{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:23Z","timestamp":1754157683485,"version":"3.41.2"},"reference-count":26,"publisher":"Emerald","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2004,4]]},"DOI":"10.1108\/09685220410530807","type":"journal-article","created":{"date-parts":[[2004,4,21]],"date-time":"2004-04-21T08:11:52Z","timestamp":1082535112000},"page":"167-177","source":"Crossref","is-referenced-by-count":7,"title":["Nature of e\u2010business ethical dilemmas"],"prefix":"10.1108","volume":"12","author":[{"given":"Sonja","family":"Petrovic\u2010Lazarevic","sequence":"first","affiliation":[]},{"given":"Amrik S.","family":"Sohal","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"b1","unstructured":"Biggs, M. (2000), \u201cIn implementing emerging technology, we may face thorny ethical problems\u201d, InfoWorld, Vol. 22 No. 42, pp. 106\u20108."},{"key":"b2","doi-asserted-by":"publisher","DOI":"10.2307\/3857754"},{"key":"b3","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.7.16951"},{"key":"b4","doi-asserted-by":"publisher","DOI":"10.2307\/256699"},{"key":"b5","doi-asserted-by":"publisher","DOI":"10.5840\/bpej1999183\/423"},{"key":"b6","doi-asserted-by":"publisher","DOI":"10.1016\/0090-2616(95)90015-2"},{"key":"b7","doi-asserted-by":"publisher","DOI":"10.2307\/3857895"},{"key":"b9","doi-asserted-by":"publisher","DOI":"10.2307\/3857695"},{"key":"b10","unstructured":"Goldsborough, R. (2000), \u201cComputer and ethics\u201d, Link\u2010up, January\u2010February, pp. 9\u201012."},{"key":"b12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006274825363"},{"key":"b13","unstructured":"Johnson, J. (1998), \u201cNetiquette training: whose responsibility?\u201d, CPSR Newsletter, Vol. 16 No. 3, pp. 14\u201018."},{"key":"b15","unstructured":"Lewis, B. (2000), \u201cNo privacy: employers watch every click you make. And what's wrong with that?\u201d, InfoWorld, Vol. 22 No. 46, pp. 58\u201060."},{"key":"b18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006232417265"},{"key":"b19","doi-asserted-by":"publisher","DOI":"10.2307\/3857899"},{"key":"b20","unstructured":"Nycum, S. (2000), \u201cPlay fair with info on the Web\u201d, InformationWeek, Vol. 27, November, pp. 192\u20104."},{"key":"b21","doi-asserted-by":"publisher","DOI":"10.2307\/256404"},{"key":"b23","unstructured":"Petrovic\u2010Lazarevic, S. (2001), \u201cElectronic business culture ethical dilemmas\u201d, in Callaos, N . Yunfa, H . Rodriguez, M . and Quang, H . (Eds), Proceedings of World Multiconference on Systemics, Cybernetics and Informatics, SCI 2001, International Institute of Informatics and Systemics, Orlando, FL, pp. 200\u20104."},{"key":"b25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006324404561"},{"key":"b26","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026577604845"},{"key":"b29","doi-asserted-by":"publisher","DOI":"10.2307\/3857838"},{"key":"b30","unstructured":"Schwab, A.J. (2000), \u201cApplied ethics: a third\u2010millennium approach\u201d, IEEE Spectrum, November, pp. 23\u20106."},{"key":"b31","unstructured":"Smith, C. (2000), \u201cThe ethical workplace\u201d, Association Management, June, pp. 70\u20103."},{"key":"b32","doi-asserted-by":"publisher","DOI":"10.5840\/bpej2000193\/45"},{"key":"b33","unstructured":"Tobias, Z. (2000), \u201cPutting the ethics in e\u2010business\u201d, Computerworld, Vol. 34 No. 45, pp. 81\u20105."},{"key":"b35","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006415514200"},{"key":"b36","unstructured":"Weber, A. (2000), \u201cEthics? Not interested\u201d, Software Development, Vol. 8 No. 5, pp. 7\u20109."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220410530807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:49Z","timestamp":1753402129000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/12\/2\/167-177\/171120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,4]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,4]]}},"alternative-id":["10.1108\/09685220410530807"],"URL":"https:\/\/doi.org\/10.1108\/09685220410530807","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2004,4]]}}}