Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy enhancing technology (pp. 36–58).
Alder, G. S., Schminke, M., & Noel, T. W. (2007). The impact of individual ethics on reactions to potentially invasive HR practices. Journal of Business Ethics,
Allen, A. L. (1999). Coercing privacy. William and Mary Law Review,
Angst, C. M., & Agarwal, R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion, MIS Quarterly, 33(2), 339–370.
Appelbaum, L. D., Lennon, M. C., & Aber, J. L. (2006). When effort is threatening: the influence of the belief in a just world on Americans’ attitudes toward antipoverty policy. Political Psychology,
Ashworth, L., & Free, C. (2006). Marketing dataveillance and digital privacy: Using theories of justice to understand consumers’ online privacy concerns. Journal of Business Ethics,
Awad, N. F., & Krishman, M. S. (2006). The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly,
Bailey, W., & Spicer, A. (2007). When does National Identity Matter? Convergence and divergence in international business ethics. Academy of Management Journal, 50(6).
Beales, H. J., & Muris, T. J. (2008). Choice or consequences: Protecting privacy in commercial information. The University of Chicago Law Review,
Bennett, C. (1992). Regulating privacy. Ithaca: Cornell University Press.
Borna, S., & Avila, S. (1999). Genetic information: Consumers’ right to privacy versus insurance companies’ right to know a public opinion survey. Journal of Business Ethics,
Brenkert, G. (1981). Privacy, polygraphs, and work. Business and Professional Ethics Journal,
Charters, D. (2002). Electronic monitoring and privacy issues in business-marketing: The ethics of the doubleclick experience. Journal of Business Ethics,
Coase, R. H. (1937). The nature of the firm. Economica,
Culnan, M. J. (1993). How did they get my name? An exploratory investigation of computer attitudes toward secondary information use. MIS Quarterly,
Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science,
Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues,
Culnan, M. J., & Williams, C. C. (2009). How ethics can enhance organizational privacy: Lessons from the choicepoint and tjx data breaches. MIS Quarterly,
Donaldson, T., & Dunfee, T. W. (1994). Toward a unified conception of business ethics: Integrative social contracts theory. Academy of Management Review,
Donaldson, T., & Dunfee, T. W. (2002). Ties that bind in business ethics: Social contracts and why they matter. Journal of Banking and Finance,
Donaldson, T., & Dunfee, T. W. (1999). Ties that bind: A social contract approach to business ethics. Cambridge, MA: Harvard Business School Press.
Dunfee, T. W. (2006). A critical perspective of integrative social contracts theory: Recurring criticisms and next generation research topics. Journal of Business Ethics,
Elgesem, D. (1999). The structure of rights in Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. Ethics and Information Technology,
Floridi, L. (2006). Four challenges for a theory of informational privacy. Ethics and Information Technology,
Fried, C. (1984). Privacy. In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology. Cambridge: Cambridge University Press.
Ganong, L. H., & Coleman, M. (2006). Multiple segment factorial vignette designs. Journal of Marriage and Family,
Glac, K., & Kim, T. W. (2009). The “I” in ISCT: Normative and empirical facets of integration. Journal of Business Ethics,
Heugens, P. P. M. A. R., van Oosterhout, J., & Kaptein, S. P. (2006). Foundations and applications for contractualist business ethics. Journal of Business Ethics,
Husted, B. W. (1999). A critique of the empirical methods of integrative social contracts theory. Journal of Business Ethics,
Jasso, G. (1990). Factorial survey methods for studying beliefs and judgments. Sociology Methods and Research,
Jasso, G. (2006). Factorial survey methods for studying beliefs and judgments. Sociological Methods and Research,
Jasso, G., & Opp, K. (1997). Probing the character of norms: A factorial survey analysis of the norms of political action. American Sociological Review,
Jiang, X., Hong, J. L., & Landay, J. A. (2002). Approximate information flows: Socially based modeling of privacy in Ubiquitous Computing, Ubicomp 2002: ubiquitous computing (pp. 176–193).
Johnson, D. (2001). Computer ethics (3rd ed.). Upper Saddle River, NJ: Prentice Hall.
Johnson, D. (2004). Computer ethics. In L. Floridi (Ed.), The Blackwell guide to the philosophy of computing and information (pp. 64–75). Malden, MA: Blackwell.
Katz, N., & Koenig, G. (2001). Sports teams as a model for workplace teams: Lessons and liabilities. Academy of Management Executive,
Kennedy, P. (2003). A guide to econometrics (5th ed.). Cambridge, MA: MIT Press.
Kuo, F., Lin, C., & Hsu, M. (2007). Assessing gender differences in computer professionals’ self-regulatory efficacy concerning information privacy practices. Journal of Business Ethics,
Levitt, S. D., & List, J. A. (2007). What do laboratory experiments measuring social preferences reveal about the real world? The Journal of Economic Perspectives,
Lynch, J. (1982). The concept of external validity. Journal of Consumer Research,
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research,
Martin, K. (2010). Privacy revisited: From Lady Godiva’s Peeping Tom to Facebook’s Beacon Program. In D. E. Palmer (Ed.), Ethical issues in e-business: Models and frameworks. IGI Global: Hershey.
Martin, K., & Freeman, R. E. (2003). Some problems with employee monitoring. Journal of Business Ethics,
Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science,
Miller, S., & Weckert, J. (2000). Privacy, the workplace and the Internet. Journal of Business Ethics,
Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society,
Mossholder, K. W., Giles, W. F., & Wesolowski, M. A. (1991). Information privacy and performance appraisal: An examination of employee perceptions and reactions. Journal of Business Ethics,
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review,
Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Standford, CA: Stanford University Press.
Nock, S., & Gutterbock, T. M. (2010). Survey experiments. In J. Wright & P. Marsden (Eds.), Handbook of survey research (2nd ed.). Amsterdam: Elsevier.
O’Connell, A. A. (2006). Logistic regression models for ordinal response variables. Thousand Oaks, CA: SAGE.
Oz, E. (2001). Organizational commitment and ethical behavior: An empirical study of information system professionals. Journal of Business Ethics,
Pavlau, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly,
Persson, A. J., & Hansson, S. O. (2003). Privacy at work—ethical criteria. Journal of Business Ethics,
Peslak, A. R. (2005). An ethical exploration of privacy and radio frequency identification. Journal of Business Ethics,
Phillips, R. A., & Johnson-Cramer, M. E. (2006). Ties that unwind: Dynamism in integrative social contracts theory. Journal of Business Ethics,
Pollach, I. (2005). A typology of communicative strategies in online privacy policies: Ethics, power and informed consent. Journal of Business Ethics,
Rachels, J. (1975). Why is privacy important? Philosophy & Public Affairs,
Robertson, D. C., & Ross, W. T. (1995). Decision-making processes on ethical issues: the impact of a social contract perspective. Business Ethics Quarterly,
Rosen, J. (2010). The Web means the end of forgetting. The New York Times
, July 21, 2010. http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all
Rossi, P., & Nock, S. (Eds.). (1982). Measuring social judgments: The factorial survey approach. Beverly Hills: SAGE.
Schoeman, F. (Ed.). (1984). Privacy: Philosophical dimensions of the literature. In Philosophical dimensions of privacy: An anthology. Cambridge: Cambridge University Press.
Shaw, T. R. (2003). The moral intensity of privacy: An empirical study of Webmaster’ attitudes. Journal of Business Ethics,
Singleton, S. (1998). Privacy as censorship. Cato Institute: Policy Analysis,
Smith, H. J. (2004). Information privacy and its management. MIS Quarterly Executive,
Smith, J. H., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review, MIS Quarterly,
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly,
Smith, N. C., Simpson, S. S., & Huang, C. (2007). Why managers fail to do the right thing: An empirical study of unethical and illegal conduct. Business Ethics Quarterly,
Smith, W. P., & Tabak, F. (2009). Monitoring employee e-mails: Is there any room for privacy? Academy of Management Perspectives,
Solove, D. J. (2006). A taxonomy of privacy. University of Pennsylvania Law Review,
Son, J. Y., & Kim, S. S. (2008). Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly,
Soule, E. (2002). Managerial moral strategies—in search of a few good principles. Academy of Management Journal,
Spicer, A., Dunfee, T. W., & Bailey, W. J. (2004). Does national context matter in ethical decision making? An empirical test of integrated social contracts theory. Academy of Management Review,
Straub, D. W., & Collins, R. W. (1990). Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy. MIS Quarterly,
Strong, K. C., & Ringer, R. C. (2000). An examination of integrative social contracts theory: Social hypernorms and authentic community norms in corporate drug testing programs. Employee Responsibilities and Rights Journal,
Tavani, H. T. (2008). Floridi’s ontological theory of informational privacy: Some implications and challenges. Ethics and Information Technology,
Taylor, B. J. (2006). Factorial surveys: Using vignettes to study professional judgment. British Journal of Social Work,
Thompson, J. A., & Hart, D. W. (2006). Psychological contracts: A nano-level perspective on social contract theory. Journal of Business Ethics,
Thurman, Q. C., Lam, J. A., & Rossi, P. H. (1988). Sorting out the cuckoo’s nest: A factorial survey approach to the study of popular conceptions of mental illness. The Sociological Quarterly,
Van de Hoven, J. (2008). Information technology, privacy, and the protection of personal data. In J. Weckert & J. Van de Hoven (Eds.), Information technology and moral philosophy (pp. 301–321). Cambridge: Cambridge University Press.
van Oosterhout, J., Heugens, P., & Kaptein, M. (2006). The internal morality of contracting: Advancing the contractualist endeavor in business ethics. Academy of Management Review,
Wallander, L. (2009). 25 years of factorial surveys in sociology: A review. Social Science Research,
Walzer, M. (2006). Thick and thin: Moral argument at home and abroad. South Bend, IN: University of Notre Dame Press.
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review,
Weber, J. (1992). Scenarios in business ethics research: Review, critical assessment, and recommendations. Business Ethics Quarterly,
Wempe, B. (2005). In defense of a self-disciplined, domain-specific social contract theory of business ethics. Business Ethics Quarterly,
Westin, A. (1967). Privacy and freedom. New York: Atheneum.
Winter, S. J., Stylianou, A. C., & Giacalone, R. A. (2004). Individual differences in the acceptability of unethical information technology practices: The case of Machiavellianism and ethical ideology. Journal of Business Ethics,