Citations of:
Add citations
You must login to add citations.
|
|
Privacy is a critical challenge for corporate social responsibility in the mobile device ecosystem. Mobile application firms can collect granular and largely unregulated data about their consumers, and must make ethical decisions about how and whether to collect, store, and share these data. This paper conducts a discourse analysis of mobile application developer forums to discover when and how privacy conversations, as a representative of larger ethical debates, arise during development. It finds that online forums can be useful spaces for (...) |
|
Recent scholarship in philosophy, law, and information systems suggests that respecting privacy entails understanding the implicit privacy norms about what, why, and to whom information is shared within specific relationships. These social contracts are important to understand if firms are to adequately manage the privacy expectations of stakeholders. This paper explores a social contract approach to developing, acknowledging, and protecting privacy norms within specific contexts. While privacy as a social contract—a mutually beneficial agreement within a community about sharing and using (...) |
|
Motivated by advances in mass customization in business practice, explosion in the number of internet of things devices, and the lack of published research on privacy differentiation and customization, we propose a contextual information relevance model of privacy. We acknowledge the existence of individual differences with respect to unique security and privacy protection needs. We observe and argue that it is unfair and socially inefficient to treat privacy in a uniform manner whereby a large proportion of the population remain unsatisfied (...) |
|
The Internet has drastically changed how people interact, communicate, conduct business, seek jobs, find partners, and shop. Millions of people are using social networking sites to connect with others, and employers are using these sites as a source of background information on job applicants. Employers report making decisions not to hire people based on the information posted on social networking sites. Few employers have policies in place to govern when and how these online character checks should be used and how (...) |
|
This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales (...) |
|
The Internet has drastically changed how people interact, communicate, conduct business, seek jobs, find partners, and shop. Millions of people are using social networking sites to connect with others, and employers are using these sites as a source of background information on jobapplicants.Employers report making decisions not to hire people based on the information posted on social networking sites. Few employers have policies in place to govern when and how these online character checks should be used and how to ensure (...) |
|
The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. (...) |
|
|
|
Privacy has been defined as “the protective buffer within which people can avoid another party’s taking something from them, keeping watch over them, or entering into their lives in a way that is both unwelcome and undesirable”. It is a premise of this paper that such a position needs to be taken very seriously in contemporary society, and particularly in the case of schools, as school personnel have the capacity to engage in practices which show great disregard for individual and (...) |