{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T14:12:35Z","timestamp":1770473555458,"version":"3.49.0"},"reference-count":101,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T00:00:00Z","timestamp":1496620800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ITP"],"published-print":{"date-parts":[[2017,6,5]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to understand the impact of Chinese culture on the information ethics perception gaps between Chinese and American students.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>Using a qualitative approach, this study utilizes Kohlberg\u2019s Cognitive Moral Development model and an open-ended questionnaire to measure and analyze the gaps among information ethics perceptions of students from Taiwan, Mainland China, Hong Kong, and the USA, and to assess the extent to which the gaps are influenced by Chinese culture.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Students\u2019 perceptions of intellectual property, information accuracy, privacy, and accessibility (PAPA) are deeply influenced by national culture. Sub-cultures have significant impact on the perceptions. Political systems, history, and legal environment may also play a role in the differences of PAPA perceptions among the three Chinese societies. The study also revealed that accuracy and intellectual property are the most deficient areas of moral developments in both Chinese and American samples.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title><jats:p>The sample sizes from Hong Kong and the USA were relatively small due to resource and time constraints. In addition, the subjects from Hong Kong and the USA were a little bit older than the subjects from Taiwan and Mainland China due to the fact that universities in HK and USA tend to have more non-traditional students than in universities in Mainland China and Taiwan. Second, the questionnaire is a limited means of studying moral reasoning because the results are likely to reflect espoused theory rather than theory-in-use.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title><jats:p>The educational implication of this study calls for a renewed approach to educate students on the importance of information ethics for the sake of sustained economic development.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>The novelty of this research lies in its interpretation of students\u2019 PAPA perceptions and fresh insights from a Chinese<jats:italic>guanxi<\/jats:italic>perspective.<\/jats:p><\/jats:sec>","DOI":"10.1108\/itp-08-2014-0181","type":"journal-article","created":{"date-parts":[[2017,4,20]],"date-time":"2017-04-20T07:22:55Z","timestamp":1492672975000},"page":"473-502","source":"Crossref","is-referenced-by-count":10,"title":["The information ethics perception gaps between Chinese and American students"],"prefix":"10.1108","volume":"30","author":[{"given":"Christina Ling-hsing","family":"Chang","sequence":"first","affiliation":[]},{"given":"Jim Q.","family":"Chen","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"1","key":"key2020120706413182900_ref001","first-page":"36","article-title":"Imagined communities: awareness, information sharing, and privacy on the Facebook","volume":"4258","year":"2006","journal-title":"Privacy Enhancing Technologies"},{"issue":"1","key":"key2020120706413182900_ref002","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1023\/A:1010012313068","article-title":"Does gender matter in computer ethics?","volume":"2","year":"2000","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"key2020120706413182900_ref003","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1086\/443530","article-title":"Moral reasoning of students in different cultural, social, and educational settings","volume":"88","year":"1980","journal-title":"American Journal of Education"},{"issue":"5","key":"key2020120706413182900_ref004","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1080\/01972240490507956","article-title":"International differences in information privacy concerns: a global survey of consumers","volume":"20","year":"2004","journal-title":"Information Society"},{"issue":"3","key":"key2020120706413182900_ref005","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1023\/B:BUSI.0000032658.12032.4e","article-title":"Ethics in information technology and software use","volume":"51","year":"2004","journal-title":"Journal of Business Ethics"},{"issue":"2","key":"key2020120706413182900_ref006","first-page":"27","article-title":"User attitude towards instant messaging: the effect of espoused national cultural values on awareness and privacy","volume":"11","year":"2008","journal-title":"Journal of Global Information Technology Management"},{"key":"key2020120706413182900_ref007","doi-asserted-by":"crossref","unstructured":"Capurro, R. (2006), \u201cTowards an ontological foundation of information ethics\u201d, Ethics and Information Technology, Vol. 8 No. 4, pp. 175-186.","DOI":"10.1007\/s10676-006-9108-0"},{"key":"key2020120706413182900_ref008","doi-asserted-by":"crossref","unstructured":"Capurro, R. (2008), \u201cIntercultural information ethics\u201d, in Himma, K. and Tavani, H. (Eds), The Handbook of Information and Computer Ethics, Wiley, Hoboken, NJ, pp. 639-665.","DOI":"10.1002\/9780470281819.ch27"},{"issue":"1","key":"key2020120706413182900_ref009","doi-asserted-by":"crossref","first-page":"25","DOI":"10.3172\/JIE.18.1.25","article-title":"Ethical values of IT professionals in Chinese cultural societies","volume":"18","year":"2009","journal-title":"Journal of Information Ethics"},{"issue":"3","key":"key2020120706413182900_ref010","article-title":"Chinese cultural and power perspective on information systems \u2013 technological frames and reframes","volume":"15","year":"2010","journal-title":"Information Research: An International Electronic Journal"},{"issue":"5","key":"key2020120706413182900_ref011","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1080\/0144929X.2010.504283","article-title":"The dilemma of renqing in ISD \u2013 interpretations from the perspectives of face and Guanxi of Chinese cultural society","volume":"31","year":"2012","journal-title":"Behavior & Information Technology"},{"issue":"6","key":"key2020120706413182900_ref012","doi-asserted-by":"crossref","first-page":"2258","DOI":"10.1016\/j.chb.2012.06.033","article-title":"A framework for Chinese power games \u2013 political tactics in information systems development processes","volume":"28","year":"2012","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"key2020120706413182900_ref013","doi-asserted-by":"crossref","first-page":"285","DOI":"10.5465\/amr.1998.533227","article-title":"How can cooperation be fostered? The cultural effects of individualism-collectivism","volume":"23","year":"1998","journal-title":"Academy of Management Review"},{"issue":"4","key":"key2020120706413182900_ref014","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1080\/15332861.2013.865388","article-title":"A cross-culture empirical study of mobile commerce privacy concerns","volume":"12","year":"2013","journal-title":"Journal of Internet Commerce"},{"issue":"1-2","key":"key2020120706413182900_ref015","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s10551-007-9391-7","article-title":"Ethical perceptions of business students: differences between East Asia and the USA and among \u2018Confucian\u2019 cultures","volume":"79","year":"2008","journal-title":"Journal of Business Ethics"},{"key":"key2020120706413182900_ref016","unstructured":"Chung, W.K. and Hamilton, G.G. (2001), \u201cSocial logic as business logic: Guanxi, trustworthiness, and the embeddedness of Chinese business practices\u201d, in Appelbaum, R., Felstiner, W. and Gessner, V. (Eds), Rules and Networks: The Legal Culture of Global Business Transactions, Hart Publishing, Oxford, pp. 325-346."},{"issue":"1","key":"key2020120706413182900_ref017","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1177\/001316446002000104","article-title":"A coefficient of agreement for nominal scales","volume":"20","year":"1960","journal-title":"Educational and Psychological Measurement"},{"issue":"4","key":"key2020120706413182900_ref018","doi-asserted-by":"crossref","first-page":"673","DOI":"10.2307\/20650322","article-title":"How ethics can enhance organizational privacy: lessons from the choice point and TJX data breaches","volume":"33","year":"2009","journal-title":"MIS Quarterly"},{"issue":"11","key":"key2020120706413182900_ref019","doi-asserted-by":"crossref","first-page":"834","DOI":"10.17705\/1jais.00212","article-title":"The ethics of IT professionals in Japan and China","volume":"10","year":"2009","journal-title":"Journal of the Association for Information Systems"},{"issue":"8","key":"key2020120706413182900_ref020","first-page":"1","article-title":"Professional ethics in information systems: a personal perspective","volume":"3","year":"2000","journal-title":"Communications of the Association for Information Systems"},{"issue":"1","key":"key2020120706413182900_ref021","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TEM.2005.861817","article-title":"Ethical values of IT professionals: evidence from Hong Kong","volume":"53","year":"2006","journal-title":"IEEE Transactions on Engineering Management"},{"key":"key2020120706413182900_ref022","first-page":"1","article-title":"Perusing, choosing, and not misusing: non-parametric vs parametric tests in SAS","year":"2004"},{"issue":"4","key":"key2020120706413182900_ref023","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/0273-2297(82)90017-X","article-title":"A Chinese perspective on Kohlberg\u2019s theory of moral development","volume":"2","year":"1982","journal-title":"Developmental Review"},{"issue":"1","key":"key2020120706413182900_ref024","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","year":"2006","journal-title":"Information Systems Research"},{"issue":"5","key":"key2020120706413182900_ref025","first-page":"48","article-title":"Values in tension: ethics away from home","volume":"74","year":"1996","journal-title":"Harvard Business Review"},{"issue":"5","key":"key2020120706413182900_ref026","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/j.im.2007.05.002","article-title":"Equity perceptions as a deterrent to software piracy behavior","volume":"44","year":"2007","journal-title":"Information & Management"},{"issue":"3","key":"key2020120706413182900_ref027","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s10551-007-9381-9","article-title":"Enhancing business ethics: using cases to teach moral reasoning","volume":"79","year":"2008","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"key2020120706413182900_ref028","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1108\/07378830710735830","article-title":"Information ethics for 21st century library professionals","volume":"25","year":"2007","journal-title":"Library Hi Tech"},{"key":"key2020120706413182900_ref029","unstructured":"Froehlich, T. (2004), \u201cA brief history of information ethics\u201d, working paper at Kent State University, Kent, OH."},{"issue":"12","key":"key2020120706413182900_ref030","first-page":"11","article-title":"A brief history of information ethics","volume":"28","year":"2005","journal-title":"Computer Society of India Communications"},{"key":"key2020120706413182900_ref031","unstructured":"Fu, P.Y. and Lei, T. (1991), \u201cResearch on the development of moral reasoning in Taiwan and Hong Kong (in Chinese)\u201d, in Yang, C.F. and Kao, H.S.J. (Eds), Chinese People and Chinese Mind, Yuan-liu, Taipei, pp. 213-303."},{"key":"key2020120706413182900_ref032","doi-asserted-by":"crossref","unstructured":"Gallini, N. and Scotchmer, S. (2002), \u201cIntellectual property: when is it the best incentive system?\u201d, in Cafaggi, F., Nicita, A. and Pagano, U. (Eds), Legal Orderings and Economic Institutions, Vol. 2, Routledge Studies in Political Economy, MIT Press, Cambridge, MA, pp. 51-77.","DOI":"10.1086\/653754"},{"issue":"5","key":"key2020120706413182900_ref033","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1016\/j.im.2006.03.005","article-title":"An empirical study of software piracy among tertiary institutions in Singapore","volume":"43","year":"2006","journal-title":"Information & Management"},{"issue":"1","key":"key2020120706413182900_ref034","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/s10551-007-9571-5","article-title":"A cross-cultural comparison of the deliberative reasoning of Canadian and Chinese accounting students","volume":"82","year":"2008","journal-title":"Journal of Business Ethics"},{"key":"key2020120706413182900_ref035","unstructured":"Gielen, U.P. and Markoulis, D. (2001), \u201cPreference for principled moral reasoning: a developmental and cross-cultural perspective\u201d, in Adler, L.L. and Gielen, U.P. (Eds), Cross-cultural Topics in Psychology, 2nd ed., Praeger, Westport, CT, pp. 81-100."},{"key":"key2020120706413182900_ref036","volume-title":"In a Different Voice: Psychological Theory and Women\u2019s Development","year":"1982"},{"key":"key2020120706413182900_ref037","first-page":"71","article-title":"Information revelation and privacy in online social networks","year":"2005"},{"issue":"4","key":"key2020120706413182900_ref038","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/BF02765185","article-title":"Epistemological and methodological bases of naturalistic inquiry","volume":"30","year":"1982","journal-title":"Educational Communications and Technology Journal"},{"issue":"2","key":"key2020120706413182900_ref039","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1111\/1467-8608.00273","article-title":"European vs American approaches to institutionalisation of business ethics: the Spanish case","volume":"11","year":"2002","journal-title":"Business Ethics: An European Review"},{"issue":"3","key":"key2020120706413182900_ref040","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.im.2007.02.002","article-title":"Situational influences on ethical decision-making in an IT context","volume":"44","year":"2007","journal-title":"Information & Management"},{"issue":"3","key":"key2020120706413182900_ref041","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1111\/j.1741-5446.2001.00259.x","article-title":"What happens when we use Kohlberg? His troubling functionalism and the potential of pragmatism in moral education","volume":"51","year":"2001","journal-title":"Educational Theory"},{"key":"key2020120706413182900_ref042","volume-title":"Culture\u2019s Consequences: International Differences in Work-related Values","year":"1980"},{"issue":"1","key":"key2020120706413182900_ref043","doi-asserted-by":"crossref","first-page":"19","DOI":"10.2307\/25148779","article-title":"The value of privacy assurance: an exploratory field experiment","volume":"31","year":"2007","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2020120706413182900_ref044","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1108\/13632540410807682","article-title":"Cultural influence on relationship cultivation strategies: multinational companies in China","volume":"8","year":"2004","journal-title":"Journal of Communication Management"},{"issue":"4","key":"key2020120706413182900_ref045","doi-asserted-by":"crossref","first-page":"944","DOI":"10.1086\/228588","article-title":"Face and favor: the Chinese power game","volume":"92","year":"1987","journal-title":"American Journal of Sociology"},{"issue":"3","key":"key2020120706413182900_ref046","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1111\/1467-839X.00015","article-title":"Two moralities: reinterpreting the findings of empirical research on moral reasoning in Taiwan","volume":"1","year":"1998","journal-title":"Asian Journal of Social Psychology"},{"issue":"4","key":"key2020120706413182900_ref047","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2753\/MIS0742-1222240401","article-title":"Self-perception-based versus transference-based trust determinants in computer-mediated transactions: a cross-cultural comparison study","volume":"24","year":"2008","journal-title":"Journal of Management Information Systems"},{"key":"key2020120706413182900_ref048","first-page":"121","volume-title":"Essays on Moral Development, Vol. 1: The Philosophy of Moral Development","year":"1981"},{"key":"key2020120706413182900_ref049","volume-title":"Essays on Moral Development Vol. 2. The Psychology of Moral Development","year":"1984"},{"issue":"1","key":"key2020120706413182900_ref050","first-page":"28","article-title":"Trust, and long-term orientation in Chinese business markets","volume":"13","year":"2005","journal-title":"Journal of International Marketing"},{"issue":"5","key":"key2020120706413182900_ref051","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1016\/j.ijproman.2008.05.012","article-title":"E-ethical leadership for virtual project teams","volume":"27","year":"2009","journal-title":"International Journal of Project Management"},{"key":"key2020120706413182900_ref052","doi-asserted-by":"crossref","unstructured":"Lemley, M.A. (2004), \u201cProperty, intellectual property, and free riding\u201d, working paper at Stanford Law School, Stanford, CA.","DOI":"10.2139\/ssrn.582602"},{"key":"key2020120706413182900_ref053","volume-title":"Naturalistic Inquiry","year":"1985"},{"issue":"4","key":"key2020120706413182900_ref054","doi-asserted-by":"crossref","first-page":"163","DOI":"10.2753\/MIS0742-1222270406","article-title":"Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures","volume":"27","year":"2011","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"key2020120706413182900_ref055","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/s10551-013-1705-3","article-title":"Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse","volume":"121","year":"2014","journal-title":"Journal of Business Ethics"},{"issue":"4","key":"key2020120706413182900_ref056","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model","volume":"15","year":"2004","journal-title":"Information Systems Research"},{"issue":"11","key":"key2020120706413182900_ref057","doi-asserted-by":"crossref","first-page":"816","DOI":"10.17705\/1jais.00213","article-title":"Sub-cultural differences in information ethics across China: focus on Chinese management generation gaps","volume":"10","year":"2009","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"key2020120706413182900_ref058","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1111\/j.1365-2575.2008.00302.x","article-title":"Relationship-based e-commerce: theory and evidence from China","volume":"18","year":"2008","journal-title":"Information Systems Journal"},{"issue":"1","key":"key2020120706413182900_ref059","doi-asserted-by":"crossref","first-page":"5","DOI":"10.2307\/248873","article-title":"Four ethical issues of the information age","volume":"10","year":"1986","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020120706413182900_ref060","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s10551-005-7100-y","article-title":"Corporate ethical policies in large corporations in Argentina, Brazil and Spain","volume":"63","year":"2006","journal-title":"Journal of Business Ethics"},{"issue":"4","key":"key2020120706413182900_ref061","doi-asserted-by":"crossref","first-page":"833","DOI":"10.2307\/25750707","article-title":"Toward ethical information systems: the contribution of discourse ethics","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2020120706413182900_ref062","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1287\/isre.2.3.192","article-title":"Development of an instrument to measure the perceptions of adopting an information technology innovation","volume":"2","year":"1991","journal-title":"Information Systems Research"},{"issue":"1","key":"key2020120706413182900_ref063","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s10551-007-9479-0","article-title":"An analysis of the impact of economic wealth and national culture on the rise and fall of software piracy rates","volume":"81","year":"2008","journal-title":"Journal of Business Ethics"},{"issue":"8","key":"key2020120706413182900_ref064","doi-asserted-by":"crossref","first-page":"1037","DOI":"10.1016\/j.im.2003.10.005","article-title":"A reversed context analysis of software piracy issues in Singapore","volume":"41","year":"2004","journal-title":"Information & Management"},{"issue":"1","key":"key2020120706413182900_ref065","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s10676-005-0453-1","article-title":"Japanese conceptions of privacy: an intercultural perspective","volume":"7","year":"2005","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"key2020120706413182900_ref066","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1037\/1082-989X.3.1.55","article-title":"Analysis of Likert scale data in disability and medical rehabilitation research","volume":"3","year":"1998","journal-title":"Psychological Methods"},{"issue":"1","key":"key2020120706413182900_ref067","first-page":"233","article-title":"Investigating information systems with positivist case study research","volume":"13","year":"2004","journal-title":"Communications of the Association for Information Systems"},{"key":"key2020120706413182900_ref068","unstructured":"Pettigrew, A.M. (1985), \u201cContextualist research and the study of organizational change processes\u201d, in Lawler, E. (Ed.), Doing Research that is Useful for Theory and Practice, Jossey-Bass, San Francisco, CA, pp. 53-72."},{"issue":"1","key":"key2020120706413182900_ref069","first-page":"24","article-title":"When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse","volume":"7","year":"2011","journal-title":"Journal of Information System Security"},{"issue":"1","key":"key2020120706413182900_ref070","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1287\/isre.1080.0174","article-title":"Choice and chance: a conceptual model of paths to information security compromise","volume":"20","year":"2009","journal-title":"Information Systems Research"},{"key":"key2020120706413182900_ref071","volume-title":"Development in Judging Moral Issues","year":"1979"},{"issue":"2","key":"key2020120706413182900_ref072","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/s10551-007-9504-3","article-title":"A cross-cultural comparison of ethical orientations and willingness to sacrifice ethical standards: China versus Peru","volume":"81","year":"2008","journal-title":"Journal of Business Ethics"},{"issue":"4","key":"key2020120706413182900_ref073","first-page":"329","article-title":"Personal medical information management: the information privacy culture of Asian countries","volume":"1","year":"2013","journal-title":"Journal of Economics, Business and Management"},{"issue":"4","key":"key2020120706413182900_ref074","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1037\/0022-3514.83.4.919","article-title":"Protestant relational ideology and (in) attention to relational cues in work settings","volume":"83","year":"2002","journal-title":"Journal of Personality and Social Psychology"},{"key":"key2020120706413182900_ref075","volume-title":"The Principles of Information Ethics","year":"1997"},{"issue":"1","key":"key2020120706413182900_ref076","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1145\/962081.962088","article-title":"Global software piracy revisited","volume":"47","year":"2004","journal-title":"Communications of the ACM"},{"issue":"4","key":"key2020120706413182900_ref077","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1111\/j.1365-2575.2004.00179.x","article-title":"Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice","volume":"14","year":"2004","journal-title":"Information Systems Journal"},{"issue":"2","key":"key2020120706413182900_ref079","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1037\/0033-2909.97.2.202","article-title":"Cross-cultural universality of social-moral development: a critical review of Kohlbergian research","volume":"97","year":"1985","journal-title":"Psychological Bulletin"},{"issue":"1","key":"key2020120706413182900_ref080","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1177\/001872679604900102","article-title":"Complementing Kohlberg: mapping the ethical reasoning used by managers for their own dilemma cases","volume":"49","year":"1996","journal-title":"Human Relations"},{"issue":"3","key":"key2020120706413182900_ref081","doi-asserted-by":"crossref","first-page":"507","DOI":"10.2307\/3857514","article-title":"Obedience to authority and ethical dilemmas in Hong Kong companies","volume":"9","year":"1999","journal-title":"Business Ethics Quarterly"},{"issue":"2","key":"key2020120706413182900_ref082","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1002\/tie.1","article-title":"Ethical dilemmas of relationship building in China","volume":"43","year":"2001","journal-title":"Thunderbird International Business Review"},{"issue":"3","key":"key2020120706413182900_ref083","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25148854","article-title":"Internet users\u2019 information privacy-protective responses: a taxonomy and a nomological model","volume":"32","year":"2008","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020120706413182900_ref084","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1287\/isre.13.1.36.97","article-title":"An empirical examination of the concern for information privacy instrument","volume":"13","year":"2002","journal-title":"Information Systems Research"},{"key":"key2020120706413182900_ref085","volume-title":"Basics of Qualitative Research: Grounded Theory, Procedures, and Techniques","year":"1990"},{"issue":"3","key":"key2020120706413182900_ref086","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1023\/A:1017570803846","article-title":"Entering guanxi: a business ethical dilemma in mainland China","volume":"33","year":"2001","journal-title":"Journal of Business Ethics"},{"issue":"8","key":"key2020120706413182900_ref087","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1007\/BF00383392","article-title":"The morality of software piracy: a cross-cultural analysis","volume":"9","year":"1990","journal-title":"Journal of Business Ethics"},{"issue":"4","key":"key2020120706413182900_ref088","doi-asserted-by":"crossref","first-page":"153","DOI":"10.2753\/MIS0742-1222240406","article-title":"Gaining trust through online privacy protection: self-regulation, mandatory standards, or caveat emptor","volume":"24","year":"2008","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"key2020120706413182900_ref089","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1016\/j.socscimed.2006.01.015","article-title":"Modelling and understanding primary health care accessibility and utilization in rural South Africa: an exploration using a geographical information system","volume":"63","year":"2006","journal-title":"Social Science & Medicine"},{"key":"key2020120706413182900_ref090","unstructured":"Thoma, S.J. and Rest, J.R. (1986), \u201cMoral judgment, behavior, decision making, and attitudes\u201d, in Rest, J.R. (Ed.), Moral Development: Advances in Research and Theory, Praeger, New York, NY, pp. 133-175."},{"issue":"1","key":"key2020120706413182900_ref091","first-page":"139","article-title":"The development of two measures to assess accountants\u2019 prescriptive and deliberative moral reasoning","volume":"12","year":"2000","journal-title":"Behavioural Research in Accounting"},{"key":"key2020120706413182900_ref092","unstructured":"Tu, W.M. (1998), \u201cProbing the \u2018three bonds\u2019 and \u2018five relationships\u2019 in Confucian humanism\u201d, in Slote, W.H. and DeVos, G.A. (Eds), Confucianism and the Family, State University of New York Press, Albany, NY, pp. 121-136."},{"issue":"4","key":"key2020120706413182900_ref093","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/07421222.1997.11518140","article-title":"Moral hazard, ethical considerations, and the decision to implement an information system","volume":"13","year":"1997","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"key2020120706413182900_ref094","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1080\/01972240309490","article-title":"Dissecting the digital divide: a case study of Egypt","volume":"19","year":"2003","journal-title":"The Information Society"},{"key":"key2020120706413182900_ref095","unstructured":"Wellman, B., Chen, W. and Dong, W. (2001), \u201cNetworking guanxi\u201d, in Gold, T., Guthrie, D. and Wank, D. (Eds), Social Networks in China: Institutions, Culture, and the Changing Nature of Guanxi, Cambridge University Press, Cambridge, pp. 221-241."},{"key":"key2020120706413182900_ref096","volume-title":"Privacy and Freedom","year":"1967"},{"issue":"4","key":"key2020120706413182900_ref097","first-page":"15","article-title":"Implementing the ethos of corporate codes of ethics: Australia, Canada, and Sweden","volume":"13","year":"2004","journal-title":"Business Ethics: A European Review"},{"issue":"6","key":"key2020120706413182900_ref098","doi-asserted-by":"crossref","first-page":"1641","DOI":"10.2307\/257072","article-title":"Guanxi: connections as substitutes for formal institutional support","volume":"39","year":"1996","journal-title":"Academy of Management Journal"},{"issue":"3","key":"key2020120706413182900_ref099","first-page":"137","article-title":"The role of push-pull technology in privacy calculus: the case of location-based services","volume":"26","year":"2009\/2010","journal-title":"Journal of Management Information Systems"},{"issue":"5","key":"key2020120706413182900_ref100","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1002\/asi.20530","article-title":"Predicting user concerns about online privacy","volume":"58","year":"2007","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2020120706413182900_ref101","volume-title":"Case Study Research: Design and Methods","year":"1994","edition":"2nd ed."},{"issue":"3","key":"key2020120706413182900_ref102","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1111\/j.1748-8583.1997.tb00422.x","article-title":"Ethical dilemmas and ethical reasoning: a study in Hong Kong","volume":"7","year":"1997","journal-title":"Human Resource Management Journal"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-08-2014-0181\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-08-2014-0181\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:55:17Z","timestamp":1753394117000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/30\/2\/473-502\/176402"}},"subtitle":["A Chinese<i>guanxi<\/i>perspective"],"short-title":[],"issued":{"date-parts":[[2017,6,5]]},"references-count":101,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6,5]]}},"alternative-id":["10.1108\/ITP-08-2014-0181"],"URL":"https:\/\/doi.org\/10.1108\/itp-08-2014-0181","relation":{},"ISSN":["0959-3845"],"issn-type":[{"value":"0959-3845","type":"print"}],"subject":[],"published":{"date-parts":[[2017,6,5]]}}}