{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:11:19Z","timestamp":1765368679893},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,7,31]],"date-time":"2009-07-31T00:00:00Z","timestamp":1248998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1007\/s10796-009-9207-7","type":"journal-article","created":{"date-parts":[[2009,7,30]],"date-time":"2009-07-30T04:07:47Z","timestamp":1248926867000},"page":"379-387","source":"Crossref","is-referenced-by-count":9,"title":["Expanding ethical vistas of IT professionals"],"prefix":"10.1007","volume":"12","author":[{"given":"Ian","family":"Stoodley","sequence":"first","affiliation":[]},{"given":"Christine","family":"Bruce","sequence":"additional","affiliation":[]},{"given":"Sylvia","family":"Edwards","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,7,31]]},"reference":[{"key":"9207_CR1","first-page":"365","volume":"12","author":"S Alter","year":"2003","unstructured":"Alter, S. (2003). 18 reasons why IT-reliant work systems should replace \u201cThe IT artifact\u201d as the core subject matter of the IS field. Communications of AIS, 12, 365\u2013394.","journal-title":"Communications of AIS"},{"issue":"1","key":"9207_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10676-006-9131-1","volume":"9","author":"M Brigham","year":"2007","unstructured":"Brigham, M., & Introna, L. D. (2007). Invoking politics and ethics in the design of information technology: undesigning the design. Ethics and Information Technology, 9(1), 1\u201310.","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9207_CR3","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1080\/0307507042000190804","volume":"29","author":"C Bruce","year":"2004","unstructured":"Bruce, C., Pham, B., & Stoodley, I. (2004). Constituting the significance and value of research: views from information technology academics and industry professionals. Studies in Higher Education, 29(2), 219\u2013238.","journal-title":"Studies in Higher Education"},{"key":"9207_CR4","doi-asserted-by":"crossref","unstructured":"Burnett, K., & Subramaniam, M. M. (2004). Defining the information technology workforce from the educational perspectives: a pilot study. Paper presented at 5th Conference on Information Technology Education, Salt Lake City, UT, USA.","DOI":"10.1145\/1029533.1029582"},{"key":"9207_CR5","first-page":"135","volume-title":"Computer ethics and professional responsibility","author":"TW Bynum","year":"2004","unstructured":"Bynum, T. W., & Rogerson, S. (2004). Codes of ethics: Editors\u2019 introduction. In T. W. Bynum & S. Rogerson (Eds.), Computer ethics and professional responsibility (pp. 135\u2013141). Malden: Blackwell."},{"issue":"1","key":"9207_CR6","first-page":"i","volume":"18","author":"TP Cronan","year":"2006","unstructured":"Cronan, T. P., & Douglas, D. E. (2006). Toward a comprehensive ethical behavior model for information technology. Journal of Organizational and End User Computing, 18(1), i\u2013xi.","journal-title":"Journal of Organizational and End User Computing"},{"key":"9207_CR7","volume-title":"Levinas: An introduction","author":"C Davis","year":"1996","unstructured":"Davis, C. (1996). Levinas: An introduction. Cambridge: Polity."},{"issue":"7","key":"9207_CR8","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1005817.1005836","volume":"47","author":"PJ Denning","year":"2004","unstructured":"Denning, P. J. (2004). The field of programmers myth. Communications of the ACM, 47(7), 15\u201320.","journal-title":"Communications of the ACM"},{"issue":"3","key":"9207_CR9","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/636772.636788","volume":"46","author":"PJ Denning","year":"2003","unstructured":"Denning, P. J., & Dunham, R. (2003). The missing customer. Communications of the ACM, 46(3), 19\u201323.","journal-title":"Communications of the ACM"},{"key":"9207_CR10","volume-title":"The unfinished revolution: Human-centred computers and what they can do for us","author":"M Dertouzos","year":"2002","unstructured":"Dertouzos, M. (2002). The unfinished revolution: Human-centred computers and what they can do for us. New York: HarperCollins."},{"key":"9207_CR11","first-page":"237","volume-title":"Universalism vs. Communitarianism: Contemporary debates in ethics","author":"H Dreyfus","year":"1990","unstructured":"Dreyfus, H., & Dreyfus, S. (1990). What is morality? A phenomenological account of ethical experience. In D. Rasmussen (Ed.), Universalism vs. Communitarianism: Contemporary debates in ethics (pp. 237\u2013264). Cambridge: MIT."},{"issue":"2","key":"9207_CR12","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1080\/0260293042000188447","volume":"29","author":"SL Edwards","year":"2004","unstructured":"Edwards, S. L., & Bruce, C. (2004). The assignment that triggered change: assessment and the relational learning model for generic capabilities. Assessment & Evaluation in Higher Education, 29(2), 141\u2013157.","journal-title":"Assessment & Evaluation in Higher Education"},{"key":"9207_CR13","unstructured":"Ellis, R., & Lowell, B. L. (1999). Core occupations of the U.S. information technology workforce. http:\/\/206.67.48.105\/IT-1.pdf Accessed May 1, 2009."},{"key":"9207_CR14","unstructured":"Finkelstein, L., & Hafner, C. (2002). The evolving discipline(s) of IT (and their relation to computer science): A framework for discussion. http:\/\/www.cra.org\/Activities\/itdeans\/finkelstein.pdf Accessed May 1, 2009."},{"issue":"1","key":"9207_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1023\/A:1015209807065","volume":"4","author":"L Floridi","year":"2002","unstructured":"Floridi, L., & Sanders, J. W. (2002). Mapping the foundationalist debate in computer ethics. Ethics and Information Technology, 4(1), 1\u20139.","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9207_CR16","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1023\/B:MIND.0000035461.63578.9d","volume":"14","author":"L Floridi","year":"2004","unstructured":"Floridi, L., & Sanders, J. W. (2004). On the morality of artificial agents. Minds and Machines, 14(3), 349\u2013379.","journal-title":"Minds and Machines"},{"key":"9207_CR17","volume-title":"In a different voice: Psychological theory and women\u2019s development","author":"C Gilligan","year":"1982","unstructured":"Gilligan, C. (1982). In a different voice: Psychological theory and women\u2019s development. Cambridge: Harvard University Press."},{"issue":"1","key":"9207_CR18","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/572217.572218","volume":"30","author":"FS Grodzinsky","year":"2000","unstructured":"Grodzinsky, F. S. (2000). The development of the \u2018ethical\u2019 ICT professional: and the vision of an ethical on-line society: how far have we come and where are we going? Computers and Society, 30(1), 3\u20137.","journal-title":"Computers and Society"},{"issue":"2\u20133","key":"9207_CR19","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s10676-008-9163-9","volume":"10","author":"FS Grodzinsky","year":"2008","unstructured":"Grodzinsky, F. S., Miller, K. W., & Wolf, M. J. (2008). The ethics of designing artificial agents. Ethics and Information Technology, 10(2\u20133), 115\u2013121.","journal-title":"Ethics and Information Technology"},{"key":"9207_CR20","unstructured":"Kaarst-Brown, M. L., & Guzman, I. R. (2005). The IT professional: Who is \u201cthe IT workforce\u201d?: Challenges facing policy makers, educators, management, and research. Paper presented at ACM SIGMIS Conference on Computer Personnel Research, Atlanta, Georgia, USA."},{"key":"9207_CR21","volume-title":"The ground of professional ethics","author":"D Koehn","year":"1994","unstructured":"Koehn, D. (1994). The ground of professional ethics. London: Routledge."},{"key":"9207_CR22","volume-title":"Essays on moral development, Volume 1: The philosophy of moral development","author":"L Kohlberg","year":"1981","unstructured":"Kohlberg, L. (1981). Essays on moral development, Volume 1: The philosophy of moral development. San Francisco: Harper & Row."},{"key":"9207_CR23","volume-title":"Entre nous: On thinking-of-the-other","author":"E Levinas","year":"1998","unstructured":"Levinas, E. (1998). Entre nous: On thinking-of-the-other. London: Athlone."},{"key":"9207_CR24","volume-title":"Learning and awareness","author":"F Marton","year":"1997","unstructured":"Marton, F., & Booth, S. (1997). Learning and awareness. Mahwah: Erlbaum."},{"issue":"2","key":"9207_CR25","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1207\/s15327809jls1502_2","volume":"15","author":"F Marton","year":"2006","unstructured":"Marton, F., & Pang, M. F. (2006). On some necessary conditions of learning. The Journal of the Learning Sciences, 15(2), 193\u2013220.","journal-title":"The Journal of the Learning Sciences"},{"key":"9207_CR26","unstructured":"Munro, K. I., & Cohen, J. F. (2004). Ethical behaviour and information systems codes: The effects of code communication, awareness, understanding, and enforcement. Paper presented at 25th International Conference on Information Systems, University of Virginia, Charlottesville, Virginia, USA."},{"issue":"2","key":"9207_CR27","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1287\/isre.12.2.121.9700","volume":"12","author":"WJ Orlikowski","year":"2001","unstructured":"Orlikowski, W. J., & Iacono, C. S. (2001). Research commentary: desperately seeking \u201cIT\u201d in IT research\u2014a call to theorizing the IT artifact. Information Systems Research, 12(2), 121\u2013134.","journal-title":"Information Systems Research"},{"key":"9207_CR28","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1023\/A:1023280619632","volume":"31","author":"MF Pang","year":"2003","unstructured":"Pang, M. F., & Marton, F. (2003). Beyond \u201clesson study\u201d: comparing two ways of facilitating the grasp of some economic concepts. Instructional Science, 31, 175\u2013194.","journal-title":"Instructional Science"},{"key":"9207_CR29","doi-asserted-by":"crossref","DOI":"10.1111\/b.9780631216346.2004.x","volume-title":"The Blackwell companion to religious ethics","author":"W Schweiker","year":"2004","unstructured":"Schweiker, W. (2004). The Blackwell companion to religious ethics. Oxford: Blackwell."},{"key":"9207_CR30","unstructured":"Stahl, B. C., Wood, C., & Howley, R. (2004). Teaching professional issues in computing through the development of a student code of conduct. Ethicomp 2(1). http:\/\/www.ccsr.cse.dmu.ac.uk\/journal\/home.html Accessed May 1, 2009."},{"key":"9207_CR31","unstructured":"Stoodley, I. (2009). IT professionals\u2019 experience of ethics and its implications for IT education. Doctor of Philosophy Thesis. Queensland University of Technology, Brisbane, Australia."},{"key":"9207_CR32","volume-title":"Ethics and technology: Ethical issues in an age of information and communication technology","author":"HT Tavani","year":"2004","unstructured":"Tavani, H. T. (2004). Ethics and technology: Ethical issues in an age of information and communication technology. Hoboken: Wiley."},{"key":"9207_CR33","unstructured":"Vartiainen, T. (2005). Moral conflicts in a project course in information systems education. Doctor of Philosophy Thesis. University of Jyv\u00e4skyl\u00e4, Department of Computer Science and Information Systems, Jyv\u00e4skyl\u00e4, Finland."},{"key":"9207_CR34","unstructured":"Volkman, R. (2004). Being a good computer professional: The advantages of virtue ethics in computing. Ethicomp 2(1). http:\/\/www.ccsr.cse.dmu.ac.uk\/journal\/ Accessed May 1, 2009."}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9207-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-009-9207-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9207-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:36:13Z","timestamp":1559248573000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-009-9207-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,31]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["9207"],"URL":"https:\/\/doi.org\/10.1007\/s10796-009-9207-7","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,31]]}}}