Skip to main content

2017 | OriginalPaper | Buchkapitel

2. The Moral Responsibilities of Online Service Providers

verfasst von : Mariarosaria Taddeo, Luciano Floridi

Erschienen in: The Responsibilities of Online Service Providers

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Online service providers (OSPs)— such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment (infosphere) and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the Levels of Abstract (LoAs), we first analyse the moral responsibilities of OSPs in the web (LoAIN). These concern the management of online information, which includes information filtering, Internet censorship, the circulation of harmful content, and the implementation and fostering of human rights (including privacy). We then consider the moral responsibilities ascribed to OSPs on the web (LoAON) and focus on the existing legal regulation of access to users’ data. The overall analysis provides an overview of the current state of the debate and highlights two main results. First, topics related to OSPs’ public role—especially their gatekeeping function, their corporate social responsibilities, and their role in implementing and fostering human rights—have acquired increasing relevance in the specialised literature. Second, there is a lack of an ethical framework that can (a) define OSPs’ responsibilities, and (b) provide the fundamental sharable principles necessary to guide OSPs’ conduct within the multicultural and international context in which they operate. This article contributes to the ethical framework necessary to deal with (a) and (b) by endorsing a LoA enabling the definition of the responsibilities of OSPs with respect to the well-being of the inforsphere and of the entities inhabiting it (LoAFor).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM conference on Electronic Commerce (pp. 21–29). EC ’04. New York: ACM. doi:10.1145/988772.988777 Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM conference on Electronic Commerce (pp. 21–29). EC ’04. New York: ACM. doi:10.1145/988772.988777
Zurück zum Zitat Albareda, L., Lozano, J. M., & Ysa, T. (2007). Public policies on corporate social responsibility: The role of governments in Europe. Journal of Business Ethics, 74(4), 391–407. doi:10.1007/s10551-007-9514-1.CrossRef Albareda, L., Lozano, J. M., & Ysa, T. (2007). Public policies on corporate social responsibility: The role of governments in Europe. Journal of Business Ethics, 74(4), 391–407. doi:10.​1007/​s10551-007-9514-1.CrossRef
Zurück zum Zitat Anderson, M. (2008). The gaze of the perfect search engine: Google as an institution of Dataveillance. In A. Spink & M. Zimmer (Ed.), Web search: Multidisciplinary perspectives (pp. 77–99). Berlin: Springer-Verlag. In Web search: Multidisciplinary perspectives, by Amanda Spink and Michael Zimmer. Berlin. Anderson, M. (2008). The gaze of the perfect search engine: Google as an institution of Dataveillance. In A. Spink & M. Zimmer (Ed.), Web search: Multidisciplinary perspectives (pp. 77–99). Berlin: Springer-Verlag. In Web search: Multidisciplinary perspectives, by Amanda Spink and Michael Zimmer. Berlin.
Zurück zum Zitat Anderson, G. (2012). Just business. London: Headline. Anderson, G. (2012). Just business. London: Headline.
Zurück zum Zitat Arnold, D. G. (2010). Transnational corporations and the duty to respect basic human rights. Business Ethics Quarterly, 20(3), 371–399.CrossRef Arnold, D. G. (2010). Transnational corporations and the duty to respect basic human rights. Business Ethics Quarterly, 20(3), 371–399.CrossRef
Zurück zum Zitat Barzilai-Nahon, K. (2008). Toward a theory of network gatekeeping: A framework for exploring information control. Journal of the American Society for Information Science and Technology, 59(9), 1493–1512. doi:10.1002/asi.20857.CrossRef Barzilai-Nahon, K. (2008). Toward a theory of network gatekeeping: A framework for exploring information control. Journal of the American Society for Information Science and Technology, 59(9), 1493–1512. doi:10.​1002/​asi.​20857.CrossRef
Zurück zum Zitat Baym, N. K. (2011). Social networks 2.0. In Mia Consalvo & Charles Ess (Ed.), The handbook of internet studies (pp. 384–405). Chichester: Wiley-Blackwell. http://onlinelibrary.wiley.com/doi/10.1002/9781444314861.ch18/summary Baym, N. K. (2011). Social networks 2.0. In Mia Consalvo & Charles Ess (Ed.), The handbook of internet studies (pp. 384–405). Chichester: Wiley-Blackwell. http://​onlinelibrary.​wiley.​com/​doi/​10.​1002/​9781444314861.​ch18/​summary
Zurück zum Zitat Besmer, A., Lipford, H. R., Shehab, M., & Cheek, G. (2009). Social applications: Exploring a more secure framework. In In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). Besmer, A., Lipford, H. R., Shehab, M., & Cheek, G. (2009). Social applications: Exploring a more secure framework. In In Proceedings of the Symposium on Usable Privacy and Security (SOUPS).
Zurück zum Zitat Black, J. (2001). Decentring regulation: Understanding the role of regulation and self regulation in a ‘Post-Regulatory’ world. Current Legal Problems, 54(1), 103–146.CrossRef Black, J. (2001). Decentring regulation: Understanding the role of regulation and self regulation in a ‘Post-Regulatory’ world. Current Legal Problems, 54(1), 103–146.CrossRef
Zurück zum Zitat Blowfield, M., & Murray, A. (2008). Corporate responsibility: A critical introduction. Oxford; New York: OUP Oxford. Blowfield, M., & Murray, A. (2008). Corporate responsibility: A critical introduction. Oxford; New York: OUP Oxford.
Zurück zum Zitat Blumenthal, M. S., & Clark, D. D. (2001). Rethinking the design of the Internet: the end to end arguments vs. the brave new world. ACM Transactions on Internet Technology, 1(1), 70–109.CrossRef Blumenthal, M. S., & Clark, D. D. (2001). Rethinking the design of the Internet: the end to end arguments vs. the brave new world. ACM Transactions on Internet Technology, 1(1), 70–109.CrossRef
Zurück zum Zitat Boca, P. (2014). Formal methods: State of the art and new directions. [Place of publication not identified]: Springer. Boca, P. (2014). Formal methods: State of the art and new directions. [Place of publication not identified]: Springer.
Zurück zum Zitat Brandimarte, L., Acquisti, A., & Loewenstein, G. (2010). Misplaced confidences: Privacy and the control paradox. Brandimarte, L., Acquisti, A., & Loewenstein, G. (2010). Misplaced confidences: Privacy and the control paradox.
Zurück zum Zitat Calhoun, C. J. (Ed.). (2002). Dictionary of the social sciences. New York: Oxford University Press. Calhoun, C. J. (Ed.). (2002). Dictionary of the social sciences. New York: Oxford University Press.
Zurück zum Zitat Cavoukian, A. (2014). The unintended consequences of privacy paternalism /. Canadian Electronic Library. Canadian Public Policy Collection. Cavoukian, A. (2014). The unintended consequences of privacy paternalism /. Canadian Electronic Library. Canadian Public Policy Collection.
Zurück zum Zitat Cragg, W. (2010). Business and human rights: A principle and value-based analysis. In G. G. Brenkert & T. L. Beauchamp (Eds.), The Oxford handbook of business ethics. Oxford: Oxford University Press. Cragg, W. (2010). Business and human rights: A principle and value-based analysis. In G. G. Brenkert & T. L. Beauchamp (Eds.), The Oxford handbook of business ethics. Oxford: Oxford University Press.
Zurück zum Zitat Dann, G. E., & Haddow, N. (2007). Just doing business or doing just business: Google, Microsoft, Yahoo! And the business of censoring China’s internet. Journal of Business Ethics, 79(3), 219–234. doi:10.1007/s10551-007-9373-9.CrossRef Dann, G. E., & Haddow, N. (2007). Just doing business or doing just business: Google, Microsoft, Yahoo! And the business of censoring China’s internet. Journal of Business Ethics, 79(3), 219–234. doi:10.​1007/​s10551-007-9373-9.CrossRef
Zurück zum Zitat De Wolf, R., Willaert, K., & Pierson, J. (2014, June). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444–454. doi:10.1016/j.chb.2014.03.010.CrossRef De Wolf, R., Willaert, K., & Pierson, J. (2014, June). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444–454. doi:10.​1016/​j.​chb.​2014.​03.​010.CrossRef
Zurück zum Zitat Diller, A. (1994). Z: An introduction to formal methods (2nd ed.). Chichester; New York: Wiley. Diller, A. (1994). Z: An introduction to formal methods (2nd ed.). Chichester; New York: Wiley.
Zurück zum Zitat Donaldson, T. (1992). The ethics of international business, The Ruffin Series in Business Ethnics. New York: Oxford Univ. Press. Donaldson, T. (1992). The ethics of international business, The Ruffin Series in Business Ethnics. New York: Oxford Univ. Press.
Zurück zum Zitat Donaldson, T., & Dunfee, T. W. (1999). Ties that bind: A social contracts approach to business ethics. Boston, Mass: Harvard Business School Press. Donaldson, T., & Dunfee, T. W. (1999). Ties that bind: A social contracts approach to business ethics. Boston, Mass: Harvard Business School Press.
Zurück zum Zitat Elkin-Koren, N. (2001). Let the crawlers crawl: On virtual gatekeepers and the right to exclude indexing. University of Dayton Law Review., 26, 179–188. Elkin-Koren, N. (2001). Let the crawlers crawl: On virtual gatekeepers and the right to exclude indexing. University of Dayton Law Review., 26, 179–188.
Zurück zum Zitat Etzioni, A. (1999). The limits of privacy. New York: Basic Books. Etzioni, A. (1999). The limits of privacy. New York: Basic Books.
Zurück zum Zitat Floridi, L. (2013). The ethics of information. Oxford: Oxford University Press.CrossRef Floridi, L. (2013). The ethics of information. Oxford: Oxford University Press.CrossRef
Zurück zum Zitat Floridi, L., & Taddeo, M. (Eds.). (2014). The ethics of information warfare. New York: Springer. Floridi, L., & Taddeo, M. (Eds.). (2014). The ethics of information warfare. New York: Springer.
Zurück zum Zitat Friedmann, D. (2014). Sinking the safe harbour with the legal certainty of strict liability in sight. Journal of Intellectual Property Law & Practice, 9(2), 148–155. doi:10.1093/jiplp/jpt227.CrossRef Friedmann, D. (2014). Sinking the safe harbour with the legal certainty of strict liability in sight. Journal of Intellectual Property Law & Practice, 9(2), 148–155. doi:10.​1093/​jiplp/​jpt227.CrossRef
Zurück zum Zitat Gerry, F., & Berova, N. (2014). The rule of law online: Treating data like the sale of goods: Lessons for the internet from OECD and CISG and sacking Google as the regulator. Computer Law Security Review, 30(5), 465–481.CrossRef Gerry, F., & Berova, N. (2014). The rule of law online: Treating data like the sale of goods: Lessons for the internet from OECD and CISG and sacking Google as the regulator. Computer Law Security Review, 30(5), 465–481.CrossRef
Zurück zum Zitat Heath, D., Allum, D., & Dunckley, L. (1994). Introductory logic and formal methods. Henley-on-Thames: Alfred Waller. Heath, D., Allum, D., & Dunckley, L. (1994). Introductory logic and formal methods. Henley-on-Thames: Alfred Waller.
Zurück zum Zitat Helgesson, K. S., & Mörth, U. (Eds.). (2013). The political role of corporate citizens: An interdisciplinary approach, Palgrave studies in citizenship transitions series. Basingstoke; New York: Palgrave Macmillan. Helgesson, K. S., & Mörth, U. (Eds.). (2013). The political role of corporate citizens: An interdisciplinary approach, Palgrave studies in citizenship transitions series. Basingstoke; New York: Palgrave Macmillan.
Zurück zum Zitat Hinman, L. (2005). Esse Est Indicato in Google: Ethical and political issues in search engines. International Review of Information Ethics, 3(6), 19–25. Hinman, L. (2005). Esse Est Indicato in Google: Ethical and political issues in search engines. International Review of Information Ethics, 3(6), 19–25.
Zurück zum Zitat Huberman, B. A. (2003). The laws of the web: Patterns in the ecology of information. New Ed edition. Cambridge, Mass; London: MIT Press. Huberman, B. A. (2003). The laws of the web: Patterns in the ecology of information. New Ed edition. Cambridge, Mass; London: MIT Press.
Zurück zum Zitat Jacky, J. (1997). The way of Z: Practical programming with formal methods. Cambridge; New York: Cambridge University Press. Jacky, J. (1997). The way of Z: Practical programming with formal methods. Cambridge; New York: Cambridge University Press.
Zurück zum Zitat Johnson, D. G. (2009). Computer ethics (4 ed.). Upper Saddle River: Pearson. Johnson, D. G. (2009). Computer ethics (4 ed.). Upper Saddle River: Pearson.
Zurück zum Zitat Karp, D. J. (2009). Transnational corporations in ‘bad States’: Human rights duties, legitimate authority and the rule of law in international political theory. International Theory, 1(01), 87. doi:10.1017/S1752971909000074.CrossRef Karp, D. J. (2009). Transnational corporations in ‘bad States’: Human rights duties, legitimate authority and the rule of law in international political theory. International Theory, 1(01), 87. doi:10.​1017/​S175297190900007​4.CrossRef
Zurück zum Zitat Kerr, I. 2002. Internet users dependence and the duty of loyalty. In T. Mendina and Barbara Rockenbach (Ed.), Ethics and electronic information (166–176). North Carolina: McFarland Press. Kerr, I. 2002. Internet users dependence and the duty of loyalty. In T. Mendina and Barbara Rockenbach (Ed.), Ethics and electronic information (166–176). North Carolina: McFarland Press.
Zurück zum Zitat Laidlaw, E. (2008). Private power, public interest: An examination of search engine accountability. International Journal of Law and Information Technology, 17(1), 113–145. doi:10.1093/ijlit/ean018.CrossRef Laidlaw, E. (2008). Private power, public interest: An examination of search engine accountability. International Journal of Law and Information Technology, 17(1), 113–145. doi:10.​1093/​ijlit/​ean018.CrossRef
Zurück zum Zitat Lampinen, A., Lehtinen, V., Lehmuskallio, A., & Tamminen, S. (2011). We’Re in it together: Interpersonal management of disclosure in social network services. InProceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’11 (pp. 3217–3226). New York: ACM. doi:10.1145/1978942.1979420. Lampinen, A., Lehtinen, V., Lehmuskallio, A., & Tamminen, S. (2011). We’Re in it together: Interpersonal management of disclosure in social network services. InProceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’11 (pp. 3217–3226). New York: ACM. doi:10.​1145/​1978942.​1979420.
Zurück zum Zitat Lanier, J. (2011). You are not a gadget: A manifesto. Reprint edition. New York: Vintage. Lanier, J. (2011). You are not a gadget: A manifesto. Reprint edition. New York: Vintage.
Zurück zum Zitat Lessig, L. (1999). Code: And other laws of cyberspace. New York: Basic Books. Lessig, L. (1999). Code: And other laws of cyberspace. New York: Basic Books.
Zurück zum Zitat Lessig, L. (2007). In support of network neutrality. I/S: A Journal of Law and Policy for InformationSociety, 3(1), 185–196. Lessig, L. (2007). In support of network neutrality. I/S: A Journal of Law and Policy for InformationSociety, 3(1), 185–196.
Zurück zum Zitat Lev-On, A., & Manin, B. (2007). Happy accidents: Deliberation and online exposure to opposing views. In Forthcoming In: T Davies (Ed.), Online Deliberation: Design Research and Practice. Lev-On, A., & Manin, B. (2007). Happy accidents: Deliberation and online exposure to opposing views. In Forthcoming In: T Davies (Ed.), Online Deliberation: Design Research and Practice.
Zurück zum Zitat Lewin, K. (1947). Frontiers in group dynamics. Human Relations, 1(2), 143–153.CrossRef Lewin, K. (1947). Frontiers in group dynamics. Human Relations, 1(2), 143–153.CrossRef
Zurück zum Zitat Madden, M. (2012). Privacy management on social media sites. Pew Internet Report. Madden, M. (2012). Privacy management on social media sites. Pew Internet Report.
Zurück zum Zitat Matten, D., & Crane, A. (2005). Corporate citizenship: Toward an extended theoretical conceptualization. Academy of Management Review, 30(1), 166–179.CrossRef Matten, D., & Crane, A. (2005). Corporate citizenship: Toward an extended theoretical conceptualization. Academy of Management Review, 30(1), 166–179.CrossRef
Zurück zum Zitat Mayer-Schönberger, V. (2011). Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press. Mayer-Schönberger, V. (2011). Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press.
Zurück zum Zitat McQuail, D. (1992). Media performance: Mass communication and the public interest. London; Newbury Park: Sage Publications. McQuail, D. (1992). Media performance: Mass communication and the public interest. London; Newbury Park: Sage Publications.
Zurück zum Zitat Metoyer-Duran, C. (1993, January). Information gatekeepers. Annual Review of Information Science and Technology (ARIST), 28, 111–150. Metoyer-Duran, C. (1993, January). Information gatekeepers. Annual Review of Information Science and Technology (ARIST), 28, 111–150.
Zurück zum Zitat Nagenborg, M. (2005). The ethics of search engines (Special Issue). International Review of Information Ethics 3. Nagenborg, M. (2005). The ethics of search engines (Special Issue). International Review of Information Ethics 3.
Zurück zum Zitat Negroponte, N. (1996). Being digital. New edition. Rydalmere: Coronet Books. Negroponte, N. (1996). Being digital. New edition. Rydalmere: Coronet Books.
Zurück zum Zitat Nissenbaum, H. F. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford Law Books. Nissenbaum, H. F. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford Law Books.
Zurück zum Zitat Pandey, S., Roy, S., Olston, C., Cho, J., & Chakrabarti, S. (2005). Shuffling a stacked deck: The case for partially randomized ranking of search engine results. In In Proceedings of the 31st international conference on Very Large Databases (VLDB, 781–792. Pandey, S., Roy, S., Olston, C., Cho, J., & Chakrabarti, S. (2005). Shuffling a stacked deck: The case for partially randomized ranking of search engine results. In In Proceedings of the 31st international conference on Very Large Databases (VLDB, 781–792.
Zurück zum Zitat Pariser, E. (2012). The filter bubble: What the internet is hiding from you. London: Penguin.CrossRef Pariser, E. (2012). The filter bubble: What the internet is hiding from you. London: Penguin.CrossRef
Zurück zum Zitat Reger, C. M. (2004). Let’s swap copyright for code: The computer software disclosure dichotomy. Loyola of Los Angeles Entertainment Law Review, 24, 215. Reger, C. M. (2004). Let’s swap copyright for code: The computer software disclosure dichotomy. Loyola of Los Angeles Entertainment Law Review, 24, 215.
Zurück zum Zitat Rosen, J. (2012). The right to be forgotten. Stanford Law Review Online, 64, 88. Rosen, J. (2012). The right to be forgotten. Stanford Law Review Online, 64, 88.
Zurück zum Zitat Santoro, M. A. (1998). Engagement with integrity: What we should expect multinational firms to do about human rights in China. Santoro, M. A. (1998). Engagement with integrity: What we should expect multinational firms to do about human rights in China.
Zurück zum Zitat Schahczenski, C. (2008). Net neutrality, computing and social change. Acm Sigcas Computers and Society, 38(2), 27–27.CrossRef Schahczenski, C. (2008). Net neutrality, computing and social change. Acm Sigcas Computers and Society, 38(2), 27–27.CrossRef
Zurück zum Zitat Scherer, A. G., & Palazzo, G.. 2006. Toward a political conception of corporate responsibility-business and society seen from a Habermasian perspective. SSRN Scholarly Paper ID 952013. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=952013 Scherer, A. G., & Palazzo, G.. 2006. Toward a political conception of corporate responsibility-business and society seen from a Habermasian perspective. SSRN Scholarly Paper ID 952013. Rochester: Social Science Research Network. http://​papers.​ssrn.​com/​abstract=​952013
Zurück zum Zitat Schermer, B. W., Custers, B., & van der Hof, S. (2014). The crisis of consent: How stronger legal protection may lead to weaker consent in data protection. Ethics and Information Technology, 16(2), 171–182. doi:10.1007/s10676-014-9343-8. Schermer, B. W., Custers, B., & van der Hof, S. (2014). The crisis of consent: How stronger legal protection may lead to weaker consent in data protection. Ethics and Information Technology, 16(2), 171–182. doi:10.​1007/​s10676-014-9343-8.
Zurück zum Zitat Schwartz, P. (1999). Privacy and democracy in cyberspace. Vanderbilt Law Review., 52(1999), 1607–1071. Schwartz, P. (1999). Privacy and democracy in cyberspace. Vanderbilt Law Review., 52(1999), 1607–1071.
Zurück zum Zitat Semitsu, J. P. (2011). From Facebook to mug shot: How the dearth of social networking privacy rights revolutionized online government surveillance. SSRN Scholarly Paper ID 1782267. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=1782267 Semitsu, J. P. (2011). From Facebook to mug shot: How the dearth of social networking privacy rights revolutionized online government surveillance. SSRN Scholarly Paper ID 1782267. Rochester: Social Science Research Network. http://​papers.​ssrn.​com/​abstract=​1782267
Zurück zum Zitat Shapiro, A. L. (2000). The control revolution: How the internet is putting individuals in charge and changing the world we know. 2nd.Printing edition. New York: PublicAffairs. Shapiro, A. L. (2000). The control revolution: How the internet is putting individuals in charge and changing the world we know. 2nd.Printing edition. New York: PublicAffairs.
Zurück zum Zitat Smith, H. J., Dinev, T., & Heng, X. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly., 35(4), 989–1016. Smith, H. J., Dinev, T., & Heng, X. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly., 35(4), 989–1016.
Zurück zum Zitat Spinello, R. A. (2011). Privacy and social networking technology. International Review of Information Ethics, 16, 12. Spinello, R. A. (2011). Privacy and social networking technology. International Review of Information Ethics, 16, 12.
Zurück zum Zitat Spink, A., & Zimmer, M.. (2008). Web search. Vol. 14. Information Science and Knowledge Management. Berlin, Heidelberg: Springer Berlin/Heidelberg. Spink, A., & Zimmer, M.. (2008). Web search. Vol. 14. Information Science and Knowledge Management. Berlin, Heidelberg: Springer Berlin/Heidelberg.
Zurück zum Zitat Sunstein, C. R. (2001). Republic.com. With a new afterword by the author edition. Princeton: Princeton University Press. Sunstein, C. R. (2001). Republic.com. With a new afterword by the author edition. Princeton: Princeton University Press.
Zurück zum Zitat Taddeo, M. (2014, September). The struggle between liberties and authorities in the information age. Science and Engineering Ethics, 21, 1–14. doi:10.1007/s11948-014-9586-0. Taddeo, M. (2014, September). The struggle between liberties and authorities in the information age. Science and Engineering Ethics, 21, 1–14. doi:10.​1007/​s11948-014-9586-0.
Zurück zum Zitat Toffler, A., Toffler, H., & Gingrich, N. (1995). Creating a new civilization: The politics of the third wave. First Edition edition. Atlanta: Kansas City, Mo: Turner Publishing. Toffler, A., Toffler, H., & Gingrich, N. (1995). Creating a new civilization: The politics of the third wave. First Edition edition. Atlanta: Kansas City, Mo: Turner Publishing.
Zurück zum Zitat Turilli, M., Vaccaro, A., & Taddeo, M. (2012). Internet neutrality: Ethical issues in the internet environment. Philosophy & Technology, 25, 133–151.CrossRef Turilli, M., Vaccaro, A., & Taddeo, M. (2012). Internet neutrality: Ethical issues in the internet environment. Philosophy & Technology, 25, 133–151.CrossRef
Zurück zum Zitat Wang, N., Xu H., & Grossklags J. (2011). Third-party apps on Facebook: Privacy and the illusion of control. In Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, 4:1–4:10. CHIMIT ’11. New York: ACM. doi:10.1145/2076444.2076448. Wang, N., Xu H., & Grossklags J. (2011). Third-party apps on Facebook: Privacy and the illusion of control. In Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, 4:1–4:10. CHIMIT ’11. New York: ACM. doi:10.1145/2076444.2076448.
Zurück zum Zitat Weckert, J. (2005). Trust in cyberspace. In R. J. Cavalier (Ed.), The impact of the internet on our moral lives (pp. 95–120). Albany: University of New York Press. Weckert, J. (2005). Trust in cyberspace. In R. J. Cavalier (Ed.), The impact of the internet on our moral lives (pp. 95–120). Albany: University of New York Press.
Zurück zum Zitat Xu, H. (2012). Reframing privacy 2.0 in online social networks. University of Pennsylvania Journal of Constitutional Law, 14(4), 1077. Xu, H. (2012). Reframing privacy 2.0 in online social networks. University of Pennsylvania Journal of Constitutional Law, 14(4), 1077.
Zurück zum Zitat Ziniti, C. (2008). Optimal liability system for online service providers: How Zeran v. America online got it right and Web 2.0 proves it. Berkeley Technology Law Journal, 23, 583. Ziniti, C. (2008). Optimal liability system for online service providers: How Zeran v. America online got it right and Web 2.0 proves it. Berkeley Technology Law Journal, 23, 583.
Metadaten
Titel
The Moral Responsibilities of Online Service Providers
verfasst von
Mariarosaria Taddeo
Luciano Floridi
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-47852-4_2