{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:32:15Z","timestamp":1725517935237},"reference-count":57,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2010,11,16]],"date-time":"2010-11-16T00:00:00Z","timestamp":1289865600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11,16]]},"abstract":"Purpose<\/jats:title>This paper aims to provide insights into the moral values embodied by a popular social networking site (SNS), Facebook.<\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>This study is based upon qualitative fieldwork, involving participant observation, conducted over a two\u2010year period. The authors adopt the position that technology as well as humans has a moral character in order to disclose ethical concerns that are not transparent to users of the site.<\/jats:p><\/jats:sec>Findings<\/jats:title>Much research on the ethics of information systems has focused on the way that people deploy particular technologies, and the consequences arising, with a view to making policy recommendations and ethical interventions. By focusing on technology as a moral actor with reach across and beyond the internet, the authors reveal the complex and diffuse nature of ethical responsibility and the consequent implications for governance of SNS.<\/jats:p><\/jats:sec>Research limitations\/implications<\/jats:title>The authors situate their research in a body of work known as disclosive ethics, and argue for an ongoing process of evaluating SNS to reveal their moral importance. Along with that of other authors in the genre, this work is largely descriptive, but the paper engages with prior research by Brey and Introna to highlight the scope for theory development.<\/jats:p><\/jats:sec>Practical implications<\/jats:title>Governance measures that require the developers of social networking sites to revise their designs fail to address the diffuse nature of ethical responsibility in this case. Such technologies need to be opened up to scrutiny on a regular basis to increase public awareness of the issues and thereby disclose concerns to a wider audience. The authors suggest that there is value in studying the development and use of these technologies in their infancy, or if established, in the experiences of novice users. Furthermore, flash points in technological trajectories can prove useful sites of investigation.<\/jats:p><\/jats:sec>Originality\/value<\/jats:title>Existing research on social networking sites either fails to address ethical concerns head on or adopts a tool view of the technologies so that the focus is on the ethical behaviour of users. The authors focus upon the agency, and hence the moral character, of technology to show both the possibilities for, and limitations of, ethical interventions in such cases.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09593841011087770","type":"journal-article","created":{"date-parts":[[2010,11,6]],"date-time":"2010-11-06T12:03:51Z","timestamp":1289045031000},"page":"290-311","source":"Crossref","is-referenced-by-count":67,"title":["Ethics and social networking sites: a disclosive analysis of Facebook"],"prefix":"10.1108","volume":"23","author":[{"given":"Ben","family":"Light","sequence":"first","affiliation":[]},{"given":"Kathy","family":"McGrath","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020119485970600_b1","doi-asserted-by":"crossref","unstructured":"Ahern, S., Eckles, D., Good, N., King, S., Naaman, M. and Nair, R. (2007), \u201cOver\u2010exposed? Privacy patterns and considerations in online and mobile photo sharing\u201d, in Rosson, M.B. and Gilmore, D. (Eds), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, San Jose, CA, pp. 357\u201066.","DOI":"10.1145\/1240624.1240683"},{"key":"key2022020119485970600_b2","doi-asserted-by":"crossref","unstructured":"Albrechtslund, A. (2007), \u201cEthics and technology design\u201d, Ethics and Information Technology, Vol. 9 No. 1, pp. 63\u201072.","DOI":"10.1007\/s10676-006-9129-8"},{"key":"key2022020119485970600_b3","unstructured":"Bahney, A. (2006), \u201cDon't talk to invisible strangers\u201d, www.nytimes.com\/2006\/03\/09\/fashion\/thursdaystyles\/09parents.html (accessed 26 November 2007)."},{"key":"key2022020119485970600_b4","unstructured":"BBC News (2010), \u201cFacebook murderer to serve at least 35 years\u201d, available at: http:\/\/news.bbc.co.uk\/1\/hi\/england\/wear\/8555221.stm (accessed April 6, 2010)."},{"key":"key2022020119485970600_b5","doi-asserted-by":"crossref","unstructured":"Bell, F. and Adam, A. (2004), \u201cWhatever happened to information systems ethics? Caught between the devil and the deep blue sea\u201d, in Kaplan, B., Truex, D., Wastell, D., Wood\u2010Harper, A.T. and DeGross, J. (Eds), Information Systems Research: Relevant Theory and Informed Practice, Kluwer Academic, Boston, MA, pp. 159\u201074.","DOI":"10.1007\/1-4020-8095-6_10"},{"key":"key2022020119485970600_b6","doi-asserted-by":"crossref","unstructured":"Boyd, D. (2004), \u201cFriendster and publicly articulated social networks\u201d, Proceedings of the Conference on Human Factors and Computing Systems \u2013 CHI2004, Vienna.","DOI":"10.1145\/985921.986043"},{"key":"key2022020119485970600_b7","doi-asserted-by":"crossref","unstructured":"Boyd, D. (2006), \u201cFriends, friendsters, and top 8: writing community into being on social network sites\u201d, First Monday, available at: http:\/\/firstmonday.org\/issues\/issue11_12\/boyd\/index.html.","DOI":"10.5210\/fm.v11i12.1418"},{"key":"key2022020119485970600_b8","doi-asserted-by":"crossref","unstructured":"Boyd, D. (2008a), \u201cFacebook's privacy trainwreck\u201d, Convergence, Vol. 14 No. 1, pp. 13\u201020.","DOI":"10.1177\/1354856507084416"},{"key":"key2022020119485970600_b9","unstructured":"Boyd, D. (2008b), \u201cWhy youth \u2665 social network sites: the role of networked publics in teenage social life\u201d, in Buckingham, D. (Ed.), Youth Identity and Digital Media, MIT Press, Cambridge, MA, pp. 119\u201042."},{"key":"key2022020119485970600_b10","doi-asserted-by":"crossref","unstructured":"Brey, P. (2000a), \u201cDisclosive computer ethics\u201d, Computers and Society, Vol. 30 No. 4, pp. 10\u201016.","DOI":"10.1145\/572260.572264"},{"key":"key2022020119485970600_b11","unstructured":"Brey, P. (2000b), \u201cMethod in computer ethics: towards a multi\u2010level interdisciplinary approach\u201d, Ethics and Information Technology, Vol. 2, pp. 125\u20109."},{"key":"key2022020119485970600_b12","doi-asserted-by":"crossref","unstructured":"Byrne, D. (2007), \u201cPublic discourse, community concerns, and civic engagement: exploring black social networking traditions on BlackPlanet.com\u201d, Journal of Computer\u2010mediated Communication, Vol. 13 No. 1, pp. 319\u201040.","DOI":"10.1111\/j.1083-6101.2007.00398.x"},{"key":"key2022020119485970600_b13","unstructured":"CNET (2008), \u201cExclusive: the next Facebook privacy scandal\u201d, available at: http:\/\/news.cnet.com\/8301\u201010784_3\u20109854409\u20107.html (accessed April 7, 2010)."},{"key":"key2022020119485970600_b14","doi-asserted-by":"crossref","unstructured":"Donath, J. (2007), \u201cSignals in social supernets\u201d, Journal of Computer\u2010mediated Communication, Vol. 13 No. 1, pp. 231\u201051.","DOI":"10.1111\/j.1083-6101.2007.00394.x"},{"key":"key2022020119485970600_b15","unstructured":"Ellison, N.B., Steinfield, C. and Lampe, C. (2006), \u201cSpatially bounded online social networks and social capital: the role of Facebook\u201d, Proceedings of the 56th Annual Conference of the International Communication Association, Dresden."},{"key":"key2022020119485970600_b16","unstructured":"Facebook (2010), available at: www.facebook.com\/press\/info.php?statistics (accessed April 6, 2010)."},{"key":"key2022020119485970600_b17","doi-asserted-by":"crossref","unstructured":"Fernback, J. and Papacharissi, Z. (2007), \u201cOnline privacy as legal safeguard: the relationship among consumer, online portal, and privacy policies\u201d, New Media and Society, Vol. 9 No. 5, pp. 715\u201034.","DOI":"10.1177\/1461444807080336"},{"key":"key2022020119485970600_b18","unstructured":"Foucault, M. (1980), \u201cTruth and power\u201d, in Gordon, C. (Ed.), Power\/Knowledge: Selected Interviews and Other Writings 1972\u201077, Prentice\u2010Hall, New York, NY, pp. 109\u201033."},{"key":"key2022020119485970600_b19","unstructured":"Foucault, M. (1985), The Use of Pleasure: The History of Sexuality, Vol. 2, Penguin, London."},{"key":"key2022020119485970600_b20","unstructured":"Fox News (2007), \u201cCreator of MySpace sex offender database is excop\u201d, Data Expert, available at: www.sentryweb.com\/articles\/myspacefox.pdf (accessed October 28, 2007)."},{"key":"key2022020119485970600_b21","doi-asserted-by":"crossref","unstructured":"Golder, S., Wilkinson, D. and Huberman, B. (2007), \u201cRhythms of social interaction: messaging within a massive online network\u201d, in Steinfield, C., Pentland, B., Ackerman, M. and Contractor, N. (Eds), Proceedings of the 3rd International Conference on Communities and Technologies, Vol. MI, Michigan State University, East Lansing, MI, pp. 41\u201066.","DOI":"10.1007\/978-1-84628-905-7_3"},{"key":"key2022020119485970600_b22","doi-asserted-by":"crossref","unstructured":"Griffiths, M. and Light, B. (2008), \u201cSocial networking and digital gaming media convergence: classification and its consequences for appropriation\u201d, Information Systems Frontiers, Vol. 10 No. 4, pp. 447\u201059.","DOI":"10.1007\/s10796-008-9105-4"},{"key":"key2022020119485970600_b23","doi-asserted-by":"crossref","unstructured":"Gross, R. and Acquisti, A. (2005), \u201cInformation revelation and privacy in online social networks\u201d, in Atluri, V., De Capitani di Vimercati, S. and Dingledine, R. (Eds), Proceedings of the ACM Workshop on Privacy in the Electronic Society, Alexandria, VA, pp. 71\u201080.","DOI":"10.1145\/1102199.1102214"},{"key":"key2022020119485970600_b24","doi-asserted-by":"crossref","unstructured":"Hargittai, E. (2007), \u201cWhose space? Differences among users and non\u2010users of social network sites\u201d, Journal of Computer\u2010mediated Communication, Vol. 13 No. 1, pp. 276\u201097.","DOI":"10.1111\/j.1083-6101.2007.00396.x"},{"key":"key2022020119485970600_b25","doi-asserted-by":"crossref","unstructured":"Introna, L.D. (2005), \u201cDisclosive ethics and information technology: disclosing facial recognition systems\u201d, Ethics and Information Technology, Vol. 7, pp. 75\u201086.","DOI":"10.1007\/s10676-005-4583-2"},{"key":"key2022020119485970600_b26","doi-asserted-by":"crossref","unstructured":"Introna, L.D. (2007), \u201cMaintaining the reversibility of foldings: making the ethics (politics) of information technology visible\u201d, Ethics and Information Technology, Vol. 9 No. 1, pp. 11\u201025.","DOI":"10.1007\/s10676-006-9133-z"},{"key":"key2022020119485970600_b27","doi-asserted-by":"crossref","unstructured":"Ito, M. (2008), \u201cIntroduction\u201d, in Varnelis, K. (Ed.), Networked Publics, The MIT Press, Cambridge, MA, pp. 1\u201014.","DOI":"10.7551\/mitpress\/9780262220859.003.0001"},{"key":"key2022020119485970600_b28","doi-asserted-by":"crossref","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M. and Menczer, F. (2007), \u201cSocial phishing\u201d, Communications of the ACM, Vol. 50 No. 10, pp. 94\u2010100.","DOI":"10.1145\/1290958.1290968"},{"key":"key2022020119485970600_b29","unstructured":"Johnson, D. (2001), Computer Ethics, Prentice\u2010Hall, Upper Saddle River, NJ."},{"key":"key2022020119485970600_b30","doi-asserted-by":"crossref","unstructured":"Joinson, A.N. (2008), \u201cLooking at, looking up or keeping up with people? Motives and use of Facebook\u201d, Proceedings of the 26th Annual SIGCHI Conference on Human Factors in Computing Systems, Florence, pp. 1027\u201036.","DOI":"10.1145\/1357054.1357213"},{"key":"key2022020119485970600_b31","doi-asserted-by":"crossref","unstructured":"Kendall, L. (2007), \u201c\u2018Shout into the wind, and it shouts back\u2019: identity and interactional tensions on LiveJournal\u201d, First Monday, http:\/\/firstmonday.org\/issues\/issue12_9\/kendall\/index.html.","DOI":"10.5210\/fm.v12i9.2004"},{"key":"key2022020119485970600_b32","doi-asserted-by":"crossref","unstructured":"Kim, K.\u2010H. and Yun, H. (2007), \u201cCying for me, cying for us: relational dialectics in a Korean social network site\u201d, Journal of Computer\u2010mediated Communication, Vol. 13 No. 1, pp. 298\u2010318.","DOI":"10.1111\/j.1083-6101.2007.00397.x"},{"key":"key2022020119485970600_b33","doi-asserted-by":"crossref","unstructured":"Krasnova, H., Spiekermann, S., Koroleva, K. and Hildebrand, T. (2010), \u201cOnline social networks: why we disclose\u201d, Journal of Information Technology, Vol. 25, pp. 109\u201025.","DOI":"10.1057\/jit.2010.6"},{"key":"key2022020119485970600_b34","doi-asserted-by":"crossref","unstructured":"Lampe, C., Ellison, N.B. and Steinfield, C. (2006), \u201cA Face(book) in the crowd: social searching vs. social browsing\u201d, Proceedings of the 20th Anniversary Conference on Computer Supported Cooperative Work, Banff, Alberta, pp. 167\u201070.","DOI":"10.1145\/1180875.1180901"},{"key":"key2022020119485970600_b35","doi-asserted-by":"crossref","unstructured":"Lampe, C., Ellison, N.B. and Steinfield, C. (2007), \u201cA familiar Face(book): profile elements as signals in an online social network\u201d, in Rosson, M.B. and Gilmore, D. (Eds), Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, San Jose, CA, pp. 435\u201044.","DOI":"10.1145\/1240624.1240695"},{"key":"key2022020119485970600_b36","doi-asserted-by":"crossref","unstructured":"Lange, P.G. (2007), \u201cPublicly private and privately public: social networking on YouTube\u201d, Journal of Computer\u2010mediated Communication, Vol. 13 No. 1, pp. 361\u201080.","DOI":"10.1111\/j.1083-6101.2007.00400.x"},{"key":"key2022020119485970600_b37","unstructured":"Larsen, M.C. (2007), \u201cUnderstanding social networking: on young people's construction and co\u2010construction of identity online\u201d, paper presented at the Society for Social Studies of Science (4S) Annual Conference, Montreal, October."},{"key":"key2022020119485970600_b38","doi-asserted-by":"crossref","unstructured":"Latour, B. (1999a), \u201cOn recalling ANT\u201d, in Law, J. and Hassard, J. (Eds), Actor Network Theory and After, Blackwell, Oxford, pp. 15\u201025.","DOI":"10.1111\/1467-954X.46.s.2"},{"key":"key2022020119485970600_b39","unstructured":"Latour, B. (1999b), Pandora's Hope: Essays on the Reality of Science Studies, Harvard University Press, Cambridge, MA."},{"key":"key2022020119485970600_b40","doi-asserted-by":"crossref","unstructured":"Latour, B. (2005), Reassembling the Social: An Introduction to Actor\u2010network\u2010theory, Oxford University Press, Oxford.","DOI":"10.1093\/oso\/9780199256044.001.0001"},{"key":"key2022020119485970600_b41","doi-asserted-by":"crossref","unstructured":"Light, B. (2007), \u201cIntroducing masculinity studies to information systems research: the case of Gaydar\u201d, European Journal of Information Systems, Vol. 16 No. 5, pp. 658\u201065.","DOI":"10.1057\/palgrave.ejis.3000709"},{"key":"key2022020119485970600_b42","unstructured":"Light, B. (2009), \u201cGendering social media: shaping masculinities on Gaydar, Facebook and beyond\u201d, paper presented at the 10th Annual Conference of the Association of Internet Researchers (AOIR), Internet Critical, Milwaukee, WI."},{"key":"key2022020119485970600_b43","doi-asserted-by":"crossref","unstructured":"Light, B., Fletcher, G. and Adam, A. (2008), \u201cGay men, Gaydar and the commodification of difference\u201d, Information Technology & People, Vol. 21 No. 3, pp. 300\u201014.","DOI":"10.1108\/09593840810896046"},{"key":"key2022020119485970600_b44","doi-asserted-by":"crossref","unstructured":"Liu, H. (2007), \u201cSocial network profiles as taste performances\u201d, Journal of Computer\u2010mediated Communication, Vol. 13 No. 1, pp. 252\u201075.","DOI":"10.1111\/j.1083-6101.2007.00395.x"},{"key":"key2022020119485970600_b45","doi-asserted-by":"crossref","unstructured":"Magnet, S. (2007), \u201cFeminist sexualities, race and the internet: an investigation of Suicidegirls.com\u201d, New Media and Society, Vol. 9 No. 4, pp. 577\u2010602.","DOI":"10.1177\/1461444807080326"},{"key":"key2022020119485970600_b46","doi-asserted-by":"crossref","unstructured":"Messerly, J. (2007), \u201cDisclosive computer ethics?\u201d, Computers and Society, Vol. 37 No. 1, pp. 18\u201021.","DOI":"10.1145\/1273353.1273355"},{"key":"key2022020119485970600_b47","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H. (2001), \u201cHow computer systems embody values\u201d, Computer, March, pp. 117\u20109.","DOI":"10.1109\/2.910905"},{"key":"key2022020119485970600_b48","doi-asserted-by":"crossref","unstructured":"Orlikowski, W. and Iacono, S. (2001), \u201cDesperately seeking the \u2018IT\u2019 in IT research \u2013 a call to theorizing the IT artifact\u201d, Information Systems Research, Vol. 12 No. 2, pp. 121\u201034.","DOI":"10.1287\/isre.12.2.121.9700"},{"key":"key2022020119485970600_b49","unstructured":"Petersen, S.M. (2008), \u201cLoser generated content: from participation to exploitation\u201d, First Monday, available at: www.uic.edu\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/viewArticle\/2141\/1948."},{"key":"key2022020119485970600_b50","doi-asserted-by":"crossref","unstructured":"R\u00f6hle, T. (2007), \u201cDesperately seeking the consumer: personalized search engines and the commercial exploitation of user data\u201d, First Monday, available at: http:\/\/firstmonday.org\/issues\/issue12_9\/rohle\/index.html.","DOI":"10.5210\/fm.v12i9.2008"},{"key":"key2022020119485970600_b51","unstructured":"Rothberg, S. (2006), \u201cMySpace, Facebook and other social networking sites: friend or foe to employers?\u201d, available at: www.interbiznet.com\/ern\/archives\/060830.html (accessed May 3, 2008)."},{"key":"key2022020119485970600_b52","unstructured":"Rothberg, S. (2008), \u201cDo employers really hire candidates from Facebook and MySpace? FurstPerson\/Sprint does\u201d, vailable at: www.collegerecruiter.com\/weblog\/2008\/04\/do_employers_re.php#more (accessed May 3, 2008)."},{"key":"key2022020119485970600_b53","doi-asserted-by":"crossref","unstructured":"Small, L. (2007), \u201cTheft in a wireless world\u201d, Ethics and Information Technology, Vol. 9 No. 3, pp. 179\u201086.","DOI":"10.1007\/s10676-007-9139-1"},{"key":"key2022020119485970600_b54","unstructured":"Sophos (2007), \u201cSophos Facebook ID probe shows 41% of users happy to reveal all to potential identity thieves\u201d, available at: www.sophos.com\/pressoffice\/news\/articles\/2007\/08\/facebook.html (accessed April 1, 2008)."},{"key":"key2022020119485970600_b55","unstructured":"Sweney, M. and Gosden, E. (2006), \u201cFacebookers protest over privacy\u201d, www.guardian.co.uk\/technology\/2006\/sep\/08\/news.newmedia (accessed January 28, 2008)."},{"key":"key2022020119485970600_b56","doi-asserted-by":"crossref","unstructured":"Tow, W.N.\u2010F.H., Dell, P. and Venable, J. (2010), \u201cUnderstanding information disclosure behaviour in Australian Facebook users\u201d, Journal of Information Technology, Vol. 25, pp. 126\u201036.","DOI":"10.1057\/jit.2010.18"},{"key":"key2022020119485970600_b57","doi-asserted-by":"crossref","unstructured":"Wellman, B. (1996), \u201cAre personal communities local? A Dumptarian consideration\u201d, Social Networks, Vol. 18 No. 4, pp. 347\u201054.","DOI":"10.1016\/0378-8733(95)00282-0"}],"container-title":["Information Technology & People"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09593841011087770","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593841011087770\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593841011087770\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T01:01:24Z","timestamp":1711933284000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593841011087770\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,16]]},"references-count":57,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,11,16]]}},"alternative-id":["10.1108\/09593841011087770"],"URL":"https:\/\/doi.org\/10.1108\/09593841011087770","relation":{},"ISSN":["0959-3845"],"issn-type":[{"value":"0959-3845","type":"print"}],"subject":[],"published":{"date-parts":[[2010,11,16]]}}}