Switch to: References

Add citations

You must login to add citations.
  1. Ethical considerations in an online community: the balancing act. [REVIEW]Cecile Paris, Nathalie Colineau, Surya Nepal, Sanat Kumar Bista & Gina Beschorner - 2013 - Ethics and Information Technology 15 (4):301-316.
    With the emergence and rapid growth of Social Media, a number of government departments in several countries have embraced Social Media as a privilege channel to interact with their constituency. We are exploring, in collaboration with the Australian Department of Human Services, the possibility to exploit the potential of social networks to support specific groups of citizens. To this end, we have developed Next Step, an online community to help people currently receiving welfare payments find a job and become financially (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Unauthorized copying of software: an empirical study of reasons for and against.Mikko T. Siponen & Tero Vartiainen - 2007 - Acm Sigcas Computers and Society 37 (1):30-43.
    Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of computer software, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Information and Computer Ethics.Richard A. Spinello - 2012 - Journal of Information Ethics 21 (2):17-32.
    This paper reviews the intriguing history of information and computer ethics. Information ethics began as a branch of applied ethics concerned with the responsible management of information resources, while computer ethics was originally concerned with the training of computer professionals. Thanks to the Internet and the Web, these two fields merged together as access and communications issues became more prominent. In more recent years, responding to the ongoing debate about this discipline's structural foundations, philosophers like Floridi have given information ethics (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. [REVIEW]Hassan Aleassa, John Michael Pearson & Scott McClurg - 2011 - Journal of Business Ethics 98 (4):663-676.
    Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance, over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Information technology and moral values.John Sullins - forthcoming - Stanford Encyclopedia of Philosophy.
    A encyclopedia entry on the moral impacts that happen when information technologies are used to record, communicate and organize information. including the moral challenges of information technology, specific moral and cultural challenges such as online games, virtual worlds, malware, the technology transparency paradox, ethical issues in AI and robotics, and the acceleration of change in technologies. It concludes with a look at information technology as a model for moral change, moral systems and moral agents.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • The ethical decision-making processes of information systems workers.David B. Paradice & Roy M. Dejoie - 1991 - Journal of Business Ethics 10 (1):1 - 21.
    An empirical investigation was conducted to determine whether management information systems (MIS) majors, on average, exhibit ethical decision-making processes that differ from students in other functional business areas. The research also examined whether the existence of a computer-based information system in an ethical dilemma influences ethical desision-making processes. Although student subjects were used, the research instrument has been highly correlated with educational levels attained by adult subjects in similar studies. Thus, we feel that our results have a high likelihood of (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Characteristics and challenges in the industries towards responsible AI: a systematic literature review.Marianna Anagnostou, Olga Karvounidou, Chrysovalantou Katritzidaki, Christina Kechagia, Kyriaki Melidou, Eleni Mpeza, Ioannis Konstantinidis, Eleni Kapantai, Christos Berberidis, Ioannis Magnisalis & Vassilios Peristeras - 2022 - Ethics and Information Technology 24 (3):1-18.
    Today humanity is in the midst of the massive expansion of new and fundamental technology, represented by advanced artificial intelligence (AI) systems. The ongoing revolution of these technologies and their profound impact across various sectors, has triggered discussions about the characteristics and values that should guide their use and development in a responsible manner. In this paper, we conduct a systematic literature review with the aim of pointing out existing challenges and required principles in AI-based systems in different industries. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • An Ethical Exploration of Privacy and Radio Frequency Identification.Alan R. Peslak - 2005 - Journal of Business Ethics 59 (4):327-345.
    This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Individual Differences in the Acceptability of Unethical Information Technology Practices: The Case of Machiavellianism and Ethical Ideology.Susan J. Winter, Antonis C. Stylianou & Robert A. Giacalone - 2004 - Journal of Business Ethics 54 (3):275-296.
    While information technologies present organizations with opportunities to become more competitive, unsettled social norms and lagging legislation guiding the use of these technologies present organizations and individuals with ethical dilemmas. This paper presents two studies investigating the relationship between intellectual property and privacy attitudes, Machiavellianism and Ethical Ideology, and working in R&D and computer literacy in the form of programming experience. In Study 1, Machiavellians believed it was more acceptable to ignore the intellectual property and privacy rights of others. Programmers (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
  • Understanding the Behavioral Intention to Report Unethical Information Technology Practices: The Role of Machiavellianism, Gender, and Computer Expertise. [REVIEW]Antonis C. Stylianou, Susan Winter, Yuan Niu, Robert A. Giacalone & Matt Campbell - 2013 - Journal of Business Ethics 117 (2):333-343.
    Although organizations can derive competitive advantage from developing and implementing information systems, they are confronted with a rising number of unethical information practices. Because end-users and computer experts are the conduit to an ethical organizational environment, their intention to report unethical IT-related practices plays a critical role in protecting intellectual property and privacy rights. Using the survey methodology, this article investigates the relationship between willingness to report intellectual property and privacy violations and Machiavellianism, gender and computer literacy in the form (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • (1 other version)Assessing gender differences in computer professionals' self-regulatory efficacy concerning information privacy practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145 - 160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Big data, little wisdom: trouble brewing? Ethical implications for the information systems discipline.David J. Purleen, David Rooney & Ali Intezari - 2017 - Social Epistemology 31 (4):400-416.
    The question we pose in this paper is: How can wisdom and its inherent drive for integration help information systems in the development of practices for responsibly and ethically managing and using big data, ubiquitous information and algorithmic knowledge and so make the world a better place? We use the recent financial crises to illustrate the perils of an overreliance on and misuse of data, information and predictive knowledge when global Information Systems are not wisely integrated. Our analysis shows that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Information systems ethics – challenges and opportunities.Simon Rogerson, Keith W. Miller, Jenifer Sunrise Winter & David Larson - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):87-97.
    Purpose The purpose of this paper is to explore the ethical issues surrounding information systems practice with a view to encouraging greater involvement in this aspect of IS research. Information integrity relies upon the development and operation of computer-based information systems. Those who undertake the planning, development and operation of these information systems have obligations to assure information integrity and overall to contribute to the public good. This ethical dimension of information systems has attracted mixed attention in the IS academic (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • “Privacy by default” and active “informed consent” by layers.Amaya Noain-Sánchez - 2016 - Journal of Information, Communication and Ethics in Society 14 (2):124-138.
    Purpose The purpose of this paper is to lay out an approach to addressing the problem of privacy protection in the global digital environment based on the importance that information has to improve users’ informational self-determination. Following this reasoning, this paper focuses on the suitable way to provide user with the correct amount of information they may need to maintain a desirable grade of autonomy as far as their privacy protection is concerned and decide whether or not to put their (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Elephant in the Server Room.Shana R. Ponelis & Johannes J. Britz - 2012 - Journal of Information Ethics 21 (1):27-39.
    Download  
     
    Export citation  
     
    Bookmark  
  • Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges.Corey M. Angst - 2009 - Journal of Business Ethics 90 (S2):169 - 178.
    When information is transformed from what has traditionally been a paper-based format into digitized elements with meaning associated to them, new and intriguing discussions begin surrounding proper and improper uses of this codified and easily transmittable information. As these discussions continue, some health care providers, insurers, laboratories, pharmacies, and other healthcare stakeholders are creating and retroactively digitizing our medical information with the unambiguous endorsement of the federal government.Some argue that these enormous databases of medical information offer improved access to timely (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Ethical Decisions About Sharing Music Files in the P2P Environment.Rong-An Shang, Yu-Chen Chen & Pin-Cheng Chen - 2008 - Journal of Business Ethics 80 (2):349-365.
    Digitized information and network have made an enormous impact on the music and movie industries. Internet piracy is popular and has greatly threatened the companies in these industries. This study tests Hunt-Vitell’s ethical decision model and attempts to understand why and how people share unauthorized music files with others in the peer-to-peer (P2P) network. The norm of anti-piracy, the ideology of free software, the norm of reciprocity, and the ideology of consumer rights are proposed as four deontological norms related to (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Ethics, Information Manipulation and Cyber Security in Social Media.Aynur Tekke & Aybala Lale - 2021 - Akademik İncelemeler Dergisi 16 (2):44-62.
    The aim of this study is to analyze the information in the social media which is being produced and included into the stream by mass media in the context of digital ethics and cyber security. The principles of digital ethics includes norms that takes individual’s privacy of life into consideration. In addition to being a concept related to cyberspace, computer, and computer networks, it also includes the whole human-made activities, for this reason manipulation techniques in cyberspace appear as an important (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • ACTIVE ethics: an information systems ethics for the internet age.Neil Kenneth McBride - 2014 - Journal of Information, Communication and Ethics in Society 12 (1):21-44.
    Purpose– The purpose of this paper is to present a novel mnemonic, ACTIVE, inspired by Mason's 1985 PAPA mnemonic, which will help researchers and IT professionals develop an understanding of the major issues in information ethics.Design/methodology/approach– Theoretical foundations are developed for each element of the mnemonic by reference to philosophical definitions of the terms used and to virtue ethics, particularly MacIntyrean virtue ethics. The paper starts with a critique of the elements of the PAPA mnemonic and then proceeds to develop (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Examining the differences between information professional groups in perceiving information ethics: An analytic hierarchy process study.Hsiu-Ping Yueh, Ching-Yin Huang & Weijane Lin - 2022 - Frontiers in Psychology 13.
    Information and communication technology has a great impact on contemporary society and people’s lives. Especially with the pervasive access to rapidly developing technology, the impact of ICT on society and human values, the norms of ICT use, and the ethical issues derived from them are beyond the past ethical framework and deserve more research attention. The purpose of this study was to explore the key factors that influence the decision-making behaviors of information professionals when they are faced with information ethics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Socio-ethical implications of using AI in accelerating SDG3 in Least Developed Countries.Kutoma Wakunuma, Tilimbe Jiya & Suleiman Aliyu - 2020 - Journal of Responsible Technology 4:100006.
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical considerations of using information obtained from online file sharing sites.Aimee van Wynsberghe & Jeroen van der Ham - 2015 - Journal of Information, Communication and Ethics in Society 13 (3/4):256-267.
    Purpose – The purpose of this paper is to develop a novel approach for the ethical analysis of data collected from an online file-sharing site known as The PirateBay. Since the creation of Napster back in the late 1990s for the sharing and distribution of MP3 files across the Internet, the entertainment industry has struggled to deal with the regulation of information sharing at large. Added to the ethical questions of censorship and distributive justice are questions related to the use (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Attitudes towards information ethics: a view from Egypt.Omar E. M. Khalil & Ahmed A. S. Seleim - 2012 - Journal of Information, Communication and Ethics in Society 10 (4):240-261.
    PurposeThe information technology related ethical issues will only increase in frequency and complexity with the increasing diffusion of IT in economies and societies. The purpose of this paper is to explore Egyptian students' attitudes towards the information ethics issues of privacy, access, property, and accuracy, and it evaluates the possible impact of a number of personal characteristics on such attitudes.Design/methodology/approachThis research utilized a cross‐sectional sample and data set to test five hypotheses. It adopted an instrument to collect the respondents' background (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A comparative study on the information ethics of junior high school students cognition and behavior between taiwan and china: Kaohsiung and nanjing regions used as examples.Wen-Jiuh Chiang, Chihchia Chen, ChiaChien Teng & Jiangjun Gu - 2008 - Science and Engineering Ethics 14 (1):121-138.
    A great deal of progress has been made on information ethics. Which portion is not sufficient? That might be the comparison from countries to countries. The purpose of this study was closely examined using the cross-cultural method for comparison. To determine the ethics cognitions and behaviors of the students, a comprehensive survey was distributed. The questionnaire for the study used Mason’s four essential factors in information ethics that included Privacy, Accuracy, Property and Accessibility (PAPA). The samples were comprised of Kaohsiung (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Individual privacy and computer-based human resource information systems.G. Stephen Taylor & J. Stephen Davis - 1989 - Journal of Business Ethics 8 (7):569 - 576.
    The proliferation of computers in the business realm may lead to ethical problems between individual and societal rights, and the organization's need to control costs. In an attempt to explore the causes of this potential conflict, this study examined the varying levels of sensitivity 223 respondents assigned to different types of information typically stored in computer-based human resource information systems. It was found that information most directly related to the job — pay rate, fringe benefits, educational history — was considered (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Softlifting: A model of motivating factors. [REVIEW]Penny M. Simpson, Debasish Banerjee & Claude L. Simpson - 1994 - Journal of Business Ethics 13 (6):431 - 438.
    Softlifting (software piracy by individuals) is an unethical behavior that pervades today''s computer dependent society. Since a better understanding of underlying considerations of the behavior may provide a basis for remedy, a model of potential determinants of softlifting behavior is developed and tested. The analysis provides some support for the hypothesized model, specifically situational variables, such as delayed acquisition times, and personal gain variables, such as the challenge of copying, affect softlifting behavior. Most importantly, the analysis indicated that ethical perception (...)
    Download  
     
    Export citation  
     
    Bookmark   42 citations  
  • Ethical practice in sharing and mining medical data.Kevin Watson & Dinah M. Payne - 2021 - Journal of Information, Communication and Ethics in Society 19 (1):1-19.
    Purpose The purpose of this paper is to review current practice in sharing and mining medical data revealing benefits, costs and ethical issues. Based on stakeholder perspectives and values, the authors create an ethical code to regulate the sharing and mining of medical information. Design/methodology/approach The framework is based on a review of academic, practitioner and legal research. Findings Owing to the inability of current safeguards to protect consumers from risks related to the disclosure of medical information, the authors develop (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Privacy versus accessibility: The impact of situationally conditioned belief. [REVIEW]Laura Lally - 1996 - Journal of Business Ethics 15 (11):1221 - 1226.
    The information age we are living in and the technology that supports it, raises new ethical concerns. Among these concerns are privacy — the rights of individuals to withold information they consider sensitive, and accessibility — the rights of individuals to obtain information that is relevant to the decisions they must make. Arguments about potential impacts of information technology on privacy and accessibility mask and underlying conflict — that one person's beliefs about their right to relevant information is likely to (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Toward an Ethical Understanding of the Controversial Technology of Online Reverse Auctions.Mohamed Hédi Charki, Emmanuel Josserand & Nabila Boukef Charki - 2011 - Journal of Business Ethics 98 (1):17-37.
    B2B online reverse auctions technology (ORAs) emerged as a popular tool for large buying firms in the late 1990s. However, its growing use has been accompanied by a corresponding increase in unethical behaviors to a point that it has been described as the technology that has triggered more ethical concerns in the e-commerce arena than in any other segment of activity. Our findings first indicate that the establishment of formal ethical criteria based on the restrictive interpretation of ethics as honesty (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The Significance of a Suitable Information Ethical Code.Christina Ling-Hsing Chang - 2011 - Journal of Information Ethics 20 (1):54-85.
    Download  
     
    Export citation  
     
    Bookmark  
  • Development and emancipation.Bernd Carsten Stahl, Neil McBride & Ibrahim Elbeltagi - 2010 - Journal of Information, Communication and Ethics in Society 8 (1):85-107.
    PurposeThe purpose of this paper is to investigate the emancipatory promises and realities of information and communication technology in Egypt.Design/methodology/approachThe combination of Habermasian and Foucauldian ideas implemented by a critical discourse analysis of the Egyptian Information Society Policy and interviews with employees of local decision support systems employees. Promises and rhetoric are contrasted with findings and questioned with regards to their validity.FindingsOn the policy level, analysis shows that the emancipating rhetoric of ICT is not followed through. ICT is mostly seen (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation