{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T01:43:23Z","timestamp":1768441403640,"version":"3.49.0"},"reference-count":35,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2012,11,23]],"date-time":"2012-11-23T00:00:00Z","timestamp":1353628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11,23]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to reflect on society's relationship with technology and particularly our increasing dependence on electronic technology \u2013 so\u2010called eDependency. The paper argues that technology is not neutral and we must engage with the moral issues that arise from our relationship with it.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Society's relationship with technology is examined through the lens of Socrates' consideration of the technology of writing. It identifies \u201ctechnophilia\u201d as a major theme in society and \u201cneo\u2010Luddism\u201d as the Socrates\u2010like examination of the benefits of technology.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>While rejecting both technology determinism and technology presentism the paper argues technology is not neutral and does afford social change within a particular social ecology. The authors suggest that ultimately the use of all technology, including the technology underpinning eDependency, leads to important moral questions which deserve considered debate. The paper concludes by arguing that the Information Systems (IS) discipline should take the mantle of King Thamus and that the study of these issues should become a key concern for the discipline.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>In an age of technophilia, this paper calls considered debate on the moral issues that arise from our relationship with technology, how it is appropriated, to whose benefit, and how we change it and will be changed by it.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14779961211285881","type":"journal-article","created":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T05:18:51Z","timestamp":1353561531000},"page":"262-272","source":"Crossref","is-referenced-by-count":9,"title":["Technophilia, neo\u2010Luddism, eDependency and the judgement of Thamus"],"prefix":"10.1108","volume":"10","author":[{"given":"Darryl","family":"Coulthard","sequence":"first","affiliation":[]},{"given":"Susan","family":"Keller","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021220475897800_b1","unstructured":"Bauman, Z. (2000), Liquid Modernity, Polity Press, Cambridge."},{"key":"key2022021220475897800_b2","doi-asserted-by":"crossref","unstructured":"Bauman, Z. (2005), \u201cEducation in liquid modernity\u201d, The Review of Education, Pedagogy, and Cultural Studies, Vol. 27, pp. 303\u201017.","DOI":"10.1080\/10714410500338873"},{"key":"key2022021220475897800_b3","doi-asserted-by":"crossref","unstructured":"Bauman, Z. (2008), Does Ethics Have a Chance in a World of Consumers?, Harvard University Press, Cambridge, MA.","DOI":"10.4159\/9780674033948"},{"key":"key2022021220475897800_b4","unstructured":"Beck, U. (1992), Risk Society: Towards a New Modernity, Sage, London."},{"key":"key2022021220475897800_b5","unstructured":"Broersma, M. (2010), \u201cSpam traps catch 95 percent of email sent\u201d, available at: www.zdnet.com\/news\/spam\u2010traps\u2010catch\u201095\u2010percent\u2010of\u2010email\u2010sent\/386652 (accessed 25 January 2011)."},{"key":"key2022021220475897800_b6","unstructured":"Castells, M. (2000), The Rise of the Network Society, 2nd ed., Blackwell, Malden, MA."},{"key":"key2022021220475897800_b7","doi-asserted-by":"crossref","unstructured":"Davenport, T.H. and Prusak, L. (1997), Information Ecology: Mastering the Information and Knowledge Environment, Oxford University Press, New York, NY.","DOI":"10.1093\/oso\/9780195111682.001.0001"},{"key":"key2022021220475897800_b8","unstructured":"Dickinson, D. (2002), \u201cLooking forward\u201d, Creating the Future: Perspectives on Educational Change, available at: http:\/\/education.jhu.edu\/newhorizons\/future\/creating_the_future\/crfut_dickinson.cfm (accessed 1 February 2011)."},{"key":"key2022021220475897800_b9","unstructured":"Dreyfus, H.L. (1996), \u201cThe current relevance of merleau\u2010ponty's phenomenology of embodiment\u201d, Electronic Journal of Analytic Philosophy, No. 4, available at: http:\/\/ejap.louisiana.edu\/EJAP\/1996.spring\/dreyfus.1996.spring.html (accessed 3 April 2008)."},{"key":"key2022021220475897800_b11","unstructured":"Foucault, M. (1991), \u201cWhat is enlightenment?\u201d, in Rabinow, P. (Ed.), The Foucault Reader, Penguin, London, pp. 32\u201050."},{"key":"key2022021220475897800_b12","unstructured":"Furedi, F. (2009), Wasted: Why Education isn't Working, Continuum, London."},{"key":"key2022021220475897800_b13","doi-asserted-by":"crossref","unstructured":"Geertz (1979), \u201cFrom the native's point of view: on the nature of anthropological understanding\u201d, in Rabinow, P. and Sullivan, W.M. (Eds), Interpretive Social Science, University of California Press, Berkeley, CA.","DOI":"10.1525\/9780520340343-008"},{"key":"key2022021220475897800_b14","unstructured":"Gibson, J.J. (1977), \u201cThe theory of affordances\u201d, in Shaw, R.E. and Bransford, J. (Eds), Perceiving, Acting, and Knowing: Toward an Ecological Psychology, Lawrence Erlbaum, Hillsdale, NJ, pp. 67\u201082."},{"key":"key2022021220475897800_b15","unstructured":"Giddens, A. (1991), Modernity and Self\u2010identity: Self and Society in the Late Modern Age, Polity Press, Cambridge."},{"key":"key2022021220475897800_b16","unstructured":"Giddens, A. (1994), \u201cLiving in a post\u2010traditional society\u201d, in Beck, U., Giddens, A. and Lash, S. (Eds), Reflexive Modernization: Politics, Tradition and Aesthetics in the Modern Social Order, Polity Press, Cambridge."},{"key":"key2022021220475897800_b17","doi-asserted-by":"crossref","unstructured":"Goldfinch, S. (2007), \u201cPessimism, computer failure, and information systems development in the public sector\u201d, Public Administration Review, Vol. 67 No. 5, pp. 917\u201029.","DOI":"10.1111\/j.1540-6210.2007.00778.x"},{"key":"key2022021220475897800_b18","unstructured":"Kirtchev, C.A. (1997), \u201cA cyberpunk manifesto\u201d, available at: http:\/\/project.cyberpunk.ru\/idb\/cyberpunk_manifesto.html (accessed 30 January 2011)."},{"key":"key2022021220475897800_b19","doi-asserted-by":"crossref","unstructured":"Kranzberg, M. (1986), \u201cTechnology and history: Kranzberg's laws\u201d, Technology and Culture, Vol. 27 No. 3, pp. 544\u201060.","DOI":"10.2307\/3105385"},{"key":"key2022021220475897800_b20","unstructured":"Levy, S. (1984), Hackers: Heroes of the Computer Revolution, Anchor Press, Garden City, NY."},{"key":"key2022021220475897800_b21","doi-asserted-by":"crossref","unstructured":"Lyytinen, K. and Robey, D. (1999), \u201cLearning failure in information systems development\u201d, Information Systems Journal, Vol. 9 No. 2, pp. 85\u2010101.","DOI":"10.1046\/j.1365-2575.1999.00051.x"},{"key":"key2022021220475897800_b22","doi-asserted-by":"crossref","unstructured":"MacIntyre, A.C. (2002), \u201cAlasdair MacIntyre on education: in dialogue with Joseph Dunne\u201d, Journal of Philosophy of Education, Vol. 36 No. 1, pp. 1\u201019.","DOI":"10.1111\/1467-9752.00256"},{"key":"key2022021220475897800_b23","doi-asserted-by":"crossref","unstructured":"MacIntyre, A.C. (2006), \u201cSocial structures and their threat to moral agency\u201d, Ethics and Politics: Selected Essays, Vol. 2, Cambridge University Press, Cambridge, pp. 186\u2010284.","DOI":"10.1017\/CBO9780511606670.012"},{"key":"key2022021220475897800_b24","unstructured":"Marx, K. (1848), Communist Manifesto, ElecBook, London."},{"key":"key2022021220475897800_b25","doi-asserted-by":"crossref","unstructured":"Nardi, B.A. and O'Day, V. (1999), Information Ecologies: Using Technology with Heart, MIT Press, Cambridge, MA.","DOI":"10.7551\/mitpress\/3767.001.0001"},{"key":"key2022021220475897800_b26","unstructured":"Palmer, R. (1974), The Triumph of General Ludd, Penguin, Harmondsworth."},{"key":"key2022021220475897800_b27","unstructured":"Peter, I. (2004), \u201cThe history of email\u201d, available at: www.nethistory.info\/History%20of%20the%20Internet\/email.html (accessed 27 January 2011)."},{"key":"key2022021220475897800_b28","unstructured":"Plato (1917), Plato with an English Translation, W. Heinemann, London (H. N. Fowler, trans. Vol. v.1. Euthyphro, Apology, Crito, Phaedo, Phaedrus)."},{"key":"key2022021220475897800_b29","unstructured":"Rheingold, H. (1993), The Virtual Community: Homesteading on the Electronic Frontier, Addison\u2010Wesley, Reading, MA."},{"key":"key2022021220475897800_b30","unstructured":"Schumpeter, J.A. (1987), Capitalism, Socialism, and Democracy, 6th ed., Unwin Paperbacks, London, with a new introduction by Tom Bottomore %@ 004335064X: ed."},{"key":"key2022021220475897800_b31","unstructured":"Strauser, K. (2005), \u201cThe history and future of SMTP. SMTP's adaptations to a hostile internet\u201d, available at: www.freesoftwaremagazine.com\/articles\/focus_spam_smtp (accessed 27 January 2011)."},{"key":"key2022021220475897800_b32","unstructured":"The\u2010Mentor (1986), The Hacker Manifesto, available at: www.mithral.com\/\u223cbeberg\/manifesto.html (accessed 30 January 2011)."},{"key":"key2022021220475897800_b33","unstructured":"Thompson, E.P. (1968), The Making of the English Working Class, Penguin, Harmondsworth."},{"key":"key2022021220475897800_b34","unstructured":"Tsantis, L.A. (2002), \u201cTechnology as the catalyst\u201d, Creating the Future: Perspectives on Educational Change, available at: http:\/\/education.jhu.edu\/newhorizons\/future\/creating_the_future\/crfut_dickinson.cfm (accessed 5 January 2011)."},{"key":"key2022021220475897800_b35","doi-asserted-by":"crossref","unstructured":"Wellman, B. (2001), \u201cComputer networks as social networks\u201d, Science, Vol. 293 No. 5537, pp. 2031\u20104.","DOI":"10.1126\/science.1065547"},{"key":"key2022021220475897800_frd1","unstructured":"Ford, D. and Keays, J. (1970), \u201cBecause I love you\u201d, Masters Apprentices."}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14779961211285881","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961211285881\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961211285881\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:13:20Z","timestamp":1753402400000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/10\/4\/262-272\/218275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,23]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,11,23]]}},"alternative-id":["10.1108\/14779961211285881"],"URL":"https:\/\/doi.org\/10.1108\/14779961211285881","relation":{},"ISSN":["1477-996X"],"issn-type":[{"value":"1477-996X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,11,23]]}}}