Results for ' Personal information management'

1000+ found
Order:
  1.  18
    From Note‐Taking to Data Banks: Personal and Institutional Information Management in Early Modern Europe.Jacob Soll - 2010 - Intellectual History Review 20 (3):355-375.
    Note?takers in early modern Europe mixed a number of scribal practices. Not only did they write down extracts of texts, they also collected data from observation or from accounting. Practices such as commonplacing were part of sometimes communal, rather informal personal practices that laid the foundations for personal diaries. Other note?taking was prescriptive, fact?establishing technical data entry. Yet both the personal, sentimental and technical forms of note?taking were interrelated. It was during this period that merchants, administrators, scholars (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  97
    Obtaining subjects' consent to publish identifying personal information: current practices and identifying potential issues.Akiko Yoshida, Yuri Dowa, Hiromi Murakami & Shinji Kosugi - 2013 - BMC Medical Ethics 14 (1):47.
    In studies publishing identifying personal information, obtaining consent is regarded as necessary, as it is impossible to ensure complete anonymity. However, current journal practices around specific points to consider when obtaining consent, the contents of consent forms and how consent forms are managed have not yet been fully examined. This study was conducted to identify potential issues surrounding consent to publish identifying personal information.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  41
    Holding personal information in a disease-specific register: the perspectives of people with multiple sclerosis and professionals on consent and access.W. Baird, R. Jackson, H. Ford, N. Evangelou, M. Busby, P. Bull & J. Zajicek - 2009 - Journal of Medical Ethics 35 (2):92-96.
    Objective: To determine the views of people with multiple sclerosis (MS) and professionals in relation to confidentiality, consent and access to data within a proposed MS register in the UK. Design: Qualitative study using focus groups (10) and interviews (13). Setting: England and Northern Ireland. Participants: 68 people with MS, neurologists, MS nurses, health services management professionals, researchers, representatives from pharmaceutical companies and social care professionals. Results: People with MS expressed open and altruistic views towards the use of their (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  12
    Personal information as communicative acts.Jens-Erik Mai - 2016 - Ethics and Information Technology 18 (1):51-57.
    The paper extends previous accounts of informational privacy as a contextual notion. Where previous accounts have focused on interpretations of the privacy context itself as being contextual and open for negotiation and interpretation, this paper extends those analyses and shows that personal information itself is in fact best understood as contextual and situational—and as such open for interpretation. The paper reviews the notion of information as it has been applied in informational privacy and philosophy of information, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  44
    Construction of Student Information Management System Based on Data Mining and Clustering Algorithm.XueHong Yin - 2021 - Complexity 2021:1-11.
    Data mining is a new technology developed in recent years. Through data mining, people can discover the valuable and potential knowledge hidden behind the data and provide strong support for scientifically making various business decisions. This paper applies data mining technology to the college student information management system, mines student evaluation information data, uses data mining technology to design student evaluation information modules, and digs out the factors that affect student development and the various relationships between (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  23
    Developing registries of volunteers: key principles to manage issues regarding personal information protection.E. Levesque, D. Leclerc, J. Puymirat & B. M. Knoppers - 2010 - Journal of Medical Ethics 36 (11):712-714.
    Much biomedical research cannot be performed without recruiting human subjects. Increasingly, volunteer registries are being developed to assist researchers with this challenging task. Yet, volunteer registries raise confidentiality issues. Having recently developed a registry of volunteers, the authors searched for normative guidance on how to implement the principle of confidentiality. The authors found that the protection of confidentiality in registries are based on the 10 key elements which are elaborated in detail in the Canadian Standards Association Model Code. This paper (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  7.  23
    To Disclose or Not to Disclose: The Ironic Effects of the Disclosure of Personal Information About Ethnically Distinct Newcomers to a Team.Bret Crane, Melissa Thomas-Hunt & Selin Kesebir - 2019 - Journal of Business Ethics 158 (4):909-921.
    Recently, scholars have argued that disclosure of personal information is an effective mechanism for building high-quality relationships. However, personal information can focus attention on differences in demographically diverse teams. In an experiment using 37 undergraduate teams, we examine how sharing personal information by ethnically similar and ethnically distinct newcomers to a team affects team perceptions, performance, and behavior. Our findings indicate that the disclosure of personal information by ethnically distinct newcomers improves team (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  8.  30
    What is the ‘personal’ in ‘personal information’?Sille Obelitz Søe, Rikke Frank Jørgensen & Jens-Erik Mai - 2021 - Ethics and Information Technology 23 (4):625-633.
    Contemporary privacy theories and European discussions about data protection employ the notion of ‘personal information’ to designate their areas of concern. The notion of personal information is demarcated from non-personal information—or just information—indicating that we are dealing with a specific kind of information. However, within privacy scholarship the notion of personal information appears undertheorized, rendering the concept somewhat unclear. We argue that in an age of datafication, protection of personal (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9.  33
    Formal and informal management training programs for women in canada: Who seems to be doing a good job? [REVIEW]Dina Lavoie - 1990 - Journal of Business Ethics 9 (4-5):377 - 383.
    The increasing complexity of Canadian businesses in a changing marketplace indicates that women as well as men managers will have to be well trained to be able to position themselves in this new environment with a certain degree of success and personal happiness. As management educators, we have to accept an important share in this responsibility. This paper examines some of the factors that should be considered by those who want to develop management training programs for the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  41
    Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse.Paul Benjamin Lowry, Clay Posey, Tom L. Roberts & Rebecca J. Bennett - 2014 - Journal of Business Ethics 121 (3):385-401.
    Computer abuse by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  11.  36
    Personal Privacy in the Health Care System: Employer-Sponsored Insurance, Managed Care, and Integrated Delivery Systems.Larry Ogalthorpe Gostin - 1997 - Kennedy Institute of Ethics Journal 7 (4):361-376.
    : Widespread collection and use of identifiable information can promote social goods while, at the same time, infringing on personal privacy. Information systems are developing within the context of a fundamental transformation in the organization, delivery, and financing of health care. Changes in the health care system include rapid development of employer-sponsored health coverage, managed care organizations, and integrated delivery systems. These complex, multifaceted arrangements for delivering and paying for health care require ever-more-sophisticated information systems that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  45
    Trusting third-party storage providers for holding personal information. A context-based approach to protect identity-related data in untrusted domains.Giulio Galiero & Gabriele Giammatteo - 2009 - Identity in the Information Society 2 (2):99-114.
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, are two (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  13.  16
    Is Impression Management Through Status Updates Successful? Meta-Accuracy and Judgment Accuracy of Big Five Personality Traits Based on Status Updates From Social Network Sites in China.Ting Wu & Yong Zheng - 2019 - Frontiers in Psychology 10.
    Status updates on social network sites (SNSs) as a new medium for people to express “what is on your mind” on the Internet can provide much information. In the current study, we statistically analysed survey data to examine whether individuals utilize impression management in their status updates on SNSs, whether their attempts at impression management are successful, and whether users who post these status updates can infer how others view them based on these contents, whether the status (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Information Privacy and Social Self-Authorship.Daniel Susser - 2016 - Techné: Research in Philosophy and Technology 20 (3):216-239.
    The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries—boundaries between what others should and shouldn’t know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  15. Respect for persons, identity, and information technology.Robin S. Dillon - 2010 - Ethics and Information Technology 12 (1):17-28.
    There is surprisingly little attention in Information Technology ethics to respect for persons, either as an ethical issue or as a core value of IT ethics or as a conceptual tool for discussing ethical issues of IT. In this, IT ethics is very different from another field of applied ethics, bioethics, where respect is a core value and conceptual tool. This paper argues that there is value in thinking about ethical issues related to information technologies, especially, though not (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  16.  8
    Informed decision making about predictive DNA tests: arguments for more public visibility of personal deliberations about the good life.Marianne Boenink & Simone Burg - 2010 - Medicine, Health Care and Philosophy 13 (2):127-138.
    Since its advent, predictive DNA testing has been perceived as a technology that may have considerable impact on the quality of people’s life. The decision whether or not to use this technology is up to the individual client. However, to enable well considered decision making both the negative as well as the positive freedom of the individual should be supported. In this paper, we argue that current professional and public discourse on predictive DNA-testing is lacking when it comes to supporting (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  17.  11
    An Ethics-informed, Policy-based Approach to the Management of Challenges Posed by Living-at-Risk, Frequent Users of Emergency Departments.Jeffrey Kirby & Lisbeth Witthoefft Nielsen - 2023 - Canadian Journal of Bioethics / Revue canadienne de bioéthique 6 (1):44-55.
    The complex health and social circumstances of living-at-risk, frequent users of emergency departments (aREDFUs) in the health jurisdictions of high-income countries, and the related, significant challenges posed for emergency departments and the health care providers working within them, are identified and explored in the paper. Ethical analyses of a set of relevant domains are performed, i.e., individual and relational autonomy considerations, relevant social construction and personal responsibility conceptions, patient welfare principles (beneficence, nonmaleficence, continuity of care), harm reduction methodologies and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  52
    Enhancing moral intensity: The roles of personal and consequential information in ethical decision-making. [REVIEW]Loy D. Watley & Douglas R. May - 2004 - Journal of Business Ethics 50 (2):105-126.
    This research explored how (a) information regarding consequences and (b) personal information regarding the potential victim influences perceptions of moral intensity and ethical behavioral intent. An experimental vignette research design was used and 314 professional managers participated. The results of the study indicated that personal information impacted ethical behavioral intent through its influence on perceptions of proximity. In contrast, consequential information''s impact depended on the presence of personal information or prior knowledge. Implications (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  19.  28
    Informed decision making about predictive DNA tests: arguments for more public visibility of personal deliberations about the good life. [REVIEW]Marianne Boenink & Simone van der Burg - 2010 - Medicine, Health Care and Philosophy 13 (2):127-138.
    Since its advent, predictive DNA testing has been perceived as a technology that may have considerable impact on the quality of people’s life. The decision whether or not to use this technology is up to the individual client. However, to enable well considered decision making both the negative as well as the positive freedom of the individual should be supported. In this paper, we argue that current professional and public discourse on predictive DNA-testing is lacking when it comes to supporting (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  20. Property rights in genetic information.Richard A. Spinello - 2004 - Ethics and Information Technology 6 (1):29-42.
    The primary theme of this paper is the normative case against ownership of one's genetic information along with the source of that information (usually human tissues samples). The argument presented here against such “upstream” property rights is based primarily on utilitarian grounds. This issue has new salience thanks to the Human Genome Project and “bio-prospecting” initiatives based on the aggregation of genetic information, such as the one being managed by deCODE Genetics in Iceland. The rationale for ownership (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  21. The construction of personal identities online.Luciano Floridi - 2011 - Minds and Machines 21 (4):477-479.
    Information and communication technologies (ICTs) are building a new habitat (infosphere) in which future generations, living in advanced information societies, will spend an increasing amount of time. This paper introduces a series of articles that explore what constitutes a personal identity online (PIO) and how, as well as to what extent, individuals can learn to create, manage and perceive their PIOs in order to facilitate a healthy and rewarding online experience (onlife).
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  22.  11
    Catch-22: A patient’s right to informational determination and the rendering of accounts by medical schemes.M. Botes & E. A. Obasa - 2023 - South African Journal of Bioethics and Law 16 (2):67.
    Many people who have reached the age of majority still qualify as financial dependents of their parents, and may be registered as dependents on their parents’ medical schemes. This poses a practical conundrum, because major persons enjoy complete autonomy over their bodies to choose healthcare services as they please, including informational determination. However, their sensitive health information may end up being disclosed in the accounts rendered to their parents, as main members of medical schemes, thereby breaching their informational privacy, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  33
    A New Era, New Strategies: Education and Communication Strategies to Manage Greater Access to Genomic Information.Megan A. Lewis, Natasha Bonhomme & Cinnamon S. Bloss - 2018 - Hastings Center Report 48 (S2):25-27.
    As next‐generation genomic sequencing, including whole‐genome sequencing information, becomes more common in research, clinical, and public health contexts, there is a need for comprehensive communication strategies and education approaches to prepare patients and clinicians to manage this information and make informed decisions about its use, and nowhere is that imperative more pronounced than when genomic sequencing is applied to newborns. Unfortunately, in‐person counseling is unlikely to be applicable or cost‐effective when parents obtain genomic risk information directly via (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  28
    The Effects of Environmental Factors on the Behavior of Chinese Managers in the Information Age in China.Wing S. Chow, Jane P. Wu & Allan K. K. Chan - 2009 - Journal of Business Ethics 89 (4):629-639.
    This paper examines the effects of environmental factors on the ethical behavior of managers using computers at work in Mainland China. In this study, environmental factors refer to senior management, peer groups, company policies, professional practices, and legal considerations. Ethical behaviors include attitudes to disclosure, protection of privacy, conflict of interest, personal conduct, social responsibility, and integrity. A questionnaire survey was used for data collection, and 125 mainland Chinese managers participated in the study. The results show that peer (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  9
    “Can I Have a Look?”: The Discursive Management of Victims’ Personal Space During Police First Response Call-Outs to Domestic Abuse Incidents.Kate Steel - 2024 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 37 (2):547-572.
    The complexities of domestic abuse as both a lived experience and a crime generate unique communicative challenges at the scene of emergency police call-outs. Space is a prominent and complex feature of these ecounters, entailing a juxtaposition of the institutional and the private, whereby frontline officers seek evidence of abuse from victims in the same space in which the abuse occurred. This paper explores how speakers manage one evidentially salient aspect of these encounters: officers’ advancement into victim’s immediate personal (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  35
    Information and friend segregation for online social networks: a user study.Javed Ahmed, Serena Villata & Guido Governatori - 2019 - AI and Society 34 (4):753-766.
    Online social networks captured the attention of the masses by offering attractive means of sharing personal information and developing social relationships. People expose personal information about their lives on OSNs. This may result in undesirable consequences of users’ personal information leakage to an unwanted audience and raises privacy concerns. The issue of privacy has received a significant attention in both the research literature and the mainstream media. In this paper, we present results of an (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  6
    The role of Data Transfer Agreements in ethically managing data sharing for research in South Africa.S. Mahomed, G. Loots & C. Staunton - forthcoming - South African Journal of Bioethics and Law:26-30.
    A multitude of legislation impacts the use of samples and data for research in South Africa. With the coming into effect of the Protection of Personal Information Act No. 4 of 2013 in July 2021, recent attention has been given to safeguarding research participants’ personal information. The protection of participants’ privacy in research is essential, but it is not the only risk at stake in the use and sharing of personal information. Other rights and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  28. Equipoise as a means of managing uncertainty: personal, communal and proxy.P. Alderson - 1996 - Journal of Medical Ethics 22 (3):135-139.
    Equipoise is advocated as a means of achieving high scientific and ethical standards in randomised trials. As used in the context of research the word describes a state of uncertainty characterised by the belief that in a trial no arm is known to offer greater harm or benefit than any other arm. Clinicians who lack personal equipoise are advised to accept clinical or communal equipoise, based on current unresolved disagreement among the medical profession. Equipoise is mainly discussed in the (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  29. Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data.Gordon Hull - 2015 - Ethics and Information Technology 17 (2):89-101.
    The “privacy paradox” refers to the discrepancy between the concern individuals express for their privacy and the apparently low value they actually assign to it when they readily trade personal information for low-value goods online. In this paper, I argue that the privacy paradox masks a more important paradox: the self-management model of privacy embedded in notice-and-consent pages on websites and other, analogous practices can be readily shown to underprotect privacy, even in the economic terms favored by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  30.  15
    Informal Status and Taking Charge: The Different Roles of OBSE, P-J Fit, and P-S Fit.Chuanjun Deng, Shudi Liao, Zhiqiang Liu, Yucheng Zhang & Yan Bao - 2020 - Frontiers in Psychology 11.
    Status in an organization is considered a significant antecedent to an employee's work-related behaviors. However, the relationship between knowledge workers' informal status and "taking charge" has been ignored in previous human resource management (HRM) research. Based on the self-consistency theory, this study examines the mechanisms underlying the influence of knowledge workers’ informal status on taking charge. Data were collected from 337 dyads of employees and their immediate supervisors in 24 enterprises and companies. Based on moderated mediation analysis, results indicated (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  31.  29
    Informed Consent Out of Context.Sven Ove Hansson - 2006 - Journal of Business Ethics 63 (2):149-154.
    Several attempts have been made to transfer the concept of informed consent from medical and research ethics to dealing with affected groups in other areas such as engineering, land use planning, and business management. It is argued that these attempts are unsuccessful since the concept of informed consent is inadequate for situations in which groups of affected persons are dealt with collectively (rather than individually, as in clinical medicine). There are several reasons for this. The affected groups from which (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  32. From Utopia to Science: Challenges of Personalised Genomics Information for Health Management and Health Enhancement. [REVIEW]Hub Zwart - 2009 - Medicine Studies 1 (2):155-166.
    From 1900 onwards, scientists and novelists have explored the contours of a future society based on the use of “anthropotechnologies” (techniques applicable to human beings for the purpose of performance enhancement ranging from training and education to genome-based biotechnologies). Gradually but steadily, the technologies involved migrated from (science) fiction into scholarly publications, and from “utopia” (or “dystopia”) into science. Building on seminal ideas borrowed from Nietzsche, Peter Sloterdijk has outlined the challenges inherent in this development. Since time immemorial, and at (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  33.  27
    Formation of Stakeholder Trust in Business and the Role of Personal Values.Michael Pirson, Kirsten Martin & Bidhan Parmar - 2017 - Journal of Business Ethics 145 (1):1-20.
    Declining levels of stakeholder trust in business are of concern to business executives and scholars for legitimacy- and performance-related effects. Research in the area of stakeholder trust in business is nascent; therefore, the trust formation process has been rarely examined at the stakeholder level. Furthermore, the role of personal values as one significant influence in trust formation has been under-researched. In this paper, we develop a contingency model for stakeholder trust formation based on the effects of stakeholder-specific vulnerability and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  34.  13
    Verbal Representations of Motivational Attitudes of Education Managers in the Post-Information Society.Olena Shaumian, Tetіana Ternavska, Lesia Viktorova, Alla Yarova, Liudmyla Obukh & Alla Serhiieva - 2022 - Postmodern Openings 13 (2):51-76.
    The article attempts to provide a practical analysis of the psychological basis for the incentives of personality motivation in education managers. In particular, it highlights the results of an empirical study of motivational techniques for normative and value attitudes of education managers in terms of management. It justifies the opinion that leaders of the organizations with strong cooperation between staff and administration and united by a common desire for success, are dominated by the category “hope for success”. And the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  14
    Educational Management Turned on its Head: Exploring a Professional Ethic for Educational Leadership: A Critical Reader.William C. Frick (ed.) - 2012 - P. Lang.
    The importance of professional and/or practical ethics cannot be overstated in most occupations, especially in light of our contemporary, interconnected world. Within formal education, the management paradigm is shifting as a result of a continuing refocus on the moral and ethical dimensions of working and leading in schools. Although professional norms and personal qualities of the educator can be powerful in directing and informing work-related judgment and behavior, this book puts forth and expands upon the viability of a (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  37
    Ethics Management in Public Relations: Practitioner Conceptualizations of Ethical Leadership, Knowledge, Training and Compliance.Seow Ting Lee & I.-Huei Cheng - 2012 - Journal of Mass Media Ethics 27 (2):80 - 96.
    Little is known and understood about ethics management or the development of formal, systematic, and goal-directed initiatives to improve ethics in the public relations workplace. This study found little ethics training and written guidelines in the public relations workplace. Organizational ethics initiatives are poorly communicated to practitioners and rely mostly on punitive restraints with little reward for ethical behavior. For many practitioners, ethics is not learned through workplace ethics initiatives but rather is mostly informed by external influences including (...) values, family upbringing, and professional work experiences. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  37.  33
    An approach to ethical communication from the point of view of management responsibilities. The importance of communication in organisations.Carlos M. Moreno - 2010 - Ramon Llull Journal of Applied Ethics 1 (1):97.
    In the so-called knowledge society, communication plays a key role in organizations. In traditional societies, the exchange of personal communication was conducted _face to face_. The development of new technologies has expanded the possibilities of transmitting more information within organizations and faster. Technology has brought greater opportunities for collective communication, as well as greater information management. The impact of these factors has led to some very significant changes in the business world. In these processes of change, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  38.  19
    Privacy Behaviour: A Model for Online Informed Consent.Gary Burkhardt, Frederic Boy, Daniele Doneddu & Nick Hajli - 2022 - Journal of Business Ethics 186 (1):237-255.
    An online world exists in which businesses have become burdened with managerial and legal duties regarding the seeking of informed consent and the protection of privacy and personal data, while growing public cynicism regarding personal data collection threatens the healthy development of marketing and e-commerce. This research seeks to address such cynicism by assisting organisations to devise ethical consent management processes that consider an individual’s attitudes, their subjective norms and their perceived sense of control during the elicitation (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  39.  39
    Book Review: Solove, Daniel J. The digital person: Technology and privacy in the information age. New York: New York University Press, 2004, 283 pp. ISBN 0-8147-9846-2 ($29.95). [REVIEW]Michael Zimmer - 2004 - Ethics and Information Technology 6 (4):301-302.
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  40. Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of using (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  41.  84
    Public sector engagement with online identity management.D. Barnard-Wills & D. Ashenden - 2010 - Identity in the Information Society 3 (3):657-674.
    The individual management of online identity, as part of a wider politics of personal information, privacy, and dataveillance, is an area where public policy is developing and where the public sector attempts to intervene. This paper attempts to understand the strategies and methods through which the UK government and public sector is engaging in online identity management. The analysis is framed by the analytics of government (Dean 2010 ) and governmentality (Miller and Rose 2008 ). This (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark  
  42.  9
    Course Design for College Entrepreneurship Education – From Personal Trait Analysis to Operation in Practice.Hsin-Te Wu & Mu-Yen Chen - 2019 - Frontiers in Psychology 10.
    Nowadays, many countries are promoting entrepreneurial education or the “innovation, entrepreneurship, and creativity” education. Entrepreneurial education can enhance a nation’s economic competitiveness and give rise to new business. At the moment, entrepreneurial courses are mostly designed by school teachers; however, while school teachers may possess business experience, they lack in entrepreneurial experience. Hence, entrepreneurial education courses call for experts with entrepreneurial experience to contribute to course designs and assist with course teachings. Entrepreneurial education not only improves a student’s entrepreneurial skills, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  22
    The informed consent aftermath of the genetic revolution. An Italian example of implementation.Federica Artizzu - 2008 - Medicine, Health Care and Philosophy 11 (2):181-190.
    A great part of human genetics research is carried out collecting data and building large databases of biological samples that are in a non-anonymous format. These constitute a valuable resource for future research. The construction of such databases and tissue banks facilitates important scientific progress. However, biobanks have been recognized as ethically problematic because they contain thousands of data that could expose individuals and populations to discrimination, stigmatization and psychological stress if misused. Informed consent is regarded as a cornerstone in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  44.  15
    On the adoption of personal health records: some problematic issues for patient empowerment.Paraskevas Vezyridis & Stephen Timmons - 2015 - Ethics and Information Technology 17 (2):113-124.
    The development of electronic personal health records by independent vendors and national health systems is understood to empower patients and create a new kind of consumerism in healthcare. With more personal health information at hand, active participation in the management of health and rational purchasing of healthcare services will be possible. Healthcare systems will also be able to contain costs and achieve sustainability. Based on a careful examination of the literature, we argue that many of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45. Personal Variables and Their Impact on Promoting Job Creation in Gaza Strip through Business Incubators.Maram O. Owda, Rasha O. Owda, Mohammed N. Abed, Samia A. M. Abdalmenem, Samy S. Abu-Naser & Mazen J. Al Shobaki - 2019 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 3 (8):65-77.
    The study aimed at identifying the personal variables and their effect in promoting job creation in Gaza Strip through business incubators. The researchers used the descriptive analytical approach to achieve the study objectives. The study population consisted of 92 of the pilot projects benefiting from the three business incubators in Gaza Strip (Palestinian Information Technology Incubator, UCAS Technology Incubator and Business and Technology Incubator). The study reached a number of results, the most important of which are the existence (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  46.  37
    Human resource information systems: An overview of current ethical and legal issues. [REVIEW]Joan C. Hubbard, Karen A. Forcht & Daphyne S. Thomas - 1998 - Journal of Business Ethics 17 (12):1319-1323.
    Technology has made it easier and cheaper for human resource managers to gather and maintain an infinite amount of data about present and prospective employees. An essential component in the success of managing this data is the Human Resource Information System (HRIS), a database of personal information about each employee. Because of the power to access and use this data, HR managers must be aware of the ethical and legal issues associated with both the creation and use (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  47.  24
    Changes in Personality Associated with Deep Brain Stimulation: a Qualitative Evaluation of Clinician Perspectives.Cassandra J. Thomson, Rebecca A. Segrave & Adrian Carter - 2019 - Neuroethics 14 (1):109-124.
    Gilbert et al. argue that the neuroethics literature discussing the putative effects of Deep Brain Stimulation on personality largely ignores the scientific evidence and presents distorted claims that personality change is induced by the DBS stimulation. This study contributes to the first-hand primary research on the topic exploring DBS clinicians’ views on post-DBS personality change among their patients and its underlying cause. Semi-structured interviews were conducted with sixteen clinicians from various disciplines working in Australian DBS practice for movement disorders and/or (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  48.  17
    Changes in Personality Associated with Deep Brain Stimulation: a Qualitative Evaluation of Clinician Perspectives.Cassandra J. Thomson, Rebecca A. Segrave & Adrian Carter - 2019 - Neuroethics 14 (1):109-124.
    Gilbert et al. argue that the neuroethics literature discussing the putative effects of Deep Brain Stimulation on personality largely ignores the scientific evidence and presents distorted claims that personality change is induced by the DBS stimulation. This study contributes to the first-hand primary research on the topic exploring DBS clinicians’ views on post-DBS personality change among their patients and its underlying cause. Semi-structured interviews were conducted with sixteen clinicians from various disciplines working in Australian DBS practice for movement disorders and/or (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  49.  13
    Changes in Personality Associated with Deep Brain Stimulation: a Qualitative Evaluation of Clinician Perspectives.Cassandra J. Thomson, Rebecca A. Segrave & Adrian Carter - 2019 - Neuroethics 14 (1):109-124.
    Gilbert et al. argue that the neuroethics literature discussing the putative effects of Deep Brain Stimulation on personality largely ignores the scientific evidence and presents distorted claims that personality change is induced by the DBS stimulation. This study contributes to the first-hand primary research on the topic exploring DBS clinicians’ views on post-DBS personality change among their patients and its underlying cause. Semi-structured interviews were conducted with sixteen clinicians from various disciplines working in Australian DBS practice for movement disorders and/or (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  50.  27
    Personalized medicine, digital technology and trust: a Kantian account.Bjørn K. Myskja & Kristin S. Steinsbekk - 2020 - Medicine, Health Care and Philosophy 23 (4):577-587.
    Trust relations in the health services have changed from asymmetrical paternalism to symmetrical autonomy-based participation, according to a common account. The promises of personalized medicine emphasizing empowerment of the individual through active participation in managing her health, disease and well-being, is characteristic of symmetrical trust. In the influential Kantian account of autonomy, active participation in management of own health is not only an opportunity, but an obligation. Personalized medicine is made possible by the digitalization of medicine with an ensuing (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 1000