Privacy as a shared feature of the e-phenomenon: a comparison of privacy policies in e-government, e-commerce and e-teaching
暂无分享,去创建一个
[1] Janice C. Sipior,et al. The ethical and legal quandary of email privacy , 1995, CACM.
[2] M. Castells,et al. The Hacker Ethic and the Spirit of the Information Age , 2001 .
[3] Detmar W. Straub,et al. Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .
[4] M. Castells. End of Millennium: The Information Age: Economy, Society and Culture , 1997 .
[5] William S. Brown. Ontological Security, Existential Anxiety and Workplace Privacy , 2000 .
[6] Lucas D. Introna. Workplace surveillance is unethical and unfair , 2002 .
[7] Bruce A. Reinig,et al. Managing user perceptions of email privacy , 1995, CACM.
[8] Bernd Carsten Stahl,et al. Electronic monitoring in the workplace: if people don’t care, then what is the relevance? , 2005 .
[9] Grace F. Johnson‐Page,et al. B2C data privacy policies: current trends , 2001 .
[10] Mary J. Culnan,et al. Using the Content of Online Privacy Notices to Inform Public Policy: A Longitudinal Analysis of the 1998-2001 U.S. Web Surveys , 2002, Inf. Soc..
[11] Minh Q. Huynh,et al. The critical social theory of Jürgen Habermas and its implications for IS research , 2004 .
[12] M. Velasquez. Business Ethics: Concepts and Cases , 1982 .
[13] Leonard M. Jessup,et al. Does electronic monitoring of employee internet usage work? , 2002, CACM.
[14] Simon Rogerson. Ethical Aspects of Information Technology: Issues for Senior Executives , 1998 .
[15] D. Nye,et al. The 'Privacy in Employment' Critique: A Consideration of Some of the Arguments for 'Ethical' HRM Professional Practice , 2002 .
[16] Joseph S. Valacich,et al. E-Learning as an Emerging Entrepreneurial Enterprise in Universities and Firms , 2003, Commun. Assoc. Inf. Syst..
[17] Sirkka L. Jarvenpaa,et al. The Use of Information Technology to Enhance Management School Education: A Theoretical View , 1995, MIS Q..
[18] John Weckert,et al. Computer and Information Ethics , 1997 .
[19] Felix Stalder,et al. Privacy is not the Antidote to Surveillance. , 2009 .
[20] Bernd Carsten Stahl,et al. Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics? , 2004, J. Organ. End User Comput..
[21] Philip Brey,et al. Disclosive computer ethics , 2000, CSOC.
[22] Benjamin J. Goold,et al. Public Area Surveillance and Police Work: the impact of CCTV on police behaviour and autonomy , 2002 .
[23] R. Mason. Four ethical issues of the information age , 1986 .
[24] H. Nissenbaum. Toward an Approach to Privacy in Public: Challenges of Information Technology , 1997 .
[25] Marc Rotenberg,et al. Communications privacy: implications for network design , 1993, CACM.
[26] Richard J. Severson,et al. The Principles of Information Ethics , 1997 .
[27] Lucas D. Introna. Privacy and the computer: why we need privacy in the information society , 1997 .
[28] Herman T. Tavani,et al. Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.
[29] M. Foucault,et al. Surveiller et punir: Naissance de la prison , 1977 .
[30] R. Chandran. Privacy in Employment , 2007 .
[31] Blake Ives,et al. Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effectiveness in Basic It Skills Training Author(s): Piccoli Et Al./web-based Virtual Learning Environments Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effe , 2022 .
[32] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[33] Richard A. Spinello,et al. Cyberethics: Morality and Law in Cyberspace , 2001 .
[34] Dag Elgesem,et al. The structure of rights in Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data , 1999, Ethics and Information Technology.
[35] James H. Moor,et al. Towards a theory of privacy in the information age , 1997, CSOC.
[36] Stewart T. Fleming. Biometrics: past, present and future , 2003 .
[37] Kiran J. Desai,et al. E-commerce policies and customer privacy , 2003, Inf. Manag. Comput. Secur..
[38] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[39] Michael J. Gallivan,et al. Trust, control and the role of interorganizational systems in electronic partnerships , 2003, Inf. Syst. J..
[40] Yolande E. Chan,et al. Theoretical Explanations for Firms' Information Privacy Behaviors , 2005, J. Assoc. Inf. Syst..
[41] M. Castells. The Information Age: Economy, Society and Culture , 1999 .
[42] Claire Gauzente. WEB MERCHANTS' PRIVACY AND SECURITY STATEMENTS: HOW REASSURING ARE THEY FOR CONSUMERS? A TWO-SIDED APPROACH , 2004 .
[43] Dorothy E. Leidner,et al. Research Commentary: Technology-Mediated Learning - A Call for Greater Depth and Breadth of Research , 2001, Inf. Syst. Res..
[44] M. Foucault,et al. Surveiller et punir: Naissance de la prison , 1993 .
[45] Bernd Carsten Stahl,et al. The Paradigm of E-Commerce in E-Government and E-Democracy , 2004 .