{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:34:28Z","timestamp":1766486068029,"version":"3.41.2"},"reference-count":19,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2015,3,9]],"date-time":"2015-03-09T00:00:00Z","timestamp":1425859200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3,9]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>\u2013 The purpose of this paper is to attempt to investigate how Information and Communications Technology (ICT) researchers in UK computing departments address ethics in their research. Whilst research and innovation in ICT has blossomed in the last two decades, the ethical, social and legal challenges they present have also increased. However, the increasing attention the technical development receives has not been replicated in the area of developing effective guidelines that can address the moral issues inherent in ICT research.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>\u2013 This research is qualitative and made use of interviews. The data analysis was done with dialectical hermeneutics. Through a dialectical hermeneutic process, this research unpacks different understandings of relevance attached to ethics reviews of ICT research in UK computing departments.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>\u2013 The findings include that ethics reviews are relevant because; it is a moral duty, it improves trust for researchers, it is part of risk assessment, it is in compliance with the law and it is a sustainable act.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>\u2013 These various understandings illustrate an important dialectic process on the current state of the art in ICT research.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Social implications<\/jats:title><jats:p>\u2013 It asks to what degree the currently dominant model of ethics review based on biomedical ethics is optimal to ICT.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>\u2013 It proposes a framework that can effectively help researchers and administrators to ensure responsible research and innovation in ICT. Finally, it identifies that ICT researchers would benefit from the developing repertoire of responsible research innovation.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jices-03-2014-0015","type":"journal-article","created":{"date-parts":[[2015,2,23]],"date-time":"2015-02-23T08:50:50Z","timestamp":1424681450000},"page":"28-38","source":"Crossref","is-referenced-by-count":2,"title":["Understanding the relevance of ethics reviews of ICT research in UK computing departments using dialectical hermeneutics"],"prefix":"10.1108","volume":"13","author":[{"given":"Damian Okaibedi","family":"Eke","sequence":"first","affiliation":[]},{"given":"Bernd Carsten","family":"Stahl","sequence":"additional","affiliation":[]},{"given":"Christine","family":"Fidler","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122521014503700_b1","doi-asserted-by":"crossref","unstructured":"Annells, M. (1996), \u201cHermeneutic phenomenology: philosophical perspectives and current use in nursing research\u201d, Journal of Advanced Nursing , Vol. 23 No. 4, pp. 705-713.","DOI":"10.1111\/j.1365-2648.1996.tb00041.x"},{"key":"key2020122521014503700_b2","unstructured":"Bissett, A. (2005), \u201cDeveloping an ethics policy for research that uses ICT\u201d, in Looking Back to the Future , Link\u00f6ping, Sweden."},{"key":"key2020122521014503700_b3","doi-asserted-by":"crossref","unstructured":"Boland, R.J. (2002), \u201cInformation system use as a hermeneutic process\u201d, in Myers, M.D. and Avison, D. (Eds), Qualitative Research in Information Systems , Sage Publications Ltd, London.","DOI":"10.4135\/9781849209687.n12"},{"key":"key2020122521014503700_b4","unstructured":"Bunnin, N. and Yu, J. (2008), The Blackwell Dictionary of Western Philosophy , John Wiley & Sons."},{"key":"key2020122521014503700_b5","unstructured":"Clarke, J. (2008), Future Internet: A Matter of Trust , eMobility News, available at: www.networks-etp.eu\/fileadmin\/user_upload\/Publications\/Newsletter\/Newsletter112008_R2web.pdf"},{"key":"key2020122521014503700_b6","unstructured":"Demeterio, F.P.A. (2001), \u201cIntroduction to Hermeneutics\u201d, Diwatao , Vol. 1 No. 1, pp. 1-8."},{"key":"key2020122521014503700_b7","unstructured":"Eke, D. (2012), \u201cInvestigating the current state of the art on ethics reviews of information and communications technology Research in UK Universities\u201d, PhD Dissertation , De Montfort University, Leicester."},{"key":"key2020122521014503700_b8","unstructured":"Erdmann, L. , Hilty, L. , Goodman, J. and Arnfalk, P. (2004), \u201cThe future impact of ICTs on environmental sustainability (Technical Report)\u201d, Institute for Prospective Technological Studies."},{"key":"key2020122521014503700_b9","doi-asserted-by":"crossref","unstructured":"Fuchs, T. (2006), \u201cEthical issues in neuroscience\u201d, Current Opinion in Psychiatry , Vol. 19 No. 6, pp. 600-607.","DOI":"10.1097\/01.yco.0000245752.75879.26"},{"key":"key2020122521014503700_b10","unstructured":"Johnson, C. (2008), What is Research in Computing Science , Glasgow Interactive Systems Group-Department of Computer Science, Glasgow University, Glasgow."},{"key":"key2020122521014503700_b19","unstructured":"Moor, J.H. (1985), \u201cWhat is Computer Ethics? Metaphilosophy , Vol. 16, pp. 266-275."},{"key":"key2020122521014503700_b11","doi-asserted-by":"crossref","unstructured":"Myers, M. (1997), \u201cQualitative research in information systems\u201d, Management Information Systems Quarterly , Vol. 21 No. 6.","DOI":"10.2307\/249422"},{"key":"key2020122521014503700_b12","doi-asserted-by":"crossref","unstructured":"Portmore, D.W. (2009), \u201cRule-consequentialism and irrelevant others\u201d, Utilitas , Vol. 21 No. 3, pp. 368-376.","DOI":"10.1017\/S0953820809990100"},{"key":"key2020122521014503700_b13","unstructured":"Reeder, F. (1985), \u201cHermeneutics\u201d, in Starter, B. (Ed.), Paths to Knowledge: Innovative Research Methods for Nursing , National League for Nursing Press, New York, NY, pp. 193-238."},{"key":"key2020122521014503700_b14","unstructured":"Rogerson, S. and Gotterbarn, D. (1998), \u201cThe ethics of software project management\u201d, in Ethics and Information Technology , New Academic Publishers, Delhi, pp. 137-154."},{"key":"key2020122521014503700_b15","unstructured":"Stiver, D.R. (1996), The Philosophy of Religious Language: Sign, Symbol and Story , Wiley-Blackwell."},{"key":"key2020122521014503700_b16","unstructured":"Toomey, R. (2001), Schooling Issues Digest No 2: Information and Communication Technology for Teaching and Learning , available at: www.dest.gov.au\/sectors\/school_education\/publications_resources\/schooling_issues_digest\/schooling_issues_digest_technology.htm, (accessed 5 October 2010)."},{"key":"key2020122521014503700_b17","doi-asserted-by":"crossref","unstructured":"Vance, A. , Elie-Dit-Cosaque, C. and Straub, D.W. (2008), \u201cExamining trust in information technology artifacts: the effects of system quality and culture\u201d, Journal of Management Information Systems , Vol. 24 No. 4, pp. 73-100.","DOI":"10.2753\/MIS0742-1222240403"},{"key":"key2020122521014503700_b18","doi-asserted-by":"crossref","unstructured":"Weckert, J. and Lucas, R. (2013), Professionalism in the Information and Communication Technology Industry , ANU E Press.","DOI":"10.26530\/OAPEN_459997"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JICES-03-2014-0015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-03-2014-0015\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-03-2014-0015\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:38:14Z","timestamp":1753393094000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/13\/1\/28-38\/215465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,9]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3,9]]}},"alternative-id":["10.1108\/JICES-03-2014-0015"],"URL":"https:\/\/doi.org\/10.1108\/jices-03-2014-0015","relation":{},"ISSN":["1477-996X"],"issn-type":[{"type":"print","value":"1477-996X"}],"subject":[],"published":{"date-parts":[[2015,3,9]]}}}