring of e-mail in the context of the international nature of the modern world. Its three main aims are: (1) to highlight the problems involved in discussing an essentially philosophical question within a legal framework, and thus to show that providing purely legal answers to an ethical question is an inadequate approach to the problem of privacy on the Internet; (2) to discuss and define what privacy in the medium of the Internet actually is; (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice. [REVIEW]Leigh A. Clark & Sherry J. Roberts - 2010 - Journal of Business Ethics 95 (4):507 - 525.
    The Internet has drastically changed how people interact, communicate, conduct business, seek jobs, find partners, and shop. Millions of people are using social networking sites to connect with others, and employers are using these sites as a source of background information on jobapplicants.Employers report making decisions not to hire people based on the information posted on social networking sites. Few employers have policies in place to govern when and how these online character checks should be used and how to ensure (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice.Leigh A. Clark & Sherry J. Roberts - 2010 - Journal of Business Ethics 95 (4):507-525.
    The Internet has drastically changed how people interact, communicate, conduct business, seek jobs, find partners, and shop. Millions of people are using social networking sites to connect with others, and employers are using these sites as a source of background information on job applicants. Employers report making decisions not to hire people based on the information posted on social networking sites. Few employers have policies in place to govern when and how these online character checks should be used and how (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Business ethics: A helpful hybrid in search of integrity.Edmund F. Byrne - 2002 - Journal of Business Ethics 37 (2):121 - 133.
    What sort of connection is there between business ethics and philosophy? The answer given here: a weak one, but it may be getting stronger. Comparatively few business ethics articles are structurally dependent on mainstream academic philosophy or on such sub-specialities thereof as normative ethics, moral theory, and social and political philosophy. Examining articles recently published in the Journal of Business Ethics that declare some dependence, the author finds that such declarations often constitute only a pro forma gesture which could be (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Applying the new software engineering code of ethics to usability engineering: A study of four cases.Oliver K. Burmeister & John Weckert - 2003 - Journal of Information, Communication and Ethics in Society 1 (3):119-132.
    It has been argued that it is in the best interests of IT professionals, to adopt and enforce professional codes in the work place. But there is no code for usability engineers, unless one accepts that it is a branch of software engineering. The new joint ACM/IEEE‐CS Software Engineering Code of Ethics is applied to actual usability cases. This enables usability engineers to interpret this code in their profession. This is achieved by utilizing four case studies both directly in terms (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Marketing dataveillance and digital privacy: Using theories of justice to understand consumers' online privacy concerns. [REVIEW]Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107 - 123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers’ privacy concerns relates to (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns.Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107-123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers' privacy concerns relates to (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • On the autonomy and justification of nanoethics.Fritz Allhoff - 2007 - NanoEthics 1 (3):185-210.
    In this paper, I take a critical stance on the emerging field of nanoethics. After an introductory section, “Conceptual Foundations of Nanotechnology” considers the conceptual foundations of nanotechnology, arguing that nanoethics can only be as coherent as nanotechnology itself and then discussing concerns with this latter concept; the conceptual foundations of nanoethics are then explicitly addressed in “Conceptual Foundations of Nanoethics”. “Issues in Nanoethics” considers ethical issues that will be raised through nanotechnology and, in “What’s New?”, it is argued that (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • Ethical issues in electronic comemrce.Bette Ann Stead & Jackie Gilbert - 2001 - Journal of Business Ethics 34 (2):75 - 85.
    This article reviews the incredible growth of electronic commerce (e-commerce) and presents ethical issues that have emerged. Security concerns, spamming, Web sites that do not carry an "advertising" label, cybersquatters, online marketing to children, conflicts of interest, manufacturers competing with intermediaries online, and "dinosaurs" are discussed. The power of the Internet to spotlight issues is noted as a significant force in providing a kind of self-regulation that supports an ethical e-commerce environment.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Ethical Issues in Electronic Commerce.Bette Stead & Jackie Gilbert - 2001 - Journal of Business Ethics 34 (2):75-85.
    This article reviews the incredible growth of electronic commerce (e-commerce) and presents ethical issues that have emerged. Security concerns, spamming, Web sites that do not carry an "advertising" label, cybersquatters, online marketing to children, conflicts of interest, manufacturers competing with intermediaries online, and "dinosaurs" are discussed. The power of the Internet to spotlight issues is noted as a significant force in providing a kind of self-regulation that supports an ethical e-commerce environment.
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • Why the Duty to Self-Censor Requires Social-Media Users to Maintain Their Own Privacy.Earl Spurgin - 2019 - Res Publica 25 (1):1-19.
    Revelations of personal matters often have negative consequences for social-media users. These consequences trigger frequent warnings, practical rather than moral in nature, that social-media users should consider carefully what they reveal about themselves since their revelations might cause them various difficulties in the future. I set aside such practical considerations and argue that social-media users have a moral obligation to maintain their own privacy that is rooted in the duty to self-censor. Although Anita L. Allen provides a paternalist justification of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Securing privacy at work: The importance of contextualized consent. [REVIEW]Elin Palm - 2009 - Ethics and Information Technology 11 (4):233-241.
    The starting point of this article is that employees’ chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of job-applicants that they negotiate their privacy interests in employment contracting, it is important to consider (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Privacy Expectations at Work—What is Reasonable and Why?Elin Palm - 2009 - Ethical Theory and Moral Practice 12 (2):201-215.
    Throughout the longstanding debate on privacy, the concept has been framed in various ways. Most often it has been discussed as an area within which individuals rightfully may expect to be left alone and in terms of certain data that they should be entitled to control. The sphere in which individuals should be granted freedom from intrusion has typically been equated with the indisputably private domestic sphere. Privacy claims in the semi-public area of work have not been sufficiently investigated. In (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • An interactive ethical assessment of surveillance‐capable software within the home‐help service sector.Elin Palm - 2013 - Journal of Information, Communication and Ethics in Society 11 (1):43-68.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Ethics of Smart Stadia: A Stakeholder Analysis of the Croke Park Project.Fiachra O’Brolcháin, Simone de Colle & Bert Gordijn - 2019 - Science and Engineering Ethics 25 (3):737-769.
    The development of “smart stadia”, i.e. the use of “smart technologies” in the way sports stadia are designed and managed, promises to enhance the experience of attending a live match through innovative and improved services for the audience, as well as for the players, vendors and other stadium stakeholders. These developments offer us a timely opportunity to reflect on the ethical implications of the use of smart technologies and the emerging Internet of Things. The IoT has the potential to radically (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.
    Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a community about sharing and using (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract.Kirsten E. Martin - 2012 - Journal of Business Ethics 111 (4):519-539.
    A growing body of theory has focused on privacy as being contextually defined, where individuals have highly particularized judgments about the appropriateness of what, why, how, and to whom information flows within a specific context. Such a social contract understanding of privacy could produce more practical guidance for organizations and managers who have employees, users, and future customers all with possibly different conceptions of privacy across contexts. However, this theoretical suggestion, while intuitively appealing, has not been empirically examined. This study (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • An Indirect Argument for the Access Theory of Privacy.Jakob Mainz - 2021 - Res Publica 27 (3):309-328.
    In this paper, I offer an indirect argument for the Access Theory of privacy. First, I develop a new version of the rival Control Theory that is immune to all the classic objections against it. Second, I show that this new version of the Control Theory collapses into the Access Theory. I call the new version the ‘Negative Control Account’. Roughly speaking, the classic Control Theory holds that you have privacy if, and only if, you can control whether other people (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • An Ethical Perspective on Emerging Forms of Ubiquitous IT-Based Control.Aurélie Leclercq-Vandelannoitte - 2017 - Journal of Business Ethics 142 (1):139-154.
    The goal of this paper is to investigate the ethical implications of emerging forms of control that have developed along with the use of ubiquitous information technology. Because it can be exerted at a distance, almost anytime and anywhere, IT-based control has become more subtle, indirect, and almost invisible, with many negative side effects. Yet the issues raised by this new form of control have rarely been interpreted, treated, and framed as ethical issues in business ethics literature. Thus, a more (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Public health measures and the rise of incidental surveillance: Considerations about private informational power and accountability.B. A. Kamphorst & A. Henschke - 2023 - Ethics and Information Technology 25 (4):1-14.
    The public health measures implemented in response to the COVID-19 pandemic have resulted in a substantially increased shared reliance on private infrastructure and digital services in areas such as healthcare, education, retail, and the workplace. This development has (i) granted a number of private actors significant (informational) power, and (ii) given rise to a range of digital surveillance practices incidental to the pandemic itself. In this paper, we reflect on these secondary consequences of the pandemic and observe that, even though (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Drivers and Inhibitors of Internet Privacy Concern: A Multidimensional Development Theory Perspective.Weiyin Hong, Frank K. Y. Chan & James Y. L. Thong - 2019 - Journal of Business Ethics 168 (3):539-564.
    This paper investigates the drivers and inhibitors of Internet privacy concern. Applying the Multidimensional Development Theory to the online environment, we identify the important factors under four dimensions—i.e., environmental, individual, information management, and interaction management. We tested our model using data from an online survey of 2417 individuals in Hong Kong. The results show that the factors under all four dimensions are significant in the formation of Internet privacy concern. Specifically, familiarity with government legislation, Internet knowledge, benefit of information disclosure, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • A 30-Year Historical Examination of Ethical Concerns Regarding Business Ethics: Who’s Concerned? [REVIEW]Will Drover, Jennifer Franczak & Richard F. Beltramini - 2012 - Journal of Business Ethics 111 (4):431-438.
    Understanding the ethical attitudes and concerns of future business leaders has been the focus of increasing research attention. Largely, this is due to the influence of such perspectives, as it is these presently held ideologies that ultimately translate into the actions and behaviors of the forthcoming workforce. This research examines how such business-related ethicality perspectives have evolved by administering a nationwide survey that builds on two Journal of Business Ethics studies, Beltramini et al. (J Bus Ethics 3:195–200, 1984 ) and (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Ethics of Workspace Surveillance.Elin Palm - 2008 - Dissertation, Royal Institute of Technology, Stockholm
    The general framework of this thesis is that of ethical Technology Assessment. Whereas the first essay proposes an inclusive approach to technology assessment by delineating an ethical checklist, the following essays focus on two of the checklist points, i.e. “privacy” and “control, influence and power”, in relation to workspace surveillance. The core idea of Essay I is that, due to its strong social impact, new technology and novel use of existing technology should be considered from the perspective of ethics. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • I Know What You Will Do Next Summer: Informational Privacy and the Ethics of Data Analytics.Jakob Mainz - 2021 - Dissertation, Aalborg University
    Download  
     
    Export citation  
     
    Bookmark