“Don’t Be Evil” and Beyond for High Tech Organizations: Ethical Statements and Mottos (and Responsibility)

[1]  Chanchai Tangpong,et al.  Employee Primacy and Corporate Slogans in Japanese and American Firms’ Communication in Times of Crisis , 2020 .

[2]  Jo Ann Oravec The manipulation of scholarly rating and measurement systems: constructing excellence in an era of academic stardom , 2017 .

[3]  Hal Hodson,et al.  Google DeepMind and healthcare in an age of algorithms , 2017, Health and Technology.

[4]  C. Shalley,et al.  Working with creative leaders: Exploring the relationship between supervisors' and subordinates' creativity , 2017 .

[5]  Kenneth C. Werbin,et al.  The contextual integrity of the closet: Privacy, data mining and outing Facebook’s algorithmic logics , 2017 .

[6]  Judith Townend Data Protection and the ‘Right to be Forgotten’ in Practice: A UK Perspective , 2017, International Journal of Legal Information.

[7]  Alexander Tsesis,et al.  Terrorist Speech on Social Media , 2017 .

[8]  R. Woods,et al.  Processing Is Not Judgment, Storage Is Not Memory: A Critique of Silicon Valley’s Moral Catechism , 2017 .

[9]  L. Taylor,et al.  Does Great Power Come with Great Responsibility? The Need to Talk About Corporate Political Responsibility , 2017 .

[10]  Mariarosaria Taddeo,et al.  The Debate on the Moral Responsibilities of Online Service Providers , 2015, Science and Engineering Ethics.

[11]  J. Spector,et al.  Ethics in educational technology: towards a framework for ethical decision making in and for the discipline , 2016 .

[12]  Keith W. Miller,et al.  There's something in your eye: ethical implications of augmented visual field devices , 2016, J. Inf. Commun. Ethics Soc..

[13]  Shlomo Mark,et al.  Professional Ethics of Software Engineers: An Ethical Framework , 2016, Sci. Eng. Ethics.

[14]  Agnieszka McPeak Social Media Snooping and Its Ethical Bounds , 2014 .

[15]  C. Besio,et al.  Morality, Ethics, and Values Outside and Inside Organizations: An Example of the Discourse on Climate Change , 2014 .

[16]  H. Hodson Clever cars with Android and 4G keep you connected , 2014 .

[17]  Yadong Luo,et al.  Moral Degradation, Business Ethics, and Corporate Social Responsibility in a Transitional Economy , 2014 .

[18]  Aimee van Wynsberghe,et al.  Ethicist as Designer: A Pragmatic Approach to Ethics in the Lab , 2014, Sci. Eng. Ethics.

[19]  Jo Ann Oravec Gaming Google: Some Ethical Issues Involving Online Reputation Management , 2013 .

[20]  Marisol Sandoval Corporate Social (IR)Responsibility in Media and Communication Industries , 2013 .

[21]  Mike W. Martin Of Mottos and Morals , 2012 .

[22]  Victor T. Nilsson You're Not from Around Here, Are You? Fighting Deceptive Marketing in the Twenty-First Century , 2012 .

[23]  Nicole Ozer,et al.  Putting Online Privacy Above the Fold: Building a Social Movement and Creating Corporate Change , 2012 .

[24]  Jef Ausloos,et al.  The 'Right to be Forgotten' - Worth remembering? , 2012, Comput. Law Secur. Rev..

[25]  Mark N. Bing,et al.  To Screen or Not to Screen? Using the Internet for Selection Decisions , 2011, Employee Responsibilities and Rights Journal.

[26]  Privacy and the private realm , 2012 .

[27]  C. Fuchs The Political Economy of Privacy on Facebook , 2012 .

[28]  S. Desmarais,et al.  Hey Mom, What’s on Your Facebook? Comparing Facebook Disclosure and Privacy in Adolescents and Adults , 2012 .

[29]  Jo Ann Oravec Bullying and Mobbing in Academe: Challenges for Distance Education and Social Media Applications. , 2012 .

[30]  Paul M. Schwartz,et al.  The PII Problem: Privacy and a New Concept of Personally Identifiable Information , 2011 .

[31]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[32]  John F. Blevins The New Scarcity: A First Amendment Framework for Regulating Access to Digital Platforms , 2011 .

[33]  R. Sims,et al.  Business Ethics Across the Curriculum , 2011 .

[34]  H. Beech,et al.  Killing fields. How Asia's growing appetite for traditional medicine is threatening Africa's rhinos. , 2011, Time.

[35]  Sarah Michele Ford,et al.  RECONCEPTUALIZING THE PUBLIC/PRIVATE DISTINCTION IN THE AGE OF INFORMATION TECHNOLOGY , 2011 .

[36]  Ken Strutin Social Media and the Vanishing Points of Ethical and Constitutional Boundaries , 2011 .

[37]  S. Clegg,et al.  On the dark side of codes: Domination not enlightenment , 2011 .

[38]  Pekka Aula,et al.  Meshworked reputation: Publicists views on the reputational impacts of online communication , 2011 .

[39]  S. Adee Personal PR: how to have sparkling reputation online , 2011 .

[40]  I. Winkler The Representation of Social Actors in Corporate Codes of Ethics. How Code Language Positions Internal Actors , 2011 .

[41]  Thaddeus A. Hoffmeister Google, Gadgets, and Guilt: Juror Misconduct in the Digital Age , 2010 .

[42]  Johan Sandström,et al.  Resisting a corporate code of ethics and the reinforcement of management control , 2010 .

[43]  B. Stallworth,et al.  Future Imperfect: Googling for Principles in Online Behavioral Advertising , 2010 .

[44]  James Grimmelmann,et al.  Privacy as Product Safety , 2010 .

[45]  Leigh Anne Clark,et al.  Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice , 2010 .

[46]  Jochen Wirtz,et al.  Regulatory Focus Theory, Trust, and Privacy Concern , 2009 .

[47]  Chris Jay Hoofnagle Beyond Google and Evil: How Policy Makers, Journalists and Consumers Should Talk Differently About Google and Privacy , 2009, First Monday.

[48]  Michael Zimmer,et al.  Web Search Studies: Multidisciplinary Perspectives on Web Search Engines , 2009 .

[49]  Josh Blackman,et al.  Omniveillance, Google, Privacy in Public, and the Right to Your Digital Identity: A Tort for Recording and Disseminating an Individual's Image over the Internet , 2008 .

[50]  R. Baker Defamation and the Moral Community , 2008 .

[51]  Michael Zimmer,et al.  The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance , 2008 .

[52]  Bruce R. Gaumnitz,et al.  Changing Behavior by Improving Codes of Ethics , 2007 .

[53]  Judit Bar-Ilan,et al.  Manipulating search engine algorithms: the case of Google , 2007, J. Inf. Commun. Ethics Soc..

[54]  W. Pannapacker The Inescapability of Your Past. , 2007 .

[55]  Andrew D. Brown,et al.  `Ethics' as a discursive resource for identity work , 2007 .

[56]  Eric Goldman,et al.  Search Engine Bias and the Demise of Search Engine Utopianism , 2006 .

[57]  J. Urist Who's Feeling Lucky? Skewed Incentives, Lack of Transparency, and Manipulation of Google Search Results Under the DMCA , 2006 .

[58]  Jo Ann Oravec The transparent knowledge worker: weblogs and reputation mechanisms in KM systems , 2004, Int. J. Technol. Manag..

[59]  Jo Ann Oravec The transformation of privacy and anonymity: Beyond the right to be let alone , 2003 .

[60]  Steven Pfaff,et al.  The Limits of Coercive Surveillance , 2001 .

[61]  Laszlo Bock,et al.  Work Rules!: Insights from Inside Google That Will Transform How You Live and Lead , 2001 .

[62]  Jo Ann Oravec Integrating privacy studies into teacher education curricula , 1999 .