Switch to: Citations

Add references

You must login to add references.
  1. Privacy, Polygraphs and Work.George G. Brenkert - 1981 - Business and Professional Ethics Journal 1 (1):19-35.
  • Causal-explanatory pluralism: how intentions, functions, and mechanisms influence causal ascriptions.Tania Lombrozo - 2010 - Cognitive Psychology 61 (4):303-332.
    Both philosophers and psychologists have argued for the existence of distinct kinds of explanations, including teleological explanations that cite functions or goals, and mechanistic explanations that cite causal mechanisms. Theories of causation, in contrast, have generally been unitary, with dominant theories focusing either on counterfactual dependence or on physical connections. This paper argues that both approaches to causation are psychologically real, with different modes of explanation promoting judgments more or less consistent with each approach. Two sets of experiments isolate the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   84 citations  
  • Information Relevance Model of Customized Privacy for IoT.Wei Zhou & Selwyn Piramuthu - 2015 - Journal of Business Ethics 131 (1):19-30.
    Motivated by advances in mass customization in business practice, explosion in the number of internet of things devices, and the lack of published research on privacy differentiation and customization, we propose a contextual information relevance model of privacy. We acknowledge the existence of individual differences with respect to unique security and privacy protection needs. We observe and argue that it is unfair and socially inefficient to treat privacy in a uniform manner whereby a large proportion of the population remain unsatisfied (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Implied, presumed and waived consent: The relative moral wrongs of under- and over-informing.Robert M. Veatch - 2007 - American Journal of Bioethics 7 (12):39 – 41.
  • Social Media Policies: Implications for Contemporary Notions of Corporate Social Responsibility.Cynthia Stohl, Michael Etter, Scott Banghart & DaJung Woo - 2017 - Journal of Business Ethics 142 (3):413-436.
    Three global developments situate the context of this investigation: the increasing use of social media by organizations and their employees, the burgeoning presence of social media policies, and the heightened focus on corporate social responsibility. In this study the intersection of these trends is examined through a content analysis of 112 publicly available social media policies from the largest corporations in the world. The extent to which social media policies facilitate and/or constrain the communicative sensibilities and values associated with contemporary (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Trends and Drivers in CSR Disclosure: A Focus on Reporting Practices in the Automotive Industry.Tiziana Russo-Spena, Marco Tregua & Alessandra De Chiara - 2018 - Journal of Business Ethics 151 (2):563-578.
    This work focuses on corporate social responsibility disclosure practices of multinational corporations. Based on a longitudinal study of CSR reports of companies operating in the automotive industry, the paper offers a detailed study of how disclosure practices are changing and which principles and approaches influence and drive the development of such disclosure. Based on a four-year report-based study, the findings enable us to identify three main trends in the CSR disclosure strategy of automotive firms. First, in line with the mainstream (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent.Irene Pollach - 2005 - Journal of Business Ethics 62 (3):221-235.
    The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  • An Ethical Exploration of Privacy and Radio Frequency Identification.Alan R. Peslak - 2005 - Journal of Business Ethics 59 (4):327-345.
    This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Big Data: A Normal Accident Waiting to Happen?Daniel Nunan & Marialaura Di Domenico - 2017 - Journal of Business Ethics 145 (3):481-491.
    Widespread commercial use of the internet has significantly increased the volume and scope of data being collected by organisations. ‘Big data’ has emerged as a term to encapsulate both the technical and commercial aspects of this growing data collection activity. To date, much of the discussion of big data has centred upon its transformational potential for innovation and efficiency, yet there has been less reflection on its wider implications beyond commercial value creation. This paper builds upon normal accident theory to (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Respecting Context to Protect Privacy: Why Meaning Matters.Helen Nissenbaum - 2018 - Science and Engineering Ethics 24 (3):831-852.
    In February 2012, the Obama White House endorsed a Privacy Bill of Rights, comprising seven principles. The third, “Respect for Context,” is explained as the expectation that “companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data.” One can anticipate the contested interpretations of this principle as parties representing diverse interests vie to make theirs the authoritative one. In the paper I will discuss three possibilities and explain why (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  • Business Ethics – Deontologically Revisited.Edwin R. Micewski & Carmelita Troy - 2007 - Journal of Business Ethics 72 (1):17-25.
    In this paper we look at business ethics from a deontological perspective. We address the theory of ethical decision-making and deontological ethics for business executives and explore the concept of “moral duty” as transcending mere gain and profit maximization. Two real-world cases that focus on accounting fraud as the ethical conception. Through these cases, we show that while accounting fraud – from a consequentialist perspective – may appear to provide a quick solution to a pressing problem, longer term effects of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  • Understanding Privacy Online: Development of a Social Contract Approach to Privacy.Kirsten Martin - 2016 - Journal of Business Ethics 137 (3):551-569.
    Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a community about sharing and using (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   17 citations  
  • Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract.Kirsten E. Martin - 2012 - Journal of Business Ethics 111 (4):519-539.
    A growing body of theory has focused on privacy as being contextually defined, where individuals have highly particularized judgments about the appropriateness of what, why, how, and to whom information flows within a specific context. Such a social contract understanding of privacy could produce more practical guidance for organizations and managers who have employees, users, and future customers all with possibly different conceptions of privacy across contexts. However, this theoretical suggestion, while intuitively appealing, has not been empirically examined. This study (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse.Paul Benjamin Lowry, Clay Posey, Tom L. Roberts & Rebecca J. Bennett - 2014 - Journal of Business Ethics 121 (3):385-401.
    Computer abuse by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals who (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Building Trust Between Consumers and Corporations: The Role of Consumer Perceptions of Transparency and Social Responsibility. [REVIEW]Jiyun Kang & Gwendolyn Hustvedt - 2014 - Journal of Business Ethics 125 (2):1-13.
    Developing trust in a company is a significant part of building the company-consumer relationship. Previous studies have sought to identify the positive consequences of trust such as loyalty and repurchase, but the question of what builds trust remains largely unanswered. To answer the question, we developed a model that depicts the relationships among transparency, social responsibility, trust, attitude, word-of-mouth (WOM) intention, and purchase intention. An online survey was conducted with a US nationwide sample of 303 consumers, and the data were (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Defining the scope of implied consent in the emergency department.Raul B. Easton, Mark A. Graber, Jay Monnahan & Jason Hughes - 2007 - American Journal of Bioethics 7 (12):35 – 38.
    Purpose: To determine the relative value that patients place on consent for procedures in the emergency department (ED) and to define a set of procedures that fall in the realm of implied consent. Methods: A questionnaire was administered to a convenience sample 134 of 174 patients who were seen in the ED of a Midwestern teaching hospital. The questionnaire asked how much time they believed was necessary to give consent for various procedures. Procedures ranged from simple (venipuncture) to complex (procedural (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • A Critical Perspective of Integrative Social Contracts Theory: Recurring Criticisms and Next Generation Research Topics.Thomas W. Dunfee - 2006 - Journal of Business Ethics 68 (3):303-328.
    During the past ten years Integrative Social Contracts Theory (ISCT) has become part of the repertoire of specialized decision-oriented theories in the business ethics literature. The intention here is to (1)␣provide a brief overview of the structure and strengths of ISCT; (2) identify recurring themes in the extensive commentary on the theory including brief mention of how ISCT has been applied outside the business ethics literature; (3) describe where research appears to be headed; and (4) specify challenges faced by those (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   54 citations