Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet Law (2)
- Law, Technology and Online Privacy (2)
- Aritstotle (1)
- Bentham (1)
- Business Law (1)
-
- Business ethics (1)
- Classroom performance (1)
- College professors (1)
- Computer Law (1)
- Computer law (1)
- Connect in the classroom (1)
- Connect with students (1)
- Consumer Protection (1)
- Data Brokers (1)
- Data Trade (1)
- Data brokers (1)
- Data collection (1)
- Data mining (1)
- Data trade (1)
- Deontology (1)
- E-commerce (1)
- Effective professors (1)
- Effective teaching (1)
- Ethical frameworks (1)
- Ethics (1)
- Information Privacy (1)
- Kany (1)
- Law and Technology (1)
- Law and technology (1)
- Mill (1)
Articles 1 - 5 of 5
Full-Text Articles in Law
Ethical Frameworks, Corey A. Ciocchetti
Ethical Frameworks, Corey A. Ciocchetti
Corey A Ciocchetti
This article discusses the three prominent business ethics theories of Utilitarianism, Deontology and Virtue Ethics. This is a short primer on these theories.
Connect & Thrive: Perspectives Of A Newly Tenured Professor, Corey A. Ciocchetti
Connect & Thrive: Perspectives Of A Newly Tenured Professor, Corey A. Ciocchetti
Corey A Ciocchetti
This essay encapsulates my perspective (newly-tenured and seven years into my career) on how average professors can become highly effective professors. The secret rests in the ability to genuinely connect with students. Connecting really matters - even if it takes some personality adaptation and thrusts academics out of their comfort zones. Many professors fail to connect with students in a meaningful way. My evidence for this assertion is simple and straightforward. In addition to teaching, I am blessed to travel the country and speak on college campuses.3 After extensive discussions on these trips, students consistently claim their professors are boring, …
The Privacy Matrix, Corey A. Ciocchetti
The Privacy Matrix, Corey A. Ciocchetti
Corey A Ciocchetti
The twenty-first-century e-commerce environment is a scary place. Lurking within are technologically-sophisticated e-threats ready to compromise an individual’s personally identifying information (PII). At the same time, consumers submit vast amounts of PII into cyberspace without comprehending such dangers while businesses stumble to protect the information they collect and sell it on the open market. The United States legal system – currently a mixture of self-regulation and a patchwork of federal/state legislation – is ill-equipped to deal with these e-threats effectively. A new paradigm is needed. The Privacy Matrix paradigm categorizes the most prominent e-threats into three stages of the PII …
Employment Law, Negotiation And The Business Environment: A Cooperative Collective Bargaining Negotiation Of The National Hockey League Lockout Of 2004, Corey A. Ciocchetti
Employment Law, Negotiation And The Business Environment: A Cooperative Collective Bargaining Negotiation Of The National Hockey League Lockout Of 2004, Corey A. Ciocchetti
Corey A Ciocchetti
Teaching courses revolving around business law and ethics is a daunting challenge. Students need real-world examples to make the difficult topics and concepts come to life. This artcile explores legal negotiation and negotiation ethics in the context of the National Hockey League Lockout of 2004-2005.
The article describes the basics of collective bargaining and negotiation strategy and then offers a group exercise to hammer out a CBA. Student teams represent the NHL Owners and NHL Player's Union respectively and enter into a series of three timed negotiations followed by a large group debrief.
The exercise described in this article won …
E-Commerce And Information Privacy: Privacy Policies As Personal Information Protectors, Corey A. Ciocchetti
E-Commerce And Information Privacy: Privacy Policies As Personal Information Protectors, Corey A. Ciocchetti
Corey A Ciocchetti
This article dives into the contemporary debate surrounding information privacy in the twenty-first century e-commerce environment through the lens of consumers submitting personally identifying information into the vast abyss of cyberspace. I argue that this information must be better protected and that United States law should emphasize electronic privacy policies as privacy-protecting devices. Currently, the United States operates under primarily a self-regulatory environment where the federal and state governments allow industry to regulate the use and content of their privacy policies. This article details current state of the United States legal regime, addresses its inefficiencies in this area and proposes …