{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T13:35:24Z","timestamp":1768829724807,"version":"3.49.0"},"reference-count":37,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10,1]]},"abstract":"<p>Ethical issues of information and communication technologies (ICTs) are important because they can have significant effects on human liberty, happiness, and people\u2019s ability to lead a good life. They are also of functional interest because they can determine whether technologies are used and whether their positive potential can unfold. For these reasons, policy makers are interested in finding out what these issues are and how they can be addressed. The best way of creating ICT policy that is sensitive to ethical issues pertain to being proactive in addressing such issues at an early stage of the technology life cycle. The present paper uses this position as a starting point and discusses how knowledge of ethical aspects of emerging ICTs can be gained. It develops a methodology that goes beyond established futures methodologies to cater for the difficult nature of ethical issues. The authors outline how the description of emerging ICTs can be used for an ethical analysis.<\/p>","DOI":"10.4018\/jte.2010100102","type":"journal-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T20:59:51Z","timestamp":1297803591000},"page":"20-38","source":"Crossref","is-referenced-by-count":45,"title":["Identifying the Ethics of Emerging Information and Communication Technologies"],"prefix":"10.4018","volume":"1","author":[{"given":"Bernd Carsten","family":"Stahl","sequence":"first","affiliation":[{"name":"De Montfort University, UK"}]},{"given":"Richard","family":"Heersmink","sequence":"additional","affiliation":[{"name":"Delft University of Technology, The Netherlands"}]},{"given":"Philippe","family":"Goujon","sequence":"additional","affiliation":[{"name":"Laboratory for Ethical Governance of Information Technology ,Facult\u00e9s Universitaires Notre-Dame de la Paix, Belgium"}]},{"given":"Catherine","family":"Flick","sequence":"additional","affiliation":[{"name":"Facult\u00e9s Universitaires Notre-Dame de la Paix, Belgium"}]},{"given":"Jeroen","family":"van den Hoven","sequence":"additional","affiliation":[{"name":"Delft University of Technology, The Netherlands"}]},{"given":"Kutoma","family":"Wakunuma","sequence":"additional","affiliation":[{"name":"De Montfort University, UK"}]},{"given":"Veikko","family":"Ikonen","sequence":"additional","affiliation":[{"name":"VTT (Technical Research Centre of Finland), Finland"}]},{"given":"Michael","family":"Rader","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]}],"member":"2432","reference":[{"key":"jte.2010100102-0","author":"T. L.Beauchamp","year":"2008","journal-title":"Principles of Biomedical Ethics"},{"key":"jte.2010100102-1","author":"W. E.Bijker","year":"1997","journal-title":"Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change"},{"key":"jte.2010100102-2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-51667-1.50051-3"},{"key":"jte.2010100102-3","unstructured":"Bynum, T. (2008). Computer and Information Ethics. Retrieved December 4, 2008, from http:\/\/plato.stanford.edu\/entries\/ethics-computer\/"},{"key":"jte.2010100102-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2005.04.006"},{"key":"jte.2010100102-5","author":"M.Callon","year":"2009","journal-title":"Acting in an Uncertain World: An Essay on Technical Democracy"},{"key":"jte.2010100102-6","author":"A. B. A. K.Charmaz","year":"2007","journal-title":"The SAGE Handbook of Grounded Theory"},{"key":"jte.2010100102-7","author":"J.Corbin","year":"2008","journal-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory"},{"key":"jte.2010100102-8","doi-asserted-by":"publisher","DOI":"10.1002\/for.848"},{"key":"jte.2010100102-9","author":"V.Dusek","year":"2006","journal-title":"Philosophy of Technology: an Introduction"},{"key":"jte.2010100102-10","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511845239","author":"L.Floridi","year":"2010","journal-title":"The Cambridge Handbook of Information and Computer Ethics"},{"key":"jte.2010100102-11","doi-asserted-by":"publisher","DOI":"10.1080\/09537320500357251"},{"key":"jte.2010100102-12","author":"B. G.Glaser","year":"1999","journal-title":"Discovery of Grounded Theory: Strategies for Qualitative Research"},{"key":"jte.2010100102-13","author":"K.Grint","year":"1997","journal-title":"The Machine at Work: Technology, Work and Organization"},{"key":"jte.2010100102-14","doi-asserted-by":"crossref","unstructured":"Heersmink, R., van den Hoven, J., van Eck, N. J., & van den Berg, J. (2011). A Bibliometrical Study of Computer and Information Ethics. Ethics and Information Technology.","DOI":"10.1007\/s10676-011-9273-7"},{"key":"jte.2010100102-15","doi-asserted-by":"publisher","DOI":"10.1002\/9780470281819"},{"key":"jte.2010100102-16","first-page":"329","article-title":"What We May Learn from the Social Shaping of Technology Approach","author":"D.Howcroft","year":"2004","journal-title":"Social Theory and Philosophy for Information Systems"},{"key":"jte.2010100102-17","author":"D. G.Johnson","year":"1985","journal-title":"Computer Ethics"},{"key":"jte.2010100102-18","doi-asserted-by":"publisher","DOI":"10.1177\/02767602022003006"},{"key":"jte.2010100102-19","author":"S.Joss","year":"2002","journal-title":"Participatory Technology Assessment: European Perspectives"},{"key":"jte.2010100102-20","author":"B.Latour","year":"2007","journal-title":"Reassembling the Social: An Introduction to Actor-Network-Theory"},{"key":"jte.2010100102-21","author":"J.Law","year":"1999","journal-title":"Actor Network Theory and After"},{"key":"jte.2010100102-22","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9973.1985.tb00173.x"},{"key":"jte.2010100102-23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511498725.003"},{"key":"jte.2010100102-24","doi-asserted-by":"publisher","DOI":"10.1002\/9781444310795"},{"key":"jte.2010100102-25","author":"P.Ricoeur","year":"1990","journal-title":"Soi-m\u00eame comme un autre"},{"key":"jte.2010100102-26","doi-asserted-by":"publisher","DOI":"10.1108\/14779960710846155"},{"key":"jte.2010100102-27","doi-asserted-by":"crossref","DOI":"10.1007\/978-90-481-2229-5","author":"P.Sollie","year":"2009","journal-title":"Evaluating New Technologies: Methodological Problems for the Ethical Assessment of Technology Developments"},{"key":"jte.2010100102-28","author":"S.Stephan","year":"2004","journal-title":"Bridges Between Science, Society and Policy: Technology Assessment - Methods and Impacts"},{"key":"jte.2010100102-29","author":"A. C.Strauss","year":"1997","journal-title":"Grounded Theory in Practice"},{"key":"jte.2010100102-30","doi-asserted-by":"publisher","DOI":"10.1007\/s11569-007-0005-8"},{"key":"jte.2010100102-31","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511845239.005","article-title":"The use of normative theories in computer ethics","author":"J.van den Hoven","year":"2010","journal-title":"The Cambridge Handbook of Information and Computer Ethics"},{"key":"jte.2010100102-32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511498725"},{"key":"jte.2010100102-33","doi-asserted-by":"crossref","unstructured":"Van Eck, N. J., & Waltman, L. (2006). VOS: a new method for visualizing similarities between objects. In Proceedings of the 30th Annual Conference of the German Classification Society, Studies in Classification, Data Analysis, and Knowledge Organization (pp. 299-306).","DOI":"10.1007\/978-3-540-70981-7_34"},{"key":"jte.2010100102-34","first-page":"1","article-title":"Software survey: VOSviewer, a computer program for bibliometric mapping.","author":"N. J.Van Eck","year":"2009","journal-title":"Scientometrics"},{"key":"jte.2010100102-35","unstructured":"Van Eck, N. J., Waltman, L., & van den Berg, J. (2005). A novel algorithm for visualizing concept associations. In Proceedings of the Database and Expert Systems Applications, Advances in Data Analysis, Sixteenth International Workshop (pp. 405-409)."},{"key":"jte.2010100102-36","author":"M. G.Velasquez","year":"2001","journal-title":"Business Ethics: Concepts and Cases"}],"container-title":["International Journal of Technoethics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=48521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T02:47:37Z","timestamp":1654138057000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jte.2010100102"}},"subtitle":["An Essay on Issues, Concepts and Method"],"short-title":[],"issued":{"date-parts":[[2010,10,1]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,10]]}},"URL":"https:\/\/doi.org\/10.4018\/jte.2010100102","relation":{},"ISSN":["1947-3451","1947-346X"],"issn-type":[{"value":"1947-3451","type":"print"},{"value":"1947-346X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,10,1]]}}}