References


Adam, A. (2002). Cyberstalking and Internet pornography: Gender and the gaze. Ethics and Information Technology, 4 (2), 133-142.

Anderson, R.E., Johnson, D.G., Gotterbarn, D., & Perrolle, J. (1993). Using the new ACM code of ethics in decision making. Communications of the ACM, 36 (2), 98-106.

Arendt, H. (1958). The human condition (second edition). Chicago, IL: University of Chicago Press.

Ball, K. (2003). The labours of surveillance. Surveillance & Society, 1 (2), 125-137.

Beu, D. & Buckley, M.R. (2001). The hypothesized relationship between accountability and ethical behavior. Journal of Business Ethics, 34 , 57-73.

Block, W. (2001). Cyberslacking, business ethics and managerial economics. Journal of Business Ethics, 33 , 225-231.

Boncella, R.J. (2001). Internet privacy, at home and at work. Communications of the Association for Information Systems , 7.

Bowie, N.E. (1999). Business ethics - A Kantian perspective . Oxford: Blackwell.

Brey, P. (2001). Disclosive computer ethics. In R.A. Spinello & H.T. Tavani (Eds.), Readings in cyberethics (pp. 51-62). Sudbury, MA: Jones and Bartlett.

Britz, J.J. (1999). Ethical guidelines for meeting the challenges of the information age. In L.J. Pourciau (Ed.), Ethics and electronic information in the 21 st century (pp. 9-28). West Lafayette, IN: Purdue University Press.

Brown, W.S. (2000). Ontological security, existential anxiety and workplace privacy. Journal of Business Ethics, 23, 61-65.

Castells, M. (1997). The information age: Economy, society, and culture. Volume II: The power of identity . Oxford: Blackwell.

Catudal, J.N. (2001). Censorship, the Internet, and the child pornography law of 1996: A critique. In R.A. Spinello & H.T. Tavani (Eds.), Readings in cyberethics (pp. 170-187). Sudbury, MA: Jones and Bartlett.

Collins, D., & Stahl, B.C. (2002, November 13-15). The importance of codes of conduct for Irish IS/IT professionals practice of employee surveillance. InI. Alvarez et al. (Eds.), The transformation of organisations in the information age: Social and ethical implications . Proceedings of the Sixth ETHICOMP Conference, Lisbon, Portugal (pp. 67-82). Lisbon: Universidade Lusiada.

Culnan, M.J. (1993). How did they get my name ? : An exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly, 17 (3), 341-363.

Denzin, N. (1989). Interpretive interactionism . Newbury Park, CA: Sage.

Dubbeld, L. (2002, November 13-15). Surveilling organisations, organising surveillance: Organisations, observers and the observed . In I. Alvarez et al. (Eds.), The transformation of organisations in the information age: Social and ethical implications . Proceedings of the Sixth ETHICOMP Conference, Lisbon, Portugal (pp. 94-111). Lisbon: Universidade Lusiada.

Elgesiem, D. (1996). Privacy, respect for persons, and risk. In C. Ess (Ed.), Philosophical perspectives on computer-mediated communication (pp. 45-66). Albany: State University of New York Press.

Elgesiem, D. (2001). The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. In R.A. Spinello & H.T. Tavani (Eds.), Readings in cyberethics (pp. 350-377). Sudbury, MA: Jones and Bartlett. Fleming, S.T. (2003). Biometrics: Past, present, and future. In R. Azari (Ed.), Current security management & ethical issues of information technology (pp. 111-132). Hershey, PA: IRM Press.

Forester, T., & Morrison, P. (1994). Computer ethics “ Cautionary tales and ethical dilemmas in computing (2nd ed.). Cambridge, MA; London: MIT Press.

Foucault, M. (1975). Surveiller et punir: Naissance de la prison . Paris: Gallimard.

Gallivan, M.J., & Depledge, G. (2003). Trust, control and the role of interorganizational systems in electronic partnerships. Information Systems Journal, 13, 159-190.

Gavison, R. (1995). Privacy and limits of law. In D.G. Johnson & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 332-351). Upper Saddle River, NJ: Prentice Hall.

Goold, B.J. (2003). Public area surveillance and police work: The impact of CCTV on police behaviour and autonomy. Surveillance & Society, 1 (2), 191-203.

Gumpert, G., & Drucker, S.J. (2000). The demise of privacy in a private world. In R. M. Baird, R. Ramsower & S.E. Rosenbaum (Eds.), Cyberethics: Social and moral issues in the computer age (pp. 171-187). New York: Prometheus Books.

Hartman, L. (2001). Technology and ethics: Privacy in the workplace. Business and Society Review, 106, 1-27.

Himanen, P. (2001). The hacker ethic and the spirit of the information age . London: Secker & Warburg.

Introna, L.D. (2000). Privacy and the computer “ Why we need privacy in the information society. In R. M. Baird, R. Ramsower & S.E. Rosenbaum (Eds.), Cyberethics: Social and moral issues in the computer age (pp. 188-199). New York: Prometheus Books.

Introna, L.D. (2001). Workplace surveillance, privacy, and distributive justice . In R. A. Spinello & H.T. Tavani (Eds.), Readings in cyberethics (pp. 418-429). Sudbury, MA: Jones and Bartlett.

Introna, L.D. (2003). Workplace surveillance is unethical and unfair. Surveillance & Society, 1 (2), 210-216.

Jerrard, A.A., & Chang, T.Y. (2003). A case study of how technology and trust enable the projectized team-based organization. In L.A. Joia (Ed.), IT-based management: Challenges and solutions (pp. 111-129). Hershey, PA: Idea Group Publishing.

Johnson, D.G. (2001). Computer ethics (third edition). Upper Saddle River, NJ: Prentice Hall.

Johnson, D.G. (2001b). Ethics on-line. In R.A. Spinello & H.T. Tavani (Eds.), Readings in cyberethics (pp. 26-35). Sudbury, MA: Jones and Bartlett.

Koehn, D. (2001, July 4-6). Ethical challenges confronting businesses today. Proceedings of the 11th International Symposium on Ethics, Business and Society: Ethical challenges in the age of globalization. The message of the encyclical centesimus annus on the 10th anniversary of its publication, Barcelona.

Langford, D. (1999). Business computer ethics . Harlow: Addison-Wesley. Lyon, D. (2002). Surveillance studies: Understanding visibility, mobility and the phenetic fix. Surveillance & Society, 1 (1), 1-7.

Lyon, D. (2003, September 10). Surveillance since 9/11. Presentation given at De Montfort University, Leicester, UK.

Marx, G.T. (2002). What s new about the new surveillance ? Classifying for change and continuity. Surveillance & Society, 1 (1), 9-29.

Mason, R.O. (1986). Four ethical issues of the information age. MIS Quarterly, 10, 5-12.

Moor, J.H. (2000). Toward a theory of privacy in the information age. In R.M. Baird et al. (Eds.), Cyberethics: Social and moral issues in the computer age (pp. 200-212). New York: Prometheus Books.

Nissenbaum, H. (2001). Toward an approach to privacy in public: Challenges of information technology. In R.A. Spinello & H.T. Tavani (Eds.), Readings in cyberethics (pp. 392-403). Sudbury, MA: Jones and Bartlett.

Norris, C., & Armstrong, G. (1999). The maximum surveillance society: The rise of CCTV. Berg.

Nye, D. (2002). The privacy in employment critique: A consideration of some of the arguments for ethical HRM professional practice. Business Ethics: A European Review, 11 (3), 224-232.

O Boyle, E.J. (2002). An ethical decision-making process for computing professionals. Ethics and Information Technology, 4 (4), 267-277.

O Neill, O. (2002). A question of trust: The Reith lectures 2002 . London: BBC.

Panko, R.R., & Beh, H.G. (2002). Monitoring for pornography and sexual harassment . Communications of the ACM, 45 (1), 84-87.

Posner, R.A. (1995). An economic theory of privacy. In D.G. Johnson & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 358-366). Upper Saddle River, NJ: Prentice Hall.

Prior, M. (2002, November 13-15). Big brother “ so what? A study of the attitudes of young people to workplace surveillance. In I. Alvarez et al. (Eds.), The transformation of organisations in the information age: Social and ethical implications. Proceedings of the Sixth ETHICOMP conference, Lisbon, Portugal (pp. 259-269). Lisbon: Universidade Lusiada.

Rachels, J. (1995). Why privacy is important. In D.G. Johnson & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 351-357). Upper Saddle River, NJ: Prentice Hall.

Robison, W.L. (2000). Privacy and appropriation of identity. In G. Collste (Ed.), Ethics in the age of information technology (pp. 70-86). Link ping: Centre for Applied Ethics.

Rogerson, S. (1998). Ethical aspects of information technology ”Issues for senior executives . London: Institute of Business Ethics.

Rotenberg, M. (1998). Communications privacy: Implications for network design. In R.N. Stichler & R. Hauptman (Eds.), Ethics, information and technology: Readings (pp. 152-168). Jefferson, NC: MacFarland & Company.

Rule, J.B. et al. (1995). Preserving individual autonomy in an information-oriented society. In D.G. Johnson & H. Nissenbaum (Eds.), Computers, ethics & social values (pp. 314-332). Upper Saddle River, NJ: Prentice Hall.

Schulman, M. (2000). Littlebrother is watching you. In R.M. Baird, R. Ramsower & S.E. Rosenbaum (Eds.), Cyberethics: Social and moral issues in the computer age (pp. 155-161). New York: Prometheus Books.

Severson, R.J. (1997). The principles of information ethics . Armonk, NY; London: M. E. Sharpe.

Sewell, G., & Barker, J.R. (2001). Neither good, nor bad, but dangerous: Surveillance as an ethical paradox. Ethics and Information Technology, 3 , 183-196.

Siau, K., et al. (2002). Acceptable Internet use policy. Communications of the ACM, 45 (1), 75-79.

Solomon, R.C., & Flores, F. (2001). Building trust in business, politics, relationships, and life . Oxford: Oxford University Press.

Spinello, R. (1997). Case studies in information and computer ethics . Upper Saddle River, NJ: Prentice Hall.

Spinello, R. (2000). Cyberethics: Morality and law in cyberspace . London: Jones and Bartlett.

Stalder, F. (2002). Privacy is not the antidote to surveillance. Surveillance & Society, 1 (1), 120-124.

Stanton, J.M., & Stam, K.R. (2003). Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives. Surveillance & Society, 1 (2), 152-190.

Tavani, H.T. (2000). Privacy and security. In D. Langford (Ed.), Internet ethics (pp. 65-69). London: McMillan.

Tavani, H.T., & Moor, J.T. (2001). Privacy protection, control of information, and privacy-enhancing technologies. In R.A. Spinello & H.T. Tavani (Eds.), Readings in cyberethics (pp. 378-391). Sudbury, MA: Jones and Bartlett.

Taylor, N. (2002). State surveillance and the right to privacy. Surveillance & Society, 1 (1), 66-85.

Thompson, P.B. (2003). Fantasy island: A labour process critique of the age of surveillance. Surveillance & Society, 1 (2), 138-151.

Tolo, P., & Steinke, G. (2002). Issues in the adoption of biometrics. Communications of the IIMA, 2 (1), 1-7.

Urbaczewski, A., & Jessup, L.M. (2002). Does electronic monitoring of employee Internet usage work? Communications of the ACM, 45 (1), 80-83.

van den Hoeven, J. (1997). Computer ethics and moral methodology. Metaphilosophy, 28 (3), 234-248.

van den Hoeven, J. (2001). Privacy and the varieties of informational wrongdoing. In R.A. Spinello & H.T. Tavani (Eds.), Readings in cyberethics (pp. 430-442). Sudbury, MA: Jones and Bartlett.

Velasquez, M. (1998). Business ethics: Concepts and cases (4th ed.). Upper Saddle River, NJ: Prentice Hall.

Warren, S.D., & Brandeis, L.D. (1890). The right to privacy. Harvard Law Review 4 (5), 193-220.

Weber, M. (1996). Die protestantische Ethik und der Geist de Kapitalismus , edited and introduced by Klaus Lichtblau and Johannes Wei (2nd ed.). Weinheim: Beltz Athen um Verlag.

Weckert, J., & Adeney, D. (1997). Computer and information ethics . Westport, CT; London: Greenwood Press.

Weisband, S.P., & Reinig, B.A. (1995). Managing user perceptions of email privacy. Communications of the ACM, 38 (12), 40-47.

Yoon, S. H. (1996). Power online: A post-structuralist perspective on computer-mediated communication. In C. Ess (Ed.), Philosophical perspectives on computer-mediated communication (pp. 171-196). Albany, NY: State University of New York Press.




Electronic Monitoring in the Workplace. Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions
ISBN: 1591404568
EAN: 2147483647
Year: 2005
Pages: 161

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net