{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T01:09:07Z","timestamp":1768698547941,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1007\/s10796-009-9201-0","type":"journal-article","created":{"date-parts":[[2009,7,30]],"date-time":"2009-07-30T09:21:33Z","timestamp":1248945693000},"page":"415-424","source":"Crossref","is-referenced-by-count":11,"title":["Agents of responsibility\u2014freelance web developers in web applications development"],"prefix":"10.1007","volume":"12","author":[{"given":"Malik Aleem","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Jeroen","family":"van den Hoven","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,7,31]]},"reference":[{"issue":"1","key":"9201_CR1","doi-asserted-by":"crossref","first-page":"78","DOI":"10.2307\/2392767","volume":"31","author":"SR Barley","year":"1986","unstructured":"Barley, S. R. (1986). Technology as an Occasion for Structuring: Evidence from Observations of CT Scanners and the Social Order of Radiology Departments. Administrative Science Quarterly, 31(1), 78\u2013108.","journal-title":"Administrative Science Quarterly"},{"key":"9201_CR2","doi-asserted-by":"crossref","unstructured":"Beaumont, N. B. (2006). An Overview of Service Level Agreements. In H. Kehal & V. Singh (Eds.), Outsourcing and Offshoring in the 21st Century: A Socio-Economic Perspective (pp. 302\u2013325): IGI Publishing.","DOI":"10.4018\/978-1-59140-875-8.ch014"},{"issue":"3","key":"9201_CR3","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/S0267-3649(03)00306-6","volume":"19","author":"K Burden","year":"2003","unstructured":"Burden, K., & Palmer, C. (2003). Internet crime: Cyber Crime\u2014A new breed of criminal? Computer Law & Security Report, 19(3), 222\u2013227.","journal-title":"Computer Law & Security Report"},{"key":"9201_CR4","unstructured":"Cane, P. (2002). Responsibility in law and morality: Hart Publishing."},{"key":"9201_CR5","unstructured":"Chan, E. S. K., & Swatman, P. M. C. (2000). Electronic Commerce Careers: a Preliminary Survey of the Online Marketplace. Paper presented at the Electronic Commerce: The End of the Beginning\u201413th International Bled Electronic Commerce Conference, Bled, Slovenia."},{"issue":"4","key":"9201_CR6","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/242889.242890","volume":"26","author":"H Chuck","year":"1996","unstructured":"Chuck, H. (1996). Unintentional power in the design of computer systems. SIGCAS Comput. Soc., 26(4), 6\u20139.","journal-title":"SIGCAS Comput. Soc."},{"issue":"1","key":"9201_CR7","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/175222.175229","volume":"37","author":"WR Collins","year":"1994","unstructured":"Collins, W. R., Keith, W. M., Bethany, J. S., & Phillip, W. (1994). How good is good enough?: an ethical analysis of software construction and use. Communications of the ACM, 37(1), 81\u201391.","journal-title":"Communications of the ACM"},{"key":"9201_CR8","volume-title":"The management of normality: critical essays in health and welfare","author":"A Swaan De","year":"1990","unstructured":"De Swaan, A. (1990). The management of normality: critical essays in health and welfare. London; New York: Routledge."},{"key":"9201_CR9","volume-title":"Building the virtual state: information technology and institutional change","author":"JE Fountain","year":"2001","unstructured":"Fountain, J. E. (2001). Building the virtual state: information technology and institutional change. Washington, D.C.: Brookings Institution."},{"key":"9201_CR10","unstructured":"Friedman, B., Peter H. Kahn, J., & Borning, A. (2002). Value Sensitive Design: Theory and Methods (Report): University of Washington, Department of Computer Science and Engineering."},{"issue":"1","key":"9201_CR11","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MC.2005.26","volume":"38","author":"D Geer","year":"2005","unstructured":"Geer, D. (2005). Malicious bots threaten network security. Computer, 38(1), 18\u201320.","journal-title":"Computer"},{"key":"9201_CR12","doi-asserted-by":"crossref","unstructured":"Gil-Garcia, J. R. (2006). Enacting State Websites: A Mixed Method Study Exploring E-Government Success in Multi-Organizational Settings. Paper presented at the Proceedings of the 39th Annual Hawaii International Conference on System Sciences, 2006. HICSS '06, Kauai.","DOI":"10.1109\/HICSS.2006.149"},{"key":"9201_CR13","unstructured":"Gleason, D. H. (2002). ICT Professionalism. Paper presented at the ETHICOMP 2002 \"The Transformation of Organisations in the Information Age: Social and Ethical Implications, Lisbon, Portugal."},{"issue":"1","key":"9201_CR14","first-page":"54","volume":"4","author":"D Gotterbarn","year":"1995","unstructured":"Gotterbarn, D. (1995). The Moral Responsibility of Software Developers: Three Levels of Professional Software Engineering. Journal of Information Ethics, 4(1), 54\u201364.","journal-title":"Journal of Information Ethics"},{"issue":"2","key":"9201_CR15","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/s11948-001-0043-5","volume":"7","author":"D Gotterbarn","year":"2001","unstructured":"Gotterbarn, D. (2001). Informatics and professional responsibility. Science and Engineering Ethics, 7(2), 221\u2013230.","journal-title":"Science and Engineering Ethics"},{"key":"9201_CR16","first-page":"559","volume-title":"Computer, Ethics & Social Values","author":"DG Johnson","year":"1995","unstructured":"Johnson, D. G. (1995). Professional Ethics. In D. G. Johnson & H. Nissenbaum (Eds.), Computer, Ethics & Social Values (pp. 559\u2013572). Upper Saddle River, NJ: Prentice Hall. 07458."},{"issue":"2","key":"9201_CR17","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s10676-005-4585-0","volume":"7","author":"D Johnson","year":"2005","unstructured":"Johnson, D., & Powers, T. (2005). Computer Systems and Responsibility: A Normative Look at Technological Complexity. Ethics and Information Technology, 7(2), 99\u2013107.","journal-title":"Ethics and Information Technology"},{"issue":"30","key":"9201_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1088431.1088204","volume":"6","author":"ME Kabay","year":"2005","unstructured":"Kabay, M. E. (2005). Some notes on malware. Ubiquity, 6(30), 1\u20131.","journal-title":"Ubiquity"},{"key":"9201_CR19","doi-asserted-by":"crossref","unstructured":"Lawton, G. (2007). Web 2.0 Creates Security Challenges. Computer, 40(10), 13\u201316.","DOI":"10.1109\/MC.2007.367"},{"key":"9201_CR20","unstructured":"Leung, C. K., & Wong, J. (2000). Professional Ethics\u2014A life-long pursuit by an engineer. Paper presented at the IVETA Conference 2000: Vocational Education and Training for Life Long Learning in the Information Era, Hong Kong."},{"key":"9201_CR21","unstructured":"Lima, T. d., Royakkers, L. e., & Dignum, F. (2008). Towards a Formalization of Responsibility. Paper presented at the 3rd International Workshop on Normative Multiagent Systems NorMAS 2008, Luxembourg."},{"issue":"5","key":"9201_CR22","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/S1353-4858(07)70037-5","volume":"2007","author":"G Ollmann","year":"2007","unstructured":"Ollmann, G. (2007). Writing secure code. Network Security, 2007(5), 16\u201320.","journal-title":"Network Security"},{"key":"9201_CR23","volume-title":"Ethics for the information age","author":"MJ Quinn","year":"2005","unstructured":"Quinn, M. J. (2005). Ethics for the information age. Boston: Pearson\/Addison-Wesley."},{"issue":"3","key":"9201_CR24","first-page":"50","volume":"35","author":"M Radnofsky","year":"2006","unstructured":"Radnofsky, M. (2006). Corporate and Government Computers Hacked by Juveniles. The Public Manager, 35(3), 50\u201355.","journal-title":"The Public Manager"},{"key":"9201_CR25","doi-asserted-by":"crossref","unstructured":"Rogerson, S. (2002). The software engineering code of ethics and professional practice: a case for being proactive. Paper presented at the Proceedings. 26th Annual International Computer Software and Applications Conference, COMPSAC 2002, Oxford, England.","DOI":"10.1109\/CMPSAC.2002.1045025"},{"key":"9201_CR26","doi-asserted-by":"crossref","DOI":"10.1109\/VLHCC.2005.73","volume-title":"Who, what, and how: a survey of informal and professional Web developers","author":"MB Rosson","year":"2005","unstructured":"Rosson, M. B., Ballin, J., & Rode, J. (2005). Who, what, and how: a survey of informal and professional Web developers. Dallas, Texas, USA: Paper presented at the IEEE Symposium on Visual Languages and Human-Centric Computing."},{"issue":"1","key":"9201_CR27","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/0164-1212(92)90079-Y","volume":"17","author":"EH Spafford","year":"1992","unstructured":"Spafford, E. H. (1992). Are computer hacker break-ins ethical? Journal of Systems and Software, 17(1), 41\u201347.","journal-title":"Journal of Systems and Software"},{"key":"9201_CR28","doi-asserted-by":"crossref","unstructured":"Stahl, B. C. (2002). Social Responsibility in the Information Age is to Maximise Profits\u2014Isn't It? Paper presented at the 2002 Information Resources Management Association International Conference, Issues and Trends of Information Technology Management in Contemporary Organizations, Seattle, USA.","DOI":"10.4018\/978-1-93177-743-8.ch008"},{"issue":"4","key":"9201_CR29","first-page":"49","volume":"1","author":"BC Stahl","year":"2006","unstructured":"Stahl, B. C. (2006). Is Forensic Computing a Profession? Revisiting an Old Debate in a New Field. Journal of Digital Forensics, Security and Law, 1(4), 49\u201366.","journal-title":"Journal of Digital Forensics, Security and Law"},{"issue":"2","key":"9201_CR30","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/s10676-004-1266-3","volume":"6","author":"A Takanen","year":"2004","unstructured":"Takanen, A., Vuorij\u00e4rvi, P., Laakso, M., & R\u00f6ning, J. (2004). Agents of responsibility in software vulnerability processes. Ethics and Information Technology, 6(2), 93\u2013110.","journal-title":"Ethics and Information Technology"},{"issue":"6","key":"9201_CR31","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/S0950-5849(02)00024-1","volume":"44","author":"MJ Taylor","year":"2002","unstructured":"Taylor, M. J., McWilliam, J., Forsyth, H., & Wade, S. (2002). Methodologies and website development: a survey of practice. Information and Software Technology, 44(6), 381\u2013391.","journal-title":"Information and Software Technology"},{"key":"9201_CR32","first-page":"97","volume-title":"Public administration in an information age : a handbook","author":"MJ Hoven Van den","year":"1998","unstructured":"Van den Hoven, M. J. (1998). Moral Responsibility, Public Office and Information Technology. In I. T. M. Snellen & Donk WBHJvd (Eds.), Public administration in an information age : a handbook (pp. 97\u2013112). Amsterdam; Washington, DC: IOS."},{"key":"9201_CR33","unstructured":"Van den Hoven, J. (2008). Information Technology, Privacy, and the Protection of Personal Data. In J. v. d. Hoven & J. Weckert (Eds.), Information Technology and Moral Philosophy (pp. 301\u2013322): Cambridge University Press."},{"issue":"12","key":"9201_CR34","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/S1361-3723(02)01210-1","volume":"2002","author":"E Wales","year":"2002","unstructured":"Wales, E. (2002). Your Money or your Website? Computer Fraud & Security, 2002(12), 7\u20138.","journal-title":"Computer Fraud & Security"},{"issue":"10","key":"9201_CR35","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/S1353-4858(07)70094-6","volume":"2007","author":"D Watson","year":"2007","unstructured":"Watson, D. (2007). Web application attacks. Network Security, 2007(10), 10\u201314.","journal-title":"Network Security"},{"key":"9201_CR36","doi-asserted-by":"crossref","unstructured":"Wolf, M. J., & Grodzinsky, F. S. (2006). Good\/fast\/cheap: contexts, relationships and professional responsibility during software development. Paper presented at the 2006 ACM symposium on Applied computing, Dijon, France.","DOI":"10.1145\/1141277.1141339"},{"issue":"2","key":"9201_CR37","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s11948-998-0050-x","volume":"4","author":"M Woodbury","year":"1998","unstructured":"Woodbury, M. (1998). Defining web ethics. Science and Engineering Ethics, 4(2), 203\u2013212.","journal-title":"Science and Engineering Ethics"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9201-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,21]],"date-time":"2020-05-21T02:38:59Z","timestamp":1590028739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-009-9201-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,31]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["9201"],"URL":"https:\/\/doi.org\/10.1007\/s10796-009-9201-0","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,31]]}}}