Switch to: Citations

Add references

You must login to add references.
  1. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites.Zeynep Tufekci - 2008 - Bulletin of Science, Technology and Society 28 (1):20-36.
    The prevailing paradigm in Internet privacy literature, treating privacy within a context merely of rights and violations, is inadequate for studying the Internet as a social realm. Following Goffman on self-presentation and Altman's theorizing of privacy as an optimization between competing pressures for disclosure and withdrawal, the author investigates the mechanisms used by a sample (n = 704) of college students, the vast majority users of Facebook and Myspace, to negotiate boundaries between public and private. Findings show little to no (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • Privacy and Freedom.Alan F. Westin - 1970 - Science and Society 34 (3):360-363.
    Download  
     
    Export citation  
     
    Bookmark   205 citations  
  • Information technology, privacy, and the protection of personal data.Jeroen Van Den Hoven - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press.
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • (1 other version)Information ethics, its nature and scope.Luciano Floridi - 2006 - Acm Sigcas Computers and Society 36 (2):21-36.
    In recent years, “Information Ethics” (IE) has come to mean different things to different researchers working in a variety of disciplines, including computer ethics, business ethics, medical ethics, computer science, the philosophy of information, social epistemology and library and information science. Using an ontocentric approach, this paper seeks to define the parameters of IE and thereby increase our understanding of the moral challenges associated with Information Communication Technologies.
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  • What is computer ethics?James H. Moor - 1985 - Metaphilosophy 16 (4):266-275.
    Download  
     
    Export citation  
     
    Bookmark   153 citations  
  • Contextual gaps: privacy issues on Facebook.Gordon Hull, Heather Richter Lipford & Celine Latulipe - 2011 - Ethics and Information Technology 13 (4):289-302.
    Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant privacy issues for their users. We analyze two of Facebooks’s more recent features, Applications and News Feed, from the perspective enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps are at the root of many of the sites’ (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
    In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145-160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract.Kirsten E. Martin - 2012 - Journal of Business Ethics 111 (4):519-539.
    A growing body of theory has focused on privacy as being contextually defined, where individuals have highly particularized judgments about the appropriateness of what, why, how, and to whom information flows within a specific context. Such a social contract understanding of privacy could produce more practical guidance for organizations and managers who have employees, users, and future customers all with possibly different conceptions of privacy across contexts. However, this theoretical suggestion, while intuitively appealing, has not been empirically examined. This study (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • (1 other version)Privacy: Philosophical Dimensions.Ferdinand Schoeman - 1984 - American Philosophical Quarterly 21 (3):199 - 213.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
    Download  
     
    Export citation  
     
    Bookmark   74 citations  
  • Appendix.[author unknown] - 1993 - The Personalist Forum 9 (1):53-61.
    Download  
     
    Export citation  
     
    Bookmark   121 citations  
  • Appendix.[author unknown] - 1994 - Deutsche Vierteljahrsschrift für Literaturwissenschaft Und Geistesgeschichte 68 (1):289-289.
    Download  
     
    Export citation  
     
    Bookmark   119 citations