{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T16:10:33Z","timestamp":1764432633836,"version":"3.41.2"},"reference-count":20,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2008,3,21]],"date-time":"2008-03-21T00:00:00Z","timestamp":1206057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3,21]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The paper addresses the contemporary and very important area of electronic information (EI) management \u2013 the ethical dimension and implications. Specifically, this paper aims to analyze EI activities and management practices, the ethical dilemmas and implications; to relate effectiveness in EI ethics activities in the context of organizational ethics policy and practice, and to suggest a framework for handling ethical dilemmas in managing the major EI activities.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A survey of mid\u2010 and first\u2010level managers in six industries was conducted. Subjects were asked to describe organization practices in 11 areas of ethics policy application. Respondent firms were compared according to high and low numbers of ethical safeguards: an ethics code, a credo or values statement, written ethics policies \u2013 general and specific, ethics training and development, ready access to ethics guidelines at all levels, and a cohesive, supportive ethical culture.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>EI ethics need to be addressed in the context of the organization's policies and practices. This extends to specific EI activities as well, where the ramifications of misbehavior \u2013 or upright behavior \u2013 are magnified.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The organization that invests in ethics safeguards provides the needed supports and reaps substantial returns in employee morale, performance and ultimately, the bottom line \u2013 profits. In this area of EI management, the atmosphere of trust that results lightens the burden for all involved.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This research has a value that is relevant to the current issues related to the privacy and security of information.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685220810862724","type":"journal-article","created":{"date-parts":[[2008,4,5]],"date-time":"2008-04-05T07:10:24Z","timestamp":1207379424000},"page":"20-27","source":"Crossref","is-referenced-by-count":5,"title":["Managing electronic information: an ethics perspective"],"prefix":"10.1108","volume":"16","author":[{"given":"Mayur S.","family":"Desai","sequence":"first","affiliation":[]},{"given":"Thomas J.","family":"von der Embse","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022030719504933900_b1","doi-asserted-by":"crossref","unstructured":"Cavanaugh, T.A. (2000), \u201cGenetics and fair use codes for electronic information\u201d, Ethics and Information Technology, Vol. 2 No. 2, pp. 121\u20103.","DOI":"10.1023\/A:1010032202867"},{"key":"key2022030719504933900_b2","doi-asserted-by":"crossref","unstructured":"Desai, M.S., Richards, T.C. and von der Embse, T. (2002), \u201cSystem insecurity \u2013 firewalls\u201d, Information Management & Computer Security, Vol. 10 No. 3, pp. 135\u20109.","DOI":"10.1108\/09685220210431890"},{"key":"key2022030719504933900_b3","doi-asserted-by":"crossref","unstructured":"Hilton, T. (2000), \u201cInformation systems ethics: a practitioner survey\u201d, Journal of Business Ethics, Vol. 28 No. 4, pp. 279\u201084.","DOI":"10.1023\/A:1006274825363"},{"key":"key2022030719504933900_b4","unstructured":"Jennings, M. (2002), \u201cEthics in cyberspace\u201d, BizEd, January\u2010February, pp. 18\u201023, ."},{"key":"key2022030719504933900_b8","unstructured":"KPMG LLP (2000), Organizational Integrity Survey: A Summary, Integrity Management Services, KPMG LLP, New York, NY."},{"key":"key2022030719504933900_b5","doi-asserted-by":"crossref","unstructured":"Leonard, L.N.K., Cronon, T.P. and Kreie, J. (2004), \u201cWhat influences IT ethical behavior intentions\u2010planned behavior, reasoned action, perceived importance, or individual characteristics?\u201d, Information & Management, Vol. 42 No. 1, pp. 143\u201058.","DOI":"10.1016\/j.im.2003.12.008"},{"key":"key2022030719504933900_b6","doi-asserted-by":"crossref","unstructured":"Mason, R. (1986), \u201cFour ethical issues of the information age\u201d, Management Information Systems Quarterly, Vol. 10 No. 1, pp. 5\u201012.","DOI":"10.2307\/248873"},{"key":"key2022030719504933900_b7","doi-asserted-by":"crossref","unstructured":"Neubaum, D., Mitchell, M. and Schminke, M. (2004), \u201cFirm newness, entrepreneurial orientation, and ethical climate\u201d, Journal of Business Ethics, Vol. 2, pp. 335\u201047.","DOI":"10.1007\/s10551-004-1532-7"},{"key":"key2022030719504933900_b9","doi-asserted-by":"crossref","unstructured":"Oz, E. (1992), \u201cEthical standards for information systems professionals: a case for unified code\u201d, Management Information Systems Quarterly, Vol. 16 No. 4, pp. 1\u201012.","DOI":"10.2307\/249729"},{"key":"key2022030719504933900_b10","doi-asserted-by":"crossref","unstructured":"Oz, E. (2001), \u201cOrganizational commitment and ethical behavior: an empirical study of information systems professionals\u201d, Journal of Business Ethics, Vol. 34 No. 2, pp. 137\u201043.","DOI":"10.1023\/A:1012214017119"},{"key":"key2022030719504933900_b11","unstructured":"Paine, L.S. (1994), \u201cManaging for organizational integrity\u201d, Harvard Business Review, March\/April, pp. 106\u201017."},{"key":"key2022030719504933900_b12","doi-asserted-by":"crossref","unstructured":"Petrovic\u2010Lazarevic, S. and Sohal, A. (2004), \u201cNature of e\u2010business ethical dilemmas\u201d, Information Management & Computer Security, Vol. 12 Nos 3\/4, pp. 167\u201077.","DOI":"10.1108\/09685220410530807"},{"key":"key2022030719504933900_b13","unstructured":"Phulkan, S. (2005), \u201cUsing information technology ethically: new dimensions in the age of the internet\u201d, The Business Review, Vol. 4 No. 1, pp. 234\u201040."},{"key":"key2022030719504933900_b14","unstructured":"Rivera, R.J. and Andrew, P. (2006), State of the Industry in Leading Enterprises: ASTD Annual Review of Trends in Workplace Learning and Performance, American Society for Training & Development, Alexandria, VA, ASTDResearch@astd.org."},{"key":"key2022030719504933900_b15","doi-asserted-by":"crossref","unstructured":"Robertson, T. (2006), \u201cEthical issues in interaction design\u201d, Ethics and Information Technology, Vol. 8 No. 2, pp. 49\u201059.","DOI":"10.1007\/s10676-005-8308-3"},{"key":"key2022030719504933900_b16","unstructured":"Smyth v. Pillsbury Co. (1996), 914 F. Supp. 97, E.D. PA."},{"key":"key2022030719504933900_b17","doi-asserted-by":"crossref","unstructured":"Stahl, B.C. (2004), \u201cResponsibility for information assurance and privacy: a problem of individual ethics?\u201d, Journal of Organizational and End User Computing, Vol. 16 No. 3, pp. 59\u201078.","DOI":"10.4018\/joeuc.2004070104"},{"key":"key2022030719504933900_b18","unstructured":"von der Embse, T.J. and Desai, M.S. (2006), \u201cA blueprint for an ethics\u2010based strategy\u201d, Proceedings Society for the Advancement of Management International Conference, Orlando."},{"key":"key2022030719504933900_b19","doi-asserted-by":"crossref","unstructured":"von der Embse, T.J., Desai, M.S. and Desai, S. (2004), \u201cHow well are corporate ethics codes and policies applied in the trenches? Key factors and conditions\u201d, Information Management & Computer Security, Vol. 12 Nos 2\/3, pp. 146\u201053.","DOI":"10.1108\/09685220410530780"},{"key":"key2022030719504933900_b20","unstructured":"Walton, C. (1988), The Moral Manager, Ballinger, Cambridge, MA."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220810862724","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220810862724\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220810862724\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:04Z","timestamp":1753402144000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/16\/1\/20-27\/179023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,21]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,3,21]]}},"alternative-id":["10.1108\/09685220810862724"],"URL":"https:\/\/doi.org\/10.1108\/09685220810862724","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2008,3,21]]}}}