{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T07:06:42Z","timestamp":1776496002649,"version":"3.51.2"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T00:00:00Z","timestamp":1552089600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10676-019-09502-5","type":"journal-article","created":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T06:40:46Z","timestamp":1552113646000},"page":"197-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":75,"title":["Data science ethical considerations: a systematic literature review and proposed project framework"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8913-1095","authenticated-orcid":false,"given":"Jeffrey S.","family":"Saltz","sequence":"first","affiliation":[]},{"given":"Neil","family":"Dewar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,9]]},"reference":[{"key":"9502_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17705\/1CAIS.03412","volume":"34","author":"S Boell","year":"2014","unstructured":"Boell, S., & Cecez-Kecmanovic, D. (2014). A hermeneutic approach for conducting literature reviews and literature searches. Communications of the Association for Information Systems, 34, 1.","journal-title":"Communications of the Association for Information Systems"},{"issue":"5","key":"9502_CR2","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1080\/1369118X.2012.678878","volume":"15","author":"D Boyd","year":"2012","unstructured":"Boyd, D, & Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, communication & society, 15(5), 662\u2013679.","journal-title":"Information, communication & society"},{"key":"9502_CR3","first-page":"43","volume-title":"Data and discrimination: Collected essays","author":"D Boyd","year":"2014","unstructured":"Boyd, D, Levy, K., & Marwick, A. E. (2014). The networked nature of algorithmic discrimination. In Data and discrimination: Collected essays (pp.\u00a043\u201357). Washington, DC: Open Technology Institute."},{"key":"9502_CR4","doi-asserted-by":"publisher","first-page":"662679","DOI":"10.1080\/1369118X.2012.678878","volume":"15","author":"K Boyd","year":"2012","unstructured":"Boyd, K. (2012). Critical questions for big data. Information, Communication & Society, 15, 662\u2013679.","journal-title":"Information, Communication & Society"},{"key":"9502_CR5","volume-title":"Digital marketplaces unleashed","author":"A Braun","year":"2018","unstructured":"Braun, A., & Garriga, G. (2018). Consumer journey analytics in the context of data privacy and ethics. In C. Linnhoff-Popien, R. Schneider & M. Zaddach (Eds.), Digital marketplaces unleashed. Berlin: Springer."},{"key":"9502_CR6","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1016\/B978-0-444-51667-1.50051-3","volume-title":"Philosophy of technology and engineering sciences","author":"P Brey","year":"2009","unstructured":"Brey, P., & Soraker, J. (2009). Philosophy of computing and information technology. In D. M. Gabbay, A. W. M. Meijers, J. Woods, & P. Thagard (Eds). Philosophy of technology and engineering sciences (pp.\u00a01341\u20131408). North Holland: Elsevier."},{"key":"9502_CR7","unstructured":"Butrymowicz, S., & Garland, S. (2012). How New York city\u2019s value-added model compares to what other districts, states are doing, hechingerreport. Retrieved from http:\/\/hechingerreport.org\/content\/how-new-york-citys-value-added-model-compares-to-what-other-districts-states-are-doing_7757\/ ."},{"key":"9502_CR8","unstructured":"Bynum, T. (2008). Computer and information ethics. In Stanford encyclopedia of philosophy. Retrieved from http:\/\/plato.stanford.edu\/entries\/ethics-computer\/ . Accessed 14 January 2016"},{"key":"9502_CR9","volume-title":"Computer ethics and professional responsibility: Introductory text","author":"T Bynum","year":"2003","unstructured":"Bynum, T., & Rogerson, S. (2003). Computer ethics and professional responsibility: Introductory text. New York: Wiley"},{"key":"9502_CR10","unstructured":"Chen, A. (2017). Using machine learning to find the 8 types of players in the NBA, Fastbreak. http:\/\/fastbreakdata.com\/classifying-the-modern-nba-player-with-machine-learning-539da03bb824 ."},{"issue":"1","key":"9502_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1111\/isj.12088","volume":"26","author":"R Clarke","year":"2016","unstructured":"Clarke, R. (2016). Big data, big risks. Information Systems Journal, 26(1), 77\u201390.","journal-title":"Information Systems Journal"},{"key":"9502_CR12","unstructured":"Crawford, K. (2013). The hidden biases in big data. Harvard Business Review Online Edn. Harvard Business Review."},{"issue":"3","key":"9502_CR13","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/3144592.3144597","volume":"47","author":"PB Laat De","year":"2017","unstructured":"De Laat, P. B. (2017). Big data and algorithmic decision-making: Can transparency restore accountability? ACM SIGCAS Computers and Society, 47(3), 39\u201353.","journal-title":"ACM SIGCAS Computers and Society"},{"key":"9502_CR14","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-319-31861-5_13","volume-title":"Data science and big data computing","author":"N Dorasamy","year":"2016","unstructured":"Dorasamy, N., & Pomazalov\u00e1, N. (2016). Social impact and social media analysis relating to big data. In Data science and big data computing (pp.\u00a0293\u2013313). Cham: Springer."},{"issue":"2","key":"9502_CR15","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1089\/big.2016.0054","volume":"5","author":"M Drosou","year":"2017","unstructured":"Drosou, M., Jagadish, H. V., Pitoura, E., & Stoyanovich, J. (2017). Diversity in big data: A review. Big data, 5(2), 73\u201384.","journal-title":"Big data"},{"issue":"1","key":"9502_CR16","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1111\/j.1365-2648.2007.04569.x","volume":"62","author":"S Elo","year":"2007","unstructured":"Elo, S., & Kyng\u00e4s, H. (2007). The qualitative content analysis process. Journal of Advanced Nursing, 62(1), 107\u2013115.","journal-title":"Journal of Advanced Nursing"},{"key":"9502_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1080\/08900523.2014.863126","volume":"29","author":"J Fairfield","year":"2014","unstructured":"Fairfield, J., & Shtein, H. (2014). Big data, big problems: Emerging issues in the ethics and data science of journalism. Journal of Mass Media Ethics, 29, 38\u201351.","journal-title":"Journal of Mass Media Ethics"},{"key":"9502_CR18","first-page":"64","volume":"2","author":"JL Fleiss","year":"2004","unstructured":"Fleiss, J. L., Levin, B., & Paik, M. C. (2004). Determining sample sizes needed to detect a difference between two proportions. Statistical Methods for Rates and Proportions, 2, 64\u201385.","journal-title":"Statistical Methods for Rates and Proportions"},{"key":"9502_CR19","first-page":"2083","volume":"374","author":"L Floridi","year":"2016","unstructured":"Floridi, L., & Taddeo, M. (2016). What is data ethics?. Philosophical Transactions Series A, 374, 2083.","journal-title":"Philosophical Transactions Series A"},{"key":"9502_CR20","unstructured":"Fong, K. (2016). The ethics conversation we\u2019re not having about analytics. Harvard Business Review Online Edn. Retrieved from http:\/\/blogs.hbr.org\/2013\/04\/thehidden-biases-in-big-data\/ . Accessed 20 August 2017."},{"issue":"5","key":"9502_CR21","doi-asserted-by":"publisher","first-page":"88","DOI":"10.3390\/rel8050088","volume":"8","author":"M Fuller","year":"2017","unstructured":"Fuller, M. (2017). Big data, ethics and religion: New questions from a new science. Religions, 8(5), 88.","journal-title":"Religions"},{"issue":"2083","key":"9502_CR22","doi-asserted-by":"publisher","first-page":"20160132","DOI":"10.1098\/rsta.2016.0132","volume":"374","author":"P Grindrod","year":"2016","unstructured":"Grindrod, P. (2016). Beyond privacy and exposure: Ethical issues within citizen-facing analytics. Philosophical Transactions of the Royal Society A, 374(2083), 20160132.","journal-title":"Philosophical Transactions of the Royal Society A"},{"issue":"3","key":"9502_CR23","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1145\/2874239.2874256","volume":"45","author":"A Gumbus","year":"2016","unstructured":"Gumbus, A., & Grodzinsky, F. (2016). Era of big data: Danger of descrimination. ACM SIGCAS Computers and Society, 45(3), 118\u2013125.","journal-title":"ACM SIGCAS Computers and Society"},{"key":"9502_CR24","unstructured":"Haffar, J. (2015). Have you seen ASUM-DM? Retrieved from IBM: https:\/\/developer.ibm.com\/predictiveanalytics\/2015\/10\/16\/have-you-seen-asum-dm\/ ."},{"key":"9502_CR25","unstructured":"Harkens, A. (2016). \u2018Rear window ethics\u2019 and discrimination: The darker side of big data. In European conference on e-government (p.\u00a0267). Academic Conferences International Limited."},{"issue":"9","key":"9502_CR26","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1177\/1049732305276687","volume":"15","author":"H-F Hsieh","year":"2005","unstructured":"Hsieh, H.-F., & Shannon, S. E. (2005). Three approaches to qualitative content analysis. Qualitative Health Research, 15(9), 1277\u20131288.","journal-title":"Qualitative Health Research"},{"issue":"7","key":"9502_CR27","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/2611567","volume":"57","author":"H Jagadish","year":"2014","unstructured":"Jagadish, H., Gehrke, J., Labrinidis, A., Papakonstantinou, Y., Patel, J. M., Ramakrishnan, R., & Shahabi, C. (2014). Big data and its technical challenges. Communications of the ACM, 57(7), 86\u201394.","journal-title":"Communications of the ACM"},{"key":"9502_CR28","volume-title":"Computer ethics","author":"D Johnson","year":"1985","unstructured":"Johnson, D. (1985). Computer ethics. Upper Saddle River: Prentice-Hall."},{"key":"9502_CR29","volume-title":"Computers, ethics and social values","author":"D Johnson","year":"1995","unstructured":"Johnson, D., & Nissenbaum, H. (1995). Computers, ethics and social values. New York: Pearson."},{"issue":"3","key":"9502_CR30","doi-asserted-by":"publisher","first-page":"547","DOI":"10.2307\/25148807","volume":"31","author":"D Joseph","year":"2007","unstructured":"Joseph, D., Ng, K., Koh, C., and Ang. S (2007). Turnover of information technology professionals: A narrative review, meta-analytic structural equation modeling, and model development. MIS Quarterly, 31(3), 547\u2013577.","journal-title":"MIS Quarterly"},{"key":"9502_CR31","volume-title":"Guidelines for performing systematic literature reviews in software engineering","author":"B Kitchenham","year":"2007","unstructured":"Kitchenham, B., & Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering. UK: Keele."},{"issue":"2083","key":"9502_CR32","doi-asserted-by":"publisher","first-page":"20160122","DOI":"10.1098\/rsta.2016.0122","volume":"374","author":"S Leonelli","year":"2016","unstructured":"Leonelli, S. (2016). Locating ethics in data science: Responsibility and accountability in global and distributed knowledge production systems. Philosophical Transactions of the Royal Society A, 374(2083), 20160122.","journal-title":"Philosophical Transactions of the Royal Society A"},{"issue":"2","key":"9502_CR33","doi-asserted-by":"crossref","first-page":"37","DOI":"10.29173\/irie87","volume":"10","author":"N Manders-Huits","year":"2009","unstructured":"Manders-Huits, N., & Zimmer, M. (2009). Values and pragmatic action: The challenges of introducing ethical intelligence in technical design communities. International Review of Information Ethics, 10(2), 37\u201345.","journal-title":"International Review of Information Ethics"},{"key":"9502_CR34","first-page":"2","volume":"14","author":"KE Martin","year":"2015","unstructured":"Martin, K. E. (2015). Ethical issues in the big data industry. MIS Quarterly Executive, 14, 2.","journal-title":"MIS Quarterly Executive"},{"issue":"2","key":"9502_CR35","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MM.2013.35","volume":"33","author":"R Mateosian","year":"2013","unstructured":"Mateosian, R. (2013). Ethics of big data. IEEE Micro, 33(2), 60\u201361.","journal-title":"IEEE Micro"},{"key":"9502_CR36","unstructured":"Metcalf, J., Keller, E., Boyd, D. (2016). Perspectives on big data, ethics and society. Council for Big Data, Ethics and Society. http:\/\/bdes.datasociety.net\/council-output\/perspectives-on-big-data-ethics-andsociety\/ ."},{"issue":"4","key":"9502_CR37","doi-asserted-by":"publisher","first-page":"833","DOI":"10.2307\/25750707","volume":"34","author":"J Mingers","year":"2010","unstructured":"Mingers, J., & Walsham, G. (2010). Towards ethical information systems: The contribution of discourse ethics. MIS Quarterly, 34(4), 833\u2013854.","journal-title":"MIS Quarterly"},{"key":"9502_CR38","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s13347-017-0253-7","volume":"30","author":"B Mittelstadt","year":"2017","unstructured":"Mittelstadt, B. (2017). From individual to group privacy in big data analytics. Philosophy & Technology, 30, 475\u2013494.","journal-title":"Philosophy & Technology"},{"key":"9502_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2015.02.001","author":"S Newell","year":"2015","unstructured":"Newell, S., & Marabelli, M. (2015). Strategic opportunities (and challenges) of algorithmic decisionmaking: A call for action on the long-term societal effects of \u2018datification\u2019. The Journal of Strategic Information Systems. https:\/\/doi.org\/10.1016\/j.jsis.2015.02.001 .","journal-title":"The Journal of Strategic Information Systems"},{"key":"9502_CR40","unstructured":"Nyes, K. (2016). White house to data scientists: We need you. Computer world. Retrieved from http:\/\/www.computerworld.com\/article\/3125660\/big-data\/white-house-to-data-scientists-we-need-you.html . Accessed 20 August 2017."},{"issue":"1","key":"9502_CR41","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s10676-016-9410-4","volume":"19","author":"M Pascalev","year":"2017","unstructured":"Pascalev, M. (2017). Privacy exchanges: Restoring consent in privacy self-management. Ethics and Information Technology, 19(1), 39\u201348. https:\/\/doi.org\/10.1007\/s10676-016-9410-4 .","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9502_CR42","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1057\/ejis.2014.7","volume":"23","author":"F Rowe","year":"2014","unstructured":"Rowe, F. (2014). What literature review is not: Diversity, boundaries and recommendations. European Journal of Information Systems, 23(3), 241\u2013255.","journal-title":"European Journal of Information Systems"},{"key":"9502_CR43","doi-asserted-by":"crossref","unstructured":"Saltz, J., Dewar, N., & Heckman, R. (2018). Key concepts for a data science ethics curriculum. In Proceedings of the 49th ACM technical symposium on computer science education (pp.\u00a0952\u2013957). ACM.","DOI":"10.1145\/3159450.3159483"},{"key":"9502_CR44","volume-title":"An introduction to data science","author":"J Saltz","year":"2017","unstructured":"Saltz, J., & Stanton, J. (2017). An introduction to data science. Thousand Oaks: SAGE Publications."},{"key":"9502_CR45","volume-title":"Data and discrimination: Collected essays","author":"C Sandvig","year":"2014","unstructured":"Sandvig, C., Hamilton, K., Karahalios, K., & Langbort, C. (2014). An algorithm audit. In Data and discrimination: Collected essays. New York: New America, Open Technology Institute."},{"key":"9502_CR46","doi-asserted-by":"crossref","unstructured":"Schwartz, P. M. (2011). Privacy, ethics and analytics. IEEE security and privacy 9(3). IEEE.","DOI":"10.1109\/MSP.2011.61"},{"issue":"4","key":"9502_CR47","first-page":"13","volume":"5","author":"C Shearer","year":"2000","unstructured":"Shearer, C. (2000). The CRISP-DM model: The new blueprint for data mining. Journal of Data Warehousing, 5(4), 13\u201322.","journal-title":"Journal of Data Warehousing"},{"key":"9502_CR49","unstructured":"Someh, I. A., Breidbach, C. F., Davern, M. J., & Shanks, G. G. (2016). Ethical implications of big data analytics. In ECIS (pp. Research-in)."},{"issue":"4","key":"9502_CR50","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/2871196","volume":"48","author":"BC Stahl","year":"2016","unstructured":"Stahl, B. C., Timmermans, J., & Mittelstadt, B. D. (2016). The ethics of computing: A survey of the computing-oriented literature. ACM Computing Surveys (CSUR), 48(4), 55.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"9502_CR51","first-page":"16","volume-title":"Locating discrimination in data-based systems. Data and discrimination: Collected essays","author":"D Stevenson","year":"2014","unstructured":"Stevenson, D. (2014). Locating discrimination in data-based systems. Data and discrimination: Collected essays (16\u201320). Washington, DC: New America\/Open Technology Institute"},{"key":"9502_CR52","doi-asserted-by":"crossref","unstructured":"Stoyanovich, J., Howe, B., Abiteboul, S., Miklau, G., Sahuguet, A., & Weikum, G. (2017). Fides: Towards a platform for responsible data science. In SSDBM\u201917-29th International Conference on Scientific and Statistical Database Management.","DOI":"10.1145\/3085504.3085530"},{"key":"9502_CR53","doi-asserted-by":"crossref","unstructured":"Sweeney, L. (2013). Discrimination in Online Ad Delivery. ACM Queue 11(3). Association of Computing Machinery.","DOI":"10.1145\/2460276.2460278"},{"key":"9502_CR54","unstructured":"Tene, O., & Polotensky, J. (2012). Privacy in the age of big data. Stanford Law Review."},{"key":"9502_CR55","unstructured":"Tiell, S., & Metcalf, J. (2016). The Universal Principles of Data Science Ethics. Accenture Labs. https:\/\/www.accenture.com\/t20160629T012639__w__\/us-en\/_acnmedia\/PDF-24\/Accenture-Universal-Principles-Data-Ethics.pdf ."},{"issue":"6","key":"9502_CR56","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1007\/s11948-014-9613-1","volume":"21","author":"RE Tractenberg","year":"2015","unstructured":"Tractenberg, R. E., Russell, A. J., Morgan, G. J., FitzGerald, K. T., Collmann, J., Vinsel, L., \u2026 Dolling, L. M. (2015). Using ethical reasoning to amplify the reach and resonance of professional codes of conduct in training big data scientists. Science and Engineering Ethics, 21(6), 1485\u20131507.","journal-title":"Science and Engineering Ethics"},{"key":"9502_CR57","doi-asserted-by":"crossref","unstructured":"Voronova, L., & Kazantsev, N. (2015). The ethics of big data: Analytical survey. In Business informatics (CBI), 2015 IEEE 17th conference on (Vol.\u00a02, pp.\u00a057\u201363). IEEE.","DOI":"10.1109\/CBI.2015.27"},{"issue":"2","key":"9502_CR58","first-page":"192","volume":"11","author":"J Wielki","year":"2015","unstructured":"Wielki, J. (2015). The social and ethical challenges connected with the big data phenomenon. Polish Journal of Management Studies, 11(2), 192\u2013202.","journal-title":"Polish Journal of Management Studies"},{"key":"9502_CR59","volume-title":"The human use of human beings","author":"N Wiener","year":"1954","unstructured":"Wiener, N. (1954). The human use of human beings. New York: Doubleday."},{"issue":"2","key":"9502_CR60","doi-asserted-by":"publisher","first-page":"205395171455925","DOI":"10.1177\/2053951714559253","volume":"1","author":"A Zwitter","year":"2014","unstructured":"Zwitter, A. (2014). Big data ethics. Big Data & Society, 1(2), 2053951714559253.","journal-title":"Big Data & Society"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09502-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-019-09502-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09502-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T15:55:15Z","timestamp":1663084515000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-019-09502-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,9]]},"references-count":59,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["9502"],"URL":"https:\/\/doi.org\/10.1007\/s10676-019-09502-5","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,9]]},"assertion":[{"value":"9 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}