Results for 'Businesses' anti-privacy'

1000+ found
Order:
  1. Technology and Privacy.Edmund Byrne - 1991 - In Byrne Edmund (ed.), The Technology of Discovery and the Discovery of Technology. Society for Philosophy and Technology. pp. 379-390.
    Emergent technologies are undermining both decisional privacy (intimacy) and informational privacy. Regarding the former consider, e.g., technical intrusions on burglar alarms and telephone calls. Regarding the latter consider how routinely technologies enable intrusion into electronic data processing (EDP) in spite of government efforts to maintain control. These efforts are uneven among nations thus inviting selective choice of a data storage country. Deregulation of telecommunications and assigning operators First Amendment rights invites multiple efforts to profit from preferential treatment of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2. Chapter outline.A. Myth Versus Reality, D. Publicity not Privacy, E. Guilty Until Proven Innocent, J. Change & Rotation Mentality - forthcoming - Moral Management: Business Ethics.
    No categories
     
    Export citation  
     
    Bookmark  
  3.  15
    Ethical considerations in using a smartphone‐based GPS app to understand linkages between mobility patterns and health outcomes: The example of HIV risk among mobile youth in rural South Africa.Thulile Mathenjwa, Busi Nkosi, Hae-Young Kim, Luchuo Engelbert Bain, Frank Tanser & Douglas Wassenaar - 2023 - Developing World Bioethics 23 (4):321-330.
    Smartphones with Global Positioning System (GPS) apps offer simple and accurate tools to collect data on human mobility. However, their associated ethical challenges remain to be assessed. We used the Emanuel framework to assess the ethical concerns of using smartphone GPS to record mobility patterns of young adults in rural South Africa for a larger study on mobility and HIV risk (Sesikhona). We conducted four focus groups (FGDs) with individuals eligible for the Sesikhona study. FGD data were coded using the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  4.  23
    Breaking the Privacy Paradox: The Value of Privacy and Associated Duty of Firms.Kirsten Martin - 2020 - Business Ethics Quarterly 30 (1):65-96.
    ABSTRACT:The oft-cited privacy paradox is the perceived disconnect between individuals’ stated privacy expectations, as captured in surveys, and consumer market behavior in going online: individuals purport to value privacy yet still disclose information to firms. The goal of this paper is to empirically examine the conceptualization of privacy postdisclosure assumed in the privacy paradox. Contrary to the privacy paradox, the results here suggest consumers retain strong privacy expectations even after disclosing information. Privacy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  5.  20
    Information exchange in business collaboration using grid technologies.Fotis Aisopos, Konstantinos Tserpes, Magdalini Kardara, George Panousopoulos, Stephen Phillips & Spyridon Salamouras - 2009 - Identity in the Information Society 2 (2):189-204.
    With the emergence of service provisioning environments and new networking capabilities, antagonistic businesses have been able to collaborate securely by sharing information in order to have a beneficial result for all. This collaboration has sometimes been imposed by state legislation and sometimes been desirable by the firms themselves so as to resolve frequently occurring abnormalities. In any case, as information exchange takes place between antagonistic firms, security and privacy issues arise. In the context of this paper, a collaborative environment (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  6. Judaism, Business and Privacy.Elliot N. Dorff - 1997 - Business Ethics Quarterly 7 (2):31-44.
    This article first describes some of the chief contrasts between Judaism and American secularism in their underlying convictions about the business environment and the expectations which all involved in business can have of each other—namely, duties vs. rights,communitarianism vs. individualism, and ties to God and to the environment based on our inherent status as God’s creatures rather than on our pragmatic choice. Conservative Judaism’s methodology for plumbing the Jewish tradition for guidance is described and contrasted to those of Orthodox and (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  7.  7
    The Perfect Business? Anti-Trafficking and the Sex Trade along the Mekong.Sverre Molland - 2013 - Philosophy East and West 63 (2).
  8. Anti-doping, purported rights to privacy and WADA's whereabouts requirements: A legal analysis.Oskar MacGregor, Richard Griffith, Daniele Ruggiu & Mike McNamee - 2013 - Fair Play 1 (2):13-38.
    Recent discussions among lawyers, philosophers, policy researchers and athletes have focused on the potential threat to privacy posed by the World Anti-Doping Agency’s (WADA) whereabouts requirements. These requirements demand, among other things, that all elite athletes file their whereabouts information for the subsequent quarter on a quarterly basis and comprise data for one hour of each day when the athlete will be available and accessible for no advance notice testing at a specified location of their choosing. Failure to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  9.  20
    Candor, Privacy, and “Legal Immunity” In Business Ethics Research: An Empirical Assessment of the Randomized Response Technique (RRT).Dan R. Dalton, James C. Wimbush & Catherine M. Daily - 1996 - Business Ethics Quarterly 6 (1):87-99.
    Many areas of business ethics research are “sensitive.” We provide an empirical assessment of the randomized response technique which providesabsoluteanonymity to subjects and “legal immunity” to the researcher. Beyond that, RRT techniques provide complete disclosure to subjects, unconditional privacy is maintained, and there is no deception.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  10.  54
    From privacy to anti-discrimination in times of machine learning.Thilo Hagendorff - 2019 - Ethics and Information Technology 21 (4):331-343.
    Due to the technology of machine learning, new breakthroughs are currently being achieved with constant regularity. By using machine learning techniques, computer applications can be developed and used to solve tasks that have hitherto been assumed not to be solvable by computers. If these achievements consider applications that collect and process personal data, this is typically perceived as a threat to information privacy. This paper aims to discuss applications from both fields of personality and image analysis. These applications are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  11.  28
    Candor, Privacy, and “Legal Immunity” In Business Ethics Research: An Empirical Assessment of the Randomized Response Technique (RRT).Catherine M. Daily - 1996 - Business Ethics Quarterly 6 (1):87-99.
    Many areas of business ethics research are “sensitive.” We provide an empirical assessment of the randomized response technique which providesabsoluteanonymity to subjects and “legal immunity” to the researcher. Beyond that, RRT techniques provide complete disclosure to subjects, unconditional privacy is maintained, and there is no deception.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  12.  13
    Privacy and anti-surveillance advocacy: the role/challenge of issue salience.Smith Oduro-Marfo - 2023 - Journal of Information, Communication and Ethics in Society 21 (4):422-437.
    Purpose The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse profiling and social sorting. There is a heightened need for dedicated advocacy and activism to consistently demand accountability and transparency from African states, governments and their allies regarding surveillance. The purpose of this paper is to understand the issue frames that accompany anti-surveillance and privacy advocacy in Ghana and the related implications. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  15
    Theorizing Privacy in a Liberal Democracy: Canadian Jurisprudence, Anti-Terrorism, and Social Memory After 9/11.Valerie Steeves - 2019 - Theoretical Inquiries in Law 20 (1):323-341.
    The creation of new search powers in the Canadian Anti-Terrorism Act post-9/11 to make citizens more transparent to state surveillance was less a new phenomenon than an extension of preexisting tendencies to make citizens transparent to the state, so the risks they pose can be efficiently managed. However, 9/11 brought about a shift in the ways in which the Supreme Court of Canada talked about terrorism; terrorism was no longer placed on a continuum of criminal activity but was elevated (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  26
    Privacy, speech, and values: what we have no business knowing.Adam D. Moore - 2016 - Ethics and Information Technology 18 (1):41-49.
    In the United States the ascendancy of speech protection is due to an expansive and unjustified view of the value or primacy of free expression and access to information. This is perhaps understandable, given that privacy has been understood as a mere interest, whereas speech rights have been seen as more fundamental. I have argued elsewhere that the “mere interest” view of privacy is false. Privacy, properly defined, is a necessary condition for human well-being or flourishing. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  12
    The Anti-Egoist Perspective in Business Ethics and its Anti-Business Manifestations.Marja K. Svanberg & Carl F. C. Svanberg - 2022 - Philosophy of Management 21 (4):569-596.
    This article identifies the moral premises of contemporary business ethics. After analyzing thirty business ethics texts, the article shows that many business ethicists hold the conventional view that being moral is altruistic. This altruistic perspective logically implies a negative evaluation of self-interest and the profit motive, and business. As a result, the prevailing attitude in mainstream business ethics is that without altruistic restraints businesspeople are inclined to lie, steal, and cheat, not create and earn wealth through honest production and voluntary (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  3
    Anti-corruption in management research and business school classrooms.Agata Stachowicz-Stanusch & Wolfgang Amann (eds.) - 2019 - Charlotte, NC: Information Age Publishing.
    The book Anti-Corruption in Management Research and Business School Classrooms aims at presenting the topic of anti-corruption activities throughout management research as well as in the process of educating future business leaders and practitioners in business schools in different parts of the globe. Simultaneously the book deepens the topic of anti-corruption in selected cultures and societies. The volume consists of four parts and includes three themes. The first part is the "Introduction" and subsequent parts are as follows: (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  22
    Privacy for Sale—Business as Usual in the 21st Century: An Economic and Normative Critique.Wilhelm Peekhaus - 2007 - Journal of Information Ethics 16 (1):83-98.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  40
    Towards Candor, Cooperation, & Privacy in Applied Business Ethics Research.Michael B. Metzger - 1992 - Business Ethics Quarterly 2 (2):207-221.
    Virtually every empirical inquiry of issues relevant to applied business ethics involves the asking of questions that are sensitive, embarrassing, threatening, stigmatizing, or incriminating. Accordingly, questions of this sort are likely to result in unsatisfactory outcomes: 1) many individuals will not respond; and/or, 2) many individuals will not respond candidly. An obvious objective, then, is to use a method to collect information which increases participation, provides absolute anonymity, and does not jeopardize subjects' privacy. The randomized response technique (RRT) is (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  19.  93
    Privacy by Design: essential for organizational accountability and strong business practices. [REVIEW]Ann Cavoukian, Scott Taylor & Martin E. Abrams - 2010 - Identity in the Information Society 3 (2):405-413.
    An accountability-based privacy governance model is one where organizations are charged with societal objectives, such as using personal information in a manner that maintains individual autonomy and which protects individuals from social, financial and physical harms, while leaving the actual mechanisms for achieving those objectives to the organization. This paper discusses the essential elements of accountability identified by the Galway Accountability Project, with scholarship from the Centre for Information Policy Leadership at Hunton & Williams LLP. Conceptual _Privacy by Design_ (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  20.  31
    The Impact of Anti-Intellectualism Attitudes and Academic Self-Efficacy on Business Students’ Perceptions of Cheating.Rafik Z. Elias - 2009 - Journal of Business Ethics 86 (2):199-209.
    College cheating represents a major ethical problem facing students and educators, especially in colleges of business. The current study surveys 666 business students in three universities to examine potential determinants of cheating perceptions. Anti-intellectualism refers to a student's negative view of the value and importance of intellectual pursuits and critical thinking. Academic selfefficacy refers to a student's belief in one's ability to accomplish an academic task. As hypothesized, students high in anti-intellectualism attitudes and those with low academic self-efficacy (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  21.  34
    Internet Privacy for Sale. A Viable Option When Legislation, Litigation, and Business Self-Regulation Are Ineffective in Curbing the Abuses of Online Consumers' Privacy.Craig Wilson - 2005 - Journal of Information Ethics 14 (1):29-43.
  22. Privacy, trust and business ethics for mobile business social networks.Hungarian Academy of Sciences Istvan Mezgar & Sonja Grabner-Kräuter Hungary - 2015 - In Daniel E. Palmer (ed.), Handbook of research on business ethics and corporate responsibilities. Hershey: Business Science Reference, An Imprint of IGI Global.
     
    Export citation  
     
    Bookmark  
  23.  32
    Considering Privacy as a Public Good and Its Policy Ramifications for Business Organizations.Shaheen Borna & Dheeraj Sharma - 2011 - Business and Society Review 116 (3):331-353.
    Direct download  
     
    Export citation  
     
    Bookmark  
  24.  33
    The Unreality Business - How Economics (and Management) Became Anti-philosophical.Matthias P. Hühn - 2015 - Philosophy of Management 14 (1):47-66.
    This paper argues that economics, over the past 200 years, has become steadily more anti-philosophical and that there are three stages in the development of economic thought. Adam Smith intended economics to be a descriptive social science, rooted in an understanding of the moral and psychological processes of an individual’s decision-making and its connection to society in general. Yet, immediately after Smith’s death, economists made a clean cut and invented a totally new discipline: they switched towards a physicalist understanding (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  25. Not the doctor’s business: Privacy, personal responsibility and data rights in medical settings.Carissa Véliz - 2020 - Bioethics 34 (7):712-718.
    This paper argues that assessing personal responsibility in healthcare settings for the allocation of medical resources would be too privacy-invasive to be morally justifiable. In addition to being an inappropriate and moralizing intrusion into the private lives of patients, it would put patients’ sensitive data at risk, making data subjects vulnerable to a variety of privacy-related harms. Even though we allow privacy-invasive investigations to take place in legal trials, the justice and healthcare systems are not analogous. The (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26. The impact of anti-intellectualism attitudes and academic self-efficacy on business students' perceptions of cheating.Rafik Z. Elias - 2009 - Journal of Business Ethics 86 (2):199 - 209.
    College cheating represents a major ethical problem facing students and educators, especially in colleges of business. The current study surveys 666 business students in three universities to examine potential determinants of cheating perceptions. Anti-intellectualism refers to a student’s negative view of the value and importance of intellectual pursuits and critical thinking. Academic self-efficacy refers to a student’s belief in one’s ability to accomplish an academic task. As hypothesized, students high in anti-intellectualism attitudes and those with low academic self-efficacy (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  27. Pragmatic Reflections in Privacy. "It's none of their business".Arnulf Zweig - 2001 - Jahrbuch für Recht Und Ethik 9.
    Vorschläge für staatliche DNA-Datenbanken und die kürzlichen Enthüllungen und öffentlichen Präsentationen des Sexuallebens des amerikanischen Präsidenten geben den Anlaß für diese Reflexionen über die Bedeutung des Rechts auf Privatheit. Dabei werden die Ambiguität des Ausdrucks "Privatheit" und eines möglichen Rechts auf Privatheit erörtert, sowie die Spannung zwischen dem Wert eines gesellschaftlichen Gutes wie der Durchsetzung des Rechts einerseits und dem Wert des Schutzes des einzelnen vor Einbrüchen in die intimen Details seines Lebens andererseits. Hierzu werden insbesondere die Ansichten von Thomas (...)
    No categories
     
    Export citation  
     
    Bookmark  
  28.  34
    The Anti-Colonial Archive: France and Africa's Unfinished Business.Phyllis Taoua - 2003 - Substance 32 (3):146-164.
  29. Electronic monitoring and privacy issues in business-marketing: The ethics of the doubleclick experience. [REVIEW]Darren Charters - 2002 - Journal of Business Ethics 35 (4):243 - 254.
    The paper examines the ethics of electronic monitoring for advertising purposes and the implications for Internet user privacy using as a backdrop DoubleClick Incs recent controversy over matching previously anonymous user profiles with personally identifiable information. It explores various ethical theories that are applicable to understand privacy issues in electronic monitoring. It is argued that, despite the fact that electronic monitoring always constitutes an invasion of privacy, it can still be ethically justified on both Utilitarian and Kantian (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  30. How Much Privacy Does Business Need?R. Stevenson - 2001 - Business and Society Review 47.
     
    Export citation  
     
    Bookmark  
  31.  55
    A pragmatic approach to privacy risk optimization: privacy by design for business practices. [REVIEW]Terry McQuay & Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):379-396.
    This paper introduces Nymity’s Privacy Risk Optimization Process (PROP), a process that enables the implementation of privacy into operational policies and procedures, which embodies in Privacy by Design for business practices. The PROP is based on the International Organization for Standardization (ISO) concept that risk can be positive and negative; and further defines Risk Optimization as a process whereby organizations strive to maximize positive risks and mitigate negative ones. The PROP uses these concepts to implement privacy (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  32. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, the last few years (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  33.  7
    What can Businesses do to Appease Anti‐Globalization Protestors?Joel E. Oestreich - 2002 - Business and Society Review 107 (2):207-220.
  34.  25
    Candor, Privacy, and.Dan R. Dalton, James C. Wimbush & Catherine M. Daily - 1996 - Business Ethics Quarterly 6 (1):87-99.
    Many areas of business ethics research are “sensitive.” We provide an empirical assessment of the randomized response techniquewhich provides absolute anonymity to subjects and “legal immunity” to the researcher. Beyond that, RRT techniques provide complete disclosure to subjects, unconditional privacy is maintained, and there is no deception.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  35.  10
    Big Business: A Love Letter to an American Anti-Hero, by Tyler Cowen. New York: St. Martin’s Press, 2019. 272 pp. [REVIEW]Matthew Caulfield - 2020 - Business Ethics Quarterly 30 (4):608-612.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  6
    Hucksters of the “Postcolonial Business” in Search of Academic Respectability: Reflections on Contemporary Pseudo Anti-Racism in France.Pierre-André Taguieff - 2020 - Telos: Critical Theory of the Contemporary 2020 (193):13-35.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37. Privacy, Democracy and Freedom of Expression.Annabelle Lever - 2014 - In Beaete Roessler & Dorota Mokrosinska (eds.), The Social Dimensions of Privacy. Cambridge University Press. pp. 67-69.
    Must privacy and freedom of expression conflict? To witness recent debates in Britain, you might think so. Anything other than self-regulation by the press is met by howls of anguish from journalists across the political spectrum, to the effect that efforts to protect people’s privacy will threaten press freedom, promote self-censorship and prevent the press from fulfilling its vital function of informing the public and keeping a watchful eye on the activities and antics of the powerful.[Brown, 2009, 13 (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Privacy as an Asset.Jarek Gryz - 2017 - In Marcellus Mindel, Kelly Lyons & Joe Wigglesworth (eds.), Proceedings of the 27th CASCON Conference. Markham, Canada: IBM/ACM. pp. 266-271.
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39. Privacy as Informational Commodity.Jarek Gryz - 2013 - Proceedings of IACAP Conference.
    Many attempts to define privacy have been made since the publication of the seminal paper by Warren and Brandeis (Warren & Brandeis, 1890). Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy became an urgent issue as legal and business problems regarding privacy started to (...)
     
    Export citation  
     
    Bookmark  
  40.  84
    Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.
    Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  41.  59
    Privacy and autonomy: From Warren and brandeis to Roe and Cruzan.Thomas Halper - 1996 - Journal of Medicine and Philosophy 21 (2):121-135.
    Warren and Brandeis ' tort against invasion of privacy had chiefly a social goal: to enlist the courts to reinforce the norm of civility. Years later in Griswold v. Connecticut, the Supreme Court announced a constitutional right of privacy that was personal in focus. Here and in subsequent rulings on abortion and the " right to die," it became apparent that Warren and Brandeis ' Victorian " right to be let alone" had metamorphosed into a right to autonomy, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42. Privacy, the workplace and the internet.Seumas Miller & John Weckert - 2000 - Journal of Business Ethics 28 (3):255 - 265.
    This paper examines workplace surveillance and monitoring. It is argued that privacy is a moral right, and while such surveillance and monitoring can be justified in some circumstances, there is a presumption against the infringement of privacy. An account of privacy precedes consideration of various arguments frequently given for the surveillance and monitoring of employees, arguments which look at the benefits, or supposed benefits, to employees as well as to employers. The paper examines the general monitoring of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  43. Privacy at work – ethical criteria.Anders J. Persson & Sven Ove Hansson - 2003 - Journal of Business Ethics 42 (1):59 - 70.
    New technologies and practices, such as drug testing, genetic testing, and electronic surveillance infringe upon the privacy of workers on workplaces. We argue that employees have a prima facie right to privacy, but this right can be overridden by competing moral principles that follow, explicitly or implicitly, from the contract of employment. We propose a set of criteria for when intrusions into an employee''s privacy are justified. Three types of justification are specified, namely those that refer to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  44.  34
    Privacy Rights On The Internet: Self-Regulation Or Government Regulation?Norman E. Bowie & Karim Jamal - 2006 - Business Ethics Quarterly 16 (3):323-342.
    Consumer surveys indicate that concerns about privacy are a principal factor discouraging consumers from shopping online. The keypublic policy issue regarding privacy is whether the US should follow its current self-regulation course, or whether a European style formal legal regulation approach should be adopted in the US.We conclude that the use of assurance seals has worked reasonably well and websites should be free to decide whether they have aprivacy seal or not. Given the narrow scope and the wide (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  45. Privacy concerns and identity in online social networks.Hanna Krasnova, Oliver Günther, Sarah Spiekermann & Ksenia Koroleva - 2009 - Identity in the Information Society 2 (1):39-63.
    Driven by privacy-related fears, users of Online Social Networks may start to reduce their network activities. This trend can have a negative impact on network sustainability and its business value. Nevertheless, very little is understood about the privacy-related concerns of users and the impact of those concerns on identity performance. To close this gap, we take a systematic view of user privacy concerns on such platforms. Based on insights from focus groups and an empirical study with 210 (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  46.  28
    Perceived Privacy Violation: Exploring the Malleability of Privacy Expectations.Scott A. Wright & Guang-Xin Xie - 2019 - Journal of Business Ethics 156 (1):123-140.
    Recent scholarship in business ethics has revealed the importance of privacy expectations as they relate to implicit privacy norms and the business practices that may violate these expectations. Yet, it is unclear how and when businesses may violate these expectations, factors that form or influence privacy expectations, or whether or not expectations have in fact been violated by company actions. This article reports the findings of three studies exploring how and when the corporate dissemination of consumer data (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  47. Privacy and the USA patriot act: Rights, the value of rights, and autonomy.Alan Rubel - 2007 - Law and Philosophy 26 (2):119-159.
    Civil liberty and privacy advocates have criticized the USA PATRIOT Act (Act) on numerous grounds since it was passed in the wake of the World Trade Center attacks in 2001. Two of the primary targets of those criticisms are the Act’s sneak-and-peek search provision, which allows law enforcement agents to conduct searches without informing the search’s subjects, and the business records provision, which allows agents to secretly subpoena a variety of information – most notoriously, library borrowing records. Without attending (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  48.  70
    Why Privacy Isn't Everything: Feminist Reflections on Personal Accountability.Anita L. Allen - 2003 - Rowman & Littlefield Publishers.
    Accountability protects public health and safety, facilitates law enforcement, and enhances national security, but it is much more than a bureaucratic concern for corporations, public administrators, and the criminal justice system. In Why Privacy Isn't Everything, Anita L. Allen provides a highly original treatment of neglected issues affecting the intimacies of everyday life, and freshly examines how a preeminent liberal society accommodates the competing demands of vital privacy and vital accountability for personal matters. Thus, "None of your business!" (...)
  49.  13
    Privacy and Ethics Are Fundamental to Tech Development.Jill Clayton & Scott Sibbald - 2020 - International Review of Information Ethics 28.
    For years, privacy regulators have said that privacy is good for business. Strong privacy management programs and accountability mechanisms build trust with consumers. In the public sector, privacy regulators have seen massive information sharing projects fail when public input or consultation, or independent oversight is not considered. After a sequence of events in 2018, society as a whole began asking questions about what is being done with personal information and questioned whether it is in our best (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  22
    Business Ethics in Africa: The Role of Institutional Context, Social Relevance, and Development Challenges.Ifedapo Adeleye, John Luiz, Judy Muthuri & Kenneth Amaeshi - 2020 - Journal of Business Ethics 161 (4):717-729.
    Business ethics in Africa, as a field of research, practice, and teaching, has grown rapidly over the last two decades or so, covering a wide variety of topical issues, including corporate social responsibility, governance, and social entrepreneurship. Building on this progress, and to further advance the field, this special issue addresses four broad areas that cover important, under-researched or newly emerging phenomena in Africa: culture, ethics and leadership; business, society and institutions; corruption, anti-corruption and governance; and philanthropy, social entrepreneurship (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 1000