David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Ezio Di Nucci
Jonathan Jenkins Ichikawa
Jack Alan Reynolds
Learn more about PhilPapers
Business and Professional Ethics Journal 30 (1-2):1-32 (2011)
Organizations have a vested interest in customers, employees, and users to disclose information within existing expectations of privacy. This empirical examination uses theoretical sampling and experimental design to identify the factors individuals consider when disclosing information within privacy expectations. The findings from a factorial vignette survey are theoretically generalizable and show that an individual’s relationship to the recipient (familiarity) and the degree to which the information is protected from being easily transferred to others (friction) positively influence the odds that disclosure is judged to be withinprivacy expectations. The results have implications for data gathering and management of customer, user, and employee information, and suggest a two pronged strategy for organizations targeting the disclosure of information by individuals inside and outside the organization: (1) taking into consideration the familiarity of the recipient and (2) increasing the information friction of the environment
|Keywords||No keywords specified (fix it)|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
Kirsten E. Martin (2012). Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract. Journal of Business Ethics 111 (4):519-539.
Hidehito Gomi (2010). A Persistent Data Tracking Mechanism for User-Centric Identity Governance. Identity in the Information Society 3 (3):639-656.
Ann Cavoukian, Scott Taylor & Martin E. Abrams (2010). Privacy by Design: Essential for Organizational Accountability and Strong Business Practices. [REVIEW] Identity in the Information Society 3 (2):405-413.
Luciano Floridi (2005). The Ontological Interpretation of Informational Privacy. Ethics and Information Technology 7 (4):185-200.
Jonathan Schonscheck (1997). Privacy and Discrete "Social Spheres". Ethics and Behavior 7 (3):221 – 228.
Norman Mooradian (2009). The Importance of Privacy Revisited. Ethics and Information Technology 11 (3):163-174.
Cheng-Li Huang & Fan-Hua Kung (2010). Drivers of Environmental Disclosure and Stakeholder Expectation: Evidence From Taiwan. [REVIEW] Journal of Business Ethics 96 (3):435 - 451.
Donald Gotterbarn (1999). Privacy Lost: The Net, Autonomous Agents, and 'Virtual Information'. [REVIEW] Ethics and Information Technology 1 (2):147-154.
William E. Berry (2003). Miranda Rights and Cyberspace Realities: Risks to "the Right to Remain Silent". Journal of Mass Media Ethics 18 (3 & 4):230 – 249.
Robert L. McArthur (2001). Reasonable Expectations of Privacy. Ethics and Information Technology 3 (2):123-128.
Shaheen Borna & Stephen Avila (1999). Genetic Information: Consumers' Right to Privacy Versus Insurance Companies' Right to Know a Public Opinion Survey. [REVIEW] Journal of Business Ethics 19 (4):355 - 362.
Jaakko Hintikka (1984). Some Varieties of Information. Information Processing and Management 20 (1-2):175-181.
Deepak Khazanchi (1995). Unethical Behavior in Information Systems: The Gender Factor. [REVIEW] Journal of Business Ethics 14 (9):741 - 749.
Added to index2011-12-01
Total downloads17 ( #227,513 of 1,934,588 )
Recent downloads (6 months)1 ( #434,272 of 1,934,588 )
How can I increase my downloads?