Journal of Business Ethics

, Volume 139, Issue 3, pp 429–441 | Cite as

Asking for Facebook Logins: An Egoist Case for Privacy

Article

Abstract

With the advent of social networking websites, privacy concerns have reached a new high. One particularly problematic concern entails employers requesting login credentials to popular social media platforms. While many people may consider this request unethical, they may not agree on the reasons it is unethical. One reason may be to blame the behavior on egoism. Egoism, however, comes in multiple flavors, not all of which would agree that violating privacy is acceptable. In this paper, we articulate how one egoist perspective provides a defense of privacy in the face of unjust information access requests. Objectivism, the philosophy of Ayn Rand, offers an egoist approach to ethics that values individual privacy on rational, self-interested grounds. By applying Objectivist principles to a business context, we observe that businesspeople should not violate other people’s privacy for short-term gains. Furthermore, we observe that privacy can be protected without distinct right to privacy. Rather, Objectivism’s conception of rational self-interest suggests that long-term flourishing is the proper end of individuals and businesses, predicated on, among other things, respecting privacy and enforcing individual rights.

Keywords

Objectivism Privacy Social networks Ethics Rights 

References

  1. Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In G. Danezis & P. Golle (Eds.), Privacy enhancing technologies (pp. 36–58). Cambridge, UK: Springer.CrossRefGoogle Scholar
  2. Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory, and crowding. Monterey, CA: Brooks/Cole Publishing.Google Scholar
  3. Aristotle, (2004). The Nicomachean ethics (J. A. K. Thomson, Trans.). London: Penguin Books.Google Scholar
  4. Baumer, D. L., Earp, J. B., & Poindexter, J. C. (2004). Internet privacy law: a comparison between the United States and the European Union. Computers & Security, 23(5), 400–412.CrossRefGoogle Scholar
  5. Becker, T. E. (1998). Integrity in organizations: Beyond honesty and conscientiousness. Academy of Management Review, 23(1), 154–161.Google Scholar
  6. Belanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017–1041.Google Scholar
  7. Binswanger, H. (1990). The biological basis of teleological concepts. Marina del Rey, CA: Ayn Rand Institute Press.Google Scholar
  8. Blomgren-Hansen, N. (2012). Optimum organization of the labor market in a small open economy. Labour Economics, 19(2), 222–231.CrossRefGoogle Scholar
  9. Bolton, R. L. (2015). The right to be forgotten: Forced amnesia in a technological age. John Marshall Journal of Computer & Information Law.Google Scholar
  10. Carson, J. (2005). A philosophical analysis of objectivist education. (Doctor of Philosophy Dissertation, University of Texas at Austin, 2005, Austin, TX).Google Scholar
  11. Clark, L. A., Clark, W. J., & Jones, D. L. (2011). Innovation policy vacuum: Navigating unmarked paths. Technology in Society, 33(3–4), 253–264.CrossRefGoogle Scholar
  12. Clark, L. A., & Roberts, S. J. (2010). Employer’s use of social networking sites: A socially irresponsible practice. Journal of Business Ethics, 95(4), 507–525.CrossRefGoogle Scholar
  13. Coll, S. (2014). Power, knowledge, and the subjects of privacy: Understanding privacy as the ally of surveillance. Information, Communication & Society, 17(10), 1250–1263.CrossRefGoogle Scholar
  14. Davison, H. K., Maraist, C., & Bing, M. N. (2011). Friend or foe? The promise and pitfalls of using social networking sites for HR decisions. Journal of Business and Psychology, 26(2), 153–159.CrossRefGoogle Scholar
  15. Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295–316.CrossRefGoogle Scholar
  16. Donaldson, T. (1989). The ethics of international business. New York, NY: Oxford University Press.Google Scholar
  17. Drake, J. R. (2007). Objective ethics for managing information technology. In M. Quigley (Ed.), Encyclopedia of information ethics and security. Calgary: Idea Group.Google Scholar
  18. Drake, J. R., Hall, D., Cegielski, C., & Byrd, T. A. (2015). An exploratory look at early online auction decisions: Extending signal theory. Journal of Theoretical and Applied Electronic Commerce Research, 10(1), 35–48.CrossRefGoogle Scholar
  19. Dunfee, T. W. (1991). Business ethics and extant social contracts. Business Ethics Quarterly, 1(1), 23–51.CrossRefGoogle Scholar
  20. Economist, T. (2009, July 10, 2012). Atlas felt a sense of déjà vu: The economic bust has caused a boom for at least one author. The economist.Google Scholar
  21. Elsbach, K. D., Stigliani, I., & Stroud, A. (2012). The building of employee distrust: A case study of Hewlett-Packard from 1995 to 2010. Organizational Dynamics, 41(3), 254–263.CrossRefGoogle Scholar
  22. Enk, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., & Sheth, A. N. (2014). TaintDroid: An information flow tracking system for real-time privacy monitoring on smartphones. Communications of ACM, 57(3), 99–106.CrossRefGoogle Scholar
  23. Facebook. (2012, June 8, 2012). Statement of rights and responsibilities. Retrieved July 20, 2012 from https://www.facebook.com/legal/terms.
  24. Ghate, D., & Ralston, R. E. (Eds.). (2011). Why businessmen need philosophy. New York, NY: New American Library.Google Scholar
  25. Gotthelf, A., & Lennox, J. G. (Eds.). (2010). Metaethics, egoism, and virtue: Studies in Ayn Rand’s normative theory. Pittsburgh, PN: University of Pittsburgh Press.Google Scholar
  26. Gwartney, J., Lawson, R., & Hall, J. (2012). Economic freedom of the world: 2012 annual report. Canada: Fraser Institute.Google Scholar
  27. Haefner, R. (2009). More employers screening candidates via social networking sites. Retrieved July 20, 2012 from http://www.careerbuilder.com/Article/CB-1337-Getting-Hired-More-Employers-Screening-Candidates-via-Social-Networking-Sites/.
  28. Hasnas, J. (1998). The normative theories of business ethics: A guide for the perplexed. Business Ethics Quarterly, 8(1), 19–42.CrossRefGoogle Scholar
  29. Hoffman, D. L., Novak, T. P., & Peralta, M. (1999). Building consumer trust online. Communication of the ACM, 42(4), 80–85.CrossRefGoogle Scholar
  30. Hsieh, D. M. (2004). False excuses: Honesty, wrongdoing, and moral growth. The Journal of Value Inquiry, 38, 171–185.CrossRefGoogle Scholar
  31. Hume, D. (1740). A treatise of human nature. Retrieved September 4, 2006 from http://en.wikisource.org/wiki/Treatise_of_Human_Nature.
  32. Iivari, J., & Magda, H. (2007). The relationship between organizational culture and the deployment of systems development methodologies. MIS Quarterly, 31(1), 35–58.Google Scholar
  33. Joinson, A. N., Reips, U.-D., Buchanan, T., & Schofield, C. B. P. (2010). Privacy, trust, and self-disclosure online. Human Computer Interaction, 25(1), 1–24.CrossRefGoogle Scholar
  34. Kant, I. (1900). Foundations of the metaphysics of morals (T. K. Abbott, Trans.). 2nd ed. New York, NY: Longmans, Green, and Co.Google Scholar
  35. King, K. S. (2011). Corporate governance. Retrieved April 26, 2012 from http://www.bbt.com/bbtdotcom/about/investor-relations/corporate-governance/default.page.
  36. Kristof-Brown, A. L., Zimmerman, R. D., & Johnson, E. C. (2005). Consequences of individuals’ fit at work: A meta-analysis of person-job, person-organization, person-group, and person-supervisor fit. Personnel Psychology, 58(2), 281–342.CrossRefGoogle Scholar
  37. Macinnes, I. (2005). Causes of disputes in online auctions. Electronic Markets, 15(2), 146–157.CrossRefGoogle Scholar
  38. Martin, K. (2012). Information technology and privacy: Conceptual muddles or privacy vacuums? Ethics and Information Technology, 14(4), 267–284.CrossRefGoogle Scholar
  39. Mill, J. S. (1863). Utilitarianism. Retrieved September 4, 2006 from http://en.wikisource.org/wiki/Utilitarianism.
  40. Mizutami, M., Dorsey, J., & Moor, J. H. (2004). The internet and Japanese conception of privacy. Ethics and Information Technology, 6(2), 121–128.CrossRefGoogle Scholar
  41. Moore, A. (2010). Privacy rights: Moral and legal foundations. University Park, PA: The Pennsylvania State University Press.Google Scholar
  42. O’Dell, J. (2012). Recruitment trend we hate: Asking for Facebook passwords during the interview. Retrieved May 16, 2012 from http://venturebeat.com/2012/03/21/facebook-login-job-interview/.
  43. Parnell, J. A., & Dent, E. B. (2009). Philosophy, ethics, and capitalism: An interview with BB&T chairman John Allison. Academy of Management Learning and Education, 8(4), 587–596.CrossRefGoogle Scholar
  44. Pavlou, P. A., & Dimoka, A. (2006). The nature and role of feedback text comments in online marketplaces: Implications for trust building, price premiums, and seller differentiation. Information Systems Research, 17(4), 392–414.CrossRefGoogle Scholar
  45. Peikoff, L. (1991). Objectivism: The philosophy of Ayn Rand. New York, NY: Penguin Books.Google Scholar
  46. Peikoff, L. (1999). Healthcare is not a right. In R. E. Ralston (Ed.), Why businessmen need philosophy. Monterey, CA: Ayn Rand Institute Press.Google Scholar
  47. Peikoff, A. (2004). No Corn on this Cobb: Why reduct should be all ears for pavesich. Brandeis Law Journal, 42, 751–792.Google Scholar
  48. Peikoff, A. (2006). The right to privacy: Contemporary reductionists and their critics. Virginia Journal of Social Policy and the Law, 13(3), 474–551.Google Scholar
  49. Peikoff, A. (2008). Beyond reductionism: Reconsidering the right to privacy. NYU Journal of of Law & Liberty, 3(1), 1–47.Google Scholar
  50. Pineda, A., & Jimenez-Varea, J. (2014). Popular culture, ideology, and the comics industry: Steve Ditko’s objectivist spider-man. The Journal of Popular Culture, 46(6), 1156–1176.CrossRefGoogle Scholar
  51. Pinjani, P., & Palvia, P. (2013). Trust and knowledge sharing in diverse global virtual teams. Information & Management, 50(4), 144–153.CrossRefGoogle Scholar
  52. Prosser, R. A. (1978). The right to privacy. Georgia Law Review, 12(3), 393–422.Google Scholar
  53. Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323–333.Google Scholar
  54. Rand, A. (1957). Atlas shrugged. New York, NY: Random House.Google Scholar
  55. Rand, A. (1962). Introducing objectivism. The Objectivist Newsletter, 1(1), 35.Google Scholar
  56. Rand, A. (1963). For the new intellectual. New York, NY: Signet.Google Scholar
  57. Rand, A. (1964). The virtue of selfishness: A new concept of egoism. New York, NY: Signet.Google Scholar
  58. Rand, A. (1975). The romantic manifesto (2nd ed.). New York, NY: New American Library.Google Scholar
  59. Rand, A. (1986). Capitalism: The unknown ideal. New York, NY: Signet.Google Scholar
  60. Rand, A. (1989). The voice of reason: Essays in objectivist thought. New York, NY: Plume.Google Scholar
  61. Rand, A. (1990). Introduction to objectivist epistemology (2nd ed.). New York, NY: Meridian.Google Scholar
  62. Rand, A. (2011). America’s persecuted minority: Big business. In D. Ghate & R. E. Ralston (Eds.), Why businessmen need philosophy. New York, NY: New American Library.Google Scholar
  63. Rasmussen, D. B. (2006). Regarding choice and the foundation of morality: Reflections on Rand’s ethics. The Journal of Ayn Rand Studies, 7(2), 309–328.Google Scholar
  64. Rawls, J. (1999). A theory of justice (Revised ed.). Cambridge, MA: Harvard University Press.Google Scholar
  65. Reer, F., & Kramer, N. C. (2014). Underlying factors of social capital acquisition in the context of online-gaming: Comparing world of warcraft and counter-strike. Computers in Human Behavior, 36(1), 179–189.CrossRefGoogle Scholar
  66. Sarathy, R., & Robertson, C. J. (2003). Strategic and ethical considerations in managing digital privacy. Journal of Business Ethics, 46(2), 111–126.CrossRefGoogle Scholar
  67. Sarker, S., Ajuja, M., Sarker, S., & Kirkeby, S. (2011). The role of communication and trust in global virtual teams: A social network perspective. Journal of Management Information Systems, 28(1), 273–309.CrossRefGoogle Scholar
  68. Schoorman, F. D., Mayer, R. C., & Davis, J. H. (2007). An integrative model of organizational trust: Past, present, and future. Academy of Management Review, 32(2), 344–354.CrossRefGoogle Scholar
  69. Sciabarra, C. M. (1995). Ayn Rand: The Russian radical. University Park, PA: The Pennsylvania State University Press.Google Scholar
  70. Smith, T. (2000). Viable values: A study of life as the root and reward of morality. Lanham, MD: Rowman & Littlefield Publishers Inc.Google Scholar
  71. Smith, T. (2004). Morality without the Wink: A defense of moral perfection. Journal of Philosophic Research, 29, 315–331.Google Scholar
  72. Smith, T. (2006). Ayn Rand’s normative ethics: The virtuous egoist. New York, NY: Cambridge University Press.CrossRefGoogle Scholar
  73. Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015.Google Scholar
  74. Straub, D., & Collins, R. W. (1990). Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy. MIS Quarterly, 14(2), 143–156.CrossRefGoogle Scholar
  75. Stutzman, F., Capra, R., & Thompson, J. (2011). Factors mediating disclosure in social network sites. Computers in Human Behavior, 27(1), 590–598.CrossRefGoogle Scholar
  76. Stutzman, F., Gross, R., & Acquisti, A. (2013). Silent listeners: The evolution of privacy and disclosure on facebook. Journal of Privacy and Confidentiality, 4(2), 7–41.Google Scholar
  77. Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1), 1–22.CrossRefGoogle Scholar
  78. Tavani, H. T., & Moor, J. H. (2001). Privacy protection, Control of Information, and Privacy-Enhancing Technologies. Computers and Society, 31(1), 6–11.CrossRefGoogle Scholar
  79. Thomson, J. J. (1975). The right to privacy. Philosophy & Public Affairs, 4(4), 295–314.Google Scholar
  80. Torres, L., & Kamhi, M. M. (2000). What art is: The Esthetic theory of Ayn Rand. Peru, IL: Open Court.Google Scholar
  81. Tsai, J. Y., Egelman, S., Cranor, L., & Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254–268.CrossRefGoogle Scholar
  82. Uyl, D. J. D., & Rasmussen, D. B. (Eds.). (1986). The philosophic thought of Ayn Rand. Urbana, IL: University of Illinois Press.Google Scholar
  83. Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5(4), 199–210.CrossRefGoogle Scholar
  84. Walden, E. A. (2005). Intellectual property rights and cannibalization in information technology outsourcing contracts. MIS Quarterly, 29(4), 699–720.Google Scholar
  85. Wang, J.-M., & Kleiner, B. H. (2000). Effective employment screening practices. Management Research News, 32(5), 73–81.CrossRefGoogle Scholar
  86. Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193–220.CrossRefGoogle Scholar
  87. Waters, S., & Ackerman, J. (2011). Exploring privacy management on Facebook: Motivations and perceived consequences of voluntary disclosure. Journal of Computer-Mediated Communication, 17(1), 101–115.CrossRefGoogle Scholar
  88. Weisband, S. P., & Reinig, B. A. (1995). Managing user perceptions of email privacy. Communication of ACM, 38(12), 40–47.CrossRefGoogle Scholar
  89. Wheeless, L. R., & Grotz, J. (1977). The measurement of trust and its relationship to self-disclosure. Human Communication Research, 3(3), 250–257.CrossRefGoogle Scholar
  90. Woiceshyn, J. (2009). Lessons from “Good Minds”: How CEOs use intuition, analysis, and guiding principles to make strategic decisions. Long Range Planning, 42(3), 298–319.CrossRefGoogle Scholar
  91. Woiceshyn, J. (2011). A model for ethical decision making in business: Reasoning, intuition, and rational moral principles. Journal of Business Ethics, 104(3), 311–323.CrossRefGoogle Scholar
  92. Woiceshyn, J. (2012). How to be profitable and moral. Lanham, Maryland: Hamilton Books.Google Scholar
  93. Workman, M. (2012). Gaining access with social engineering: An empirical study of the threat. Information Systems Security, 16(6), 315–331.CrossRefGoogle Scholar
  94. Xu, C., Ryan, S., Prybutok, V., & Wen, C. (2012). It is not for fun: An examination of social network site usage. Information & Management, 49(5), 210–217.CrossRefGoogle Scholar
  95. Younkins, E. (2012). Ayn Rand’s objectivist virtues as the foundation for morality and success in business. The Journal of Ayn Rand Studies, 12(2), 237–262.Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2015

Authors and Affiliations

  1. 1.Department of Management Information SystemsEast Carolina UniversityGreenvilleUSA

Personalised recommendations