{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T18:03:35Z","timestamp":1770314615083,"version":"3.49.0"},"reference-count":34,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T00:00:00Z","timestamp":1415059200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11,4]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 This aim of this paper was to highlight the awareness of ethical issues across the group of information systems (IS) professionals from a range of geographical regions. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 An initial survey was conducted that informed in-depth interviews with 26 IS professionals from across the globe. The study identified that around 70 per cent of the sample were over 50 years old. This provided an opportunity to consider age-related differences in perception regarding ethical awareness of both current and emerging technologies. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The project revealed that the more mature IS professionals had a significantly higher level of awareness and perceived understanding regarding the importance of ethical issues than the younger IS professionals. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title>\n               <jats:p> \u2013 The research was limited to IS professionals and so the findings do not generalise further. Future research would be beneficial to find out if the higher level of ethical awareness is also evident across older people in general or whether it is specific to technology professionals. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 IS professionals need to be exposed to high standards and expectations of ethical behaviour from senior colleagues, as well as embedding this within technical education. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Social implications<\/jats:title>\n               <jats:p> \u2013 Caution with regards to youth culture and youthitisation of the workforce needs to be exerted to avoid rash decision-making and short-termism, which could undermine progress and development. A change in the view of employers to older workers will also require a change in attitudes across Western society, particularly as demographics continue to skew towards an aging population. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 This paper provides new insight into the ethical awareness of older employees and goes some way to dispel the myths surrounding stereotypes of older workers as being fearful of technology and resistant to change.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/jices-02-2014-0013","type":"journal-article","created":{"date-parts":[[2014,11,10]],"date-time":"2014-11-10T12:55:03Z","timestamp":1415624103000},"page":"270-283","source":"Crossref","is-referenced-by-count":3,"title":["Perceptions of ethics in IS: how age can affect awareness"],"prefix":"10.1108","volume":"12","author":[{"given":"Sara","family":"Helen Wilford","sequence":"first","affiliation":[]},{"given":"Kutoma","family":"Jacqueline Wakunuma","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2020122721032507600_b1","doi-asserted-by":"crossref","unstructured":"Abbey, R.\n                and \n                  Hyde, S.\n                (2009), \u201cNo country for older people? Age and the digital divide\u201d, Journal of Information, Communication & Ethics in Society, Vol. 7 No. 4, pp. 225-242.","DOI":"10.1108\/14779960911004480"},{"key":"key2020122721032507600_b2","doi-asserted-by":"crossref","unstructured":"Banerjee, S.B.\n                (2008), \u201cCorporate social responsibility: the good, the bad and the ugly\u201d, Critical Sociology, Vol. 34 No. 1, pp. 51-79.","DOI":"10.1177\/0896920507084623"},{"key":"key2020122721032507600_b3","doi-asserted-by":"crossref","unstructured":"Camp, L.J.\n                and \n                  Osorio, C.L.\n                (2003), Privacy Enhancing Technologies for Internet Commerce, Trust in The Network Economy, Springer-Verlag, Berlin, Spring.","DOI":"10.1007\/978-3-7091-6088-6_19"},{"key":"key2020122721032507600_b4","unstructured":"Chou, R.J.A.\n                (2012), \u201cDiscrimination against older workers: current knowledge, future research directions and implications for social work\u201d, Indian Journal of Gerontology, Vol. 26 No. 1, pp. 25-49."},{"key":"key2020122721032507600_b5","doi-asserted-by":"crossref","unstructured":"Convertino, G.\n               , \n                  Farooq, U.\n               , \n                  Rosson, M.B.\n                and \n                  Carroll, J.M.\n                (2005), \u201cOld is gold: integrating older workers in CSCW\u201d Proceedings of the 38th Hawaii International Conference on System Sciences, IEEE, The Pennsylvania State University, University Park, PA, pp. 1-10.","DOI":"10.1109\/HICSS.2005.461"},{"key":"key2020122721032507600_b6","doi-asserted-by":"crossref","unstructured":"Cullen, R.\n                (2009), \u201cCulture, identity and information privacy in the age of digital government\u201d, Online Information Review, Vol. 33 No. 3, pp. 405-421.","DOI":"10.1108\/14684520910969871"},{"key":"key2020122721032507600_b7","doi-asserted-by":"crossref","unstructured":"Culley, M.\n                and \n                  Vandenheuvel, A.\n                (2000), \u201cParticipation in, and barriers to, training: the experience of older adults\u201d, Australasian Journal on Ageing, Vol. 19 No. 4, pp. 172-179.","DOI":"10.1111\/j.1741-6612.2000.tb00231.x"},{"key":"key2020122721032507600_b8","unstructured":"Dana, T.V.\n                (2004), \u201cThe changing face of a constant issue: emerging privacy issues\u201d, Journal of Applied Management and Entrepreneurship, Vol. 9 No. 1, pp. 119-124."},{"key":"key2020122721032507600_b9","unstructured":"Fairweather, N.B.\n                (2001), \u201cPrivacy in the age of bigger brother\u201d, ETHICOMP, Vol. 2001 No. 2, pp. 309-317."},{"key":"key2020122721032507600_b10","doi-asserted-by":"crossref","unstructured":"Fenstermacher, K.S.\n                and \n                  Kleiner, B.H.\n                (1999), \u201cThe relationship between age and seniority in American industry\u201d, Management Research News, Vol. 22 No. 6, pp. 13-17.","DOI":"10.1108\/01409179910781698"},{"key":"key2020122721032507600_b11","unstructured":"Fromm, E.\n                (1942), The Fear of Freedom, Routledge, London."},{"key":"key2020122721032507600_b12","unstructured":"Gandy, O.\n                (1993), The Panoptic Sort: a Political Economy of Personal Information: Critical Studies in Communication and in the Cultural Industries, Westview Press 5500 Central Avenue, Boulder, CO."},{"key":"key2020122721032507600_b13","doi-asserted-by":"crossref","unstructured":"Garigue, R.\n                (2007), \u201cUnderstanding the new information risks: the requirement for a new information security conceptual framework\u201d, EDPACS, Vol. 35 No. 3.","DOI":"10.1080\/07366980701292878"},{"key":"key2020122721032507600_b36","unstructured":"IdeGov Final report\n                (2012), available at: https:\/\/pure.fundp.ac.be\/ws\/files\/2133284\/Revised_IDEGOV_report_combining_DMU_and_NAMUR_deliverables.pdf"},{"key":"key2020122721032507600_b15","doi-asserted-by":"crossref","unstructured":"Katzan, H.\n                (2010), \u201cOn the privacy of cloud computing\u201d, International Journal of Management and Information Systems, Second Quarter, Vol. 14 No. 2.","DOI":"10.19030\/ijmis.v14i2.824"},{"key":"key2020122721032507600_b16","doi-asserted-by":"crossref","unstructured":"Kauffman, R.J.\n               , \n                  Lee, Y.J.\n               , \n                  Prosch, M.\n                and \n                  Steinbart, P.J.\n                (2011), \u201cA survey of consumer information privacy from the accounting information systems perspective\u201d, Journal of Information Systems, Vol. 25 No. 2, pp. 47-79.","DOI":"10.2308\/isys-10091"},{"key":"key2020122721032507600_b17","unstructured":"Korzaan, M.L.\n                and \n                  Boswell, K.T.\n                (2008), \u201cThe influence of personality traits and information privacy concerns on behavioural intentions\u201d, The Journal of Computer Information Systems, Vol. 48 No. 4, pp. 15-24."},{"key":"key2020122721032507600_b18","doi-asserted-by":"crossref","unstructured":"Leidner, D.\n                and \n                  Kayworth, T.\n                (2006), \u201cA review of culture in information systems research: toward a theory of information technology culture conflict\u201d, MIS Quarterly, Vol. 30 No. 2, pp. 357-399.","DOI":"10.2307\/25148735"},{"key":"key2020122721032507600_b19","doi-asserted-by":"crossref","unstructured":"Lin, W.\n               , \n                  Pei-Luen, P.R.\n                and \n                  Salvendy, G.\n                (2011), \u201cOlder adult\u2019s acceptance of information technology\u201d, Educational Geontology, Vol. 37 No. 12, pp. 1081-1099.","DOI":"10.1080\/03601277.2010.500588"},{"key":"key2020122721032507600_b20","unstructured":"Lyon, D.\n                (2001), Surveillance Society \u2013 Monitoring Everyday Life, Open University Press, Buckinghamshire."},{"key":"key2020122721032507600_b21","doi-asserted-by":"crossref","unstructured":"McArthur, R.L.\n                (2001), \u201cReasonable expectations of privacy\u201d, Ethics and Information Technology, Vol. 3 No. 2, pp. 23-128.","DOI":"10.1023\/A:1011898010298"},{"key":"key2020122721032507600_b22","unstructured":"McNair, S.\n               , \n                  Flynn, M.\n                and \n                  Dutton, Y.\n                (2007), \u201cEmployer responses to an ageing workforce: a qualitative study\u201d, Department for Work and Pensions, Research Report No 455 Leeds: Corporate Document Services, available at: http:\/\/research.dwp.gov.uk\/asd\/asd5\/rports2007-2008\/rrep455.pdf (accessed 3 March 2013)."},{"key":"key2020122721032507600_b23","unstructured":"Moor, J.\n                (2006), \u201cWhy we need better ethics for emerging technologies\u201d, Ethics and Information Technology, Vol. 2005 No. 7, pp. 111-119."},{"key":"key2020122721032507600_b24","doi-asserted-by":"crossref","unstructured":"Olson, K.E.\n               , \n                  O\u2019Brien, M.A.\n               , \n                  Rogers, W.A.\n                and \n                  Charness, N.\n                (2010), \u201cDiffusion of technology: frequency of use for younger and older adults\u201d, Ageing International, Vol. 36 No. 1, pp. 123-145.","DOI":"10.1007\/s12126-010-9077-9"},{"key":"key2020122721032507600_b25","doi-asserted-by":"crossref","unstructured":"Raamgovind, S.\n               , \n                  Eloff, M.M.\n                and \n                  Smith, E.\n                (2010), \u201cThe management of security in cloud computing\u201d, Information Security for South Africa (ISSA), IEEE, Sandton, Johannesburg, pp. 2-4.","DOI":"10.1109\/ISSA.2010.5588290"},{"key":"key2020122721032507600_b27","doi-asserted-by":"crossref","unstructured":"Stahl, B.C.\n                (2011), \u201cWhat future, which technology? On the problem of describing relevant futures\u201d, in \n                  Chiasson, \n               , \n                  M.\n               , \n                  Henfridsson, \n               , \n                  O.\n               , \n                  Karsten, \n               , \n                  H.\n               , \n                  DeGross, \n                and \n                  J.\n                (Eds), Proceedings Researching the Future in Information Systems: IFIP WG 8.2 Working Conference, Future IS 2011, Springer, Turku, June 6-8, pp. 95-108.","DOI":"10.1007\/978-3-642-21364-9_7"},{"key":"key2020122721032507600_b28","doi-asserted-by":"crossref","unstructured":"Stamov-Ro\u00dfnagel, C.\n                and \n                  Hertel, G.\n                (2010), \u201cOlder workers\u2019 motivation: against the myth of general decline\u201d, Management Decision, Vol. 48 No. 6, pp. 894-906.","DOI":"10.1108\/00251741011053451"},{"key":"key2020122721032507600_b29","doi-asserted-by":"crossref","unstructured":"Stanton, J.M.\n               , \n                  Stam, K.R.\n               , \n                  Mastrangelo, P.\n                and \n                  Jolton, J.\n                (2005), \u201cAnalysis of end user security behaviors\u201d, Computer Security, Vol. 24 No. 2, pp. 124-133.","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"key2020122721032507600_b30","doi-asserted-by":"crossref","unstructured":"Staufer, M.\n                (1992), \u201cTechnological change and the older employee: implications for introduction and training\u201d, Behaviour & Information Technology, Vol. 11 No. 1, pp. 46-52.","DOI":"10.1080\/01449299208924318"},{"key":"key2020122721032507600_b31","doi-asserted-by":"crossref","unstructured":"Stoodley, I.\n               , \n                  Bruce, C.\n                and \n                  Edwards, S.\n                (2010), \u201cExpanding ethical vistas of IT professionals\u201d, Information Systems Frontiers, Vol. 12 No. 4, pp. 379-387.","DOI":"10.1007\/s10796-009-9207-7"},{"key":"key2020122721032507600_b32","doi-asserted-by":"crossref","unstructured":"Taylor, P.E.\n                and \n                  Walker, A.\n                (1994), \u201cThe ageing workforce: employers\u2019 attitudes towards older people\u201d, Work, Employment & Society, Vol. 8 No. 4, pp. 569-591.","DOI":"10.1177\/095001709484005"},{"key":"key2020122721032507600_b33","doi-asserted-by":"crossref","unstructured":"Xu, H.\n               , \n                  Dinev, T.\n               , \n                  Smith, J.\n                and \n                  Hart, P.\n                (2011), \u201cInformation privacy concerns: linking individual perceptions with institutional privacy assurances\u201d, Journal of the Association for Information Systems, Vol. 12 No. 12, pp. 798-824.","DOI":"10.17705\/1jais.00281"},{"key":"key2020122721032507600_frd1","doi-asserted-by":"crossref","unstructured":"Kashyap, R.\n               , \n                  Mir, R.\n                and \n                  Mir, A.\n                (2011), \u201cCorporate social responsibility: a call for multidisciplinary inquiry\u201d, Journal of Business & Economics Research, Vol. 2 No. 7, p. -.","DOI":"10.19030\/jber.v2i7.2902"},{"key":"key2020122721032507600_frd2","doi-asserted-by":"crossref","unstructured":"Sousa, R.\n                and \n                  Voss, C.A.\n                (2009), \u201cThe effects of service failures and recovery on customer loyalty in e-services: an empirical investigation\u201d, International Journal of Operations & Production Management, Vol. 29 No. 8, pp. 834-864.","DOI":"10.1108\/01443570910977715"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JICES-02-2014-0013","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-02-2014-0013\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-02-2014-0013\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:38:08Z","timestamp":1753393088000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/12\/4\/270-283\/221486"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,4]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,11,4]]}},"alternative-id":["10.1108\/JICES-02-2014-0013"],"URL":"https:\/\/doi.org\/10.1108\/jices-02-2014-0013","relation":{},"ISSN":["1477-996X"],"issn-type":[{"value":"1477-996X","type":"print"}],"subject":[],"published":{"date-parts":[[2014,11,4]]}}}