{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:40:03Z","timestamp":1760708403636,"version":"3.41.2"},"reference-count":26,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2012,2,24]],"date-time":"2012-02-24T00:00:00Z","timestamp":1330041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,2,24]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to discuss some ethical issues in the internet encounter between customer and bank. Empirical data related to the difficulties that customers have when they deal with the bank through internet technology and electronic banking. The authors discuss the difficulties that customers expressed from an ethical standpoint.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The key problem of the paper is \u201chow does research handle the user's lack of competence in a web\u2010based commercial environment?\u201d The authors illustrate this ethical dilemma with data from a Danish Bank collected in 2002. The data have been structured by an advanced text analytic method, Pertex (by generation of intentionality of verbal actors from text).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The authors can conclude that the experience of lack of competency in internet banking implies a severe damage on the experience of the ethics of the good life and of the respect for the basic ethical principles of customer autonomy, dignity, integrity and vulnerability. However, increased experience of competency may imply experience of increased feeling of ethical superiority and of the good life among customers.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The important implication for managerial research of this study would be for banks to focus on customer competency with an ethical concern instead of only being concerned with technical solutions for effective internet operations.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Since more and more businesses are digitally based, the authors can foresee a potential generic problem of lack of competence for certain age groups and also of people from different social groups.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper provides an analysis of the ethics of on\u2010line banking on the basis of Pertex methodology and with the use of basic ethical principles of autonomy, dignity, integrity and vulnerability.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14779961211210649","type":"journal-article","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T07:26:20Z","timestamp":1330154780000},"page":"36-51","source":"Crossref","is-referenced-by-count":24,"title":["Ethics in the bank internet encounter: an explorative study"],"prefix":"10.1108","volume":"10","author":[{"given":"Jacob","family":"Dahl Rendtorff","sequence":"first","affiliation":[]},{"given":"Jan","family":"Mattsson","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020419494891200_b2","doi-asserted-by":"crossref","unstructured":"Bagozzi, R. and Nataraajan, R. (2000), \u201cThe year 2000: looking forward\u201d, Psychology & Marketing, Vol. 17 No. 1, pp. 1\u201011.","DOI":"10.1002\/(SICI)1520-6793(200001)17:1<1::AID-MAR1>3.0.CO;2-Y"},{"key":"key2022020419494891200_b3","unstructured":"Beauchamp, T.L. and Childress, J.F. (1994), Principles of Biomedical Ethics (1979), Oxford University Press, Oxford."},{"key":"key2022020419494891200_b1","unstructured":"Boatright, J.R. (2008), Ethics in Finance, 2nd ed., Blackwell, London."},{"key":"key2022020419494891200_b4","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1989), \u201cPerceived usefulness, perceived ease of use and user acceptance of information technology\u201d, MIS Quartely, Vol. 13 No. 3, pp. 318\u201039.","DOI":"10.2307\/249008"},{"key":"key2022020419494891200_b5","unstructured":"De George, R.T. (2008), Ethical Issues on the Internet, in the Ethics of Information Technology and Business, Blackwell, Oxford."},{"key":"key2022020419494891200_b6","doi-asserted-by":"crossref","unstructured":"Donaldson, T. and Dunfee, T. (1994), \u201cTowards a unified conception of business ethics: integrative social contract theory\u201d, Academy of Management Review, Vol. 19 No. 2, pp. 252\u201084.","DOI":"10.5465\/amr.1994.9410210749"},{"key":"key2022020419494891200_b7","unstructured":"Dworkin, G. (1988), The Theory and Practice of Autonomy, Cambridge Studies in Philosophy, Cambridge University Press, Cambridge."},{"key":"key2022020419494891200_b8","doi-asserted-by":"crossref","unstructured":"Flanagan, J. (1954), \u201cThe critical incident technique\u201d, Psychological Bulletin, Vol. 51 No. 4, pp. 327\u201058.","DOI":"10.1037\/h0061470"},{"key":"key2022020419494891200_b9","doi-asserted-by":"crossref","unstructured":"Frederick, R.E. (2002), A Companion to Business Ethics, Basil Blackwell, Oxford.","DOI":"10.1111\/b.9780631201304.2002.00002.x"},{"key":"key2022020419494891200_b10","unstructured":"Goodin, R. (1985), Protecting the Vulnerable: A Reanalysis of Our Social Responsibilities, University of Chicago Press, Chicago, IL."},{"key":"key2022020419494891200_b11","unstructured":"Helmersson, H. (1992), \u201cMain principles for perspective text analysis via the PC\u2010system Pertex\u201d, Kognitionsvetenskaplig forskning, Vol. 41."},{"key":"key2022020419494891200_b25","doi-asserted-by":"crossref","unstructured":"Helmersson, H. and Mattsson, J. (2001a), \u201cDemonstrating PERTEX: a new method to improve interpretation of text\u201d, Field Methods, Vol. 13 No. 2, pp. 115\u201036.","DOI":"10.1177\/1525822X0101300201"},{"key":"key2022020419494891200_b26","unstructured":"Helmersson, H. and Mattsson, J. (2001b), \u201cHur f\u00f6rklara en textanalytisk nyorientering?\u201d, in Landstr\u00f6m, H., Helmersson, H. and Mattsson, J. (Eds), Ur en Forskarhandledares \u00d6rtag\u00e5rd: En V\u00e4nbok till Bertil Gandemo, Lund Business Press, Lund, pp. 19\u201036."},{"key":"key2022020419494891200_b12","doi-asserted-by":"crossref","unstructured":"O'Cass, A. and Fenech, T. (2003), \u201cWeb\u2010retail adoption: exploring the nature of internet users web retailing behaviour\u201d, Journal of Retaling and Consumer Services, Vol. 10, pp. 81\u201094.","DOI":"10.1016\/S0969-6989(02)00004-8"},{"key":"key2022020419494891200_b14","unstructured":"Paine, L.S. (1997), Cases in Leadership, Ethics, and Organizational Integrity: A Strategic Perspective, Richard D. Irwin, Burr Ridge, IL."},{"key":"key2022020419494891200_b15","unstructured":"Paine, L.S. (2003), Value Shift: Why Companies Must Merge Social and Financial Imperatives to Achieve Superior Performance, McGraw\u2010Hill, New York, NY."},{"key":"key2022020419494891200_b13","doi-asserted-by":"crossref","unstructured":"Palmer, J. (2002), \u201cWebsite usability, design, and performance metrics\u201d, Information Systems Research, Vol. 13 No. 2, pp. 151\u201067.","DOI":"10.1287\/isre.13.2.151.88"},{"key":"key2022020419494891200_b16","unstructured":"Pine, B.J. and Gilmore, J.H. (2007), Authenticity: What Consumers Really Want, Harvard Business School Press, Cambridge, MA."},{"key":"key2022020419494891200_b28","unstructured":"Rendtorff, J.D. (2009), Responsibility, Ethics and Legitimacy of Corporations, Copenhagen Business School Press, Copenhagen."},{"key":"key2022020419494891200_b27","doi-asserted-by":"crossref","unstructured":"Rendtorff, J.D. and Kemp, P. (2000), Basic Ethical Principles in European Bioethics and Biolaw, Vol. 1\u20102, Centre for Ethics and Law, Copenhagen and Barcelona.","DOI":"10.1016\/j.bioet.2015.12.004"},{"key":"key2022020419494891200_b17","doi-asserted-by":"crossref","unstructured":"Roos, I. (2002), \u201cMethods of investigating critical incidents\u201d, Journal of Service Research, Vol. 4 No. 3, pp. 193\u2010204.","DOI":"10.1177\/1094670502004003003"},{"key":"key2022020419494891200_b18","unstructured":"Solomon, R.C. (1992), Ethics and Excellence: Cooperation and Integrity in Business, Oxford University Press, New York, NY."},{"key":"key2022020419494891200_b19","doi-asserted-by":"crossref","unstructured":"Taylor, C. (1992), The Ethics of Authenticity, Harvard University Press, Cambridge, MA.","DOI":"10.4159\/9780674237117"},{"key":"key2022020419494891200_b20","doi-asserted-by":"crossref","unstructured":"Wang, Y.\u2010S., Wang, Y.\u2010M., Lin, H.\u2010H. and Tang, T.I. (2003), \u201cDeterminants of user acceptance of internet banking: an empirical study\u201d, International Journal of Service Industry Management, Vol. 14 No. 5, pp. 501\u201019.","DOI":"10.1108\/09564230310500192"},{"key":"key2022020419494891200_b21","doi-asserted-by":"crossref","unstructured":"Ward, J.E. (1963), \u201cHierarchical grouping to optimize an objective function\u201d, Journal of American Statistical Association, Vol. 58, pp. 236\u201044.","DOI":"10.1080\/01621459.1963.10500845"},{"key":"key2022020419494891200_b22","doi-asserted-by":"crossref","unstructured":"Yen, H.J.R. and Gwinner, K.P. (2003), \u201cInternet retail loyalty: the mediating role of relational benefits\u201d, International Journal of Service Industry Management, Vol. 14 No. 5, pp. 483\u2010500.","DOI":"10.1108\/09564230310500183"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14779961211210649","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961211210649\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961211210649\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:13:18Z","timestamp":1753402398000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/10\/1\/36-51\/219733"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,24]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,2,24]]}},"alternative-id":["10.1108\/14779961211210649"],"URL":"https:\/\/doi.org\/10.1108\/14779961211210649","relation":{},"ISSN":["1477-996X"],"issn-type":[{"type":"print","value":"1477-996X"}],"subject":[],"published":{"date-parts":[[2012,2,24]]}}}