Skip to main content
Log in

Asking for Facebook Logins: An Egoist Case for Privacy

Journal of Business Ethics Aims and scope Submit manuscript

Abstract

With the advent of social networking websites, privacy concerns have reached a new high. One particularly problematic concern entails employers requesting login credentials to popular social media platforms. While many people may consider this request unethical, they may not agree on the reasons it is unethical. One reason may be to blame the behavior on egoism. Egoism, however, comes in multiple flavors, not all of which would agree that violating privacy is acceptable. In this paper, we articulate how one egoist perspective provides a defense of privacy in the face of unjust information access requests. Objectivism, the philosophy of Ayn Rand, offers an egoist approach to ethics that values individual privacy on rational, self-interested grounds. By applying Objectivist principles to a business context, we observe that businesspeople should not violate other people’s privacy for short-term gains. Furthermore, we observe that privacy can be protected without distinct right to privacy. Rather, Objectivism’s conception of rational self-interest suggests that long-term flourishing is the proper end of individuals and businesses, predicated on, among other things, respecting privacy and enforcing individual rights.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  • Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In G. Danezis & P. Golle (Eds.), Privacy enhancing technologies (pp. 36–58). Cambridge, UK: Springer.

    Chapter  Google Scholar 

  • Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory, and crowding. Monterey, CA: Brooks/Cole Publishing.

    Google Scholar 

  • Aristotle, (2004). The Nicomachean ethics (J. A. K. Thomson, Trans.). London: Penguin Books.

    Google Scholar 

  • Baumer, D. L., Earp, J. B., & Poindexter, J. C. (2004). Internet privacy law: a comparison between the United States and the European Union. Computers & Security, 23(5), 400–412.

    Article  Google Scholar 

  • Becker, T. E. (1998). Integrity in organizations: Beyond honesty and conscientiousness. Academy of Management Review, 23(1), 154–161.

    Google Scholar 

  • Belanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1041.

    Google Scholar 

  • Binswanger, H. (1990). The biological basis of teleological concepts. Marina del Rey, CA: Ayn Rand Institute Press.

    Google Scholar 

  • Blomgren-Hansen, N. (2012). Optimum organization of the labor market in a small open economy. Labour Economics, 19(2), 222–231.

    Article  Google Scholar 

  • Bolton, R. L. (2015). The right to be forgotten: Forced amnesia in a technological age. John Marshall Journal of Computer & Information Law.

  • Carson, J. (2005). A philosophical analysis of objectivist education. (Doctor of Philosophy Dissertation, University of Texas at Austin, 2005, Austin, TX).

  • Clark, L. A., Clark, W. J., & Jones, D. L. (2011). Innovation policy vacuum: Navigating unmarked paths. Technology in Society, 33(3–4), 253–264.

    Article  Google Scholar 

  • Clark, L. A., & Roberts, S. J. (2010). Employer’s use of social networking sites: A socially irresponsible practice. Journal of Business Ethics, 95(4), 507–525.

    Article  Google Scholar 

  • Coll, S. (2014). Power, knowledge, and the subjects of privacy: Understanding privacy as the ally of surveillance. Information, Communication & Society, 17(10), 1250–1263.

    Article  Google Scholar 

  • Davison, H. K., Maraist, C., & Bing, M. N. (2011). Friend or foe? The promise and pitfalls of using social networking sites for HR decisions. Journal of Business and Psychology, 26(2), 153–159.

    Article  Google Scholar 

  • Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295–316.

    Article  Google Scholar 

  • Donaldson, T. (1989). The ethics of international business. New York, NY: Oxford University Press.

    Google Scholar 

  • Drake, J. R. (2007). Objective ethics for managing information technology. In M. Quigley (Ed.), Encyclopedia of information ethics and security. Calgary: Idea Group.

    Google Scholar 

  • Drake, J. R., Hall, D., Cegielski, C., & Byrd, T. A. (2015). An exploratory look at early online auction decisions: Extending signal theory. Journal of Theoretical and Applied Electronic Commerce Research, 10(1), 35–48.

    Article  Google Scholar 

  • Dunfee, T. W. (1991). Business ethics and extant social contracts. Business Ethics Quarterly, 1(1), 23–51.

    Article  Google Scholar 

  • Economist, T. (2009, July 10, 2012). Atlas felt a sense of déjà vu: The economic bust has caused a boom for at least one author. The economist.

  • Elsbach, K. D., Stigliani, I., & Stroud, A. (2012). The building of employee distrust: A case study of Hewlett-Packard from 1995 to 2010. Organizational Dynamics, 41(3), 254–263.

    Article  Google Scholar 

  • Enk, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., & Sheth, A. N. (2014). TaintDroid: An information flow tracking system for real-time privacy monitoring on smartphones. Communications of ACM, 57(3), 99–106.

    Article  Google Scholar 

  • Facebook. (2012, June 8, 2012). Statement of rights and responsibilities. Retrieved July 20, 2012 from https://www.facebook.com/legal/terms.

  • Ghate, D., & Ralston, R. E. (Eds.). (2011). Why businessmen need philosophy. New York, NY: New American Library.

    Google Scholar 

  • Gotthelf, A., & Lennox, J. G. (Eds.). (2010). Metaethics, egoism, and virtue: Studies in Ayn Rand’s normative theory. Pittsburgh, PN: University of Pittsburgh Press.

    Google Scholar 

  • Gwartney, J., Lawson, R., & Hall, J. (2012). Economic freedom of the world: 2012 annual report. Canada: Fraser Institute.

    Google Scholar 

  • Haefner, R. (2009). More employers screening candidates via social networking sites. Retrieved July 20, 2012 from http://www.careerbuilder.com/Article/CB-1337-Getting-Hired-More-Employers-Screening-Candidates-via-Social-Networking-Sites/.

  • Hasnas, J. (1998). The normative theories of business ethics: A guide for the perplexed. Business Ethics Quarterly, 8(1), 19–42.

    Article  Google Scholar 

  • Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building consumer trust online. Communication of the ACM, 42(4), 80–85.

    Article  Google Scholar 

  • Hsieh, D. M. (2004). False excuses: Honesty, wrongdoing, and moral growth. The Journal of Value Inquiry, 38, 171–185.

    Article  Google Scholar 

  • Hume, D. (1740). A treatise of human nature. Retrieved September 4, 2006 from http://en.wikisource.org/wiki/Treatise_of_Human_Nature.

  • Iivari, J., & Magda, H. (2007). The relationship between organizational culture and the deployment of systems development methodologies. MIS Quarterly, 31(1), 35–58.

    Google Scholar 

  • Joinson, A. N., Reips, U.-D., Buchanan, T., & Schofield, C. B. P. (2010). Privacy, trust, and self-disclosure online. Human Computer Interaction, 25(1), 1–24.

    Article  Google Scholar 

  • Kant, I. (1900). Foundations of the metaphysics of morals (T. K. Abbott, Trans.). 2nd ed. New York, NY: Longmans, Green, and Co.

    Google Scholar 

  • King, K. S. (2011). Corporate governance. Retrieved April 26, 2012 from http://www.bbt.com/bbtdotcom/about/investor-relations/corporate-governance/default.page.

  • Kristof-Brown, A. L., Zimmerman, R. D., & Johnson, E. C. (2005). Consequences of individuals’ fit at work: A meta-analysis of person-job, person-organization, person-group, and person-supervisor fit. Personnel Psychology, 58(2), 281–342.

    Article  Google Scholar 

  • Macinnes, I. (2005). Causes of disputes in online auctions. Electronic Markets, 15(2), 146–157.

    Article  Google Scholar 

  • Martin, K. (2012). Information technology and privacy: Conceptual muddles or privacy vacuums? Ethics and Information Technology, 14(4), 267–284.

    Article  Google Scholar 

  • Mill, J. S. (1863). Utilitarianism. Retrieved September 4, 2006 from http://en.wikisource.org/wiki/Utilitarianism.

  • Mizutami, M., Dorsey, J., & Moor, J. H. (2004). The internet and Japanese conception of privacy. Ethics and Information Technology, 6(2), 121–128.

    Article  Google Scholar 

  • Moore, A. (2010). Privacy rights: Moral and legal foundations. University Park, PA: The Pennsylvania State University Press.

    Google Scholar 

  • O’Dell, J. (2012). Recruitment trend we hate: Asking for Facebook passwords during the interview. Retrieved May 16, 2012 from http://venturebeat.com/2012/03/21/facebook-login-job-interview/.

  • Parnell, J. A., & Dent, E. B. (2009). Philosophy, ethics, and capitalism: An interview with BB&T chairman John Allison. Academy of Management Learning and Education, 8(4), 587–596.

    Article  Google Scholar 

  • Pavlou, P. A., & Dimoka, A. (2006). The nature and role of feedback text comments in online marketplaces: Implications for trust building, price premiums, and seller differentiation. Information Systems Research, 17(4), 392–414.

    Article  Google Scholar 

  • Peikoff, L. (1991). Objectivism: The philosophy of Ayn Rand. New York, NY: Penguin Books.

    Google Scholar 

  • Peikoff, L. (1999). Healthcare is not a right. In R. E. Ralston (Ed.), Why businessmen need philosophy. Monterey, CA: Ayn Rand Institute Press.

    Google Scholar 

  • Peikoff, A. (2004). No Corn on this Cobb: Why reduct should be all ears for pavesich. Brandeis Law Journal, 42, 751–792.

    Google Scholar 

  • Peikoff, A. (2006). The right to privacy: Contemporary reductionists and their critics. Virginia Journal of Social Policy and the Law, 13(3), 474–551.

    Google Scholar 

  • Peikoff, A. (2008). Beyond reductionism: Reconsidering the right to privacy. NYU Journal of of Law & Liberty, 3(1), 1–47.

    Google Scholar 

  • Pineda, A., & Jimenez-Varea, J. (2014). Popular culture, ideology, and the comics industry: Steve Ditko’s objectivist spider-man. The Journal of Popular Culture, 46(6), 1156–1176.

    Article  Google Scholar 

  • Pinjani, P., & Palvia, P. (2013). Trust and knowledge sharing in diverse global virtual teams. Information & Management, 50(4), 144–153.

    Article  Google Scholar 

  • Prosser, R. A. (1978). The right to privacy. Georgia Law Review, 12(3), 393–422.

    Google Scholar 

  • Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323–333.

    Google Scholar 

  • Rand, A. (1957). Atlas shrugged. New York, NY: Random House.

    Google Scholar 

  • Rand, A. (1962). Introducing objectivism. The Objectivist Newsletter, 1(1), 35.

    Google Scholar 

  • Rand, A. (1963). For the new intellectual. New York, NY: Signet.

    Google Scholar 

  • Rand, A. (1964). The virtue of selfishness: A new concept of egoism. New York, NY: Signet.

    Google Scholar 

  • Rand, A. (1975). The romantic manifesto (2nd ed.). New York, NY: New American Library.

    Google Scholar 

  • Rand, A. (1986). Capitalism: The unknown ideal. New York, NY: Signet.

    Google Scholar 

  • Rand, A. (1989). The voice of reason: Essays in objectivist thought. New York, NY: Plume.

    Google Scholar 

  • Rand, A. (1990). Introduction to objectivist epistemology (2nd ed.). New York, NY: Meridian.

    Google Scholar 

  • Rand, A. (2011). America’s persecuted minority: Big business. In D. Ghate & R. E. Ralston (Eds.), Why businessmen need philosophy. New York, NY: New American Library.

    Google Scholar 

  • Rasmussen, D. B. (2006). Regarding choice and the foundation of morality: Reflections on Rand’s ethics. The Journal of Ayn Rand Studies, 7(2), 309–328.

    Google Scholar 

  • Rawls, J. (1999). A theory of justice (Revised ed.). Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Reer, F., & Kramer, N. C. (2014). Underlying factors of social capital acquisition in the context of online-gaming: Comparing world of warcraft and counter-strike. Computers in Human Behavior, 36(1), 179–189.

    Article  Google Scholar 

  • Sarathy, R., & Robertson, C. J. (2003). Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics, 46(2), 111–126.

    Article  Google Scholar 

  • Sarker, S., Ajuja, M., Sarker, S., & Kirkeby, S. (2011). The role of communication and trust in global virtual teams: A social network perspective. Journal of Management Information Systems, 28(1), 273–309.

    Article  Google Scholar 

  • Schoorman, F. D., Mayer, R. C., & Davis, J. H. (2007). An integrative model of organizational trust: Past, present, and future. Academy of Management Review, 32(2), 344–354.

    Article  Google Scholar 

  • Sciabarra, C. M. (1995). Ayn Rand: The Russian radical. University Park, PA: The Pennsylvania State University Press.

    Google Scholar 

  • Smith, T. (2000). Viable values: A study of life as the root and reward of morality. Lanham, MD: Rowman & Littlefield Publishers Inc.

    Google Scholar 

  • Smith, T. (2004). Morality without the Wink: A defense of moral perfection. Journal of Philosophic Research, 29, 315–331.

    Google Scholar 

  • Smith, T. (2006). Ayn Rand’s normative ethics: The virtuous egoist. New York, NY: Cambridge University Press.

    Book  Google Scholar 

  • Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015.

    Google Scholar 

  • Straub, D., & Collins, R. W. (1990). Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy. MIS Quarterly, 14(2), 143–156.

    Article  Google Scholar 

  • Stutzman, F., Capra, R., & Thompson, J. (2011). Factors mediating disclosure in social network sites. Computers in Human Behavior, 27(1), 590–598.

    Article  Google Scholar 

  • Stutzman, F., Gross, R., & Acquisti, A. (2013). Silent listeners: The evolution of privacy and disclosure on facebook. Journal of Privacy and Confidentiality, 4(2), 7–41.

    Google Scholar 

  • Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1–22.

    Article  Google Scholar 

  • Tavani, H. T., & Moor, J. H. (2001). Privacy protection, Control of Information, and Privacy-Enhancing Technologies. Computers and Society, 31(1), 6–11.

    Article  Google Scholar 

  • Thomson, J. J. (1975). The right to privacy. Philosophy & Public Affairs, 4(4), 295–314.

    Google Scholar 

  • Torres, L., & Kamhi, M. M. (2000). What art is: The Esthetic theory of Ayn Rand. Peru, IL: Open Court.

    Google Scholar 

  • Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268.

    Article  Google Scholar 

  • Uyl, D. J. D., & Rasmussen, D. B. (Eds.). (1986). The philosophic thought of Ayn Rand. Urbana, IL: University of Illinois Press.

    Google Scholar 

  • Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5(4), 199–210.

    Article  Google Scholar 

  • Walden, E. A. (2005). Intellectual property rights and cannibalization in information technology outsourcing contracts. MIS Quarterly, 29(4), 699–720.

    Google Scholar 

  • Wang, J.-M., & Kleiner, B. H. (2000). Effective employment screening practices. Management Research News, 32(5), 73–81.

    Article  Google Scholar 

  • Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193–220.

    Article  Google Scholar 

  • Waters, S., & Ackerman, J. (2011). Exploring privacy management on Facebook: Motivations and perceived consequences of voluntary disclosure. Journal of Computer-Mediated Communication, 17(1), 101–115.

    Article  Google Scholar 

  • Weisband, S. P., & Reinig, B. A. (1995). Managing user perceptions of email privacy. Communication of ACM, 38(12), 40–47.

    Article  Google Scholar 

  • Wheeless, L. R., & Grotz, J. (1977). The measurement of trust and its relationship to self-disclosure. Human Communication Research, 3(3), 250–257.

    Article  Google Scholar 

  • Woiceshyn, J. (2009). Lessons from “Good Minds”: How CEOs use intuition, analysis, and guiding principles to make strategic decisions. Long Range Planning, 42(3), 298–319.

    Article  Google Scholar 

  • Woiceshyn, J. (2011). A model for ethical decision making in business: Reasoning, intuition, and rational moral principles. Journal of Business Ethics, 104(3), 311–323.

    Article  Google Scholar 

  • Woiceshyn, J. (2012). How to be profitable and moral. Lanham, Maryland: Hamilton Books.

    Google Scholar 

  • Workman, M. (2012). Gaining access with social engineering: An empirical study of the threat. Information Systems Security, 16(6), 315–331.

    Article  Google Scholar 

  • Xu, C., Ryan, S., Prybutok, V., & Wen, C. (2012). It is not for fun: An examination of social network site usage. Information & Management, 49(5), 210–217.

    Article  Google Scholar 

  • Younkins, E. (2012). Ayn Rand’s objectivist virtues as the foundation for morality and success in business. The Journal of Ayn Rand Studies, 12(2), 237–262.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John R. Drake.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Drake, J.R. Asking for Facebook Logins: An Egoist Case for Privacy. J Bus Ethics 139, 429–441 (2016). https://doi.org/10.1007/s10551-015-2586-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-015-2586-4

Keywords

Navigation