{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T09:20:09Z","timestamp":1770801609881,"version":"3.50.0"},"reference-count":76,"publisher":"Emerald","issue":"3\/4","license":[{"start":{"date-parts":[[2015,8,10]],"date-time":"2015-08-10T00:00:00Z","timestamp":1439164800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8,10]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>\u2013 The purpose of this paper is twofold: to provide an overview of related studies and to highlight research gaps and questions that need to be addressed. Research conducted in three-dimensional (3D) online environments constitutes a different research context, not least because it involves the recruitment of avatars in the research process. Researchers need to appreciate better the ethical concerns that arise in this novel, fast-evolving context and how these concern different stakeholders.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>\u2013 The paper employs an interdisciplinary desk-research approach. It critically reviews related literature, highlights the involved stakeholders, discusses ethical issues from a marketing research perspective and concludes with a discussion of related studies and research gaps, providing direct future research avenues.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>\u2013 The characteristics of the 3D online environments and the behaviour and experiences of their users set the boundaries and guide the way regarding the ethical research in this context.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>\u2013 The paper does not present primary empirical results, instead it reviews and critiques related literature in 3D online environments and sets the agenda for future research.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>\u2013 The paper provides ethical guidelines and identifies blurred areas in conducting or participating in research in 3D online environments.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>\u2013 Based on earlier studies and examples of ethical concerns when studying 3D online environments, this paper emphasises the parameters that should be taken into consideration in current and future research studies.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jices-01-2014-0003","type":"journal-article","created":{"date-parts":[[2015,7,21]],"date-time":"2015-07-21T06:17:15Z","timestamp":1437459435000},"page":"218-234","source":"Crossref","is-referenced-by-count":2,"title":["3D online environments: ethical challenges for marketing research"],"prefix":"10.1108","volume":"13","author":[{"given":"Ioannis","family":"Krasonikolakis","sequence":"first","affiliation":[]},{"given":"Nancy","family":"Pouloudi","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122123055991300_b1","doi-asserted-by":"crossref","unstructured":"Aggarwal, P. , Vaidyanathan, R. and Castleberry, S. (2012), \u201cManagerial and public attitudes toward ethics in marketing research\u201d, Journal of Business Ethics , Vol. 109 No. 4, pp. 463-481.","DOI":"10.1007\/s10551-011-1140-2"},{"key":"key2020122123055991300_b2","unstructured":"Albrecht, K. and McIntyre, L. (2005), Spychips: How Major Corporations and Government Plan to Track your Every Move with RFID , Nelson Current, Nashville, TN."},{"key":"key2020122123055991300_b3","unstructured":"AMA (American Marketing Association) (2008), \u201cMarketing definitions\u201d, available at: www.marketingpower.com\/AboutAMA\/Pages\/DefinitionofMarketing.aspx (accessed 29 June 2013)."},{"key":"key2020122123055991300_b4","doi-asserted-by":"crossref","unstructured":"Anker, T. , Kappel, K. and Sand\u00f8e, P. (2010), \u201cThe liberating power of commercial marketing\u201d, Journal of Business Ethics , Vol. 93 No. 4, pp. 519-530.","DOI":"10.1007\/s10551-009-0236-4"},{"key":"key2020122123055991300_b5","doi-asserted-by":"crossref","unstructured":"Bakardjieva, M. and Feenberg, A. (2000), \u201cInvolving the virtual subject\u201d, Ethics and Information Technology , Vol. 2 No. 4, pp. 233-240.","DOI":"10.1023\/A:1011454606534"},{"key":"key2020122123055991300_b6","doi-asserted-by":"crossref","unstructured":"Bargh, J.A. , McKenna, K.Y.A. and Fitzsimons, G.M. (2002), \u201cCan you see the real me? Activation and expression of the \u2018true self\u2019 on the Internet\u201d, Journal of Social Issues , Vol. 58 No. 1, pp. 33-48.","DOI":"10.1111\/1540-4560.00247"},{"key":"key2020122123055991300_b7","doi-asserted-by":"crossref","unstructured":"Belisle, J.-F. and Onur, B.H. (2010), \u201cAvatars as information: perception of consumers based on their avatars in virtual worlds\u201d, Psychology & Marketing , Vol. 28 No. 7, pp. 741-765.","DOI":"10.1002\/mar.20354"},{"key":"key2020122123055991300_b8","doi-asserted-by":"crossref","unstructured":"Bernardi, R.A. , Melton, M.R. , Roberts, S.D. and Bean, D.F. (2008), \u201cFostering ethics research: an analysis of the accounting, finance and marketing disciplines\u201d, Journal of Business Ethics , Vol. 82 No. 1, pp. 157-170.","DOI":"10.1007\/s10551-007-9569-z"},{"key":"key2020122123055991300_b9","unstructured":"Boellstorff, T. (2008), Coming of Age in Second Life: An Anthropologist Explores the Virtually Human , Princeton University Press, Princeton, NJ."},{"key":"key2020122123055991300_b10","doi-asserted-by":"crossref","unstructured":"Bogdanovic, D. , Dowd, M. , Wattam, E. and Adam, A. (2012), \u201cContesting methodologies: evaluating focus group and privacy diary methods in a study of on-line privacy\u201d, Journal of Information, Communication and Ethics in Society , Vol. 10 No. 4, pp. 208-221.","DOI":"10.1108\/14779961211285854"},{"key":"key2020122123055991300_b11","doi-asserted-by":"crossref","unstructured":"Boostrom, R. (2008), \u201cThe social construction of virtual reality and the stigmatized identity of the newbie\u201d, Journal of Virtual Worlds Research \u2013 Social Construction of Virtual Reality , Vol. 1 No. 2, pp. 1941-8477.","DOI":"10.4101\/jvwr.v1i2.302"},{"key":"key2020122123055991300_b12","unstructured":"Bromseth, J.C.H. (2002), \u201cPublic places: public activities? Methodological approaches and ethical dilemmas in research on computer-mediated communication contexts\u201d, in Morrison, A. (Ed.), Researching ICTs in Context , University of Oslo, Oslo, pp. 33-61."},{"key":"key2020122123055991300_b13","unstructured":"Buchanan, E.A. and Zimmer, M. (2012), \u201cInternet research ethics\u201d, in Zalta, E.N. (Ed.), The Stanford Encyclopedia of Philosophy , available at: http:\/\/plato.stanford.edu\/archives\/win2012\/entries\/ethics-internet-research\/ (accessed 30 June 2013)."},{"key":"key2020122123055991300_b14","unstructured":"Castronova, E. (2005), \u201cReal products in imaginary world\u201d, Harvard Business Review, May, pp. 20-22."},{"key":"key2020122123055991300_b15","doi-asserted-by":"crossref","unstructured":"Chonko, L.B. and Hunt, S.D. (2000), \u201cEthics and marketing management: a retrospective and prospective commentary\u201d, Journal of Business Research , Vol. 50 No. 3, pp. 235-244.","DOI":"10.1016\/S0148-2963(00)00175-2"},{"key":"key2020122123055991300_b16","doi-asserted-by":"crossref","unstructured":"De Saulles, M. and Horner, D. (2011), \u201cThe portable panopticon: morality and mobile technologies\u201d, Journal of Information, Communication and Ethics in Society , Vol. 9 No. 3, pp. 206-216.","DOI":"10.1108\/14779961111167676"},{"key":"key2020122123055991300_b17","unstructured":"Deepwell, F. (2010), \u201cResearch ethics and practicalities: coventry university research into learning in immersive educational worlds\u201d, available at: http:\/\/cuba.coventry.ac.uk\/leverhulme\/literature-review\/litblog-introduction\/litblog-13-researching-virtual-worlds-ethics-and-practicalities\/ (accessed 5 June 2013)."},{"key":"key2020122123055991300_b18","doi-asserted-by":"crossref","unstructured":"Ducheneaut, N. , Wen, M.-H. , Yee, N. and Wadley, G. (2009), \u201cBody and mind: a study of avatar personalization in three virtual worlds\u201d, Proceedings of 27th International Conference in Human Factors in Computing Systems (CHI), ACM Press, New York, NY, pp. 1151-1160.","DOI":"10.1145\/1518701.1518877"},{"key":"key2020122123055991300_b19","doi-asserted-by":"crossref","unstructured":"Eynon, R. , Schroeder, R. and Fry, J. (2009), \u201cNew techniques in online research: challenges for research ethics\u201d, 21st Century Society , Vol. 4 No. 2, pp. 187-199.","DOI":"10.1080\/17450140903000308"},{"key":"key2020122123055991300_b20","unstructured":"Fairfield, J. (2011), Avatar Experimentation: Human Subjects Research in Virtual Worlds , Washington & Lee Public Legal Studies Research Paper Series."},{"key":"key2020122123055991300_b21","doi-asserted-by":"crossref","unstructured":"Fuchs, C. (2011), \u201cTowards an alternative concept of privacy\u201d, Journal of Information, Communication and Ethics in Society , Vol. 9 No. 4, pp. 220-237.","DOI":"10.1108\/14779961111191039"},{"key":"key2020122123055991300_b22","doi-asserted-by":"crossref","unstructured":"Gee, J.P. (2003), What Video Games Have to Teach us About Learning and Literacy , Palgrave MacMillan, New York, NY.","DOI":"10.1145\/950566.950595"},{"key":"key2020122123055991300_b23","doi-asserted-by":"crossref","unstructured":"Gorriz, C. and Medina, C. (2000), \u201cEngaging girls with computers through software games\u201d, Communications of the ACM , Vol. 43 No. 1, pp. 42-49.","DOI":"10.1145\/323830.323843"},{"key":"key2020122123055991300_b24","unstructured":"Grimes, J.M. , Fleischmann, K.R. and Jaeger, P.T. (2009), \u201cVirtual guinea pigs: ethical implications of human subjects research in virtual worlds\u201d, International Journal of Internet Research Ethics , Vol. 2 No. 1, pp. 38-56."},{"key":"key2020122123055991300_b25","doi-asserted-by":"crossref","unstructured":"Hair, N. and Clark, M. (2007), \u201cThe ethical dilemmas and challenges of ethnographic research in electronic communities\u201d, International Journal of Market Research , Vol. 49 No. 6, pp. 781-800.","DOI":"10.1177\/147078530704900609"},{"key":"key2020122123055991300_b26","unstructured":"Harris, I. , Jennings, R. , Pullinger, D. , Rogerson, S. and Duquenoy, P. (2009), \u201cHelping ICT professionals to assess ethical issues in new and emerging technologies\u201d, paper presented at BCS Ethics Forum, BCS, London."},{"key":"key2020122123055991300_b27","doi-asserted-by":"crossref","unstructured":"Hendaoui, A. , Limayem, M. and Thompson, W.C. (2008), \u201c3D social virtual worlds: research issues and challenges\u201d, IEEE Internet Computing , Vol. 12 No. 1, pp. 88-92.","DOI":"10.1109\/MIC.2008.1"},{"key":"key2020122123055991300_b28","doi-asserted-by":"crossref","unstructured":"Hine, C. (2000), Virtual Ethnography , Sage Publications, London.","DOI":"10.4135\/9780857020277"},{"key":"key2020122123055991300_b29","unstructured":"Hine, C. (2005), Virtual Methods: Issues in Social Research on the Internet , Berg, London."},{"key":"key2020122123055991300_b30","unstructured":"Introna, L.D. (2007), \u201cTowards a post-human intra-actional account of socio-technical agency (and morality)\u201d, Moral Agency and Technical Artefacts , NIAS, Hague."},{"key":"key2020122123055991300_b31","doi-asserted-by":"crossref","unstructured":"Jerry, P. (2013), \u201cMethods and ethics in virtual world research: the second life experience\u201d, Proceedings of the 3rd Global Conference: Experiential Learning in Virtual Worlds, Lisbon, 7-9 March.","DOI":"10.1163\/9781848882348_023"},{"key":"key2020122123055991300_b32","doi-asserted-by":"crossref","unstructured":"Kelley, S.W. , Ferrell, O.C. and Skinner, S.J. (1990), \u201cEthical behavior among marketing researchers: an assessment of selected demographic characteristics\u201d, Journal of Business Ethics , Vol. 9 No. 8, pp. 681-688.","DOI":"10.1007\/BF00383395"},{"key":"key2020122123055991300_b33","doi-asserted-by":"crossref","unstructured":"Krasonikolakis, I. , Vrechopoulos, A. and Pouloudi, A. (2011), \u201cDefining, applying and customizing store atmosphere in virtual reality commerce: back to basics?\u201d, International Journal of E-Services and Mobile Applications , Vol. 3 No. 2, pp. 59-72.","DOI":"10.4018\/jesma.2011040104"},{"key":"key2020122123055991300_b34","unstructured":"Lee, D.J. (2005), \u201cCorporate integrity in Korea: issues and opportunities\u201d, paper presented at the Annual Meeting of the Business Ethics Research Centre (BERC), Tokyo, 18 November."},{"key":"key2020122123055991300_b35","unstructured":"Lund, D.B. (2001), \u201cDeontological and teleological influences on marketing research ethics\u201d, Journal of Applied Research , Vol. 17 No. 2, pp. 65-82."},{"key":"key2020122123055991300_b36","doi-asserted-by":"crossref","unstructured":"Lund, D.B. (2008), \u201cGender differences in ethics judgment of marketing professionals in the US\u201d, Journal of Business Ethics , Vol. 77 No. 4, pp. 501-515.","DOI":"10.1007\/s10551-007-9362-z"},{"key":"key2020122123055991300_b38","doi-asserted-by":"crossref","unstructured":"McArthur, V. (2008), \u201cReal ethics in a virtual world\u201d, Conference on Human Factors in Computing Systems, Florence, 5-10 April.","DOI":"10.1145\/1358628.1358850"},{"key":"key2020122123055991300_b39","unstructured":"McCreary, L. (2008), \u201cWhat was privacy?\u201d, Harvard Business Review, October, pp. 123-131."},{"key":"key2020122123055991300_b40","unstructured":"McKee, H.A. and Porter, J.E. (2009), \u201cPlaying a good game: ethical issues in researching MMOGs and virtual worlds\u201d, International Journal of Internet Research Ethics , Vol. 2 No. 1, pp. 5-37."},{"key":"key2020122123055991300_b37","unstructured":"MailOnline (2008), \u201cRevealed: the \u2018other woman\u2019 in second life divorce \u2026 who\u2019s now engaged to the web cheat she\u2019s never met\u201d, available at: www.dailymail.co.uk\/news\/article-1085412\/Revealed-The-woman-Second-Life-divorce\u2013whos-engaged-web-cheat-shes-met.html (accessed November 2014)."},{"key":"key2020122123055991300_b41","doi-asserted-by":"crossref","unstructured":"Messinger, P.R. , Strouli, E. , Lyons, K. , Bone, M. , Niu, R.H. , Smirnov, K. and Perelgut, S. (2009), \u201cVirtual worlds \u2013 past, present, and future: new directions in social computing\u201d, Decision Support Systems , Vol. 47 No. 3, pp. 204-228.","DOI":"10.1016\/j.dss.2009.02.014"},{"key":"key2020122123055991300_b42","doi-asserted-by":"crossref","unstructured":"Minocha, S. , Tran, M. and Reeves, A. (2010), \u201cConducting empirical research in virtual worlds: experiences from two projects in Second Life\u201d, Journal of Virtual Worlds Research , Vol. 3 No. 1, pp. 3-21.","DOI":"10.4101\/jvwr.v3i1.811"},{"key":"key2020122123055991300_b43","doi-asserted-by":"crossref","unstructured":"Moor, J. (2005), \u201cWhy we need better ethics for emerging technologies\u201d, Ethics and Information Technology , Vol. 7 No. 1, pp. 111-119.","DOI":"10.1007\/s10676-006-0008-0"},{"key":"key2020122123055991300_b44","doi-asserted-by":"crossref","unstructured":"Nairn, A. (2009), \u201cResearch ethics in the virtual world\u201d, International Journal of Market Research , Vol. 51 No. 2, pp. 276-278.","DOI":"10.1177\/147078530905100206"},{"key":"key2020122123055991300_b45","unstructured":"Novak, T. (2010), \u201cElab city: a platform for academic research on virtual worlds\u201d, Journal of Virtual Worlds Research , Vol. 3 No. 1, available at: https:\/\/journals.tdl.org\/jvwr\/article\/view\/832"},{"key":"key2020122123055991300_b46","doi-asserted-by":"crossref","unstructured":"Nowak, K.L. (2004), \u201cThe influence of anthropomorphism and agency on social judgment in virtual environments\u201d, Journal of Computer Mediated Communication , Vol. 9, available at: http:\/\/jcmc.indiana.edu\/vol9\/issue2\/nowak.html","DOI":"10.1111\/j.1083-6101.2004.tb00284.x"},{"key":"key2020122123055991300_b47","doi-asserted-by":"crossref","unstructured":"Nowak, K.L. and Biocca, F. (2003), \u201cThe effect of the agency and anthropomorphism on users\u2019 sense of telepresence, copresence, and social presence in virtual environments\u201d, Teleoperators and Virtual Environments , Vol. 12 No. 5, pp. 481-494.","DOI":"10.1162\/105474603322761289"},{"key":"key2020122123055991300_b48","doi-asserted-by":"crossref","unstructured":"Nyberg, D. (2009), \u201cComputers, customer service operatives and cyborgs: intra-actions in call centres\u201d, Organization Studies , Vol. 30 No. 11, pp. 1181-1199.","DOI":"10.1177\/0170840609337955"},{"key":"key2020122123055991300_b49","unstructured":"Odwazny, L. and Buchanan, E. (2011), \u201cEthical and regulatory issues in internet research\u201d, Advancing Ethical Research Conference, PRIM & R, National Harbor, MD."},{"key":"key2020122123055991300_b50","doi-asserted-by":"crossref","unstructured":"Oleksy, W. , Just, E. and Zapedowska-Kling, K. (2012), \u201cGender issues in information and communication technologies (ICTs)\u201d, Journal of Information, Communication and Ethics in Society , Vol. 10 No. 2, pp. 107-120.","DOI":"10.1108\/14779961211227010"},{"key":"key2020122123055991300_b51","doi-asserted-by":"crossref","unstructured":"Pace, T. , Houssian, A. and McArthur, V. (2009), \u201cAre socially exclusive values embedded in the avatar creation interfaces of MMORPGs?\u201d, Journal of Information, Communication and Ethics in Society , Vol. 7 Nos 2\/3, pp. 192-210.","DOI":"10.1108\/14779960910955909"},{"key":"key2020122123055991300_b52","doi-asserted-by":"crossref","unstructured":"Palese, E. (2013), \u201cFrom neuromorphic sensors to a chip under skin: morality and ethics in the world of the internet of things\u201d, Journal of Information, Communication and Ethics in Society , Vol. 11 No. 2, pp. 72-80.","DOI":"10.1108\/JICES-12-2012-0023"},{"key":"key2020122123055991300_b53","doi-asserted-by":"crossref","unstructured":"Philips, A. (2010), \u201cStart listening, stop asking\u2019-researchers snoopers and spies \u2013 the legal and ethical challenges facing observational research\u201d, International Journal of Market Research , Vol. 52 No. 2, pp. 275-281.","DOI":"10.2501\/S1470785309201223"},{"key":"key2020122123055991300_b54","doi-asserted-by":"crossref","unstructured":"Pouloudi, N. (2012), \u201cIS research stakeholders and cyborgs: an opportunity to revisit the normative IS agenda\u201d, Journal of Information Technology , Vol. 27 No. 4, pp. 321-323.","DOI":"10.1057\/jit.2012.28"},{"key":"key2020122123055991300_b55","unstructured":"Rosenberg, A. (2010), \u201cVirtual world research ethics and the private\/public distinction\u201d, International Journal of Internet Research Ethics , Vol. 3, pp. 23-37."},{"key":"key2020122123055991300_b56","doi-asserted-by":"crossref","unstructured":"Schultze, U. and Mason, R. (2012), \u201cStudying cyborgs: re-examining internet studies as human subjects research\u201d, Journal of Information Technology , Vol. 27 No. 4, pp. 301-312.","DOI":"10.1057\/jit.2012.30"},{"key":"key2020122123055991300_b57","doi-asserted-by":"crossref","unstructured":"Shankar, V. , Smith, A.K. and Rangaswamy, A. (2003), \u201cCustomer satisfaction and loyalty in online and offline environments\u201d, International Journal of Research in Marketing , Vol. 20, pp. 153-175.","DOI":"10.1016\/S0167-8116(03)00016-8"},{"key":"key2020122123055991300_b58","doi-asserted-by":"crossref","unstructured":"Shin, H.D. (2008), \u201cUnderstanding purchasing behaviors in a virtual economy: consumer behavior involving virtual currency in Web 2.0 communities\u201d, Interacting with Computers , Vol. 20 Nos 4\/5, pp. 433-446.","DOI":"10.1016\/j.intcom.2008.04.001"},{"key":"key2020122123055991300_b59","unstructured":"Sicart, M. (2005), \u201cThe ethics of computer game design\u201d, paper presented at DiGRA (Digital Games Research Association) International Conference, Vancouver, available at: http:\/\/miguelsicart.net\/papers\/DIGRA_05_Ethics.pdf (accessed 23 June 2013)."},{"key":"key2020122123055991300_b60","doi-asserted-by":"crossref","unstructured":"Singhapakdi, A. , Kraft, K.L. , Vitell, S.J. and Rallapalli, K.C. (1995), \u201cThe perceived importance of ethics and social responsibility on organizational effectiveness: a survey of marketers\u201d, Journal of the Academy of Marketing Science , Vol. 23, pp. 49-56.","DOI":"10.1007\/BF02894611"},{"key":"key2020122123055991300_b61","unstructured":"Slater, D. (2002), \u201cSocial relationships and identity online and offline\u201d, in Lievrouw, L. and Livingston, S. (Eds), The Handbook of New Media , Sage, London, pp. 533-546."},{"key":"key2020122123055991300_b62","unstructured":"Sloan, P. (2005), \u201cThe virtual Rockefeller\u201d, CNN Money, available at: http:\/\/money.cnn.com\/magazines\/business2\/business2_archive\/2005\/12\/01\/8364581\/index.htm?cnn=yes (accessed 29 June 2013)."},{"key":"key2020122123055991300_b63","doi-asserted-by":"crossref","unstructured":"Spake, D.F. , Megehee, C.M. and Franke, G.R. (2007), \u201cStudents\u2019 views of ethical behavior and the impact of association\u201d, Marketing Education Review , Vol. 17 No. 3, pp. 33-47.","DOI":"10.1080\/10528008.2007.11489012"},{"key":"key2020122123055991300_b64","doi-asserted-by":"crossref","unstructured":"Spence, E.H. (2012), \u201cVirtual rape, real dignity: meta-ethics for virtual worlds\u201d, The Philosophy of Computer Games , Springer, Dordrecht, pp. 125-142.","DOI":"10.1007\/978-94-007-4249-9_9"},{"key":"key2020122123055991300_b65","doi-asserted-by":"crossref","unstructured":"Stewart, K.F. and Williams, M.L. (2005), \u201cResearching online populations: the use of online focus groups for social research\u201d, Qualitative Research , Vol. 5 No. 4, pp. 395-416.","DOI":"10.1177\/1468794105056916"},{"key":"key2020122123055991300_b66","unstructured":"Stross, R. (2008), \u201cWhat has driven women out of computer science?\u201d, available at: www.nytimes.com\/2008\/11\/16\/business\/16digi.html (accessed 10 June 2013)."},{"key":"key2020122123055991300_b67","doi-asserted-by":"crossref","unstructured":"Suler, J. (2004), \u201cThe online disinhibition effect\u201d, CyberPsychology and Behavior , Vol. 7 No. 3, pp. 321-326.","DOI":"10.1089\/1094931041291295"},{"key":"key2020122123055991300_b68","unstructured":"Sveningsson Elm, M. (2009), \u201cHow do various notions of privacy influence decisions in qualitative internet research?\u201d, in Markham, A.N. and Baym, N.K. (Eds), Internet Inquiry: Conversations about Method , Sage Publications, Los Angeles, CA, pp. 69-87."},{"key":"key2020122123055991300_b69","doi-asserted-by":"crossref","unstructured":"Tsukamoto-Wagner, S. (2009), \u201cConsumer ethics in Japan: an economic reconstruction of moral agency of Japanese firms \u2013 qualitative insights from grocery\/retail markets\u201d, Journal of Business Ethics , Vol. 84 No. 1, pp. 29-44.","DOI":"10.1007\/s10551-008-9671-x"},{"key":"key2020122123055991300_b70","doi-asserted-by":"crossref","unstructured":"Vanacker, B. and Heider, D. (2011), \u201cEthical harm in virtual communities\u201d, The International Journal of Research into New Media Technologies , Vol. 18 No. 1, pp. 71-84.","DOI":"10.1177\/1354856511419916"},{"key":"key2020122123055991300_b71","doi-asserted-by":"crossref","unstructured":"Vazire, S. and Gosling, S.D. (2004), \u201cE-personality: impressions based on personal websites\u201d, Journal of Personality and Social Psychology , Vol. 87 No. 1, pp. 123-132.","DOI":"10.1037\/0022-3514.87.1.123"},{"key":"key2020122123055991300_b72","doi-asserted-by":"crossref","unstructured":"Wadley, G. , Gibbs, M. and Ducheneaut, N. (2009), \u201cYou can be too rich: mediated communication in a virtual world\u201d, Proceedings of the 21st Annual Computer-Human Interaction Special Interest Group (CHISIG) of the Human Factors and Ergonomics Society of Australia, ACM Press, New York, NY.","DOI":"10.1145\/1738826.1738835"},{"key":"key2020122123055991300_b73","doi-asserted-by":"crossref","unstructured":"White, M. (2002), \u201cRegulating research: the problem of theorizing community on lambdamoo\u201d, Ethics and Information Technology , Vol. 5 No. 1, pp. 55-70.","DOI":"10.1023\/A:1015235925721"},{"key":"key2020122123055991300_b74","doi-asserted-by":"crossref","unstructured":"Woolgar, S. (2002), \u201cFive rules of virtuality\u201d, in Woolgar, S. (Ed.), Virtual Society? Technology, Cyberbole, Reality , Oxford University Press, New York, NY.","DOI":"10.1093\/oso\/9780199248759.001.0001"},{"key":"key2020122123055991300_b75","doi-asserted-by":"crossref","unstructured":"Yee, N. and Bailenson, J.N. (2007), \u201cThe Proteus effect: the effect of transformed self-representation on behavior\u201d, Human Communication Research , Vol. 33, pp. 271-290.","DOI":"10.1111\/j.1468-2958.2007.00299.x"},{"key":"key2020122123055991300_b76","doi-asserted-by":"crossref","unstructured":"Zhu, Y. (2009), \u201cConfucian ethics exhibited in the discourse of Chinese business and marketing communication\u201d, Journal of Business Ethics , Vol. 88 No. 3, pp. 517-528.","DOI":"10.1007\/s10551-009-0299-2"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-01-2014-0003\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-01-2014-0003\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:38:04Z","timestamp":1753393084000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/13\/3-4\/218-234\/211848"}},"subtitle":[],"editor":[{"given":"Prof.","family":"Bernd Carsten Stahl ,Prof. Charles M Ess","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2015,8,10]]},"references-count":76,"journal-issue":{"issue":"3\/4","published-print":{"date-parts":[[2015,8,10]]}},"alternative-id":["10.1108\/JICES-01-2014-0003"],"URL":"https:\/\/doi.org\/10.1108\/jices-01-2014-0003","relation":{},"ISSN":["1477-996X"],"issn-type":[{"value":"1477-996X","type":"print"}],"subject":[],"published":{"date-parts":[[2015,8,10]]}}}