Abstract
With the advent of social networking websites, privacy concerns have reached a new high. One particularly problematic concern entails employers requesting login credentials to popular social media platforms. While many people may consider this request unethical, they may not agree on the reasons it is unethical. One reason may be to blame the behavior on egoism. Egoism, however, comes in multiple flavors, not all of which would agree that violating privacy is acceptable. In this paper, we articulate how one egoist perspective provides a defense of privacy in the face of unjust information access requests. Objectivism, the philosophy of Ayn Rand, offers an egoist approach to ethics that values individual privacy on rational, self-interested grounds. By applying Objectivist principles to a business context, we observe that businesspeople should not violate other people’s privacy for short-term gains. Furthermore, we observe that privacy can be protected without distinct right to privacy. Rather, Objectivism’s conception of rational self-interest suggests that long-term flourishing is the proper end of individuals and businesses, predicated on, among other things, respecting privacy and enforcing individual rights.
Similar content being viewed by others
References
Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In G. Danezis & P. Golle (Eds.), Privacy enhancing technologies (pp. 36–58). Cambridge, UK: Springer.
Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory, and crowding. Monterey, CA: Brooks/Cole Publishing.
Aristotle, (2004). The Nicomachean ethics (J. A. K. Thomson, Trans.). London: Penguin Books.
Baumer, D. L., Earp, J. B., & Poindexter, J. C. (2004). Internet privacy law: a comparison between the United States and the European Union. Computers & Security, 23(5), 400–412.
Becker, T. E. (1998). Integrity in organizations: Beyond honesty and conscientiousness. Academy of Management Review, 23(1), 154–161.
Belanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1041.
Binswanger, H. (1990). The biological basis of teleological concepts. Marina del Rey, CA: Ayn Rand Institute Press.
Blomgren-Hansen, N. (2012). Optimum organization of the labor market in a small open economy. Labour Economics, 19(2), 222–231.
Bolton, R. L. (2015). The right to be forgotten: Forced amnesia in a technological age. John Marshall Journal of Computer & Information Law.
Carson, J. (2005). A philosophical analysis of objectivist education. (Doctor of Philosophy Dissertation, University of Texas at Austin, 2005, Austin, TX).
Clark, L. A., Clark, W. J., & Jones, D. L. (2011). Innovation policy vacuum: Navigating unmarked paths. Technology in Society, 33(3–4), 253–264.
Clark, L. A., & Roberts, S. J. (2010). Employer’s use of social networking sites: A socially irresponsible practice. Journal of Business Ethics, 95(4), 507–525.
Coll, S. (2014). Power, knowledge, and the subjects of privacy: Understanding privacy as the ally of surveillance. Information, Communication & Society, 17(10), 1250–1263.
Davison, H. K., Maraist, C., & Bing, M. N. (2011). Friend or foe? The promise and pitfalls of using social networking sites for HR decisions. Journal of Business and Psychology, 26(2), 153–159.
Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295–316.
Donaldson, T. (1989). The ethics of international business. New York, NY: Oxford University Press.
Drake, J. R. (2007). Objective ethics for managing information technology. In M. Quigley (Ed.), Encyclopedia of information ethics and security. Calgary: Idea Group.
Drake, J. R., Hall, D., Cegielski, C., & Byrd, T. A. (2015). An exploratory look at early online auction decisions: Extending signal theory. Journal of Theoretical and Applied Electronic Commerce Research, 10(1), 35–48.
Dunfee, T. W. (1991). Business ethics and extant social contracts. Business Ethics Quarterly, 1(1), 23–51.
Economist, T. (2009, July 10, 2012). Atlas felt a sense of déjà vu: The economic bust has caused a boom for at least one author. The economist.
Elsbach, K. D., Stigliani, I., & Stroud, A. (2012). The building of employee distrust: A case study of Hewlett-Packard from 1995 to 2010. Organizational Dynamics, 41(3), 254–263.
Enk, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., & Sheth, A. N. (2014). TaintDroid: An information flow tracking system for real-time privacy monitoring on smartphones. Communications of ACM, 57(3), 99–106.
Facebook. (2012, June 8, 2012). Statement of rights and responsibilities. Retrieved July 20, 2012 from https://www.facebook.com/legal/terms.
Ghate, D., & Ralston, R. E. (Eds.). (2011). Why businessmen need philosophy. New York, NY: New American Library.
Gotthelf, A., & Lennox, J. G. (Eds.). (2010). Metaethics, egoism, and virtue: Studies in Ayn Rand’s normative theory. Pittsburgh, PN: University of Pittsburgh Press.
Gwartney, J., Lawson, R., & Hall, J. (2012). Economic freedom of the world: 2012 annual report. Canada: Fraser Institute.
Haefner, R. (2009). More employers screening candidates via social networking sites. Retrieved July 20, 2012 from http://www.careerbuilder.com/Article/CB-1337-Getting-Hired-More-Employers-Screening-Candidates-via-Social-Networking-Sites/.
Hasnas, J. (1998). The normative theories of business ethics: A guide for the perplexed. Business Ethics Quarterly, 8(1), 19–42.
Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building consumer trust online. Communication of the ACM, 42(4), 80–85.
Hsieh, D. M. (2004). False excuses: Honesty, wrongdoing, and moral growth. The Journal of Value Inquiry, 38, 171–185.
Hume, D. (1740). A treatise of human nature. Retrieved September 4, 2006 from http://en.wikisource.org/wiki/Treatise_of_Human_Nature.
Iivari, J., & Magda, H. (2007). The relationship between organizational culture and the deployment of systems development methodologies. MIS Quarterly, 31(1), 35–58.
Joinson, A. N., Reips, U.-D., Buchanan, T., & Schofield, C. B. P. (2010). Privacy, trust, and self-disclosure online. Human Computer Interaction, 25(1), 1–24.
Kant, I. (1900). Foundations of the metaphysics of morals (T. K. Abbott, Trans.). 2nd ed. New York, NY: Longmans, Green, and Co.
King, K. S. (2011). Corporate governance. Retrieved April 26, 2012 from http://www.bbt.com/bbtdotcom/about/investor-relations/corporate-governance/default.page.
Kristof-Brown, A. L., Zimmerman, R. D., & Johnson, E. C. (2005). Consequences of individuals’ fit at work: A meta-analysis of person-job, person-organization, person-group, and person-supervisor fit. Personnel Psychology, 58(2), 281–342.
Macinnes, I. (2005). Causes of disputes in online auctions. Electronic Markets, 15(2), 146–157.
Martin, K. (2012). Information technology and privacy: Conceptual muddles or privacy vacuums? Ethics and Information Technology, 14(4), 267–284.
Mill, J. S. (1863). Utilitarianism. Retrieved September 4, 2006 from http://en.wikisource.org/wiki/Utilitarianism.
Mizutami, M., Dorsey, J., & Moor, J. H. (2004). The internet and Japanese conception of privacy. Ethics and Information Technology, 6(2), 121–128.
Moore, A. (2010). Privacy rights: Moral and legal foundations. University Park, PA: The Pennsylvania State University Press.
O’Dell, J. (2012). Recruitment trend we hate: Asking for Facebook passwords during the interview. Retrieved May 16, 2012 from http://venturebeat.com/2012/03/21/facebook-login-job-interview/.
Parnell, J. A., & Dent, E. B. (2009). Philosophy, ethics, and capitalism: An interview with BB&T chairman John Allison. Academy of Management Learning and Education, 8(4), 587–596.
Pavlou, P. A., & Dimoka, A. (2006). The nature and role of feedback text comments in online marketplaces: Implications for trust building, price premiums, and seller differentiation. Information Systems Research, 17(4), 392–414.
Peikoff, L. (1991). Objectivism: The philosophy of Ayn Rand. New York, NY: Penguin Books.
Peikoff, L. (1999). Healthcare is not a right. In R. E. Ralston (Ed.), Why businessmen need philosophy. Monterey, CA: Ayn Rand Institute Press.
Peikoff, A. (2004). No Corn on this Cobb: Why reduct should be all ears for pavesich. Brandeis Law Journal, 42, 751–792.
Peikoff, A. (2006). The right to privacy: Contemporary reductionists and their critics. Virginia Journal of Social Policy and the Law, 13(3), 474–551.
Peikoff, A. (2008). Beyond reductionism: Reconsidering the right to privacy. NYU Journal of of Law & Liberty, 3(1), 1–47.
Pineda, A., & Jimenez-Varea, J. (2014). Popular culture, ideology, and the comics industry: Steve Ditko’s objectivist spider-man. The Journal of Popular Culture, 46(6), 1156–1176.
Pinjani, P., & Palvia, P. (2013). Trust and knowledge sharing in diverse global virtual teams. Information & Management, 50(4), 144–153.
Prosser, R. A. (1978). The right to privacy. Georgia Law Review, 12(3), 393–422.
Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323–333.
Rand, A. (1957). Atlas shrugged. New York, NY: Random House.
Rand, A. (1962). Introducing objectivism. The Objectivist Newsletter, 1(1), 35.
Rand, A. (1963). For the new intellectual. New York, NY: Signet.
Rand, A. (1964). The virtue of selfishness: A new concept of egoism. New York, NY: Signet.
Rand, A. (1975). The romantic manifesto (2nd ed.). New York, NY: New American Library.
Rand, A. (1986). Capitalism: The unknown ideal. New York, NY: Signet.
Rand, A. (1989). The voice of reason: Essays in objectivist thought. New York, NY: Plume.
Rand, A. (1990). Introduction to objectivist epistemology (2nd ed.). New York, NY: Meridian.
Rand, A. (2011). America’s persecuted minority: Big business. In D. Ghate & R. E. Ralston (Eds.), Why businessmen need philosophy. New York, NY: New American Library.
Rasmussen, D. B. (2006). Regarding choice and the foundation of morality: Reflections on Rand’s ethics. The Journal of Ayn Rand Studies, 7(2), 309–328.
Rawls, J. (1999). A theory of justice (Revised ed.). Cambridge, MA: Harvard University Press.
Reer, F., & Kramer, N. C. (2014). Underlying factors of social capital acquisition in the context of online-gaming: Comparing world of warcraft and counter-strike. Computers in Human Behavior, 36(1), 179–189.
Sarathy, R., & Robertson, C. J. (2003). Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics, 46(2), 111–126.
Sarker, S., Ajuja, M., Sarker, S., & Kirkeby, S. (2011). The role of communication and trust in global virtual teams: A social network perspective. Journal of Management Information Systems, 28(1), 273–309.
Schoorman, F. D., Mayer, R. C., & Davis, J. H. (2007). An integrative model of organizational trust: Past, present, and future. Academy of Management Review, 32(2), 344–354.
Sciabarra, C. M. (1995). Ayn Rand: The Russian radical. University Park, PA: The Pennsylvania State University Press.
Smith, T. (2000). Viable values: A study of life as the root and reward of morality. Lanham, MD: Rowman & Littlefield Publishers Inc.
Smith, T. (2004). Morality without the Wink: A defense of moral perfection. Journal of Philosophic Research, 29, 315–331.
Smith, T. (2006). Ayn Rand’s normative ethics: The virtuous egoist. New York, NY: Cambridge University Press.
Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015.
Straub, D., & Collins, R. W. (1990). Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy. MIS Quarterly, 14(2), 143–156.
Stutzman, F., Capra, R., & Thompson, J. (2011). Factors mediating disclosure in social network sites. Computers in Human Behavior, 27(1), 590–598.
Stutzman, F., Gross, R., & Acquisti, A. (2013). Silent listeners: The evolution of privacy and disclosure on facebook. Journal of Privacy and Confidentiality, 4(2), 7–41.
Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1–22.
Tavani, H. T., & Moor, J. H. (2001). Privacy protection, Control of Information, and Privacy-Enhancing Technologies. Computers and Society, 31(1), 6–11.
Thomson, J. J. (1975). The right to privacy. Philosophy & Public Affairs, 4(4), 295–314.
Torres, L., & Kamhi, M. M. (2000). What art is: The Esthetic theory of Ayn Rand. Peru, IL: Open Court.
Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268.
Uyl, D. J. D., & Rasmussen, D. B. (Eds.). (1986). The philosophic thought of Ayn Rand. Urbana, IL: University of Illinois Press.
Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5(4), 199–210.
Walden, E. A. (2005). Intellectual property rights and cannibalization in information technology outsourcing contracts. MIS Quarterly, 29(4), 699–720.
Wang, J.-M., & Kleiner, B. H. (2000). Effective employment screening practices. Management Research News, 32(5), 73–81.
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193–220.
Waters, S., & Ackerman, J. (2011). Exploring privacy management on Facebook: Motivations and perceived consequences of voluntary disclosure. Journal of Computer-Mediated Communication, 17(1), 101–115.
Weisband, S. P., & Reinig, B. A. (1995). Managing user perceptions of email privacy. Communication of ACM, 38(12), 40–47.
Wheeless, L. R., & Grotz, J. (1977). The measurement of trust and its relationship to self-disclosure. Human Communication Research, 3(3), 250–257.
Woiceshyn, J. (2009). Lessons from “Good Minds”: How CEOs use intuition, analysis, and guiding principles to make strategic decisions. Long Range Planning, 42(3), 298–319.
Woiceshyn, J. (2011). A model for ethical decision making in business: Reasoning, intuition, and rational moral principles. Journal of Business Ethics, 104(3), 311–323.
Woiceshyn, J. (2012). How to be profitable and moral. Lanham, Maryland: Hamilton Books.
Workman, M. (2012). Gaining access with social engineering: An empirical study of the threat. Information Systems Security, 16(6), 315–331.
Xu, C., Ryan, S., Prybutok, V., & Wen, C. (2012). It is not for fun: An examination of social network site usage. Information & Management, 49(5), 210–217.
Younkins, E. (2012). Ayn Rand’s objectivist virtues as the foundation for morality and success in business. The Journal of Ayn Rand Studies, 12(2), 237–262.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Drake, J.R. Asking for Facebook Logins: An Egoist Case for Privacy. J Bus Ethics 139, 429–441 (2016). https://doi.org/10.1007/s10551-015-2586-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-015-2586-4