{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:11Z","timestamp":1754157671343,"version":"3.41.2"},"reference-count":8,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2003,3,1]],"date-time":"2003-03-01T00:00:00Z","timestamp":1046476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003,3,1]]},"abstract":"<jats:p>Conflicts of interest are situations in which a decision maker must balance personal interests with corporate or organizational interests. Often the conflict is unknown to others involved in or affected by a decision. Examples of conflicts of interest affecting the IT profession are examined and categorized in the areas of self\u2010dealing, accepting benefits, influence peddling, using your employer\u2019s property for personal advantage, using confidential information, obtaining outside employment or moonlighting, and taking advantage in post\u2010employment. Further, steps are recommended by which individuals and organizations can reduce the risks attributable to conflicts of interest.<\/jats:p>","DOI":"10.1108\/09685220310463704","type":"journal-article","created":{"date-parts":[[2003,3,12]],"date-time":"2003-03-12T03:20:29Z","timestamp":1047439229000},"page":"28-32","source":"Crossref","is-referenced-by-count":11,"title":["Information systems professionals and conflict of interest"],"prefix":"10.1108","volume":"11","author":[{"given":"Fritz","family":"Grupe","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022013020024589000_B1","unstructured":"Association for Computing Machinery (nd), ACM Code of Ethics and Professional Conduct, available at: www.acm.org\/constitution\/code.html"},{"key":"key2022013020024589000_B2","unstructured":"Bowyer, K.W. (2000), Ethics and Computing: Living Responsibly in a Computerized World, Institute of Electrical and Electronics Engineers, pp. 58\u20109."},{"key":"key2022013020024589000_B3","unstructured":"Davis, M. and Stark, A. (2001), Oxford University Press, Oxford."},{"key":"key2022013020024589000_B4","doi-asserted-by":"crossref","unstructured":"Grupe, F., Garcia\u2010Jay, T. and Kuechler, W. (2002), \u201cIs it time for an IT ethics program?\u201d, Information Systems Management, Vol. 19 No. 3, pp. 51\u20107.","DOI":"10.1201\/1078\/43201.19.3.20020601\/37170.7"},{"key":"key2022013020024589000_B5","unstructured":"Institute of Electrical and Electronics Engineers (nd), IEEE Code of Ethics available at: www.ieee.org\/about\/whatis\/code.html"},{"key":"key2022013020024589000_B6","unstructured":"Kernaghan, K. and Langford, J. (1990), The Responsible Public Servant, Institute for Research on Public Policy, Toronto\/The Institute of Public Administration of Canada, Halifax."},{"key":"key2022013020024589000_B7","unstructured":"McDonald, M. (nd), Ethics and Conflict of Interest, Center for Applied Ethics, available at: www.ethics.ubc.ca\/mcdonald\/conflict.html"},{"key":"key2022013020024589000_B8","unstructured":"May, L. (1994), \u201cConflict of interest\u201d, Professional Ethics and Social Responsibility, Rowman & Littlefield, Lanham, MD, pp. 67\u201082."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220310463704","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220310463704\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220310463704\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:44Z","timestamp":1753402124000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/11\/1\/28-32\/174111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,3,1]]},"references-count":8,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,3,1]]}},"alternative-id":["10.1108\/09685220310463704"],"URL":"https:\/\/doi.org\/10.1108\/09685220310463704","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2003,3,1]]}}}