Morality, Ethics, and Reflection: A Categorization of Normative IS Research
暂无分享,去创建一个
[1] Christopher Bull. A review of ethical theory in the 'upper echelons' of information systems research , 2009, ECIS.
[2] Terrell Ward Bynum,et al. Flourishing Ethics , 2006, Ethics and Information Technology.
[3] J. Habermas. Moralbewusstsein und kommunikatives Handeln , 1983 .
[4] J. Bentham. An Introduction to the Principles of Morals and Legislation , 1945, Princeton Readings in Political Thought.
[5] Vijayan Sugumaran,et al. A framework for creating hybrid‐open source software communities , 2002, Inf. Syst. J..
[6] Geoff Walsham,et al. Ethical theory, codes of ethics and IS practice , 1996 .
[7] Alison Adam. Gender, Ethics, and Information Technology , 2005 .
[8] Herman T. Tavani,et al. The uniqueness debate in computer ethics: What exactly is at issue, and why does it matter? , 2002, Ethics and Information Technology.
[9] John R Connery,et al. The right to privacy. , 1973, The Linacre quarterly.
[10] Jeroen van den Hoven,et al. Information Technology and Moral Philosophy: Introduction , 2008 .
[11] M. Velasquez. Business Ethics: Concepts and Cases , 1982 .
[12] R. Mason. Four ethical issues of the information age , 1986 .
[13] Geoff Walsham,et al. Interpretive case studies in IS research: nature and method , 1995 .
[14] Rudy Hirschheim,et al. Realizing Emancipatory Principles in Information Systems Development: The Case for ETHICS , 1994, MIS Q..
[15] Andrew Dillon. Computer and Information Ethics, by John Weckert and Douglas Adeney , 1998, J. Am. Soc. Inf. Sci..
[16] Enid Mumford,et al. Effective systems design and requirements analysis : the ETHICS approach , 1995 .
[17] P Pafko,et al. [Right to privacy]. , 2013, Rozhledy v chirurgii : mesicnik Ceskoslovenske chirurgicke spolecnosti.
[18] Jeroen van den Hoven,et al. Moral Methodology and Information Technology , 2009 .
[19] D. F. Norton,et al. A Treatise of Human Nature: Being an Attempt to Introduce the Experimental Method of Reasoning Into Moral Subjects , 2000 .
[20] Eleanor Wynn,et al. Möbius transitions in the dilemma of legitimacy , 2001 .
[21] Richard Owen,et al. Responsible Innovation: A Pilot Study with the U.K. Engineering and Physical Sciences Research Council , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[22] J. Daniel Couger,et al. Preparing IS Students to Deal with Ethical Issues , 1989, MIS Q..
[23] John Weckert,et al. Computer and Information Ethics , 1997 .
[24] Robert M. Davison,et al. Dealing with Plagiarism in the Information Systems Research Community: A Look at Factors that Drive Plagiarism and Ways to Address Them , 2003, MIS Q..
[25] A.W.M. Meijers,et al. Philosophy of technology and engineering sciences , 2009 .
[26] Geoff Walsham,et al. The Emergence of Interpretivism in IS Research , 1995, Inf. Syst. Res..
[27] Luciano Floridi,et al. Information ethics, its nature and scope , 2005, CSOC.
[28] Suprateek Sarker,et al. Ethical Information Systems Development : A Baumanian Postmodernist Perspective , 2009 .
[29] Richard Baskerville,et al. Information Systems as a Reference Discipline , 2002, MIS Q..
[30] Herman T. Tavani,et al. Intellectual Property Rights in a Networked World: Theory and Practice , 2004 .
[31] Detmar W. Straub,et al. Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .
[32] David B. Paradice,et al. Ethical attitudes of entry-level MIS personnel , 1990, Inf. Manag..
[33] Antonio Marturano. The role of metaethics and the future of computer ethics , 2004, Ethics and Information Technology.
[34] B. Doolin,et al. Towards Critical Interpretivism in IS Research , 2005 .
[35] D. Cecez-Kecmanovic. Doing critical IS research: the question of methodology , 2001 .
[36] M. Friedman. The Social Responsibility of Business Is to Increase Its Profits , 2007 .
[37] Stefan Koch,et al. Free / open source software development , 2004 .
[38] Richard T. DeGeorge,et al. The Ethics of Information Technology and Business , 2002 .
[39] M. Hauser,et al. The Role of Conscious Reasoning and Intuition in Moral Judgment , 2006, Psychological science.
[40] Jacques Lenoble,et al. Democracy, Law and Governance , 2010 .
[41] H. Tavani. Informational Privacy: Concepts, Theories, and Controversies , 2009 .
[42] Donn B. Parker,et al. Fighting computer crime , 1983 .
[43] Susan E. Hume. Editor's introduction to the special issue , 2003 .
[44] J. Habermas. Theorie des kommunikativen Handelns , 1981 .
[45] Michael D. Myers,et al. A Set of Principles for Conducting Critical Research in Information Systems , 2011, MIS Q..
[46] C. Allen,et al. Artificial Morality: Top-down, Bottom-up, and Hybrid Approaches , 2005, Ethics and Information Technology.
[47] David Ma,et al. Sub-Cultural Differences in Information Ethics across China: Focus On Chinese Management Generation Gaps , 2009, J. Assoc. Inf. Syst..
[48] David J. Danelski,et al. Privacy and Freedom , 1968 .
[49] Michael S. Moore,et al. Causation and Responsibility , 1999, Social Philosophy and Policy.
[50] L. Floridi. © 1999 Kluwer Academic Publishers. Printed in the Netherlands. Information ethics: On the philosophical foundation of computer ethics ⋆ , 2022 .
[51] I. Ajzen. The theory of planned behavior , 1991 .
[52] Jeremy Hayward,et al. The Republic: Plato , 2007 .
[53] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[54] Lucas D. Introna. Workplace surveillance is unethical and unfair , 2002 .
[55] Robert M. Davison,et al. The Ethics of IT Professionals in Japan and China , 2009, J. Assoc. Inf. Syst..
[56] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[57] Aristotle,et al. THE NICOMACHEAN ETHICS , 1990 .
[58] Sarah Fowler-Dixon,et al. The Ethics , 2020, A Spinoza Reader.
[59] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[60] Tero Vartiainen,et al. Teaching End-User Ethics: Issues and a Solution Based on Universalizability , 2002, Commun. Assoc. Inf. Syst..
[61] Enid Mumford,et al. Redesigning Human Systems , 2003 .
[62] J. Habermas. Erläuterungen zur Diskursethik , 1991 .
[63] L. Floridi,et al. Mapping the foundationalist debate in computer ethics , 2002, Ethics and Information Technology.
[64] Bernd Carsten Stahl,et al. ETHICS, Morality and Critique: An Essay on Enid Mumford¡¯s Socio-Technical Approach , 2007, J. Assoc. Inf. Syst..
[65] Geoff Walsham,et al. Toward Ethical Information Systems: The Contribution of Discourse Ethics , 2010, MIS Q..
[66] Roger Strand,et al. Conversations About Responsible Nanoresearch , 2011, Nanoethics.
[67] Ann Blandford,et al. Bridging the gap between organizational and user perspectives of security in the clinical domain , 2005, Int. J. Hum. Comput. Stud..
[68] Lucas D. Introna. Disclosive Ethics and Information Technology: Disclosing Facial Recognition Systems , 2005, Ethics and Information Technology.
[69] Leela Damodaran,et al. Citizen Participation and engagement in the Design of e-Government Services: The Missing Link in Effective ICT Design and Delivery , 2007, J. Assoc. Inf. Syst..
[70] T. F. Rodger. The Human Use of Human Beings , 1952 .
[71] David Hume,et al. A treatise of human nature; being an attempt to introduce the experimental method of reasoning into moral subjects; and dialogues concerning natural religion , 2010 .
[72] Philip Brey,et al. Disclosive computer ethics , 2000, CSOC.
[73] Philip A.E. Brey,et al. Philosophy of Computing and Information Technology , 2009 .
[74] P. Kleingeld,et al. The Stanford Encyclopedia of Philosophy , 2013 .
[75] Carol M. Sánchez. Ties That Bind: A Social Contracts Approach to Business Ethics , 1999 .
[76] Karen D. Loch,et al. Ethics and information technology use: a factor analysis of attitudes to computer use , 1995, Inf. Syst. J..
[77] Lucas D. Introna,et al. On sociomaterial imbrications: What plagiarism detection systems reveal and why it matters , 2011, Inf. Organ..
[78] Sonja Grabner-Kraeuter. The Role of Consumers' Trust in Online-Shopping , 2002 .
[79] Katherine J. Stewart,et al. The Impact of Ideology on Effectiveness in Open Source Software Development Teams , 2006, MIS Q..
[80] Thompson S. H. Teo,et al. Adoption of WAP-enabled mobile phones among Internet users , 2003 .
[81] Peter G. W. Keen,et al. Mis Research: Reference disciplines and a Cumulative Tradition , 1980, ICIS.
[82] A. Macintyre,et al. After Virtue: A Study in Moral Theory. , 1981 .
[83] Ben Light,et al. Ethics and social networking sites: a disclosive analysis of Facebook , 2010, Inf. Technol. People.
[84] John Rawls,et al. The Idea Of An Overlapping Consensus , 1987 .
[85] Immanuel Kant,et al. Kritik der praktischen Vernunft , 2003 .
[86] Paul Ricoeur. Soi même comme un autre , 1990 .
[87] Immanuel Kant,et al. Grundlegung zur Metaphysik der Sitten , 1906 .
[88] Rafael Capurro,et al. On Floridi’s metaphysical foundation of information ecology , 2008, Ethics and Information Technology.
[89] Paul Thagard,et al. Moral Intuition , 2020, Encyclopedia of Personality and Individual Differences.
[90] Tero Vartiainen,et al. What levels of moral reasoning and values explain adherence to information security rules? An empirical study , 2009, Eur. J. Inf. Syst..
[91] Enid Mumford,et al. Designing participatively : a participative approach to computer systems design : a case study of the introduction of a new computer system , 1979 .
[92] Trevor T. Moores,et al. Ethical Decision Making in Software Piracy: Initial Development and a Test of a Four-Component Model , 2006, MIS Q..
[93] N. Ben Fairweather. No PAPA: why incomplete codes of ethics are worse than none at all. , 2003 .
[94] Bernd Carsten Stahl,et al. The ethical nature of critical research in information systems , 2008, Inf. Syst. J..
[95] H. Jeff Smith,et al. Ethics and Information Systems: The Corporate Domain , 1999, MIS Q..
[96] Bernd W. Wirtz,et al. Understanding consumer acceptance of mobile payment services: An empirical analysis , 2010, Electron. Commer. Res. Appl..
[97] Pär J. Ågerfalk,et al. Outsourcing to an Unknown Workforce: Exploring Opensourcing as a Global Sourcing Strategy , 2008, MIS Q..
[98] Bernd Carsten Stahl,et al. What privacy? The impact of the UK Human Rights Act 1998 on privacy protection in the workplace. , 2007 .
[99] Luciano Floridi,et al. The Cambridge Handbook of Information and Computer Ethics: Index , 2010 .
[100] Bruce Robinson,et al. The mysterious case of the missing paradigm: a review of critical information systems research 1991–2001 , 2007, Inf. Syst. J..
[101] Cecil Eng Huang Chua,et al. The Role of Online Trading Communities in Managing Internet Auction Fraud , 2007, MIS Q..
[102] Mary J. Culnan,et al. How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches , 2009, MIS Q..