{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T17:00:33Z","timestamp":1763830833099,"version":"3.41.2"},"reference-count":65,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T00:00:00Z","timestamp":1509926400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ITP"],"published-print":{"date-parts":[[2017,11,6]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this paper is to propose an inter-disciplinary approach to the ethics of social networking services (SNS) that connects critical analysis with the doing of ethics in terms of both pedagogic and technological practice.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Primarily conceptual and discursive, drawing on theoretical concepts from a broad, inter-disciplinary field. These concepts are integrated into a multi-dimensional framework that proceeds through four sequential stages: socio-economic, ethical, legal and practical\/professional. Particular instances of SNS are used as illustrative examples.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The evaluation of ethical issues can be enriched by broader, holistic approaches that take account of the socio-economic, technical and legal contexts in which SNS technologies are designed, deployed and used. Inter-disciplinary approaches have the potential to generate new connections and possibilities for both the teaching and the professional practice of ethics.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>Applied ethics are used to consider practical solutions that explore regulatory measures and envision alternative models of social networking. The approach proposed has practical value for teachers and students of computer ethics, as well as for IT practitioners.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This paper synthesises elements from media, communication and cultural studies, science and technology, information systems and computer science. The paper offers a strategy of inquiry to understand various aspects of SNS ethics \u2013 legal, socio-economic and technical. It presents a methodology for thinking about and doing ethics which can be used by IT practitioners.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/itp-04-2016-0093","type":"journal-article","created":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T19:12:49Z","timestamp":1507057969000},"page":"910-926","source":"Crossref","is-referenced-by-count":10,"title":["Doing social network ethics: a critical, interdisciplinary approach"],"prefix":"10.1108","volume":"30","author":[{"given":"Simon","family":"Jones","sequence":"first","affiliation":[]}],"member":"140","reference":[{"volume-title":"ISpy: Surveillance and Power in the Interactive Era","year":"2007","key":"key2020120419261293700_ref001"},{"volume-title":"A Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet","year":"2013","key":"key2020120419261293700_ref002"},{"volume-title":"Research Using Social Media; Users\u2019 Views","year":"2014","key":"key2020120419261293700_ref003"},{"issue":"5","key":"key2020120419261293700_ref004","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1080\/1369118X.2012.678878","article-title":"Critical questions for big data","volume":"15","year":"2012","journal-title":"Information, Communication and Society"},{"issue":"1","key":"key2020120419261293700_ref005","first-page":"210","article-title":"Social networking sites: definition, history, and scholarship","volume":"13","year":"2008","journal-title":"Journal of Computer-Mediated Communication"},{"volume-title":"Sharing our Lives Online: Risks and Exposure in Social Media","year":"2014","key":"key2020120419261293700_ref006"},{"key":"key2020120419261293700_ref007","doi-asserted-by":"crossref","unstructured":"Brey, P. (2010), \u201cValues in technology and disclosive computer ethics\u201d, in Floridi, L. (Ed.), Cambridge Handbook of Information and Computer Ethics, Cambridge University Press, Cambridge, pp. 41-58.","DOI":"10.1017\/CBO9780511845239.004"},{"issue":"8","key":"key2020120419261293700_ref008","doi-asserted-by":"crossref","first-page":"974","DOI":"10.1080\/1369118X.2013.870591","article-title":"Facebook: public space, or private space?","volume":"17","year":"2014","journal-title":"Information, Communication and Society"},{"key":"key2020120419261293700_ref009","unstructured":"Clarke, R. (2001), \u201cIntroducing PITs and PETs: technologies affecting privacy\u201d, available at: www.rogerclarke.com\/DV\/PITsPETs.html (accessed 13 December 2016)."},{"key":"key2020120419261293700_ref010","unstructured":"Clarke, R. (2006), \u201cWhat\u2019s \u2018privacy\u2019?\u201d, available at: www.rogerclarke.com\/DV\/Privacy.html (accessed 13 December 2016)."},{"volume-title":"Big Brother Watch; UK Public Research \u2013 Online Privacy","year":"2015","author":"COMRES","key":"key2020120419261293700_ref063"},{"first-page":"271","article-title":"Malicious interface design: exploiting the user","year":"2010","key":"key2020120419261293700_ref011"},{"issue":"3","key":"key2020120419261293700_ref012","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1145\/2874239.2874255","article-title":"Digital alienation as the foundation of online privacy concerns","volume":"45","year":"2016","journal-title":"ACM SIGCAS Computers and Society"},{"key":"key2020120419261293700_ref013","unstructured":"Data Science Association (2016), \u201cData science code of professional conduct\u201d, available at: www.datascienceassn.org\/sites\/default\/files\/datasciencecodeofprofessionalconduct.pdf (accessed 24 April 2016)."},{"key":"key2020120419261293700_ref014","unstructured":"Diaspora (2016), \u201cHow does diaspora work?\u201d, available at: https:\/\/diasporafoundation.org\/about#host (accessed 24 April 2016)."},{"key":"key2020120419261293700_ref015","unstructured":"Digital Analytics Association (2016), \u201cThe web analyst\u2019s code of ethics\u201d, available at: www.digitalanalyticsassociation.org\/codeofethics (accessed 24 April 2016)."},{"volume-title":"A Critical Hypertext Analysis of Social Media: The True Colours of Facebook","year":"2013","key":"key2020120419261293700_ref016"},{"key":"key2020120419261293700_ref017","unstructured":"Facebook (2015), \u201cFacebook reports first quarter 2015 results\u201d, available at: http:\/\/investor.fb.com\/releasedetail.cfm?ReleaseID=908022 (accessed 24 April 2016)."},{"key":"key2020120419261293700_ref018","unstructured":"Facebook (2016a), \u201cAbout Facebook\u201d, available at: www.facebook.com\/facebook\/info?tab=page_info (accessed 24 April 2016)."},{"key":"key2020120419261293700_ref019","unstructured":"Facebook (2016b), \u201cData policy\u201d, available at: www.facebook.com\/about\/privacy\/advertising (accessed 24 April 2016)."},{"key":"key2020120419261293700_ref020","doi-asserted-by":"crossref","unstructured":"Friedman, B., Kahn, P. and Borning, A. (2008), \u201cValue sensitive design and information systems\u201d, in Himma, K. and Tavani, H. (Eds), The Handbook of Information and Computer Ethics, John Wiley, Hoboken, NJ, pp. 69-101.","DOI":"10.1002\/9780470281819.ch4"},{"volume-title":"Social Media: A Critical Introduction, Sage","year":"2014","key":"key2020120419261293700_ref021"},{"key":"key2020120419261293700_ref022","doi-asserted-by":"crossref","unstructured":"Fuller, M. (Ed.) (2008), Software Studies: A Lexicon, MIT Press, Cambridge, MA.","DOI":"10.7551\/mitpress\/9780262062749.001.0001"},{"volume-title":"Reverse Engineering Social Media: Software, Culture and Political Economy in New Media Capitalism","year":"2014","key":"key2020120419261293700_ref023"},{"key":"key2020120419261293700_ref024","unstructured":"Greenwood, S., Perrin, A. and Duggan, M. (2016), \u201cSocial media update 2016\u201d, Pew Research Center, available at: www.pewinternet.org\/2016\/11\/11\/social-media-update-2016 (accessed 13 December 2016)."},{"volume-title":"Moral Conciousness and Communicative Action","year":"2001","key":"key2020120419261293700_ref025"},{"key":"key2020120419261293700_ref026","unstructured":"Hall, S. (1982), \u201cThe rediscovery of \u2018ideology\u2019: return of the repressed in media studies\u201d, in Bennett, T., Curran, J., Gurevitch, G. and Wollacott, J. (Eds), Culture, Society and the Media, Methuen, New York, NY, pp. 56-90."},{"issue":"2","key":"key2020120419261293700_ref027","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10676-015-9363-z","article-title":"Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data","volume":"17","year":"2015","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"key2020120419261293700_ref028","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1177\/S0038038501000219","article-title":"Technologies, texts and affordances","volume":"35","year":"2001","journal-title":"Sociology"},{"volume-title":"Computer Ethics: Analyzing Information Technology","year":"2009","key":"key2020120419261293700_ref029"},{"issue":"1","key":"key2020120419261293700_ref030","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1108\/JICES-07-2014-0033","article-title":"Doing the right thing: computer ethics pedagogy revisited","volume":"14","year":"2016","journal-title":"Journal of Information, Communication and Ethics in Society"},{"volume-title":"Code: Version 2.0","year":"2006","key":"key2020120419261293700_ref031"},{"issue":"4","key":"key2020120419261293700_ref032","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1108\/09593841011087770","article-title":"Ethics and social networking sites: a disclosive analysis of Facebook","volume":"23","year":"2010","journal-title":"Information Technology and People"},{"volume-title":"Networks Without a Cause: A Critique of Social Media","year":"2011","key":"key2020120419261293700_ref033"},{"volume-title":"Surveillance Studies: An Overview","year":"2007","key":"key2020120419261293700_ref034"},{"issue":"1","key":"key2020120419261293700_ref035","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1108\/JICES-06-2013-0017","article-title":"ACTIVE ethics: an information systems ethics for the internet age","volume":"12","year":"2014","journal-title":"Journal of Information, Communication and Ethics in Society"},{"issue":"2","key":"key2020120419261293700_ref036","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1080\/15295036.2014.913806","article-title":"Be realistic, demand the impossible: three radically democratic internet policies","volume":"31","year":"2014","journal-title":"Critical Studies in Media Communication"},{"key":"key2020120419261293700_ref037","unstructured":"McGee, M. (2013), \u201cEdgerank is dead: facebook\u2019s news feed algorithm now has close to 100k weight factors\u201d, Marketing Land, 16 August, available at: http:\/\/marketingland.com\/edgerank-is-dead-facebooks-news-feed-algorithm-now-has-close-to-100k-weight-factors-55908 (accessed 24 April 2016)."},{"year":"2015","key":"key2020120419261293700_ref038","article-title":"Government surveillance and internet search behavior"},{"volume-title":"Delete: The Virtue of Forgetting in the Digital Age","year":"2011","key":"key2020120419261293700_ref039"},{"issue":"4","key":"key2020120419261293700_ref040","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1089\/cyber.2009.0257","article-title":"Self-presentation 2.0: narcissism and self-esteem on Facebook","volume":"13","year":"2010","journal-title":"Cyberpsychology, Behavior and Social Networking"},{"key":"key2020120419261293700_ref041","unstructured":"Moglen, E. (2010), \u201cFreedom in the cloud: software freedom, privacy, and security for web 2.0 and cloud computing\u201d, presentation to The Internet Society, New York, NY, 5 February, available at: www.softwarefreedom.org\/events\/2010\/isoc-ny\/FreedomInTheCloud-transcript.html (accessed 24 April 2016)."},{"issue":"4","key":"key2020120419261293700_ref042","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1111\/j.1467-9973.1985.tb00173.x","article-title":"What is computer ethics?","volume":"16","year":"1985","journal-title":"Metaphilosophy"},{"volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","year":"2010","key":"key2020120419261293700_ref043"},{"key":"key2020120419261293700_ref044","doi-asserted-by":"crossref","unstructured":"Papacharissi, Z. (Ed.) (2011), A Networked Self: Identity, Community and Culture on Social Network Sites, Routledge, London.","DOI":"10.4324\/9780203876527"},{"volume-title":"Ethics for the Information Age","year":"2010","key":"key2020120419261293700_ref045"},{"year":"2016","key":"key2020120419261293700_ref046","article-title":"The state of privacy in America: what we learned"},{"volume-title":"Ethics in Information Technology","year":"2012","key":"key2020120419261293700_ref047"},{"issue":"2","key":"key2020120419261293700_ref048","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1093\/idpl\/ips036","article-title":"Big data: the end of privacy or a new beginning?","volume":"3","year":"2013","journal-title":"International Data Privacy Law"},{"volume-title":"Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World","year":"2015","key":"key2020120419261293700_ref049"},{"issue":"1","key":"key2020120419261293700_ref050","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/15332861.2011.558454","article-title":"Online privacy concerns associated with cookies, flash cookies, and web beacons","volume":"10","year":"2011","journal-title":"Journal of Internet Commerce"},{"issue":"3","key":"key2020120419261293700_ref051","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1080\/1369118X.2015.1111403","article-title":"Capital experimentation with person\/a formation: how facebook\u2019s monetization refigures the relationship between property, personhood and protest","volume":"19","year":"2016","journal-title":"Information, Communication and Society"},{"volume-title":"Information Systems: Critical Perspectives","year":"2008","key":"key2020120419261293700_ref052"},{"issue":"6","key":"key2020120419261293700_ref053","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1016\/j.im.2014.01.001","article-title":"From computer ethics to responsible research and innovation in ICT","volume":"51","year":"2014","journal-title":"Information and Management"},{"key":"key2020120419261293700_ref054","unstructured":"Stallman, R. (2013), \u201cReasons not to use Facebook\u201d, available at: https:\/\/stallman.org\/facebook.html (accessed 13 July, 2016)."},{"issue":"3","key":"key2020120419261293700_ref055","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1089\/1094931041291295","article-title":"The online disinhibition effect","volume":"7","year":"2004","journal-title":"CyberPsychology and Behavior"},{"volume-title":"Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing","year":"2013","key":"key2020120419261293700_ref056"},{"year":"2010","key":"key2020120419261293700_ref065","article-title":"Choice architecture"},{"issue":"2","key":"key2020120419261293700_ref057","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1109\/SURV.2012.072412.00129","article-title":"A survey on identity management for the future network","volume":"15","year":"2013","journal-title":"IEEE Communications Surveys & Tutorials"},{"volume-title":"Alone Together: Why We Expect More from Technology and Less from Each Other","year":"2011","key":"key2020120419261293700_ref058"},{"volume-title":"The Daily You: How the New Advertising Industry is Defining Your Identity and Your World","year":"2011","key":"key2020120419261293700_ref059"},{"volume-title":"The Culture of Connectivity: A Critical History of Social Media","year":"2013","key":"key2020120419261293700_ref060"},{"key":"key2020120419261293700_ref061","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2053951714559253","article-title":"Big data ethics","year":"2014","journal-title":"Big Data and Society"},{"key":"key2020120419261293700_ref062","unstructured":"Andrejevic, M. (2011), \u201cSocial network exploitation\u201d, in Papacharissi, Z. (Ed.), A Networked Self: Identity, Community and Culture on Social Network Sites, Routledge, London, pp. 82-101."},{"issue":"13","key":"key2020120419261293700_ref064","first-page":"289","article-title":"Contextual gaps: privacy issues on facebook","volume":"4","year":"2011","journal-title":"Ethics and Information Technology"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-04-2016-0093\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-04-2016-0093\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:54:35Z","timestamp":1753394075000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/30\/4\/910-926\/175608"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,6]]},"references-count":65,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,11,6]]}},"alternative-id":["10.1108\/ITP-04-2016-0093"],"URL":"https:\/\/doi.org\/10.1108\/itp-04-2016-0093","relation":{},"ISSN":["0959-3845"],"issn-type":[{"type":"print","value":"0959-3845"}],"subject":[],"published":{"date-parts":[[2017,11,6]]}}}