Skip to main content
Log in

Locating a Space for Ethics to Appear in Decision-making: Privacy as an Exemplar

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

Using concepts from Ulrich Beck’s Risk Society, this paper argues that as expertise proliferates questions of ethics in decision-making fall through gaps between domains of expertise. As a consequence, unethical outcomes are unattached to actions taken with no one accountable or responsible for these outcomes. Using Actor-Network Theory (ANT), a case study is presented showing how the sale of students’ personal information by the Calgary Board of Education (CBE) escaped questions of ethics. The sale of student information was the product of the convergence of narrowly focussed technology and education expert actions and decisions with an earlier two-stage translation of privacy from a potential ethical issue to an issue of expert rule creation and interpretation. The purpose of this paper is to show, through an example, how questions of ethics are displaced in expert decision-making and to enable the public, managers, individuals and experts to recognize displacements and, through this, create a space for ethics to appear.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  • Alberta Education: 1995, ‘Technology Integration in Education Discussion Paper’, Alberta Education, Edmonton.

  • Beck U. (1992). Risk Society: Towards a New Modernity. Sage, Thousand Oaks California

    Google Scholar 

  • Bell Canada: 2004, ‘Security and Privacy’, Online Privacy Statement, http://www.bell.ca/shop/application/commercewf?origin = noorigin.jsp&event = link(goto)&content = /jsp/content/cust_care/privacy_fip.jsp

  • Bonner, W. T. and Chiasson, M.: 2005, ‘If Fair Information Principles are the Answer, what was the Question? An Actor-Network Theory Investigation of the Modern Constitution of Privacy’, Information & Organization 15(4), 267–293

  • Bowar, P.: 2000, ‘Privacy and Security: What are Some of the Key Issues that Managers Should Address?’, Access & Privacy Division: Ombudsman’s Office, Winnipeg, Manitoba.

  • Brenton M. (1964). The Privacy Invaders. Longmans Canada Limited, Toronto

    Google Scholar 

  • Caudill, E. M. and P.E. Murphy: 2000, ‘Consumer Online Privacy Legal and Ethical Issues’, Journal of Public Policy & Marketing 19(1), 7–19.

    Google Scholar 

  • Cavoukian A., Tapscott D. (1995). Who Knows: Safeguarding your Privacy in a Networked World. Random House of Canada, Toronto

    Google Scholar 

  • Charters D. (2002). Electronic Monitoring and Privacy Issues in Business-Marketing: The Ethics of the DoubleClick Experience. Journal of Business Ethics 35(4):243–254

    Article  Google Scholar 

  • Culnan M. J. (1993). ‘How Did They Get My Name?’ An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use. MIS Quarterly 17(3):341–363

    Article  Google Scholar 

  • Culnan M. J. and Armstrong P. K. (1999). Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science 10(1):104–115

    Article  Google Scholar 

  • Culnan M. J. and Bries R. J. (2003). Consumer Privacy: Balancing Economic and Justice Considerations. Journal of Social Issues 59(2):232–342

    Article  Google Scholar 

  • Daboub A. J., Calton J. M. (2002). Stakeholder Learning Dialogues: How to Preserve Ethical Responsibility in Networks. Journal of Business Ethics 41(1–2):85–98

    Article  Google Scholar 

  • Davies S. G. (1997). Re-Engineering the Right to Privacy: How Privacy has been Transformed from a Right to a Commodity. In: Agre P. E. and Rotenburg M. (eds), Technology and Privacy: The New Landscape. The MIT Press, Cambridge Mass, pp. 143–165

    Google Scholar 

  • Equifax Canada: 2004, ‘Consumer Information and Privacy’, Online privacy statement at http://www.equifax.com/EFX_Canada/welcome/privacy_e.html

  • Equifax/Harris: 1994, ‘1994 Equifax/Harris Consumer Privacy Survey’, online at http://www.mindspring.com/∼mdeeb/equifax/cc/parchive/svry94/docs/summary4.html

  • Equifax/Harris: 1996, ‘1996 Equifax/Harris Consumer Privacy Survey’, Online at http://www.mindspring.com/∼mdeeb/equifax/cc/parchive/svry96/docs/summary.html

  • Gioia D. A. (1992). Pinto Fires and Personal Ethics: A script Analysis of Missed Opportunities. Journal of Business Ethics 11(5–6):379–389

    Article  Google Scholar 

  • Federal Trade Commission: 1998, ‘Privacy Online: A Report to Congress Federal Trade Commission, June 1998’, Federal Trade Commission, Washington, On line at http://www.ftc.gov/reports/privacy3/toc.htm

  • Federal Trade Commission: 1999, ‘Self-Regulation and␣Privacy Online,’ Federal Trade Commission, Washington, DC, July 13, 1999, On line at http://www.ftc.gov//os/1999/9907/pt071399.htm

  • Federal Trade Commission: 2000, ‘Privacy Online: Fair Information Practices In the Electronic Marketplace’, Federal Trade Commission, Washington, DC, May 25, 2000, On line at http://www.ftc.gov//os/2000/05/testimonyprivacy.htm

  • Finestone, S.: 1997, ‘Privacy: Where do we Draw the Line?’, Standing Committee on Human Rights and the Status of Persons with Disabilities, Ottawa.

  • Flaherty D. H. (1972). Privacy in Colonial New England. University Press of Virginia, Charlottesville

    Google Scholar 

  • Flaherty D. H. (1989). Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States. The University of North Carolina Press, Chapel Hill

    Google Scholar 

  • Flaherty D. H. (1997). Controlling Surveillance: Can Privacy Protection Be Made Effective. In: Agre P. E. and Rotenburg M. (eds), Technology and Privacy: The New Landscape. The MIT Press, Cambridge Mass, pp. 168–192

    Google Scholar 

  • Herschel R. T., Andrews P. H. (1997). Ethical Implications of Technological Advances on Business Communications. Journal of Business Communications 34(2):160–170

    Article  Google Scholar 

  • Introna L. D. (1997). Privacy and the Computer: Why We Need Privacy in the Information Society. Metaphilosophy 28(3): 259–275

    Article  Google Scholar 

  • Janis I. L. (1982). Groupthink: Psychological Studies of Policy Decisions and Fiascos. Houghton Mifflin, Boston

    Google Scholar 

  • Koehn D. (2003). The Nature of and Conditions for Online Trust. Journal of Business Ethics 43(1–2):3–19

    Article  Google Scholar 

  • Latour B. (1987). Science in Action: How to Follow Scientists and Engineers Through Society. Harvard University Press, Cambridge, Mass

    Google Scholar 

  • Latour B. (1988a). The Pasteurization of France. Harvard University Press, Cambridge, Mass

    Google Scholar 

  • Latour B. (1988b). The Politics of Explanation: An Alternative. In: Woolgar S. (eds), Knowledge and Reflexivity: New Frontiers in the Sociology of Knowledge. Sage Publications, London

    Google Scholar 

  • Latour B. (1991) Technology is Society Made Durable. In: La J. (eds), A Sociology of Monsters: Essays on Power, Technology and Domination. Routledge, London

    Google Scholar 

  • Latour B. (1993). We Have Never Been Modern. Harvard University Press, Cambridge, Mass

    Google Scholar 

  • Latour B. (1999). Pandora’s Hope: Essays on the Reality of Science Studies. Harvard University Press, Cambridge, Mass

    Google Scholar 

  • Laudon K. C. (1996). Markets and Privacy. Communications of the ACM 39(9):92–104

    Article  Google Scholar 

  • Levine D. A. (1971). Georg Simmel: On Individuality and Social forms. The University of Chicago Press, Chicago

    Google Scholar 

  • Laudon K. C. (1995). Ethical Concepts and Information Technology. Communications of the ACM 38(12):33–39

    Article  Google Scholar 

  • Marcuse H. (1968). One-Dimensional Man: Studies in the Ideology of Advanced Industrial Society. Beacon Press, Boston

    Google Scholar 

  • Marshall K. P. (1999). Has Technology Introduced New Ethical Problems. Journal of Business Ethics 19(1):81–90

    Article  Google Scholar 

  • Martin C. D. (1993). The Myth of the Awesome Thinking Machine. Communications of the ACM 36(4):120–130

    Article  Google Scholar 

  • Ministry of Education: 1997, ‘Learner Outcomes in Information and Communication Technology’, Edmonton, Alberta, November 7, 1997.

  • Ministry of Education: 1998, ‘Information and Communication Technology: Kindergarten to Grade 12 – An Interim Program of Studies’, Edmonton, Alberta, June 1998.

  • Ministry of Education: 1999, ‘Preparing to Implement Learner Outcomes in Technology: Best Practices for Alberta School Jurisdictions’, Edmonton, Alberta, February 1999.

  • Moll M. (1997). Canadian Classrooms on the Information Highway: Making the Connections. In: Moll M. (eds), Tech High: Globalization and the Future of Canadian Education. Fernwood Publishing, Halifax, pp. 33–64

    Google Scholar 

  • Office of the Information and Privacy Commissioner of Alberta: 2002, ‘Order 2001–038’, Edmonton Alberta, September 23, 2002.

  • Organisation for Economic Co-Operation and Development: 1980, Guidelines: On the Protection of Privacy and Transborder of Personal Data, Organisation for Economic Co-Operation and Development, Paris.

  • Packard V. O. (1964). The Naked Society. David McKay, New York

    Google Scholar 

  • Peslak A. R. (2005). An Ethical Exploration of Privacy and Radio Frequency Identification. Journal of Business Ethics 59(4):327–345

    Article  Google Scholar 

  • Pincus, L. B. and R. Johns: 1997, ‘Private Parts: A Global Analysis of Privacy Protection Schemes and a Proposed Innovation for Their Comparative Evaluation’, Journal of Business Ethics 16(12–13), 1237–1260.

    Google Scholar 

  • Privacy Commissioner of Canada: 2000, ‘Annual Report’, Privacy Commissioner of Canada, Ottawa, May 2000.

  • Raab C. D., and Bennett J.(1998). The Distribution of Privacy Risks. The Information Society 14(4):263–274

    Article  Google Scholar 

  • Reid, M.: 2002, ‘Provincial ruling aims to protect privacy of Calgary students’, Calgary Herald, Calgary, Saturday, September 28, 2002, p. B7.

  • Roy Morgan Research: 2001, ‘Privacy and the Community’, Office of the Federal Privacy Commissioner, Canberra, July 2001.

  • Royal Bank Of Canada: 2004, ‘Our Privacy Policy: Ten Privacy Principles’, Online privacy statement, online at http://www.rbcroyalbank.com/privacy/priv_pri.html

  • Schoeman F. (1984). “Privacy: Philosophical Dimensions of the Literature”. In: Schoeman F. D. (eds), Philosophical Dimensions of Privacy. Cambridge University Press, London, pp. 1–33

    Google Scholar 

  • Slane, B. H.: 2000, ‘Killing the Goose? Information Privacy Issues on the Web’, Office of the Privacy Commissioner of New Zealand, July 10, 2000.

  • Smith H. J., Milberg S. J., and Burke S. J. (1996). Information Privacy: Measuring Individual Concerns About Organizational Practices. MIS Quarterly 20(2):167–196

    Article  Google Scholar 

  • Tobias A. (1980). Extraordinary Popular Delusions & the Madness of Crowds. Random House, Toronto

    Google Scholar 

  • U.S. Department of Health Education and Welfare (HEW) (1973). Records, Computers and the Rights of Citizens: Report of the Secretary’s Advisors Committee on Automated Personal Data Systems. U.S. Government Printing Office, Washington

    Google Scholar 

  • Warren S. D. and Brandeis L. D. (1890) The Right to Privacy. Harvard Law Review 4(5):193–220

    Article  Google Scholar 

  • Westin A. F. (1967). Privacy and Freedom. Atheneum, New York

    Google Scholar 

  • Wood, M.: 2002, ‘CBE Kids’ Info Caught on Web’, Calgary Sun, Calgary, Saturday, September 28, 2002, p. 4.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to William Bonner.

Additional information

Bill has conducted extensive research in the area of information technology and privacy, with a particular emphasis on how privacy issues play out in practice. The variety and complexity of interacting influences that shape privacy in practice has lead Bill to expand the scope of his research to include history, ethics and public plicy.

Notes

Notes

  1. 1

    Canada did not pass such legislation until the 1980s. Others have read privacy rights into sections of the U.S. Constitution, but privacy as a specific right is not mentioned in these sections (Peslak, 2005).

  2. 2

    The terms are often used interchangeably. For the sake of clarity, fair information principles are guiding lights that are then operationalized into practical rules that are enacted in practice. Hence principles are general and practices are on-the-ground enactments.

  3. 3

    Due to the influence of the OECD’s FIP in privacy legislation around the world, including Canada, it is the focus in this study. Much more detail on the development and subsequent spread of OECD’s FIP has been published elsewhere (Bonner and Chiasson, 2005).

  4. 4

    None of the eight OECD FIP contains the word privacy. Each principle does contain the word data.

  5. 5

    WhoWhere? Inc. had contracted banner advertising to DoubleClick. Thus, the CBE would earn 25% of the net advertising revenue that DoubleClick would pay to WhoWhere? Inc.

  6. 6

    More distant events were also influential, such as the public pronouncements of then U.S. President Clinton and Vice-President Gore, who envisioned computers on every school desk (Moll, 1997). But action takes place locally and this group’s report was the call to action for other local groups.

  7. 7

    This inside view research is potentially insightful, but in many respects fortuitous; situations cannot be predicted in advance. A good example of such research involves the analysis of events and decisions surrounding Pinto fires in the 1970s (Gioia, 1992).

  8. 8

    There is evidence that others, especially the media, do not listen when experts try to explain the limits of their areas or objects of expertise. See for instance the role of the media in creating myths surrounding computer technology in the 1950s and 1960s (Martin, 1993).

  9. 9

    The displacement of ethics through the gaps between action and subsequent accountability and responsibility has been postulated in networked specialized organizations (Daboub and Calton, 2002).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bonner, W. Locating a Space for Ethics to Appear in Decision-making: Privacy as an Exemplar. J Bus Ethics 70, 221–234 (2007). https://doi.org/10.1007/s10551-006-9107-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-006-9107-4

Keywords

Navigation