Switch to: Citations

Add references

You must login to add references.
  1. Uneasy Access: Privacy for Women in a Free Society.Anita L. Allen - 1988 - Rowman & Littlefield Publishers.
    'Anita L. Allen breaks new ground...A stunning indictment of women's status in contemporary society, her book provides vital original scholarly research and insight.' |s-NEW DIRECTIONS FOR WOMEN.
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  • Privacy protection, control of information, and privacy-enhancing technologies.Herman T. Tavani & James H. Moor - 2001 - Acm Sigcas Computers and Society 31 (1):6-11.
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • (1 other version)Information ethics, its nature and scope.Luciano Floridi - 2006 - Acm Sigcas Computers and Society 36 (2):21-36.
    In recent years, “Information Ethics” (IE) has come to mean different things to different researchers working in a variety of disciplines, including computer ethics, business ethics, medical ethics, computer science, the philosophy of information, social epistemology and library and information science. Using an ontocentric approach, this paper seeks to define the parameters of IE and thereby increase our understanding of the moral challenges associated with Information Communication Technologies.
    Download  
     
    Export citation  
     
    Bookmark   49 citations  
  • Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract.Kirsten E. Martin - 2012 - Journal of Business Ethics 111 (4):519-539.
    A growing body of theory has focused on privacy as being contextually defined, where individuals have highly particularized judgments about the appropriateness of what, why, how, and to whom information flows within a specific context. Such a social contract understanding of privacy could produce more practical guidance for organizations and managers who have employees, users, and future customers all with possibly different conceptions of privacy across contexts. However, this theoretical suggestion, while intuitively appealing, has not been empirically examined. This study (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Psychological Contracts.Jeffery A. Thompson & David W. Hart - 2005 - Proceedings of the International Association for Business and Society 16:38-43.
    Social contract theory has been criticized as a “theory in search of application.” We argue that incorporating the nano- or individual level of analysis into social contract inquiry will yield more descriptive theory. We draw upon the psychological contract perspective to address two critiques of social contract theory: its rigid macro orientation and inattention to the process of contract formation. We demonstrate how a psychological contract approach offers practical insight into the impact of social contracting on day-today human interaction.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Stakeholder Theory and A Principle of Fairness.Robert A. Phillips - 1997 - Business Ethics Quarterly 7 (1):51-66.
    Stakeholder theory has become a central issue in the literature on business ethics / business and society. There are, however, a number of problems with stakeholder theory as currently understood. Among these are: 1) the lack of a coherent justificatory framework, 2) the problem of adjudicating between stakeholders, and 3) the problem of stakeholder identification. In this essay, I propose that a possible source of obligations to stakeholders is the principle of fairness (or fair play) as discussed in the political (...)
    Download  
     
    Export citation  
     
    Bookmark   156 citations  
  • (1 other version)Privacy: Philosophical Dimensions.Ferdinand Schoeman - 1984 - American Philosophical Quarterly 21 (3):199 - 213.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Anarchy, State, and Utopia.Robert Nozick - 1974 - New York: Basic Books.
    Winner of the 1975 National Book Award, this brilliant and widely acclaimed book is a powerful philosophical challenge to the most widely held political and social positions of our age--liberal, socialist, and conservative.
    Download  
     
    Export citation  
     
    Bookmark   2053 citations  
  • Freedom evolves.Daniel Clement Dennett - 2003 - New York: Viking Press.
    Daniel C. Dennett is a brilliant polemicist, famous for challenging unexamined orthodoxies. Over the last thirty years, he has played a major role in expanding our understanding of consciousness, developmental psychology, and evolutionary theory. And with such groundbreaking, critically acclaimed books as Consciousness Explained and Darwin's Dangerous Idea (a National Book Award and Pulitzer Prize finalist), he has reached a huge general and professional audience. In this new book, Dennett shows that evolution is the key to resolving the ancient problems (...)
    Download  
     
    Export citation  
     
    Bookmark   281 citations  
  • Ethics at work: basic readings in business ethics.William H. Shaw (ed.) - 2003 - New York: Oxford University Press.
    A unique and compact collection, Ethics at Work: Basic Readings in Business Ethics is an ideal text for courses in business ethics, business and society, or applied ethics. Bringing together eleven essays by prominent authors, it features some of the best work in the field and addresses important and provocative issues. The essays represent diverse ethical and philosophical orientations and have been edited and abridged to make them more accessible to students. The book opens with two introductory readings that discuss (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Good natured: the origins of right and wrong in humans and other animals.Frans de Waal - 1996 - Cambridge: Harvard University Press.
    Waal shows how ethical behavior is as much a matter of evolution as any other trait.
    Download  
     
    Export citation  
     
    Bookmark   197 citations  
  • The moral foundation of employee rights.John R. Rowan - 2000 - Journal of Business Ethics 24 (4):355 - 361.
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Why privacy is important.James Rachels - 1975 - Philosophy and Public Affairs 4 (4):323-333.
    Download  
     
    Export citation  
     
    Bookmark   158 citations  
  • Privacy, the workplace and the internet.Seumas Miller & John Weckert - 2000 - Journal of Business Ethics 28 (3):255 - 265.
    This paper examines workplace surveillance and monitoring. It is argued that privacy is a moral right, and while such surveillance and monitoring can be justified in some circumstances, there is a presumption against the infringement of privacy. An account of privacy precedes consideration of various arguments frequently given for the surveillance and monitoring of employees, arguments which look at the benefits, or supposed benefits, to employees as well as to employers. The paper examines the general monitoring of work, and the (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • Liberal and communitarian defenses of workplace privacy.Rita C. Manning - 1997 - Journal of Business Ethics 16 (8):817-823.
    In this paper, I survey liberal and communitarian defenses of privacy, paying particular attention to defenses of privacy in the workplace. I argue that liberalism cannot explain all our of intuitions about the wrongness of workplace invasions of privacy. Communitarianism, on the other hand, is able to account for these intuitions.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • (1 other version)Integrative Social Contracts Theory.Thomas Donaldson - 1995 - Economics and Philosophy 11 (1):85-112.
    Difficult moral issues in economic life, such as evaluating the impact of hostile takeovers and plant relocations or determining the obligations of business to the environment, constitute the raison d'etre of business ethics. Yet, while the ultimate resolution of such issues clearly requires detailed, normative analysis, a shortcoming of business ethics is that to date it has failed to develop an adequate normative theory.1 The failing is especially acute when it results in an inability to provide a basis for fine-grained (...)
    Download  
     
    Export citation  
     
    Bookmark   72 citations  
  • (1 other version)Spheres of Justice: A Defense of Pluralism and Equality.Michael Walzer - 1983 - Journal of Business Ethics 4 (1):63-64.
    Download  
     
    Export citation  
     
    Bookmark   573 citations  
  • Spheres of Justice: A Defence of Pluralism and Equality.Michael Walzer - 1983 - Basic Books.
    Download  
     
    Export citation  
     
    Bookmark   475 citations  
  • Privacy and Freedom.Alan F. Westin - 1970 - Science and Society 34 (3):360-363.
    Download  
     
    Export citation  
     
    Bookmark   205 citations  
  • Floridi’s ontological theory of informational privacy: Some implications and challenges. [REVIEW]Herman T. Tavani - 2008 - Ethics and Information Technology 10 (2-3):155-166.
    This essay critically analyzes Luciano Floridi’s ontological theory of informational privacy. Organized into two main parts, Part I examines some key foundational components of Floridi’s privacy theory and it considers some of the ways in which his framework purports to be superior to alternative theories of informational privacy. Part II poses two specific challenges for Floridi’s theory of informational privacy, arguing that an adequate privacy theory should be able to: (i) differentiate informational privacy from other kinds of privacy, including psychological (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Drug testing and the right to privacy: Arguing the ethics of workplace drug testing. [REVIEW]Michael Cranford - 1998 - Journal of Business Ethics 17 (16):1805-1815.
    As drug testing has become increasingly used to maximize corporate profits by minimizing the economic impact of employee substance abuse, numerous arguments have been advanced which draw the ethical justification for such testing into question, including the position that testing amounts to a violation of employee privacy by attempting to regulate an employee's behavior in her own home, outside the employer's legitimate sphere of control. This article first proposes that an employee's right to privacy is violated when personal information is (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • (1 other version)Anarchy, State, and Utopia.Robert Nozick - 1974 - Philosophy 52 (199):102-105.
    Download  
     
    Export citation  
     
    Bookmark   2011 citations  
  • (1 other version)Integrative Social Contracts Theory.Thomas Donaldson & Thomas Dunfee - 1994 - Economics and Philosophy 10 (2):85-112.
    Difficult moral issues in economic life, such as evaluating the impact of hostile takeovers and plant relocations or determining the obligations of business to the environment, constitute the raison d'etre of business ethics. Yet, while the ultimate resolution of such issues clearly requires detailed, normative analysis, a shortcoming of business ethics is that to date it has failed to develop an adequate normative theory.1 The failing is especially acute when it results in an inability to provide a basis for fine-grained (...)
    Download  
     
    Export citation  
     
    Bookmark   61 citations  
  • Extant Social Contracts in Global Business Regulation: Outline of a Research Agenda.J. Oosterhout & Pursey Heugens - 2009 - Journal of Business Ethics 88 (S4):729-740.
    The notion of extant social contracts (ESC), which was the original contribution that Tom Dunfee provided to contractualist business ethics (CBE) and Integrated Social Contracts Theory (ISCT) more specifically, has commanded less research attention to date than one would expect based on its apparent empirical face validity and its disciplinary spanning potential. This article attempts to revive the ESC concept in both normative and positive research at the intersection of business, management, and ethics and law. After identifying three features that (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Lying: The Impact of Decision Context.William T. Ross & Diana C. Robertson - 2000 - Business Ethics Quarterly 10 (2):409-440.
    Abstract:This study tests the usefulness of a person-situation interactionist framework in examining the willingness of a salesperson to lie to get an order. Using a survey of 389 salespersons, our results demonstrate that organizational relationships influence willingness to lie. Specifically, salespersons are less willing to lie to their own company than to their customer, than to a channel partner, and finally, than to a competitor firm. Furthermore, respondents from firms with a clear and positive ethical climate are less willing to (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  • Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145-160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • A Critical Perspective of Integrative Social Contracts Theory: Recurring Criticisms and Next Generation Research Topics.Thomas W. Dunfee - 2006 - Journal of Business Ethics 68 (3):303-328.
    During the past ten years Integrative Social Contracts Theory (ISCT) has become part of the repertoire of specialized decision-oriented theories in the business ethics literature. The intention here is to (1)␣provide a brief overview of the structure and strengths of ISCT; (2) identify recurring themes in the extensive commentary on the theory including brief mention of how ISCT has been applied outside the business ethics literature; (3) describe where research appears to be headed; and (4) specify challenges faced by those (...)
    Download  
     
    Export citation  
     
    Bookmark   56 citations  
  • Psychological Contracts: A Nano-Level Perspective on Social Contract Theory.Jeffery A. Thompson & David W. Hart - 2006 - Journal of Business Ethics 68 (3):229-241.
    Social contract theory has been criticized as a “theory in search of application.” We argue that incorporating the nano, or individual, level of analysis into social contract inquiry will yield more descriptive theory. We draw upon the psychological contract perspective to address two critiques of social contract theory: its rigid macro-orientation and inattention to the process of contract formation. We demonstrate how a psychological contract approach offers practical insight into the impact of social contracting on day-to-day human interaction. We then (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Individual Differences in the Acceptability of Unethical Information Technology Practices: The Case of Machiavellianism and Ethical Ideology.Susan J. Winter, Antonis C. Stylianou & Robert A. Giacalone - 2004 - Journal of Business Ethics 54 (3):275-296.
    While information technologies present organizations with opportunities to become more competitive, unsettled social norms and lagging legislation guiding the use of these technologies present organizations and individuals with ethical dilemmas. This paper presents two studies investigating the relationship between intellectual property and privacy attitudes, Machiavellianism and Ethical Ideology, and working in R&D and computer literacy in the form of programming experience. In Study 1, Machiavellians believed it was more acceptable to ignore the intellectual property and privacy rights of others. Programmers (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
    Download  
     
    Export citation  
     
    Bookmark   74 citations  
  • Privacy at work – ethical criteria.Anders J. Persson & Sven Ove Hansson - 2003 - Journal of Business Ethics 42 (1):59 - 70.
    New technologies and practices, such as drug testing, genetic testing, and electronic surveillance infringe upon the privacy of workers on workplaces. We argue that employees have a prima facie right to privacy, but this right can be overridden by competing moral principles that follow, explicitly or implicitly, from the contract of employment. We propose a set of criteria for when intrusions into an employee''s privacy are justified. Three types of justification are specified, namely those that refer to the employer''s interests, (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • (1 other version)Ties that Unwind: Dynamism in Integrative Social Contracts Theory1.Robert A. Phillips & Michael E. Johnson-Cramer - 2006 - Journal of Business Ethics 68 (3):283-302.
    Social contract theory offers a powerful method and metaphor for the study of organizational ethics. This paper considers the variant of the social contract that has arguably gained the most attention among business ethicists: integrative social contracts theory or ISCT [Donaldson and Dunfee: 1999, Ties That Bind (Harvard Business School Press, Boston)]. A core precept of ISCT – that consent to membership in an organization entails obligations to follow the norms of that organization, subject to the moral minimums of basic (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • The Perceptions of Consumers Regarding Online Retailers’ Ethics and Their Relationship with Consumers’ General Internet Expertise and Word of Mouth: A Preliminary Analysis.Sergio Román & Pedro J. Cuestas - 2008 - Journal of Business Ethics 83 (4):641-656.
    Ethical concerns of Internet users continue to rise. Accordingly, several scholars have called for systematic empirical research to address these issues. This study examines the conceptualization and measurement of consumers' perceptions regarding the ethics of online retailers. Also, this research represents a first step into the analysis of the relationship between CPEOR, consumers' general Internet expertise and reported positive word of mouth. Results, from a convenience sample of 357 online shoppers, suggest that CPEOR can be operationalized as a second-order construct (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy.Meng-Hsiang Hsu & Feng-Yang Kuo - 2003 - Journal of Business Ethics 42 (4):305 - 320.
    In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows that (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • In Defense of a Self-Disciplined, Domain-Specific Social Contract Theory of Business Ethics.Ben Wempe - 2005 - Business Ethics Quarterly 15 (1):113-135.
    Abstract:This article sets out two central theses. Both theses primarily involve a fundamental criticism of current contractarian business ethics (CBE), but if these can be sustained, they also constitute two boundary conditions for any future contractarian theory of business ethics. The first, which I label the self-discipline thesis, claims that current CBE would gain considerably in focus if more attention were paid to the logic of the social contract argument. By this I mean the aims set by the theorist and (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  • (1 other version)Ties that Unwind: Dynamism in Integrative Social Contracts Theory1.Robert A. Phillips & Michael E. Johnson-Cramer - 2006 - Journal of Business Ethics 68 (3):283-302.
    Social contract theory offers a powerful method and metaphor for the study of organizational ethics. This paper considers the variant of the social contract that has arguably gained the most attention among business ethicists: integrative social contracts theory or ISCT [Donaldson and Dunfee: 1999, Ties That Bind (Harvard Business School Press, Boston)]. A core precept of ISCT - that consent to membership in an organization entails obligations to follow the norms of that organization, subject to the moral minimums of basic (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  • A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent.Irene Pollach - 2005 - Journal of Business Ethics 62 (3):221-235.
    The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • (1 other version)Darwin's Dangerous Idea: Evolution and the Meanings of Life.David L. Hull - 1997 - British Journal for the Philosophy of Science 48 (3):435-438.
    Download  
     
    Export citation  
     
    Bookmark   518 citations  
  • Technology, workplace privacy and personhood.William S. Brown - 1996 - Journal of Business Ethics 15 (11):1237 - 1248.
    This paper traces the intellectual development of the workplace privacy construct in the course of American thinking. The role of technological development in this process is examined, particularly in regard to the information gathering/dissemination dilemmas faced by employers and employees alike. The paper concludes with some preliminary considerations toward a theory of workplace privacy.
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Locating a Space for Ethics to Appear in Decision-making: Privacy as an Exemplar.William Bonner - 2007 - Journal of Business Ethics 70 (3):221-234.
    Using concepts from Ulrich Beck's Risk Society, this paper argues that as expertise proliferates questions of ethics in decision-making fall through gaps between domains of expertise. As a consequence, unethical outcomes are unattached to actions taken with no one accountable or responsible for these outcomes. Using Actor-Network Theory, a case study is presented showing how the sale of students' personal information by the Calgary Board of Education escaped questions of ethics. The sale of student information was the product of the (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Foundations and Applications for Contractualist Business Ethics.Pursey P. M. A. R. Heugens, J. Oosterhout & Muel Kaptein - 2006 - Journal of Business Ethics 68 (3):211-228.
    Contractualism is one of the most promising ‘centers of gravity’ in business ethics. In this guest editorial we provide a concise roadmap to the field, sketching contractualism’s historic and disciplinary antecedents, the basic argumentative structure of the contract model, and its boundary conditions. We also sketch two main dimensions along which contributions to the contractualist tradition can be positioned. The first dimension entails positive versus normative theorizing – does a given contribution analyze the world as it is or how it (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • The “I” in ISCT: Normative and Empirical Facets of Integration.Katherina Glac & Tae Wan Kim - 2009 - Journal of Business Ethics 88 (S4):693-705.
    Integrative social contracts theory is a novel approach to normative questions and has been widely evaluated, discussed, and applied by academics and practitioners alike. While the "I" in ISCT leads the title, it has not received the analytical attention it deserves, especially since the "integrative" component in ISCT is multifaceted and at the conceptual core of the theory. In this paper we therefore take a closer look at two facets of integration. First, we examine the normative integration that takes place (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Perceived Ethicality of Insurance Claim Fraud: Do Higher Deductibles Lead to Lower Ethical Standards?Anthony D. Miyazaki - 2009 - Journal of Business Ethics 87 (4):589-598.
    Insurance claim fraud costs insurance companies, policymakers, and taxpayers billions of dollars every year and has been described as the second largest white collar crime. The most common insurance fraud activity and one that contributes a significant portion of dollar losses is the practice of padding claim amounts in the event of a loss. One of the largest issues insurance companies face is that policyholders often do not perceive insurance claim padding as an unethical behavior. However, very little research has (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • The Impact of Individual Ethics on Reactions to Potentially Invasive HR Practices.G. Stoney Alder, Marshall Schminke & Terry W. Noel - 2007 - Journal of Business Ethics 75 (2):201-214.
    In recent years, the practices of work organizations have raised increasing concerns regarding individual privacy at work. It is clear that people expect and value privacy in their personal lives. However, the extent to which privacy perceptions influence individuals’ work attitudes is less clear. Research has explored the extent to which employee perceptions of privacy derive from characteristics of the programs themselves. However, there is a paucity of research that examines how the characteristics of the individual employee may influence perceptions (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns.Laurence Ashworth & Clinton Free - 2006 - Journal of Business Ethics 67 (2):107-123.
    Technology used in online marketing has advanced to a state where collection, enhancement and aggregation of information are instantaneous. This proliferation of customer information focused technology brings with it a host of issues surrounding customer privacy. This article makes two key contributions to the debate concerning digital privacy. First, we use theories of justice to help understand the way consumers conceive of, and react to, privacy concerns. Specifically, it is argued that an important component of consumers' privacy concerns relates to (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  • An Ethical Exploration of Privacy and Radio Frequency Identification.Alan R. Peslak - 2005 - Journal of Business Ethics 59 (4):327-345.
    This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • (2 other versions)Privacy Rights On The Internet: Self-Regulation Or Government Regulation?Norman E. Bowie & Karim Jamal - 2006 - Business Ethics Quarterly 16 (3):323-342.
    Consumer surveys indicate that concerns about privacy are a principal factor discouraging consumers from shopping online. The keypublic policy issue regarding privacy is whether the US should follow its current self-regulation course, or whether a European style formal legal regulation approach should be adopted in the US.We conclude that the use of assurance seals has worked reasonably well and websites should be free to decide whether they have aprivacy seal or not. Given the narrow scope and the wide variety among (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Thick and Thin: Moral Argument at Home and Abroad.Michael Walzer - 1995 - Philosophy 70 (273):472-475.
    Download  
     
    Export citation  
     
    Bookmark   193 citations  
  • Privacy in the information age: Stakeholders, interests and values. [REVIEW]Lucas Introna & Athanasia Pouloudi - 1999 - Journal of Business Ethics 22 (1):27 - 38.
    Privacy is a relational and relative concept that has been defined in a variety of ways. In this paper we offer a systematic discussion of potentially different notions of privacy. We conclude that privacy as the freedom or immunity from the judgement of others is an extremely useful concept to develop ways in which to understand privacy claims and associated risks. To this end, we develop a framework of principles that explores the interrelations of interests and values for various stakeholders (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites.Zeynep Tufekci - 2008 - Bulletin of Science, Technology and Society 28 (1):20-36.
    The prevailing paradigm in Internet privacy literature, treating privacy within a context merely of rights and violations, is inadequate for studying the Internet as a social realm. Following Goffman on self-presentation and Altman's theorizing of privacy as an optimization between competing pressures for disclosure and withdrawal, the author investigates the mechanisms used by a sample (n = 704) of college students, the vast majority users of Facebook and Myspace, to negotiate boundaries between public and private. Findings show little to no (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations