{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:19Z","timestamp":1750306579798,"version":"3.41.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2014,10,23]],"date-time":"2014-10-23T00:00:00Z","timestamp":1414022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCAS Comput. Soc."],"published-print":{"date-parts":[[2014,10,23]]},"abstract":"<jats:p>Computing ethics is a complex area of study that is of significant importance to the computing community and global society. However, research and education in computing ethics are difficult due to the diverse meanings of ethics. This paper presents details of a content analysis study that analyzed definitions of computer ethics. The purpose of this study was to educe and present the meaning of computing ethics, resulting in a thematic definition of computing ethics for use in education and research. This paper presents definition themes that emerged: interdisciplinary, collaboration, scholars and professionals, methodically study, practically affect, contributions and costs, computing artifacts, and global society. The results of this study can assist computing ethicists with research, aid computing educators with curriculum development, and provide a theoretical frame for relating ethics to computing. This exploration demonstrates that groups within the computing community can find common ground, even on such a difficult and complex matter as ethics.<\/jats:p>","DOI":"10.1145\/2684097.2684102","type":"journal-article","created":{"date-parts":[[2014,10,24]],"date-time":"2014-10-24T15:29:07Z","timestamp":1414164547000},"page":"21-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A synthesized definition of computer ethics"],"prefix":"10.1145","volume":"44","author":[{"given":"Brian R.","family":"Hall","sequence":"first","affiliation":[{"name":"Champlain College, Burlington, VT"}]}],"member":"320","published-online":{"date-parts":[[2014,10,23]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1108\/00251740910984578"},{"key":"e_1_2_1_2_1","first-page":"135","volume-title":"Proceedings of the 8th International Conference CEPE","author":"Briggle A.","year":"2009"},{"key":"e_1_2_1_3_1","unstructured":"T. W. Bynum. Computer ethics: Basic concepts and historical overview 2001.  T. W. Bynum. Computer ethics: Basic concepts and historical overview 2001."},{"key":"e_1_2_1_4_1","unstructured":"T. W. Bynum. Computer and information ethics 2011.  T. W. Bynum. Computer and information ethics 2011."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/csr.132"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107622.1107630"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2447976.2447988"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445245"},{"volume-title":"Jones & Bartlett Learning","year":"2002","author":"Edgar S. L.","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","first-page":"79","article-title":"The place of definition in ethics. Proceedings of the Aristotelian Society","volume":"32","author":"Field G. C.","year":"1932","journal-title":"New Series"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010018611096"},{"volume-title":"Prentice-Hall","year":"1963","author":"Frankena W. K.","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02583552"},{"issue":"3","key":"e_1_2_1_14_1","article-title":"Responsibility regained","volume":"71","author":"Gotterbarn D.","year":"1991","journal-title":"The Phi Beta Kappa Journal"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012534014727"},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"K. E. Himma and H. T. Tavani editors. The handbook of information and computer ethics. Wiley-Interscience 1 edition May 2008.   K. E. Himma and H. T. Tavani editors. The handbook of information and computer ethics . Wiley-Interscience 1 edition May 2008.","DOI":"10.1002\/9780470281819"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/1049732305276687"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"J. M. Kizza. Ethical and social issues in the information age. Springer 5th edition Mar. 2013.   J. M. Kizza. Ethical and social issues in the information age . Springer 5th edition Mar. 2013.","DOI":"10.1007\/978-1-4471-4990-3"},{"key":"e_1_2_1_19_1","unstructured":"K. H. Krippendorff. Content analysis: An introduction to its methodology. SAGE Publications Inc. third edition edition Apr. 2012.  K. H. Krippendorff. Content analysis: An introduction to its methodology . SAGE Publications Inc. third edition edition Apr. 2012."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02388590"},{"volume-title":"Sage","year":"2010","author":"Locke L. F.","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9973.1985.tb00173.x"},{"key":"e_1_2_1_23_1","unstructured":"G. E. Moore. Principia ethica. Cambridge University Press 2 edition 1993.  G. E. Moore. Principia ethica . Cambridge University Press 2 edition 1993."},{"key":"e_1_2_1_24_1","unstructured":"P. M. Nardi. Doing survey research. Pearson Boston 2 edition July 2005.  P. M. Nardi. Doing survey research . Pearson Boston 2 edition July 2005."},{"volume-title":"Sage","year":"2010","author":"O'Leary Z.","key":"e_1_2_1_25_1"},{"key":"e_1_2_1_26_1","unstructured":"M. Quinn. Ethics for the information age. Addison-Wesley 5 edition Mar. 2012.   M. Quinn. Ethics for the information age . Addison-Wesley 5 edition Mar. 2012."},{"key":"e_1_2_1_27_1","unstructured":"G. W. Reynolds. Ethics in information technology. Cengage Learning 4 edition Oct. 2011.  G. W. Reynolds. Ethics in information technology . Cengage Learning 4 edition Oct. 2011."},{"key":"e_1_2_1_28_1","unstructured":"J. Salda\u00f1a. The coding manual for qualitative researchers. SAGE Los Angeles 2 edition 2013.  J. Salda\u00f1a. The coding manual for qualitative researchers . SAGE Los Angeles 2 edition 2013."},{"volume-title":"MIT Press","year":"2009","author":"Sicart M.","key":"e_1_2_1_29_1"},{"volume-title":"Jones & Bartlett Learning","year":"2010","author":"Spinello R.","key":"e_1_2_1_30_1"},{"issue":"3","key":"e_1_2_1_31_1","first-page":"253","article-title":"Teaching ethical reflexivity in information systems: How to equip students to deal with moral and ethical issues of emerging information and communication technologies","volume":"22","author":"Stahl B. C.","year":"2011","journal-title":"Journal of Information Systems Education"},{"key":"e_1_2_1_32_1","first-page":"719","volume-title":"Proceedings of the 8th International Conference CEPE","author":"Stahl B. C.","year":"2009"},{"key":"e_1_2_1_33_1","unstructured":"J. J. Wesley. Building bridges in content analysis: Quantitative and qualitative traditions May 2009.  J. J. Wesley. Building bridges in content analysis: Quantitative and qualitative traditions May 2009."},{"key":"e_1_2_1_34_1","unstructured":"N. Wiener. The human use of human beings. Doubleday & Company second edition revised edition 1954.  N. Wiener. The human use of human beings . Doubleday & Company second edition revised edition 1954."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2307\/2183526"},{"key":"e_1_2_1_36_1","unstructured":"Y. Zhang and B. M. Wildemuth. Qualitative analysis of content. Applications of social research methods to questions of information and library science pages 308--319 2009.  Y. Zhang and B. M. Wildemuth. Qualitative analysis of content. Applications of social research methods to questions of information and library science pages 308--319 2009."}],"container-title":["ACM SIGCAS Computers and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2684097.2684102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2684097.2684102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:45Z","timestamp":1750227225000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2684097.2684102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,23]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,10,23]]}},"alternative-id":["10.1145\/2684097.2684102"],"URL":"https:\/\/doi.org\/10.1145\/2684097.2684102","relation":{},"ISSN":["0095-2737"],"issn-type":[{"type":"print","value":"0095-2737"}],"subject":[],"published":{"date-parts":[[2014,10,23]]},"assertion":[{"value":"2014-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}