{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:20:02Z","timestamp":1743002402504,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319448046"},{"type":"electronic","value":"9783319448053"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-44805-3_10","type":"book-chapter","created":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T01:03:04Z","timestamp":1472000584000},"page":"116-129","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Participatory Design Program for Making Ethical Choices in Client Vendor Relations in ISD"],"prefix":"10.1007","author":[{"given":"Tero","family":"Vartiainen","sequence":"first","affiliation":[]},{"given":"Olli I.","family":"Heimo","sequence":"additional","affiliation":[]},{"given":"Kai K.","family":"Kimppa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"issue":"7","key":"10_CR1","first-page":"409","volume":"9","author":"CW Park","year":"2008","unstructured":"Park, C.W., Im, G., Keil, M.: Overcoming the mum effect in IT project reporting: impacts of fault responsibility and time urgency. J. Assoc. Inf. Syst. 9(7), 409 (2008). Article 17","journal-title":"J. Assoc. Inf. Syst."},{"issue":"4","key":"10_CR2","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1080\/095373203000136015","volume":"15","author":"J Natovich","year":"2003","unstructured":"Natovich, J.: Vendor related risks in IT development: a chronology of an outsourced project failure. Technol. Anal. Strat. Manag. 15(4), 409\u2013419 (2003)","journal-title":"Technol. Anal. Strat. Manag."},{"issue":"2","key":"10_CR3","first-page":"19","volume":"10","author":"CC Claybaugh","year":"2009","unstructured":"Claybaugh, C.C., Srite, M.: Factors contributing to the information technology vendor-client relationship. J. Inf. Technol. Theor. Appl. 10(2), 19\u201338 (2009)","journal-title":"J. Inf. Technol. Theor. Appl."},{"issue":"1","key":"10_CR4","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/175222.175229","volume":"37","author":"WR Collins","year":"1994","unstructured":"Collins, W.R., Miller, K.W., Spielman, B.J., Wherry, P.: How good is good enough? An ethical analysis of software construction and use. Commun. ACM 37(1), 81\u201391 (1994)","journal-title":"Commun. ACM"},{"key":"10_CR5","unstructured":"Bapna, R., Gupta, A., Ray, G., Singh, S.: Specialization, integration, and multi-sourcing: a study of large IT outsourcing projects. In: International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design, pp. 3537\u20133551 (2013)"},{"key":"10_CR6","unstructured":"Koh, C., Tay, C., Ang, S.: Managing vendor-client expectations in IT outsourcing: a psychological contract perspective. In: ICIS 1999 Proceedings, Paper 56 (1999)"},{"issue":"6","key":"10_CR7","first-page":"374","volume":"12","author":"W-K Lim","year":"2011","unstructured":"Lim, W.-K., Sia, S.K., Yeow, A.: Managing risks in a failing IT project: a social constructionist view. J. Assoc. Inf. Syst. 12(6), 374 (2011). Article 2","journal-title":"J. Assoc. Inf. Syst."},{"key":"10_CR8","unstructured":"Tufte, T., Mefalopulos, P.: Participatory communication: a practical guide. World Bank Working Paper 170, World Bank, Washington (2009)"},{"key":"10_CR9","unstructured":"Lind, M., Melin U.: Dialectics in information systems research: potentials and challenges. In: Remenyi, D., Brown, A. (eds.) Proceedings of 2nd European Conference on Research Methodology for Business and Management Studies (ECRM 2003), pp. 209\u2013218. Reading University, Reading (2003)"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1002\/sres.511","volume":"20","author":"R Robinson","year":"2002","unstructured":"Robinson, R., Wilson, F.: Soft systems methodology and dialectics in an information environment: a case study of the Battle of Britain. Syst. Res. Behav. Sci. 20, 255\u2013268 (2002)","journal-title":"Syst. Res. Behav. Sci."},{"key":"10_CR11","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1002\/smj.4250131013","volume":"13","author":"AH Van de Ven","year":"1992","unstructured":"Van de Ven, A.H.: Suggestions for studying strategy process: a research note. Strat. Manag. J. 13, 169\u2013188 (1992)","journal-title":"Strat. Manag. J."},{"key":"10_CR12","volume-title":"On Research Methods","author":"P J\u00e4rvinen","year":"2001","unstructured":"J\u00e4rvinen, P.: On Research Methods. Opinpajan kirja, Tampere (2001)"},{"issue":"2","key":"10_CR13","doi-asserted-by":"publisher","first-page":"171","DOI":"10.2307\/249378","volume":"15","author":"SL Caudle","year":"1991","unstructured":"Caudle, S.L., Gorr, W.L., Newcomer, K.E.: Key information systems management issues for the public sector. MIS Q. 15(2), 171\u2013185 (1991). \n                    http:\/\/www.jstor.org\/stable\/249378?seq=11\n                    \n                  . Accessed 28 Jan 2016","journal-title":"MIS Q."},{"issue":"1","key":"10_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.ijinfomgt.2003.12.001","volume":"24","author":"AM Khalfan","year":"2004","unstructured":"Khalfan, A.M.: Information security considerations in IS\/IT outsourcing projects: a descriptive case study of two sectors. Int. J. Inf. Manag. 24(1), 29\u201342 (2004)","journal-title":"Int. J. Inf. Manag."},{"issue":"1","key":"10_CR15","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1108\/17506160810862955","volume":"2","author":"KM Rosacker","year":"2008","unstructured":"Rosacker, K.M., Olson, D.L.: Public sector information system critical success factors. Transform. Gov.: People, Process Policy 2(1), 60\u201370 (2008)","journal-title":"Transform. Gov.: People, Process Policy"},{"key":"10_CR16","volume-title":"Information Systems Management in Practice","author":"BC McNurlin","year":"2009","unstructured":"McNurlin, B.C., Sprague Jr., R.H., Bui, T.: Information Systems Management in Practice. Prentice Hall, New Jersey (2009)"},{"key":"10_CR17","unstructured":"Osakeyhti\u00f6laki (OYL, 624\/2006) (2016). \n                    http:\/\/www.finlex.fi\/fi\/laki\/alkup\/2006\/20060624\n                    \n                  . Accessed 28 Jan 2016"},{"key":"10_CR18","unstructured":"Heimo, O.I., Koskinen J.S.S., Kainu, V.A., Kimppa, K.K.: Problem of power: the missing agent. In: Buchanan, E.A., de Laat, P.B., Tavani, H.T., Klucarich, J. (eds.) Proceedings of 2013 Computer Ethics, Philosophical Enquiry (CEPE) Conference, pp. 160\u2013169. The International Society of Ethics and Information Technology (2014)"},{"key":"10_CR19","unstructured":"Heimo, O.I., Fairweather, N.B., Kimppa, K.K.: The Finnish eVoting experiment: what went wrong? In: Ethicomp 2010 - Universitat Rovira i Virgili, Tarragona, Spain, 14\u201316 April 2010, pp. 290\u2013298 (2010)"},{"key":"10_CR20","unstructured":"Heimo, O.I., Koskinen, J.S., Kimppa, K.K.: Responsibility in acquiring critical governmental information systems: whose fault is failure? In: ETHICOMP 2013 \u2013 The Possibilities of Ethical ICT, University of Southern Denmark, Kolding, Denmark, 12\u201314 June 2013, pp. 213\u2013217 (2013)"},{"key":"10_CR21","volume-title":"Computer Ethics: Analyzing Information Technology","author":"DG Johnson","year":"2009","unstructured":"Johnson, D.G., Miller, K.W.: Computer Ethics: Analyzing Information Technology, 4th edn. Pearson Education, Inc., New Jersey (2009)","edition":"4"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1037\/0003-066X.31.10.689","volume":"31","author":"KF Riegel","year":"1976","unstructured":"Riegel, K.F.: The dialectics of human development. Am. Psychol. 31, 689\u2013700 (1976)","journal-title":"Am. Psychol."},{"issue":"3","key":"10_CR23","doi-asserted-by":"crossref","first-page":"510","DOI":"10.5465\/amr.1995.9508080329","volume":"20","author":"AH Van de Ven","year":"1995","unstructured":"Van de Ven, A.H., Poole, M.S.: Four process theories explaining development and change in organisations. Acad. Manag. Rev. 20(3), 510\u2013540 (1995)","journal-title":"Acad. Manag. Rev."},{"issue":"6","key":"10_CR24","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/153571.255960","volume":"36","author":"MJ Muller","year":"1993","unstructured":"Muller, M.J., Kuhn, S.: Participatory design. Commun. ACM 36(6), 24\u201328 (1993)","journal-title":"Commun. ACM"},{"issue":"6","key":"10_CR25","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1016\/S0142-694X(03)00040-1","volume":"24","author":"R Luck","year":"2003","unstructured":"Luck, R.: Dialogue in participatory design. Des. Stud. 24(6), 523\u2013535 (2003)","journal-title":"Des. Stud."},{"issue":"1","key":"10_CR26","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1108\/JICES-11-2013-0044","volume":"12","author":"BC Stahl","year":"2014","unstructured":"Stahl, B.C.: Participatory design as ethical practice \u2013 concepts, reality and conditions. J. Inf. Commun. Ethics Soc. 12(1), 10\u201313 (2014)","journal-title":"J. Inf. Commun. Ethics Soc."},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1057\/palgrave.ejis.3000589","volume":"15","author":"G Walsham","year":"2006","unstructured":"Walsham, G.: Doing interpretive research. Eur. J. Inf. Syst. 15, 320\u2013330 (2006)","journal-title":"Eur. J. Inf. Syst."},{"key":"10_CR28","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-93070-806-8","volume-title":"Qualitative Research in IS: Issues and Trends","author":"EM Trauth","year":"2001","unstructured":"Trauth, E.M.: Qualitative Research in IS: Issues and Trends. Idea Group Publishing, Hershey (2001)"},{"issue":"1","key":"10_CR29","doi-asserted-by":"publisher","first-page":"67","DOI":"10.2307\/249410","volume":"23","author":"HK Klein","year":"1999","unstructured":"Klein, H.K., Myers, M.D.: A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Q. 23(1), 67\u201394 (1999)","journal-title":"MIS Q."},{"key":"10_CR30","volume-title":"Qualitative Evaluation and Research Methods","author":"MQ Patton","year":"1990","unstructured":"Patton, M.Q.: Qualitative Evaluation and Research Methods. Sage, Newbury Park (1990)"},{"key":"10_CR31","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199255504.001.0001","volume-title":"The Balanced Company: A Theory of Corporate Integrity","author":"M Kaptein","year":"2002","unstructured":"Kaptein, M., Wempe, J.: The Balanced Company: A Theory of Corporate Integrity. Oxford University Press, Oxford (2002)"},{"key":"10_CR32","first-page":"24","volume-title":"Morality, Moral Behavior, and Moral Development","author":"J Rest","year":"1984","unstructured":"Rest, J.: The major components of morality. In: Kurtines, W.M., Gewirtz, J.L. (eds.) Morality, Moral Behavior, and Moral Development, pp. 24\u201338. Wiley, New York (1984)"}],"container-title":["IFIP Advances in Information and Communication Technology","Technology and Intimacy: Choice or Coercion"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-44805-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:06:51Z","timestamp":1598227611000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-44805-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319448046","9783319448053"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-44805-3_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"25 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Human Choice and Computers","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}