Electronic monitoring in the workplace: if people don’t care, then what is the relevance?
暂无分享,去创建一个
Bernd Carsten Stahl | B. Stahl | S. Wilford | M. Prior | S. Wilford | D. Collins | Mary Prior | S. Wilford | D. Collins | Dervla Collins
[1] Edward J. O'Boyle,et al. An ethical decision-making process for computing professionals , 2002, Ethics and Information Technology.
[2] J. Stanton,et al. Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange perspectives. , 2002 .
[3] G. Armstrong,et al. The Maximum Surveillance Society: The Rise of CCTV , 1999 .
[4] D. Langford. Internet Ethics , 2003 .
[5] Duncan Langford. Business Computer Ethics , 1999 .
[6] T. Bynum. Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing , 1991 .
[7] Lucas D. Introna. Workplace surveillance is unethical and unfair , 2002 .
[8] M. Ronald Buckley,et al. The Hypothesized Relationship Between Accountability and Ethical Behavior , 2001 .
[9] John Weckert,et al. Computer and Information Ethics , 1997 .
[10] Raymond R. Panko,et al. Monitoring for pornography and sexual harassment , 2002, CACM.
[11] Richard A. Spinello,et al. Cyberethics: Morality and Law in Cyberspace , 2001 .
[12] M. Castells,et al. The Hacker Ethic and the Spirit of the Information Age , 2001 .
[13] J. Rubenfeld. The Right of Privacy , 1989 .
[14] Luiz Antonio Joia,et al. IT-based management : challenges and solutions , 2003 .
[15] Laura P. Hartman,et al. Technology and Ethics: Privacy in the Workplace , 2001 .
[16] David Lyon,et al. Surveillance Studies: understanding visibility, mobility and the phenetic fix. , 2002 .
[17] Lucas D. Introna. Workplace surveillance, privacy and distributive justice , 2000, CSOC.
[18] R. Solomon,et al. Building Trust: In Business, Politics, Relationships, and Life , 2001 .
[19] C. Ess. Philosophical Perspectives on Computer-Mediated Communication , 1996 .
[20] Richard G. Vedder,et al. Privacy and security , 1996, CSOC.
[21] Deborah G. Johnson. Computer Ethics , 1985 .
[22] M. Velasquez. Business Ethics: Concepts and Cases , 1982 .
[23] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[24] Bruce A. Reinig,et al. Managing user perceptions of email privacy , 1995, CACM.
[25] Keng Siau,et al. Acceptable internet use policy , 2002, CACM.
[26] Richard J. Severson,et al. The Principles of Information Ethics , 1997 .
[27] Jacques N. Catudal. Censorship, the Internet, and the child pornography law of 1996: A critique , 2004, Ethics and Information Technology.
[28] G. Gumpert,et al. The Demise of Privacy in a Private World: From Front Porches to Chat Rooms , 1998 .
[29] Gary T. Marx,et al. What’s new about the “new surveillance”?: Classifying for change and continuity , 2004 .
[30] Rasool Azari,et al. Current Security Management & Ethical Issues of Information Technology , 2003 .
[31] Stewart T. Fleming. Biometrics: past, present and future , 2003 .
[32] Leonard M. Jessup,et al. Does electronic monitoring of employee internet usage work? , 2002, CACM.
[33] J. Rachels. Why privacy is important , 1985 .
[34] M. Castells. The Information Age: Economy, Society and Culture , 1999 .
[35] M. Foucault,et al. Surveiller et punir: Naissance de la prison , 1993 .
[36] Philip Brey,et al. Disclosive computer ethics , 2000, CSOC.
[37] Donald Gotterbarn,et al. Using the new ACM code of ethics in decision making , 1993, CACM.
[38] Paul Thompson. Fantasy Island: a Labour Process critique of the 'age of surveillance'. , 2002 .
[39] H. Arendt,et al. The Human Condition , 1960 .
[40] Herman T. Tavani,et al. Readings in Cyberethics , 2001 .
[41] Reagan M. Ramsower,et al. Cyberethics: Social and Moral Issues in the Computer Age , 2000 .
[42] A. Adam. Cyberstalking and Internet pornography: Gender and the gaze , 2002, Ethics and Information Technology.
[43] Herman T. Tavani,et al. Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.
[44] R. Gavison. Privacy and the Limits of Law , 1980 .
[45] William S. Brown. Ontological Security, Existential Anxiety and Workplace Privacy , 2000 .
[46] D. Nye,et al. The 'Privacy in Employment' Critique: A Consideration of Some of the Arguments for 'Ethical' HRM Professional Practice , 2002 .
[47] Wes Sharrock,et al. On the poverty of apriorism: Technology, surveillance in the workplace and employee responses , 2002 .
[48] Norman E. Bowie,et al. Book Review , 2001, Business Ethics Quarterly.
[49] Marc Rotenberg,et al. Communications privacy: implications for network design , 1993, CACM.
[50] Nick Taylor,et al. State Surveillance and the Right to Privacy. , 2002 .
[51] Göran Collste. Ethics in the Age of Information Technology , 2000 .
[52] K. Ball. The Labours of Surveillance , 2002 .
[53] H. Nissenbaum. Toward an Approach to Privacy in Public: Challenges of Information Technology , 1997 .
[54] Robert Boncella. Internet Privacy: At Home and At Work , 2001, Commun. Assoc. Inf. Syst..
[55] James B. Rule,et al. Preserving individual autonomy in an information-oriented society , 1991 .
[56] Benjamin J. Goold,et al. Public Area Surveillance and Police Work: the impact of CCTV on police behaviour and autonomy , 2002 .
[57] Jeroen van den Hoven,et al. Computer Ethics and Moral Methodology , 1997 .
[58] James H. Moor,et al. Towards a theory of privacy in the information age , 1997, CSOC.
[59] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[60] Gregory J. Walters,et al. Privacy and security: an ethical analysis , 2001, CSOC.
[61] R. Posner. Philosophical Dimensions of Privacy: An economic theory of privacy , 1984 .
[62] Simon Rogerson. Ethical Aspects of Information Technology: Issues for Senior Executives , 1998 .
[63] R. Mason. Four ethical issues of the information age , 1986 .
[64] Dag Elgesem,et al. The structure of rights in Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data , 1999, Ethics and Information Technology.
[65] Deborah G. Johnson,et al. Computers, ethics & social values , 1995 .
[66] Amit Pinchevski,et al. Ethics on the line , 2003 .
[67] Lucas D. Introna. Privacy and the computer: why we need privacy in the information society , 1997 .
[68] R. Spinello. Case studies in information and computer ethics , 1996 .
[69] T. Forester,et al. Computer ethics: Cautionary tales and ethical dilemmas in computing , 1990 .
[70] Marjorie Ann Jerrard,et al. A Case Study of How Technology and Trust Enable the Projectized Team-Based Organization , 2003 .
[71] Michael J. Gallivan,et al. Trust, control and the role of interorganizational systems in electronic partnerships , 2003, Inf. Syst. J..
[72] W. Block. Cyberslacking, Business Ethics and Managerial Economics , 2011 .