Morality, Ethics, and Reflection: A Categorization of Normative IS Research

Moral views and perceptions, their ethical evaluation and justification, and practical concerns about how to incorporate them all play important roles in research and practice in the information systems discipline. This paper develops a model of normative issues ranging from moral intuition and explicit morality to ethical theory and meta-ethical reflection. After showing that this normative model is relevant to IS and that it allows an improved understanding of normative issues, the paper discusses these levels of normativity in the context of two of the most prominent normative topics in IS: Privacy and intellectual property. The paper then suggests that a more explicit understanding of the different aspects of normativity would benefit IS research. This would leverage the traditional empirical strengths of IS research and use them to develop research that is relevant beyond the boundaries of the discipline. Such broader relevance could be aimed at the reference disciplines. In particular, moral philosophy could benefit from understanding information technology and its role in organizations in more detail. It could, furthermore, inform policy makers who are increasingly called on to regulate new information technologies.

[1]  Christopher Bull A review of ethical theory in the 'upper echelons' of information systems research , 2009, ECIS.

[2]  Terrell Ward Bynum,et al.  Flourishing Ethics , 2006, Ethics and Information Technology.

[3]  J. Habermas Moralbewusstsein und kommunikatives Handeln , 1983 .

[4]  J. Bentham An Introduction to the Principles of Morals and Legislation , 1945, Princeton Readings in Political Thought.

[5]  Vijayan Sugumaran,et al.  A framework for creating hybrid‐open source software communities , 2002, Inf. Syst. J..

[6]  Geoff Walsham,et al.  Ethical theory, codes of ethics and IS practice , 1996 .

[7]  Alison Adam Gender, Ethics, and Information Technology , 2005 .

[8]  Herman T. Tavani,et al.  The uniqueness debate in computer ethics: What exactly is at issue, and why does it matter? , 2002, Ethics and Information Technology.

[9]  John R Connery,et al.  The right to privacy. , 1973, The Linacre quarterly.

[10]  Jeroen van den Hoven,et al.  Information Technology and Moral Philosophy: Introduction , 2008 .

[11]  M. Velasquez Business Ethics: Concepts and Cases , 1982 .

[12]  R. Mason Four ethical issues of the information age , 1986 .

[13]  Geoff Walsham,et al.  Interpretive case studies in IS research: nature and method , 1995 .

[14]  Rudy Hirschheim,et al.  Realizing Emancipatory Principles in Information Systems Development: The Case for ETHICS , 1994, MIS Q..

[15]  Andrew Dillon Computer and Information Ethics, by John Weckert and Douglas Adeney , 1998, J. Am. Soc. Inf. Sci..

[16]  Enid Mumford,et al.  Effective systems design and requirements analysis : the ETHICS approach , 1995 .

[17]  P Pafko,et al.  [Right to privacy]. , 2013, Rozhledy v chirurgii : mesicnik Ceskoslovenske chirurgicke spolecnosti.

[18]  Jeroen van den Hoven,et al.  Moral Methodology and Information Technology , 2009 .

[19]  D. F. Norton,et al.  A Treatise of Human Nature: Being an Attempt to Introduce the Experimental Method of Reasoning Into Moral Subjects , 2000 .

[20]  Eleanor Wynn,et al.  Möbius transitions in the dilemma of legitimacy , 2001 .

[21]  Richard Owen,et al.  Responsible Innovation: A Pilot Study with the U.K. Engineering and Physical Sciences Research Council , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[22]  J. Daniel Couger,et al.  Preparing IS Students to Deal with Ethical Issues , 1989, MIS Q..

[23]  John Weckert,et al.  Computer and Information Ethics , 1997 .

[24]  Robert M. Davison,et al.  Dealing with Plagiarism in the Information Systems Research Community: A Look at Factors that Drive Plagiarism and Ways to Address Them , 2003, MIS Q..

[25]  A.W.M. Meijers,et al.  Philosophy of technology and engineering sciences , 2009 .

[26]  Geoff Walsham,et al.  The Emergence of Interpretivism in IS Research , 1995, Inf. Syst. Res..

[27]  Luciano Floridi,et al.  Information ethics, its nature and scope , 2005, CSOC.

[28]  Suprateek Sarker,et al.  Ethical Information Systems Development : A Baumanian Postmodernist Perspective , 2009 .

[29]  Richard Baskerville,et al.  Information Systems as a Reference Discipline , 2002, MIS Q..

[30]  Herman T. Tavani,et al.  Intellectual Property Rights in a Networked World: Theory and Practice , 2004 .

[31]  Detmar W. Straub,et al.  Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .

[32]  David B. Paradice,et al.  Ethical attitudes of entry-level MIS personnel , 1990, Inf. Manag..

[33]  Antonio Marturano The role of metaethics and the future of computer ethics , 2004, Ethics and Information Technology.

[34]  B. Doolin,et al.  Towards Critical Interpretivism in IS Research , 2005 .

[35]  D. Cecez-Kecmanovic Doing critical IS research: the question of methodology , 2001 .

[36]  M. Friedman The Social Responsibility of Business Is to Increase Its Profits , 2007 .

[37]  Stefan Koch,et al.  Free / open source software development , 2004 .

[38]  Richard T. DeGeorge,et al.  The Ethics of Information Technology and Business , 2002 .

[39]  M. Hauser,et al.  The Role of Conscious Reasoning and Intuition in Moral Judgment , 2006, Psychological science.

[40]  Jacques Lenoble,et al.  Democracy, Law and Governance , 2010 .

[41]  H. Tavani Informational Privacy: Concepts, Theories, and Controversies , 2009 .

[42]  Donn B. Parker,et al.  Fighting computer crime , 1983 .

[43]  Susan E. Hume Editor's introduction to the special issue , 2003 .

[44]  J. Habermas Theorie des kommunikativen Handelns , 1981 .

[45]  Michael D. Myers,et al.  A Set of Principles for Conducting Critical Research in Information Systems , 2011, MIS Q..

[46]  C. Allen,et al.  Artificial Morality: Top-down, Bottom-up, and Hybrid Approaches , 2005, Ethics and Information Technology.

[47]  David Ma,et al.  Sub-Cultural Differences in Information Ethics across China: Focus On Chinese Management Generation Gaps , 2009, J. Assoc. Inf. Syst..

[48]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[49]  Michael S. Moore,et al.  Causation and Responsibility , 1999, Social Philosophy and Policy.

[50]  L. Floridi © 1999 Kluwer Academic Publishers. Printed in the Netherlands. Information ethics: On the philosophical foundation of computer ethics ⋆ , 2022 .

[51]  I. Ajzen The theory of planned behavior , 1991 .

[52]  Jeremy Hayward,et al.  The Republic: Plato , 2007 .

[53]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[54]  Lucas D. Introna Workplace surveillance is unethical and unfair , 2002 .

[55]  Robert M. Davison,et al.  The Ethics of IT Professionals in Japan and China , 2009, J. Assoc. Inf. Syst..

[56]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[57]  Aristotle,et al.  THE NICOMACHEAN ETHICS , 1990 .

[58]  Sarah Fowler-Dixon,et al.  The Ethics , 2020, A Spinoza Reader.

[59]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[60]  Tero Vartiainen,et al.  Teaching End-User Ethics: Issues and a Solution Based on Universalizability , 2002, Commun. Assoc. Inf. Syst..

[61]  Enid Mumford,et al.  Redesigning Human Systems , 2003 .

[62]  J. Habermas Erläuterungen zur Diskursethik , 1991 .

[63]  L. Floridi,et al.  Mapping the foundationalist debate in computer ethics , 2002, Ethics and Information Technology.

[64]  Bernd Carsten Stahl,et al.  ETHICS, Morality and Critique: An Essay on Enid Mumford¡¯s Socio-Technical Approach , 2007, J. Assoc. Inf. Syst..

[65]  Geoff Walsham,et al.  Toward Ethical Information Systems: The Contribution of Discourse Ethics , 2010, MIS Q..

[66]  Roger Strand,et al.  Conversations About Responsible Nanoresearch , 2011, Nanoethics.

[67]  Ann Blandford,et al.  Bridging the gap between organizational and user perspectives of security in the clinical domain , 2005, Int. J. Hum. Comput. Stud..

[68]  Lucas D. Introna Disclosive Ethics and Information Technology: Disclosing Facial Recognition Systems , 2005, Ethics and Information Technology.

[69]  Leela Damodaran,et al.  Citizen Participation and engagement in the Design of e-Government Services: The Missing Link in Effective ICT Design and Delivery , 2007, J. Assoc. Inf. Syst..

[70]  T. F. Rodger The Human Use of Human Beings , 1952 .

[71]  David Hume,et al.  A treatise of human nature; being an attempt to introduce the experimental method of reasoning into moral subjects; and dialogues concerning natural religion , 2010 .

[72]  Philip Brey,et al.  Disclosive computer ethics , 2000, CSOC.

[73]  Philip A.E. Brey,et al.  Philosophy of Computing and Information Technology , 2009 .

[74]  P. Kleingeld,et al.  The Stanford Encyclopedia of Philosophy , 2013 .

[75]  Carol M. Sánchez Ties That Bind: A Social Contracts Approach to Business Ethics , 1999 .

[76]  Karen D. Loch,et al.  Ethics and information technology use: a factor analysis of attitudes to computer use , 1995, Inf. Syst. J..

[77]  Lucas D. Introna,et al.  On sociomaterial imbrications: What plagiarism detection systems reveal and why it matters , 2011, Inf. Organ..

[78]  Sonja Grabner-Kraeuter The Role of Consumers' Trust in Online-Shopping , 2002 .

[79]  Katherine J. Stewart,et al.  The Impact of Ideology on Effectiveness in Open Source Software Development Teams , 2006, MIS Q..

[80]  Thompson S. H. Teo,et al.  Adoption of WAP-enabled mobile phones among Internet users , 2003 .

[81]  Peter G. W. Keen,et al.  Mis Research: Reference disciplines and a Cumulative Tradition , 1980, ICIS.

[82]  A. Macintyre,et al.  After Virtue: A Study in Moral Theory. , 1981 .

[83]  Ben Light,et al.  Ethics and social networking sites: a disclosive analysis of Facebook , 2010, Inf. Technol. People.

[84]  John Rawls,et al.  The Idea Of An Overlapping Consensus , 1987 .

[85]  Immanuel Kant,et al.  Kritik der praktischen Vernunft , 2003 .

[86]  Paul Ricoeur Soi même comme un autre , 1990 .

[87]  Immanuel Kant,et al.  Grundlegung zur Metaphysik der Sitten , 1906 .

[88]  Rafael Capurro,et al.  On Floridi’s metaphysical foundation of information ecology , 2008, Ethics and Information Technology.

[89]  Paul Thagard,et al.  Moral Intuition , 2020, Encyclopedia of Personality and Individual Differences.

[90]  Tero Vartiainen,et al.  What levels of moral reasoning and values explain adherence to information security rules? An empirical study , 2009, Eur. J. Inf. Syst..

[91]  Enid Mumford,et al.  Designing participatively : a participative approach to computer systems design : a case study of the introduction of a new computer system , 1979 .

[92]  Trevor T. Moores,et al.  Ethical Decision Making in Software Piracy: Initial Development and a Test of a Four-Component Model , 2006, MIS Q..

[93]  N. Ben Fairweather No PAPA: why incomplete codes of ethics are worse than none at all. , 2003 .

[94]  Bernd Carsten Stahl,et al.  The ethical nature of critical research in information systems , 2008, Inf. Syst. J..

[95]  H. Jeff Smith,et al.  Ethics and Information Systems: The Corporate Domain , 1999, MIS Q..

[96]  Bernd W. Wirtz,et al.  Understanding consumer acceptance of mobile payment services: An empirical analysis , 2010, Electron. Commer. Res. Appl..

[97]  Pär J. Ågerfalk,et al.  Outsourcing to an Unknown Workforce: Exploring Opensourcing as a Global Sourcing Strategy , 2008, MIS Q..

[98]  Bernd Carsten Stahl,et al.  What privacy? The impact of the UK Human Rights Act 1998 on privacy protection in the workplace. , 2007 .

[99]  Luciano Floridi,et al.  The Cambridge Handbook of Information and Computer Ethics: Index , 2010 .

[100]  Bruce Robinson,et al.  The mysterious case of the missing paradigm: a review of critical information systems research 1991–2001 , 2007, Inf. Syst. J..

[101]  Cecil Eng Huang Chua,et al.  The Role of Online Trading Communities in Managing Internet Auction Fraud , 2007, MIS Q..

[102]  Mary J. Culnan,et al.  How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches , 2009, MIS Q..