Understanding Information Ethics Practice through the PAPA Framework
DOI:
https://doi.org/10.21834/ebpj.v7iSI10.4103Keywords:
Information Ethics, Library and Information Science, PAPA, Ethical IssuesAbstract
This article discusses the dimension of the PAPA (Privacy, Accuracy, Property, and Accessibility) framework used in information ethics practice in various fields. PAPA framework provides a holistic view of information ethics practice research. The aim is to identify what is the dimension used in PAPA components. An analysis of literature has been performed to capture the dimension and a brief description is presented. The analysis found unique dimensions used, and finally, a Hybrid PAPA framework is illustrated to provide a framework guide for further information ethics research.
References
Abu R., Sabri A.Z.S.A. (2018) Information ethics: Malaysian breach of trust. In: Said R., Mohd Sidek N., Azhar Z., Anuar Kamarudin K. (eds) State-of-the-Art Theories and Empirical Evidence. Springer, Singapore.
Acquisti, A. , & Grossklags, J. (2005). Privacy and Rationality in Individual Decision Making. IEEE Security & Privacy, January/February, pp. 24-30.
Braunstein, Y. M. (1990). Resolving Conflicts between Information Ownership and Intellectual Freedom. Library Trends, 39(1-2), 126-131. Retrieved from www.scopus.com
Chuang, C., & Chen, J. C. (1999). Issues in Information Ethics and Educational Policies for the Coming Age. Journal of Industrial Technology, 15(4), 2-6.
Culnan, M.J. (1983). Environmental Scanning: The Effects of Task Complexity and Source Accessibility on Information Gathering Behavior, 14(2), 194–206.
Date, C.J. (1986). An Introduction to Database Systems (4th ed.). MA: Addison-Wesley Publishing Company, Reading.
Ellis, W. W. (1994). Intellectual Property: Information Ownership in the Electronic Age: Introduction, Overview, and User Needs. Journal of Agricultural and Food Information, 2(1), 45-46. doi:10.1300/J108v02n01_12
Floridi, L. (1999). Information Ethics: On the Theoretical Foundations of Computer Ethics." Ethics and Information Technology, 1(1): 37–56.
Harris, A. L. (2000). IS Ethical Attitudes Among College Students: A Comparative Study. In The Proceedings of the Information Systems Education Conference 2008, 25: 801-807, Philadelphia, PA.
Hauptman, R. (1988). Ethical Challenges in Librarianship. Phoenix, AZ: Oryx Press.Hoq, K.( 2019). Information Ethics and Its Implications for Library and Information Professionals: A Contemporary Analysis. Philosophy and Progress. Vols. LI-LII, January-June, July-December, DOI: http://dx.doi.org/10.3329/pp.v51i1-2.17677
Hauptman, R. (2008). Ethics and Information: An Encyclopedic Overview. Business Information Review,25(4),238–252. https://doi.org/10.1177/0266382108098058
Hersh, M.A. (2003). Ethical Analysis of the Information Society.
Hoq, K. (2019). Information Ethics and Its Implications for Library and Information Professionals: A Contemporary Analysis. Philosophy and Progress. Vols. LI-LII, January- June, July-December, DOI: http://dx.doi.org/10.3329/pp.v51i1-2.17677
Ikokoh, C.E, & Ikonne, C.N. (2021). Ethical Challenges of Information Society in the Twenty-First Century. Journal of Library Services and Technologies, 3(2), 49 – 57.
Ji, D., & Gan, H. (2022). Effects of Providing Total Cost of Ownership Information on Below-40 Young Consumers’ Intent to Purchase an Electric Vehicle: A Case Study in China. Energy Policy, 165 doi:10.1016/j.enpol.2022.112954
Laudon, K.C. Dossier society: Value choices in the design of National Information Systems. Columbia University Press, New York, 1986.
Linowes, D. F. (1989). Privacy in America: Is your private life in the public eye? Urbana, IL: University of Illinois Press.
Lipinski, T. A. (1998). Information Ownership and Control. Retrieved from www.scopus.com Annual Review of Information Science and Technology, 33, Pages 3 – 381998
Kuzu, A. (2009). Problems related to computer ethics: Origins of the problems and suggested solutions. Turkish Online Journal of Educational Technology, 8(2):91-110.
Mason, R. (1986). Four Ethical Issues in the Information Age. Management Information System Quarterly. (10:1). Retrieved from https://www.gdrc.org/info-design/4- ethic.html
Masrom, M., Ismail, Z., Anuar, R.N., Hussein, R., & Mohamed, N. (2011). Analyzing Accuracy and Accessibility in Information and Communication Technology Ethical Scenario Context. American Journal of Economics and Business Administration, 3, 370-376.
Miller, A. (1982). Computers and Privacy in Ethics and the Management of Computer Technology. In W. M. Hoffman, & J. M. Moore (Eds.), Cambridge, MA: Oelgeschlager, Gunn, and Hain Publishers, Inc.
Mrah, I. & Tizaoui, H. (2018). The Rise of Misinformation in the Digital Age: Moroccan Students' Attitudes and Perceptions of Fake News Online. Journal of English Language Teaching and Linguistics. 3. 10.21462/jeltl.v3i2.137.
Pennycook, G., & Rand, D. G. (2022). Accuracy Prompts are a Replicable and Generalizable Approach for Reducing the Spread of Misinformation. Nature Communications, 13(1) doi:10.1038/s41467-022-30073-5
Peslak, A. (2006). PAPA Revisited: A Current Empirical Study of the Mason Framework. Journal of Computer Information Systems, 46(3): 117-123.
Pierri, F., Perry, B. L., DeVerna, M. R., Yang, K. -., Flammini, A., Menczer, F., & Bryden, J. (2022). Online Misinformation is Linked to Early COVID-19 Vaccination Hesitancy and Refusal. Scientific Reports, 12(1) doi:10.1038/s41598-022-10070-w
Ponelis, S. (2013), Ethical Risks of Social Media Use by Academic Libraries Innovation, No.47, December 2013.
Prandi, L., & Primiero, G. (2020). Effects of Misinformation Diffusion during a Pandemic. Applied Network Science, 5(1) doi:10.1007/s41109-020-00327-6
Primiero, G., &Kosolosky, L. (2016). The Semantics of Untrustworthiness. Topoi, 35(1), 253–266.
Reed, C. (2021). Information Ownership in the Cloud. Cloud Computing Law (pp. 145-176) doi:10.1093/oso/9780198716662.003.0005
Safieddine, F., Dordevic, M., & Pourghomi, P. (2018). Spread of Misinformation Online: Simulation Impact of Social Media Newsgroups. Paper presented at the Proceedings of Computing Conference 2017, 2018-January 899-906. doi:10.1109/SAI.2017.8252201 Retrieved from www.scopus.com
Sahid, N., Abdullah Sani, M., Noordin, S., Zaini, M., & Baba, J. (2021). Determinants Factors of Intention to Adopt Big Data Analytics in Malaysian Public Agencies. Journal of Industrial Engineering and Management, 14(2), 269-293. doi:http://dx.doi.org/10.3926/jiem.3334
Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly, 20(2), 167–196. https://doi.org/10.2307/249477
Stone, E. F., Gueutal, G.H., Gardner, D.G. & Mcclure, S. A. (1983). Field Experiment Comparing Information-Privacy Values Beliefs and Attitudes across Several Types of Organizations. Journal of Applied Psychology, 68(3), 459–468.
Sturges, P. (2009). Information Ethics in the Twenty-First Century. Australian Academic & Research Libraries, 40(4), 241–251.
Woodward, B., Martin, T. & Imboden, T. (2010). Expanding and Validation of the APA Framework. Information Systems Educators Conference (ISECON) Proceedings,27(1321). Nashville, Tennessee, USA. Retrieved on November 12, 2015, from www.aitp-edsig.org /proc.isecon.org
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Kasmarini Baharuddin, A'dillah Mustafa, Siti Nurul Maryam Abdullah, Khalid Ayuba Abdullahi
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.