Accès gratuit
Numéro
Rev. Fr. Gest.
Volume 44, Numéro 271, mars 2018
Sciences, techniques et pratiques de gestion
Page(s) 99 - 129
Section Varia
DOI https://doi.org/10.3166/rfg.2018.00221
Publié en ligne 27 juin 2018
  1. Adam A. (2005). Gender, ethics and information technology, Palgrave Macmillan, New York. [CrossRef] [Google Scholar]
  2. Argyris C. (1990). “The dilemma of implementing controls: The case of managerial accounting”, Accounting, Organizations and Society, vol. 15, p. 503‐511. [CrossRef] [Google Scholar]
  3. Banerjee D., Cronan T.P. et Jones T.W. (1998). “Modeling IT ethics: A Study in situational ethics”, MIS Quarterly, vol. 22, no 1, p. 31‐60. [CrossRef] [Google Scholar]
  4. Bao Z. (2001). “An ethical discussion on the network economy”, Business Ethics: A European Review, vol. 10, no 2, p. 108‐112. [CrossRef] [Google Scholar]
  5. Bauman Z (1993). Postmodern Ethics, Routledge, London. [Google Scholar]
  6. Bélanger F. et Crossler R.E. (2011). “Privacy in the digital age: A review of information privacy research in information systems”, MIS Quarterly, vol. 35, no 4, p. 1017‐1042. [CrossRef] [Google Scholar]
  7. Bélanger F., Hiller J. et Smith W.J. (2002). “Trustworthiness in electronic commerce: The role of privacy, security, and site attributes”, Journal of Strategic Information Systems, vol. 11, no 3/4, p. 245‐270. [CrossRef] [Google Scholar]
  8. Bentham J. (1948 [1789]). Introduction to the Principles of Morals and Legislation, Oxford University Press, Oxford, UK. [Google Scholar]
  9. Béranger J. et Le Coz P. (2014). « Chapitre 3. Vers une utilisation éthique des systèmes d’information en santé », Journal International de Bioéthique, vol. 25, no 3, p. 47‐62. [CrossRef] [Google Scholar]
  10. Block W. (2001). “Cyberslacking, business ethics and managerial economics”, Journal of Business Ethics, vol. 33, no 3, p. 225‐231. [CrossRef] [Google Scholar]
  11. Boncella R.J. (2001). “Internet privacy: At home and at work”, Communications of the Association for Information Systems, vol. 7, no 1. [Google Scholar]
  12. Brey P. (2000). “Disclosive computer ethics: The exposure and evaluation of embedded normativity in computer technology”, Computers and Society, vol. 30, no 4, p. 10‐16. [CrossRef] [Google Scholar]
  13. Brown W.S. (2000). “Ontological security, existential anxiety and workplace privacy”, Journal of Business Ethics, vol. 23, no 1, p. 61‐65. [CrossRef] [Google Scholar]
  14. Bull C.M. et Adam A. (2011). “Virtue ethics and customer relationship management: Towards a more holistic approach for the development of best practice”, Business Ethics: A European Review, vol. 20, no 2, p. 121‐130. [CrossRef] [Google Scholar]
  15. Bynum T.W. (1985). Computers and Ethics, Blackwell Ed., Oxford, UK. [Google Scholar]
  16. Bynum T.W. (2000). “The foundation of computer ethics”, Computers and Society, vol. 30, no 2, p. 6‐13. [CrossRef] [Google Scholar]
  17. Cappel J. et Windsor J. (2000). “Ethical decision making: A comparison of computer-supported and face-to-face group”, Journal of Business Ethics, vol. 28, no 2, p. 95‐107. [CrossRef] [Google Scholar]
  18. Chae B., Paradice D., Courtney J.F. et Cagle C.J. (2005). “Incorporating an ethical perspective into problem formulation: implications for decision support systems design”, Decision support systems, vol. 40, no 2, p. 197‐212. [CrossRef] [Google Scholar]
  19. Chatterjee S., Sarker S. et Fuller M. (2009). “Ethical information systems development: A Baumanian postmodernist perspective”, Journal of the Association for Information Systems, p. 787‐815. [CrossRef] [Google Scholar]
  20. Chatterjee S., Sarker S. et Valacich J.S. (2015). “The behavioral roots of information systems security: exploring key factors related to unethical IT use”, Journal of Management Information Systems, vol. 31, no 4, p. 49‐87. [CrossRef] [Google Scholar]
  21. Cheng L., Li Y., Li W., Holm E. et Zhai Q. (2013). “Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory”, Computers and Security, vol. 39, p. 447‐459. [CrossRef] [Google Scholar]
  22. Clarke R. (1999). “Internet privacy concerns confirm the case for intervention”, Communications of the ACM, vol. 42, no 2, p. 60‐67. [CrossRef] [Google Scholar]
  23. Conger S., Loch K. et Helft B. (1995). “Ethics and information technology use: a factor analysis of Attitudes to computer use”, Information Systems Journal, vol. 5, no 3, p. 161‐183. [CrossRef] [Google Scholar]
  24. Culnan M.J. et Williams C.C. (2009). “How ethics can enhance organizational privacy: lessons from the choicepoint and TJX data breaches”, MIS Quarterly, p. 673‐687. [CrossRef] [Google Scholar]
  25. Datta A., Tschantz M.C. et Datta A. (2015). “Automated experiments on ads privacy settings”, Proceedings on Privacy Enhancing Technologies, no 1, p. 92‐112. [CrossRef] [Google Scholar]
  26. Davison R.M. (2000). “Professional ethics in information systems: A personal perspective”, Communications of the AIS, vol. 3, no 2, art. 4. [Google Scholar]
  27. De George R.T. (1999). “Business ethics and the information age”, Business & Society Review, vol. 104, no 3, p. 261‐278. [CrossRef] [Google Scholar]
  28. De George R.T. (2000). “Business ethics and the information age”, Business Ethics Quarterly, vol. 10, no 1, p. 63‐72. [CrossRef] [Google Scholar]
  29. Dillard J. et Yuthas K. (2001). “A responsibility ethics for audit expert systems”, Journal of Business Ethics, vol. 30, no 4, p. 337‐359. [CrossRef] [Google Scholar]
  30. Dillard J.F. et Yuthas K. (2002). “Ethical audit decisions: A structuration perspective”, Journal of Business Ethics, vol. 36, p. 49‐64. [CrossRef] [Google Scholar]
  31. Dulipovici A. et Baskerville R. (2007). “Conflicts between privacy and property: The discourse in personal and organizational knowledge”, Journal of Strategic Information Systems, vol. 16, no 2, p. 187‐213. [CrossRef] [Google Scholar]
  32. Earp J. B., Anton A.I., Aiman-Smith L. et Stufflebeam W.H. (2005). “Examining internet privacy policies within the context of user privacy values”, IEEE Transactions on Engineering Management, vol. 52, n° 2 , p. 227‐237. [CrossRef] [Google Scholar]
  33. Eining M. et Lee G. (1997). “Information ethics: An exploratory study from an international perspective”, Journal of Information Systems, Spring, vol. 11, n° 1 , p. 1‐17. [Google Scholar]
  34. Ellis T. et Griffith D. (2000). “The evaluation of IT ethical scenarios using a multidimensional scale”, ACM SIGMIS Database, vol. 32, n° 1, p. 75‐85. [CrossRef] [Google Scholar]
  35. Floridi L. (2008). Foundations of information ethics, dans The Handbook of Information and Computer Ethics, Himma et Tavani (Eds.). Wiley [Google Scholar]
  36. Foxman E.R. et Kilcoyne P. (1993). “Information technology, marketing practice, and consumer privacy: ethical issues”, Journal of Public Policy & Marketing, vol. 12, no 1, p. 106‐119. [Google Scholar]
  37. Gorniak-Kocikowska K. (1996). “The computer revolution and the problem of global ethics”, Science and Engineering Ethics, vol. 2, no 2, p. 177‐190. [CrossRef] [Google Scholar]
  38. Gotterbarn D. (1991). “Computer ethics: Responsibility regained. national forum”, The Phi Beta Kappa Journal, 71, p. 26‐31. [Google Scholar]
  39. Habermas J. (1996). Between Facts and Norms: Contribution to a Discourse Theory of Law and Democracy, MIT Press, Cambridge. [Google Scholar]
  40. Hauptman R. (1988). Ethical Challenges in Librarianship, Oryx Press, Phoenix, AZ. [Google Scholar]
  41. Hauptman R. (1999). Ethics, Information Technology And Crisis, Ethics And Electronic Information in the 21st Century, L.J. Pourciau (Ed), Purdue University Press. [Google Scholar]
  42. Hawk S.R. (1994). “The effects of computerized performance monitoring: An ethical perspective”, Journal of Business Ethics, vol. 13, no 12, p. 949‐957. [CrossRef] [Google Scholar]
  43. Heersmink R., Van den Hoven J., van Eck N.J. et Van den Berg J. (2011). “Bibliometric mapping of computer and information ethics”, Ethics and information technology, vol. 13, no 3, p. 241‐249. [CrossRef] [Google Scholar]
  44. Himma K.E. (2007). “The concept of information overload: A preliminary step in understanding the nature of a harmful information-related condition”, Ethics and Information Technology, vol. 9, no 4, p. 259‐272. [CrossRef] [Google Scholar]
  45. Howard R. (1985) Brave New Work-Place, Vildng-Penguin Inc., New York. [Google Scholar]
  46. Introna L.D. (1996). “Privacy and the Computer: Why we need privacy in the information Society”, Computer Ethics dans: Privacy and the Computer, p. 259‐275. [Google Scholar]
  47. Introna L. D. (2002). “The (im)possibility of ethics in the information age”, Information and Organization, vol. 12, n° 2, p. 71‐84. [CrossRef] [Google Scholar]
  48. Introna L. D. (2007). “Maintaining the reversibility of foldings: Making the ethics (politics) of information technology visible”, Ethics and Information Technology, vol. 9, no 1, p. 11‐25. [CrossRef] [Google Scholar]
  49. Isaac H. et Kalika M. (2001). « Organisation, technologie de l’information et vie privée », Revue française de gestion, no 134, p. 101‐105. [Google Scholar]
  50. Jaworski B.J. et Young S.M. (1992). “ Dysfunctional behaviour and management control: An empirical study of marketing managers”, Accounting, Organizations and Society, vol. 17, no 1, p. 17‐35. [CrossRef] [Google Scholar]
  51. Johnson D.G. (1985). Computer Ethics, Prentice -Hall, Upper Saddle River: New Jersey. [Google Scholar]
  52. Kant E. (1993) (orig 1785). Fondement de la Métaphysique des Mœurs, Librairie Générale Française. [Google Scholar]
  53. Khalil O.E. (1993). “Artificial decision-making and artificial ethics: A management concern”, Journal of Business Ethics, vol. 12, no 4, p. 313‐321. [CrossRef] [Google Scholar]
  54. Koenig M., Kostrewski B. et Oppenheim C. (1981). “Ethics in Information Science”, Journal of Information Science, vol. 3, p. 45‐47. [CrossRef] [Google Scholar]
  55. Koenig T. et Rustad M. (2003). In Defense of Tort Law. NYU Press, 2001; paperback edition. [Google Scholar]
  56. Leclercq-Vandelannoitte A., Isaac H. et Kalika M. (2014). “Mobile information systems and organisational control: beyond the panopticon metaphor?”, European Journal of Information Systems, vol. 23, n° 5, p. 543‐557. [CrossRef] [Google Scholar]
  57. Levy S. (1984). Hackers, Dell, New York. [Google Scholar]
  58. Light B. et McGrath K. (2010). “Ethics and social networking sites: A disclosive analysis of Facebook. Information”, Technology & People, vol. 23, no 4, p. 290‐311. [CrossRef] [Google Scholar]
  59. Liu C. et Arnett K.P. (2002). “Raising a Red Flag on Global WWW Privacy Policies”, The Journal of Computer Information Systems, vol. 43, n° 1, p. 117‐127. [Google Scholar]
  60. Loch K.D., Conger S. et Oz E. (1998). “Ownership, privacy and monitoring in the workplace: a debate on technology and ethics”, Journal of Business Ethics, vol. 17, n° 6, p. 653‐663. [Google Scholar]
  61. Lyon D. (2001). “Facing the future: Seeking ethics for everyday surveillance”, Ethics and Information Technology, vol. 3, no 3, p. 171‐180. [CrossRef] [Google Scholar]
  62. Lyon D. (2003). Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, Psychology Press. [Google Scholar]
  63. Malhotra A., Melville N.P. et Watson R.T. (2013). “Spurring impactful research on information systems for environmental sustainability”, MIS Quarterly, vol. 37, no 4, p. 1265‐1274. [CrossRef] [Google Scholar]
  64. Maner W. (1980). Starter Kit in Computer Ethics, Helvetia Press (published in cooperation with the National Information and Resource Center for Teaching Philosophy). (Originally self-published by Maner in 1978). [Google Scholar]
  65. Martinsons M.G. et Ma D. (2009). “Sub-cultural differences in information ethics across china: focus on Chinese management generation gaps”, Journal of The Association for Information Systems, vol. 10, p. 816‐833. [CrossRef] [Google Scholar]
  66. Masclet L. et Goujon P. (2012). “Implementing ethics in information systems, presuppositions and consequences in ethics and information systems”, ICT Critical Infrastructures and Society, Springer Berlin Heidelberg, p. 287‐298, [Google Scholar]
  67. Mason R.O. (1986). “Four ethical issues of the information age”, MIS Quarterly, vol. 10, no 1, p. 5‐12. [CrossRef] [Google Scholar]
  68. Matwyshyn A. (2009). “CSR and the corporate cyborg: Ethical corporate information security practices”, Journal Of Business Ethics, vol. 88, no 4, p. 579‐594. [CrossRef] [Google Scholar]
  69. Mill J.S. (1861). Utilitarianism, Broadview Press. [Google Scholar]
  70. Mingers J. et Walsham G. (2010). “Toward ethical information systems: the contribution of discourse ethics”, MIS Quarterly, vol. 34, no 4, p. 833‐854. [CrossRef] [Google Scholar]
  71. Moor J.H. (1985). “What is computer ethics?”, Computers And Ethics (A Special Issue of Metaphilosophy), Bynum (Ed.), vol. 16, no 4, p. 263‐275. [Google Scholar]
  72. Moor J.H. (2005). “Why we need better ethics for emerging technologies”, Ethics And Information Technology, vol. 7, no 3, p. 111‐119. [CrossRef] [Google Scholar]
  73. Myers M. et Miller L. (1996). “Ethical dilemmas in the use of information technology: An Aristotelian perspective”, Ethics And Behavior, vol. 6, no 2, p. 153‐160. [CrossRef] [Google Scholar]
  74. Nissenbaum H. (2001). “How computer systems embody values”, Computer, vol. 34, no 3, p. 120‐119. [CrossRef] [Google Scholar]
  75. Ogburn W.F. (1922). Social Change with Respect to Culture and Original Nature, BW Huebsch, Incorporated. [Google Scholar]
  76. Onsi M. (1973). “Factor analysis of behavioural variables affecting budgetary slack”, Accounting Review, p. 535‐548. [Google Scholar]
  77. Peslak A.R. (2005). “Internet privacy policies: A Review and survey of the Fortune 50”, Information Resources Management Journal, vol. 18, no 1, p. 29‐41. [CrossRef] [Google Scholar]
  78. Peslak A. (2006). “Papa revisited: A current empirical study of the Mason framework”, Journal of Computer Information Systems, vol. 46, no 3, p. 117‐123. [Google Scholar]
  79. Peslak A.R. (2007). “ACM code of conduct and information technology moral judgment and intent”, Journal of Computer Information Systems, vol. 47, no 3, p. 1‐10. [Google Scholar]
  80. Pesqueux Y. et Biefnot Y. (2002). L’éthique des affaires : management par les valeurs et responsabilité sociale, Éditions d’Organisation. [Google Scholar]
  81. Peyrat-Guillard D. (2012). « Le Respect de la vie privée des salariés: quels enjeux pour les entreprises et les organisations syndicales ? », Revue française de gestion, vol. 38, no 224, p. 153‐172. [CrossRef] [Google Scholar]
  82. Piazza C. (2008). Virtues of a Cyborg Workplace: The Ethical Challenges of Managing a Dispersed Workforce, Union Institute and University. [Google Scholar]
  83. Pras B. (2012). « Entreprise et vie privée. Le ‘privacy paradox’ et comment le dépasser », Revue française de gestion, vol. 38, no 224, p. 87‐94. [CrossRef] [Google Scholar]
  84. Reix R. (2004). Systèmes d’Information et Management des organisations, Vuibert, 5e édition. [Google Scholar]
  85. Reix R. et Rowe F. (2002). « La Recherche en systèmes d’information : de l’histoire au concept », Faire de la Recherche en Systèmes d’Information, F. Rowe (éd.), Vuibert, Paris, p. 1‐17. [Google Scholar]
  86. Rodhain F., Fallery B., Girard A. et Desq S. (2010). « Une histoire de la recherche en Systèmes d’Information, à travers 30 trente ans de publications », Entreprises et Histoire, vol. 3, p. 78‐97. [CrossRef] [Google Scholar]
  87. Rowe F. (2009). « Les approches critiques en Systèmes d’Information : de la sociologie de la domination à l’éthique de l’émancipation », AIM 2009. [Google Scholar]
  88. Ryker R., Lafleur E., McManis B. et Cox K. C. (2002). “Online privacy policies: An assessment of the Fortune e-50”, Journal of Computer Information Systems, vol. 42, n° 4, p. 15‐20. [Google Scholar]
  89. Saganuwan M.U., Ismail W.K.W. et Ahmad U.M.U. (2013). “Technostress: Mediating accounting information systems performance”, Information Management and Business Review, vol. 5, no 6, p. 270‐277. [Google Scholar]
  90. Schwaig K.S., Kane G.C. et Storey V.C. (2005). “Privacy, fair information practices and the Fortune 500: The virtual reality of compliance”, The Data Base for Advances in Information Systems, vol. 36, n° 1, p. 49‐63. [CrossRef] [Google Scholar]
  91. Severson R.J. (1997). The Principles of Information Ethics, ME Sharpe Ed. [Google Scholar]
  92. Shaw T.R. (2003). “The moral intensity of privacy: An empirical study of webmasters attitudes”, Journal of Business Ethics, vol. 46, no 4, p. 301‐318. [CrossRef] [Google Scholar]
  93. Sheehan K. B. (2005). “In poor health: An assessment of privacy policies at direct-to-consumer web sites”, Journal of Public Policy & Marketing, vol. 24, no 2, p. 273‐283. [CrossRef] [Google Scholar]
  94. Siau K., Nah F.F.-H. et Teng L. (2002). “Internet abuse and acceptable internet use policy”, Communications of the ACM, vol. 45, no 1, p. 75‐79. [CrossRef] [Google Scholar]
  95. Simmons G. (2013). “Clearing the Air? Information disclosure, systems of power, and the National pollution release inventory”, McGill Law Journal, vol. 59, no 1, p. 9‐48. [CrossRef] [Google Scholar]
  96. Simon H.A. (1972). “Theories of bounded rationality”, Decision and organization, vol. 1, no 1, p. 161‐176. [Google Scholar]
  97. Smith A. (1776). An Inquiry Into the Nature and Causes of the Wealth of Nations, Edwin Cannan's annotated Edition. [Google Scholar]
  98. Smith H.J., Dinev T. et Xu H. (2011). “Information privacy research: An interdisciplinary review”, MIS Quarterly, vol. 35, no 4, p. 989‐1016. [CrossRef] [Google Scholar]
  99. Smith H.J. et Hasnas J. (1999). “Ethics and information systems: the corporate domain”, MIS Quarterly, p. 109‐127. [Google Scholar]
  100. Smith H.J., Milberg S.J. et Burke S.J. (1996). “Information privacy: Measuring individuals concerns about organizational practices”, MIS Quarterly, vol. 20, no 2, p. 167‐196. [CrossRef] [Google Scholar]
  101. Smith M.J., Cohen B.G. et Stammerjohn L.W. (1981). “An investigation of health complaints and job stress in video display operations”, Human Factors, vol. 23, p. 387‐400. [CrossRef] [Google Scholar]
  102. Snyder J.L. (2010). “E-mail privacy in the workplace: A boundary regulation perspective”, Journal of Business Communication, vol. 47, no 3, p. 266‐294. [CrossRef] [Google Scholar]
  103. Solove D.J. (2006). “A Taxonomy of privacy”, University of Pennsylvania Law Review, vol. 154, no 3, p. 477‐564. [CrossRef] [Google Scholar]
  104. Spinello R.A. (2000). “Except from Cyberethics: Morality and law in cyberspace”, ACM SIGCAS Computers and Society, vol. 30, no 1, p. 10‐13. [CrossRef] [Google Scholar]
  105. Stahl B. C. (2004). “Information, ethics, and computers: The problem of autonomous moral agents”, Minds and Machines, vol. 14, no 1, p. 67‐83. [CrossRef] [Google Scholar]
  106. Stahl B.C. (2005). Information systems: Critical Perspectives, Routledge, London & New York. [Google Scholar]
  107. Stahl B.C. (2012). “Morality, Ethics, and Reflection: A Categorization of Normative IS Research”, Journal of the Association for Information Systems, vol. 13, no 8, p. 636‐656. [CrossRef] [Google Scholar]
  108. Stahl B.C., Timmermans J. et Mittelstadt B.D. (2016). “The ethics of computing: A survey of the computing-oriented literature”, ACM Computing Surveys (CSUR), vol. 48, no 4. [CrossRef] [Google Scholar]
  109. Steinmetz K. et Gerber J. (2015). “It doesn’t have to be this way: Hacker perspectives on privacy”, Social Justice, vol. 41, no 3, p. 29‐51. [Google Scholar]
  110. Straub D.W. (1990). “Effective IS security: An empirical study”, Information Systems Research, vol. 1, no 3, p. 255‐276. [CrossRef] [Google Scholar]
  111. Taras D.G. et Bennett J.T. (2003). “E-Voice: Power and identity via electronic communication”, Journal of Labor Research, vol. 24, no 1, p. 1‐7. [CrossRef] [Google Scholar]
  112. Tavani H.T. (2011). Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing, John Wiley & Sons ed. [Google Scholar]
  113. Taylor G.S. et Davis J.S. (1989). “Individual privacy and computer-based human resource information systems”, Journal of Business Ethics, vol. 8, no 7, 569‐576. [CrossRef] [Google Scholar]
  114. Taylor M. et Moynihan E. (2002). “Analysing IT ethics”, Systems Research & Behavioral Science, vol. 19, no 1, p. 49‐60. [CrossRef] [Google Scholar]
  115. Urbaczewski A. et Jessup L.M. (2002). “Does Electronic Monitoring of Employee Internet Usage Work?”, Communications of the ACM, vol. 45, no 1, p. 80‐83. [Google Scholar]
  116. Vickers G. (1983). Human Systems are Different, Harper & Row, London. [Google Scholar]
  117. Walsham G. (1996). “Ethical theory, codes of ethics and IS practice”, Information Systems Journal, vol. 6, no 1, p. 69‐81. [CrossRef] [Google Scholar]
  118. Warschauer M. (2003). “Demystifying the digital divide”, Scientific American, vol. 289, no 2, p. 42‐47. [CrossRef] [Google Scholar]
  119. Weckert J. et Adeney D. (1997). Computer and Information Ethics, Greenwood Press, Westport, Connecticut. [Google Scholar]
  120. Westin A.F. (1967). Privacy and Freedom, Atheneum Press, New York. [Google Scholar]
  121. Wu X., Rogerson S. et Fairweather N. (2001). “Being Ethical in Developing Information Systems: An Issue of Methodology or Maturity in Judgment?”, Proceedings of the 34th Hawaii International Conference on Systems Sciences. [Google Scholar]
  122. Zazzau V.E. (2006). “Becoming information literate about Information technology and the ethics of toxic waste”, Libraries and the Academy, vol. 6, no 1, p. 99‐107. [CrossRef] [Google Scholar]

Les statistiques affichées correspondent au cumul d'une part des vues des résumés de l'article et d'autre part des vues et téléchargements de l'article plein-texte (PDF, Full-HTML, ePub... selon les formats disponibles) sur la platefome Vision4Press.

Les statistiques sont disponibles avec un délai de 48 à 96 heures et sont mises à jour quotidiennement en semaine.

Le chargement des statistiques peut être long.