{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:32:56Z","timestamp":1754155976983,"version":"3.41.2"},"reference-count":37,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2015,9,21]],"date-time":"2015-09-21T00:00:00Z","timestamp":1442793600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9,21]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to explore the differences and similarities between computer ethics, internet ethics and cyberethics as reflected in the contents of the published literature as well as the search trends on Google. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 The paper opted for an informetrics approach, and more specifically content analysis, to investigate the inter-relationships between computer ethics, internet ethics and cyberethics. The data sources for this study included Google Trends, Google Scholar and the Web of Science citation indexes. Different search queries were used, depending on the structure of each data source, to extract the relevant data sets. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 Using different methods and techniques to analyse the data, the paper provides an alternative means of investigating relationships among concepts. The findings indicate that there is still no clear distinction between the concepts in terms of subject and title terms used to describe the published literature on the three concepts, as well as the research areas where the three concepts are applied. Going by the current trend, the paper envisages that cyberethics may, in the future, become a broader term to include computer ethics and internet ethics. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title>\n               <jats:p> \u2013 The data sources that were selected for the study might have not been comprehensive in the coverage of the published literature on the three concepts and therefore there is need for further research, which will expand the scope of the data sources. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 The paper\u2019s findings may apply in the practice of indexing and abstracting as well as thesaurus construction as far as the three terms are concerned. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 The paper offers an alternative technique that can be used to investigate relationships among concepts. The value of the paper could include curriculum development of programmes dealing with ethical issues that arise when developing and using computers and related technologies.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/lht-04-2015-0033","type":"journal-article","created":{"date-parts":[[2015,9,17]],"date-time":"2015-09-17T05:28:28Z","timestamp":1442467708000},"page":"387-408","source":"Crossref","is-referenced-by-count":14,"title":["An informetrics view of the relationship between internet ethics, computer ethics and cyberethics"],"prefix":"10.1108","volume":"33","author":[{"given":"Omwoyo Bosire","family":"Onyancha","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2020122119584554100_b1","doi-asserted-by":"crossref","unstructured":"Akbulut, Y.\n               , \n                  Sendag, S.\n               , \n                  Birinci, G.\n               , \n                  Kilicer, K.\n               , \n                  Sahin, M.C.\n                and \n                  Odabasi, H.F.\n                (2008), \u201cExploring the types and reasons of internet-triggered academic dishonesty among Turkish undergraduate students: development of internet-triggered academic dishonesty scale (ITADS)\u201d, \n                  Computers and Education\n               , Vol. 51 No. 1, pp. 463-473.","DOI":"10.1016\/j.compedu.2007.06.003"},{"key":"key2020122119584554100_b2","unstructured":"Babbie, E.\n                (2010), \n                  The Practice of Social Research\n               , Wadsworth, Belmont, CA."},{"key":"key2020122119584554100_b3","doi-asserted-by":"crossref","unstructured":"Bar-Ilan, J.\n                and \n                  Echerman, A.\n                (2005), \u201cThe anthrax scare and the web: a content analysis of web pages linking to resources on anthrax\u201d, \n                  Scientometrics\n               , Vol. 63 \n               No 3, pp. 443-462.","DOI":"10.1007\/s11192-005-0224-0"},{"key":"key2020122119584554100_b4","unstructured":"Bryman, A.\n                (2012), \n                  Social Science Research\n               , 4th ed., Oxford University Press, Oxford."},{"key":"key2020122119584554100_b5","unstructured":"Bynum, T.\n                (2011), \u201cComputer and information ethics\u201d, in \n                  Zalta, E.N.\n                (Ed.), \n                  The Stanford Encyclopedia of Philosophy\n               , Spring ed., The Metaphysics Research Lab, Stanford, CA, available at: http:\/\/plato.stanford.edu\/archives\/spr2011\/entries\/ethics-computer\/ (accessed 27 August 2013)."},{"key":"key2020122119584554100_b7","unstructured":"Chapman, C.\n                (2010), \u201cThe history of computers in a nutshell\u201d, available at: http:\/\/sixrevisions.com\/resources\/the-history-of-computers-in-a-nutshell\/ (accessed 28 August 2013)."},{"key":"key2020122119584554100_b8","unstructured":"Diodato, V.\n                (1994), \n                  Dictionary of Bibliometrics\n               , Haworth, New York, NY."},{"key":"key2020122119584554100_b9","unstructured":"Egghe, L.\n                and \n                  Rousseau, R.\n                (1990), \n                  Introduction to Informetrics: Quantitative Methods in Library, Documentation and Information Science\n               , Elsevier, Amsterdam."},{"key":"key2020122119584554100_b10","unstructured":"Froehlich, T.\n                (2005), \u201cA brief history of information ethics\u201d, \n                  Computer Society of India Communications\n               , Vol. 28 No. 12, pp. 11-13."},{"key":"key2020122119584554100_b11","doi-asserted-by":"crossref","unstructured":"Fujigaki, Y.\n                (2006), \u201cChanges in the research stream by standardization: a content analysis of the archives of general psychiatry during the establishment of operational diagnostic criteria\u201d, \n                  Scientometrics\n               , Vol. 68 No. 2, pp. 203-212.","DOI":"10.1007\/s11192-006-0162-5"},{"key":"key2020122119584554100_b12","unstructured":"Google Inc.\n                (2014), \u201cAbout Google trends\u201d, available at: https:\/\/support.google.com\/trends\/?hl=en#topic=4365531 (accessed 12 December 2013)."},{"key":"key2020122119584554100_b13","doi-asserted-by":"crossref","unstructured":"Graneheim, U.H.\n                and \n                  Lundman, B.\n                (2004), \u201cQualitative content analysis in nursing research: concepts, procedures and measures to achieve trustworthiness\u201d, \n                  Nurse Education Today\n               , Vol. 24 No. 2, pp. 105-112.","DOI":"10.1016\/j.nedt.2003.10.001"},{"key":"key2020122119584554100_b14","unstructured":"Internet Crime Complaint Center\n                (2012), \u201cInternet Crime Report\u201d, available at: www.ic3.gov\/media\/annualreport\/2012_IC3Report.pdf (accessed 25 August 2013)."},{"key":"key2020122119584554100_b15","unstructured":"International Telecommunication Union\n                (2013), \u201cKey ICT indicators for developed and developing countries and the world (totals and penetration rates)\u201d, available at: www.itu.int\/en\/ITU-D\/Statistics\/Documents\/statistics\/2013\/ITU_Key_2005-2013_ICT_data.xls (accessed 12 July 2013)."},{"key":"key2020122119584554100_b201","unstructured":"Johnson, D.W.\n                (1984), \n                  Computer Ethics: A Guide for the New Age\n               , The Brethren Press."},{"key":"key2020122119584554100_b202","unstructured":"Johnson, D.G.\n                (1985), \n                  Computer Ethics, Prentice-Hall\n               , Englewood Cliffs, New Jersey, NJ."},{"key":"key2020122119584554100_b203","unstructured":"Kaliman, E.A.\n                and \n                  Grillo, J.P.\n                (1993), \n                  Ethical Decision Making and Information Technology: An Introduction with Cases\n               , Mitchell McGraw-Hill, New York, NY."},{"key":"key2020122119584554100_b16","doi-asserted-by":"crossref","unstructured":"Kavuk, M.\n               , \n                  Keser, H.\n                and \n                  Teker, N.\n                (2011), \u201cReviewing unethical behaviors of primary education students\u2019 internet usage\u201d, \n                  Procedia \u2013 Social Behavioral Sciences\n               , Vol. 28, pp. 1043-1052.","DOI":"10.1016\/j.sbspro.2011.11.190"},{"key":"key2020122119584554100_b17","unstructured":"Kuzu, A.\n                (2009), \u201cProblems related to computer ethics: origins of the problems and suggested solutions\u201d, \n                  The Turkish Journal of Educational Technology \u2013 TOJET\n               , Vol. 8 No. 2, pp. 91-110."},{"key":"key2020122119584554100_b18","doi-asserted-by":"crossref","unstructured":"Lyman, P.\n               , \n                  Varian, H.R.\n               , \n                  Dunn, J.\n               , \n                  Strygin, A.\n                and \n                  Swearingen, K.\n                (2000), \u201cHow much information?\u201d, available at: www.attitudeweb.be\/doc\/resources\/studies\/how_much_information_produced_world_year_en.pdf (accessed 30 August 2013).","DOI":"10.3998\/3336451.0006.204"},{"key":"key2020122119584554100_b19","doi-asserted-by":"crossref","unstructured":"Lyu, H.S.\n                (2012), \u201cInternet policy in Korea: a preliminary framework for assigning moral and legal responsibility to agents in internet activities\u201d, \n                  Government Information Quarterly\n               , Vol. 29 No. 3, pp. 394-402.","DOI":"10.1016\/j.giq.2011.12.008"},{"key":"key2020122119584554100_b20","doi-asserted-by":"crossref","unstructured":"Moor, J.H.\n                (1985), \u201cWhat is computer ethics?\u201d, in \n                  Bynum, T.W.\n                (Ed.), \n                  Computers and Ethics\n               , Blackwell, Basil, pp. 266-275.","DOI":"10.1111\/j.1467-9973.1985.tb00173.x"},{"key":"key2020122119584554100_b21","doi-asserted-by":"crossref","unstructured":"Moor, J.H.\n                (2005), \u201cWhy we need better ethics for emerging technologies\u201d, \n                  Ethics and Information Technology\n               , Vol. 7 No. 7, pp. 111-119.","DOI":"10.1007\/s10676-006-0008-0"},{"key":"key2020122119584554100_b22","unstructured":"Moore, N.\n                (1997), \u201cThe information society\u201d, in \n                  Courrier, Y.\n                and \n                  Andrew, L.\n                (Eds), \n                  World Information Report, 1997\/1998\n               , United Nations Educational, Scientific and Cultural Organization, Paris, pp. 271-284, available at: http:\/\/unesdoc.unesco.org\/images\/0010\/001062\/106215e.pdf (accessed 23 May 2014)."},{"key":"key2020122119584554100_b23","unstructured":"Onyancha, O.B.\n                and \n                  Ocholla, D.N.\n                (2009), \u201cSubject content analysis of the HIV\/AIDS research in Eastern and Southern Africa, 1981-2005\u201d, \n                  Mousaion\n               , Vol. 28 No. 2, pp. 89-109."},{"key":"key2020122119584554100_b24","unstructured":"Palmquist, M.\n                (nd), \u201cContent analysis\u201d, available at: www.colostate.edu\/Depts\/WritingCenter\/references\/research\/content\/page2.htm (accessed 21 June 2006)."},{"key":"key2020122119584554100_b204","unstructured":"Parker, D.B.\n               , \n                  Swope, S.\n                and \n                  Baker, B.N.\n                (1990), \n                  Ethical Conflicts in Information and Computer Science Technology, and Business\n               , QED Information Sciences Inc."},{"key":"key2020122119584554100_b26","unstructured":"Spinello, R.A.\n                and \n                  Tavani, H.\n                (Eds) (2004), \n                  Readings in Cyberethics\n               , Jones and Bartlett Publishers, Sudbury, MA."},{"key":"key2020122119584554100_b28","unstructured":"Stamatellos, G.\n                (2007), \n                  Computer Ethics: A Global Perspective\n               , Jones \n\t\t\t\t\t&\n\t\t\t\t Bartlett Learning, Sudbury, MA."},{"key":"key2020122119584554100_b30","unstructured":"Van Eck, N.\n                and \n                  Waltman, L.\n                (2013), \u201cVOSviewer manual\u201d, available at: www.vosviewer.com\/documentation\/Manual_VOSviewer_1.5.5.pdf (accessed 9 June 2014)."},{"key":"key2020122119584554100_b31","doi-asserted-by":"crossref","unstructured":"Vaughan, L.\n                and \n                  You, J.\n                (2008), \u201cContent assisted web co-link analysis for competitive intelligence\u201d, \n                  Scientometrics\n               , Vol. 77 No. 3, pp. 433-444.","DOI":"10.1007\/s11192-007-1999-y"},{"key":"key2020122119584554100_b32","doi-asserted-by":"crossref","unstructured":"Wong, E.Y.W.\n                (1995), \u201cHow should we teach computer ethics? A short study done in Hong Kong\u201d, \n                  Computer Education\n               , Vol. 25 No. 4, pp. 179-191.","DOI":"10.1016\/0360-1315(95)00069-0"},{"key":"key2020122119584554100_b33","doi-asserted-by":"crossref","unstructured":"Wormell, I.\n                (2000), \u201cInformetrics \u2013 a new era of quantitative studies\u201d, \n                  Education for Information\n               , Vol. 18 Nos 2\/3, pp. 131-138.","DOI":"10.3233\/EFI-2000-182-304"},{"key":"key2020122119584554100_frd1","unstructured":"Canadian Centre for Justice Statistics\n                (2001), \u201cCyber crime: issues, data sources, and feasibility of collecting police-reported statistics\u201d, available at: www.statcan.gc.ca\/pub\/85-558-x\/85-558-x2002001-eng.pdf (accessed 1 September 2013)."},{"key":"key2020122119584554100_frd2","unstructured":"Reitz, J.M.\n                (2013), \u201cOnline dictionary of library and information science\u201d, available at: www.abc-clio.com\/ODLIS\/odlis_I.aspx#informationethics (accessed 14 August 2013)."},{"key":"key2020122119584554100_frd3","unstructured":"Spinello, R.A.\n                (2014), \n                  Cyberethics: Morality and Law in Cyberspace\n               , 5th ed., Jones and Bartlett Publishers, Sudbury, MA."},{"key":"key2020122119584554100_frd4","unstructured":"Stanford encyclopedia of philosophy\n                (2008), \u201cComputer and information ethics\u201d, available at:http:\/\/plato.stanford.edu\/entries\/ethics-computer\/ (accessed 28 June 2013)."}],"container-title":["Library Hi Tech"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/LHT-04-2015-0033","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-04-2015-0033\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-04-2015-0033\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:14:19Z","timestamp":1753395259000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/lht\/article\/33\/3\/387-408\/270304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,21]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9,21]]}},"alternative-id":["10.1108\/LHT-04-2015-0033"],"URL":"https:\/\/doi.org\/10.1108\/lht-04-2015-0033","relation":{},"ISSN":["0737-8831"],"issn-type":[{"type":"print","value":"0737-8831"}],"subject":[],"published":{"date-parts":[[2015,9,21]]}}}