Hostname: page-component-586b7cd67f-l7hp2 Total loading time: 0 Render date: 2024-11-28T04:25:14.091Z Has data issue: false hasContentIssue false

Is There a Special E-Commerce Ethics?

Published online by Cambridge University Press:  23 January 2015

Abstract:

The speed and degree to which e-commerce is infiltrating the very fabric of our society, faster and more pervasively than any other entity in history, makes an examination of its ethical dimensions critical. Though ethical lag has heretofore hindered our explorations of e-commerce ethics, it is now time to identify and confront them. In this paper we define e-commerce and describe the characteristics that set it apart from traditional brick and-mortar business. We then examine the ethical foundation of e-commerce, focusing on the question, “Is there a special e-commerce ethics?” Our answer is “no.” We support our answer by showing that the current issues in e-commerce ethics and brick-and-mortar business are fundamentally the same, but that e-commerce issues have different manifestations and scope. We then demonstrate that ethical principles and rules in e-commerce and brick-and-mortar business are fundamentally the same, but have different manifestations at the most specific level. We elucidate this point by discussing the use of personal information and the opt-in, opt-out debate. We conclude with a call for research on trust, a key value in the success of e-commerce.

Type
Articles
Copyright
Copyright © Society for Business Ethics 2004

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Allen, D. 1998. “New directions for EDL.” Telecommunications 32(1): 6364.Google Scholar
Andel, T. 1998. “EDI meets Internet. Now what?” Transportation & Distribution 39(6): 3240.Google Scholar
Aristotle. 1948. Nicomachean Ethics. Translated by Ross, W. D.. Oxford: Oxford University Press.Google Scholar
Association for Computing Machinery, 1992. ACM Code of Ethics and Professional Conduct. Retrieved July 1, 2002. Available on the World Wide Web: http://www.ccsr.cse.dmu.ac.uk/resources/professionalism/codes/acm.html.Google Scholar
Baier, A. 1994. “The possibility of sustaining trust.” In Norms, Values, and Society, ed. Pauer-Studer, H.. Dordrecht: Kluwer Academic Publishers: 245259.Google Scholar
Beabout, G. R., and Wennemann, D. J.. 1994. Applied Professional Ethics. Lanham, Md.: University Press of America.Google Scholar
Braziel, R. 2001. “Netrana.” In Peernetics [online]. Retrieved November 23, 2001. Available on the World Wide Web: http://www.peernetics.com/companies_P2P/netrana/mainpage_P2P_netrana.asp.Google Scholar
Carr, A. 1968. “Is business bluffing ethical?” Harvard Business Review 46(1): 145153.Google Scholar
Coltman, T., Devinney, T., Latukefu, A., and Midgley, D.. 2002. “Keeping e-business in perspective.” Communications of the ACM 45(8): 6973.Google Scholar
Computer Ethics Institute. 1997. “Ten commandants of computer ethics.” On the Computer Ethics Institute Web site. Retrieved January 10, 2000. Available on the World Wide Web: http://www.cpsr.org/program/ethics/cei.html.Google Scholar
Computer Industry Almanac. 2002. “North America is the leading region for Internet users according to the Computer Industry Almanac.” In Computer Industry Almanac Web site. Retrieved August 9, 2000. Available on the World Wide Web: http://www.c-i-a.com.Google Scholar
Cope, K. (Narrator), and Williams, M. (Director). 2000. “Trends in e-commerce.” In Williams, M. (Producer), Let’s Talk E-Business. Omaha: KKAR.Google Scholar
Corritore, C. L., Kracher, B., and Wiedenbeck, S.. 2001. “Trust in the online environment.” In Usability Evaluation and Interface Design: Cognitive Engineering, Intelligent Agents and Virtual Reality, ed. Smith, M. J., Salvendy, G., Harris, D., and Koubek, R. J.. Mahwah, N.J.: Erlbaum: 15481552.Google Scholar
Costello, S. 2001. “Report: Napster file sharing down 90 percent.” In CNN.com Web site. Retrieved November 15, 2001. Available on the World Wide Web: http://www.cnn.con/2001/TECHiinternet/06/07/napster.user.down.idg/index.html.Google Scholar
Dash, J. 2001. “Former dot-com workers find homes at porn sites.” In CNN.com Web site. Retrieved November 1, 2001. Available on the World Wide Web: http://www.cnn.com/2001/TECH/industry/06/13/dot.com.Google Scholar
DeGeorge, R. 1999. “Business ethics and the information age.” Waltham, Mass.: Bentley College Center for Business Ethics Keynote Address.Google Scholar
DeCovny, S. 1998. “The electronic commerce comes of age.” The Journal of Business Strategy 19(6): 3844.Google Scholar
Delio, M. 2002. “Yahoo’s opt-out angers users.” Wired News, April 2. Retrieved May 19, 2002. Available on the World Wide Web: http://www.wired.com/news/print/0,1294,51461,00.html.Google Scholar
Direct Marketing Association. 2001. Online Marketing Guidelines. Retrieved June 15, 2002. Available on the World Wide Web: http://www.the-dma.org/library/guidelines/onlineguidelines.shtml.Google Scholar
Direct Marketing Association. 2002. Guidelines for Ethical Business Practices. Article #30. Retrieved June 15, 2002. Available on the World Wide Web: http://www.the-dma.org/library/guidelines/ethicalguidelines.shtml#6.Google Scholar
Donaldson, T. 2001. “Cyberspace: have we seen this movie before?” Business and Society Review 106(4): 273291.Google Scholar
Faden, R., and Beauchamp, T.. 1986. A History and Theory of Informed Consent. New York: Oxford University Press.Google Scholar
Forrester. 2000. “$525 million in sales taxes went uncollected online in 1999.” In Forrester.com Website. Retrieved February 24, 2000. Available on the World Wide Web: http://www.forrester.com.Google Scholar
Frankena, W. 1963. Ethics. Englewood Cliffs, N.J.: Prentice-Hall, Inc.Google Scholar
Freeman, R. E. 1994. “The politics of stakeholder theory: some future directions.” Business Ethics Quarterly 4(4): 409421.Google Scholar
Geach, P. 1977. The Virtues: The Stanton Lectures 1973–4. Cambridge, England: Cambridge University Press.Google Scholar
Gert, B. 1970. The Moral Rules. New York: Harper & Row.Google Scholar
Grant, E. X. 2002. “E-commerce to top $1 trillion in 2002.” In Newsfactor.com. Retrieved August 3, 2002. Available on the World Wide Web: http://www.newsfactor.com/per1/story116314.html.Google Scholar
Hansell, S. 2001. “Profitable or not? It depends on who’s measuring.” In New York Times 30 September 2001. Retrieved September 30, 2001. Available on the World Wide Web: http://www.nytimes.com/2001/05/20/technology/20SAMA.html.Google Scholar
Holzschlag, M. E., and Sullivan, J.. 2001. “Free to be P2P.” In Webreviews.com. Retrieved March 9, 2001. Available on the World Wide Web: http://www.webreview.com/2001/03_09/strategists/index01.shtml.Google Scholar
Judson, B., and Kelly, K.. 1999. HyperWars: Eleven Strategies for Survival and Profit in the Era of Online Business. New York: Scribner.Google Scholar
Kahn, J. 2000. “Presto chango! Sales are huge!” Fortune, March 20: 9096.Google Scholar
Kalakota, R., and Robinson, M.. 2001. E-business 2.0: Roadmap for success. Boston: Addison-Wesley.Google Scholar
Kant, I. 1785/1964. Groundwork of the Metaphysics of Morals. Translated and edited by Paton, H. J.. New York: Harper Books.Google Scholar
Kelly, K. 1997. “New rules for the new economy: twelve dependable principles for thriving in a turbulent world.” Wired 5(9): 141143, 186197.Google Scholar
Kramer, J., and Kramarae, C.. 1997. Gendered Ethics on the Internet. Urbana-Champaign, Ill.: University of Illinois Press.Google Scholar
Levy, S. 2000. “Wired for the bottom line.” Newsweek 134(12): 4249.Google Scholar
MacIntyre, A. 1981. After Virtue. Notre Dame, Ind.: University of Notre Dame Press.Google Scholar
Marcella, A. 1999. Establishing Trust in Virtual Markets. Altamonte Springs, Fla.: The Institute of Internal Auditors.Google Scholar
Marshall, K. P. 1999. “Has technology introduced new ethical problems?Journal of Business Ethics 19(1): 8190.Google Scholar
Mill, J. S. 1863/1957. Utilitarianism. Indianapolis: Bobbs-Merrill.Google Scholar
Milne, G. R., and Rohm, A. J., A. J. 2000. “Consumer privacy and name removal across direct marketing channels: exploring opt-in and opt-out alternatives.” Journal of Public Policy 19(2): 238249.Google Scholar
Mooney, J., and Pittman, W., W. 1996. “A guide to electronic commerce.” Management Accounting 78(3): 4351.Google Scholar
Muller, N. 1998. “How the Internet is breaking down barriers to EDI.” Information Systems Management 15(3): 7881.Google Scholar
Nash, L. 1993. Good Intentions Aside: A Manager’s Guide to Resolving Ethical Problems. Boston, Mass.: Harvard Business School Press.Google Scholar
National Office for the Information Economy. 2001. “The phantom menace: Setting the record straight about online credit card fraud.” In National Office for the Information Economy Web site. Retrieved November 15, 2001. Available on the World Wide Web: http://www.noie..gov.au/NOIE/consumer/creditcardfraud.pdf.Google Scholar
Norland, R., and Bartholet, J., J. 2001. “The Web’s dark secret.” Newsweek 137(12): March 19: 4451.Google Scholar
Novak, T. P., and Hoffman, D. L.. 1998. “Bridging the digital divide: the impact of race on computer access and Internet use.” In Project 2000 Web site. Retrieved February 2, 2001. Available on the World Wide Web: http://www2000.o,gsm.vanderbilt.edu/papers/race/science.htm.Google Scholar
Nua Internet Surveys. 2002. “How many online?” In NuaSurvey.com web site. Accessed July 10, 2002. Available on the World Wide Web: http://www.nua.ie/surveys/how_many_online.Google Scholar
Pastore, M. 2001. “B2B objections remain high despite obstacles.” In CyberAtlas Web site. Retrieved November 5, 2001. Available on the World Wide Web: http://cyberatlas.internet.com/markets/B2B/article/0,1323,10091555291,OO.html.Google Scholar
Rest, J., Narvaez, D., Bebeau, M., and Thoma, S.. 1999. Postconventional Moral Thinking. Mahwah, N.J.: Lawrence Erlbaum Associates.Google Scholar
Robinson, J. P. 1981. “Will the new electronic media revolutionize our daily lives?” In Communications in the Twenty-First Century, ed. Haigh, R. W., Gerbner, G., and Byme, R. B.. New York: John Wiley and Sons: 6067.Google Scholar
Round Table Report: USA. 1999. “Global challenges for government in the information age: Creating a 21st century information technology management paradigm.” Presented at the International Council for Information Technology in Government Administration (Bratislavia, Slovakia 1999). Accessed July 10, 2002. Available on the World Wide Web: http://www.ica.ogo.gov.au/ica1/Events/conf33/usa.doc.Google Scholar
Rubin, E., and Freedman, L.. 1999. “E-commerce and merchandising.” In Net Success, ed. Haylock, C. and Muscarella, L.. Avon, Mass.: Adams Media Corporation: 123145.Google Scholar
Scheeres, J. 2002. “Privacy gets some respect.” In Wired News, March 28. Retrieved May, 21, 2002. Available on the World Wide Web: http://www.wired.com/news/print/0,1294,51379,00.html.Google Scholar
Scheraga, D. 2001. “Privacy matters.” Chain Store Age 86(8), August: 77.Google Scholar
Scoblionkov, D. 1998. “Senate embraces spam bill.” In Wired News, June 18. Retrieved May, 21, 2002. Available on the World Wide Web: http://www.wired.com/news/print/0,1294,13080,00.html.Google Scholar
Senn, J. 1998. “Expanding the reach of electronic commerce: The Internet EDI alternative.” Information Systems Management 15(3): 715.Google Scholar
Shaw, W., and Barry, V.. 1995. Moral Issues in Business, 6th Edition. Belmont, Calif.: Wadsworth.Google Scholar
Siebel, T., and House, P.. 1999. CyberRules. New York: Currency/Doubleday.Google Scholar
Sisson, D. 2000. “Ecommerce trust study.” In Philosophe.com Web site. Retrieved February 21, 2000. Available on the World Wide Web: http://www.philosophe.com.Google Scholar
Solomon, R. C. and Hanson, K. 1985. It’s Good Business. New York: Harper & Row.Google Scholar
Spencer, Karyn. 2002. “In the online world, child porn is explicit and easy to get.” Omaha World Herald, June 17: 12.Google Scholar
The Systems Administration, Networking and Security (SANS) Institute. 2001. “The twenty most critical Internet security vulnerabilities, version 2.100.” In the Systems Administration, Networking and Security Institute Web site. Retrieved October 2, 2001. Available on the World Wide Web: http://www.sans.org/top20.htmGoogle Scholar
Suri, A. 1998. “Extending the enterprise: taking EDI into the future.” Business Communications Review 28(7): 4348.Google Scholar
Taylor, P. W. 1975. Principles of Ethics: An Introduction. Encino, Calif.: Dickenson Publishing Company.Google Scholar
Tedeschi, B. 2001. “E-commerce report: DoubleClick seeks ways to protect users’ anonymity.” In New York Times 5 March 2001. Retrieved March 5, 2001. Available on the World Wide Web: http://www.nytimes.com/2001/techiiology/29ECOMMERCE.html.Google Scholar
Thibodeau, P. 2002. “Vermont opt-in rules spur suit.” Computerworld 36(7): 16.Google Scholar
Thomas, H. 1999. “Business-to-business commerce: The Internet evolution.” In Net Success, ed. Haylock, C. and Muscarella, L.. Avon, Mass.: Adams Media Corporation: 186205.Google Scholar
Tong, R. 1986. Ethics in Policy Analysis. Englewood Cliffs, N.J.: Prentice-Hall.Google Scholar
Useem, J. 2000. New ethics or no ethics? Fortune, March 20: 8286.Google Scholar
Warnoch, G. J. 1971. The Object of Morality. London: Methuen & Co.Google Scholar
Warner, M. 2000. “Friends and family.” Fortune, March 20: 101108.Google Scholar
Wheatley, M. 2000. “To B2B or not to be.” Director 54(2): 109 ff.Google Scholar