{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T21:52:14Z","timestamp":1759960334211,"version":"3.41.0"},"reference-count":0,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2003,9,30]],"date-time":"2003-09-30T00:00:00Z","timestamp":1064880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCAS Comput. Soc."],"published-print":{"date-parts":[[2003,9,30]]},"abstract":"<jats:p>As the Association for Computing Machinery (ACM) Code of Ethics has\nan important guiding role in embedding ethics into computing\npractice, both in the United States and around the globe, its\ncontent is important. This paper considers a way of analyzing the\nCode into ethical categories, inspired by a soft systems 'rich\npicture' Information Systems (IS) framework. A list of seven\nstakeholder categories, together with the major components of\napplied ethical theory, are used to map the elements of the ACM\nCode. While such an analysis is imprecise due to human\ninterpretation, so also is the art of applied ethics. Yet, by\nframing the ACM Code according to stakeholder roles and basic\nethical analysis tools, the ACM Code of Ethics becomes more useful\nin various ways. Overlaps and gaps can be identified, various\ninterpretations of word meanings can be more easily identified and\ndebated, and, perhaps, most importantly in the global ethical\narena, a better comparison of the ACM with other codes of ethics is\nfacilitated.<\/jats:p>","DOI":"10.1145\/968261.968264","type":"journal-article","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T15:54:55Z","timestamp":1132070095000},"page":"2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["AN ANALYSIS OF THE ASSOCIATION FOR COMPUTING MACHINERY (ACM) CODE OF ETHICS"],"prefix":"10.1145","volume":"33","author":[{"given":"S. L.","family":"Wheeler","sequence":"first","affiliation":[{"name":"School of Accounting and Information Systems | University of South Australia"}]}],"member":"320","published-online":{"date-parts":[[2003,9,30]]},"container-title":["ACM SIGCAS Computers and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/968261.968264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/ft_gateway.cfm?id=968264&ftid=1206277&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:19:25Z","timestamp":1750263565000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/968261.968264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,9,30]]},"references-count":0,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2003,9,30]]}},"alternative-id":["10.1145\/968261.968264"],"URL":"https:\/\/doi.org\/10.1145\/968261.968264","relation":{},"ISSN":["0095-2737"],"issn-type":[{"type":"print","value":"0095-2737"}],"subject":[],"published":{"date-parts":[[2003,9,30]]},"assertion":[{"value":"2003-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}