Switch to: References

Add citations

You must login to add citations.
  1. Information Relevance Model of Customized Privacy for IoT.Wei Zhou & Selwyn Piramuthu - 2015 - Journal of Business Ethics 131 (1):19-30.
    Motivated by advances in mass customization in business practice, explosion in the number of internet of things devices, and the lack of published research on privacy differentiation and customization, we propose a contextual information relevance model of privacy. We acknowledge the existence of individual differences with respect to unique security and privacy protection needs. We observe and argue that it is unfair and socially inefficient to treat privacy in a uniform manner whereby a large proportion of the population remain unsatisfied (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Perceived Privacy Violation: Exploring the Malleability of Privacy Expectations.Scott A. Wright & Guang-Xin Xie - 2019 - Journal of Business Ethics 156 (1):123-140.
    Recent scholarship in business ethics has revealed the importance of privacy expectations as they relate to implicit privacy norms and the business practices that may violate these expectations. Yet, it is unclear how and when businesses may violate these expectations, factors that form or influence privacy expectations, or whether or not expectations have in fact been violated by company actions. This article reports the findings of three studies exploring how and when the corporate dissemination of consumer data violates privacy expectations. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.
    Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a community about sharing and using (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  • Information technology and privacy: conceptual muddles or privacy vacuums? [REVIEW]Kirsten Martin - 2012 - Ethics and Information Technology 14 (4):267-284.
    Within a given conversation or information exchange, do privacy expectations change based on the technology used? Firms regularly require users, customers, and employees to shift existing relationships onto new information technology, yet little is known as about how technology impacts established privacy expectations and norms. Coworkers are asked to use new information technology, users of gmail are asked to use GoogleBuzz, patients and doctors are asked to record health records online, etc. Understanding how privacy expectations change, if at all, and (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Tackling Complexity in Business and Society Research: The Methodological and Thematic Potential of Factorial Surveys.Peter Kotzian, Daniel Reimsbach, Rüdiger Hahn & Josua Oll - 2018 - Business and Society 57 (1):26-59.
    Factorial surveys integrate elements of survey research and classical experiments. Using a large number of respondents in a controlled setting, FSs approximate complex and realistic judgment situations through so-called vignettes—that is, carefully designed descriptions of hypothetical people, social situations, or scenarios. Despite being rooted, and predominantly applied, in sociology, FSs are particularly promising for business and society scholars. Given the multiplicity, inherent complexity, and sometimes fuzziness of B&S research objects, conventional research methods inevitably reach their limits. This article, therefore, systematically (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  • How Unbecoming of You: Online Experiments Uncovering Gender Biases in Perceptions of Ridesharing Performance.Brad Greenwood, Idris Adjerid, Corey M. Angst & Nathan L. Meikle - 2020 - Journal of Business Ethics 175 (3):499-518.
    Gender discrimination continues to plague organizations. While the advent of the Internet and the digitization of commerce have provided both a mechanism by which goods and services can be exchanged, as well as an efficient way for consumers to voice their opinions about retailers (i.e., via online rating systems), recent work has begun to uncover significant biases that manifest during the review process. In particular, it has been suggested that the gig-economy’s elimination of previously anonymous arm’s-length transactions may re-introduce bias (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Areas of Privacy in Facebook.Katherina Glac, Dawn R. Elm & Kirsten Martin - 2014 - Business and Professional Ethics Journal 33 (2-3):147-176.
    Privacy issues surrounding the use of social media sites have been apparent over the past ten years. Use of such sites, particularly Facebook, has been increasing and recently business organizations have begun using Facebook as a means of connecting with potential customers or clients. This paper presents an empirical study of perceived privacy violations to examine factors that influence the expectations of privacy on Facebook. Results of the study suggest that the more important Facebook is to users, the more likely (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation