•  85
    A pragmatic evaluation of the theory of information ethics
    Ethics and Information Technology 6 (4): 279-290. 2004.
    It has been argued that moral problems in relation to Information Technology (IT) require new theories of ethics. In recent years, an interesting new theory to address such concerns has been proposed, namely the theory of Information Ethics (IE). Despite the promise of IE, the theory has not enjoyed public discussion. The aim of this paper is to initiate such discussion by critically evaluating the theory of IE
  •  78
    The relevance of different concepts of computer software (henceforth SW) rights is analysed from the viewpoint of divergent sociopolitical doctrines. The question of software rights is considered from the ontological assumptions, on one extreme, to the relevance of current practical applications of SW rights (such as copyright and patent), on the other extreme. It will be argued (from a non-descriptive/non-cognitive account) that the current expression of SW rights in Western societies (namely c…Read more
  •  52
    Unauthorized copying of software: an empirical study of reasons for and against
    with Tero Vartiainen
    Acm Sigcas Computers and Society 37 (1): 30-43. 2007.
    Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the …Read more
  •  32
    A justification for software rights
    Acm Sigcas Computers and Society 36 (3): 11-20. 2006.
    It has been debated whether unauthorized copying of computer software is morally justified and whether developers or software companies can own software and require users to pay for its use. Four views in favour of unauthorized copying of software can be distinguished: 'free software', the landlord analogy, the 'non-exclusiveness argument' and 'it is justified to copy a program that we would never buy'. Considerations regarding these issues can be retraced to the three foundations of rights: inh…Read more
  •  30
    Demystifying the Influential IS Legends of Positivism
    with Aggeliki Tsohou
    Journal of the Association for Information Systems 19 (7): 600-617. 2018.
    Positivism has been used to establish a standard that Information Systems (IS) research must meet to be scientific. According to such positivistic beliefs in IS, scientific research should: 1) be generalizable, 2) focus on stable independent variables, 3) have certain ontological assumptions, and 4) use statistical or quantitative methods rather than qualitative methods. We argue that logical positivist philosophers required none of these. On the contrary, logical positivist philosophers regarde…Read more
  •  24
    Attitudes of sixth form female students toward the IT field
    with Katja Leiviskä
    Acm Sigcas Computers and Society 40 (1): 34-49. 2010.
    It is well known that girls are not interested in computer science, information systems, and software engineering studies. While the underlying reasons for this phenomenon have been studied in the US, Canada, and Australia, only a few studies have been carried out in Europe and in Scandinavia. To fill this gap in the research, we have analyzed the qualitative responses of 64 female sixth form students concerning their attitudes towards studying information technology, including computer science,…Read more
  •  12
    The philosophy of mechanisms has developed rapidly during the last 30 years. As mechanisms-based explanations are often seen as an alternative to nomological, law-based explanations, MBEs could be relevant in IS. We begin by offering a short history of mechanistic philosophy and set out to clarify the contemporary landscape. We then suggest that mechanistic models provide an alternative to variance and process models in IS. Finally, we highlight how MBEs typically contain deliberate misrepresent…Read more
  •  9
    Demystifying the Influential IS Legends of Positivism : Response to Lee’s Commentary
    with Aggeliki Tsohou
    Journal of the Association for Information Systems 21 (6). 2020.
    We respond to Lee’s (forthcoming) commentary on our article “Demystifying the Influential IS Legends of Positivism” (Siponen & Tsohou [S&T], 2018). Lee offers four arguments against our analyses and conclusions in S&T (2018). First, because logical positivism (LP) has been discredited, he contends it cannot be used as a normative standard in IS. We clarify that our conclusions in S&T (2018) point to (1) the lack of justification for certain IS beliefs, and (2) a misunderstanding rather than legi…Read more
  •  5
    Numerous articles in top IS journals note as a limitation and lack of generalizability that their findings are specific to a certain type of technology, culture, and so on. We argue that this generalizability concern is about limited scope. The IS literature notes this preference for generalizability as a characteristic of good science and it is sometimes confused with statistical generalizability. We argue that such generalizability can be in conflict with explanation or prediction accuracy. An…Read more
  •  3
    Guidelines for different qualitative research genres have been proposed in information systems. As these guidelines are outlined for conducting and evaluating good research, studies may be denied publication simply because they do not follow a prescribed methodology. This can result in “checkbox” compliance, where the guidelines become more important than the study. We argue that guidelines can only be used to evaluate what good research is if there is evidence that they lead to certain good res…Read more
  •  2
    Specialisation, by seeking theoretically deeper explanations or more accurate predictions, is common in the sciences. It typically involves splitting, where one model is further divided into several or even hundreds of narrow-scope models. The Information Systems (IS) literature does not discuss such splitting. On the contrary, many seminal IS studies report that a narrow scope is less strong, less interesting, or less useful than a wider scope. In this commentary, we want to raise the awareness…Read more