Switch to: Citations

Add references

You must login to add references.
  1. Monitoring Employee Internet Usage.John Gorman - 1998 - Business Ethics, the Environment and Responsibility 7 (1):21-24.
    Do employers know where their employees are going when they are provided with Internet and World Wide Web access? Should they know? Or is that a breach of privacy issue? Exploring this sensitive area is a former consultant for a software company, who is completing his MBA at London Business School.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • E-mail, terrorism, and the right to privacy.Stephen Coleman - 2006 - Ethics and Information Technology 8 (1):17-27.
    This paper discusses privacy and the monitoring of e-mail in the context of the international nature of the modern world. Its three main aims are: (1) to highlight the problems involved in discussing an essentially philosophical question within a legal framework, and thus to show that providing purely legal answers to an ethical question is an inadequate approach to the problem of privacy on the Internet; (2) to discuss and define what privacy in the medium of the Internet actually is; (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Electronic monitoring and privacy issues in business-marketing: The ethics of the doubleclick experience. [REVIEW]Darren Charters - 2002 - Journal of Business Ethics 35 (4):243 - 254.
    The paper examines the ethics of electronic monitoring for advertising purposes and the implications for Internet user privacy using as a backdrop DoubleClick Incs recent controversy over matching previously anonymous user profiles with personally identifiable information. It explores various ethical theories that are applicable to understand privacy issues in electronic monitoring. It is argued that, despite the fact that electronic monitoring always constitutes an invasion of privacy, it can still be ethically justified on both Utilitarian and Kantian grounds. From a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Privacy, Polygraphs and Work.George G. Brenkert - 1981 - Business and Professional Ethics Journal 1 (1):19-35.
  • An anatomy of values.Charles Fried - 1970 - Cambridge,: Harvard University Press.
  • “But the data is already public”: on the ethics of research in Facebook.Michael Zimmer - 2010 - Ethics and Information Technology 12 (4):313-325.
    In 2008, a group of researchers publicly released profile data collected from the Facebook accounts of an entire cohort of college students from a US university. While good-faith attempts were made to hide the identity of the institution and protect the privacy of the data subjects, the source of the data was quickly identified, placing the privacy of the students at risk. Using this incident as a case study, this paper articulates a set of ethical concerns that must be addressed (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   49 citations  
  • Do Librarians Have an Ethical Duty to Monitor Patrons' Internet Usage in the Public Library?Anna Wyatt - 2006 - Journal of Information Ethics 15 (1):70-79.
  • Ethical issues in web data mining.Lita van Wel & Lambèr Royakkers - 2004 - Ethics and Information Technology 6 (2):129-140.
    Web mining refers to the whole of data miningand related techniques that are used toautomatically discover and extract informationfrom web documents and services. When used in abusiness context and applied to some type ofpersonal data, it helps companies to builddetailed customer profiles, and gain marketingintelligence. Web mining does, however, pose athreat to some important ethical values likeprivacy and individuality. Web mining makes itdifficult for an individual to autonomouslycontrol the unveiling and dissemination of dataabout his/her private life. To study thesethreats, we (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  • Philosophical theories of privacy: Implications for an adequate online privacy policy.Herman T. Tavani - 2007 - Metaphilosophy 38 (1):1–22.
    This essay critically examines some classic philosophical and legal theories of privacy, organized into four categories: the nonintrusion, seclusion, limitation, and control theories of privacy. Although each theory includes one or more important insights regarding the concept of privacy, I argue that each falls short of providing an adequate account of privacy. I then examine and defend a theory of privacy that incorporates elements of the classic theories into one unified theory: the Restricted Access/Limited Control (RALC) theory of privacy. Using (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   39 citations  
  • Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of using data-mining techniques, whether (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  • A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent.Irene Pollach - 2005 - Journal of Business Ethics 62 (3):221-235.
    The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • Internet research: An opportunity to revisit classic ethical problems in behavioral research.David J. Pittenger - 2003 - Ethics and Behavior 13 (1):45 – 60.
    The Internet offers many new opportunities for behavioral researchers to conduct quantitative and qualitative research. Although the ethical guidelines of the American Psychological Association generalize, in part, to research conducted through the Internet, several matters related to Internet research require further analysis. This article reviews several fundamental ethical issues related to Internet research, namely the preservation of privacy, the issuance of informed consent, the use of deception and false feedback, and research methods. In essence, the Internet offers unique challenges to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Concealment and Exposure.Thomas Nagel - 1998 - Philosophy and Public Affairs 27 (1):3-30.
    Everyone knows that something has gone wrong, in the United States, with the conventions of privacy. Along with a vastly increased tolerance for variation in sexual life we have seen a sharp increase in prurient and censorious attention to the sexual lives of public figures and famous persons, past and present. The culture seems to be growing more tolerant and more intolerant at the same time, though perhaps different parts of it are involved in the two movements.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   105 citations  
  • Privacy, the workplace and the internet.Seumas Miller & John Weckert - 2000 - Journal of Business Ethics 28 (3):255 - 265.
    This paper examines workplace surveillance and monitoring. It is argued that privacy is a moral right, and while such surveillance and monitoring can be justified in some circumstances, there is a presumption against the infringement of privacy. An account of privacy precedes consideration of various arguments frequently given for the surveillance and monitoring of employees, arguments which look at the benefits, or supposed benefits, to employees as well as to employers. The paper examines the general monitoring of work, and the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  • Reasonable expectations of privacy.Robert L. McArthur - 2001 - Ethics and Information Technology 3 (2):123-128.
    Use of the concept of `areasonable person and his or her expectations'is widely found in legal reasoning. This legalconstruct is employed in the present article toexamine privacy questions associated withcontemporary information technology, especiallythe internet. In particular, reasonableexpectations of privacy while browsing theworld-wide-web and while sending and receivinge-mail are analyzed.
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • “MySpace” or Yours? The Ethical Dilemma of Graduate Students' Personal Lives on the Internet.Keren Lehavot - 2009 - Ethics and Behavior 19 (2):129 – 141.
    The booming popularity of the Internet, and particularly increasing use of personal Web sites, social networking sites, and blogging, raises questions regarding the ethical use of psychology graduate students' personal online information for academic purposes. Given rising controversies such as use of such information to screen applicants, I refer to the principles and standards of the Ethics Code of the American Psychological Association (2002) to examine ethical concerns associated with graduate students' personal information on the Internet, namely, the protection of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Spyware – the ethics of Covert software.Mathias Klang - 2004 - Ethics and Information Technology 6 (3):193-202.
    Many computer users are happy to be oblivious of the workings within the machine and yet on some level it is important to know what is occurring therein. This paper discusses an unusual type of surveillance software which may be installed in many computers. The strange aspect of this software is that it has often been downloaded and installed by the user, but without her knowledge. The software is mainly designed to collect information about the user of the computer and (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Privacy and the judgment of others.Jeffery L. Johnson - 1989 - Journal of Value Inquiry 23 (2):157-168.
    This article defends a new model of personal privacy. Privacy should be understood as demarcating culturally defined aspects of an individual's life in which he or she is granted immunity from the judgment of others. Such an analysis is preferable to either of the two favorite models of privacy in the current literature. The judgment of others model preserves all of the insights of the liberty and information models of privacy, But avoids the obvious problems and counterexamples. In addition, This (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  • Ethical problems inherent in psychological research based on internet communication as stored information.Peter Øhrstrøm & Johan Dyhrberg - 2007 - Theoretical Medicine and Bioethics 28 (3):221-241.
    This paper deals with certain ethical problems inherent in psychological research based on internet communication as stored information. Section 1 contains an analysis of research on Internet debates. In particular, it takes into account a famous example of deception for psychology research purposes. In section 2, the focus is on research on personal data in texts published on the Internet. Section 3 includes an attempt to formulate some ethical principles and guidelines, which should be regarded as fundamental in research on (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Self-Censorship.John Horton - 2011 - Res Publica 17 (1):91-106.
    This article seeks to explore the conceptual structure and moral standing of an idea that has received almost no attention from analytical philosophers: self-censorship. It is argued that at the heart of the concept is a tension between the thoughts of the self-censor as, on the one hand, the author, and on the other, the instrument, of the censorship. Which of these aspects is emphasised also importantly helps shape how self-censorship is viewed normatively. Focusing on authorship tends to lead to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • The Ethics of Scholarly Research and the Internet: Issues of Publication, Privacy, and the Right to Speak.Robert Holley - 2006 - Journal of Information Ethics 15 (1):27-34.
  • The Ethics of Pharmaceutical Research Funding: A Social Organization Approach.Garry C. Gray - 2013 - Journal of Law, Medicine and Ethics 41 (3):629-634.
    This paper advances a social organization approach to examining unethical behavior. While unethical behaviors may stem in part from failures in individual morality or psychological blind spots, they are both generated and performed through social interactions among individuals and groups. To illustrate the value of a social organization approach, a case study of a medical school professor's first experience with pharmaceutical-company-sponsored research is provided in order to examine how funding arrangements can constrain research integrity. The case illustrates three significant ways (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Ethics of Pharmaceutical Research Funding: A Social Organization Approach.Garry C. Gray - 2013 - Journal of Law, Medicine and Ethics 41 (3):629-634.
    What does unethical behavior look like in everyday professional practice, and how might it become the accepted norm? Examinations of unethical behavior often focus on failures of individual morality or on psychological blind spots, yet unethical behaviors are generated and performed through social interactions across professional practices rather than by individual actors alone. This shifts the focus of behavioral ethics research beyond the laboratory exploring motivation and cognition and into the organizations and professions where unethical behavior is motivated, justified, enabled (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Privacy lost: The net, autonomous agents, and 'virtual information'. [REVIEW]Donald Gotterbarn - 1999 - Ethics and Information Technology 1 (2):147-154.
    The positive qualities of the Internet--anonymity, openness, and reproducibility have added a new ethical dimension to the privacy debate. This paper describes a new and significant way in which privacy is violated. A type of personal information, called virtual information is described and the effectiveness of techniques to protect this type of information is examined. This examination includes a discussion of technical approaches and professional standards as ways to address this violation of virtual information.
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Monitoring employee internet usage.John Gorman - 1998 - Business Ethics, the Environment and Responsibility 7 (1):21–24.
    Do employers know where their employees are going when they are provided with Internet and World Wide Web access? Should they know? Or is that a breach of privacy issue? Exploring this sensitive area is a former consultant for a software company, who is completing his MBA at London Business School.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Intimacy and privacy.Robert S. Gerstein - 1978 - Ethics 89 (1):76-81.
  • For the Sake of One Child.Martin L. Garnar - 2012 - Journal of Information Ethics 21 (1):12-20.
  • Written for the Moment.Joseph S. Fulda - 2012 - Journal of Information Ethics 21 (1):21-26.
    This article argues that the disclosure, dissemination, sale, and publication of texts—such as text messages, e-mails, and letters—addressed to anyone other than the public at large are gravely and profoundly immoral. The argument has two strands, the first based on a conception of privacy largely due to Steven Davis (2009), and the second based on the concept of authorial autonomy and its reverse, authorial dilution.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • An Anatomy of Values: Problems of Personal and Social Choice. [REVIEW]Jordan Howard Sobel - 1974 - Philosophical Review 83 (1):131-135.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  • Self-censorship for democrats.Matthew Festenstein - 2018 - European Journal of Political Theory 17 (3):324-342.
    On the face of it, self-censorship is profoundly subversive of democracy, particularly in its talk-centric forms, and undermines the culture of openness and publicity on which it relies. This paper has two purposes. The first is to develop a conception of self-censorship that allows us to capture what is distinctive about the concept from a political perspective and which allows us to understand the democratic anxiety about self-censorship: if it is not obvious that biting our tongues is always wrong, we (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Privacy lost: The Net, autonomous agents, and ‘virtual information’.Gotterbarn Donald - 1999 - Ethics and Information Technology 1 (2):147-154.
    The positive qualities of the Internet--anonymity, openness, and reproducibility have added a new ethical dimension to the privacy debate. This paper describes a new and significant way in which privacy is violated. A type of personal information, called ‘virtual information’ is described and the effectiveness of techniques to protect this type of information is examined. This examination includes a discussion of technical approaches and professional standards as ways to address this violation of ‘virtual information.’.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Unpopular Privacy: What Must We Hide?Anita Allen - 2011 - New York, US: Oup Usa.
    Can the government stick us with privacy we don't want? It can, it does, and according to this author, may need to do more of it. Privacy is a foundational good, she argues, a necessary tool in the liberty-lover's kit for a successful life. A nation committed to personal freedom must be prepared to mandate inalienable, liberty-promoting privacies for its people, whether they eagerly embrace them or not. The eight chapters of this book are reflections on public regulation of privacy (...)
    Direct download  
     
    Export citation  
     
    Bookmark   19 citations  
  • Two Types of Self-censorship: Public and Private.Philip Cook & Conrad Heilmann - 2013 - Political Studies 61 (1):178-196.
    We develop and defend a distinction between two types of self-censorship: public and private. First, we suggest that public self-censorship refers to a range of individual reactions to a public censorship regime. Second, private self-censorship is the suppression by an agent of his or her own attitudes where a public censor is either absent or irrelevant. The distinction is derived from a descriptive approach to self-censorship that asks: who is the censor, who is the censee, and how do they interact? (...)
     
    Export citation  
     
    Bookmark   7 citations  
  • Privacy, intimacy, and personhood.Jeffrey Reiman - 1976 - Philosophy and Public Affairs 6 (1):26-44.
  • Privacy: Its Meaning and Value.Adam D. Moore - 2003 - American Philosophical Quarterly 40 (3):215 - 227.
    Bodily privacy, understood as a right to control access to one’s body, capacities, and powers, is one of our most cherished rights − a right enshrined in law and notions of common morality. Informational privacy, on the other hand, has yet to attain such a loftily status. As rational project pursuers, who operate and flourish in a world of material objects it is our ability control patterns of association and disassociation with our fellows that afford each of us the room (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   46 citations  
  • Why privacy is important.James Rachels - 1975 - Philosophy and Public Affairs 4 (4):323-333.
  • Why sex is private: Gays and the police.Richard D. Mohr - 1987 - Public Affairs Quarterly 1 (2):57-81.
  • A Theory of the Nature and Value of Privacy.Jeffery L. Johnson - 1992 - Public Affairs Quarterly 6 (3):271-288.
  • The nature and value of the moral right to privacy.J. Angelo Corlett - 2002 - Public Affairs Quarterly 16 (4):329-350.
  • The end of romance and the value of privacy.Earl W. Spurgin - 2006 - Public Affairs Quarterly 20 (3):247-265.
  • Self-Censorship and the First Amendment.Robert Sedler - 2011 - Notre Dame Journal of Law, Ethics and Public Policy 25 (1):13-46.
     
    Export citation  
     
    Bookmark   2 citations  
  • Privacy, liberty and integrity.Jeffery L. Johnson - 1989 - Public Affairs Quarterly 3 (3):15-34.
  • Privacy, morality, and the law.W. A. Parent - 1983 - Philosophy and Public Affairs 12 (4):269-288.
  • Privacy, Autonomy, and Self-Concept.Joseph Kupfer - 1987 - American Philosophical Quarterly 24 (1):81 - 89.
  • Towards Zero Net Presence.Terence Lau - 2011 - Notre Dame Journal of Law, Ethics and Public Policy 25 (1):237-278.