David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Ezio Di Nucci
Jack Alan Reynolds
Learn more about PhilPapers
Journal of Business Ethics 8 (7):569 - 576 (1989)
The proliferation of computers in the business realm may lead to ethical problems between individual and societal rights, and the organization's need to control costs. In an attempt to explore the causes of this potential conflict, this study examined the varying levels of sensitivity 223 respondents assigned to different types of information typically stored in computer-based human resource information systems. It was found that information most directly related to the job — pay rate, fringe benefits, educational history — was considered to be the most sensitive. Participants, however, were more concerned about certain types of individuals/groups accessing these systems than about the kinds of information contained in them. Implications of these findings are discussed.
|Keywords||No keywords specified (fix it)|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
Barbara A. Spencer & John K. Butler (1987). Measuring the Relative Importances of Social Responsibility Components: A Decision Modeling Approach. [REVIEW] Journal of Business Ethics 6 (7):573 - 577.
Arthur J. Cordell (1987). The Uneasy Eighties: The Transition to an Information Society. Acm Sigcas Computers and Society 16 (4-1):12-18.
Citations of this work BETA
Deepak Khazanchi (1995). Unethical Behavior in Information Systems: The Gender Factor. [REVIEW] Journal of Business Ethics 14 (9):741 - 749.
Catherine E. Schwoerer, Douglas R. May & Benson Rosen (1995). Organizational Characteristics and HRM Policies on Rights: Exploring the Patterns of Connections. [REVIEW] Journal of Business Ethics 14 (7):531 - 549.
Omar E. M. Khalil (1993). Artificial Decision-Making and Artificial Ethics: A Management Concern. [REVIEW] Journal of Business Ethics 12 (4):313 - 321.
Similar books and articles
Michael D. Myers & Leigh Miller (1996). Ethical Dilemmas in the Use of Information Technology: An Aristotelian Perspective. Ethics and Behavior 6 (2):153 – 160.
Meng-Hsiang Hsu & Feng-Yang Kuo (2003). The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy. Journal of Business Ethics 42 (4):305 - 320.
Seda Gürses (2010). PETs and Their Users: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality Paradigm. [REVIEW] Identity in the Information Society 3 (3):539-563.
Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu (2007). Assessing Gender Differences in Computer Professionals' Self-Regulatory Efficacy Concerning Information Privacy Practices. Journal of Business Ethics 73 (2):145 - 160.
Jonathan Schonscheck (1997). Privacy and Discrete "Social Spheres". Ethics and Behavior 7 (3):221 – 228.
Wendell Cochran (1996). Computers, Privacy, and Journalists: A Suggested Code of Information Practices. Journal of Mass Media Ethics 11 (4):210 – 222.
Philip Brey (2005). The Epistemology and Ontology of Human-Computer Interaction. Minds and Machines 15 (3-4):383-398.
Jan Doroszewski (1988). Ethical and Methodological Aspects of Medical Computer Data Bases and Knowledge Bases. Theoretical Medicine and Bioethics 9 (2).
Soraj Hongladarom (2009). Privacy, the Individual and Genetic Information: A Buddhist Perspective. Bioethics 23 (7):403-412.
Added to index2009-01-28
Total downloads12 ( #291,526 of 1,907,659 )
Recent downloads (6 months)2 ( #340,539 of 1,907,659 )
How can I increase my downloads?