Skip to main content

ORIGINAL RESEARCH article

Front. Psychol., 27 September 2022
Sec. Educational Psychology
This article is part of the Research Topic Insights in Educational Psychology 2021 View all 37 articles

Examining the differences between information professional groups in perceiving information ethics: An analytic hierarchy process study

  • 1Department of Psychology, National Taiwan University, Taipei City, Taiwan
  • 2Department of Bio-Industry Communication and Development, National Taiwan University, Taipei City, Taiwan
  • 3Department of Library and Information Science, National Taiwan University, Taipei City, Taiwan

Information and communication technology (ICT) has a great impact on contemporary society and people’s lives. Especially with the pervasive access to rapidly developing technology, the impact of ICT on society and human values, the norms of ICT use, and the ethical issues derived from them are beyond the past ethical framework and deserve more research attention. The purpose of this study was to explore the key factors that influence the decision-making behaviors of information professionals when they are faced with information ethics issues. The study adopted the analytic hierarchical process method to develop the evaluation framework and criteria for information professional ethics and employed the professional fields of library and information science and information technology as examples to compare whether information professionals in different fields make different judgments on the aforementioned decision-making criteria. The results of the study validated the professional information ethics hierarchy and criteria and contributed to the field of information ethics research by providing information on the aspects that need attention in the cultivation of professionals in different fields.

Introduction

The rapid development of information technology has led to dramatic changes in the economies, politics, and cultures of countries around the world. The Internet now plays a crucial role in a globalized society, but while the Internet provides considerable convenience, it also generates a number of ethical issues. For example, the Internet allows easy access to various materials under copyright protection, which is largely disregarded by many users. Reports on information systems security and control show that this unethical Internet activity has resulted in significant losses of profit for publishing companies (Anthes, 1996). As Mason (1986) stressed, information ethics is critical in the information era and should be emphasized, identified, and classified as a new and specific area of knowledge to be explored and studied (Floridi and Sanders, 2001).

In the general approach to ethical dilemmas, decision makers must choose one of two different ethical values in preference to the other (Maclagan, 2003). Information ethics is concerned with the moral dilemmas and ethical conflicts that arise when human beings interact with information, information and communication technologies (ICTs), and information systems (Carbo, 2008). Critical issues, including privacy, property, accuracy, and accessibility of information, are often encountered by people during their interaction with information (Mason, 1986), and throughout their careers, students who major in information-related fields will face a wide range of ethical dilemmas related to issues such as trust (Kelton et al., 2008) and transparency (Fleischmann and Wallace, 2009). Employees’ lack of information ethics could compromise institutional information security, damage an institution’s reputation, or even cause financial losses. Therefore, for information majors, information ethics is not simply part of their literacy but also directly associated with their profession.

With reference to the importance of information ethics for professional development, the Association for Computing Machinery (ACM, 1992) proposed the ACM Code of Ethics and Professional Conduct, which identifies the personal responsibility and commitment of information professionals. Information ethics also gained attention from the research field of information science education. Chang (2011) utilized Kohlberg’s cognitive moral development model to measure improvements in students’ information ethics values through technology-mediated learning models. The results showed that e-learning materials that involved multiple media representations improved students’ comprehension as well as respect toward the norms, privacy, accessibility, and intellectual property issues.

However, current resources for learning and training of information ethics remain quite limited. According to a local investigation of the undergraduate curriculum by Lin and Chou (2014), only 37% of all the 199 departments or institutes of information science and engineering in Taiwan had courses related to information ethics. For this limited number of courses, their further review of 53 syllabi suggested that most of these courses were taught with didactic approaches in classroom teaching, which failed to convey the dynamic and situated nature of information ethics. Pedagogically, previous studies (Liu and Yang, 2012; Fiesler et al., 2020) supported that the ability to assess ethical dilemmas involved high-level thinking, and therefore pedagogies that encourage critical thinking, such as case-based discussions, video tutorials, debates, and role-playing, would be more suitable for information ethics curriculum. Additionally, in terms of the nature of the learning resources, given the many theoretical frameworks of information ethics proposed by previous research (Hunt and Vitell, 1986; Thong and Yap, 1998), the transformation of these conceptual norms into practical guidelines of actions and curriculum calls for further efforts to clearly structure the elements of information ethics. Furthermore, information professional organizations in different fields follow different codes of ethics due to different backgrounds, field knowledge, and even the content of their pre-service training. For example, the professional training objectives of the library and information science, computer science, and engineering fields are aligned with those of information technology, but the focus of education for library and information science personnel is on the professional knowledge and information application skills required to provide library and information services (ASIS&T, 1992; IFLA, 2012; ALA, 2021), with an emphasis on people and services. Those in the information technology field are more oriented toward learning how to apply various information technology techniques (ACM, 2018; IEEE, 2020), and they thus focus on the data and technology itself. In addition to the differences in the professional training received in school, the actual practices and professional ethics of the workplace are also different in the field of library and information science and the field of information technology. Therefore, the scope of information professionals should be expanded to include other professionals in the field of library and information science and information technology, teachers and students, in addition to the previous focus on management information system engineers or professionals, in order to truly meet the contemporary social context.

Motivated by the aforementioned issues, the purpose of this study was to explore the key factors that influence the decision-making behaviors of information professionals when they are faced with information ethics issues. In addition, this study employed the professional field of library and information science and the field of information technology as examples to compare whether information professionals in different fields make different judgments on the aforementioned decision-making criteria, and then it explored the possible influencing factors and the planning of information ethics education for professionals. Past empirical studies of ethics were often framed around dilemmas, mostly in the form of situational questions for which examinees would have to make the choice they thought more appropriate (often one out of two). However, the purpose of this study was not to directly assess the subjects’ ethical decision making choices regarding the stated situational issues by means of situational questions, but rather to collate the guidelines suggested by professional organizations and then to allow professionals to assess the relative importance of these guidelines.

Therefore, this study focused on decision analysis as a theoretical and methodological approach which can be mainly applied to decision making problems under uncertainty and with several evaluation criteria, with reference to the Analytic Hierarchy Process (AHP) method developed to systematize complex problems, decompose them at different levels, and evaluate them in a comprehensive manner by quantifying them and finding their context (Saaty, 1990). This study first compiled the professional ethical standards developed by the major information professional societies and summarized the important elements of information ethics. The results of the study are intended to validate the professional information ethics standards compiled in the preceding section, and then to provide a reference contribution to the field of information ethics research by providing information on the aspects that need attention in the cultivation of professionals in different fields.

Information ethics for information professionals

Ethics are a set of principles and concepts that judge whether a behavior is right or not. Compared to morals, ethics focus on the complex relationships and interactions between people at the social level. Various forms of ethical theories have been discussed and developed for people to explore how to interact properly with others (Arnold and Bowie, 2019). Among them, four types of theoretical approaches, including consequence-based theories, duty-based theories, rights-based theories, and virtue-based theories, have been regarded as critical and fundamental in information ethics education (Fallis, 2007). These four approaches complement one another by their alternative emphases on different aspects of information ethics, and mastering them facilitates learners’ further understanding of the importance of the ethical codes or principles. Furthermore, to adopt these approaches in the ethical decision-making process, Thong and Yap (1998) in their empirical investigation of 243 entry-level information system professionals suggested consequence-based approaches that reveal the consequences of ethical/unethical behaviors, which could facilitate learners’ comprehension of the codes and were more likely to lead to ethical decisions.

As information ethics involves field practices and interaction with others for common well-being, practical concerns have placed great emphasis on issues related to information ethics in the contexts of different professionals, types of information, and rapidly changing technologies. Since the 1980s, several professional societies of informaticists, such as the Association for Computing Machinery (Gotterbarn et al., 2018), Institute of Electrical and Electronics Engineers (IEEE, 2020), American Library Association (Witt, 2017; ALA, 2021), and International Federation of Library Associations (IFLA, 2012; Trepanier et al., 2019) have developed their own codes of ethics to guide practices of handling information ethics issues. These codes of ethics demonstrate the discipline-specific values and responsibilities of information professionals and institutions to society, as library-related associations accentuated ethical issues in providing information services (LAROC, 2002; IFLA, 2012; ALA, 2021) while computer societies highlighted concerns about producing information (ASIS&T, 1992; ACM, 2018; IEEE, 2020). However, as shown in Table 1, they also shared a common focus on issues raised by Mason (1986), whose systematic arguments about the four ethical issues of privacy, accuracy, property, and accessibility have attracted informaticists’ attention.

TABLE 1
www.frontiersin.org

Table 1. PAPA-related statements in professional codes of informaticists.

Our review in Table 1 shows that Mason’s four issues have been included in the professional ethics in both fields, suggesting a common emphasis on privacy, accuracy, property, and accessibility across information professionals’ practices. Nevertheless, due to the highly contextual nature of information ethics (Nissenbaum, 2019), even when the code of ethics is fully understood, the actual decisions and practices in the field could be much more complex and dilemmatic (Fallis, 2007; McMenemy et al., 2014). Advancing from the above analysis, Table 2 provides a further comparison and discussion of the three main criteria included in the two domains using Mason’s (1986) PAPA framework: general moral imperatives, specific professional responsibilities, and organizational/workplace responsibilities. These were categorized by considering the professional organizations’ information management norms and personnel roles in relation to their cognitive and behavioral performance. The four aforementioned issues are included in the following behavioral levels, which are covered in the content of the evaluation items.

TABLE 2
www.frontiersin.org

Table 2. Comparison of the professional ethics criteria.

Based on the above analysis, the content of ethics for information professionals includes moral responsibility, professional ethics, and workplace ethics, while the content of the professional code of conduct in the field of library information implies the concept of a limited field in the library and is therefore closely integrated with the mission and values of the organization. The professional codes of conduct in the field of information technology tend to provide sets of principle-based guidelines. Among them, ACM’s Code of Ethics, released in 1992 (ACM, 2018), covers a wide range of topics and is regarded as a solid basis for considering informaticists’ practices. Therefore, it was used as the main framework of the hierarchical analysis and the development of assessment criteria in this study in an attempt to understand the importance of the different target constructs and assessment criteria for information professionals in the fields of both library and information science and information technology.

Methodology

The analytical hierarchy process method

This study adopted the Analytical Hierarchy Process (AHP), which is a Multiple Attribute Decision Making (MADM) method (Saaty, 1987). The behaviors of individuals and groups in making decisions are complex and often include many different dimensions of consideration (Lin and Huang, 2013). Because of the different characteristics of each decision-maker, the importance of each aspect in the decision-making process could also vary. Based on a review of the professional and information ethics literature in general, and specifically the ACM Codes of Ethics, this study first developed an analytical hierarchy of information ethics.

The concept of information ethics was composed of three major elements: general moral imperatives, specific professional responsibilities, and organizational/workplace responsibilities. With the three major elements as the main criteria for decision-making, sub-criteria were further developed as specific combinations of the characteristics of each main criterion. After a pilot study with 5 experts from academia and practice sectors of information science, several constructs under each major element were merged or deleted according to the rules of the AHP method by the value of consistency index and consistency ratio (Saaty, 1987). The final analytical hierarchy of information ethics is shown as Figure 1.

FIGURE 1
www.frontiersin.org

Figure 1. The analytical hierarchy of information ethics.

Data collection and analysis

Based on the structure of the decision criteria, the final AHP questionnaire was compiled as a scale by Saaty (1987). This scale consists of all the criteria in Figure 1 and contains pairwise comparisons of criteria at each hierarchical level. The ranking system is on a scale from 1 to 9, where 1 means that two criteria are of equal importance and 9 indicates the highest importance of one criterion over the other. With the instrument, data were collected from experts with experience as practitioners and researchers in information science. They were drawn from departments or divisions of information science, information management, and information engineering in universities and in the public and private sectors that provide training, products, or services. These experts were invited to examine and weigh the critical factors regarding information ethics in the context of their practices with this AHP questionnaire. In this study, the data were analyzed in the Expert Choice 11.5 software package. After the model of the ethical hierarchy of information professionals was established, the judgment results of each expert’s answers were entered into a relative comparison matrix, after which the weights were calculated and the consistency of each questionnaire was checked.

Results and discussions

Analytic hierarchy process consistency testing

A total of 52 valid questionnaires were collected. The respondents included 25 IT experts (10 academic experts and 15 practitioner experts) and 27 library and information science experts (7 academic experts and 20 practitioner experts). Because consistency is essential for pairwise comparison matrices to ensure that the results are meaningful and it is also required by the AHP method (Xu and Xu, 2020), in order to ensure the validity of the pairwise comparisons and achieve uniformity of responses, each questionnaire was checked for consistency (Saaty, 1987). Methodologically, the consistency index (CI) of the derived weights should be less than 0.1 to ensure that the set of judgments is reliable. The analysis of the overall inconsistency index (O.I.I) suggested that 10 responses out of 25 IT experts and 7 responses out of 27 LIS experts should be removed due to insufficient consistency (O.I.I. > 0.1).

As shown in Table 3, the final number of respondents included in the AHP analysis was 35, including 15 experts in the IT field (8 academic experts and 7 practitioner experts) and 20 experts in the library and information science field (5 academic experts and 15 practitioner experts). The overall inconsistency index (O.I.I.) for both fields was less than 0.1, indicating that the hierarchical structure was appropriate for comparative analysis of subsequent levels of decision-making elements.

TABLE 3
www.frontiersin.org

Table 3. Background information of the respondents providing valid responses.

The main criteria analysis of two expert groups

The main criteria of “general moral imperatives,” “specific professional responsibilities,” and “organizational/workplace responsibilities” valued by different informaticist groups of information technology (IT) and library and information science (LIS) are listed in Tables 4, 5, respectively. The results suggested that, although both the academic and practitioner IT experts were identical in their emphasis on the three criteria, academic experts in LIS held views that were in almost direct opposition to those of their practitioner peers. The practitioner experts in IT and LIS areas ranked the three main criteria identically as follows: “general moral imperatives” was the most important, followed by “organizational/workplace responsibilities” and then “specific professional responsibilities.” The academic IT experts possessed the same emphasis as the practitioner, but the academic LIS experts regarded organizational/workplace responsibilities as the most important. The results implied the different impacts of the technical and contextual features of information service on decision-making. While technical characteristics were applicable across organizations, contextual factors could mostly vary from organization to organization. Therefore, academic experts in the LIS area, who often needed to consider the overall library service across institutions, could place more emphasis on individual organizational/workplace factors. This is also in line with previous studies that have found that LIS professionals have more ethical issues and considerations due to the human-centered nature of their discipline and professional conduct (Fallis, 2007; ALA, 2021; Lin et al., 2022).

TABLE 4
www.frontiersin.org

Table 4. Three main criteria weights and rankings by experts in the IT field.

TABLE 5
www.frontiersin.org

Table 5. Three main criteria weights and ranking by experts in the LIS field.

In addition, all respondents considered “specific professional responsibilities” to be the least important, indicating that both academic experts and practical experts mostly considered the critical component of ethics that affected information personnel to be general moral imperatives. It is possible that, when people face ethical dilemmas, the first consideration is the intrinsic value judgment accumulated from past experiences which shaped their moral cognition.

Analysis of the general moral imperatives criteria of two expert groups

For the analysis of the second level of the hierarchy, six evaluation sub-criteria were included in the general moral imperatives criteria, and the results of the evaluation are shown in Tables 6, 7. IT academics, practitioners, and LIS academic experts all ranked “avoid harm to others” as the most important criterion for assessing general moral imperatives. This criterion was also ranked second only to “respect the privacy of others and honor confidentiality” by the LIS practitioner experts. The least important criterion was “Contribute to society and human well-being,” which was ranked sixth by all the experts except the practitioners in the IT field, who ranked it fourth.

TABLE 6
www.frontiersin.org

Table 6. Weights and ranking of general moral imperatives criteria by IT experts.

TABLE 7
www.frontiersin.org

Table 7. Weights and ranking of general moral imperatives criteria by LIS experts.

In addition, the results showed that the practitioners in the field of LIS gave more importance to the financial value and added value of the products or intellectual property protected by property rights, copyrights, patents, and intellectual property rights, and further rated the criteria as a higher priority, while the criterion of “Honor property rights including copyrights and patents” was ranked 5th by the other three groups of experts and not given much importance.

Analysis of the specific professional responsibilities criteria of two expert groups

The specific professional responsibilities criteria contained six evaluation sub-criteria. As shown in Tables 8, 9, “achieve quality, effectiveness, and dignity of professional work,” “honor contracts, agreements, and assigned responsibilities,” and “access computing and communication resources with authorization” were all ranked in the top three in terms of importance by both academic and practitioner experts in the IT and LIS fields. The importance ranking of academic experts and practitioner experts in the LIS field was the same, from highest to lowest, for “honor contracts, agreements, and assigned responsibilities”, “access computing and communication resources with authorization,” and “achieve quality, effectiveness, and dignity of professional work,” respectively.

TABLE 8
www.frontiersin.org

Table 8. Weights and ranking of specific professional responsibilities criteria by IT experts.

TABLE 9
www.frontiersin.org

Table 9. Weights and ranking of specific professional responsibilities criteria by LIS experts.

In addition, academic experts in both domains ranked the importance of the “specific professional responsibilities” criteria in roughly the same order. Only the academic experts in the IT field considered “access computing and communication resources with authorization” to be more important than “honor contracts, agreements, and assigned responsibilities,” while the academic experts in the LIS field thought the opposite. It was inferred that the work nature and environment of the academic experts were similar, so the priority of the evaluation criteria for “specific professional responsibilities” related to the workplace would be almost the same.

Analysis of the organizational/workplace responsibilities criteria of two expert groups

The organizational/workplace responsibilities criteria contained six evaluation sub-criteria. As shown in Tables 10, 11 below, “protect the privacy of organizational data” was the most important criterion for experts in both fields. The next most important criteria were more divergent and mainly included “protect confidentiality of products and services,” “protect property rights of the organization,” and “maintain and manage the accuracy of organizational data.” The criteria of “manage the ownership of software, hardware and information” and “manage the accessibility of the organizational system” were ranked lowest.

TABLE 10
www.frontiersin.org

Table 10. Weights and ranking of organizational/workplace responsibilities criteria by IT experts.

TABLE 11
www.frontiersin.org

Table 11. Weights and ranking of organizational/workplace responsibilities criteria by LIS experts.

Possible explanations for the aforementioned evaluation results could be that IT academic experts were more management-oriented (García-Holgado et al., 2021), so they focused on the protection of the privacy of the organization’s products and services and emphasized the need to maintain the accuracy of management information. As for the IT practitioners, they adopted the perspective of employees in the organization, so the privacy of employee data, customer data, and vendor data that they dealt with every day was most important to them (D’Arcy and Devaraj, 2012; Lu et al., 2018), followed by the intellectual property rights of organizational resources, such as internal training materials and online databases (Yueh et al., 2016).

The criteria analysis of information professionals in information technology and library and information science fields

This study further integrated the results of the AHP analysis between academic experts and practitioner experts in the two professional fields. As shown in Table 12, the criterion of “general moral imperatives” was given the highest priority in both the IT and LIS fields, followed by “organizational/workplace responsibilities” and finally “specific professional responsibilities.”

TABLE 12
www.frontiersin.org

Table 12. Weights and ranking of three main criteria by information professionals in IT and LIS fields.

In addition to the above three main criteria weights, the product of the main criteria weights and the sub-criteria weights was further calculated to represent the global priority of each evaluation criterion, and the relative weight rankings of all evaluation criteria were obtained as shown in Tables 13, 14.

TABLE 13
www.frontiersin.org

Table 13. Information technology experts’ local and global weights of all criteria of the hierarchy.

TABLE 14
www.frontiersin.org

Table 14. Library and information science experts’ local and global weights of all criteria of the hierarchy.

After further comparing the 18 sub-criteria, this study found that the most important criterion ranked by IT experts was “avoid harm to others” (GW = 0.113), while the criterion ranked most important by LIS experts was “respect the privacy of others and honor confidentiality” (GW = 0.108), which was slightly higher than “avoid harm to others” (GW = 0.102). The results echoed the findings of the previous studies (Eskens, 2020; Zimmer et al., 2020), supporting that informaticists, like the general public, placed the highest value on privacy in information ethics issues.

Many past studies have argued that Orientalism or Asian culture, which is strongly influenced by Confucianism, has shaped certain Asian values, one of which is “interpersonal reciprocity and accommodation” (avoiding conflict with others) (Nathan, 2012). In Confucian relationships, interpersonal relationships that give special consideration to the law of human relations may create a dilemma of human relations leading to subjective decisions due to the law of equity (Huang, 2001). Therefore, people in this cultural context tend to avoid conflict (including in verbal and non-verbal communication), prevent hurting others, and take care not to offend others. The results of the professionals’ evaluations of these ethical criteria in this study may be related to the aforementioned characteristics of these cultural contextual influences.

Conclusion

This study used the analytic hierarchical process method to develop an evaluation framework and criteria for information professional ethics, and it also attempted to understand the differences in the ranking of the importance of the criteria for evaluating information professional ethics between practitioners in field of the information technology and those in the field of library and information science. From the results of the study, it was found that the basic attitudes or perceptions of the practitioners in the two professional fields toward the ethical issues of information profession were similar, and both of them focused the most on the general moral imperatives aspect and the need to avoid hurting others or violating others’ privacy.

Furthermore, the analysis of the general moral imperatives suggested that expert respondents gave priorities to aspects that were directly and specifically related to personal interests. They were most concerned with causing harm to others and themselves, and more general aspects that caused no immediate harm were weighted less. The expert respondents’ evaluations of the specific professional responsibilities suggested that factors that directly related to their work were regarded as the most important. They also gave high priority to legal issues, since the codification of norms suggested clearer guidelines of action to follow. In the aspect of organizational/workplace responsibilities, factors involved with interests and conflicts with external institutions were given the most weight over the others, such as the protection of organizational information of clients, suppliers, and employees. On the other hand, internal exchange or circulation of information was regarded as less critical. Overall, the findings suggested that moral imperatives as personal traits were regarded as the most important, followed by personal competence in work and finally social interactions with others.

The results of this study can provide information professional organizations, academic researchers and practitioners with important references on information ethics issues. In particular, the results of this study will provide a deeper understanding of the decision-making behaviors of professionals in the face of ethical issues and serve as a reference for planning a comprehensive framework for professional training programs in information ethics education and training. In addition, the cultural contexts and personal characteristics involved in these ethical decisions are worthy of further exploration in future research. Despite considerations of disciplinary diversity, a few limitations of this study should be noticed. Since this study analyzed and compared only the results of subjective questionnaires completed by experts and scholars, their reasons and justifications for the rankings inferred by the researchers could still be insufficient to include all possibilities. Based on the findings of this study, future studies should be conducted to develop teaching materials and assessment tools for information ethics so as to help nurture talents in related information professional fields.

Data availability statement

The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.

Ethics statement

Ethical review and approval was not required for the study on human participants in accordance with the local legislation and institutional requirements. The patients/participants provided their written informed consent to participate in this study.

Author contributions

H-PY: conceptualization, methodology, funding acquisition, and writing – original draft, review and editing. C-YH: investigation, formal analysis, and visualization. WL: methodology, investigation, validation, and writing – review and editing. All authors contributed to the article and approved the submitted version.

Funding

This study was supported by the Taiwan Ministry of Science and Technology (NSC102-2511-S-002-007-MY2).

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

ACM (1992). ACM Code of Ethics and Professional Conduct. New York, NY: ACM.

Google Scholar

ACM (2018). ACM Code of Ethics and Professional Conduct. New York, NY: ACM.

Google Scholar

ALA (2021). Code of Ethics, Adopted at the 1939 Midwinter Meeting by the ALA Council. Chicago, IL: ALA.

Google Scholar

Anthes, G. H. (1996). Hack attack: cyberthieves siphon millions from US firms. Computerworld 30:81.

Google Scholar

Arnold, D. G., and Bowie, N. E. (2019). Ethical Theory and Business. Cambridge, MA: Cambridge University Press. doi: 10.1017/9781108386128

CrossRef Full Text | Google Scholar

ASIS&T (1992). Professional Guidelines. Silver Spring, MD: ASIS&T.

Google Scholar

Buchanan, E. A., Henderson, K. A., and Hauptman, R. (eds). (2009). Case studies in library and information science ethics. Jefferson, NC: McFarland & Co.

Google Scholar

Carbo, T. (2008). Ethics education for information professionals. J. Lib. Admin. 47, 5–25. doi: 10.1080/01930820802186324

CrossRef Full Text | Google Scholar

Chang, C. L.-H. (2011). The effect of an information ethics course on the information ethics values of students–A Chinese guanxi culture perspective. Comp. Hum. Behav. 27, 2028–2038. doi: 10.1016/j.chb.2011.05.010

CrossRef Full Text | Google Scholar

D’Arcy, J., and Devaraj, S. (2012). Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sci. 43, 1091–1124. doi: 10.1111/j.1540-5915.2012.00383.x

CrossRef Full Text | Google Scholar

Eskens, S. (2020). The personal information sphere: An integral approach to privacy and related information and communication rights. J. Assoc. Inform. Sci. Technol. 71, 1116–1128. doi: 10.1002/asi.24354

PubMed Abstract | CrossRef Full Text | Google Scholar

Fallis, D. (2007). Information ethics for twenty-first century library professionals. Library Hi Tech 25, 23–36. doi: 10.1108/07378830710735830

PubMed Abstract | CrossRef Full Text | Google Scholar

Fiesler, C., Garrett, N., and Beard, N. (2020). “What do we teach when we teach tech ethics? A syllabi analysis,” in Proceedings of the 51st ACM Technical Symposium on Computer Science Education, New York, NY. doi: 10.1145/3328778.3366825

CrossRef Full Text | Google Scholar

Fleischmann, K. R., and Wallace, W. A. (2009). Ensuring transparency in computational modeling. Commun. ACM 52, 131–134. doi: 10.1145/1467247.1467278

CrossRef Full Text | Google Scholar

Floridi, L., and Sanders, J. W. (2001). Artificial evil and the foundation of computer ethics. Ethics Inform. Technol. 3, 55–66. doi: 10.1023/A:1011440125207

CrossRef Full Text | Google Scholar

García-Holgado, A., García-Peñalvo, F. J., Therón, R., Vázquez-Ingelmo, A., Gamazo, A., González-González, C. S., et al. (2021). “Development of a SPOC of computer ethics for students of computer science degree,” in Proceedings of the 2021 XI International Conference on Virtual Campus (JICV), Salamanca. doi: 10.1109/JICV53222.2021.9600272

CrossRef Full Text | Google Scholar

Gotterbarn, D., Brinkman, B., Flick, C., Kirkpatrick, M. S., Miller, K., Vazansky, K., et al. (2018). ACM Code of Ethics and Professional Conduct. New York, NY: ACM.

Google Scholar

Huang, K. K. (2001). The theoretical construction of Confucian Relationalism and its philosophical foundation. Formosan Educ. Soc. 2, 1–33.

Google Scholar

Hunt, S. D., and Vitell, S. (1986). A general theory of marketing ethics. J. Macromarket. 6, 5–16. doi: 10.1177/027614678600600103

CrossRef Full Text | Google Scholar

IEEE (2020). Code of Ethics. Piscataway, NJ: IEEE.

Google Scholar

IFLA (2012). Code of Ethics for Librarians and Other Information Workers (Long Version). The Hague: IFLA.

Google Scholar

Kelton, K., Fleischmann, K. R., and Wallace, W. A. (2008). Trust in digital information. J. Am. Soc. Inform. Sci. Technol. 59, 363–374. doi: 10.1002/asi.20722

CrossRef Full Text | Google Scholar

LAROC (2002). Code of Professional Ethics for Librarians in Taiwan. Brazil: LAROC.

Google Scholar

Lin, C.-H., and Chou, C. (2014). Ethics curricula of the information science departments in Taiwanese universities and colleges. J. Res. Educ. Sci. 59, 197–228.

Google Scholar

Lin, W., and Huang, C.-Y. (2013). Understand public libraries’ decisions on eBook extension service: An AHP Analysis. J. Lib. Inform. Stud. 11, 117–148.

Google Scholar

Lin, W., Wang, J.-Y., and Yueh, H.-P. (2022). Learning information ethical decision making with a simulation game. Front. Psychol. 13:933298. doi: 10.3389/fpsyg.2022.933298

PubMed Abstract | CrossRef Full Text | Google Scholar

Liu, C.-J., and Yang, S. C. (2012). Applying the practical inquiry model to investigate the quality of students’ online discourse in an information ethics course based on Bloom’s teaching goal and Bird’s 3C model. Comp. Educ. 59, 466–480. doi: 10.1016/j.compedu.2012.01.018

CrossRef Full Text | Google Scholar

Lu, M.-H., Lin, W., and Yueh, H.-P. (2018). How do employees in different job roles in the insurance industry use mobile technology differently at work? IEEE Trans. Prof. Commun. 61, 151–165. doi: 10.1109/TPC.2018.2796998

CrossRef Full Text | Google Scholar

Maclagan, P. (2003). Varieties of moral issue and dilemma: A framework for the analysis of case material in business ethics education. J. Bus. Ethics 48, 21–32. doi: 10.1023/B:BUSI.0000004364.63317.73

CrossRef Full Text | Google Scholar

Mason, R. O. (1986). Four ethical issues of the information age. MIS Q. 10, 5–12. doi: 10.2307/248873

CrossRef Full Text | Google Scholar

McMenemy, D., Poulter, A., and Burton, P. (2014). A Handbook of Ethical Practice: A Practical Guide to Dealing with Ethical Issues in Information and Library Work. Amsterdam: Elsevier.

Google Scholar

Nathan, A. (2012). Confucius and the ballot box: Why Asian values do not stymie democracy. Foreign Affairs 91, 134–139.

Google Scholar

Nissenbaum, H. (2019). Contextual integrity up and down the data food chain. Theor. Inq. Law 20, 221–256. doi: 10.1515/til-2019-0008

CrossRef Full Text | Google Scholar

Saaty, R. W. (1987). The analytic hierarchy process—what it is and how it is used. Math. Model. 9, 161–176. doi: 10.1016/0270-0255(87)90473-8

CrossRef Full Text | Google Scholar

Saaty, R. W. (1990). How to make a decision: The Analytic Hierarchy Process. Eur. J. Operat. Res. 48, 9–26. doi: 10.1016/0377-2217(90)90057-I

CrossRef Full Text | Google Scholar

Thong, J. Y., and Yap, C.-S. (1998). Testing an ethical decision-making theory: The case of softlifting. J. Manag. Inform. Syst. 15, 213–237. doi: 10.1080/07421222.1998.11518203

CrossRef Full Text | Google Scholar

Trepanier, C., Shiri, A., and Samek, T. (2019). An examination of IFLA and Data Science Association ethical codes. IFLA J. 45, 289–301. doi: 10.1177/0340035219849614

CrossRef Full Text | Google Scholar

Witt, S. (2017). The evolution of privacy within the American Library Association, 1906–2002. Lib. Trends 65, 639–657. doi: 10.1353/lib.2017.0022

PubMed Abstract | CrossRef Full Text | Google Scholar

Xu, K., and Xu, J. (2020). A direct consistency test and improvement method for the analytic hierarchy process. Fuzzy Opt. Decision Making 19, 359–388. doi: 10.1007/s10700-020-09323-y

CrossRef Full Text | Google Scholar

Yueh, H.-P., Lu, M.-H., and Lin, W. (2016). Employees’ acceptance of mobile technology in a workplace: An empirical study using SEM and fsQCA. J. Bus. Res. 69, 2318–2324. doi: 10.1016/j.jbusres.2015.12.048

CrossRef Full Text | Google Scholar

Zimmer, M., Vitak, J., and Wu, P. (2020). Editorial introduction:“Information privacy in the digital age”. J. Assoc. Inform. Sci. Technol. 71, 997–1001. doi: 10.1002/asi.24394

CrossRef Full Text | Google Scholar

Keywords: information ethics, professional ethics, analytical hierarchy process, library information science, information technology - IT

Citation: Yueh H-P, Huang C-Y and Lin W (2022) Examining the differences between information professional groups in perceiving information ethics: An analytic hierarchy process study. Front. Psychol. 13:954827. doi: 10.3389/fpsyg.2022.954827

Received: 27 May 2022; Accepted: 17 August 2022;
Published: 27 September 2022.

Edited by:

Douglas F. Kauffman, Medical University of the Americas – Nevis, United States

Reviewed by:

Evan Andrew Wilhelms, College of Wooster, United States
Soraj Hongladarom, Chulalongkorn University, Thailand

Copyright © 2022 Yueh, Huang and Lin. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Weijane Lin, vjlin@ntu.edu.tw

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.