Ethical issues of information and business: a critical perspective.

Businesses and the economic system they work in have an important influence on ethical issues arising from information and information and communication technology. This chapter aims at establishing a link between several sets of ethical discourses that concern similar topics. It offers an introduction to some of the current debates in business ethics and considers how information and technology influence the current topics and debates in the area. Drawing on some of the debates in computer and information ethics, the paper points out areas where these two sets of discourses overlap and where they have the potential to inform each other. The chapter will do so by looking at some prominent examples of issues that arise in business and computer ethics, including privacy and employee surveillance and intellectual property, as well as some macrolevel issues including globalization and digital divides.

[1]  Benjamin J. Goold,et al.  Public Area Surveillance and Police Work: the impact of CCTV on police behaviour and autonomy , 2002 .

[2]  M. Velasquez Business Ethics: Concepts and Cases , 1982 .

[3]  L. Jean Camp,et al.  First Principles of Copyright for DRM Design , 2003, IEEE Internet Comput..

[4]  E. Gonzalez Defining a Post-Conventional Corporate Moral Responsibility , 2002 .

[5]  Richard T. DeGeorge,et al.  The Ethics of Information Technology and Business , 2002 .

[6]  D. Nye,et al.  The 'Privacy in Employment' Critique: A Consideration of Some of the Arguments for 'Ethical' HRM Professional Practice , 2002 .

[7]  When Good Companies Do Bad Things: Responsibility and Risk in an Age of Globalization , 1999 .

[8]  A. Philips The Clash of Civilisations , 2007 .

[9]  Donald Gotterbarn,et al.  Using the new ACM code of ethics in decision making , 1993, CACM.

[10]  Daniel M. Hausman,et al.  Economic analysis and moral philosophy , 1996 .

[11]  P. Koslowski The Limits of Shareholder Value , 2000 .

[12]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[13]  Keng Siau,et al.  Acceptable internet use policy , 2002, CACM.

[14]  Benjamin Kuipers,et al.  Computer power and human reason , 1976, SGAR.

[15]  Patricia H. Werhane,et al.  Persons, rights, and corporations , 1985 .

[16]  J. Collier,et al.  Thinking for the future: global corporate responsibility in the twenty-first century , 2005 .

[17]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[18]  Leonard M. Jessup,et al.  Does electronic monitoring of employee internet usage work? , 2002, CACM.

[19]  John Hasnas The Normative Theories of Business Ethics: A Guide for the Perplexed , 1998, Business Ethics Quarterly.

[20]  J. Alfred French The business knowledge investment: building architected information , 1990 .

[21]  Lawrence Lessig,et al.  The Laws of Cyberspace , 1998 .

[22]  Amartya Sen,et al.  On Ethics and Economics , 1988 .

[23]  M. Foucault,et al.  Surveiller et punir: Naissance de la prison , 1977 .

[24]  Enid Mumford,et al.  Redesigning Human Systems , 2003 .

[25]  Reagan M. Ramsower,et al.  Cyberethics: Social and Moral Issues in the Computer Age , 2000 .

[26]  Robert Joseph Skovira,et al.  The social contract revised: obligation and responsibility in the information society , 2003 .

[27]  L. Preston,et al.  The Stakeholder Theory of the Corporation: Concepts, Evidence, and Implications , 1995 .

[28]  John Weckert,et al.  Information Technology And Social Justice , 2006 .

[29]  Duncan Langford Business Computer Ethics , 1999 .

[30]  Simon Rogerson,et al.  RESPONSIBLE RISK ANALYSIS FOR SOFTWARE DEVELOPMENT: CREATING THE SOFTWARE DEVELOPMENT IMPACT STATEMENT , 2005 .

[31]  U. Beck,et al.  Was ist Globalisierung? : Irrtümer des Globalismus : Antworten auf Globalisierung , 1997 .

[32]  Max Weber Die protestantische Ethik und der Geist des Kapitalismus , 1993 .

[33]  Norman E. Bowie,et al.  Book Review , 2001, Business Ethics Quarterly.

[34]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[35]  D. Doane Beyond corporate social responsibility: minnows, mammoths and markets , 2005 .

[36]  Herman T. Tavani,et al.  Readings in Cyberethics , 2001 .

[37]  Lucas D. Introna Privacy and the computer: why we need privacy in the information society , 1997 .

[38]  Florence M. Mason,et al.  Ethics of information management , 1995 .

[39]  R. Mason Four ethical issues of the information age , 1986 .

[40]  G. Dhillon,et al.  Measuring Factors that Influence the Success of Internet Commerce , 2002, Inf. Syst. Res..

[41]  H MoorJames The future of computer ethics , 2001 .

[42]  M. Albrow,et al.  The impact of globalization on sociological concepts: Community, culture and milieu , 1994 .

[43]  Andrea H. Tapia Resistance or Deviance? A High-Tech Workplace During the Bursting of the Dot-Com Bubble , 2004, Relevant Theory and Informed Practice.

[44]  Markku Wilenius Towards the age of corporate responsibility? Emerging challenges for the business world , 2005 .

[45]  Simon Rogerson,et al.  Computer Ethics and Professional Responsibility , 2003 .

[46]  Bernd Carsten Stahl,et al.  Responsible Management of Information Systems , 2003 .

[47]  James H. Moor,et al.  Reason, relativity, and responsibility in computer ethics , 1998, CSOC.

[48]  Robert Boncella Internet Privacy: At Home and At Work , 2001, Commun. Assoc. Inf. Syst..

[49]  Ram S. Sriram,et al.  The Value Relevance of IT Investments on Firm Value in the Financial Services Sector , 2003, Inf. Resour. Manag. J..

[50]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[51]  L. Jean Camp Web Security and Privacy: An American Perspective , 1999, Inf. Soc..

[52]  Patrick Grim,et al.  Information and Meaning: Use-Based Models in Arrays of Neural Nets , 2004, Minds and Machines.

[53]  Raymond R. Panko,et al.  Monitoring for pornography and sexual harassment , 2002, CACM.

[54]  Bruce A. Reinig,et al.  Managing user perceptions of email privacy , 1995, CACM.

[55]  D. Gauthier Morals by Agreement , 1987 .

[56]  Thomas W. Dunfee,et al.  How Binding the Ties? Business Ethics as Integrative Social ContractsTies That Bind: A Social Contracts Approach to Business Ethics , 1999 .

[57]  R. Nozick Anarchy, State, and Utopia , 1975, Princeton Readings in Political Thought.

[58]  Jacques N. Catudal Censorship, the Internet, and the child pornography law of 1996: A critique , 2004, Ethics and Information Technology.

[59]  Alison Adam,et al.  Delegating and Distributing Morality: Can We Inscribe Privacy Protection in a Machine? , 2005, Ethics and Information Technology.

[60]  Frances S. Grodzinsky,et al.  The practitioner from within: revisiting the virtues , 1999, CSOC.

[61]  M. Foucault,et al.  Surveiller et punir: Naissance de la prison , 1993 .

[62]  L. Floridi © 1999 Kluwer Academic Publishers. Printed in the Netherlands. Information ethics: On the philosophical foundation of computer ethics ⋆ , 2022 .

[63]  Philip Brey,et al.  Disclosive computer ethics , 2000, CSOC.

[64]  Kalle Lyytinen,et al.  THE POVERTY OF SCIENTISM IN INFORMATION SYSTEMS , 2000 .

[65]  Bernard Gert Common morality and computing , 2004, Ethics and Information Technology.

[66]  W. Block Cyberslacking, Business Ethics and Managerial Economics , 2011 .

[67]  Shoshana Zuboff,et al.  In the Age of the Smart Machine: The Future of Work and Power , 1989 .

[68]  Carlisle E. George Copyright Management Systems - Accessing the power balance , 2005, The Information Society.

[69]  Luciano Floridi,et al.  Philosophy and Computing: An Introduction , 1999 .

[70]  Geoff Walsham,et al.  Ethical theory, codes of ethics and IS practice , 1996 .

[71]  Rudy Hirschheim,et al.  Analysing information systems evaluation: another look at an old problem , 1998 .

[72]  Bill Doolin,et al.  Power and resistance in the implementation of a medical management information system , 2004, Inf. Syst. J..

[73]  J. Hendry Economic contracts versus social relationships as a foundation for normative stakeholder theory , 2001 .

[74]  Norbert Wiener,et al.  The human use of human beings - cybernetics and society , 1988 .

[75]  Richard J. Severson,et al.  The Principles of Information Ethics , 1997 .

[76]  Effy Oz,et al.  Ethical Standards for Information Systems Professionals: A Case for a Unified Code , 1992, MIS Q..

[77]  John Ladd Ethics and the computer world: a new challenge for philosophers , 1997, CSOC.

[78]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .