Switch to: Citations

Add references

You must login to add references.
  1. Some Problems with Employee Monitoring.Kirsten Martin & R. Edward Freeman - 2003 - Journal of Business Ethics 43 (4):353-361.
    Employee monitoring has raised concerns from all areas of society – business organizations, employee interest groups, privacy advocates, civil libertarians, lawyers, professional ethicists, and every combination possible. Each advocate has its own rationale for or against employee monitoring whether it be economic, legal, or ethical. However, no matter what the form of reasoning, seven key arguments emerge from the pool of analysis. These arguments have been used equally from all sides of the debate. The purpose of this paper is to (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  • Information technology, privacy, and the protection of personal data.Jeroen Van Den Hoven - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press.
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • (3 other versions)Why Managers Fail to Do the Right Thing: An Empirical Study of Unethical and Illegal Conduct.N. Craig Smith, Sally S. Simpson & Chun-Yao Huang - 2007 - Business Ethics Quarterly 17 (4):633-667.
    We combine prior research on ethical decision-making in organizations with a rational choice theory of corporate crime from criminology to develop a model of corporate offending that is tested with a sample of U.S. managers. Despite demands for increased sanctioning of corporate offenders, we find that the threat of legal action does not directly affect the likelihood of misconduct. Managers’ evaluations of the ethics of the act, measured using a multidimensional ethics scale, have a significant effect, as do outcome expectancies (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
    Download  
     
    Export citation  
     
    Bookmark   72 citations  
  • Psychological Contracts.Jeffery A. Thompson & David W. Hart - 2005 - Proceedings of the International Association for Business and Society 16:38-43.
    Social contract theory has been criticized as a “theory in search of application.” We argue that incorporating the nano- or individual level of analysis into social contract inquiry will yield more descriptive theory. We draw upon the psychological contract perspective to address two critiques of social contract theory: its rigid macro orientation and inattention to the process of contract formation. We demonstrate how a psychological contract approach offers practical insight into the impact of social contracting on day-today human interaction.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • (1 other version)Privacy: Philosophical Dimensions.Ferdinand Schoeman - 1984 - American Philosophical Quarterly 21 (3):199 - 213.
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Privacy, Polygraphs and Work.George G. Brenkert - 1981 - Business and Professional Ethics Journal 1 (1):19-35.
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Scenarios in Business Ethics Research: Review, Critical Assessment, and Recommendations.James Weber - 1992 - Business Ethics Quarterly 2 (2):137-160.
    A growing number of researchers in the business ethics field have used scenarios as a data gathering technique in their empirical investigations of ethical issues. This paper offers a review and critique of 26 studies that have utilized scenarios to elicit inferences of ethical reasoning, decision making, and/or intended behavior from managerial or student populations. The use of a theoretical foundation, the development of hypotheses, various characteristics germane to the use of scenarios, population and sampling issues, and the use of (...)
    Download  
     
    Export citation  
     
    Bookmark   80 citations  
  • Decision-Making Processes on Ethical Issues: The Impact of a Social Contract Perspective.William T. Ross Jr - 1995 - Business Ethics Quarterly 5 (2):213-240.
    Abstract:This paper develops a framework for examining decision making about ethical issues and tests the applicability of a social contract perspective. Using two separate samples of students and salespeople, we determine that community members (salespeople) tend to judge a potentially unethical act to constitute a violation of an implicit social contract and non-community members (students) do not. Also, consistent with the emphasis on context specificity of integrative social contracts theory, situational variables influence perceptions of ethicality for the community members, but (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • In Defense of a Self-Disciplined, Domain-Specific Social Contract Theory of Business Ethics.Ben Wempe - 2005 - Business Ethics Quarterly 15 (1):113-135.
    Abstract:This article sets out two central theses. Both theses primarily involve a fundamental criticism of current contractarian business ethics (CBE), but if these can be sustained, they also constitute two boundary conditions for any future contractarian theory of business ethics. The first, which I label the self-discipline thesis, claims that current CBE would gain considerably in focus if more attention were paid to the logic of the social contract argument. By this I mean the aims set by the theorist and (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy at work – ethical criteria.Anders J. Persson & Sven Ove Hansson - 2003 - Journal of Business Ethics 42 (1):59 - 70.
    New technologies and practices, such as drug testing, genetic testing, and electronic surveillance infringe upon the privacy of workers on workplaces. We argue that employees have a prima facie right to privacy, but this right can be overridden by competing moral principles that follow, explicitly or implicitly, from the contract of employment. We propose a set of criteria for when intrusions into an employee''s privacy are justified. Three types of justification are specified, namely those that refer to the employer''s interests, (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Organizational commitment and ethical behavior: An empirical study of information system professionals. [REVIEW]Effy Oz - 2001 - Journal of Business Ethics 34 (2):137 - 142.
    IS professionals have been reported to have one of the highest turnover rates. They have also often been accused of unethical conduct, specifically, pirating software, hacking, giving professional opinion that exceeds their knowledge, and not protecting people''s privacy. In a sample of 71 IS professionals and 250 members of other professions we found that IS professionals were more committed to their organizations than the other professionals, and that IS professionals were, indeed, less ethical with respect to software piracy and hacking. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Information privacy and performance appraisal: An examination of employee perceptions and reactions. [REVIEW]Kevin W. Mossholder, William F. Giles & Mark A. Wesolowski - 1991 - Journal of Business Ethics 10 (2):151 - 156.
    Role-failure acts (Waters and Bird, 1989) have been described as a form of morally questionable activity involving a failure to perform the managerial role. The present study examined employee perceptions and reactions with regard to one form of role-failure act, failure to maintain adequate privacy of performance appraisal information. The study assessed employees' attitudes toward various performance appraisal facets as an invasion of privacy and determined the relationships between these privacy-related attitudes and employees' satisfaction with components of their appraisal system, (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy, the workplace and the internet.Seumas Miller & John Weckert - 2000 - Journal of Business Ethics 28 (3):255 - 265.
    This paper examines workplace surveillance and monitoring. It is argued that privacy is a moral right, and while such surveillance and monitoring can be justified in some circumstances, there is a presumption against the infringement of privacy. An account of privacy precedes consideration of various arguments frequently given for the surveillance and monitoring of employees, arguments which look at the benefits, or supposed benefits, to employees as well as to employers. The paper examines the general monitoring of work, and the (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • A critique of the empirical methods of integrative social contracts theory.Bryan W. Husted - 1999 - Journal of Business Ethics 20 (3):227 - 235.
    Integrative social contracts theory (ISCT) uses empirical methods to develop guidelines for international business ethics. This article criticizes ISCT in terms of the way people actually think about contracts and agreements around the globe. Differences in orientations to communications context, moral reasoning, and institutional and structural conditions make the identification of authentic norms, hypernorms, and relevant communities problematic. The difficulties of the empirical methods suggest recourse to more traditional theoretical approaches for the identification of hypernorms as well as a stronger (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. [REVIEW]Dag Elgesem - 1999 - Ethics and Information Technology 1 (4):283-293.
    The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the issues treated in (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Electronic monitoring and privacy issues in business-marketing: The ethics of the doubleclick experience. [REVIEW]Darren Charters - 2002 - Journal of Business Ethics 35 (4):243 - 254.
    The paper examines the ethics of electronic monitoring for advertising purposes and the implications for Internet user privacy using as a backdrop DoubleClick Incs recent controversy over matching previously anonymous user profiles with personally identifiable information. It explores various ethical theories that are applicable to understand privacy issues in electronic monitoring. It is argued that, despite the fact that electronic monitoring always constitutes an invasion of privacy, it can still be ethically justified on both Utilitarian and Kantian grounds. From a (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Genetic information: Consumers' right to privacy versus insurance companies' right to know a public opinion survey. [REVIEW]Shaheen Borna & Stephen Avila - 1999 - Journal of Business Ethics 19 (4):355 - 362.
    In this paper we present arguments for and against the disclosure of genetic information to the insurance companies. One of the main issues which emerges from these arguments is the question of who should be responsible for the health insurance costs of the individuals who are most likely to be affected by the disclosure of genetic information. The results of a resident opinion survey related to the above question are presented and public policy alternatives related to the survey findings are (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Appendix.[author unknown] - 1993 - The Personalist Forum 9 (1):53-61.
    Download  
     
    Export citation  
     
    Bookmark   119 citations  
  • The “I” in ISCT: Normative and Empirical Facets of Integration.Katherina Glac & Tae Wan Kim - 2009 - Journal of Business Ethics 88 (S4):693-705.
    Integrative social contracts theory is a novel approach to normative questions and has been widely evaluated, discussed, and applied by academics and practitioners alike. While the "I" in ISCT leads the title, it has not received the analytical attention it deserves, especially since the "integrative" component in ISCT is multifaceted and at the conceptual core of the theory. In this paper we therefore take a closer look at two facets of integration. First, we examine the normative integration that takes place (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • The Impact of Individual Ethics on Reactions to Potentially Invasive HR Practices.G. Stoney Alder, Marshall Schminke & Terry W. Noel - 2007 - Journal of Business Ethics 75 (2):201-214.
    In recent years, the practices of work organizations have raised increasing concerns regarding individual privacy at work. It is clear that people expect and value privacy in their personal lives. However, the extent to which privacy perceptions influence individuals’ work attitudes is less clear. Research has explored the extent to which employee perceptions of privacy derive from characteristics of the programs themselves. However, there is a paucity of research that examines how the characteristics of the individual employee may influence perceptions (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • A Critical Perspective of Integrative Social Contracts Theory: Recurring Criticisms and Next Generation Research Topics.Thomas W. Dunfee - 2006 - Journal of Business Ethics 68 (3):303-328.
    During the past ten years Integrative Social Contracts Theory (ISCT) has become part of the repertoire of specialized decision-oriented theories in the business ethics literature. The intention here is to (1)␣provide a brief overview of the structure and strengths of ISCT; (2) identify recurring themes in the extensive commentary on the theory including brief mention of how ISCT has been applied outside the business ethics literature; (3) describe where research appears to be headed; and (4) specify challenges faced by those (...)
    Download  
     
    Export citation  
     
    Bookmark   56 citations  
  • Psychological Contracts: A Nano-Level Perspective on Social Contract Theory.Jeffery A. Thompson & David W. Hart - 2006 - Journal of Business Ethics 68 (3):229-241.
    Social contract theory has been criticized as a “theory in search of application.” We argue that incorporating the nano, or individual, level of analysis into social contract inquiry will yield more descriptive theory. We draw upon the psychological contract perspective to address two critiques of social contract theory: its rigid macro-orientation and inattention to the process of contract formation. We demonstrate how a psychological contract approach offers practical insight into the impact of social contracting on day-to-day human interaction. We then (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Individual Differences in the Acceptability of Unethical Information Technology Practices: The Case of Machiavellianism and Ethical Ideology.Susan J. Winter, Antonis C. Stylianou & Robert A. Giacalone - 2004 - Journal of Business Ethics 54 (3):275-296.
    While information technologies present organizations with opportunities to become more competitive, unsettled social norms and lagging legislation guiding the use of these technologies present organizations and individuals with ethical dilemmas. This paper presents two studies investigating the relationship between intellectual property and privacy attitudes, Machiavellianism and Ethical Ideology, and working in R&D and computer literacy in the form of programming experience. In Study 1, Machiavellians believed it was more acceptable to ignore the intellectual property and privacy rights of others. Programmers (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Privacy and Freedom.Alan F. Westin - 1970 - Science and Society 34 (3):360-363.
    Download  
     
    Export citation  
     
    Bookmark   203 citations  
  • (3 other versions)Why Managers Fail to do the Right Thing: An Empirical Study of Unethical and Illegal Conduct.N. Craig Smith, Sally S. Simpson & Chun-Yao Huang - 2007 - Business Ethics Quarterly 17 (4):633-667.
    ABSTRACT:We combine prior research on ethical decision-making in organizations with a rational choice theory of corporate crime from criminology to develop a model of corporate offending that is tested with a sample of U.S. managers. Despite demands for increased sanctioning of corporate offenders, we find that the threat of legal action does not directly affect the likelihood of misconduct. Managers’ evaluations of the ethics of the act, measured using a multidimensional ethics scale, have a significant effect, as do outcome expectancies (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Foundations and Applications for Contractualist Business Ethics.Pursey P. M. A. R. Heugens, J. Oosterhout & Muel Kaptein - 2006 - Journal of Business Ethics 68 (3):211-228.
    Contractualism is one of the most promising ‘centers of gravity’ in business ethics. In this guest editorial we provide a concise roadmap to the field, sketching contractualism’s historic and disciplinary antecedents, the basic argumentative structure of the contract model, and its boundary conditions. We also sketch two main dimensions along which contributions to the contractualist tradition can be positioned. The first dimension entails positive versus normative theorizing – does a given contribution analyze the world as it is or how it (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • (3 other versions)Why Managers Fail to do the Right Thing: An Empirical Study of Unethical and Illegal Conduct.N. Craig Smith, Sally S. Simpson & Chun-Yao Huang - 2007 - Business Ethics Quarterly 17 (4):633-667.
    ABSTRACT:We combine prior research on ethical decision-making in organizations with a rational choice theory of corporate crime from criminology to develop a model of corporate offending that is tested with a sample of U.S. managers. Despite demands for increased sanctioning of corporate offenders, we find that the threat of legal action does not directly affect the likelihood of misconduct. Managers’ evaluations of the ethics of the act, measured using a multidimensional ethics scale, have a significant effect, as do outcome expectancies (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145-160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns.Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107-123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers' privacy concerns relates to (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • (1 other version)Ties that Unwind: Dynamism in Integrative Social Contracts Theory1.Robert A. Phillips & Michael E. Johnson-Cramer - 2006 - Journal of Business Ethics 68 (3):283-302.
    Social contract theory offers a powerful method and metaphor for the study of organizational ethics. This paper considers the variant of the social contract that has arguably gained the most attention among business ethicists: integrative social contracts theory or ISCT [Donaldson and Dunfee: 1999, Ties That Bind (Harvard Business School Press, Boston)]. A core precept of ISCT - that consent to membership in an organization entails obligations to follow the norms of that organization, subject to the moral minimums of basic (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • An Ethical Exploration of Privacy and Radio Frequency Identification.Alan R. Peslak - 2005 - Journal of Business Ethics 59 (4):327-345.
    This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Appendix.[author unknown] - 2009 - Journal of Law, Medicine and Ethics 37 (S1):129-151.
    Download  
     
    Export citation  
     
    Bookmark   78 citations  
  • Thick and Thin: Moral Argument at Home and Abroad.Michael Walzer - 1995 - Philosophy 70 (273):472-475.
    Download  
     
    Export citation  
     
    Bookmark   193 citations  
  • A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent.Irene Pollach - 2005 - Journal of Business Ethics 62 (3):221-235.
    The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • (1 other version)Ties that Unwind: Dynamism in Integrative Social Contracts Theory1.Robert A. Phillips & Michael E. Johnson-Cramer - 2006 - Journal of Business Ethics 68 (3):283-302.
    Social contract theory offers a powerful method and metaphor for the study of organizational ethics. This paper considers the variant of the social contract that has arguably gained the most attention among business ethicists: integrative social contracts theory or ISCT [Donaldson and Dunfee: 1999, Ties That Bind (Harvard Business School Press, Boston)]. A core precept of ISCT – that consent to membership in an organization entails obligations to follow the norms of that organization, subject to the moral minimums of basic (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • The Moral Intensity of Privacy: An Empirical Study of Webmasters' Attitudes. [REVIEW]Thomas R. Shaw - 2003 - Journal of Business Ethics 46 (4):301 - 318.
    Webmasters are a key moral agent in the issue of privacy. This study attempts to understand the factors underlying their attitudes about privacy based on the theory of moral intensity. Webmasters of high-traffic sites were invited via email to participate in a web-based survey. The results support the application of moral intensity to the domain of privacy and the population of webmasters - both outcomes and social norms have statistically significant main effects on attitudes. The results also suggest a reconfiguration (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations