{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T00:23:08Z","timestamp":1773102188094,"version":"3.50.1"},"reference-count":126,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2014,3,4]],"date-time":"2014-03-04T00:00:00Z","timestamp":1393891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3,4]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>\u2013 The purpose of this paper is to present a novel mnemonic, ACTIVE, inspired by Mason's 1985 PAPA mnemonic, which will help researchers and IT professionals develop an understanding of the major issues in information ethics.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>\u2013 Theoretical foundations are developed for each element of the mnemonic by reference to philosophical definitions of the terms used and to virtue ethics, particularly MacIntyrean virtue ethics. The paper starts with a critique of the elements of the PAPA mnemonic and then proceeds to develop an understanding of each of the elements of ACTIVE ethics, via a discussion of the underpinning virtue ethics.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>\u2013 This paper identifies six issues, described by the mnemonic, ACTIVE. ACTIVE stands for: autonomy, the ability of the individual to manage their own information and make choice; community, the ethical effect of an information systems on the community which it supports; transparency, the extent to which the derivation of content and process in an information system is made clear; identity, the social and ethical effect of an information system on the definition and maintenance of the distinctive characteristics of a person; value, the value or moral worth placed on information associated with an individual and hence on the relationship with the individual; and empathy, the ability of the information systems professional to emotionally connect with the user and the extent to which the information system distances or connects.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>\u2013 The paper applies virtue ethics to developing a tool to help information professionals reflect on their ethical practice in developing and supporting information systems.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jices-06-2013-0017","type":"journal-article","created":{"date-parts":[[2014,2,26]],"date-time":"2014-02-26T10:15:28Z","timestamp":1393409728000},"page":"21-44","source":"Crossref","is-referenced-by-count":18,"title":["ACTIVE ethics: an information systems ethics for the internet age"],"prefix":"10.1108","volume":"12","author":[{"given":"Neil","family":"Kenneth McBride","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2021010223352108200_b1","doi-asserted-by":"crossref","unstructured":"Abd-Hadi, Z. and McBride, N. (2000), \u201cThe commercialisation of public sector information within UK government departments\u201d, International Journal of Public Sector Management, Vol. 13, pp. 552-570.","DOI":"10.1108\/09513550010362631"},{"key":"key2021010223352108200_b2","unstructured":"Adam, A.E. (2004), \u201cWhatever happened to information systems ethics? Caught between the devil and the deep blue sea\u201d, Information Systems Research: Relevant Theory and Informed Practice, IFIP International Federation for Information Processing, Vol. 143, Springer, Boston, MA, pp. 159-174."},{"key":"key2021010223352108200_b3","unstructured":"Adam, A.E. and Bull, C. (2008), \u201cExploring Macintyre's virtue ethics in relation to information systems\u201d, paper presented at European Conference on Information Systems, available at: http:\/\/is2.lse.ac.uk\/asp\/aspecis\/20080054.pdf."},{"key":"key2021010223352108200_b4","doi-asserted-by":"crossref","unstructured":"Anscombe, G.E.M. (1958), \u201cModern moral philosophy\u201d, Philosophy, Vol. 33, pp. 1-20.","DOI":"10.1017\/S0031819100037943"},{"key":"key2021010223352108200_b5","doi-asserted-by":"crossref","unstructured":"Armstrong, A.E. (2006), \u201cTowards a strong virtue ethics for nursing practice\u201d, Nursing Philosophy, Vol. 7, pp. 110-124.","DOI":"10.1111\/j.1466-769X.2006.00268.x"},{"key":"key2021010223352108200_b6","doi-asserted-by":"crossref","unstructured":"Audi, R. (2012), \u201cVirtue ethics as a resource in business\u201d, Business Ethics Quarterly, Vol. 22, pp. 273-291.","DOI":"10.5840\/beq201222220"},{"key":"key2021010223352108200_b7","unstructured":"Audit Commission (2010), The Truth is Out There: Transparency in an Information Age, available at: www.audit-commission.gov.uk\/SiteCollectionDocuments\/AuditCommissionReports\/NationalStudies\/20100305thetruthisoutthere.pdf (accessed 5 November 2012)."},{"key":"key2021010223352108200_b8","unstructured":"Bala, S. (2012), \u201cMaintaining accuracy when crowdsourcing data\u201d, KnowledgeBridge, available at: www.kbridge.org\/maintaining-accuracy-when-crowdsourcing-data\/ (accessed 20 September 2012)."},{"key":"key2021010223352108200_b9","doi-asserted-by":"crossref","unstructured":"Banajee, D. , Cronan, T.P. and Jihu, T.V. (1998), \u201cModelling IT ethics: a study in situational ethics\u201d, MIS Quarterly, Vol. 22 No. 1, pp. 31-60.","DOI":"10.2307\/249677"},{"key":"key2021010223352108200_b11","unstructured":"Baron-Cohen, S. (2011), Zero Degrees of Empathy: A New Theory of Human Cruelty, Allen Lane, London."},{"key":"key2021010223352108200_b10","doi-asserted-by":"crossref","unstructured":"Basole, R.C. and Karla, J. (2011), \u201cOn the evolution of mobile platform ecosystem structure and strategy\u201d, Business and Information Systems Engineering, Vol. 3 No. 5, pp. 313-322, available at: http:\/\/aisel.aisnet.org\/bise\/vol3\/iss5\/6.","DOI":"10.1007\/s12599-011-0174-4"},{"key":"key2021010223352108200_b12","doi-asserted-by":"crossref","unstructured":"Belanger, F. and Crossler, R.E. (2011), \u201cPrivacy in the digital age: a review of information privacy research in information systems\u201d, MIS Quarterly, Vol. 35, pp. 1017-1041.","DOI":"10.2307\/41409971"},{"key":"key2021010223352108200_b13","doi-asserted-by":"crossref","unstructured":"Bertschinger, N. , Olbrich, E. , Ay, N. and Jirst, J. (2008), \u201cAutonomy \u2013 an information theoretic perspective\u201d, Biosystems, Vol. 91, pp. 331-334.","DOI":"10.1016\/j.biosystems.2007.05.018"},{"key":"key2021010223352108200_b15","doi-asserted-by":"crossref","unstructured":"Bond, R.M. , Furiss, C.I. , Jones, J.T. , Kramer, A.D.J. , Marla, C. , Settole, J.C. and Fowler, J.H. (2012), \u201cA 61-million-person experiment in social influence and political mobilisation\u201d, Nature, Vol. 489, pp. 295-298.","DOI":"10.1038\/nature11421"},{"key":"key2021010223352108200_b16","unstructured":"Bowlby, C. (2010), \u201cHow unmanned drones are changing modern warfare\u201d, BBC News, available at: http:\/\/news.bbc.co.uk\/1\/hi\/world\/south_asia\/8488269.stm."},{"key":"key2021010223352108200_b18","doi-asserted-by":"crossref","unstructured":"Bradley, D. (2011), \u201cA personal history of the IBM PC\u201d, IEEE Computer, Vol. 44 No. 8, pp. 19-25.","DOI":"10.1109\/MC.2011.232"},{"key":"key2021010223352108200_b14","doi-asserted-by":"crossref","unstructured":"Brooke, C. (2009), Critical Management Perspectives on Information Systems, Butterworth Heinemann, Oxford.","DOI":"10.4324\/9780080941684"},{"key":"key2021010223352108200_b17","doi-asserted-by":"crossref","unstructured":"Bryant, A. , Land, F. and King, J.L. (2009), \u201cEditor's introduction to the special issue on ethical issues in IS research\u201d, Journal of the Association for Information Systems, Vol. 10 No. 11, pp. 782-786.","DOI":"10.17705\/1jais.00215"},{"key":"key2021010223352108200_b19","doi-asserted-by":"crossref","unstructured":"Buchen, L. (2011), \u201cScientists and autism: when geeks meet\u201d, Nature, Vol. 479, pp. 25-27.","DOI":"10.1038\/479025a"},{"key":"key2021010223352108200_b20","unstructured":"Bull, C. (2009), \u201cA review of ethical theory in the \u2018upper echelons\u2019 of information systems research\u201d, paper presented at 17th European Conference on Information Systems, Verona, available at: www.ecis2009.it\/papers\/ecis2009-0070.pdf."},{"key":"key2021010223352108200_b22","doi-asserted-by":"crossref","unstructured":"Bynum, T. (2006), \u201cFlourishing ethics\u201d, Ethics and Information Technology, Vol. 8, pp. 157-173.","DOI":"10.1007\/s10676-006-9107-1"},{"key":"key2021010223352108200_b21","unstructured":"Bynum, T. and Rogerson, S. (2003), Computer Ethics and Professional Responsibility, Blackwell, Oxford."},{"key":"key2021010223352108200_b23","doi-asserted-by":"crossref","unstructured":"Chatterjee, S. , Sorker, S. and Fuller, M. (2009), \u201cEthical information systems development: a Baumanian postmodernist perspective\u201d, Journal of the Association for Information Systems, Vol. 10, pp. 787-815.","DOI":"10.17705\/1jais.00214"},{"key":"key2021010223352108200_b24","unstructured":"Christman, J. (2009), \u201cAutonomy in moral and political philosophy\u201d, in Edward, N.Z. (Ed.), The Stanford Encyclopedia of Philosophy (Spring 2011 Edition) , available at: http:\/\/plato.stanford.edu\/archives\/spr2011\/entries\/autonomy-moral\/."},{"key":"key2021010223352108200_b25","doi-asserted-by":"crossref","unstructured":"Conger, S. , Loch, K.D. and Helft, L. (1994), \u201cInformation technology and ethics: an exploratory factor analysis\u201d, Proceedings of ACM Conference on Ethics in Computer Age, GatIinburg, TN.","DOI":"10.1145\/199544.199556"},{"key":"key2021010223352108200_b26","unstructured":"Cope, W. (2007), \u201cYou like my poems? So pay for them\u201d, The Guardian, 8 September, available at: www.guardian.co.uk\/books\/2007\/dec\/08\/featuresreviews.guardianreview14."},{"key":"key2021010223352108200_b27","doi-asserted-by":"crossref","unstructured":"Davis, F.D. (1989), \u201cPerceived usefulness, perceived ease of use, and user acceptance of information technology\u201d, MIS Quarterly, Vol. 13 No. 3, pp. 319-340.","DOI":"10.2307\/249008"},{"key":"key2021010223352108200_b28","unstructured":"Desrosieres, A. (1998), The Politics of Large Numbers: A History of Statistical Reasoning, Harvard University Press, Cambridge, MA."},{"key":"key2021010223352108200_b29","doi-asserted-by":"crossref","unstructured":"Dinev, T. and Hart, P. (2006), \u201cAn extended privacy calculus model for e-commerce transactions\u201d, Information Systems Research, Vol. 20 No. 2, pp. 169-195.","DOI":"10.1287\/isre.1060.0080"},{"key":"key2021010223352108200_b31","unstructured":"Dobson, J. (2007), \u201cApplying virtue ethics to business: the agent-based approach\u201d, Electronic Journal of Business Ethics and Organisation Studies, Vol. 12 No. 2, available at: http:\/\/ejbo.jyu.fi\/articles\/0901_3.html (accessed 13 September 2012)."},{"key":"key2021010223352108200_b30","doi-asserted-by":"crossref","unstructured":"Dudezert, A. and Leidner, D.E. (2011), \u201cIllusions of control and social domination strategies in knowledge mapping system use\u201d, European Journal of Information Systems, Vol. 20, pp. 574-588.","DOI":"10.1057\/ejis.2011.17"},{"key":"key2021010223352108200_b32","doi-asserted-by":"crossref","unstructured":"Elia, J. (2009), \u201cTransparency rights, technology and trust\u201d, Ethics and Information Technology, Vol. 11, pp. 145-153.","DOI":"10.1007\/s10676-009-9192-z"},{"key":"key2021010223352108200_b33","doi-asserted-by":"crossref","unstructured":"El Sawy, O.A. , Malhotra, A. , Park, Y. and Pavlou, P.A. (2010), \u201cSeeking the configurations of digital ecodynamics: it takes three to tango\u201d, Information Systems Research, Vol. 21, pp. 835-848.","DOI":"10.1287\/isre.1100.0326"},{"key":"key2021010223352108200_b34","doi-asserted-by":"crossref","unstructured":"Eppler, M.J. and Mengis, J. (2004), \u201cThe concept of information overload: a review of literature from organization science, accounting, marketing, MIS, and related disciplines\u201d, The Information Society, Vol. 20 No. 5, pp. 325-344.","DOI":"10.1080\/01972240490507974"},{"key":"key2021010223352108200_b36","unstructured":"Fairweather, B. (2004), \u201cNo, PAPA: why incomplete codes of ethics are worse than none at all\u201d, in Bynum, T.W. and Rogerson, S. (Eds), Computer Ethics and Professional Responsibility, Wiley, Oxford, pp. 142-156."},{"key":"key2021010223352108200_b35","unstructured":"Falconer, D. (2011), \u201cFrom Habermas to Marcuse: an argument for the critical theory of the Frankfurt School as a basis for critical information systems research\u201d, paper presented at 7th International Critical Management Studies Conference, Naples, FL, 14-16 July."},{"key":"key2021010223352108200_b37","unstructured":"Fearon, J.D. (1999), \u201cWhat is identity (as we now use the word)?\u201d, Stanford University Working Paper, available at: www.stanford.edu\/\u223cjfearon\/papers\/iden1v2.pdf (accessed 8 November 2012)."},{"key":"key2021010223352108200_b38","doi-asserted-by":"crossref","unstructured":"Fearon, J.D. and Latini, D.D. (2000), \u201cViolence and the social construction of ethnic identity\u201d, International Organisation, Vol. 54 No. 4, pp. 845-877.","DOI":"10.1162\/002081800551398"},{"key":"key2021010223352108200_b39","doi-asserted-by":"crossref","unstructured":"Floridi, L. (1999), \u201cInformation ethics \u2013 on the philosophical foundations of computer ethics\u201d, Ethics and Information Technology, Vol. 1 No. 1, pp. 27-56.","DOI":"10.1023\/A:1010018611096"},{"key":"key2021010223352108200_b40","doi-asserted-by":"crossref","unstructured":"Floridi, L. (2010), The Cambridge Handbook of Information Ethics, Cambridge University Press, Cambridge.","DOI":"10.1017\/CBO9780511845239"},{"key":"key2021010223352108200_b41","doi-asserted-by":"crossref","unstructured":"Foot, P. (2001), Natural Goodness, Oxford University Press, Oxford.","DOI":"10.1093\/0198235089.001.0001"},{"key":"key2021010223352108200_b44","unstructured":"Foresight Future Identities (2013), Final Project Report, The Government Office for Science, London."},{"key":"key2021010223352108200_b43","doi-asserted-by":"crossref","unstructured":"Freeman, L.A. and Peace, A.G. (2005), \u201cRevisiting Mason: the last 18 years and onward\u201d, in Peace, A.G. and Freeman, L. (Eds), Information Ethics: Privacy and Intellectual Property, Information Science Publishing, Hershey, PA.","DOI":"10.4018\/978-1-59140-491-0.ch001"},{"key":"key2021010223352108200_b42","doi-asserted-by":"crossref","unstructured":"Friedman, B. , Kahn, P.H. and Borning, A. (2008), \u201cValue sensitive design and information systems\u201d, in Kenneth, E.H. and Herman, T.T. (Eds), The Handbook of Information and Computer Ethics, Wiley, New York, NY, pp. 69-101.","DOI":"10.1002\/9780470281819.ch4"},{"key":"key2021010223352108200_b45","unstructured":"Gandon, F.L. and Sadeh, N. (2003), \u201cSemantic web technologies to reconcile privacy and context awareness\u201d, Institute for Software Research, Paper No. 848, available at: http:\/\/repository.cmu.edu\/isr\/848."},{"key":"key2021010223352108200_b46","unstructured":"Giddens, A. (1984), The Constitution of Society, Polity Press, Cambridge."},{"key":"key2021010223352108200_b47","unstructured":"Gilligan, C. (1982), In a Different Voice: Psychological Theory and Woman's Development, Harvard University Press, Cambridge, MA."},{"key":"key2021010223352108200_b48","unstructured":"Goffman, E. (1990), The Presentation of Self in Everyday Life, Penguin, London."},{"key":"key2021010223352108200_b50","unstructured":"Gotterbarn, D. (2011), \u201cTweeting is a beautiful sound, but not in my backyard: employer rights and the ethical issues of a tweet free environment for business\u201d, Proceedings of Ethicomp, pp. 186-193."},{"key":"key2021010223352108200_b49","unstructured":"Gotterbarn, D. and Rogerson, S. (2005), \u201cResponsible risk analysis for software development: creating the software development impact statement\u201d, Communications of the Association for Information Systems, Vol. 15, pp. 730-750."},{"key":"key2021010223352108200_b51","doi-asserted-by":"crossref","unstructured":"Harris, H. , Wijesinghe, G. and Mckenzie, S. (2012), The Heart of the Good Institution: Virtue Ethics as a Framework for Responsible Management, Issues in Business Ethics, Springer, Berlin.","DOI":"10.1007\/978-94-007-5473-7"},{"key":"key2021010223352108200_b52","doi-asserted-by":"crossref","unstructured":"Hartman, E. (2008), \u201cSocratic questions and Aristotelian answers: a virtue-based approach to business ethics\u201d, Journal of Business Ethics, Vol. 78 No. 3, pp. 313-328.","DOI":"10.1007\/s10551-006-9337-5"},{"key":"key2021010223352108200_b55","doi-asserted-by":"crossref","unstructured":"Hendler, J. and Berners-Lee, T. (2010), \u201cFrom the semantic web to social machines: a research challenge for AI on the world wide web\u201d, Artificial Intelligence, Vol. 174 No. 2, pp. 156-161.","DOI":"10.1016\/j.artint.2009.11.010"},{"key":"key2021010223352108200_b56","doi-asserted-by":"crossref","unstructured":"Himma, K.E. and Tivani, H.T. (2008), The Handbook of Information and Computer Ethics, Wiley, Chichester.","DOI":"10.1002\/9780470281819"},{"key":"key2021010223352108200_b60","doi-asserted-by":"crossref","unstructured":"Hirschhiem, R. , Klien, H.K. and Lyytinen, K. (1995), Information Systems Development and Data Modelling Conceptual and Philosophical Foundations, Cambridge University Press, Cambridge.","DOI":"10.1017\/CBO9780511895425"},{"key":"key2021010223352108200_b57","doi-asserted-by":"crossref","unstructured":"Hongladarom, S.H. (2004), \u201cMaking information transparent as a means to close the global digital divide\u201d, Minds and Machines, Vol. 14, pp. 85-99.","DOI":"10.1023\/B:MIND.0000005137.58950.c9"},{"key":"key2021010223352108200_b59","doi-asserted-by":"crossref","unstructured":"Huff, C. , Barnard, L. and Frey, W. (2008), \u201cGood computing: a pedagogically focused model of virtue in the practice of computing (Part 1)\u201d, Journal of Information, Communication and Ethics in Society, Vol. 6 No. 3, pp. 246-278.","DOI":"10.1108\/14779960810916246"},{"key":"key2021010223352108200_b58","unstructured":"Hursthouse, R. (1999), On Virtue Ethics, Oxford University Press, Oxford."},{"key":"key2021010223352108200_b61","doi-asserted-by":"crossref","unstructured":"Keen, S. (2006), \u201cA theory of narrative empathy\u201d, Narrative, Vol. 14 No. 3, pp. 207-229.","DOI":"10.1353\/nar.2006.0015"},{"key":"key2021010223352108200_b63","unstructured":"Korzaan, M. , Brooks, N. and Greer, T. (2009), \u201cDemystifying personality and privacy: an empirical investigation into antecedents of concerns for information privacy\u201d, Journal of Behavioral Studies in Business, Vol. 1 No. 1, pp. 1-17."},{"key":"key2021010223352108200_b62","doi-asserted-by":"crossref","unstructured":"Kuo, A. and Margalit, V. (2012), \u201cMeasuring individual identity: experimental evidence\u201d, Journal of Comparative Politics, Vol. 44 No. 4, pp. 459-479.","DOI":"10.5129\/001041512801283013"},{"key":"key2021010223352108200_b64","doi-asserted-by":"crossref","unstructured":"Lee, C.-S. (2001), \u201cAn analytical framework for evaluating e-commerce business models and strategies\u201d, Internet Research, Vol. 11 No. 4, pp. 349-359.","DOI":"10.1108\/10662240110402803"},{"key":"key2021010223352108200_b65","unstructured":"Lessig, L. (2004), Free Culture: The Nature and Future of Creativity, Penguin, Harmondsworth."},{"key":"key2021010223352108200_b68","doi-asserted-by":"crossref","unstructured":"McBride, N. (2012), \u201cThe ethics of software engineering should be an ethics for the client\u201d, Communications of the ACM, Vol. 55 No. 8, pp. 39-41.","DOI":"10.1145\/2240236.2240250"},{"key":"key2021010223352108200_b69","doi-asserted-by":"crossref","unstructured":"McBride, N. and Stahl, B. (2009), \u201cEgypt's information society strategy: a critical lexicography\u201d, Journal of International Technology and Information Management, Vol. 18 No. 1, pp. 1-33.","DOI":"10.58729\/1941-6679.1230"},{"key":"key2021010223352108200_b67","unstructured":"Macintyre, A. (1999), Dependent Rational Animals, Duckworth, London."},{"key":"key2021010223352108200_b66","unstructured":"Macintyre, A. (2007), After Virtue, 3rd ed., Duckworth, London."},{"key":"key2021010223352108200_b70","doi-asserted-by":"crossref","unstructured":"Markosian, N. (2010), \u201cIdentifying the problem of personal identity\u201d, in Campbell, J.K. , O'Rourke, M. and Silverstien, H. (Eds), Time and Identity, MIT Press, Cambridge, MA, pp. 129-148.","DOI":"10.7551\/mitpress\/9780262014090.003.0101"},{"key":"key2021010223352108200_b71","doi-asserted-by":"crossref","unstructured":"Mason, R.O. (1986), \u201cFour ethical issues of the information age\u201d, MIS Quarterly, Vol. 10 No. 1, pp. 5-12, available at: www.ida.liu.se\/\u223cTIMM32\/docs\/4etical.pdf.","DOI":"10.2307\/248873"},{"key":"key2021010223352108200_b72","unstructured":"Maxwell, T.A. (2004), \u201cUniversities, information ownership and knowledge communities\u201d, Journal of the Association of History and Computing, Vol. 7 No. 2."},{"key":"key2021010223352108200_b73","doi-asserted-by":"crossref","unstructured":"Milberg, S.J. , Burke, S.J. , Smith, H.J. and Kallinen, E.A. (1995), \u201cValues, personal information privacy and regulatory approaches\u201d, Communications of the ACM, Vol. 38 No. 12, pp. 65-74.","DOI":"10.1145\/219663.219683"},{"key":"key2021010223352108200_b74","doi-asserted-by":"crossref","unstructured":"Mingers, J. and Walsham, G. (2010), \u201cToward ethical information systems: the contribution of discourse ethics\u201d, MIS Quarterly, Vol. 34 No. 4, pp. 833-854.","DOI":"10.2307\/25750707"},{"key":"key2021010223352108200_b75","doi-asserted-by":"crossref","unstructured":"Mitroff, I.S. and Mason, R.O. (1981), \u201cMetaphysics of policy and planning: a reply to Crosin\u201d, Academy of Management Review, Vol. 6 No. 4, pp. 649-651.","DOI":"10.5465\/amr.1981.4285721"},{"key":"key2021010223352108200_b76","doi-asserted-by":"crossref","unstructured":"Mitroff, I.S. and Mason, R.O. (1982), \u201cOn the structure of dialectical reasoning in social and policy science\u201d, Theory and Decision, Vol. 14 No. 4, pp. 331-350.","DOI":"10.1007\/BF00126172"},{"key":"key2021010223352108200_b78","doi-asserted-by":"crossref","unstructured":"Moore, G. (2005a), \u201cCorporate character: modern virtue ethics and the virtuous corporation\u201d, Business Ethics Quarterly, Vol. 15 No. 4, pp. 659-685.","DOI":"10.5840\/beq200515446"},{"key":"key2021010223352108200_b77","doi-asserted-by":"crossref","unstructured":"Moore, G. (2005b), \u201cHumanising business: a modern virtue ethics approach\u201d, Business Ethics Quarterly, Vol. 15, pp. 237-250.","DOI":"10.5840\/beq200515212"},{"key":"key2021010223352108200_b79","doi-asserted-by":"crossref","unstructured":"Moore, G. (2010), \u201cVirtue of governance and governance of virtue\u201d, Business Ethics Quarterly, Vol. 22, pp. 293-318.","DOI":"10.5840\/beq201222221"},{"key":"key2021010223352108200_b80","unstructured":"Moore, G. and Beadle, R. (2005), \u201cIn search of organisational virtue in business: agents, goods, practices institutions and environments\u201d, Organisation Studies, Vol. 27, pp. 329-389."},{"key":"key2021010223352108200_b81","unstructured":"Mumford, E. (1995), Effective Systems Design and Requirement Analysis, The ETHICS Approach, Macmillan, New York, NY."},{"key":"key2021010223352108200_b82","doi-asserted-by":"crossref","unstructured":"Murphy, P.J. , Laczniak, G.R. and Wood, G. (2007), \u201cAn ethical basis for relationship marketing: a virtue ethics perspective\u201d, European Journal of Marketing, Vol. 41, pp. 37-57.","DOI":"10.1108\/03090560710718102"},{"key":"key2021010223352108200_b83","doi-asserted-by":"crossref","unstructured":"Negash, S. (2004), \u201cBusiness intelligence\u201d, Communications of the AIS, Vol. 13, pp. 177-195.","DOI":"10.17705\/1CAIS.01315"},{"key":"key2021010223352108200_b84","unstructured":"Obermeyer, N.J. (2009), \u201cVirtue ethics for geographic information systems professionals\u201d, in Navratil, G. (Ed.), Research Trends in Geographic Information Sciences, Lecture Notes in Geoinformation and Cartography, Springer, Berlin."},{"key":"key2021010223352108200_b85","unstructured":"OECD (2007), \u201cAt a crossroads: \u2018personhood\u2019 and digital identity in the information society\u201d, available at: www.oecd.org\/dataoecd\/31\/6\/40204773.doc (accessed 19 November 2012)."},{"key":"key2021010223352108200_b86","unstructured":"O'Hara, K. (2011), Transparent Government, Not Transparent Citizens: A Report on Privacy and Transparency for the Cabinet Office, available at: www.cabinetoffice.gov.uk\/sites\/default\/files\/resources\/transparency-and-privacy-review-annex-b.pdf (accessed 21 December 2012)."},{"key":"key2021010223352108200_b87","doi-asserted-by":"crossref","unstructured":"Oinas-Kukkonen, H. , Lyytinen, K. and Yoo, Y. (2010), \u201cSocial networks and information systems: ongoing and future research streams\u201d, Journal of the Association for Information Systems, Vol. 11 No. 2, Article 3, available at: http:\/\/aisel.aisnet.org\/jais\/vol11\/iss2\/3.","DOI":"10.17705\/1jais.00222"},{"key":"key2021010223352108200_b88","doi-asserted-by":"crossref","unstructured":"Orlikowski, W. (2010), \u201cThe sociomateriality of organisational life: considering technology in management research\u201d, Cambridge Journal of Economics, Vol. 34 No. 1, pp. 125-141.","DOI":"10.1093\/cje\/bep058"},{"key":"key2021010223352108200_b89","unstructured":"Oxford Dictionary (2012), \u201cDefinition of value\u201d, available at: http:\/\/oxforddictionaries.com\/definition\/english\/value (accessed 19 November 2012)."},{"key":"key2021010223352108200_b90","unstructured":"Parameswaran, M. and Whinston, A.B. (2007), \u201cSocial computing: an overview\u201d, Communications of the Association for Information Systems, Vol. 19, Article 37, available at: http:\/\/aisel.aisnet.org\/cais\/vol19\/iss1\/37."},{"key":"key2021010223352108200_b91","doi-asserted-by":"crossref","unstructured":"Parasuraman, A. (2002), \u201cService quality and productivity: a synergistic perspective\u201d, Managing Service Quality, Vol. 12 No. 1, pp. 6-9.","DOI":"10.1108\/096045202104"},{"key":"key2021010223352108200_b92","doi-asserted-by":"crossref","unstructured":"Parrish, J.L. (2010), \u201cPAPA knows best: principles for the ethical sharing of information on social networking sites\u201d, Ethics of Information Technology, Vol. 12 No. 2, pp. 187-193.","DOI":"10.1007\/s10676-010-9219-5"},{"key":"key2021010223352108200_b93","doi-asserted-by":"crossref","unstructured":"Pavlou, P.A. (2011), \u201cState of the information privacy literature: where are we now and where should we go?\u201d, MIS Quarterly, Vol. 35, pp. 977-988.","DOI":"10.2307\/41409969"},{"key":"key2021010223352108200_b94","doi-asserted-by":"crossref","unstructured":"Perry, J. (2010), \u201cSelves and self-concepts\u201d, in Campbell, J.K. , O'Rourke, M. and Silverstien, H.S. (Eds), Time and Identity, MIT Press, Cambridge, MA, pp. 229-247.","DOI":"10.7551\/mitpress\/9780262014090.003.0162"},{"key":"key2021010223352108200_b95","unstructured":"Peslak, A.R. (2006), \u201cPAPA revisited: a current empirical study of the Mason framework\u201d, Journal of Computer Information Systems, Vol. 45 No. 3, pp. 117-124."},{"key":"key2021010223352108200_b96","doi-asserted-by":"crossref","unstructured":"Peter, F. (2003), \u201cGender and the foundations of social choice: the role of situated agency\u201d, Feminist Economics, Vol. 9 Nos 2\/3, pp. 13-32.","DOI":"10.1080\/1354570022000078006"},{"key":"key2021010223352108200_b97","doi-asserted-by":"crossref","unstructured":"Richardson, H.J. and Howcroft, D. (2006), \u201cThe contradictions of CRM \u2013 a critical lens on call centres\u201d, Information and Organisation, Vol. 16, pp. 143-168.","DOI":"10.1016\/j.infoandorg.2005.10.002"},{"key":"key2021010223352108200_b98","doi-asserted-by":"crossref","unstructured":"Sandel, M. (2009), Justice, What's the Right Thing to Do?, Penguin, Harmondsworth.","DOI":"10.1037\/e597132010-001"},{"key":"key2021010223352108200_b99","unstructured":"Satchell, C. , Shanks, G. , Howard, S. and Murphy, J. (2006), \u201cKnowing me, knowing you: end user perceptions of identity management systems\u201d, ECIS 2006 Proceedings, Paper No. 115, available at: http:\/\/aisel.aisnet.org\/ecise2006\/115 (accessed 20 November 2012)."},{"key":"key2021010223352108200_b100","unstructured":"Schoechle, T. (2003), \u201cDigital enclosure: the privatisation of standards and standardisation\u201d, paper presented at 3rd IEEE Conference on Standardization and Innovation in Information Technology Technical University of Delft, The Netherlands, 24 October."},{"key":"key2021010223352108200_b101","doi-asserted-by":"crossref","unstructured":"Schultze, N.O. , Collins, A.B. and McCcullough, M. (1994), \u201cThe ethics of business intelligence\u201d, Journal of Business Ethics, Vol. 13, pp. 305-314.","DOI":"10.1007\/BF00871677"},{"key":"key2021010223352108200_b102","doi-asserted-by":"crossref","unstructured":"Schultze, U. (2010), \u201cEmbodiment and presence in virtual world: a review\u201d, Journal of Information Technology, Vol. 25, pp. 434-449.","DOI":"10.1057\/jit.2009.25"},{"key":"key2021010223352108200_b103","doi-asserted-by":"crossref","unstructured":"Skovira, R.J. (2005), \u201cThe social contract revised\u201d, in Khosrow-Pour, M. (Ed.), Encyclopedia of Information Science and Technology, Information Science Reference, Hershey, PA, pp. 2831-2835.","DOI":"10.4018\/978-1-59140-553-5.ch503"},{"key":"key2021010223352108200_b104","doi-asserted-by":"crossref","unstructured":"Slote, M. (2007), The Ethics of Care and Empathy, Routledge, London.","DOI":"10.4324\/9780203945735"},{"key":"key2021010223352108200_b105","doi-asserted-by":"crossref","unstructured":"Smith, A. , O'Hara, K. and Lewis, P. (2011a), \u201cVisualizing the past: annotating a life with linked open data\u201d, Proceedings of the 3rd International Conference on Web Science, Koblenz, Germany, 14-17 June.","DOI":"10.1145\/2527031.2527038"},{"key":"key2021010223352108200_b107","doi-asserted-by":"crossref","unstructured":"Smith, H.J. , Dinev, T. and Xu, H. (2011b), \u201cInformation privacy research: an interdisciplinary review\u201d, MIS Quarterly, Vol. 35 No. 4, pp. 989-1015.","DOI":"10.2307\/41409970"},{"key":"key2021010223352108200_b106","doi-asserted-by":"crossref","unstructured":"Smith, H.J. , Milberg, S.J. and Burke, S. (1996), \u201cInformation privacy: measuring individual concern about organisational practices\u201d, MIS Quarterly, Vol. 20 No. 2, pp. 169-195.","DOI":"10.2307\/249477"},{"key":"key2021010223352108200_b108","unstructured":"Snijders, C. , Matzat, U. and Reips, U.-D. (2012), \u201cBig data: big gaps in knowledge in the field of internet science\u201d, International Journal of Internet Science, Vol. 7, pp. 1-5."},{"key":"key2021010223352108200_b109","doi-asserted-by":"crossref","unstructured":"Stahl, B. (2012), \u201cMorality, ethics and reflection: a categorisation of normative IS research\u201d, Journal of Association of Information Systems, Vol. 13 No. 8, pp. 636-656.","DOI":"10.17705\/1jais.00304"},{"key":"key2021010223352108200_b110","doi-asserted-by":"crossref","unstructured":"Ting, L. and Unger, T. (2012), \u201cWilling to pay for quality personalisation? Trade-off between quality and privacy\u201d, European Journal of Information Systems, Vol. 21, pp. 621-642.","DOI":"10.1057\/ejis.2012.13"},{"key":"key2021010223352108200_b112","doi-asserted-by":"crossref","unstructured":"Tognazzini, N.A. (2010), \u201cPersistence and responsibility\u201d, in Campbell, J.K. , O'Rourke, M. and Silverstien, H.S. (Eds), Time and Identity, MIT Press, Cambridge, MA, pp. 149-163.","DOI":"10.7551\/mitpress\/9780262014090.003.0126"},{"key":"key2021010223352108200_b150","doi-asserted-by":"crossref","unstructured":"Turilli, M. and Floridi, L. (2009), \u201cThe ethics of information transparency\u201d, Ethics and Information Technology, Vol. 11, pp. 105-122.","DOI":"10.1007\/s10676-009-9187-9"},{"key":"key2021010223352108200_b113","unstructured":"Udo, R.A. (2006), \u201cTowards a code of cyberethics\u201d, Journal of Community Informatics, Vol. 2 No. 2, available at: Ci-journal.net\/index.php\/ciej\/article.view.280."},{"key":"key2021010223352108200_b114","doi-asserted-by":"crossref","unstructured":"Uhilrova, L. (1994), \u201cOn the role of the PC as a relevant object in face-to-face communication\u201d, Journal of Pragmatics, Vol. 22 No. 5, pp. 511-527.","DOI":"10.1016\/0378-2166(94)90081-7"},{"key":"key2021010223352108200_b115","unstructured":"UNESCO (2010), \u201cLiteracy and education data for the school year ending in 2010\u201d, UNESCO Institute for Statistics, available at: www.uis.unesco.org\/literacy\/Pages\/adult-youth-literacy-data-viz.aspx (accessed 27 September 2012)."},{"key":"key2021010223352108200_b116","unstructured":"Uri, G. and Kjaergaard, A. (2009), \u201cIdentity in organisations: a review of information systems research\u201d, Proceedings of the 17th European Conference on Information Systems, available at: www.ecis2009.it\/papers\/ecis2009-0514.pdf (accessed 7 November 2012)."},{"key":"key2021010223352108200_b117","doi-asserted-by":"crossref","unstructured":"Vallor, S. (2010), \u201cSocial networking technology and the virtues\u201d, Ethics and Information Technology, Vol. 12, pp. 157-170.","DOI":"10.1007\/s10676-009-9202-1"},{"key":"key2021010223352108200_b118","doi-asserted-by":"crossref","unstructured":"Venters, W. and Whitley, E. (2012), \u201cA critical review of cloud computing: researching desires and realities\u201d, Journal of Information Technology, Vol. 27, pp. 179-197.","DOI":"10.1057\/jit.2012.17"},{"key":"key2021010223352108200_b119","doi-asserted-by":"crossref","unstructured":"Von Krogh, G. , Haefliger, S.S. and Wallen, M.N. (2012), \u201cCarrots and rainbows: motivation and social practice in open source software development\u201d, MIS Quarterly, Vol. 36, pp. 649-676.","DOI":"10.2307\/41703471"},{"key":"key2021010223352108200_b120","unstructured":"Weber, K. (2004), \u201cSocial aspects of non-proprietary software\u201d, International Journal of Information Ethics, Vol. 3 No. 11, pp. 1-8."},{"key":"key2021010223352108200_b121","unstructured":"Wind-Cowie, M. and Lekhi, R. (2012), \u201cThe data dividend\u201d, Demos, available at: www.demos.co.uk\/files\/The_Data_Dividend_-_web.pdf (accessed 27 September 2012)."},{"key":"key2021010223352108200_b122","unstructured":"Woodward, B. , Martin, N. and Imboden, T. (2010), \u201cExpansion and validation of the PAPA framework\u201d, paper presented at Information Systems Educators Conference, Nashville, TN, USA."},{"key":"key2021010223352108200_b123","doi-asserted-by":"crossref","unstructured":"Yoo, Y. (2010), \u201cComputing in everyday life: a call for research on experiential computing\u201d, MIS Quarterly, Vol. 34 No. 2, pp. 213-231.","DOI":"10.2307\/20721425"},{"key":"key2021010223352108200_b124","unstructured":"Zafeiropoulou, A.-M. , Millard, D. , Webber, C. and O'Hara, K. (2011), \u201cPrivacy implications of location and contextual data on the social web\u201d, paper presented at ACM Web Science Conference 2011, Koblenz, Germany, 14-17 June."},{"key":"key2021010223352108200_b125","unstructured":"Zheng, Y. (2007), \u201cExploring the value of the capability approach for e-development\u201d, Proceedings of the 9th International Conference on Social Implications of Computers in Developing Countries, S\u00e3o Paulo, Brazil, May."},{"key":"key2021010223352108200_b126","doi-asserted-by":"crossref","unstructured":"Zheng, Y. and Stahl, B.C. (2010), \u201cTechnology, capabilities and critical perspectives: what can critical theory contribute to Sen's capability approach?\u201d, Ethics and Information Technology, Ethics and Information Technology, Vol. 13, pp. 69-80.","DOI":"10.1007\/s10676-011-9264-8"},{"key":"key2021010223352108200_frd9","unstructured":"Hirschiem, R.A. and Klein, H.K. (2006), \u201cCrisis in the IS field \u2013 critical reflection on the state of the discipline\u201d, in King, J.L. and Lyytinen, K. (Eds), Information Systems: The State of the Field, Wiley, New York, NY, pp. 71-146."},{"key":"key2021010223352108200_frd11","doi-asserted-by":"crossref","unstructured":"Lamb, R. and Davidson, E. (2005), \u201cInformation and communication technology challenges to scientific professional identity\u201d, The Information Society, Vol. 21, pp. 1-24.","DOI":"10.1080\/01972240590895883"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/JICES-06-2013-0017","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-06-2013-0017\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JICES-06-2013-0017\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:38:29Z","timestamp":1753393109000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/12\/1\/21-44\/210802"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,4]]},"references-count":126,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3,4]]}},"alternative-id":["10.1108\/JICES-06-2013-0017"],"URL":"https:\/\/doi.org\/10.1108\/jices-06-2013-0017","relation":{},"ISSN":["1477-996X"],"issn-type":[{"value":"1477-996X","type":"print"}],"subject":[],"published":{"date-parts":[[2014,3,4]]}}}