Tuesday, August 25, 2020

The 9 Best Criminal Justice Schools

The 9 Best Criminal Justice Schools SAT/ACT Prep Online Guides and Tips Is it accurate to say that you are energetic about law and forestalling crime?Curious about how discipline and detainment facilities work? At that point a criminal equity degreewould likely be a decent fitfor you. Be that as it may, how might you discover great criminal equity schools to apply to? In this article, we go over what criminal equity schools are, the reason individuals decide to acquire degrees in the field, and how you can figure out how to distinguish top criminal equity schools, both face to face and on the web. We at that point give you a rundown of our picks for the nine best criminal equity schools. What Is Criminal Justice? Outline Before we take a gander at the best criminal equity schools, let’s go over what precisely the criminal equity field involves. Criminal equity is the investigation of the criminal equity framework, which incorporates law requirement, restorative offices and establishments (e.g., correctional facilities, penitentiaries, and adolescent confinement habitats), criminal courts, and all the jobs inside these frameworks. Criminal equity degrees contrast from degrees in criminology. Criminology is a social/conduct science that centers around the logical investigation of misconduct and crime,including why individuals carry out violations and how we may have the option to forestall them. Then again, criminal equity concentrates more on the handy side, including what sorts of wrongdoings happen, how courts and detainment facilities work, the job of the police, and so on. Regardless of the contrasts between these two fields, there's regularly some overlapin terms of themes and courses. A few schools offer degrees that consolidate both criminal equity and criminology. For instance, the University of Missouri-St. Louis offersa BS in Criminology and Criminal Justice. What Are Criminal Justice Schools? For this article, we'll be characterizing criminal equity schools as any foundations that offer a criminal equity degree program (and normally a criminal equity office or school). You can search for criminal equity schools in a particular region of the US utilizing the site All Criminal Justice Schools. Simply type inyour zip codeto get a rundown of schoolsthat have criminal equity degrees. Then again, you can peruse criminal equity schools by state onCriminal Justice Degree Schools. Criminal equity schools commonly offer a blend of criminal equity degrees, which can incorporate testaments/certificates, partner degrees, four year college educations, master’s degrees, and doctorates in criminal equity or a related field. Numerous criminal equity schools likewise have the choice to procure a degree in criminal equity altogether on the web. This can be advantageous for the individuals who think that its hard to go to classes face to face and who might lean toward the adaptability of an online program. So what precisely do you realize in a criminal equity program? You’ll for the most part spread themes that length the more extensive fields of humanism, brain research, political theory, reasoning, and open organization. Most criminal equity programs expect you to take classes on the American lawful framework, legal organization, the police, lawful issues, moral concerns, and adolescent misconduct. Numerous criminal equity majors proceed onward to a vocation in law requirement. Why Go to a Criminal Justice School? Numerous individuals decide to go to criminal equity schools to find out about the criminal equity framework, yet to likewise find a new line of work that uses the information and abilities they’ve gained in their degree program. A degree in criminal equity can help set you up for any of the accompanying employments: Bailiff CIA operator Prison guard Wrongdoing scene agent DEA operator FBI operator Extortion specialist Cop Private analyst Post trial agent Mystery Service operator Security monitor State trooper In spite of the fact that a significant number of these employments require only a secondary school recognition, having a partner or four year certification in criminal equity could assist you with standing apart from competitors and raise your potential for higher wages and advancements. Additionally, a few people get a bachelor’s qualification in criminal equity to establish the framework for getting an advanced education in a related field such aslaw. The accompanying tabledepictsthe middle compensations for different criminal equity related occupations, alongside each activity's base required degree and business development rate for the years 2016-2026. Information originates from the US Bureau of Labor Statistics (BLS). Occupations are organized from most significant compensation to least. Note that theaverage work development rate is 7% for all jobs,so any activity that has a rate higher than this is becoming quicker than normal. Employment Title Least Degree Required Middle Salary (2018) Employment Outlook (2016-2026) Legal counselors Doctoral or proficient degree $120,910 8% Sociologists Master’s or doctoral qualification $82,050 1% Police and Detectives Secondary school confirmation or advanced education $63,380 7% Criminal Justice and Law Enforcement Teachers, Postsecondary Master’s or doctoral qualification $61,900 15% (all postsecondary educators) Measurable Science Technicians Bachelor’s qualification $58,230 17% Post trial agents and Correctional Treatment Specialists Bachelor’s qualification $53,020 6% Private Detectives and Investigators Secondary school confirmation $50,090 11% Prison guards and Bailiffs Secondary school confirmation $44,400 - 7% Security Guards and Gaming Surveillance Officers Secondary school confirmation $28,530 6% As should be obvious above, as a rule, the more instruction you have, the higher the pay you’re prone to procure. This isn’t simply valid for the criminal equity field yet for all fields. As indicated by a BLS report, there's an unmistakable pattern with graduate certificate holders getting more cash on normal than unhitched male's and partner degree holders. Besides, bachelor’s and partner degree holders ordinarily make more than those with just a secondary school certificate. Which Criminal Justice Schools Should You Apply To? Presently that we’ve gone over what sorts of occupations you can get with a criminal equity degree, let’s investigate how you can make sense of which criminal equity schools and projects are top-quality. An incredible criminal equity school will have most or the entirety of the accompanying characteristics: An office or school represent considerable authority in criminal equity or criminology An assortment of criminal equity related classes Workforce with skill in criminal equity and related points, for example, humanism and brain research A high graduation rate Proficient as well as examination openings For the most part talking, there is no striking contrast in quality between a customary in-person criminal equity program and an online one. In the event that you incline toward winning your bachelor’s or master’s qualification on the web, (authorize!) criminal equity online schools can be an incredible decision. I recommend perusing the US News rundown of the best alumni online criminal equity projects to discover what schools offer solid online projects. Most great criminal equity schools offer similarly top notch online projects. These can be either bachelor’s or master’s programs. Note that you can't win a doctorate through criminal equity online schools. Any school offering this choice is in all probability a trick and won’t really reward you with a real doctorate. On the off chance that you choose to get your criminal equity degree on the web, amazing! Simply know that there are a couple of impediments to doing as such. For one, you likely won’t get the opportunity to organize as much with teachers and understudies as you would with a customary program. Also, a few bosses may look down on an online degree (however this truly relies upon the business most ought not mind how you got your degree as long as it’s genuine!). Generally, there are a great deal of elements that go into picking the correct criminal equity program for you.Now, let’s investigate the best criminal equity schools, both face to face and on the web. The 9 Best Criminal Justice Schools, In-Person and Online There are numerous criminal equity schools in the US, both face to face and on the web. Be that as it may, which ones are the best? We’ve glanced through a few rankings arrangements of the best criminal equity schools to think of our own rundown beneath ofnine top criminal equity schools. These criminal equity schools were judged essentially on the accompanying components: Rankings of customary and online projects by sites, for example, Niche and US News Generally speaking project/school notoriety and distinction Regardless of whether the school has a committed office or school to criminal equity contemplates Assorted variety of majors and courses offered in criminal equity and related fields Broadness of staff's subject matters Note that the nine criminal equity schools underneath are not recorded in a specific request. Additionally, these schools incorporate graduate projects just as online projects in criminal equity and related fields. CUNY John Jay College of Criminal Justice-New York, NY A chief criminal equity school, the CUNY John Jay College of Criminal Justice is home to 13,000 students, 41% of whom are studying criminal equity. Other well known majors incorporate criminology and legal brain research. John Jay offers numerous criminal equity majors,with concentrationsranging from wrongdoing control and counteraction to hypothesis and practice. Also, a few criminal equity graduate projects are available.At the ace's level, you can examine criminal equity, worldwide wrongdoing and equity, and legal brain science, among a few other related projects. At the doctoral level, your alternatives arecriminal equity or brain research. Ultimately, John Jay Online-the college’s separation learning branch-permits you to earnan MA in either Criminal Justice or International Crime and Justice completely on the web. Nort

Saturday, August 22, 2020

Selections from the Digital Art Gallery essays

Choices from the Digital Art Gallery papers Intensity of Authority Katrin Eismann, Untitled In this image, we can see a few coins in the waters of a lake; the primary coin being a U.S. quarter. Since the water is continually moving, it mutilates the physical picture of the coin when you take a gander at it from above, however if you somehow happened to snatch the coin, it would simply resemble some other coin you would discover in your pocket. I believe that the coin speaks to the United States in light of what the establishing fathers had for this nation which was opportunity, freedom, and correspondence; the water represents what governmental issues and the privilege of intensity has done to the nation which is degenerate the national soul and its position to the first pledge the establishing fathers had. This is like what Eismann expressed, Eismann recommends that the establishing standards of the United States are in danger of being distorted to where we will no longer remember them. As the perspective on America is beginning to fall for patriotism and the causes of thi s land, it ruins our worldwide plays, the regard of the individuals to the legislature and, above all, the intensity of the individuals. Force Struggle Peregrine Hong, Bed of Roses This image shows a little youngster lying on the young lady with a red stream going down her body and with many roses coming out of her stomach like inflatables all before a white canvas. This image shows how ladies assumed such a major job on governmental issues and developing the entire whole world. A womans body is a war zone for everything in this country. Ladies encapsulate force and initiative. We have the ability to show our kids to design their prospects, we have the ability to choose life of a person, and we have the force whether to acknowledge obligation. This is like what Honig stated, We advocate for fairness. We have the ability to instruct our girls to design their lives so they are the best guardians they can be, and the clinical way to... <!

Custom Coffee & Chocolate Essay

As indicated by the review of Custom Coffee and Chocolate’s business, Bonnie Brewer and Stacy Kim run a little cafã © where they serve one of a kind espresso, chocolates and keep up a shop. The cafã © is situated close to a college, where understudies, personnel, staff, and neighborhood occupants are the primary clients. They have maintained the business effectively, cooperating with no representatives and selling their items just in the cafã ©. They have begun to consider further turn of events. The primary inquiry now is the thing that systems they should dispatch to accomplish that point. The initial step to respond to on that question is dissecting the company’s inner condition and recognizing it qualities and shortcomings. The best quality is without a doubt information obtained by the proprietors during business and advertising courses and there experience picked up busy working. The proprietors additionally picked an intriguing area with numerous understudies who they know and see well indeed, which joined with the offer is quality of their business. Clients can sit in agreeable seats, on lounge chairs, and at foot stools, and talk or read papers between classes. As we think about shortcomings, we can distinguish a couple of tricky things. The biggest of these is the restricted access to administrations because of the little space in the cafã ©. Additionally, absence of representatives makes it incomprehensible for the cafã © to open longer, in light of the fact that the proprietors likewise need to deal with the funds. There is likewise no opportunities for clients to arrange merchandise via telephone or on the web, and for the cafã © to convey administration to areas nearby, for example, dormitories and parlors where understudies are examining. Another shortcoming is very poor menu, which ought to be stretched out by new items. Moreover, too little consideration is paid to social incorporation by sorting out occasions, for example, verse readings or conversation gatherings, and directing a blog which could coordinate understudies around the cafã ©. Absence of a remote association that clients could utilize is a noteworthy disadvantage. The last shortcoming, which is extremely significant, is an absence of budgetary hold. The proprietors depleted their investment funds and the underlying private company credit, andâ their half year rent is up. The subsequent advance is breaking down the company’s outer condition and distinguishing it openings and dangers. The best open door for the advancement of the organization is the capacity to arrive at a more extensive scope of clients who are possibly keen on utilizing the administration of the cafã ©. Custom Coffee and Chocolate’s marketable strategy bases on buying quite reasonable exchange espresso and chocolates made by a couple of nearby providers. It merits thinking about acquiring a superior cost from maker in return for advancing their brands. It is likewise conceivable to degree the quantity of potential providers, which is probably going to empower the cafã © to buy items at much better costs. An open door for the improvement of the organization is the utilization of new innovations, for example, online shops, sites or web journals, to permit better contacts with clients on the Internet. Lamentably, dangers additionally can show up in the company’s outer condition. It could be a lessening in the quantity of understudies at the University or changed area of classes. The greatest danger might be the development of contenders offering comparable administrations at lower costs or better quality. The system embraced by the organization, which comprises of purchasing items from neighborhood providers and requesting not out of the question exchange espresso, may cause a danger of presentation of less expensive substitutes available by contenders. The last however not the least danger is associated with the need to expand the caf㠩’s obligation by taking extra credits for additional turn of events. In the wake of deciding the qualities and shortcomings of the company’s inside condition just as the chances and dangers of the company’s outside condition, it is important to propose a few methodologies that consider the interdependencies between specific components of SWOT investigation, which will assist with building up the organization in the correct manner. One of the thoughts is to get new clients by expanding the accessibility of items. Masterminding an offer of items through the online store and permitting clients to play arranges by telephone, sorting out suitable advertising efforts on the site or in nearby media, offers chances to accomplish that objective. Requested merchandise would be conveyed by messenger. At the underlying stage, the scope of conveyance may be constrained to areas nearby, for example, residences and parlors where understudies are examining. This procedure would be based on chances of utilizing the Internet and becoming the customer’s base without the need of searching for bigger premises to runâ a cafã ©. It is important to recruit representatives to permit the proprietors to concentrate on vital administration exercises in the cafã ©. It would give Bonnie Brewer and Stacy Kim chance to utilize their insight and experience and assume control over a greater amount of the account and showcasing exercises. Another intriguing procedure that can secure the organization against the loss of clients is building social attachment by transforming the cafã © into a faction meeting place for understudies, personnel and other staff of the University. Sorting out verse readings or conversation gatherings could be a good thought. Additionally, those exercises would be bolstered by a blog which would be directed by the caf㠩’s proprietors. Along these lines, drinking espresso or eating delightful chocolates would be just a characteristic expansion and advantage during gatherings. All things considered, the primary quality is the particular area with understudies, workforce and staff whose the proprietors of the bistro know and see well. Having steadfast client gatherings might be especially significant when a few contenders show up available. Along these lines, the organization could essentially lessen this sort of danger. An extremely successful technique which could be utilized is building their very own conspicuous brand items. They ought to be introduced as special and not accessible from different contenders. Moreover, it may be conceivable to set up a more extensive scope of items which could be more qualified to the neighborhood clients needs. This methodology ought to be founded on the advancement of neighborhood items and providers of items and great reasonable exchange espresso. It could be a chance to get extra cash from backers of the social and network building crucial out by the proprietors of the cafã ©. The above technique depends on the quality associated with great items which assume a specialty position available and can't be effectively supplanted. It shields the organization from the danger of rivalry and improves its upper hand.

Friday, August 21, 2020

Internal auditor in a company Essay Example | Topics and Well Written Essays - 500 words

Inside evaluator in an organization - Essay Example Your association must organize fixing the bookkeeping imperfections in the framework on the grounds that the Sarbanes Oxley Act of 2002 has raised the responsibility of official administrators. The organization needs an expert evaluation of its interior control insufficiencies. The firm should employ an inward examiner at the earliest opportunity to assess the firm’s bookkeeping framework and suggest restorative activities. â€Å"The Institute of Internal Auditors characterizes inside review as an autonomous, target confirmation and counseling action intended to include esteem and improve an organization’s operations† (Menk). During the previous decade the evaluating field is becoming sought after because of new guidelines, for example, the Sarbanes Oxley Act which have increased present expectations for bookkeeping experts. Segment 404 of the Sarbanes Oxley Act orders that every open organization build up inward control systems and procedures† (Searchfinan cialsecurity, 2011). These instruments must be tried on a repetitive reason for precision and adequacy. The best individual to place responsible for this undertaking is an inside inspector. Because of the way that the organization must proceed the interior evaluating process year long it is less expensive for the organization to employ an inside evaluator full time than to re-appropriate the work to another bookkeeping firm.

Thursday, August 6, 2020

Profiles in Courage

Profiles in Courage DID YOU KNOW? There are at least two KISS cover bands in the world consisting entirely of little people, and at least two of them are apparently engaged in some sort of war. Hey all, sorry about the relative dearth of blog entries recently over the past week. Lets just say that today I turned in a problem set that was 47 pages long. CPW rocked it, yo. Special thanks to my prefrosh George for being really independent and finding his way home at 6 AM without my help, to Kristin R for her wonderful (if slightly awkward) compliment at Meet The Bloggers, to Joooliyah for preventing the theft of my laptop, and to all of the lovely prefrosh I had a chance to meet over the weekend when I wasnt slaving in lab, passed out on my couch in the midst of 10.32, performing some blog-related duty, or running 3 miles. You kids are my American Idols. Also, thanks to Kappa Sigma for letting the marching band crash their barbeque in front of Kresgealthough, really, you guys should be thanking us. As fine a piece of art as The Thong Song is, I personally think that it was simply taken to another level with our improvised marching band accompaniment on top of it. So I woke up Monday morning to find that there was a five-foot tall trophy in my suite. Now, this isnt actually such an uncommon occurrence, because I happen to live next to the president of the MIT Sport Taekwondo club. Competing against such worthy adversaries as Cornell, Princeton, and West Point, the five-year-old team has accumulated so many points in competition this year that they could skip the next competition completely and still win first place in their league. Thats pretty rowdy. My neighbor Alicia (Course 7 06) is the president of the club and is only slightly taller than the trophy recently won by the team: I was going to get a picture of Alicia with the five-foot-tall trophy, but she took it away last night. Well, this is what it would have looked like, had she won a golf tournament. Alicia came to MIT as a white belt and joined the club her first semester. She just earned her black belt two months ago in a truly beautiful display of stamina and finesse. Among her many accomplishments, Alicia has a perfect 5.0 GPA, is headed into the PhD program at Harvard (with Mollie next year), lives next to me, and has performed cancer research for the past three years in a UROP with Professor Robert I discovered the first human oncogene Weinberg. This semester alone, she organized the national collegiate taekwondo championships, served as an undergraduate TA for freshman biology and beat all three Donkey Kong Country games for the Super Nintendo with her boyfriend. She also bakes delicious sugar cookies and shares my obsession with Food Network personalities. Alicia and I were sitting in the suite one morning discussing, among other things, how amazing she is, how amazing the trophy is, and Trader Joes High Fiber Cereal. Alicia noticed that shes actually the perfect height for the trophy, because the little guy kicking on top of it is exactly at her eye level. Then she noticed that the little guy was kicking with really terrible form, and concluded that he must be a white belt or something. Such is the way of all Taekwondo trophies. Anyway, I thought it was time to blog about somebody other than myself and Rachael Ray, and Alicia is better than both of us put together! She is a prime example of how to totally rock at life. Also, she goes to MIT. Correlation implies causality.

Monday, June 29, 2020

A Business Report on The Samsung Group - Free Essay Example

Samsung was founded in 1938 by Lee Byung-Chull in Daegu, South Korea. The Samsung group is often referred to as the founder of Korean industry. Byung-Chull Started his company as just a small simple trading company, and expanded it, eventually forming the massive worldwide electronic company people know today. Samsung has been around for over seventy-five years, and is advancing rapidly and consistently (Jung-Hyun). This company, over the many years, has developed a lot of credibility and has demonstrated originality. The Samsung Group is the largest corporation in South Korea. The company functioned in over fifty countries and employed more than two hundred-thousand people worldwide. Among the main business subdivisions within the Group, Samsung Electronics is the most prominent and well known one. The organizational structure of Samsung Electronics consists of 5 business departments. They have demonstrated significant successes in such industries as mobile phones, liquid cry stal displays, and memory products enabled Samsung to grow into a global company. However, current successes do not guarantee the leading position on the market in future. The American market is of high competition. In order to operate successfully on this market, it is necessary to make right-time decisions concerning business, labor, and production. Americans should support this company because it was originally created for a good cause. Lee Byung-Chull created the company as service for his country. According to Bang Jung-Hyun, a writer for Korea IT Times, â€Å"†¦he [Lee Byung-Chull] realized how a country is vulnerable against lack of vigorous ventures keeping the nation afloat and that the nations stake was poised on the edge of the chair without the existence of strong capitalism.† At the time of 1930s Korea was much dependent on Japan, their economy was fragile, and the country required a stronger economy in order to become independent. Samsung was Byung-Chull ’s attempt to strengthen the Korean economy. Byung-Chull’s persistent efforts to construct an enhanced economic base in Korea to strengthen the nation displayed his strong passion towards business and his country. His actions results in the unprecedented economic prosperity in Korea. In Lee Byung-Chull’s eyes employees were the most valuable quality in a company. He had very unique business philosophies. Bang Jung-Hyun also says â€Å"The most interesting choice he made for the companys security and well-being was selecting a psychologist as his consultant instead of a business specialist.† Lee Byung-Chull believed that a business is best managed by understanding people rather than statistics and numbers. It is these factors that a quality company should have, Samsung places their employees first and values them. Using many employees worldwide also creates many job opportunities for people all around the world, which, ultimately, strengthens the econom y (Jung-Hyun).Therefore Samsung is a company that puts its employees’ first, and makes it their top priority to have them pleased. All of their efforts have been to help the company and the economy grow. During the 1980’s Samsung was only known as a follower company in the electronics industry. This also improves its credibility because Samsung was founded so long ago from nothing, and now they are still standing strong and prominent. They manufactured mediocre quality products and were not considered a significant threat by any of the other major electronic companies; However, Samsung now is widely viewed as one of the most technologically advanced companies in the world, in which it competes for top market positions in several electronic departments. Samsung has made a wide variety of products in its many years as an established company. They started off as a food exporter and shipped items to China. They then moved on to other business such as life insurance a nd textiles. Eventually they started to manufacture electronics. The electronic department began by making televisions to sell. They continued to expand even further and manufactured many common household appliances such as washing machines, refrigerators, and microwaves. Around 1980 Samsung produced a verity of electronics ranging from personal computers to tape recorders and began exporting them to North America. Samsung constantly were advancing and crating new technology for society to benefit from, they had been advancing since they were founded and have not slowed down (Kovach). Today, Samsung manufactures more smartphones than any other competitor in the world. Competitors such as apple may receive more attention; However, according to Stephen D. Simpson â€Å"Korean electronics giant Samsung actually sold more smartphones and sits in the catbird seat in the global cell phone market.† This can be associated with their variety of products and smartphones, while Apple has very little variations in their smartphones (Simpson). This is a great example of how Samsung has been using their own original methods that has made them successful. Samsung has exhibited a lot of success, and this can be attributed to its marketing strategy. Brad Reed, news editor exclaims that â€Å"their recent success but one of the under-appreciated ones is their willingness to crank out new products at a rapid pace without fear of diluting their brand.† Samsung creates their phones faster than any other company. They adjust to the needs of the people simply by making many variations of their phones, and creating a wide array of features available. Samsung realizes that everyone has different opinions so they take their products and match it with the needs of the consumers at a specific time (Reed). Samsung is one of the major leaders in most of the technological subdivision, they have offered the latest technology to the buyers over the past few years. Their unique strategys progresses sales and increases the number of customers. In every field of technology, Samsung provides such a wide variety of products. With the technology department growing so fast, the competition in finding and marketing the newest technological innovation is crucial. Samsung does a phenomenal job in providing the people with the newest technology when it is readily available. They take advantage over their quick production rate which the other companies cannot keep up with. Samsung can be associated with great success. The company was founded for a country and continued for the consumers. American people would benefit form purchasing their products. Jay Yarow, newspaper writer says â€Å"Samsung, on the other hand, makes skyscrapers, big ships, smartphones, TVs, and refrigerators, to name a few items.† Their products are very advanced and can greatly simplify everyday life of modern society. Samsung has been established for an extremely long amount o f time, they will continue to prosper in the future. Samsung’s business and market strategies are unique and effective. Samsung has developed tremendously from when it was first established in 1938. Now it is consisted of over 80 different business departments. Samsung extremely values employees, they have over 370,000 employees worldwide, that is more than Apple and Microsoft combined. Samsung rapidly produces product to be sold they shipped 215.8 million smartphones in 2012, more than Apple, HTC, and Nokia combined (Yarow). Samsung is recognized as the most respected company in South Korea, attracting many of the countrys most intelligent and talented pupils. Lee Byung-Chull has greatly impacted the electronic industry by founding Samsung. Americans should support this company and help it grow even further. Supporting such a company would can lead to them developing better products to help humans in their everyday lives. Samsung is one of the most innovative companies to day, they display all the characteristics of an ideal company. They value employees, have original business tactics, creates many job opportunities, and is a credible company due to how many years it has been established.

Saturday, May 23, 2020

How Philosophy Effects Who And Why I Think And Behave As I Do

In this, my final paper for this class I want to explain how philosophy effects who and why I think and behave as I do. I will examine the overall perspective how different types of philosophies are blended together to become my core beliefs. How these beliefs affect the meaning of my life and further more why life has meaning at all to me. In ending I will explain my personal theories of reality, ethics, social and racial contracts come together to contribute to my acceptance of religion and human nature. When we think about philosophy we start out believing that is a complicated process left to the teachers and thinkers of the world that are best at processing it all. What we fail to realize is that it is philosophy who shapes the†¦show more content†¦As we mature as young adults we develop relationship outside of this unit and add, modify and change what we believed as absolutes. Continually throughout adult we change our views as we learn and are exposed to events which force a wider perception of the world around us. To say we are that we perceive and believe that exactly at same at 50 as we did at 20 would be impossible because even as the world has changed it in turn changes who and how we see the world. He writing the â€Å"Circles† shows how the relativism of ethics changes and moves in circles as beliefs and truths change, so we change. (Hallman, Pg 314-319, 2008) This doesn’t mean that we lose who we were when we younger only that we have modified our thinking to accommodate our increased knowledge. Raised as I was in the western influences of philosophy as a young adult I was drawn to the eastern collectivism in culture best described by Tao. Lao Tzu wrote the world is like a river flowing and blending changing and harmonizing within nature and balance ourselves we too must harmonize and flow with nature. (Hallman, pg 192-195, 2008) Here is where for me you see the changes in my belief system for in my search to understand who I am and why do I exist I choose to search in many views. I first came across Wicca and paganism which to me explained the energy and grounding which opened my experience to practice of religious experiences outside of the Christian faith. One which could believe

Tuesday, May 19, 2020

Individual Uses Certain Cosmetic - Free Essay Example

Sample details Pages: 7 Words: 1988 Downloads: 7 Date added: 2019/04/12 Category Biology Essay Level High school Tags: Animal Testing Essay Did you like this example? When an individual uses certain cosmetics, takes antibiotics, or even gets vaccines, they are supporting the practice of animal testing either knowingly or unknowingly. Animals are tested, mostly by companies, with the intent of verifying that products and other materials are safe for human use. Although this practice can be beneficial for humans, testing on animals is abusive, the practice is unreliable, and animal testing costs an extravagant amount of tax money; therefore, this practice should be deemed illegal, and alternative practices should be used. Don’t waste time! Our writers will create an original "Individual Uses Certain Cosmetic" essay for you Create order Animal testing is an abusive practice that studies, tortures, and causes the death od over 100 million animals each year (Animal Testing 101). Although many individuals believe that animals do not feel pain, like humans, they do. A large reason why animal testing is viewed as so abusive is due to the degree in which animals are treated. For example, according to Sarah Rose A. Miller, One commonly used procedure is the Draize Test, which is used to test household products for harmful chemicals. In the Draize Eye Irritancy Test, solutions are applied immediately to the subjects eyes-usually a group of albino rabbits. This often causes intense pain and destroys the rabbits eyes, leaving them raw and bleeding. After the test period (around seven hours), the rabbits are killed so they can be examined for internal damage. As one can see, animals encounter extreme abuse in this setting; researchers view the animals as objects rather than living beings who feel pain. The animals do not have any say in how they want to live their lives, and they are tortured to death. Not only is animal testing painful for animals, but it also can easily ruin an animals quality of life. For example, according to Bogdan Marinescu and Cristin Coman, many researchers and animal testers snip animals ears, remove body parts to test them, severely burn them, and use many other methods of testing (Marinescu, B., Coman, C.). As one can see, animals go through a great deal of pain and suffering when in this captivity, and this contributes to their poor quality of life. In addition, the majority of animals that are tested on are confined to a very small space, which also makes a large contribution to the animals poor quality of life (Miller). Lastly, animals are tested on with chemicals, and this practice can significantly harm them. According to Sarah Miller, This procedure is used to measure the toxicity of a substance-the amount of the substance it takes to kill half a group (generally 200) of test animals. The test usually goes on for days, and the animals suffer extreme pain and distress. As one can see, humans are insensitively exposing animals to chemicals and seeing if they survive it or not in order to test that it is safe. The animals are tortured, and they do not have any control over what is happening to them. Furthermore, animal testing should be illegal due to the agony that animals are being forced to experience. Animal testing should be outlawed due to the unreliability of making sure that materials are safe for humans to use. Many studies and instances have proven that animal testing is not reliable when it comes to confirming that materials are safe for human usage. For example, The Food and Drug Administration reports that 92 out of every 100 drugs that pass animal tests fail in humans (Top Five Reasons to Stop Animal Testing). As one can see, this number can be stunning due to the likeliness of a product harming an individual. As further proof, according to Sheree Stachura, Just recently, Vioxx, a medication manufactured by Merck and approved by the FDA, was pulled from the market. The medication caused 25% of 239 patients taking it to have heart attacks within 13 days of starting the drug. As one can see, this statistic provides evidence that animal testing is unreliable and perhaps disquieting. It is alarming for some individuals to apprehend that humans do not know what is going to happen to them if they use a material that they believe is safe, but actually is not. Lastly, animals and humans have many significant contrasts (Stachura). For example, animals and humans differ when it comes to genetics and responses to materials (Edwards). Therefore, if we have so many contrasts, then how do humans know that they are completely safe from a material that was only tested on animals? Humans are unknowingly taking a moral risk when using materials that used animal testing, and the reason for this is that testing on animals is an unreliable method. Thus, alternative practices should be put into place. Not only does animal testing cost many animals lives, but it also costs a lot of money. One may ask, Where does all of this money come from? According to Kayla Newcomer, the funds for animal testing, which is about 14.5 million dollars every year, comes from taxes, and the government uses the taxes to pay for testing. Therefore, there are many people in the United States who are unknowingly and/or forcefully contributing to the practice of animal testing. In addition, specific studies cost a lot of money. For example, did you know that studying a chromosome aberration on animals costs $30,000 (Costs of Animal and Non-Animal Testing)? Furthermore, like mentioned before, unreliability is a large dilemma in animal testing. Therefore, humans are spending a great amount of money on animal testing, and humans do not know for sure if materials are safe to use. To bring down the cost and test for more reliability, there are alternative solutions for animal testing that researchers can use. In response to a claim that animal testing should not be legal, Jeffery A. Running, a microbiologist and research scientist, claimed that animal testing saves human lives. In fact, he claims that if animal testing did not exist, that the adverse effect rate from materials would be much higher than it already is. Within his argument, Running claims, If vaccines werent produced, many millions (yes, millions) of people would die as a result of infectious disease. If vaccines were produced, but were tested directly on humans, vaccines that did have harmful side effects would harm people instead of animals (Running). Furthermore, humans cannot perform tests directly on to humans to test whether or not they are safe for usage, so animals are the only option to make sure that a material is somewhat for human use is safe. This sourced is biased due to the fact that Running, a microbiologist and research scientist, job relies on testing materials on animals to make sure they are safe for human use. Running claims that animal testing has saved many lives, and without it, many humans would be harmed (Running). Although Running makes a strong claim that animal testing saves lives, the practice also puts human lives in danger. The unreliability of animal testing surpasses the possibility of animal testing catching flaws in materials. If a product is unsafe, then it could easily harm or even kill a human. However, there are other reliable, alternative methods to animal testing that could potentially save more humans lives than animal testing would. One of the alternatives includes in-vitro testing. In-vitro testing is where human cells are placed on a slide, and its job is to impersonate human reactions to a substance (Alternatives to Animal Testing). It can be believed that in-vitro testing allows for more accurate results due to the fact that it acts similar to humans epidermis (Alternatives to Animal Testing). As one can see, in-vitro testing, which allows for testing to be done is a human-like, accurate way; this will essentially reduce the risk of unreliability being an issue, and, it will not harm any animals in the process. According to staff from The Scientist, individuals who perform studies and research on animals take into consideration the animals pain and distress, and essentially attempt to make the environment tolerable. For example, researchers will only use the number of animals necessary to get the results that they desire (Reducing Pain and Distress in Animal Research). In addition, according to Ian Murnaghan, researchers live by the three Rs: reduction, replacement, and refinement. This means that researchers are making an attempt to decrease the number of animal subjects, trying to use different techniques for testing that does not require animals, and making an attempt to make the testing easier on the animal (Murnaghan). Although researchers are trying to reduce the amount of harm placed on an animal, this does not change the fact that animals are still being harmed by animal testing. If researchers were concerned with the state animals were in, then they would not perform animal testing at all. For example, like mentioned previously, animal are forced to suffer through studies that result in problems such as burns (Marinescu, B., Coman, C.). To put a stop to animal testing completely, alternative testing practices can be put into place. Like mentioned previously, in-vitro testing is certainly an alternative possibly (Alternatives to Animal Testing). In addition, computer modeling could be the future of medical research and animal testing (Alternatives to Animal Testing). Computer modeling has made it to where technology has the ability to find cures and use QSAR testing rather than using animal subjects (Alternatives to Animal Testing). As one can see, the alternatives to animal testing are feasible; humans just have to put in the time and effort in using them rather than using animal subjects. Testing on animals has been proven to be cruel, unreliable, and costly. As one can see, there are other alternative methods to avoid animal testing. This can and eventually will be beneficial for both animals and humans. Therefore, humans should take initiative and deem animal testing as illegal. Alternative testing such as in-vitro and computer modeling could benefit humans immensely, and be the future of testing materials. Works Cited Alternatives to Animal Testing. PETA, www.peta.org/issues/animals-used-for- experimentation/alternatives-animal-testing/. Accessed 12 December 2018. Animal Testing 101. PETA, 2018, https://www.peta.org/issues/animals-used-for- experimentation/animal-testing-101/. Accessed 14 Dec 2018. Badyal, Dinesh, and Chetna Desai. Animal use in Pharmacology Education and Research: The Changing Scenario. Indian Journal of Pharmacology, vol. 46, no. 3, 2014, pp. 257-265. ProQuest, https://nclive.org/cgi- bin/nclsm?url=https://search.proquest.com/docview/1534137941?accountid=14197, doi:https://dx.doi.org/10.4103/0253-7613.132153. Costs of Animal and Non-Animal Testing. Humane Society International, www.hsi.org/issues/chemical_product_testing/facts/time_and_cost.html. Accessed 12 December 2018. Edwards, Sarah. Achieving Standards without Sacrificing My Own. Voices from the Middle, vol. 10, no. 1, 2002, pp. 31-34. ProQuest, https://nclive.org/cgi- bin/nclsm?url=https://search.proquest.com/docview/ 213932428?accountid=14197. Marinescu, Bogdan, and Cristin Coman. The Ethics of Animals Testing. Revista Romana De Bioetica, vol. 8, no. 3, 2010. ProQuest, https://nclive.org/cgi- bin/nclsm?url=https://search.proquest.com/docview/1286687152?accountid=14197. Miller, Sarah R. A. Animal Research. The Humanist, vol. 61, no. 5, Sep, 2001, pp. 15-18. ProQuest, https://nclive.org/cgi- bin/nclsm?url=https://search.proquest.com/docview/235290335?accountid=14197. Murnaghan, Ian. Replacement Of Animal Testing. Aboutanimaltesting.Co.Uk, 2018, https://www.aboutanimaltesting.co.uk/replacement-of-animal-testing.html. Accessed 14 Dec 2018. Newcomer, Kayla. Federal Government Funds Animal Testing, Animal Experiments | Global Animal. Global Animal, 2018, https://www.globalanimal.org/2013/10/07/guilty- government-practices/. Accessed 14 Dec 2018. Reducing Pain and Distress in Animal Research. The Scientist Magazine, www.the- scientist.com/news/reducing-pain-and-distress-in-animal-research-63445. A ccessed 12 December 2018. Running, Jeffrey A. Animal Testing Helps Protesters Live 20 Years Longer.Milwaukee Journal, Jul 27, 1990, pp. A08. ProQuest, https://nclive.org/cgi- bin/nclsm?url=https://search.proquest.com/docview/333434439?accountid=14197. Stachura, Sheree,R.N., B.S.N. Drug Safety: An Argument to Ban Animal Testing.Journal of Nursing Law, vol. 12, no. 4, 2008, pp. 147-156. ProQuest, https://nclive.org/cgi- bin/nclsm?url=https://search.proquest.com/docview/206506555?accountid=14197, doi:https://dx.doi.org/10.1891/1073-7472.12.4.147. The Truth about Animals Used for Experimentation. PETA, www.peta.org/issues/animals- used-for-experimentation/animal-testing-101/. Accessed 12 December 2018. Top Five Reasons to Stop Animal Testing. PETA, 20 Apr. 2018, www.peta.org/blog/top-five- reasons-stop-animal-testing/comment-page-1/.

Tuesday, May 12, 2020

What is a Social Order - 2162 Words

Social Order A social order may be defined as the consequence of any set of moral norms that regulates the way in which persons pursue objectives. The set of norms does not specify the objectives the participants are to seek, nor the pattern formed by and through the coordination or integration of these ends, but merely the modes of seeking them. Traffic rules and the consequent traffic order provide an obvious example. Any social system or any game may be viewed quite properly as an instance of social order, although the perspective of social order does not allow us to get at what is characteristically systematic about systems or what is game-like about games (Goffman 1963, p. 140). By its definition, social order is the term which refers to the structures and institutions which allow our society to continue functioning. It encompasses all the processes which must be put in place for the society to maintain its foundation and avoid breaking down into chaos. For decades, if indeed no t centuries, philosophers and sociologists have been attempting to identify exactly what social order consists of and what is most necessary to continue its presence in the community. Among the most successful and highly respected of these sociologists are Michel Foucault and Erving Goffman. Both men published well-received literature about the structures of social order and each presents a very different view of exactly what is necessary in order to for society to maintain that order.Show MoreRelatedWhat is Social Order? Essay examples1248 Words   |  5 Pagesand contrast two social science views about the ordering of social life. It will look at what social order is and how it effects our daily lives and explore the differences and similarities between the work of Erving Goffman and Michel Foucault. It will consider Buchanan’s and Monderman’s views on ordering public space to highlight Goffman’s focus on the way individuals interact with each other and Fouca ult’s emphasis on authoritative knowledge by authorities or experts. Social order is the term usedRead MoreTo what extent can the existence of social order be explained in term of the functionalist concept of value consensus?1672 Words   |  7 PagesSocial order can be defined as a stable system of s social institutions that bring about the regular patterns of shared,stable and predictable behavior.It refers to a set of linked social structures ,social institutions,social practices which conserve,maintain and enforce normal way of relating and behaving,Functionalist theory assumes that a certain degree of order and stability is essential for the survival of social systems.Without it,society may expose to chaos and disorder.An example showingRead MoreDrawing on What You Have Learned About City Road from the Making Social Lives Dvd and Learning Companion 1, Describe Some of the Ways in Which Order Is Made and Repaired on the Street Which You Know962 Words   |  4 PagesDrawing on what you have learned about City Road from the Making Social Lives DVD and Learning Companion 1, describe some of the ways in which order is made and repaired on the street which you know. The purpose of this assignment is to compare and contrast the social order of City Road with a local road to demonstrate how order is made and is continually repaired over time. Abington Street, has changed considerably over the past 50 years, from a quiet street of individually owned shops such asRead MoreCompare and Contrast Goffmans and Foucaults Explanation of How Social Order Is Made and Remade1727 Words   |  7 Pagesof How Social Order Is Made and Remade In:  Social Issues Compare and Contrast Goffmans and Foucaults Explanation of How Social Order Is Made and Remade Introduction * Whose theories of social order I will be using as the focus of my assignment. (Goffman and Foucault) Main Content * Goffmans views on what constitutes social order being made and remade through individuals, and how Mondermans’ Thesis relates to how Goffman views social order. * Foucaults’ views on what constitutes social orderRead MoreCompare and contrast the views of Goffman and Foucault on how social oreder is produced.1596 Words   |  7 Pagesthe views of Goffman and Foucault on how social oreder is produced. In a community some form of order is an essential foundation for people to live and interact together. ‘’Order is part of the way people both imagine and practise their social existence.’’ (Silva et al., 2009, p. 311) Taylor (2004, p.58) argued that ‘’ the human capacity to imagine order is at the foundation of society itself.’’ (Taylor, cited in Silva et al., 2009 p.311) Social order draw in imagination, practices, the fittingRead MoreCompare and Contrast Two Social Science Views about the Odering of Social Life1279 Words   |  6 Pages Without knowing it, social order is very important in everyday life. As Elizabeth Silva says ‘social order is a key principle of living together’ (Reflections on Ordered Lives, 2009, Audio). The ordering of social life can be looked at in many ways. However, two theories stand out when looking at the making of social order, that of Erving Goffman and Michel Foucault. Both of these theories are concerned with how society is produced and, more specifically, how social order is made and remade. WhileRead MoreEssay about Social Deviance1286 Words   |  6 PagesSocial Deviance Social deviance is a term that refers to forms of behavior and qualities of persons that others in society devalue and discredit. So what exactly is deviance? In this essay we are concerned with social deviance, not physiological deviations from the expected norm. In general, any behavior that does not conform to social norms is deviance; that is behavior that violates significant social norms and is disapproved of by a large number of people as a result. For societiesRead MoreSociological Analysis of Brothers Keeper656 Words   |  3 Pagesmembers of the society. It creates a distinction between the different forms of social orders that exist in the society. The movie revolves around the lifestyle of The Ward brothers who live in Munnsville; New York. The movie’s main theme tends to contrast two groups of people in the society. One group consists of people who come from the rural areas while the other group is that of people from the urban setting. The social norm of the people in the rural areas is based on simplicity and illiteracyRead MoreCompare and Contrast Goffman’s and Foucault’s Explanations of How Social Order Is Made and Remade1615 Words   |  7 PagesThere are many theories regarding how social order is produced and reproduced , but this essay will focus on the similarities and differences between the two contrasting accounts of how social order is produced, provided by Goffman and Foucault. Social order is the term used to describe the unspoken rules of conduct in everyday life, or a stable social situation in which connections are maintained without change or if change occurs it is in a predictable way. (Taylor, 2009, p. 173) These differingRead MoreWhat You Learned About Yourself And Your Profe ssional Development From Feedback886 Words   |  4 PagesLifelong Learning Consultation 11) Describe what you learned about yourself and your professional development from feedback given by your peers in the small group exercises. I learned from feedback given by my peers in my small group is that I am too critical of myself and the accomplishments I want to accomplish. I find that I judge myself harshly when I am not able to accomplish the goals I set for myself. My group made a comment that I need to have more self-compassion about the circumstances

Wednesday, May 6, 2020

The Legalization Of Sex Work - 940 Words

Just as much of the debate surrounding the decriminalization of sex work hinges on the treatment of sex workers, so, too, does it hinge on whether those entering the industry do so of their own free will or by force. It is inaccurate to claim that sex work is never a desirable option for its practitioners, but that it is, instead, a desperate last resort. The NSWP notes that although â€Å"our media†¦[is] full of stories about the horrors of prostitution†¦with sellers perpetually at the mercy of buyers,† their data shows that only a small portion of sex workers can be described as unwilling or victimized (Benoit et al). The collected data reveals that the average age of entry into the sex industry is 24 years old, and that 71% of interviewed sex workers sold a sexual service no earlier than the age of 19 (Benoit et al). When asked why they entered the field, many sex workers the NSWP interviewed cited the financial independence and flexible schedule that come with se x work as motivating factors. One sex worker notes that her job has been empowering in that it has provided her with more freedom to focus on her studies; though prostitutes claim benefits to their work, they also mention the various costs of sex work, such as the possibility that it will â€Å"close some doors to [their] future[s]† (Benoit et al). These statements should be carefully taken into account when considering decriminalization as they were made by sex workers themselves who will be most affected by any decisionsShow MoreRelatedDiscussing The Legalization Of Prostitution1604 Words   |  7 PagesKarina Sobreira Final Paper SOC 3561 04/19/2015 Discussing the Legalization of Prostitution To better discuss the legalization of prostitution there’s a need to know its definition. Legalization of prostitution is where prostitution becomes controlled by the government and becomes legal under specific conditions. Legalization may include prostitution-specific controls chosen by the state, which could include licensing, registration, and mandatory regular health checks ups. Prostitution has beenRead MoreThe Debate Over The Legalization Of Prostitution1551 Words   |  7 Pagescountries in the world, such as Brazil, Germany and Canada. Thus, the heated debate over the legalization of prostitution goes on in the U.S. There are proponents, who opposed to the legalized prostitution, believing that prostitution is simply immoral and should be considered a crime. But legalization would financial benefit local government, would promote public health and protect sex workers. Although the sex trade is illegal in most of the U.S, it is alive and runs well. According to the FederalRead MoreWhy Prostitution Should Be Legalized1411 Words   |  6 PagesWhy Prostitution should be legalized We hear about it in the news almost daily; sex workers were using Craigslist to post ads in the (former) erotic service section, others are soliciting on Back Page. Human trafficking rings are being discovered all throughout the United States. Massage parlors are being used as a front for housing prostitution. Whether we want to address it or not, this is a prevalent social issue in our society today. Researchers Christine Harcourt, PhD, Research Fellow for theRead MoreShould Prostitution Be Legalized?1283 Words   |  6 Pages Prostitution or commercial sex has always been a heavily debated topic around the world. The world’s oldest profession dating back to ca. 2400 BCE has been considered degrading for the dignity of a women and the feminist community. Critics claim that legalisation of prostitution can result in violence against women, human trafficking, exploitation etc. However, data collected from nations such as Germany and New Zealand, where the profession of commer cialized sex is legalized, reports an utterlyRead MoreThe Problem Of Sex Abuse Essay1519 Words   |  7 PagesShe was a sex worker and a mother of one. A recent law enforcement crackdown targeting sex workers led Mariana to work alone that night, rather than as usual with other women, to avoid arrest. She was also allegedly working late to pay a fine she had received for soliciting. Mariana’s tragedy is not uncommon. Sex workers are 400 times more likely to become a victim of homicide than the average worker. Current legislation regarding prostitution in the United States works directly against sex workersRead MoreThe Issue Of Legalization Of Prostitution1103 Words   |  5 Pageshaving sex in exchange for money.† In recent years, there has been speculation of the laws in place that criminalize prostitution. While there are advocates that want prostitution to be decriminalized, there are also advocates for the legalization. Decriminalization would simply repeal the la ws making prostitution illegal, whereas full legalization would allow the government to put regulations and safety requirements in place. The legalization of prostitution would insure the safety of sex-workersRead MoreThe Legal And Social Implications Of Prostitution1039 Words   |  5 Pagesdebated, a proper answer to its legalization or criminalization has not yet been defined in many countries throughout the world. While some view that â€Å"sex work† is a justifiable occupation that should be protected under human rights, others argue that it’s legalization would do more harm than good. According to the Health and Human Rights Journal (2014), the Russian Federation has little justification for its criminalization of sex work, and the vulnerability of sex worker’s demand for their protectionRead MoreThe Revolution Of New Orleans1453 Words   |  6 PagesHowever, the women sent were previous prostitution offenders in France, and chose to continue their jobs in the sex trade upon arrival. This marks the beginning of New Orleans future as the largest red light district in America, and one of the first roots of the sex trade in the United States (Grant). Women continued to be shipped to the colonies due to their small population, and the sex trade continued to grow. By 1852, Herbert Asbury wrote that â€Å"no country in the world was not represented in SanRead MoreProstitution, As Stated By The Oxford English Dictionary,1742 Words   |  7 Pagespower and control, both physically and emotionally, through unsafe environments and treating prostitutes as sex objects. As a matter of fact, if we lived in a perfect society everyone would be wealthy and this practice would not exist; however, this reality seems far-fetched. The world in which we live is not ideal and sex is not always accessible or consensual. Societies revolve around sex and, as a result of this, there will always be engagement in a sexual activity in exchange for remunerati onRead MoreShould Prostitution Be Legal? Essay1261 Words   |  6 Pagesneighborhoods, but should law enforcement be made to waste their time and effort to arrest those that may or may not be prostitutes? While some believe legalizing prostitution will only encourage more people to buy sex, making prostitution legal will protect those who work in the sex industry. The earliest mentions of prostitution date all the way back to the B.C. era. The Sumerian Records (2400 B.C.) and Hammurabi’s code (1780 B.C.) list female prostitution as one of the earliest professions and

Online Privacy as a Corporate Social Responsibility- an Empirical Study Free Essays

Business Ethics: A European Review Volume 20 Number 1 January 2011 Online privacy as a corporate social responsibility: an empirical study Irene Pollach Aarhus School of Business, University of Aarhus, Aarhus, Denmark Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility (CSR) agenda: online privacy. While theory suggests that online privacy is a CSR, only very few studies in the business ethics literature have connected these two. Based on a study of CSR disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a CSR. We will write a custom essay sample on Online Privacy as a Corporate Social Responsibility- an Empirical Study or any similar topic only for you Order Now The ? ndings indicate that only a small proportion of the companies have comprehensive privacy programs, although more than half of them voice moral or relational motives for addressing online privacy. The privacy measures they have taken are primarily compliance measures, while measures that stimulate a stakeholder dialogue are rare. Overall, a wide variety of approaches to addressing privacy was found, which suggests that no institutionalization of privacy practices has taken place as yet. The study therefore indicates that online privacy is rather new on the CSR agenda, currently playing only a minor role. Introduction Since the 1990s, companies striving to be good corporate citizens have had to devise strategies to address issues such as pollution, energy use, waste production, animal testing, child labor, sweatshops, workforce diversity, or advertising to children. It has become a de-facto standard for very large corporations to publish social reports documenting how they address these issues in the marketplace, the workplace, the supply chain, and the community in order to ful? ll their role as good corporate citizens (Snider et al. 2003). The advent of the Internet has not only revolutionized many business models but has also rede? ned what it means to be a good corporate citizen (Post 2000), as most of the above issues are of little relevance to companies dealing with data and technology. One issue of public concern that has become highly relevant for IT companies is online privacy (De George 2000, Johnson 2006). doi: 10. 1111/j. 1467-8608. 2010. 01611. x Information privacy denotes an individual’s right to decide what information is made available to others (Westin 1967). Privacy is thus guaranteed only if individuals know that data are collected about them and if they have control over this data collection and the subsequent use of the data (Foxman Kilcoyne 1993, Caudill Murphy 2000). In the United States, privacy-related legislation exists only for health care, ? ancial services, and children on the Internet (Bowie Jamal 2006), while many aspects of data collection and user control in electronic commerce are still unregulated (Fernback Papacharissi 2007). Countries of the European Union, meanwhile, protect privacy more strictly (Baumer et al. 2004), which has proven to be a hurdle for US technology companies operating in Europe. In 2008, for example, tec hnology giant Google encountered problems in several European countries with its data handling practices (O’Brien 2008). Despite legislative efforts in Europe, data privacy violations have occurred in a number of 88 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. , 9600 Garsington Road, Oxford, OX4 2DQ, UK and 350 Main St, Malden, MA 02148, USA Business Ethics: A European Review Volume 20 Number 1 January 2011 large organizations, including, for example, the largest German bank, DeutscheBank (Neate 2009), or T-Mobile UK (Wray 2009). The problems with privacy legislation are that it is dif? ult to identify violations of these laws and that the law may lag behind what is technologically feasible. For the above reasons, global companies have some discretion over how much privacy they grant users and how much they reveal about their data handling practices to their users. This discretion adds extra complexity to the moral issue of whether companies take advantage of their powerful position by collecting and using data from users to further their own business interests, for example by sending out unsolicited promotional e-mails or selling user data (Pollach 2005). The discretion companies can exercise when it comes to information privacy and the ethical implications of this discretion entail that information privacy is a question of corporate morality. While theoretical work on corporate social responsibility (CSR) suggests that privacy could be a meaningful addition to a corporate CSR program, little is known about corporate practices. This paper therefore sets out to explore whether and how companies whose core business is based on data and technology are embracing information privacy as a CSR. The ? dings suggest that information privacy is emerging as an element of CSR programs, but that there is a great deal of variety regarding the adoption of privacy as a CSR. The paper ? rst discusses the moral issues behind information privacy on the Internet, reviews the literature on corporate responses to people’s privacy concerns, and then looks at the literature on privacy as a CSR. After describing the sample and the methodology underlyin g this study, the results are presented and their implications are discussed. The ethics of information privacy The very core of electronic and mobile commerce revolves around technology, digitization, and the exchange of information, which poses a number of ethical problems (Zonghao 2001). A particular challenge to information handling in electronic commerce is the trade-off between collecting data for the sake of transparency and not collecting data for the sake of privacy (Introna Pouloudi 1999). Another challenge is the trade-off between collecting data for the sake of pro? ts and not collecting data for the sake of privacy. As commercial transactions on the Internet or through mobile phones are commonly based on credit-card payments and the shipment of goods to the buyer’s home address, the balance is tipped towards the need for disclosure rather than the safeguard of privacy. However, companies collect not only personally identifying information (PII) from transactions but also collect PII when users register themselves, use online services, participate in sweepstakes or surveys, or send inquiries to the company. In addition to PII, companies collect anonymous click-stream 1/2 data and compile anonymous user pro? es when Internet users navigate the companies’ websites (Kelly Rowland 2000). Through the collection of IP addresses, PII can also be combined with anonymous click-stream data in order to obtain very comprehensive user pro? les (Payne Trumbach 2009). The easier access to and increased mobility of data have made information a commodity that is bought and sold by data brokers (Sp inello 1998). It is therefore also possible for companies to buy datasets of user information from data brokers and merge them with the data they have collected themselves. Companies may use the data they collect from customers and visitors on their websites merely to execute transactions, recognize users when they return to the site, and improve their website design based on users’ interests. But companies may equally use such data for purposes other than those they were collected for. For example, they may target banner ads at users, harass users with unsolicited commercial e-mails, or share this information with third parties (Han Maclaurin 2002). A growing body of literature documents people’s concerns about privacy violations in online transactions (e. . Culnan Armstrong 1999, Phelps et al. 2000, Sheehan 2002, Norberg Horne 2007, Norberg et al. 2007). Essentially, these concerns stem from the imbalance in power between companies as data collectors and users as data providers. While companies have superior knowledge of what user data are collected and how they are r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 89 Business Ethics: A European Review Volume 20 Number 1 January 2011 handled, users may not even be aware that data are collected, let alone that they are combined into user pro? les. hus not suited to enhance user privacy or engender trust among Internet users. Corporate response to privacy At the turn of the century, some companies began to introduce chief privacy of? cers (Awazu Desouza 2004). Their tasks include gathering information about social and legal aspects of privacy, devising the company’s privacy strategy, disseminating information about corporate data handling practices to internal and external stakeholders, and representing the company’s commitment to privacy (Kayworth et al. 2005). Another corporate response to information privacy is privacy policies posted on commercial websites (Sama Shoaf 2002). The original idea behind privacy policies on websites was that companies would disclose how they handle the data they collect from users, while users would carefully read through the explanation of the company’s data handling practices, understand their consequences, and then make an informed decision about divulging personal data or not (Ciocchetti 2007). In reality, privacy policies contain legalese, tech-speak, and other obfuscating language patterns that obscure questionable data handling practices (Pollach 2005, Fernback Papacharissi 2007). Internet users have been found not to read privacy policies for the above reasons (Milne Culnan 2004). Privacy policies are sometimes supplemented with privacy seals awarded by private-sector institutions (e. g. BBBOnline, TRUSTe, WebTrust) or accounting ? rms. These seals indicate that companies comply with responsible standards of data handling, as de? ned by the awarding institution (Smith Rupp 2004). Consumers still have to read and understand the privacy policy, as the seal alone does not guarantee that the data handling practices of the company comply with an individual’s privacy preferences (Rifon et al. 2005). The problem with privacy seals is also that they do not effectively protect users from privacy breaches. The sealawarding institution may not know about a privacy breach or, if it does learn about it, can only revoke the seal, but has no means to help people regain lost privacy (Shapiro Baker 2001). These measures are Information privacy as a CSR Carroll (1979) categorized corporate social responsibilities into economic, legal, ethical, and philanthropic responsibilities, arguing that making a pro? t is the quintessential responsibility of companies, together with their adherence to legal regulations. According to this classi? ation, information privacy can be categorized as an ethical responsibility, given that legislation is insuf? cient to govern corporate decision making in all areas of data handling. This is elaborated on by Mintzberg (1983), who suggested that areas where CSR comes into play are those ‘where existing legislation needs compliance with its spirit as well a s its letter [and] where the corporation can fool its customers or suppliers or the government through its superior knowledge’ (p. 12). If a company decides to address information privacy, it may not just do so because privacy is an ethical corporate responsibility. Rather, Aguilera et al. 2007) argue that companies accept responsibility for social issues for three different reasons: (1) moral reasons determined by morality-driven values; (2) relational reasons driven by the company’s concern about stakeholder relationships; and (3) instrumental reasons driven by corporate self-interest. Moral motives are enacted particularly by individuals with organizational decision-making power who have strong morality-based values. Relational motives are grounded in a company’s desire to promote and balance stakeholder interests, thereby building trust, maximizing stakeholder wealth, and gaining social legitimacy (Aguilera et al. 007). Instrumental approaches are self-inter est driven, seeking to achieve greater competitiveness and protecting the corporate reputation (Aguilera et al. 2007). The latter approach corresponds to Jones’ (1995) argument that companies that manage to earn the trust of their stakeholders will be able to secure a competitive advantage through savings on monitoring costs, bonding costs, transaction costs, and search costs arising from managing the various corporate stakeholder groups. Instrumental motives 90 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. Business Ethics: A European Review Volume 20 Number 1 January 2011 can also be driven by the desire to preempt costly government regulations (Aguilera et al. 2007). The strategy literature follows the instrumental approach to CSR, arguing that companies to which a particular responsibility is highly relevant can bene? t from integrating this responsibility into their overall strategies. Burke Logsdon (1996) list the following conditions in order for CSR to bring strategic advantages to the ? rm: the chosen CSR issue is central to the company’s mission, is voluntarily embraced, brings bene? s to both the ? rm and to the public at large, is addressed in a proactive manner, and is visible to external stakeholders. It has also been argued that CSR initiatives can bring sustainable competitive advantages in the form of a ? rst-mover advantage (Lieberman Montgomery 1998). However, for this advantage to emerge, the company must not only be the ? rst one to address a particular CSR comprehensively but must also continuously seek to enhance what it has achieved in order to secure this advantage (Tetrault Sirsly Lamertz 2008). The strategy literature therefore suggests that companies in the information technology industry could bene? t from embracing online privacy as a CSR, especially if they make this commitment visible to external audiences. Although theory suggests that privacy could be a relevant CSR theme for particular companies, very few empirical studies have addressed the link between information privacy and CSR. They include Sharfman et al. ’s (2000) survey among managers on how important they consider a number of social issues, including the protection of privacy. However, in the exploratory factor analysis they conducted, privacy was eliminated from further analyses. Fukukawa Moon (2004) included information privacy as an indicator of CSR in their study of CSR activities reported by companies in Japan. In addition, Chaudhri’s (2006) case study of global citizenship at Hewlett-Packard mentions privacy as one area the company has included in its CSR agenda. In previous theoretical work, Carroll (1998) has highlighted the protection of online privacy rights as one area where the law lags behind ethical thinking and morality comes into play. Finally, Post (2000) examined the changing role of corporate citizenship in the 21st century and pointed to customer privacy as a new issue of CSR. To date, there is no article that empirically studies in what ways information privacy is actually addressed as a CSR. Research design This study explores whether and how companies are embracing online privacy as a social responsibility, focusing on what measures they claim to have taken and how they communicate these to their external stakeholders in their CSR disclosures. In view of the lack of previous research in this area, this study is exploratory in nature. Accordingly, its goal is to identify the variety of corporate practices rather than to compare and contrast companies. The starting point for the analysis are the three processes of CSR included in Basu Palazzo’s (2008) process model of sense-making: (1) the reasons a company states for engaging in speci? c CSR activities, (2) the kind of behavior a company displays to live up to its CSR commitments, and (3) the way in which a company regards its relationships with its stakeholders. This section ? rst describes the sample and the data and then goes on to explain the methodology that was applied to analyze the data. Sample The sample consists of the largest companies from IT-related industries, as they are most closely intertwined with information through the hardware, software, or services they provide. To them, information privacy could be a meaningful strategic element of their CSR programs in two different ways. First, they may embrace privacy as a social responsibility in the way they collect and use data. Second, technology does not just violate privacy, it can also enhance privacy. Accordingly, IT companies may engage in corporate social innovation and develop privacy-enhancing products or commit themselves to educating consumers about privacy protection. Clearly, other large companies, such as retailers, operate online as well, but were not considered for this study, as data and information are not at the core of their activities. Large companies were chosen, as these companies are believed to serve as lead innovators in their industries. All IT-related companies from Europe 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 91 Business Ethics: A European Review Volume 20 Number 1 January 2011 and the United States listed among the Fortune Global 500 and the ? rst 1,000 companies of the Forbes 2000 company rankings were included in the sample. Neither of the two rankings includes ‘information technology’ as an industry. Rather, both incl ude a number of industries that deal with information and technology. These include Computer and Data Services, Computer Software, Computers Of? e Equipment, Network and Other Communications Equipment, and Telecommunications from the Fortune Global 500 list and Software Services, Technology Hardware Equipment, and Telecommunications Services from the Forbes 2000 list. A few IT companies listed in these two rankings could not be included in the analysis, as they had been acquired by another company since the publication of the rankings. Also, the two rankings overlap to a substantial extent, so that the ? nal sample amounted to a total of 95 IT companies. On each company’s website, the CSR section was accessed. If there was no such section, sections dedicated to the company background, mission and values, or ethics were accessed. The goal was to download all texts pertaining at least loosely to CSR and, if available, the latest CSR report. An important criterion was that privacy-related information was collected only if it was framed as a CSR issue. Privacy policies, which are a standard element of every commercial website, were not collected, as their existence alone does not represent a commitment to social responsibility. Of the 95 companies in the initial sample, 30 companies mention privacy in their CSR discourse. The analysis is thus based on these companies (see Appendix A). Their texts range from 21 to 2,367 words in length. Methods This exploratory study draws on both a positivist approach and a constructivist approach in order to look at the data as holistically as possible (cf. Jick 1979). When studying textual data, the fundamental difference between the two traditions is that the positivist tradition sees language as a transmitter of information, while the social constructionist tradition holds that people consciously and unconsciously create social realities when they use language. Accordingly, the textual data were ? st studied using quantitative content analysis, which systematically records the frequency of particular content features. Because of its quantitative, systematic nature, content analysis de-contextualizes the words from the discourse that is examined and therefore has no means to interpret its ? ndings within a wider context. The ? ndings of the content analysis were th erefore combined with a discourse analysis and are presented together. The combination of content analysis and discourse analysis has also been suggested by researchers in linguistics (van Dijk 1985, Herring 2004), sociology (Markoff et al. 974), and information systems (Trauth Jessup 2000). In this study, the results of both analyses together provide a much richer picture of corporate practices than one analysis alone could furnish. This is important, given the absence of previous research on privacy and CSR. Content analysis systematically condenses texts into content categories by applying a coding scheme that produces quantitative indices of textual content (Krippendorff 1980, Weber 1985, Kolbe Burnett 1991, Neuendorf 2002). The content analysis conducted as part of this study records in a systematic and exhaustive manner which companies in the sample have implemented which measures to improve user privacy. The approach chosen for this analysis uses factual codes, which capture precisely de? ned facts, as opposed to thematic codes, which capture themes addressed in a prede? ned textual unit (Kelle Laurie 1995). The factual codes pertain to privacy measures companies have actually taken, but exclude those that companies plan to implement in the future. With no existing coding scheme available, a preliminary coding scheme was developed from the data by examining the texts in the sample inductively (cf. Strauss Corbin 1990) for measures that companies have taken to secure user privacy. Overall, 41 different measures were identi? ed. The measures were recorded dichotomously as being either present (1) or absent (0). They are listed in Table 2 together with the results. The qualitative approach chosen here was discourse analysis, following a social constructionist tradition, which views discourse as a social action that is shaped by and shapes the context in which it occurs (van Dijk 1997a). Discourse analysis is a 92 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. Business Ethics: A European Review Volume 20 Number 1 January 2011 method of textual analysis that focuses on how and why language is used in a particular way (van Dijk 1997b). It is based on the premise that people intentionally and unintentionally construct social realities when they engage in discourse. They use language in their roles as members of particular social groups, professions, institutions, or communities but also construct such roles when they use language in social situations (van Dijk 1997a). Similarly, organizational texts can be constructive and constitutive of realities just like text or speech of individuals (Fairclough 2005). Discourse analysis typically pays attention to language features such as repetitions, pronouns, passive voice, nominalizations, modal verbs, agent–patient relations in sentences, and attitudinal lexis in order to study the roles assigned to the participants in the discourse, the power relations between them, and the foregrounding or the backgrounding of concepts and events. The discourse analysis conducted here examines how companies present themselves as responsible companies when it comes to privacy and data handling. Basu Palazzo’s (2008) process model of CSR has guided the analysis and therefore also provides the structure of the results section. Accordingly, the results section starts with the companies’ reasons for including privacy in their CSR programs, then presents privacy measures companies have taken as part of their CSR initiatives, and ultimately studies the relationships with the various stakeholders that are affected by the company’s privacy practices. The reasons for including privacy and the stakeholder relationships are analyzed in the form of a discourse analysis. The analysis of the privacy measures is based on a content analysis, but enhanced with qualitative insights, as needed. Aguilera et al. ’s (2007) classi? cation of moral, relational, and instrumental CSR motives. Table 1 shows this categorization together with the text passages where these motives were expressed. The moral motives found include the understanding that Internet users have privacy rights, which the company wants to observe, and the acknowledgement that the company has the responsibility to protect the data they gather from Internet users. Relational motives include the recognition that customers have a desire for privacy, which the company seeks to meet, and the expectation that privacy protection will help the company win customers’ trust. Ultimately, one company expects to bene? t from its privacy program in that it expects to gain a reputational advantage from privacy protection. CSR behavior The content analysis revealed 41 different measures companies had taken to support user privacy (see Table 2). They have been grouped into four categories, which are discussed below. One company has implemented 19 of these measures, and nine companies have implemented eight, nine, or 10 different measures. At the other end of the spectrum, there are two companies that have not implemented a single measure, but still talk about privacy in the context of CSR. Further, eight companies have implemented one or two measures, and nine companies have implemented between three and seven measures. Most commonly, a measure was taken by only one company (19 measures) or two companies (six measures). The measure taken most frequently was taken by 15 companies. Thus, there is a broad variety in how companies address privacy. It is also worth noting that it is not necessarily the biggest companies in the industry that have taken lead roles in protecting user privacy. When ranking all companies according to their ranks on the Forbes 2000 and the Fortune Global 500 lists, one can see that the company with the highest number of privacy measures ranks among the top three on both the Forbes and the Fortune list. The other two companies among the top three in the Fortune and Forbes rankings have implemented only one and three measures, respectively. The three companies Results Reasons for privacy as CSR The texts were examined for indications of why the companies include privacy in their CSR programs. Only 13 companies voiced their motivation for engaging in privacy protection, presenting different reasons why they engage in CSR. The communicated motives have been grouped according to r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 3 Business Ethics: A European Review Volume 20 Number 1 January 2011 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Table 1: Communicated motives for corporate privacy programs Motive Moral Explanation Three companies acknowledge that people have a right to privacy Quotations ‘To us, the right to privacy includes the right of individuals to have a voice in the use and dissemination of their personal information. ‘A person has the right to control what information about him or her is collected and to determine how that information is used. ’ ‘Con? dentiality and security of consumer data . . . are areas safeguarded by PT in order to respect the freedom and basic rights of each individual’ ‘We feel a strong responsibility to help ensure a safer, more enjoyable Internet, while addressing the challenges to privacy and security posed by today’s new media. ’ ‘Companies have a responsibility to ensure that the information they hold about their customers and employees is protected, stored, transferred, and used in a responsible manner. ‘Microsoft takes seriously its responsibility to help ad dress the security and privacy challenges of the information-based society, from viruses and spyware to spam and online identity theft. ’ ‘Respect for privacy is part of our commitment to observe high standards of integrity and ethical conduct in all our operations’ ‘Protecting our customers’ privacy is a priority. We understand and respect your desire to protect your personal information. ’ ‘The protection of personal information is a very high expectation among our customers, and to meet it, we . . .. ‘Externally, Sabre is committed to building customer relationships based on trust, and that includes recognizing the importance of protecting personal information. ’ ‘Consumer trust and con? dence is critical to Cisco’s business and to any technology and Internet-related business; as a result, the industry must protect citizens’ privacy. ’ ‘[We] have to acquire a ‘license to operate†™ by conducting our business in a decent and responsible way. ’ ‘Security and reliability form the basis of Telekom Austria Group’s stable and successful customer relationships. The Group therefore gives top priority to protecting the integrity and con? dentiality of sensitive data. ’ ‘Main opportunities: Enhance customer and employee trust, . . . support brand/reputation. ’ Four companies hold that they have a responsibility to protect the data they gather from Internet users Relational Two companies recognize that customers have a desire for privacy that needs to be met Four companies view privacy protection as a means to winning customer trust Instrumental One company states that it expects to gain a reputational advantage from its privacy program †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. that have implemented the second highest number of privacy measures occupy ranks #77, #87, and #173 on the Fortune Global 500 list and ranks #49, #518, and #782 on the Forbes 2000 list, which indicates that it is not necessarily the biggest companies in the IT industries that embrace information privacy. An investigation of the relationship between the number of measures taken and length of the privacy text on the corporate website revealed a correlation of 0. 77. This suggests that text length is an indicator of how important the issue is to a company. At the same time, it also shows that the companies generally do not talk at length about privacy without having taken relevant measures. One category of measures pertains to the companies’ internal affairs. They address processes, employee conduct, and, to a small extent, suppliers. The measures mentioned most frequently are the 94 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. Business Ethics: A European Review Volume 20 Number 1 January 2011 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Table 2: The content of corporate privacy programs Internal Physical protection of data Procedural/administrative protection of data Electronic/technical protection of data Privacy policy Privacy is part of the code of conduct Privacy of? e(r) Privacy board/working group Employee training Disciplinary action for employee misconduct Privacy newsletter for employees Employee monitoring Privacy included in employment contract Online resources for employees Ethics hotline for privacy questions Internal privacy campaign Limited employee access to data Online reporting of privacy incidents Regular review of systems and processes Regular review of privacy policy Binding third parties to privacy agreements Reviewing third-party privacy practices Privacy newsletter for customers Guidance/information for consumers Resources for parental control child safety Privacy e-mail address Integrating privacy into product development Privacy blog Involving stakeholders in design of privacy policy Supporting IS education at schools and universities Publishing privacy research papers Supporting law making Supporting industry self-regulation Working with industry Working with governments Working with NGOs, think tanks Political action committee (PAC) Compliance with laws Exceeding laws Compliance with Safe Harbor Compliance with GRI Privacy seal 6 2 3 15 8 7 3 9 1 1 1 1 1 1 1 3 1 5 3 5 2 1 10 5 2 8 1 1 1 1 2 1 5 6 10 1 11 1 4 1 4 79 External 30 Collaborations 25 Compliance 21 â € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. existence of a privacy policy and privacy training, privacy being part of the code of conduct, privacy of? cers, physical data protection, and regular review of systems and processes. All other measures taken internally were taken by one, two, or three companies each, for example measures encouraging employees to report privacy violations and to comply with relevant guidelines. Two different measures pertaining to suppliers or other third parties were identi? ed, namely that the company reviews privacy practices of those partners and that these outsiders are bound to a privacy agreement. The second category of measures contains those directed towards external stakeholders. They include r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 95 Business Ethics: A European Review Volume 20 Number 1 January 2011 primarily guidance for consumers regarding Internet privacy. Five companies take measures that address parents’ concerns about their children’s privacy. In addition to providing information, companies also solicit consumer feedback on privacy matters. Two companies highlight that they have an e-mail address to which people can send privacy concerns and inquiries, and one company involves stakeholders in the design of its privacy policy. The inclusion of privacy considerations in product development was embraced by eight companies. Another group of measures pertain to the participation in industry initiatives and collaborations. Ten companies mention a variety of privacy forums, centers, associations, think tanks, and institutes in which they are involved, including for example, the Electronic Privacy Group, the European Privacy Of? cers Forum, or the Liberty Alliance. Some of them also state that they cooperate with other companies and governments. However, the nature of this cooperation remains unclear, and in some places, the cooperating institutions are not even mentioned. Ultimately, a few US companies express their views on privacy legislation. As part of the measures they have taken, three companies take an active stance for either privacy legislation or self-regulation. Both of these viewpoints are visions at this point, as there is neither privacy legislation nor a functioning model of self-regulation in the United States. The two viewpoints are as follows: ‘We also believe that governments must ? nd improved ways to enforce laws against data breach, misuse and fraud, and help consumers pursue those who mishandle their personal information. . . . HP was one of the ? rst companies to embrace the idea of a comprehensive U. S. privacy law. ‘Because disparate and multiple privacy rules place a heavy burden on global companies, we support a model of industry self-regulation (as opposed to government intervention) in which innovative tools give consumers greater choice in both protecting their personal data and understanding how it may be co llected and used. ’ they comply with all relevant privacy laws. As compliance with laws is a legal rather than an ethical responsibility according to Carroll’s (1979) classi? cation of corporate responsibilities, only going beyond the law can qualify as a CSR initiative. Dressing up a legal responsibility as an ethical responsibility casts doubt over the sincerity of these efforts. In fact, one of these 11 companies has implemented no other privacy measure apart from legal compliance. There is only one company that vows to exceed legal requirements: ‘HP is pioneering an approach to the protection and responsible use of personal information. This effort goes beyond compliance with the law. ’ Only a minority of companies have adopted the privacy standards of outside organizations, such as GRI or privacy seal programs. Stakeholder relationships The measures identi? ed above relate to a number of internal and external stakeholder groups, including employees, consumers, parents, industry, suppliers, governments, advocacy groups, and the community at large. However, the analysis of the measures does not reveal anything about the relationships with stakeholders, and in some cases, the stakeholder group to which a particular measure was addressed was not even mentioned. This section therefore focuses speci? cally on the stakeholder groups to which the companies express some form of consideration. This could be in the form of protection measures, information provision, cooperation, or merely by expressing an awareness of their stakes in privacy. In addition to an account of these overt commitments to stakeholders, a discourse analysis is used to uncover discursively constructed relationships with stakeholders. Table 3 lists the various stakeholder groups identi? d, together with their stake in privacy, the number of companies that made a commitment toward each stakeholder group, and an example of such a commitment. This table is different from the results presented in Table 2 in that it was not concrete actions that guided this analysis, b ut the awareness of stakeholder concerns. We ? nd that companies recognize primarily the stakes of their customers and employees, who exercise a direct and economic in? uence on the company and can therefore be labeled Even companies that do not take a stance on the legislation vs. self-regulation debate emphasize compliance with legislation. Eleven companies state that 96 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. Business Ethics: A European Review Volume 20 Number 1 January 2011 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Table 3: Addressing stakeholder concerns Stakeholder GroupStake # Primary Customers/ Protection of 25 Users their data Employees Suppliers/ Vendors Training Gu idelines 14 6 Example ‘In order to help our customers address these issues, we have begun to develop guidance documents to help customers understand which parts of our technology may have privacy applications. ‘We work hard to ensure that Sun employees have the information they need to apply our privacy protection standards in their work. ’ ‘When it is necessary for business reasons to share a person’s information with third parties such as network service providers and marketing campaign partners, we work together to ensure that we maintain the highest privacy standards. ’ ‘We met with government of? cials and regulators in all regions to understand their concerns and initiatives and to help them fully appreciate the potential implications for privacy of new technologies. ’ ‘We are working with other industry participants . . . to develop solutions that help us reach both of these objectives. ‘In 2007, we formed our St akeholder Advisory Council (SAC) comprising respected experts from a variety of nongovernmental organizations. ’ ‘Symantec is committed to helping parents keep their kids cybersafe. We believe that in the same way that we educate our children about the risks of drugs, smoking, or violence, it is critical that we educate them about the importance of safe computing. ’ ‘We tap this internal resource to offer programs that bene? t our local schools and communities. We are also in the process of implementing an employee-led education program. ’ Secondary Government Industry Advocacy groups Parents Compliance with laws; expertise in data handling Cooperation Cooperation 6 6 3 Protection of 5 their children’s data Expertise 1 Schools/ communities †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ‘primary stakeholders’ according to Ansoff (1965). However, there are also companies that talk about privacy in a CSR context, but do not voice a commitment to these two primary stakeholder groups. Of the 30 companies, ? ve do not state that they do anything to improve the privacy situation of their customers and 16 do not make such a commitment toward their employees. Suppliers, who are also primary stakeholders, are addressed to a smaller extent. We can also see that the companies in the sample largely neglect their secondary stakeholders, i. e. those groups who do not directly in? uence a company’s core business (Ansoff 1965). Only a maximum of six companies interact with each secondary stakeholder group, such as parents or governments. On the surface, all companies studied engage in a discourse characterized by care and concern for privacy. In particular, emotion-laden words like help, understand, respect, concern, and safe abound across all texts studied. For example: ‘Protecting our customers’ privacy is a priority. We understand and respect your desire to protect your personal information. ’ ‘And as the 24 A 7 demands of the Internet Age threaten to overwhelm customers with complexity, they need trusted and reliable companies to help them make sense of technology and put it to use to make their lives better. ’ The tone becomes even more concerned when companies address their relationship with parents and children: ‘We understand the responsibility and concern of parents who worry about their children’s exposure to inappropriate content and potentially dangerous interactions on the Web. ’ ‘Protecting our children . . . We believe that in the same way that we educate our children about the risks of drugs, smoking, or violence, it is critical r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 97 Business Ethics: A European Review Volume 20 Number 1 January 2011 that we educate them about the importance of safe computing. ’ In the second example, the pronoun ‘we/our’ adds to the concerned tone by promoting a sense of collegiality and shared affection. The same is also achieved in other places, when companies use this inclusive form of ‘we’ to reduce the distance between themselves and their outside stakeholders: ‘Our individual sensitivities about how our information is treated . . . are not uniform’ or ‘Sun is committed to investigating and addressing the privacy challenges . . . associated with our increasingly digital way of life. ’ In such statements, companies reduce the power distance between themselves and their stakeholders. The inclusive ‘we’ is also an indicator of positive politeness (Brown Levinson 1987), indicating how writers conceptualize their audiences and what kind of distance writers create between themselves and their audience. While some companies use the inclusive ‘we,’ others talk about companies in general, e. g. ‘all businesses are responsible for . . . ,’ which includes themselves only implicitly and distances themselves from these events. Mostly, though, companies make themselves the causal agents: ‘we must address these concerns by helping to protect . . .. ’ Notably, one company draws its audiences into the discourse by always addressing them directly, e. g. ‘We understand and respect your desire to protect . . .. ’ All together, the different voices present in these texts suggest that companies have different levels of self-awareness and different understandings of their role in this process. Less variety exists in the distance to the audience, which is – apart from one exception – not explicitly present in the discourse. This suggests that companies do not consider their CSR activities to be dialogic in nature. Another kind of discourse is found in 10 of the companies’ texts studied. This discourse reveals that some companies are actually interested in ? nding a balance between users’ privacy interests and their own business interests rather than protecting privacy unconditionally. They seek to achieve a balance between customers’ privacy interests and ‘business priorities,’ ‘business requirements,’ ‘business needs,’ their ‘values,’ or their ‘ability . . . to reap the bene? ts of online interactions. Business interests are also communicated implicitly: ‘our goal is simple: to balance the interests and concerns of our customers’ private information with their interest in receiving quality service and information about useful new products. ’ Alternatively, one company mentions only one weight of the balance, without saying what the other weight is: ‘that we are striking the right balance for our customers’ and ‘to reach balanced results. ’ The discourse of balance is a manifestation of the companies’ power, given that it is they who decide when this balance is reached. Interestingly, this kind of discourse has nothing to do with the motivations they express. Two companies, for example, have voiced moral motives, but also engage in this discourse of balance, as does the one company that has indicated an instrumental motive. It is also worth noting that not a single European company in the sample engages in this discourse of balance. Discussion The literature review has highlighted that users are concerned about privacy and that companies do not respond in a manner that eases stakeholder concerns. The companies chosen for this study are all active in the hardware, software, or telecommunications industries, in which data play a crucial role. Thus, information privacy, and in particular online privacy, is a central issue in their business conduct. The content analysis has revealed that only a small proportion of the largest IT companies comprehensively address privacy as a social responsibility. In the sample, we ? nd both companies that have taken a number of relevant actions to address user privacy and companies that have only taken one or two concrete measures, but nevertheless present privacy as part of their CSR program. A substantial proportion of the measures they have taken fall into the area of compliance and employee conduct (e. g. guidelines, policies, monitoring, and reporting), while measures that stimulate a stakeholder dialogue or represent corporate social innovation are found less frequently. Further, some companies reveal that they seek to strike a balance between their own business interests and their stakeholders’ privacy needs. The sample even contains companies that 98 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. Business Ethics: A European Review Volume 20 Number 1 January 2011 voice moral motives for framing online privacy as a CSR, while at the same time indicating that they are interested in striking a balance between users’ privacy interests and their own business interests. We have also seen that some of the privacy measures are actually intended to ful? ll legal responsibilities rather than ethical ones. Thus, some companies in the sample voice concerns and a commitment to help, but do not take privacy to the level of an ethical responsibility (cf. Carroll 1991). At the same time, companies load their privacy discourse with emotive terms suggesting concern, commitment, and a desire to help. While this kind of language is typical of CSR messages and can almost be expected (cf. Pollach 2003), it is still in contrast to the results of the content analysis, which has shown that comprehensive privacy programs are for the most part non-existent. The ? ndings also indicate that companies have chosen a wide variety of approaches to information privacy. In fact, many of the different measures denti? ed were taken by one, two, or three companies only. Thus, little mimicry and no institutionalized practices have emerged yet. In uncertain environments, companies have a tendency to model themselves after other companies that are more successful or more respected. This mimicry leads to institution alized practices that help companies to obtain legitimacy (DiMaggio Powell 1983). The environment in which the sample companies operate can be characterized as uncertain, as there is no comprehensive privacy legislation as yet and privacy is, to some extent, at each company’s discretion. For mimicry behavior to occur, it must be clear to the ? m that adopting a certain practice brings competitive advantages (DiMaggio Powell 1983). In the case of privacy, an institutionalization of voluntary privacy practices could mean that privacy regulation is preempted. However, as not every company in the sample, and maybe in the industry as a whole, is pro self-regulation, some companies may decide not to adopt privacy practices voluntarily, despite the fact that they care about user privacy. Privacy may be on its way to mature from the ethics/compliance focus to a more responsive, proactive focus, but at the moment, it plays a minor role as a CSR. This point is also re? ected in the ? nding that companies address primarily consumer oncerns and step up employee training, while all other stakeholder groups in privacy play a subordinate role. Companies may not have recognized the bene? ts to be gained from engaging with secondary stakeholder groups, e. g. from cooperating with industry partners. At the same time, companies may have been too occupied with implementing privacy standards internally, so that their privacy efforts do not involve secondary stakeholders as yet. These internal compliance measures are clearly the sine qua non for a company’s external privacy activities, such as participation in industry initiatives. This study is not without limitations. One clear limitation is that the data stem from corporate selfreports, which are problematic (cf. Podsakoff Organ 1986) in that they are based on what the company reveals rather than what is actually true. This could mean that companies overstate their activities. At the same time, companies may not have mentioned the particular measures they have taken, because they did not consider them important enough. Also, the sample size could have been larger, but the small sample size also serves to illustrate that privacy is just about to begin to play a role in CSR programs of technology-oriented companies. APPENDIX A: COMPANIES Adobe Agilent ATT Belgacom British Telecom Cisco Computer Associates Dell Deutsche Telekom Electronic Data Systems France Telecom HP IBM Microsoft Motorola Nokia Oracle IN THE SAMPLE 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 99 Business Ethics: A European Review Volume 20 Number 1 January 2011 Portugal Telekom Royal KPN Sabre Sprint Sun Symantec Telefonica Telekom Austria Telia Sonera Verizon Virgin Vodafone Xerox Refe rences Aguilera, R. V. , Rupp, D. , Williams, C. A. and Ganapathi, J. 2007. ‘Putting the S back in CSR: a multilevel theory of social change in organizations’. Academy of Management Review, 32:3, 836–863. Ansoff, I. 1965. Corporate Strategy. New York, NY: McGraw-Hill. Awazu, Y. and Desouza, K. C. 2004. ‘The knowledge chiefs: CKOs, CLOs and CPOs’. European Management Journal, 22:3, 339–344. Basu, K. and Palazzo, G. 2008. Corporate social responsibility: a process model of sensemaking’. Academy of Management Review, 33:1, 122–136. Baumer, D. L. , Earp, J. B. and Poindexter, J. C. 2004. ‘Internet privacy law: a comparison between the United States and the European Union’. Computers and Security, 23:5, 400–412. Bowie, N. and Jamal, K. 2006. ‘Privacy rights on the internet: self-regulation or government regulation? ’. Business Ethics Quarterly, 16:3, 323–342. Brown, P. and Levinson, S. C. 1987. Politeness. Cambridge: Cambridge University Press. Burke, L. and Logsdon, J. M. 1996. ‘How corporate social responsibility pays off’. Long Range Planning, 29:4, 495–502. Carroll, A. B. 1979. A three-dimensional conceptual model of corporate performance’. Academy of Management Review, 4:4, 497–505. Carroll, A. B. 1991. ‘The pyramid of corporate social responsibility: toward the moral management of organizational stakeholders’. Business Horizons, 34:4, 39–48. Carroll, A. B. 1998. ‘The four faces of corporate citizenship’. Business and Society Review, 100:1, 1–7. Caudill, E. M. and Murphy, P. E. 2000. ‘Consumer online privacy: legal and ethical issues’. Journal of Public Policy and Marketing, 19:1, 7–19. Chaudhri, V. A. 2006. ‘Organising global CSR: a case study of Hewlett-Packard’s e-inclusion initiative’. Journal of Corporate Citizenship, 23, 39–51. Ciocchetti, C. A. 2007. E-commerce and information privacy: privacy policies as personal information protectors’. American Business Law Journal, 44:1, 55–126. Culnan, M. J. and Armstrong, P. K. 1999. ‘Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation’. Organization Science, 10:1, 104–115. De George, R. T. 2000. ‘Business ethics and the challenge of the information age’. Business Ethics Quarterly, 10:1, 63–72. DiMaggio, P. J. and Powell, W. W. 1983. ‘The iron cage revisited: the institutional isomorphism and collective rationality in organizational ? elds’. American Sociological Review, 48:2, 147–160. Fairclough, N. 2005. Critical discourse analysis, organizational discourse, and organizational change’. Organization Studies, 26:6, 915–939. Fernback, J. and Papacharissi, Z. 2007. ‘Online privacy as legal safeguard: the relationship among consumer, online por tal, and privacy policies’. New Media and Society, 9:5, 715–734. Foxman, E. R. and Kilcoyne, P. 1993. ‘Information technology, marketing practice, and consumer privacy: ethical issues’. Journal of Public Policy and Marketing, 12:1, 106–119. Fukukawa, K. and Moon, J. 2004. ‘A Japanese model of corporate social responsibility? A study of website reporting’. Journal of Corporate Citizenship, 16, 45–59. Han, P. and Maclaurin, A. 2002. Do consumers really care about online privacy? ’. Marketing Management, 11:1, 35–38. Herring, S. C. 2004. ‘Computer-mediated discourse analysis: an approach to researching online behavior’. In Barab, S. A. , Kling, R. and Gray, J. H. (Eds. ), Designing For Virtual Communities in the Service of Learning: 338–376. New York, NY: Cambridge University Press. Introna, L. D. and Pouloudi, A. 1999. ‘Privacy in the information age: stakeholders, interests and valuesâ€℠¢. Journal of Business Ethics, 22:1, 27–38. 100 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. Business Ethics: A European Review Volume 20 Number 1 January 2011 Jick, T. D. 1979. Mixing qualitative and quantitative methods: triangulation in action’. Administrative Science Quarterly, 24, 602–611. Johnson, D. 2006. ‘Corporate excellence, ethics, and the role of IT’. Business and Society Review, 111:4, 457–475. Jones, T. M. 1995. ‘Instrumental stakeholder theory: a synthesis of ethics and economics’. Academy of Management Review, 20:2, 404–437. Kayworth, T. , Brocato, L. and Whitten, D. 2005. ‘What is a chief privacy of? cer? ’. Communications of AIS, 16, 110–126. Kelle, U. and Laurie, H. 1995. ‘Computer use in qualitative research and issues of validity’. In Kelle, U. (Ed. ), Computer-Aided Qualitative Data Analysis. Theory, Methods and Practice: 19â₠¬â€œ28. London: Sage. Kelly, E. P. nd Rowland, H. C. 2000. ‘Ethical and online privacy issues in electronic commerce’. Business Horizons, 43:3, 3–12. Kolbe, R. H. and Burnett, M. S. 1991. ‘Contentanalysis research: an examination of applications with directives for improving research reliability and objectivity’. Journal of Consumer Research, 18:2, 243–250. Krippendorff, K. 1980. Content Analysis: An Introduction to its Methodology. Beverly Hills, CA: Sage. Lieberman, M. B. and Montgomery, D. B. 1998. ‘Firstmover (dis)advantages: retrospective and link with the resource-based view’. Strategic Management Journal, 19:12, 1111–1125. Markoff, J. , Shapiro, G. and Weitman, S. R. 1974. Toward the integration of content analysis and general methodology’. In D. Heise (Ed. ), Sociological Methodology: 1–58. San Francisco, CA: Jossey-Bass. Milne, G. R. and Culnan, M. J. 2004. ‘Strategies for reducing online privac y risks: why consumers read (or don’t read) online privacy notices’. Journal of Interactive Marketing, 18:3, 15–29. Mintzberg, H. 1983. ‘The case for corporate social responsibility’. Journal of Business Strategy, 4:2, 3–15. Neate, R. 2009. ‘Deutsche Bank admits possible privacy breaches. ’ The Telegraph, July 23. Neuendorf, K. A. 2002. The Content Analysis Guidebook. Thousand Oaks, CA: Sage. Norberg, P. A. and Horne, D. R. 2007. ‘Privacy attitudes and privacy-related behavior’. Psychology and Marketing, 24:10, 829–847. Norberg, P. A. , Horne, D. R. and Horne, D. A. 2007. ‘The privacy paradox: personal information disclosure intentions versus behaviors’. Journal of Consumer Affairs, 41:1, 100–126. O’Brien, K. J. 2008. ‘Privacy laws trip up Google’s expansion in parts of Europe. ’ New York Times, November 18. Payne, D. and Trumbach, C. C. 2009. ‘Data mining: proprietary rights, people and proposals’. Business Ethics: A European Review, 18:3, 241–252. Phelps, J. , Nowak, G. and Ferrell, E. 2000. ‘Privacy concerns and consumer willingness to provide personal information’. Journal of Public Policy and Marketing, 19:1, 27–41. Podsakoff, P. M. and Organ, D. W. 1986. ‘Self-reports in organizational research: problems and prospects’. Journal of Management, 12:4, 531–544. Pollach, I. 2003. Communicating Corporate Ethics on the World Wide Web: A Discourse Analysis of Selected Company Websites. Frankfurt: Peter Lang. Pollach, I. 2005. ‘A typology of communicative strategies in online privacy policies: ethics, power and informed consent’. Journal of Business Ethics, 62:3, 221–235. Post, J. E. 2000. ‘Moving from geographic to virtual communities: global corporate citizenship in a dot. com world’. Business and Society Review, 105:1, 27–46. Rifon, N. J. , LaRose, R. and Choi, S. M. 2005. Your privacy is sealed: effects of web privacy seals on trust and personal disclosures’. Journal of Consumer Affairs, 39:2, 339–362. Sama, L. M. and Shoaf, V. 2002. ‘Ethics on the web: applying moral decision making to the web’. Journal of Business Ethics, 36: 1–2, 93–103. Shapiro, B. and Baker, C. R. 2001. ‘Information technology and the social construction of information privacy’. Journal of Accounting and Public Policy, 20:4, 295–322. Sharfman, M. P. , Pinkston, T. S. and Sigerstad, T. D. 2000. ‘The effects of managerial values on social issues evaluation: an empirical examination’. Business and Society, 39:2, 144–182. Sheehan, K. B. 2002. ‘Toward a typology of internet users and online privacy concerns’. The Information Society, 18:1, 21–32. Smith, A. D. and Rupp, W. T. 2004. ‘Online privacy policies and diffusion theory perspectives: security or chaos? ’. Services Marketing Quarterly, 25:3, 53–75. r 2010 The Author Business Ethics: A European Review r 2010 Blackwell Publishing Ltd. 101 Business Ethics: A European Review Volume 20 Number 1 January 2011 Snider, J. , Hill, R. P. and Martin, D. 2003. ‘Corporate social responsibility in the 21st century: a view from the world’s most successful ? rms’. Journal of Business Ethics, 48:2, 175–187. Spinello, R. A. 1998. ‘Privacy rights in the information economy’. Business Ethics Quarterly, 8:4, 723–742. Strauss, A. L. nd Corbin, J. 1990. Basics of Qualitative Research: Grounded Theory Procedures and Techniques. Newbury Park, CA: Sage. Tetrault Sirsly, C. A. and Lamertz, K. 2008. ‘When does a corporate social responsibility initiative provide a ? rst-mover advanta ge? ’. Business and Society, 47:3, 343–369. Trauth, E. M. and Jessup, L. M. 2000. ‘Understanding computer-mediated discussions: positivist and interpretive analyses of group support system use’. MIS Quarterly, 24:1, 43–79. van Dijk, T. A. 1985. ‘Levels and dimensions of discourse analysis’. In van Dijk, T. A. Handbook of Discourse Analysis, Vol. 2: 1–12. London: Academic Press. van Dijk, T. A. 1997a. Discourse as interaction in society’. In van Dijk, T. A. Discourse as Social Interaction: 1–37. London: Sage. van Dijk, T. A. 1997b. ‘The study of discourse’. In van Dijk, T. A. Discourse as Structure and Process, Vol. 1: 1–34. London: Sage. Weber, R. P. 1985. Basic Content Analysis. Beverly Hills, CA: Sage. Westin, A. F. 1967. Privacy and Freedom. New York, NT: Atheneum. Wray, R. 2009. ‘T-Mobile con? rms biggest phone customer data breach. ’ The Guardian, November 17. Zonghao, B. 2001. ‘An ethical discussion on the network economy’. Business Ethics: A European Review, 10:1, 108–112. 102 r 2010 The Author Business Ethics: A European Review r 2010 Blackwell How to cite Online Privacy as a Corporate Social Responsibility- an Empirical Study, Papers