Abstract
Online service providers (OSPs)—such as AOL, Facebook, Google, Microsoft, and Twitter—significantly shape the informational environment (infosphere) and influence users’ experiences and interactions within it. There is a general agreement on the centrality of OSPs in information societies, but little consensus about what principles should shape their moral responsibilities and practices. In this article, we analyse the main contributions to the debate on the moral responsibilities of OSPs. By endorsing the method of the levels of abstract (LoAs), we first analyse the moral responsibilities of OSPs in the web (LoAIN). These concern the management of online information, which includes information filtering, Internet censorship, the circulation of harmful content, and the implementation and fostering of human rights (including privacy). We then consider the moral responsibilities ascribed to OSPs on the web (LoAON) and focus on the existing legal regulation of access to users’ data. The overall analysis provides an overview of the current state of the debate and highlights two main results. First, topics related to OSPs’ public role—especially their gatekeeping function, their corporate social responsibilities, and their role in implementing and fostering human rights—have acquired increasing relevance in the specialised literature. Second, there is a lack of an ethical framework that can (a) define OSPs’ responsibilities, and (b) provide the fundamental sharable principles necessary to guide OSPs’ conduct within the multicultural and international context in which they operate. This article contributes to the ethical framework necessary to deal with (a) and (b) by endorsing a LoA enabling the definition of the responsibilities of OSPs with respect to the well-being of the infosphere and of the entities inhabiting it (LoAFor).
Similar content being viewed by others
Notes
Dissemination and access to copyrighted material has also been a topic of great interest in research concerned with OSPs. However, this problem falls outside the scope of this article, for it has more to do with liability and the application of laws protecting copyright online than with the moral duties of OSPs. The interested reader may find useful the analyses of copyright online provided in Hanel (2006), Edwards (2011), Friedmann (2014).
Other relevant contributions on the diversity of the sources and information available on the web have been provided in the literature in information and communication studies, law, and public policy. The interested reader may find useful the following articles: (Pandey et al. 2005; Pasquale 2006; Hargittai 2007; Van Couvering 2007; Diaz 2008; Hinman 2008; Lewandowski 2011).
Concerns for the implication that filtering of information may have for participative democracy and the nature of the web have also been expressed in Lessig (1999).
The issue arises as to whether OSPs should be ascribed moral responsibilities with respect to societies at large or solely with respect to societies depending on ICTs. The answer depends on the way such responsibilities are defined. For example, if one considers the protection of privacy a duty to respect human rights, then one could argue that OSPs bear this responsibility independently from the level of distribution of their services in a given region. One could also argue that societies where Internet is not pervasive will sooner or later become information societies and hence that, even if OSPs do not massively affect these societies, they will in the foreseeable future. We would like to thank one of the anonymous reviewers for pointing out this aspect.
With the exception of countries like China and Thailand, where the strict liability model is endorsed and OSPs are liable for third-party content.
For a critical analysis of the ‘safe harbour’ model see Pagallo (2011).
An interesting analysis of OSPs’ legal responsibilities with respect to this has been provided in Burk (2011).
A legal analysis of third-party liability under US tort law has been provided in Ziniti (2008).
Resolution on “The Promotion, Protection and Enjoyment of Human Rights on the Internet” (Human Rights Council of the United Nations 2012).
The document has been approved on August 13, 2003 by the United Nations Sub-Commission on the Promotion and Protection of Human Rights. http://business-humanrights.org/en/united-nations-sub-commission-norms-on-business-human-rights-explanatory-materials.
Governmental censorship has spread throughout the globe with the Internet; the literature on OSPs’ responsibilities in China casts an interesting light on a problem that concerns several other countries around the world (Aceto et al. 2015).
Mark Zuckerberg, Facebook’s CEO, declared in 2010 that privacy is not a social norm any more as “people have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people”. http://www.theguardian.com/technology/2010/jan/11/facebook-privacy.
An example of such a friction is discussed in section “LOAON: OSPs’ Moral Responsibilities on the Web” with respect to the debate on the ‘right to be forgotten’.
Julia Powles maintains an extensive bibliography online at http://www.cambridge-code.org/googlespain.html.
Disclosure: one of the authors of this paper (L. F.) is a member of the Advisory Board.
Net neutrality also refers to responsibilities on the web. However, this problem concerns the backbone infrastructure of the web and hence it involves Internet Service Providers more than Online Service Providers. The interested reader may find useful the following articles: (Blumenthal 2001; Lessig 2007; Schahczenski 2008; Turilli et al. 2012).
Article 29 Data Protection Working Party, “Opinion 03/2013 on purpose limitation”, p. 4.
This is a free choice in which only one option is offered, so it is really equivalent to a ‘take it or leave it’ choice.
References
Aceto, G., Botta, A., Pescapè, A., Feamster, N., Awan, M. F., Ahmad, T., et al. (2015). Monitoring internet censorship with UBICA. In M. Steiner, P. Barlet-Ros & O. Bonaventure (Eds.), Traffic monitoring and analysis, 143–57. Lecture Notes in Computer Science 9053. Springer International Publishing. http://link.springer.com/chapter/10.1007/978-3-319-17172-2_10
Acquisti, A. (2004). Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM conference on electronic commerce, 21–29. EC’04. New York: ACM. doi:10.1145/988772.988777
Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security Privacy, 3(1), 26–33. doi:10.1109/MSP.2005.22
Albareda, L., Lozano, J. M., & Ysa, T. (2007). Public policies on corporate social responsibility: The role of governments in Europe. Journal of Business Ethics, 74(4), 391–407. doi:10.1007/s10551-007-9514-1
Anderson, M. (2008). The gaze of the perfect search engine: Google as an institution of dataveillance. In A. Spink & M. Zimmer (Eds.), Web search: Multidisciplinary perspectives (pp. 77–99). Berlin: Springer.
Anderson, G. (2012). Just business. London: Headline.
Arnold, D. G. (2010). Transnational corporations and the duty to respect basic human rights. Business Ethics Quarterly, 20(3), 371–399.
Bandura, A. (1999). Social cognitive theory: An agentic perspective. Asian Journal of Social Psychology, 2(1), 21–41. doi:10.1111/1467-839X.00024
Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9). doi:10.5210/fm.v11i9.1394
Barzilai-Nahon, K. (2008). Toward a theory of network gatekeeping: A framework for exploring information control. Journal of the American Society for Information Science and Technology, 59(9), 1493–1512. doi:10.1002/asi.20857
Baym, N. K. (2011). Social Networks 2.0. In M. Consalvo & C. Ess (Eds.), The handbook of internet studies (pp. 384–405). Wiley. http://onlinelibrary.wiley.com/doi/10.1002/9781444314861.ch18/summary
Besmer, A., Lipford, H. R., Shehab, M. & Cheek, G. (2009). Social applications: Exploring a more secure framework. In Proceedings of the symposium on usable privacy and security (SOUPS).
Black, J. (2001). Decentring regulation: Understanding the role of regulation and self regulation in a ‘Post-Regulatory’ world. Current Legal Problems, 54(1), 103–146.
Blowfield, M., & Murray, A. (2008). Corporate responsibility: A critical introduction. OUP Oxford: New York.
Blumenthal, M. S., & Clark, D. D. (2001). Rethinking the design of the Internet: The end to end arguments vs. the brave new world. ACM Transactions on Internet Technology, 1(1), 70–109.
Boca, P. (2014). Formal methods: State of the art and new directions. Berlin: Springer.
Brandimarte, L., Acquisti, A., & Loewenstein, G. (2013). Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science, 4(3), 340–347.
Brenkert, G. G. (2009). Google, human rights, and moral compromise. Journal of Business Ethics, 85(4), 453–478. doi:10.1007/s10551-008-9783-3
Burk, D. L. (2011). Toward an epistemology of ISP secondary liability. In SSRN scholarly paper ID 1920050. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=1920050
Calhoun, C. J. (Ed.). (2002). Dictionary of the social sciences. New York: Oxford University Press.
Cate, F., Cullen, P. & Mayer-Schönberger, V. (2014). Data protection principles for the 21st century, revising the 1980 OECD guidelines. http://www.microsoft.com/en-us/download/details.aspx?id=41191
Caudill, E., & Murphy, P. (2000). Consumer online privacy: Legal and ethical issues. Journal of Public Policy & Marketing, 19(1), 7–19. doi:10.1509/jppm.19.1.7.16951
Cavoukian, A. (2014). The unintended consequences of privacy paternalism. Canadian Electronic Library. Canadian Public Policy Collection.
Cerf, V. G. (2011). First, do no harm. Philosophy & Technology, 24(4), 463–465. doi:10.1007/s13347-011-0056-1
Chen, S. (2009). Corporate responsibilities in internet-enabled social networks. Journal of Business Ethics, 90(4), 523–536. doi:10.1007/s10551-010-0604-0
Cragg, W. (2010). Business and human rights: A principle and value-based analysis. In G. G. Brenkert & T. L. Beauchamp (Eds.), The oxford handbook of business ethics. Oxford: Oxford University Press.
Crane, A., Matten, D., McWilliams, A., Moon, J. & Siegel, D. S. (Eds.). (2008). The oxford handbook of corporate social responsibility (1st ed.). Oxford University Press. http://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780199211593.001.0001/oxfordhb-9780199211593
Crawford, S. P. (2005). Shortness of vision: Regulatory ambition in the digital age. http://dash.harvard.edu/handle/1/12933354
Dann, G. E., & Haddow, N. (2007). Just doing business or doing just business: Google, Microsoft, Yahoo! and the business of censoring China’s Internet. Journal of Business Ethics, 79(3), 219–234. doi:10.1007/s10551-007-9373-9
Diamond, L. (2010). Liberation technology. Journal of Democracy, 21(3), 69–83. doi:10.1353/jod.0.0190
Diaz, A. (2008). Through the Google goggles: Sociopolitical bias in search engine design. In A. Spink & M. Zimmer, Web search (pp. 11–34). Information Science and Knowledge Management 14. Berlin: Springer. http://link.springer.com/chapter/10.1007/978-3-540-75829-7_2
Diller, A. (1994). Z: An introduction to formal methods (2nd ed.). New York: Wiley.
Donaldson, T. (1992). The ethics of international business., The Ruffin Series in Business Ethnics New York: Oxford Univ. Press.
Donaldson, T., & Dunfee, T. W. (1999). Ties that bind: A social contracts approach to business ethics. Boston: Harvard Business School Press.
Edwards, L. (2011). Role and responsibility of the internet intermediaries in the field of copyright and related rights. Report. Geneva: WIPO. http://strathprints.strath.ac.uk/35492/
Elkin-Koren, N. (2001). Let the crawlers crawl: On virtual gatekeepers and the right to exclude indexing. University of Dayton Law Review, 26, 179–188.
Eriksson, J., & Giacomello, G. (2009). Who controls the internet? Beyond the obstinacy or obsolescence of the state. International Studies Review, 11(1), 205–230. doi:10.1111/j.1468-2486.2008.01841.x
Etzioni, A. (1999). The limits of privacy. New York: Basic Books.
Floridi, L. (2008). The method of levels of abstraction. Minds and Machines, 18(3), 303–329. doi:10.1007/s11023-008-9113-7
Floridi, L. (2013). The ethics of information. Oxford: Oxford University Press.
Floridi, L. (2015a). Free online services: Enabling, disenfranchising, disempowering. Philosophy & Technology, 28(2), 163–166. doi:10.1007/s13347-015-0200-4
Floridi, L. (2015b). Should you have the right to be forgotten on google? Nationally, yes. Globally, no. New Perspectives Quarterly, 32(2), 24–29. doi:10.1111/npqu.11510
Floridi, L., & Taddeo, M. (Eds.). (2014). The ethics of information warfare. New York: Springer.
Freeman, J. (1999). Private parties, public functions and the new administrative law. In SSRN scholarly paper ID 165988. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=165988
Friedmann, D. (2014). Sinking the safe harbour with the legal certainty of strict liability in sight. Journal of Intellectual Property Law & Practice, 9(2), 148–155. doi:10.1093/jiplp/jpt227
Gerry, F., & Berova, N. (2014). The rule of law online: Treating data like the sale of goods: Lessons for the internet from OECD and CISG and sacking google as the regulator. Computer Law & Security Review, 30(5), 465–481.
Goldman, E. (2006). Search engine bias and the demise of search engine utopianism. In SSRN scholarly paper ID 893892. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=893892
Granka, L. A. (2010). The politics of search: A decade retrospective. The Information Society, 26(5), 364–374. doi:10.1080/01972243.2010.511560
Hanel, P. (2006). Intellectual property rights business management practices: A survey of the literature. Technovation, 26(8), 895–931. doi:10.1016/j.technovation.2005.12.001
Hargittai, E. (2007). The social, political, economic, and cultural dimensions of search engines: An introduction. Journal of Computer-Mediated Communication, 12(3), 769–777. doi:10.1111/j.1083-6101.2007.00349.x
Heath, D., Allum, D., & Dunckley, L. (1994). Introductory logic and formal methods. Henley-on-Thames: Alfred Waller.
Helgesson, K. S., & Mörth, U. (Eds.). (2013). The political role of corporate citizens: An interdisciplinary approach., Palgrave studies in citizenship transitions series New York: Palgrave Macmillan.
Hildebrandt, M. (2013). Balance or trade-off? Online security technologies and fundamental rights. Philosophy & Technology, 26(4), 357–379. doi:10.1007/s13347-013-0104-0
Hinman, L. (2005). Esse est indicato in google: Ethical and political issues in search engines. International Review of Information Ethics, 3(6), 19–25.
Hinman, L. (2008). Searching ethics: The role of search engines in the construction and distribution of knowledge. In A. Spink & M. Zimmer (Eds.), Web search (pp. 67–76). Information Science and Knowledge Management 14. Berlin: Springer. http://link.springer.com/chapter/10.1007/978-3-540-75829-7_5
Hoare, C. A. R. (1972). Structured programming. In O. J. Dahl, E. W. Dijkstra, & C. A. R. Hoare (Eds.) (pp. 83–174). London: Academic Press Ltd. http://dl.acm.org/citation.cfm?id=1243380.1243382
Huberman, B. A. (2003). The laws of the web: Patterns in the ecology of information. London: MIT Press.
Hull, G., Lipford, H. R., & Latulipe, C. (2011). Contextual gaps: Privacy issues on facebook. Ethics and Information Technology, 13(4), 289–302. doi:10.1007/s10676-010-9224-8
Human Rights Council of the United Nations. (2012). U.N. human rights council: First resolution on internet free speech. http://www.loc.gov/lawweb/servlet/lloc_news?disp3_l205403231_text
Introna, L. D., & Nissenbaum, H. (2006). Shaping the web: Why the politics of search engines matters. In SSRN scholarly paper ID 222009. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=222009
Jacky, J. (1997). The way of Z: Practical programming with formal methods. New York: Cambridge University Press.
Johnson, D. G. (2009). Computer ethics (4th ed.). Upper Saddle River: Pearson.
Jolls, C., & Sunstein, C. R. (2005). Debiasing through law. In Working paper 11738. National Bureau of Economic Research. http://www.nber.org/papers/w11738
Karp, D. J. (2009). Transnational corporations in ‘bad States’: Human rights duties, legitimate authority and the rule of law in international political theory. International Theory, 1(01), 87. doi:10.1017/S1752971909000074
Kerr, I. (2002). Internet users dependence and the duty of loyalty. In T. Mendina & B. Rockenbach (Eds.), Ethics and electronic information (pp. 166–176). North Carolina: McFarland Press.
Kiss, A., & Szőke G. L. (2015). Evolution or revolution? Steps forward to a new generation of data protection regulation. In S. Gutwirth, R. Leenes, & P. de Hert (Eds.), Reforming European data protection law (pp. 311–31). Law, Governance and Technology Series 20. Springer Netherlands. http://link.springer.com/chapter/10.1007/978-94-017-9385-8_13
Laidlaw, E. (2008). Private power, public interest: An examination of search engine accountability. International Journal of Law and Information Technology, 17(1), 113–145. doi:10.1093/ijlit/ean018
Laidlaw, E. (2010). A framework for identifying internet information gatekeepers. International Review of Law, Computers & Technology, 24(3), 263–276. doi:10.1080/13600869.2010.522334
Lampinen, A., Lehtinen, V., Lehmuskallio, A., & Tamminen, S. (2011). We’Re in it together: Interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI conference on human factors in computing systems, 3217–26. CHI’11. New York: ACM. doi:10.1145/1978942.1979420
Lanier, J. (201)1. You are not a gadget: A manifesto (Reprint edition). New York: Vintage
Lessig, L. (1999). Code: And other laws of cyberspace. New York: Basic Books.
Lessig, L. (2007). In support of network neutrality. I/S: A Journal of Law and Policy for Information Society, 3(1), 185–196.
Lev-On, A. (2009). The democratizing effects of search engine use: On chance exposures and organizational hubs. In SSRN scholarly paper ID 1481901. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=1481901
Lev-On, A., & Manin, B. (2009). Happy accidents: Deliberation and online exposure to opposing views. In: T. Davies & S. P. Gangadharan (Eds.), Online deliberation: Design, research and practice. Stanford: CSLI Publications.
Lewandowski, D. (2011). The influence of commercial intent of search results on their perceived relevance. Preprint. February 8. http://eprints.rclis.org/17232/
Lewin, K. (1947). Frontiers in group dynamics. Human Relations, 1(2), 143–153.
Madden, M. (2012). Privacy management on social media sites. Pew Internet Report.
Madelin, R. (2011). The evolving social responsibilities of internet corporate actors: Pointers past and present. Philosophy & Technology, 24(4), 455–461. doi:10.1007/s13347-011-0049-0
Matten, D., & Crane, A. (2005). Corporate citizenship: Toward an extended theoretical conceptualization. Academy of Management Review, 30(1), 166–179.
Mayer-Schönberger, V. (2011). Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press.
McQuail, D. (1992). Media performance: Mass communication and the public interest. Newbury Park: Sage Publications.
Metoyer-Duran, C. (1993). Information gatekeepers. Annual Review of Information Science and Technology (ARIST), 28, 111–150.
Nagenborg, M. (2005). The ethics of search engines (special issue). International Review of Information Ethics 3.
Negroponte, N. (1996). Being digital. New edition edition. Rydalmere: Coronet Books.
Nissenbaum, H. F. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford Law Books.
Norberg, P. A., Horne, D. R., & Horne, D. A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100–126. doi:10.1111/j.1745-6606.2006.00070.x
O’Hara, K. (2010). Intimacy 2.0: Privacy rights and privacy responsibilities on the World Wide Web. In J. Zittrain, J. Domingue, & N. Benn (Eds.). http://eprints.soton.ac.uk/268760/
OECD. (2013). OECD guidelines on the protection of privacy and transborder flows of personal data. http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm
Okoye, A. (2009). Theorising corporate social responsibility as an essentially contested concept: Is a definition necessary? Journal of Business Ethics, 89(4), 613–627. doi:10.1007/s10551-008-0021-9
Pagallo, U. (2011). ISPs & rowdy web sites before the law: Should we change today’s safe harbour clauses? Philosophy & Technology, 24(4), 419–436. doi:10.1007/s13347-011-0031-x
Palazzo, G., & Scherer, A. G. (2006). Corporate legitimacy as deliberation: A communicative framework. Journal of Business Ethics, 66(1), 71–88. doi:10.1007/s10551-006-9044-2
Pandey, S, Roy, S., Olston, C., Cho, J. & Chakrabarti, S. (2005). Shuffling a stacked deck: The case for partially randomized ranking of search engine results. In Proceedings of 31st international conference on very large databases (VLDB) (pp. 781–92).
Pariser, E. (2012). The filter bubble: What the internet is hiding from you. London: Penguin.
Pasquale, F. A. (2006). Rankings, reductionism, and responsibility. In SSRN scholarly paper ID 888327. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=888327
Qi, M., & Edgar-Nevill, D. (2011). Social networking searching and privacy issues. Information Security Technical Report. doi:10.1016/j.istr.2011.09.005
Reding, V. (2012). The EU data protection reform 2012: Making Europe the standard setter for modern data protection rules in the digital age. European Commission. http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/12/26&format=PDF
Reger, C. M. (2004). Let’s swap copyright for Code: The computer software disclosure dichotomy. Loyola of Los Angeles Entertainment Law Review, 24, 215.
Rosen, J. (2012). The right to be forgotten. Stanford Law Review Online, 64, 88.
Rosen, J. (2015). Protecting privacy on the internet is the user’s responsibility. Philly-Archives. http://articles.philly.com/2012-03-05/news/31124410_1_new-privacy-policy-facebook-search-terms
Santoro, M. A. (1998). Engagement with integrity: What we should expect multinational firms to do about human rights in China. Business and the Contemporary World, 10(1), 25–54.
Schahczenski, C. (2008). Net neutrality, computing and social change. ACM SIGCAS Computers and Society, 38(2), 27.
Scherer, A. G., & Palazzo, G. (2006). Toward a political conception of corporate responsibility-business and society seen from a habermasian perspective. In SSRN scholarly paper ID 952013. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=952013
Schermer, B. W., Custers, B., & van der Hof, S. (2014). The crisis of consent: How stronger legal protection may lead to weaker consent in data protection. Ethics and Information Technology, 16(2), 171–182. doi:10.1007/s10676-014-9343-8
Schwartz, P. (1999). Privacy and democracy in cyberspace. Vanderbilt Law Review, 52(1999), 1607.
Semitsu, J. P. (2011). From facebook to mug shot: How the dearth of social networking privacy rights revolutionized online government surveillance. In SSRN scholarly paper ID 1782267. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=1782267
Shapiro, A. L. (2000). The control revolution: How the internet is putting individuals in charge and changing the world we know (2nd Printing ed.). New York: PublicAffairs.
Smith, H. Jeff, Dinev, T., & Heng, X. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1016.
Solove, D. J. (2008). Understanding privacy. In SSRN scholarly paper ID 1127888. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=1127888
Spinello, R. A. (2011). Privacy and social networking technology. International Review of Information Ethics, 16, 12.
Spink, A., & Zimmer, M. (2008). Web search (Vol. 14). Information Science and Knowledge Management. Berlin: Springer.
Sunstein, C. R. (2001). Republic.com. With a new afterword by the author edition. Princeton: Princeton University Press.
Taddeo, M. (2010). Modelling trust in artificial agents, a first step toward the analysis of e-trust. Minds and Machines, 20(2), 243–257. doi:10.1007/s11023-010-9201-3
Taddeo, M. (2013). Cyber security and individual rights, striking the right balance. Philosophy & Technology, 26(4), 353–356. doi:10.1007/s13347-013-0140-9
Taddeo, M. (2014). The struggle between liberties and authorities in the information age. Science and Engineering Ethics, 1–14. doi:10.1007/s11948-014-9586-0
Tavani, H. (2014). Search engines and ethics. In E. N. Zalta (Ed.), The stanford encyclopedia of philosophy. http://plato.stanford.edu/archives/spr2014/entries/ethics-search/
Tavani, H., & Grodzinsky, F. S. (2002). Cyberstalking, personal privacy, and moral responsibility. Ethics and Information Technology, 4(2), 123–132. doi:10.1023/A:1019927824326
Tavani, H., & Moor, J. H. (2001). Privacy protection, control of information, and privacy-enhancing technologies. SIGCAS Compututers and Society, 31(1), 6–11. doi:10.1145/572277.572278
Toffler, A., Heidi, T., & Newt, G. (1995). Creating a new civilization: The politics of the third wave (1st ed.). Kansas City: Turner Publishing.
Turilli, M., Vaccaro, A., & Taddeo, M. (2010). The case of online trust. Knowledge, Technology & Policy, 23(3–4), 333–345. doi:10.1007/s12130-010-9117-5
Turilli, M., Vaccaro, A., & Taddeo, M. (2012). Internet neutrality: Ethical issues in the internet environment. Philosophy & Technology, 25, 133–151.
Van Couvering, E. (2007). Is relevance relevant? Market, science, and war: Discourses of search engine quality. Journal of Computer-Mediated Communication, 12(3), 866–887. doi:10.1111/j.1083-6101.2007.00354.x
Vedder, A. (2001). Accountability of internet access and service providers—Strict liability entering ethics? Ethics and Information Technology, 3(1), 67–74. doi:10.1023/A:1011492109277
Wang, N., Xu, H., & Grossklags, J. (2011). Third-party apps on facebook: Privacy and the illusion of control. In Proceedings of the 5th ACM symposium on computer human interaction for management of information technology, 4:1–4:10. CHIMIT’11. New York: ACM. doi:10.1145/2076444.2076448
Weckert, J. (2005). Trust in cyberspace. In R. J. Cavalier (Ed.), The impact of the internet on our moral lives (pp. 95–120). Albany: University of New York Press.
Wettstein, F. (2012). Silence as complicity: Elements of a corporate duty to speak out against the violation of human rights. Business Ethics Quarterly, 22(01), 37–61. doi:10.1017/S1052150X00000063
Wolf, M. J., Miller, K. W., & Grodzinsky, F. S. (2009). On the meaning of free software. Ethics and Information Technology, 11(4), 279–286. doi:10.1007/s10676-009-9207-9
Wolf, D., Ralf, K. W., & Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in facebook. Computers in Human Behavior, 35, 444–454. doi:10.1016/j.chb.2014.03.010
World Economic Forum. (2012). Unlocking the economic value of personal data balancing growth and protection. http://www3.weforum.org/docs/WEF_IT_UnlockingValueData_BalancingGrowthProtection_SessionSummary.pdf
Xu, H. (2012). Reframing privacy 2.0 in online social networks. University of Pennsylvania Journal of Constitutional Law, 14(4), 1077.
Ziniti, C. (2008). Optimal liability system for online service providers: How Zeran v. America online got it right and web 2.0 proves it. Berkeley Technology Law Journal, 23, 583.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Taddeo, M., Floridi, L. The Debate on the Moral Responsibilities of Online Service Providers. Sci Eng Ethics 22, 1575–1603 (2016). https://doi.org/10.1007/s11948-015-9734-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11948-015-9734-1