<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "http://jats.nlm.nih.gov/publishing/1.1d1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">AC</journal-id>
<journal-title-group>
<journal-title>Acta Commercii - Independent Research Journal in the Management Sciences</journal-title>
</journal-title-group>
<issn pub-type="ppub">2413-1903</issn>
<issn pub-type="epub">1684-1999</issn>
<publisher>
<publisher-name>AOSIS</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">AC-26-1503</article-id>
<article-id pub-id-type="doi">10.4102/ac.v26i1.1503</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>A conceptual framework for ethical emerging digital technologies: A South African publicsector perspective</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-6536-927X</contrib-id>
<name>
<surname>Baloyi</surname>
<given-names>Wiston M.</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-3296-7374</contrib-id>
<name>
<surname>Meyer</surname>
<given-names>Natanya</given-names>
</name>
<xref ref-type="aff" rid="AF0002">2</xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-2871-4665</contrib-id>
<name>
<surname>Rossouw</surname>
<given-names>Dirk</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<aff id="AF0001"><label>1</label>Department of Business Management, College of Business and Economics, University of Johannesburg, Johannesburg, South Africa</aff>
<aff id="AF0002"><label>2</label>SARChI in Entrepreneurship Education, Department of Business Management, College of Business and Economics, University of Johannesburg, Johannesburg, South Africa</aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><bold>Corresponding author:</bold> Dirk Rossouw, <email xlink:href="drossouw@uj.ac.za">drossouw@uj.ac.za</email></corresp>
</author-notes>
<pub-date pub-type="epub"><day>06</day><month>03</month><year>2026</year></pub-date>
<pub-date pub-type="collection"><year>2026</year></pub-date>
<volume>26</volume>
<issue>1</issue>
<elocation-id>1503</elocation-id>
<history>
<date date-type="received"><day>10</day><month>09</month><year>2025</year></date>
<date date-type="accepted"><day>04</day><month>12</month><year>2025</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2026. The Authors</copyright-statement>
<copyright-year>2026</copyright-year>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>Licensee: AOSIS. This work is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.</license-p>
</license>
</permissions>
<abstract>
<sec id="st1">
<title>Orientation</title>
<p>Emerging digital technologies (EDTs) have drastically reshaped global public services. With the growing uptake of EDTs, many governments have experienced increased efficiency, transparency and greater accountability. Contrariwise, the proliferating adoption of EDTs has always been triggered by ethical concerns and dilemmas (e.g. privacy and security) in their application.</p>
</sec>
<sec id="st2">
<title>Research purpose</title>
<p>The primary objective of this study was to present a conceptual framework for ethical EDTs of the South African public sector.</p>
</sec>
<sec id="st3">
<title>Motivation for the study</title>
<p>With the changing business setting, integrating ethics into EDTs becomes imperative for the South African public sector to render efficient and streamlined services to its citizens.</p>
</sec>
<sec id="st4">
<title>Research design, approach and method</title>
<p>This study adopted a constructivist worldview and a qualitative approach using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) research technique.</p>
</sec>
<sec id="st5">
<title>Main findings</title>
<p>The study discovered the benefits of incorporating ethics into EDTs, including reduced cyberattacks, diminished bureaucracy, increased efficiency and enhanced productivity.</p>
</sec>
<sec id="st6">
<title>Practical/managerial implications</title>
<p>By developing a conceptual framework for EDTs, this study sought to contribute to policymaking and decision-making while advancing knowledge and providing far-reaching solutions to multifaceted social challenges in a turbulent business setting.</p>
</sec>
<sec id="st7">
<title>Contribution/value-add</title>
<p>This study provides an insight by critically appraising the literature and devising a conceptual framework, which is paramount in exploiting best practices of EDTs while considering critical ethical standards in strategic decision-making processes.</p>
</sec>
</abstract>
<kwd-group>
<kwd>ethics</kwd>
<kwd>emerging digital technologies</kwd>
<kwd>ethics framework</kwd>
<kwd>conceptual framework</kwd>
<kwd>public sector</kwd>
<kwd>public administration</kwd>
<kwd>PRISMA</kwd>
</kwd-group>
<funding-group>
<funding-statement><bold>Funding information</bold> The authors received no financial support for the research, authorship and/or publication of this article.</funding-statement>
</funding-group>
</article-meta>
</front>
<body>
<sec id="s0001">
<title>Introduction</title>
<p>Several public sectors across the globe are increasingly adopting emerging digital technologies (EDTs), also referred to as the Fourth Industrial Revolution (4IR), to deliver basic services to their citizens. These essential services include, but are not limited to, public health, education, municipal services, human settlements, car licensing and tax returns. Scholars in academic discourse have identified the significance of EDTs (i.e. artificial intelligence [AI], the Internet of Things [IoT], big data, cloud computing and virtual platforms) in fast-tracking public service delivery in the turbulent digital economy (Bajpai &#x0026; Singh <xref ref-type="bibr" rid="CIT0007">2024</xref>). However, these EDTs are susceptible to ethical issues (data privacy and security), the most significant challenge impacting their application in the public sector. While ethics in EDTs remains a considerable concern for academics and governments, the public sector struggles to assimilate these fundamental ethical factors into EDTs to enhance their operations (Madan &#x0026; Ashok <xref ref-type="bibr" rid="CIT0034">2023</xref>), particularly in emerging economies like South Africa (Baloyi <xref ref-type="bibr" rid="CIT0008">2025</xref>). For instance, cyberattacks as a form of ethical issues have been pervasive in the public sector in South Africa (Dagada <xref ref-type="bibr" rid="CIT0014">2024</xref>). To support this statement, in 2024, the Companies and Intellectual Property Commission (CIPC), a State-Owned Enterprise within the Department of Trade, Industry and Competition, in charge of company registration, was targeted by a ransomware attack demanding R1.9 million (Siphambili et al. <xref ref-type="bibr" rid="CIT0050">2024</xref>). Thus, research is necessary to delve into pertinent ethical issues that impact EDTs in the South African public sector and to develop a conceptual framework that devises strategies to mitigate the crucial and recurring ethical problems.</p>
<p>Like many other African countries, South Africa, as an emerging economy, has made significant developments in the adoption of EDTs, despite typical and persistent hurdles (e.g. the digital divide and limited digital literacy) (Worku <xref ref-type="bibr" rid="CIT0056">2024</xref>). The prevalence of EDTs in rendering public service delivery in South Africa has been attained through e-government platforms (Baloyi &#x0026; Beyers <xref ref-type="bibr" rid="CIT0009">2019</xref>). These platforms include, among others, the South African Revenue Service (SARS) e-filing system, the Department of Home Affairs&#x2019; biometric identification system, the Department of Transport&#x2019;s Electronic National Administration Traffic Information System (e-NATIS) and the National Treasury&#x2019;s e-tendering system. To a great extent, the country&#x2019;s use of these platforms into administrative processes has significantly improved the interactions between the government and stakeholders (Jakoet-Salie <xref ref-type="bibr" rid="CIT0029">2020</xref>) and boosted economic growth (Masilela &#x0026; Nel-Sanders <xref ref-type="bibr" rid="CIT0037">2023</xref>). Apart from the digital success stories emphasised, e-government platforms do not only create advantages for their users but also present drawbacks in their application, such as ethical issues.</p>
<p>One of the most pressing ethical issues impacting public sectors regarding the efficient application of these technologies is the absence <italic>of data protection</italic>, which often leads to cyberattacks (Dagada <xref ref-type="bibr" rid="CIT0014">2024</xref>). For instance, although the South African government effectively adopts emerging technologies, such as big data and analytics, to store and manage vast datasets (e.g. census statistics), the need for regulatory frameworks and control mechanisms on data flow raises ethical concerns for users. To this effect, while EDTs accelerate public services, they have also been interlocked with ethical impediments such as data breaches and cybercrimes (Ionescu <xref ref-type="bibr" rid="CIT0028">2025</xref>). With the burgeoning use of 4IR by citizens and stakeholders in the South African public sector, the ability to integrate ethics into these technologies cannot be overstated (Baloyi <xref ref-type="bibr" rid="CIT0008">2025</xref>). Moreover, considering the need to gear towards attaining the National Development Plan&#x2019;s Sustainable Development Goals Vision 2030 and other envisaged strategic objectives, the South African public sector should gear towards accelerating EDTs to thrive in the digital landscape.</p>
<sec id="s20002">
<title>Problem statement</title>
<p>Research has been conducted on the link between ethics and EDTs in the public sector (Madan &#x0026; Ashok <xref ref-type="bibr" rid="CIT0034">2023</xref>). However, most studies are context dependent, focusing on ethics policy development and implementation within their specific settings (for example, James <xref ref-type="bibr" rid="CIT0030">2024</xref>). In other words, the contextual factors, such as the scope and extent of the governments in addressing ethical issues, cannot be viewed as a one-size-fits-all approach, as the South African public sector differs from other regions. That said, EDTs of the public sector in South Africa are unique and can demand dissimilar approaches in devising ethical solutions. Considering the scholarly debates, the scarcity of ethical frameworks guiding the uptake of EDTs in the South African public sector has been identified as a gap leading to this research (Department of Communications and Digital Technologies [DCDT] <xref ref-type="bibr" rid="CIT0016">2024a</xref>, <xref ref-type="bibr" rid="CIT0017">2024b</xref>; Mkhatshwa &#x0026; Mawela <xref ref-type="bibr" rid="CIT0040">2023</xref>). Moreover, as the government in South Africa is at the core of service delivery in the technology-driven economy, the influence of ethics on EDTs cannot be overstretched if the innovative ways to render efficient services to the citizens and other stakeholders have to be improved.</p>
</sec>
<sec id="s20003">
<title>Research objectives</title>
<p>Based on the problem above, the primary objective is to present a conceptual framework for ethical EDTs of the South African public sector. To achieve the primary objective, the following secondary objectives are:</p>
<list list-type="bullet">
<list-item><p>To examine the benefits of integrating ethics into the EDTs of the public sector.</p></list-item>
<list-item><p>To delve into the ethical concerns of various EDTs for the public sector.</p></list-item>
</list>
</sec>
</sec>
<sec id="s0004">
<title>Literature review</title>
<p>This section discusses literature about ethics and EDTs in the public sector. It begins with underscoring the context of the study, followed by the theories that underpin it.</p>
<sec id="s20005">
<title>The context of the study</title>
<p>South Africa became a free country after the demise of the apartheid era in 1994. With the introduction of the new public administration, e-government strategies were implemented in 1999 through the State Information Technology Agency (SITA), an agency responsible for accelerating digital transformation in South Africa (Jakoet-Salie <xref ref-type="bibr" rid="CIT0029">2020</xref>; Komna &#x0026; Mpungose <xref ref-type="bibr" rid="CIT0032">2024</xref>). Although digital government in South Africa has been commended for its capability to improve efficiency, modernise internal processes, diminish costs and enhance service delivery, it has also been besieged with the contextual determinants hampering its full realisation, such as digital skills deficit, ethical issues (data privacy, security, accountability and transparency), limited digital infrastructure and the lack of appropriate regulatory frameworks guiding digital technologies, <italic>inter alia</italic> (Nkgapele <xref ref-type="bibr" rid="CIT0043">2024</xref>; Worku <xref ref-type="bibr" rid="CIT0056">2024</xref>). For instance, while the country has taken drastic steps to embrace digitalised and automated services throughout, the socio-economic disparities (e.g. poverty, unemployment and inequality) continue to exacerbate the <italic>status quo</italic>.</p>
<p>Digital policy initiatives have recently been undertaken to respond to the ever-evolving business environment. For example, the &#x2018;Draft Digital Government Policy Framework&#x2019; was introduced to facilitate the development and implementation of EDTs in the public sector, even though it has not yet been endorsed by the South African parliament (Department of Public Service and Administration [DPSA] <xref ref-type="bibr" rid="CIT0018">2024</xref>). On the other hand, the &#x2018;National Data and Cloud Policy Framework&#x2019; was instituted to tackle the burgeoning necessity to reshape digital government models and administer vast data through cutting-edge and emerging technologies, such as cloud computing (DCDT <xref ref-type="bibr" rid="CIT0016">2024a</xref>). Furthermore, the South African government has also published the &#x2018;South African National Artificial Intelligence Policy Framework&#x2019;, with the view to enhance the assimilation of AI-based technologies (e.g. machine learning algorithms, natural language processing, virtual assistants, etc.) into the internal processes of different departments while improving the health of the citizens and other stakeholders in the digital epoch (DCDT <xref ref-type="bibr" rid="CIT0015">2023</xref>). To this end, however, apart from the &#x2018;National Data and Cloud Policy Framework&#x2019; approved by the Minister of DCDT, all other policies underscored above are still being drafted. Furthermore, notwithstanding the enactment of legislative frameworks such as the <italic>Protection of Personal Information Act (PoPIA) of 2013</italic> and the Electronic Communications and Transactions Act (ECTA) of 2002, among others, they are said to be incompatible with the EDTs (Mtuze &#x0026; Morige <xref ref-type="bibr" rid="CIT0042">2024</xref>).</p>
</sec>
<sec id="s20006">
<title>Ethical theories underpinning this study</title>
<p>It is crucial to indicate that issues about the moral consequences of EDTs are not novel; instead, they have proliferated as those technologies are continuously becoming pervasive in the digital realm. To this end, scholarly discourse has reflected on the three ethical frameworks, namely: utilitarianism, deontology and virtue ethics, also referred to as &#x2018;the big three&#x2019;, to validate the adoption and implementation of technologies through ethics in diverse sectors (Dra&#x0161;&#x010D;ek, Rejc Buhovac &#x0026; Mesner Andol&#x0161;ek <xref ref-type="bibr" rid="CIT0021">2021</xref>; Farayola &#x0026; Olorunfemi <xref ref-type="bibr" rid="CIT0024">2024</xref>). That being the case, normative ethical theories have been prevalent in making sound ethical decision-making for appraising technological choices envisaged by the organisation (Bednar &#x0026; Spiekermann <xref ref-type="bibr" rid="CIT0011">2024</xref>). Apart from that, these frameworks have been pivotal in providing the rules of how individuals should conduct themselves. The frameworks are critical in policy formulation and decision-making processes in different areas where technology adoption is prevalent (Bajpai &#x0026; Singh <xref ref-type="bibr" rid="CIT0007">2024</xref>). Primarily, as these normative theories present a unique viewpoint and the requirements for appraising moral obligations and ascertaining actions of individuals, they are relevant and feasible in shaping the ethics of EDTs in this study.</p>
<p>Jeremy Bentham&#x2019;s utilitarianism, as a form of consequentialist ethical theories within moral philosophy, is an outcome-based approach that centres on the outcomes or implications of the conduct to ascertain the moral value of individuals (Akhundov <xref ref-type="bibr" rid="CIT0003">2025</xref>). Even though several utilitarian ethical guidelines have been explored in the corpus of academic discourse, the focal points of these guidelines are based on Bentham&#x2019;s framework: amplifying utility, broadening the general good and prioritising public pleasure (Bednar &#x0026; Spiekermann <xref ref-type="bibr" rid="CIT0011">2024</xref>). Specifically, the classic utilitarianism by Bentham considers utility with reference to excitement or pleasure. One of the advantages of the utilitarian stance is that it provides a tangible approach to determining the morally correct course of action (Tsou &#x0026; Walsh <xref ref-type="bibr" rid="CIT0051">2023</xref>). Utilitarianism is segregated into two features that emphasise the implications of actions and rules: Act and Rule Utilitarianism. While Act Utilitarianism entails that &#x2018;actions that maximise utility are morally good&#x2019;, Rule Utilitarianism, on the other hand, corroborates &#x2018;the rules that maximise utility are morally good&#x2019; (Tsou &#x0026; Walsh <xref ref-type="bibr" rid="CIT0051">2023</xref>:2). In this study, the utilitarian stance is based on the feasibility of generating rewards on a large scale through the application of EDTs in the public sector. This implies improving the overall well-being of humans, despite potential adverse effects for certain groups of individuals.</p>
<p>Immanuel Kant&#x2019;s worldview, deontology ethics, is a duty-based ethical theory that emphasises moral obligations and principles governing individuals&#x2019; conduct as opposed to the implications of actions when ascertaining right or wrongdoings (Bednar &#x0026; Spiekermann <xref ref-type="bibr" rid="CIT0011">2024</xref>). The individuals&#x2019; actions are weighed on the basis of their compliance with moral obligations and principles, notwithstanding the consequences brought about by those actions. Broadly, Kant&#x2019;s deontological philosophical reasoning believes that particular actions are inherently and ethically binding, tolerable or intolerable, irrespective of the resulting repercussions that may arise from the outcomes of those actions (Dra&#x0161;&#x010D;ek et al. <xref ref-type="bibr" rid="CIT0021">2021</xref>; Farayola &#x0026; Olorunfemi <xref ref-type="bibr" rid="CIT0024">2024</xref>). That said, the driving factors of the deontological viewpoint that are eminent for providing regulation on ethical procedure, autonomous of the implications thereof, are duties, moralities, customs, respect for individuals and doctrines of justice. In the context of this study, however, a deontological stance is imperative in ensuring that adherence to ethical duties and standards is observed while aligning EDTs with the moral obligations in their development and use, such as upholding data privacy, security and fairness.</p>
<p>As one of the classic and widely applied theories in technological environment, Aristotle&#x2019;s virtue ethics is a character-based ethical theory that is fundamental in nurturing decent character attributes in individuals, such as trustworthiness, courage and compassion (Akhundov <xref ref-type="bibr" rid="CIT0003">2025</xref>). While virtues are deeply embedded in the traits and conduct of individuals, they can contribute to moral success within the entire society. Furthermore, although individuals have multifaceted intellectual capacities, they require strong personal qualities to behave well, such as empathy, joy, ambition, truthfulness, kindness and love, <italic>inter alia</italic> (Tsou &#x0026; Walsh <xref ref-type="bibr" rid="CIT0051">2023</xref>). It is argued that considering virtue ethical concerns in the developmental stage of EDTs can profoundly expedite individuals to take advantage of those EDTs for their personal growth while maintaining the consequences thereof (Bednar &#x0026; Spiekermann <xref ref-type="bibr" rid="CIT0011">2024</xref>). This assertion is consistent with the views of Akhundov (<xref ref-type="bibr" rid="CIT0003">2025</xref>), who corroborates that as Aristotle&#x2019;s virtue ethics has been critical in reinforcing innovativeness and advancement in the technological milieu, it has robustly contributed to assimilating ethical concerns resulting from the uptake of EDTs.</p>
<p>The feasibility of considering these renowned normative theories in this study lies in the urgent necessity to ethically align EDTs with the processes of the South African public sector, which is vital to circumvent unethical conduct while utilising those technologies. Aside from that, with novel technologies influencing individuals&#x2019; moralities and the rising ethical conundrums permeating the public sector, the integration of the big three into the systems and workflows of the South African public sector arguably becomes non-trivial for enhancing their responsible use. This can accelerate an online and efficient public services to citizens, particularly for those situated in urban and suburban areas across the country.</p>
</sec>
<sec id="s20007">
<title>Emerging digital technologies in the public sector</title>
<p>Emerging digital technologies encompass the ubiquitous technologies (e.g. AI, big data and cloud computing) that are essential in the public sector nowadays, and their actual usage profoundly affects the socio-economic facets of users (Valle-Cruz &#x0026; Garc&#x00ED;a-Contreras <xref ref-type="bibr" rid="CIT0055">2025</xref>). These technologies are broadly novel, and some are yet to be realised, but they may also be considered mature technologies demanding new applications (Udo et al. <xref ref-type="bibr" rid="CIT0052">2024</xref>). In South Africa, the public sector includes the three spheres of government (i.e. national departments, provincial departments and local governments) and public entities. Succinctly, the public sector strives to provide excellent services (e.g. health, education, water, municipal services, welfare, agriculture, transport, safety, human settlements, sports and roads) while ensuring greater accountability, transparency and responsibility from general public servants and executives.</p>
<p>Emerging digital technologies by the public sector have gained popularity in research and practice (Mergel et al. <xref ref-type="bibr" rid="CIT0038">2023</xref>; Mkhatshwa &#x0026; Mawela <xref ref-type="bibr" rid="CIT0040">2023</xref>). With most public sectors across the globe adopting EDTs to serve their people, service delivery has significantly improved. For instance, public health professionals can identify health-related hazards (e.g. obesity leading to high blood pressure) and expedite patient file processing using AI-enabled systems (Alhosani &#x0026; Alhashmi <xref ref-type="bibr" rid="CIT0004">2024</xref>). Most imperatively, AI has substantially enhanced healthcare services. Although most EDTs (e.g. AI) in the public sector are at the embryonic stage and opaque, particularly in emerging economies like South Africa (Baloyi <xref ref-type="bibr" rid="CIT0008">2025</xref>; Worku <xref ref-type="bibr" rid="CIT0056">2024</xref>), the advanced economy countries have reaped the potential benefits resulting from their application, such as cost savings, efficiency and transparency (Saheb &#x0026; Saheb <xref ref-type="bibr" rid="CIT0049">2024</xref>; United Nations <xref ref-type="bibr" rid="CIT0054">2024</xref>).</p>
<p>Ethics play an integral role in contemporary business and have always been at the hub of humanity as a substantial facet of good governance. Several studies have focused on investigating the ethics guiding the implementation of EDTs in the public sector. <xref ref-type="table" rid="T0001">Table 1</xref> provides an overview of those studies.</p>
<table-wrap id="T0001">
<label>TABLE 1</label>
<caption><p>Ethical frameworks for emerging digital technologies.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Author</th>
<th valign="top" align="left">Objective</th>
<th valign="top" align="left">EDT</th>
<th valign="top" align="left">Ethical concerns</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Valle-Cruz and Garc&#x00ED;a-Contreras (<xref ref-type="bibr" rid="CIT0055">2025</xref>).</td>
<td align="left">The study probes the integration of AI-enabled changes and intelligent data management into the value chain activities of the public administration.</td>
<td align="left">AI</td>
<td align="left">Data privacy, transparency, accountability, security and regulatory impact.</td>
</tr>
<tr>
<td align="left">Ukeje, Gutierrez and Petrova (<xref ref-type="bibr" rid="CIT0053">2024</xref>)</td>
<td align="left">The study examines the obstacles associated with data security and privacy regarding the public sector&#x2019;s cloud computing adoption.</td>
<td align="left">Cloud computing</td>
<td align="left">Data security, privacy and transparency.</td>
</tr>
<tr>
<td align="left">James (<xref ref-type="bibr" rid="CIT0030">2024</xref>)</td>
<td align="left">The study delves into the ethical and legal concerns of big data and AI in the United States public sector.</td>
<td align="left">Big data</td>
<td align="left">Privacy concerns, consent issues, transparency, bias, fairness and discrimination.</td>
</tr>
<tr>
<td align="left">Abdullah Sani and Jaafar (<xref ref-type="bibr" rid="CIT0001">2025</xref>)</td>
<td align="left">The study investigates the enablers and constraints of the IoT in the public sector by delineating contemporary trends and patterns.</td>
<td align="left">The IoT</td>
<td align="left">Data security, privacy, data integrity, public trust and transparency.</td>
</tr>
<tr>
<td align="left">Bawole and Langnel (<xref ref-type="bibr" rid="CIT0010">2023</xref>)</td>
<td align="left">The study explores the Ghanaian public sector reforms that strengthened business continuity in the digital realm during the pandemic era.</td>
<td align="left">Virtual platforms</td>
<td align="left">Data security, human threats and cybersecurity concerns.</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>Note: See full reference list of Baloyi, W.M., Meyer, N. &#x0026; Rossouw, D., 2026, &#x2018;A conceptual framework for ethical emerging digital technologies: A South African public sector perspective&#x2019;, <italic>Acta Commercii</italic> 26(1), a1503. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/ac.v26i1.1503">https://doi.org/10.4102/ac.v26i1.1503</ext-link></p></fn>
<fn><p>EDT, emerging digital technology; AI, artificial intelligence; IoT, Internet of Things.</p></fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="s20008">
<title>Cases of cyberattack incidents in the South African public sector</title>
<p>More than ever before, cyberattack activities and exploitations are becoming increasingly prevalent worldwide (Dagada <xref ref-type="bibr" rid="CIT0014">2024</xref>), not only by compromising confidential personal information but also by eroding public trust in the delivery of digital services (Baloyi <xref ref-type="bibr" rid="CIT0008">2025</xref>). While the recognition of diverse EDTs (including AI-related technologies) is proliferating at a rapid pace, cyberattacks are also increasingly penetrating the public administration in emerging economies because of the lack of robust systems (cybersecurity) that address ethical issues (Ukeje et al. <xref ref-type="bibr" rid="CIT0053">2024</xref>; United Nations <xref ref-type="bibr" rid="CIT0054">2024</xref>). Most African countries are beleaguered by persistent cybercrime events, disrupting the efficient use of EDTs (Henrico &#x0026; Els <xref ref-type="bibr" rid="CIT0026">2025</xref>). That being the case, however, several cases of cyberattacks have occurred in the South African public sector, compromising service delivery at different public organisations and left those institutions in dire situation. The following serves as an example:</p>
<p>A study by Pillay (<xref ref-type="bibr" rid="CIT0047">2024</xref>) and Cassim and Chapanduka (<xref ref-type="bibr" rid="CIT0013">2024</xref>) focused on exploring ransomware (known as BlackSuit) cyberattacks targeting the National Health Laboratory Service (NHLS), a public entity within the Department of Health, in June 2024. Notably, the incident has harshly interrupted the core business function within the public entity, resulting in inaccessible patient electronic samples and, consequently, the manual processing of information. To this end, doctors were unable to access patients&#x2019; data (such as laboratory results) because of encrypted files. The public entity did not even have a contingency (backup) plan to cater for this type of cyberattack. Regrettably, this has left service delivery in a devastating and vulnerable situation across the country. As the disruptions to core mandates (i.e. staggered services) within the NHLS have been imminent, the institution has incurred a significant financial loss.</p>
<p>On the other hand, Henrico and Els (<xref ref-type="bibr" rid="CIT0026">2025</xref>) conducted research on the legal repercussions of cyberattacks happening in the South African context. Their study critically evaluated the legal obstacles and geopolitical issues associated with cyberattacks related to digital technologies while reflecting on the most recent cyberattacks that have occurred in the South African public sector. For example, they stated that prominent cyber events targeting the public sector and entities including &#x2018;City of Johannesburg, Transnet and the Department of Justice and Constitutional Development [DoJCD]&#x2019; have been subjected to constant ransomware attacks, thus becoming a playground for cybercriminals and technocrats in the digital environment. The authors suggested a resilient system of cybersecurity and binding regulatory frameworks to not only enhance the sustainability of digital technologies but also alleviate the perils associated with recurring cyber terrorists emanating from both local and global domains. Although the State Security Agency of South Africa initiated the development and implementation of the National Cybersecurity Policy Framework in 2015, with the intention of holistically advancing cybersecurity procedures, there are still flaws in the effective application of the policy (Henrico &#x0026; Els <xref ref-type="bibr" rid="CIT0026">2025</xref>).</p>
<p>In addition to cyberattack incidents, Siphambili et al. (<xref ref-type="bibr" rid="CIT0050">2024</xref>) conducted a systematic review of the South African public sector&#x2019;s capacity to tackle ransomware cyberattacks. Their study comprehensively assessed the country&#x2019;s readiness for cyberattacks and proposed remedial actions to address the persistent challenge. The study found that, despite measures taken to address persistent cyber threats, the South African public sector and entities have remained vulnerable to multiple ransomware attacks, thereby derailing the delivery of effective public services to citizens. Altogether, their study has identified approximately ten incidents of cyberattacks that have occurred in the South African public sector since 2019, as illustrated sequentially in <xref ref-type="fig" rid="F0001">Figure 1</xref>.</p>
<fig id="F0001">
<label>FIGURE 1</label>
<caption><p>Timeline of ransom attacks on public sector organisations.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="AC-26-1503-g001.tif"/>
</fig>
</sec>
</sec>
<sec id="s0009">
<title>Research methods and design</title>
<p>Underpinned by an interpretivist philosophy, this study applies a qualitative approach using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) strategy (Page et al. <xref ref-type="bibr" rid="CIT0046">2021</xref>) to probe ethics for EDTs in the public sector. Although the PRISMA strategy has been popularly employed in health research (Page et al. <xref ref-type="bibr" rid="CIT0046">2021</xref>), it has also been extensively used in social sciences research, especially in the technology context (Ashok et al. <xref ref-type="bibr" rid="CIT0006">2022</xref>; Madan &#x0026; Ashok <xref ref-type="bibr" rid="CIT0034">2023</xref>; Ukeje et al. <xref ref-type="bibr" rid="CIT0053">2024</xref>). The purpose of the PRISMA was to perform a thematic analysis of the existing theory to achieve saturation on the ethical EDTs in the public sector. Briefly, the scholarly debates on EDTs (i.e. peer-reviewed journal articles, conference papers and book chapters) and the grey literature, which implies synthesising government publications, were also considered in this study. To this effect, as a most reliable research technique and constructive process, the PRISMA method enables researchers to derive the fundamental meanings and themes from the studies consulted. The advantages of using systematic analysis as identified from the literature include: (1) it enables researchers to save time and costs associated with conducting the field research, (2) it provides constancy of the data gathered, (3) it ensures credibility and reliability of data and (4) as the method is unobtrusive, it circumvents interviewer prejudice as the data are readily available in the public realm (Morgan <xref ref-type="bibr" rid="CIT0041">2022</xref>).</p>
<sec id="s20010">
<title>Identification</title>
<p>While the PRISMA strategy was deemed pertinent to this study, the primary search of the studies commenced with a wide-ranging detection of the topical matter (i.e. ethics and EDTs in the public sector) aligned to the study purpose. This study considered peer-reviewed journal articles, conference papers, book chapters and government reports. The literature was extracted from the Web of Science (WoS) and ScienceDirect databases. The keywords &#x2018;ethics&#x2019;, &#x2018;emerging digital technologies&#x2019;, &#x2018;emerging technologies&#x2019;, &#x2018;ethical framework&#x2019;, &#x2018;public service&#x2019;, &#x2018;service delivery&#x2019;, &#x2018;public sector&#x2019; and &#x2018;public administration&#x2019; were searched on these reliable databases. The rationale for considering these renowned databases is their extensive coverage of information systems (IS) research. Only the studies (peer-reviewed journal articles, conference papers, book chapters and grey literature) published within 4 years (ranging from 2022 to 2025) were considered in the study.</p>
</sec>
<sec id="s20011">
<title>Screening</title>
<p>After a comprehensive search on the WoS and ScienceDirect databases, the studies were rigorously reviewed by reading the abstract to determine their relevance and contribution to this study. Moreover, a thorough and systematic analysis was conducted to detect relevant themes and patterns. Although themes were extracted and inferred based on scholarly debates and recurrent terminologies from the literature, the authors ensured alignment with the primary aim of this study. It is argued that while the researcher scrutinises the extracted literature of information (e.g. journal articles), they can authenticate the results by exploring meticulously and, as such, mitigating the repercussions of potential prejudice that can arise in that study (Morgan <xref ref-type="bibr" rid="CIT0041">2022</xref>). To enhance the reliability of the data collected in the screening process, two independent assessors were assigned to appraise the studies as a strategy to diminish bias in the selection process. Furthermore, studies were analysed to detect relationships and discrepancies that may exist between the recognised themes and findings that were produced in this study.</p>
</sec>
<sec id="s20012">
<title>Ethical considerations</title>
<p>The Department of Business Management Research Ethics Committee at the University of Johannesburg has granted ethical clearance on 01 November 2024 for a period of 3 years. The ethics waiver number is 24SOM/BM82, and the procedures in this study were aligned with the 1964 Helsinki Declaration and its later amendments or comparable ethical standards.</p>
</sec>
</sec>
<sec id="s0013">
<title>Results</title>
<p>The comprehensive search process yielded a total of 1231 studies. The outcome from the PRISMA reflects WoS (<italic>N</italic> = 783) and ScienceDirect (<italic>N</italic> = 448) as depicted in <xref ref-type="fig" rid="F0002">Figure 2</xref>. Of the 1231 studies detected, the authors noted that the eligibility criteria were necessary. They processed the existing data by eliminating non-abstract, non-English, identical and unsuitable studies, therefore leading to 34 studies being eligible for the systematic analysis (see the stages below), excluding grey literature. Most importantly, only studies on EDTs (i.e. AI, the IoT, big data, cloud computing and virtual platforms) that are dedicated to the public sector context were included in the analysis to ensure data accuracy. To this end, although, most of the studies contemplated were peer-reviewed journal articles.</p>
<fig id="F0002">
<label>FIGURE 2</label>
<caption><p>Preferred reporting items for systematic reviews and meta-analysis flow diagram.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="AC-26-1503-g002.tif"/>
</fig>
<sec id="s20014">
<title>Data synthesis and quality assessment</title>
<p>After the study selection process, the authors evaluated the selected literature by reading the titles and abstracts to determine their quality. The process has helped the authors to consider studies that could make a meaningful contribution to the study. Additionally, the activity further enabled authors to evaluate the pertinence and quality of the selected studies. As pinpointed earlier, duplicates and non-English literature were excluded from the systematic analysis. Each abstract was scrutinised by two authors, apart from independent reviewers. Slight disagreements of thoughts were deliberated and resolved, finally reaching a concurrence. This resulted in 34 studies excluding grey literature being considered for systematic analysis, as depicted in <xref ref-type="fig" rid="F0002">Figure 2</xref>. The EndNote Reference Manager was used to effectively administer the replicated citations and produce a more comprehensive file. At the end, the split of the retrieved studies analysed through citation category indicates 31 (78&#x0025;) are peer-reviewed journal articles, whereas two (5&#x0025;), one (3&#x0025;) and 6 (15&#x0025;) were book chapters, conference paper and grey literature, respectively. All in all, the total studies, including grey literature in the systematic analysis, were 40. The eligibility requirements, as described in <xref ref-type="table" rid="T0002">Table 2</xref>, were verified during the review process. Considering the eligibility criteria, the steps followed in the systematic analysis are delineated as follows:</p>
<list list-type="bullet">
<list-item><p><bold>Step 1</bold>: Studies identified through the WoS and ScienceDirect databases were 1231, ranging from 2022 to 2025 academic years.</p></list-item>
<list-item><p><bold>Step 2</bold>: After the deletion of non-English, non-abstract and identical studies, 523 studies remained, leading to the deletion of 708 studies.</p></list-item>
<list-item><p><bold>Step 3</bold>: While the screening process has unfolded, 426 full-text studies were excluded based on irrelevance.</p></list-item>
<list-item><p><bold>Step 4</bold>: After that, 97 studies were vitally appraised for eligibility requirements to strengthen rigour in the study.</p></list-item>
<list-item><p><bold>Step 5</bold>: Out of 97 studies, 29 were excluded based on the eligibility requirements of the topic.</p></list-item>
<list-item><p><bold>Step 6</bold>: Out of 69 studies, 35 were eliminated based on not meeting the assessment for quality.</p></list-item>
<list-item><p><bold>Step 7</bold>: Thereafter, 34 studies, consisting of peer-reviewed journal articles, book chapters and conference papers (excluding grey literature), were deemed eligible for inclusion in the systematic literature review.</p></list-item>
</list>
<table-wrap id="T0002">
<label>TABLE 2</label>
<caption><p>Eligibility criteria.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Item</th>
<th valign="top" align="left">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Sector</td>
<td align="left">Only studies that focus on the public sector were included in the review.</td>
</tr>
<tr>
<td align="left">Sources</td>
<td align="left">This systematic analysis included peer-reviewed journal articles, conference papers, book chapters and grey literature (e.g. government publications).</td>
</tr>
<tr>
<td align="left">Key concepts</td>
<td align="left">The search for key concepts was limited to &#x2018;ethics&#x2019;, &#x2018;emerging digital technologies&#x2019;, &#x2018;emerging technologies&#x2019;, &#x2018;ethical framework&#x2019;, &#x2018;public service&#x2019;, &#x2018;service delivery&#x2019;, &#x2018;public sector&#x2019; and &#x2018;public administration&#x2019;.</td>
</tr>
<tr>
<td align="left">Time frame</td>
<td align="left">The systematic analysis considered studies available between 2022 and 2025 to ensure the recency of the academic discourses.</td>
</tr>
<tr>
<td align="left">Research methodology</td>
<td align="left">Qualitative and quantitative research were included in the systematic analysis.</td>
</tr>
<tr>
<td align="left">Language</td>
<td align="left">Only studies written in English were eligible for inclusion. Studies written in other languages were omitted based on the complexity of accessing translators.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s20015">
<title>A synopsis of studies included</title>
<p>A concise <xref ref-type="table" rid="T0003">Table 3</xref> highlights information of the studies included in the PRISMA technique. Succinctly, it provides information about authors, title, year of publication, primary objective and research methodology.</p>
<table-wrap id="T0003">
<label>TABLE 3</label>
<caption><p>A synopsis of the features of 34 studies.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Number</th>
<th valign="top" align="left">Author(s)</th>
<th valign="top" align="left">Title</th>
<th valign="top" align="center">Year</th>
<th valign="top" align="left">Primary objective</th>
<th valign="top" align="left">Research</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">1.</td>
<td align="left">Baloyi</td>
<td align="left">&#x2018;A Systematic analysis of ethical and governance concerns relating to artificial intelligence adoption in the South African public sector&#x2019;</td>
<td align="center">2025</td>
<td align="left">To propose an integrated conceptual framework for ethical and governance concerns of AI in the South African public sector.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">2.</td>
<td align="left">Ukeje et al.</td>
<td align="left">&#x2018;Information security and privacy challenges of cloud computing for government adoption: A systematic review&#x2019;.</td>
<td align="center">2024</td>
<td align="left">To probe the dimensions affecting cloud computing service in the public sector.</td>
<td align="left">Quantitative.</td>
</tr>
<tr>
<td align="left">3.</td>
<td align="left">Mtuze and Morige</td>
<td align="left">&#x2018;Towards drafting artificial intelligence (AI) legislation in South Africa&#x2019;.</td>
<td align="center">2024</td>
<td align="left">To identify the legislative and regulatory framework governing AI in South Africa.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">4.</td>
<td align="left">Abdullah Sani and Jaafar</td>
<td align="left">&#x2018;A bibliometric and content analysis of Internet of Things (IoT) in the public sector&#x2019;.</td>
<td align="center">2025</td>
<td align="left">To provide an explicit roadmap for comprehending the challenges and prospects of IoT in the public sector.</td>
<td align="left">Bibliometric and content analysis.</td>
</tr>
<tr>
<td align="left">5.</td>
<td align="left">Dhirani et al.</td>
<td align="left">&#x2018;Ethical dilemmas and privacy issues in emerging technologies: A review&#x2019;</td>
<td align="center">2023</td>
<td align="left">To investigate ethical concerns relating to emerging technologies.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">6.</td>
<td align="left">Koohang et al.</td>
<td align="left">&#x2018;Internet of Things (IoT): From awareness to continued use&#x2019;.</td>
<td align="center">2022</td>
<td align="left">To suggest a research framework for the IoT.</td>
<td align="left">Quantitative.</td>
</tr>
<tr>
<td align="left">7.</td>
<td align="left">Marienfeldt</td>
<td align="left">&#x2018;Does digital government hollow out the essence of street-level bureaucracy? A systematic literature review of how digital tools foster curtailment, enablement and continuation of street-level decision-making&#x2019;.</td>
<td align="center">2024</td>
<td align="left">To evaluate empirical research on the effect of &#x2018;digital tools on street-level work&#x2019;.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">8.</td>
<td align="left">Akhundov</td>
<td align="left">&#x2018;The role of ethics in modern technology development&#x2019;.</td>
<td align="center">2025</td>
<td align="left">To &#x2018;critically examines how ethical principles shape modern technology, focusing on areas such as artificial intelligence, biotechnology,
surveillance, and digital platforms&#x2019;.</td>
<td align="left">Case studies.</td>
</tr>
<tr>
<td align="left">9.</td>
<td align="left">Dagada</td>
<td align="left">&#x2018;The advancement of 4IR technologies and increasing cyberattacks in South Africa&#x2019;.</td>
<td align="center">2024</td>
<td align="left">&#x2018;To assess the impact of these 4IR technologies on cyberattacks in South Africa&#x2019;.</td>
<td align="left">Qualitative.</td>
</tr>
<tr>
<td align="left">10.</td>
<td align="left">Komna and Mpungose</td>
<td align="left">&#x2018;Investigating the impact of digital transformation in the public sector: A case study of the State Information Technology Agency (SITA), South Africa&#x2019;.</td>
<td align="center">2024</td>
<td align="left">To appraise the effect of digital transformation on public services, focusing on SITA.</td>
<td align="left">Qualitative.</td>
</tr>
<tr>
<td align="left">11.</td>
<td align="left">Mahalingam</td>
<td align="left">&#x2018;The power behind cloud adoption in healthcare digital government&#x2019;.</td>
<td align="center">2024</td>
<td align="left">&#x2018;To provide an in-depth analysis of the key drivers, challenges and opportunities associated with cloud adoption in Malaysia&#x2019;s digital government landscape&#x2019;.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">12.</td>
<td align="left">Worku</td>
<td align="left">&#x2018;The benefits of artificial intelligence for enhancing the quality and efficiency of service delivery in South Africa&#x2019;.</td>
<td align="center">2024</td>
<td align="left">To identify the rewards of AI in enhancing public services in South Africa.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">13.</td>
<td align="left">Alhosani and Alhashmi</td>
<td align="left">&#x2018;Opportunities, challenges and benefits of AI innovation in government services: A review&#x2019;.</td>
<td align="center">2024</td>
<td align="left">To detect the rewards of adopting AI innovations in the public sector.</td>
<td align="left">Qualitative.</td>
</tr>
<tr>
<td align="left">14.</td>
<td align="left">Diallo et al.</td>
<td align="left">&#x2018;Case studies of AI policy development in Africa&#x2019;.</td>
<td align="center">2025</td>
<td align="left">To undertake case studies related to AI policy-making in the African continent.</td>
<td align="left">Qualitative.</td>
</tr>
<tr>
<td align="left">15.</td>
<td align="left">Mkhatshwa and Mawela</td>
<td align="left">&#x2018;Cloud computing adoption in the South African public sector&#x2019;.</td>
<td align="center">2023</td>
<td align="left">&#x2018;To investigate the factors influencing cloud computing adoption within the South African public sector&#x2019;.</td>
<td align="left">Mixed-methods.</td>
</tr>
<tr>
<td align="left">16.</td>
<td align="left">Alkhasawneh et al.</td>
<td align="left">&#x2018;Cloud computing adoption in government organisations in developing countries: A systematic literature review and future research directions&#x2019;.</td>
<td align="center">2025</td>
<td align="left">&#x2018;To examine the adoption of cloud computing in e-government services&#x2019;.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">17.</td>
<td align="left">Ionescu</td>
<td align="left">&#x2018;Adopting cloud computing and big data analytics to enhance public sector transparency and accountability through artificial intelligence&#x2019;.</td>
<td align="center">2025</td>
<td align="left">&#x2018;To explore the synergy of these technologies in reshaping public administration&#x2019;.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">18.</td>
<td align="left">Ashok et al.</td>
<td align="left">&#x2018;Ethical framework for artificial intelligence and digital technologies&#x2019;.</td>
<td align="center">2022</td>
<td align="left">To examine the ethical use of AI in digital transformations beyond high-level AI principles.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">19.</td>
<td align="left">Valle-Cruz and Garc&#x00ED;a-Contreras</td>
<td align="left">&#x2018;Towards AI-driven transformation and smart data management: Emerging technological change in the public sector value chain&#x2019;.</td>
<td align="center">2025</td>
<td align="left">&#x2018;To explore AI-driven transformation and smart data management in the public sector value chain&#x2019;.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">20.</td>
<td align="left">Bajpai and Singh</td>
<td align="left">&#x2018;Ethics in a modern technological world&#x2019;</td>
<td align="center">2024</td>
<td align="left">To investigate the ethical conundrums (privacy issues) pertaining to the EDTs.</td>
<td align="left">Qualitative.</td>
</tr>
<tr>
<td align="left">21.</td>
<td align="left">Udo et al.</td>
<td align="left">&#x2018;Conceptualising emerging technologies and Information and Communication Technology (ICT) adoption: Trends and challenges in Africa-US contexts&#x2019;.</td>
<td align="center">2024</td>
<td align="left">&#x2018;To explore the adoption trends, challenges and opportunities surrounding ICT and emerging technologies in the Africa-US contexts.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">22.</td>
<td align="left">Bawole and Langnel</td>
<td align="left">&#x2018;Administrative reforms in the Ghanaian public services for government business continuity during the COVID-19 crisis&#x2019;.</td>
<td align="center">2023</td>
<td align="left">&#x2018;To examine public sector reforms implemented in the Ghanaian public sector to ensure public service continuity during the COVID-19 pandemic&#x2019;.</td>
<td align="left">Qualitative.</td>
</tr>
<tr>
<td align="left">23.</td>
<td align="left">Saheb and Saheb</td>
<td align="left">&#x2018;Mapping ethical artificial intelligence policy landscape: A mixed method analysis&#x2019;.</td>
<td align="center">2024</td>
<td align="left">&#x2018;To methodically identify common themes throughout these policy documents and perform a comparative analysis of the ways in which various governments give priority to crucial matters&#x2019;.</td>
<td align="left">Qualitative.</td>
</tr>
<tr>
<td align="left">24.</td>
<td align="left">Bednar and Spiekermann</td>
<td align="left">&#x2018;Eliciting values for technology design with moral philosophy: An empirical exploration of effects and shortcomings&#x2019;.</td>
<td align="center">2024</td>
<td align="left">&#x2018;To explore whether normative ethical theories can contribute an ethical foundation to the value elicitation phase in technology design&#x2019;.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">25.</td>
<td align="left">Prathomwong and Singsuriya</td>
<td align="left">&#x2018;Ethical framework of digital technology, artificial intelligence and health equity&#x2019;</td>
<td align="center">2022</td>
<td align="left">&#x2018;To synthesise an ethical framework for analysing issues related to the promotion of health equity through digital technology and AI&#x2019;.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">26.</td>
<td align="left">Brzozowska-Rup, Nowakowska and Zdradzisz</td>
<td align="left">&#x2018;Cloud computing in the Polish public administration: Current state and development prospects&#x2019;.</td>
<td align="center">2024</td>
<td align="left">&#x2018;To examine the scale and determinants of cloud computing adoption in Polish public administration&#x2019;.</td>
<td align="left">Panel data analysis.</td>
</tr>
<tr>
<td align="left">27.</td>
<td align="left">Olorunfemi et al.</td>
<td align="left">&#x2018;Towards a conceptual framework for ethical AI development in its systems&#x2019;.</td>
<td align="center">2024</td>
<td align="left">&#x2018;To present a comprehensive conceptual framework aimed at fostering ethical AI development within IT systems&#x2019;.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">28.</td>
<td align="left">Entsie, Hurson and Vaz</td>
<td align="left">&#x2018;Assessing the mediating role of top management support in the adoption of cloud computing in the public sector: The case of Ghana&#x2019;.</td>
<td align="center">2025</td>
<td align="left">&#x2018;To provide insights into potential factors that could influence cloud computing adoption decisions in the public sector within the Ghanaian context&#x2019;.</td>
<td align="left">Quantitative.</td>
</tr>
<tr>
<td align="left">29.</td>
<td align="left">Nkgapele</td>
<td align="left">&#x2018;The usability of e-government as a mechanism to enhance public service delivery in the South African government: Lessons from practices&#x2019;.</td>
<td align="center">2024</td>
<td align="left">&#x2018;To identify current barriers, successes and areas for amelioration in the execution of digital government in South Africa&#x2019;.</td>
<td align="left">Qualitative.</td>
</tr>
<tr>
<td align="left">30.</td>
<td align="left">Frey and Bloch</td>
<td align="left">&#x2018;Using Microsoft Teams to facilitate asynchronous online focus groups&#x2019;.</td>
<td align="center">2023</td>
<td align="left">&#x2018;To reflect on the use of Microsoft Teams to facilitate multiple asynchronous online focus groups&#x2019;.</td>
<td align="left">Qualitative.</td>
</tr>
<tr>
<td align="left">31.</td>
<td align="left">Milukutu andSiachisa</td>
<td align="left">&#x2018;Assessing the impact of digital transformation on employee performance in the public sector: A Case Study of Zambia&#x2019;s Ministry of Health Headquarters (2017&#x2013;2022)&#x2019;.</td>
<td align="center">2023</td>
<td align="left">&#x2018;To assess the impact of DT on
employee performance in Zambia&#x2019;s Ministry of Health Headquarters&#x2019;.</td>
<td align="left">Mixed-methods.</td>
</tr>
<tr>
<td align="left">32.</td>
<td align="left">Igwama et al.</td>
<td align="left">&#x2018;Big data analytics for epidemic forecasting: Policy frameworks and technical approaches&#x2019;.</td>
<td align="center">2024</td>
<td align="left">&#x2018;To explore the intersection of big data analytics and epidemic forecasting, highlighting both technical approaches and policy frameworks&#x2019;.</td>
<td align="left">Systematic literature review.</td>
</tr>
<tr>
<td align="left">33.</td>
<td align="left">James</td>
<td align="left">&#x2018;The ethical and legal implications of using big data and artificial intelligence for public relations campaigns in the United States&#x2019;.</td>
<td align="center">2024</td>
<td align="left">To delve into the ethical and legal implications of using big data and artificial intelligence for public relations campaigns in the United States.</td>
<td align="left">A desktop methodology.</td>
</tr>
<tr>
<td align="left">34.</td>
<td align="left">Mergel et al.</td>
<td align="left">&#x2018;Implementing AI in the public sector&#x2019;.</td>
<td align="center">2023</td>
<td align="left">To explore the implementation of AI in the public sector.</td>
<td align="left">Systematic literature review.</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>Note: See full reference list of Baloyi, W.M., Meyer, N. &#x0026; Rossouw, D., 2026, &#x2018;A conceptual framework for ethical emerging digital technologies: A South African public sector perspective&#x2019;, <italic>Acta Commercii</italic> 26(1), a1503. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/ac.v26i1.1503">https://doi.org/10.4102/ac.v26i1.1503</ext-link></p></fn>
</table-wrap-foot>
</table-wrap>
</sec>
</sec>
<sec id="s0016">
<title>Discussions</title>
<p>This section discusses the research findings emanating from identified themes in the literature.</p>
<sec id="s20017">
<title>Benefits of assimilating ethics into emerging digital technologies</title>
<p>This section describes the advantages of integrating ethics into EDTs based on the themes derived from the systematic literature review: reduced cyberattacks, diminished bureaucracy, enhanced performance and increased productivity.</p>
</sec>
<sec id="s20018">
<title>Reduced cyberattacks</title>
<p>While the globe has experienced the burgeoning application of EDTs in providing services, cyberattacks have also increased in emerging economies (Masilela &#x0026; Nel-Sanders <xref ref-type="bibr" rid="CIT0037">2023</xref>). For example, South Africa has also encountered alarming cyberattacks that have disrupted services, particularly in the public sector (Dagada <xref ref-type="bibr" rid="CIT0014">2024</xref>). To this effect, many cyberattack incidents in the South African public sector and public entities have been reported to the Information Regulator. These alarming activities stem from the policy gap on EDTs that necessitate the development of stringent legal and regulatory frameworks guiding the country&#x2019;s 4IR technologies, as they adversely impact the country&#x2019;s economic growth (DCDT <xref ref-type="bibr" rid="CIT0016">2024a</xref>). Although legal and regulatory frameworks are designed (e.g. <italic>PoPIA</italic> and ECTA), they are not meant for EDTs; hence, some departments and public entities fail to implement those technologies fully (Mtuze &#x0026; Morige <xref ref-type="bibr" rid="CIT0042">2024</xref>). Despite that, South Africa is at the forefront of enacting and implementing relevant prescripts to prevent cyberattacks from occurring compared to other African countries (Masilela &#x0026; Nel-Sanders <xref ref-type="bibr" rid="CIT0037">2023</xref>). One of the benefits of incorporating ethics into EDTs is the enhancement of internal processes and public sector administration by strengthening ethics policy frameworks and complying with all applicable ethics laws, which can lead to a reduction in cyberattacks (Nkgapele <xref ref-type="bibr" rid="CIT0043">2024</xref>). Additionally, investment in sound regulatory impact regarding cybersecurity, through collaboration with the private sector and other international stakeholders, can enable the South African public sector to mitigate cyberattack risks (DPSA <xref ref-type="bibr" rid="CIT0016">2024</xref>).</p>
</sec>
<sec id="s20019">
<title>Diminished by bureaucracy</title>
<p>Bureaucracy is characterised by engagement in politics and is closely associated with hierarchical organisational structures. Whereas bureaucracy plays an adverse role in the uptake of EDTs and innovative practices, it has been viewed as a stumbling block to the public sector&#x2019;s effective adoption and implementation of digital technological initiatives (Marienfeldt <xref ref-type="bibr" rid="CIT0036">2024</xref>; Mergel et al. <xref ref-type="bibr" rid="CIT0038">2023</xref>). Scholars confirm that EDTs have thrived in the traditional bureaucratic paradigm and, to a great extent, digital technologies have improved decision-making processes and, thus, curtailed face-to-face contact (United Nations <xref ref-type="bibr" rid="CIT0054">2024</xref>). For instance, the use of virtual platforms (e.g. Microsoft Teams) by the South African public sector has profoundly improved the channel of communication and the implementation of organisational strategies, thereby enhancing the flexibility of information sharing and accelerating the internal processes that surpass the conventional <italic>modus operandi</italic> (i.e. bureaucracy). In this sense, these platforms have expedited interactions among public services while convening online meetings and workshops. Most imperatively, while the traditional paradigm has been linked to corrupt and fraudulent activities by public servants, the digital government has been said to mitigate those contradictory activities, leading to increased efficiency and productivity (Marienfeldt <xref ref-type="bibr" rid="CIT0036">2024</xref>; Nkgapele <xref ref-type="bibr" rid="CIT0043">2024</xref>). From this vantage point, this study argues that while digital government has exceptionally improved public administration and ensured transparency and accountability by public officials, bureaucracy has been considerably streamlined.</p>
</sec>
<sec id="s20020">
<title>Increased efficiency</title>
<p>Literature suggests that EDTs in an ethically driven environment have increased operational efficiency and value creation to citizens (Alhosani &#x0026; Alhashmi <xref ref-type="bibr" rid="CIT0004">2024</xref>; Madan &#x0026; Ashok <xref ref-type="bibr" rid="CIT0034">2023</xref>). When social trust is enhanced and warranted through data privacy and security, citizens can feel safe to utilise digital technologies to access essential services and <italic>vice versa</italic>. For example, because of the social trust developed between the South African government and its people, nowadays, there is a proliferating number of citizens who utilise the SARS e-filing platforms to submit their tax returns (Adegbayibi &#x0026; Ajape <xref ref-type="bibr" rid="CIT0002">2025</xref>). Consequently, this has drastically reduced long queues, thus leading to increased efficiency and seamless public services (Jakoet-Salie <xref ref-type="bibr" rid="CIT0029">2020</xref>). More notably, for people earning less than R500 thousand per annum, SARS has introduced an initiative that automatically files their tax returns. That being said, citizens have surmounted the geographic distance and unnecessary travel to government buildings to access public services, which has significantly minimised the costs associated with transportation. Generally speaking, several scholars opine that aside from other benefits brought about by the EDTs, increased operational efficiency has been evident in ensuring cost-effective and streamlined public services to the citizens (Abdullah Sani &#x0026; Jaafar <xref ref-type="bibr" rid="CIT0001">2025</xref>; Ionescu <xref ref-type="bibr" rid="CIT0028">2025</xref>; Valle-Cruz &#x0026; Garc&#x00ED;a-Contreras <xref ref-type="bibr" rid="CIT0055">2025</xref>). Additionally, while EDTs augment administrative efficiency in rendering public services, they also diminish possible human errors that can be encountered and, as such, increase accountability (Komna &#x0026; Mpungose <xref ref-type="bibr" rid="CIT0032">2024</xref>).</p>
</sec>
<sec id="s20021">
<title>Enhanced productivity</title>
<p>Accordingly, ethical EDTs have enabled the public sector to reap economic rewards apart from increased productivity (Alhosani &#x0026; Alhashmi <xref ref-type="bibr" rid="CIT0004">2024</xref>). This is supported by Mkhatshwa and Mawela (<xref ref-type="bibr" rid="CIT0040">2023</xref>), who cite that the uptake of EDTs (e.g. cloud computing) by the public sectors has radically improved the productivity of public employees, enhanced the decision-making procedure and fast-tracked the digital government substantially. Moreover, a corpus of literature corroborates that ethical EDTs (e.g. AI) have imperatively alleviated the workloads of public servants, thereby increasing their employee morale and productivity (Bajpai &#x0026; Singh <xref ref-type="bibr" rid="CIT0007">2024</xref>; Madan &#x0026; Ashok <xref ref-type="bibr" rid="CIT0034">2023</xref>; Saheb &#x0026; Saheb <xref ref-type="bibr" rid="CIT0049">2024</xref>). It is argued that despite challenges encountered in the public sectors (including the lack of digital infrastructure and digital expertise) to operate in the digital domain, specifically in emerging economies, digital technologies have boosted the degree of public servants&#x2019; engagement and, by so doing, intensified their performance and productivity (Milukutu &#x0026; Siachisa <xref ref-type="bibr" rid="CIT0039">2023</xref>). Furthermore, this argument is consistent with the views of Bawole and Langnel (<xref ref-type="bibr" rid="CIT0010">2023</xref>), who articulate that emerging economies like Ghana have been plagued with continuous hindrances (such as costly data, unreliable Internet connectivity and inadequate digital competencies), which derailed the implementation of public sector reforms through digitalised public services. Bawole and Langnel (<xref ref-type="bibr" rid="CIT0010">2023</xref>) assert that these hindrances have negatively affected public servants&#x2019; productivity and the provision of services to the citizens.</p>
</sec>
<sec id="s20022">
<title>Ethical concerns pertaining to various emerging digital technologies</title>
<p>This section presents ethical concerns and issues related to different EDTs in this study in response to the second research objective.</p>
<sec id="s30023">
<title>Ethical dilemmas in artificial intelligence</title>
<p>Research on the connection between ethics and AI has gained popularity in the literature (Bajpai &#x0026; Singh <xref ref-type="bibr" rid="CIT0007">2024</xref>; Valle-Cruz &#x0026; Garc&#x00ED;a-Contreras <xref ref-type="bibr" rid="CIT0055">2025</xref>), making AI well known in the public sector. Recently, ethical frameworks for AI in the public sector have been developed to respond to ethical conundrums faced by the public (Akhundov <xref ref-type="bibr" rid="CIT0003">2025</xref>; Ashok et al. <xref ref-type="bibr" rid="CIT0006">2022</xref>). The reason is that emerging AI-based technologies raise ethical dilemmas, such as data privacy and user security. More to this, it is critical to indicate that AI depends not only on algorithms requiring data but also on diverse digital technologies (e.g. face recognition, virtual assistants, robotics and machine learning) that dominate service delivery (Dhirani et al. <xref ref-type="bibr" rid="CIT0019">2023</xref>). To this end, these digital technologies necessitate binding legislative and regulatory frameworks governing ethics for smooth navigation, a foremost hurdle in most emerging economies, especially in Africa. As AI adoption in the public sector in South Africa is at a nascent stage and opaque, policies governing AI initiatives (including ethics) are still lacking. To this end, there is an urgent call for prioritising a clear-cut policy framework to guide AI in the public sector. Even though AI improves human capabilities on one hand, it is said to raise ethical quandaries (accountability, bias, fairness and transparency) on the other (Alhosani &#x0026; Alhashmi <xref ref-type="bibr" rid="CIT0004">2024</xref>; Worku <xref ref-type="bibr" rid="CIT0056">2024</xref>).</p>
</sec>
<sec id="s30024">
<title>Ethical concerns on the Internet of Things</title>
<p>In this era, the IoT has been at the forefront of EDTs. The IoT is a system of tangible tools or sensors that can transmit data from one device to another without human interference (Koohang et al. <xref ref-type="bibr" rid="CIT0033">2022</xref>). Notwithstanding other IoT devices (e.g. wearable technologies, smart devices and connected cars, <italic>inter alia</italic>), the most prevalent IoT devices used in the public sector in South Africa are smartphones. These devices have been prevalent in offering public services to the citizens. However, like other EDTs, the IoT poses ethical challenges (e.g. privacy and security) to its users (United Nations <xref ref-type="bibr" rid="CIT0054">2024</xref>). It is argued that even though IoT can help resolve complex predicaments in individuals&#x2019; lives and go beyond application in distinct phenomena, it can raise peculiar legal and ethical conundrums between the users and the IoT service providers (Koohang et al. <xref ref-type="bibr" rid="CIT0033">2022</xref>). For example, there is a growing ethical concern that individuals&#x2019; data in South Africa are unlawfully shared with other organisations without their consent. To support this point, the societies in South Africa are frequently inundated with irritable phone calls from disparate organisations (e.g. insurance companies, retailers, etc.) seeking to recruit them. Seemingly, this shows that the PoPIA, as legislation governing personal data, is not in force.</p>
</sec>
<sec id="s30025">
<title>Ethical issues in big data</title>
<p>Big data is significantly reforming the public sector (Igwama et al. <xref ref-type="bibr" rid="CIT0027">2024</xref>). Governments, including South Africa, are substantially using big data technology to administer enormous amounts of data in various public sector departments and entities. For example, while Statistics South Africa employs digital technologies (the IoT) to conduct a census (i.e. counting of the population) in the country nowadays, the paper-based processes have been completely eradicated. Yet, as with other EDTs (e.g. AI and the IoT), big data presents ethical and legal issues that require urgent attention, as security breaches are rampant (James <xref ref-type="bibr" rid="CIT0030">2024</xref>). Additionally, big data involves ethical matters such as privacy and consent in gathering and interpreting massive amounts of data. In South Africa, for example, even though regulatory and legal frameworks such as the <italic>PoPIA of 2013</italic>, Minimum Information Security Standards (MISS) of 1996, Minimum Interoperability Standards (MIOS) of 2018, <italic>SITA Act of 1998</italic>, ECTA of 2002 and other laws have been enacted to deal with citizens&#x2019; personal data and privacy infringement, they are not compatible with EDTs.</p>
</sec>
<sec id="s30026">
<title>Ethical concerns pertaining to virtual platforms</title>
<p>Virtual meetings have become the epicentre and a regular part of the daily running of the strategic intentions of the public sector (Bawole &#x0026; Langnel <xref ref-type="bibr" rid="CIT0010">2023</xref>). Although there is a burgeoning academic discourse in research on virtual teams and the application of virtual platforms (such as Microsoft Teams, videoconferencing, Zoom and Google Meetings) in the workplace, it is contended that the internal processes, operations, decision-making and efficiency have considerably improved (Karl, Peluchette &#x0026; Aghakhani <xref ref-type="bibr" rid="CIT0031">2022</xref>) while on the other hand raising ethical challenges. However, regardless of moral dilemmas that are faced, online meetings are said to diminish social interaction between the participants (Bawole &#x0026; Langnel <xref ref-type="bibr" rid="CIT0010">2023</xref>). Most significantly, the implementation of work-from-home initiatives by diverse organisations has resulted in the growing use of virtual (online) meetings. Notwithstanding this, although ethics on virtual platforms has received minimal attention in the literature, virtual meetings are also linked to ethical challenges affecting their application, such as the privacy and security of participants&#x2019; information (Frey &#x0026; Bloch <xref ref-type="bibr" rid="CIT0025">2023</xref>).</p>
</sec>
<sec id="s30027">
<title>Ethical concerns relating to cloud computing</title>
<p>Recently, cloud computing has gained momentum in the literature and practice in the public sector (Mahalingam <xref ref-type="bibr" rid="CIT0035">2024</xref>; Ukeje et al. <xref ref-type="bibr" rid="CIT0053">2024</xref>). As cloud computing is increasingly utilised to process vast amounts of data, it has been susceptible to ethical issues such as privacy and security. Further to that, even though the policy and regulatory frameworks (including ethics regulations) in the public sector are critical in managing and governing cloud computing technology, most studies revealed that these are still lacking (Brzozowska-Rup, Nowakowska &#x0026; Zdradzisz <xref ref-type="bibr" rid="CIT0012">2024</xref>; Entsie, Hurson &#x0026; Vaz <xref ref-type="bibr" rid="CIT0023">2025</xref>; Mkhatshwa &#x0026; Mawela <xref ref-type="bibr" rid="CIT0040">2023</xref>). With that being the case, for example, the public sector in emerging economies like South Africa continues to struggle with integrating ethical principles (security and privacy) in EDTs such as cloud computing (Mkhatshwa &#x0026; Mawela <xref ref-type="bibr" rid="CIT0040">2023</xref>), regardless of the attempts made to develop policy, such as &#x2018;National Data and Cloud Policy Framework&#x2019; (DCDT <xref ref-type="bibr" rid="CIT0016">2024a</xref>). That being said, with governments constantly adopting cloud platforms worldwide (e.g. Microsoft OneDrive and Microsoft Azure) to store and administer massive data sets, they also inherit threats pertaining to ethical conundrums (Ionescu <xref ref-type="bibr" rid="CIT0028">2025</xref>).</p>
</sec>
</sec>
<sec id="s20028">
<title>The conceptual framework</title>
<p>Given the foregoing scholarly debates, there is a need to develop an ethical framework for navigating EDTs in the South African public sector. The following serves as the components of the framework.</p>
<sec id="s30029">
<title>Transparency</title>
<p>Transparency plays a crucial role in developing ethical EDT frameworks, and governments must explicitly and fairly disseminate information on how these EDTs are designed and applied. Transparency makes the ICT friendly and understandable, enabling users to comprehend its functioning (Baloyi &#x0026; Beyers, <xref ref-type="bibr" rid="CIT0009">2019</xref>; Olorunfemi et al. <xref ref-type="bibr" rid="CIT0045">2024</xref>). While transparency is still a significant obstacle to the development of IT systems, particularly in emerging economies, it is applauded for its capability to increase trust and accountability among the users of digital technologies (Ionescu <xref ref-type="bibr" rid="CIT0028">2025</xref>; United Nations <xref ref-type="bibr" rid="CIT0054">2024</xref>). Besides that, it is argued that even the most advanced countries, such as the United States of America (USA) and the United Kingdom (UK), have enunciated transparency as an obstacle to the adoption of EDTs (e.g. AI) (Mergel et al. <xref ref-type="bibr" rid="CIT0038">2023</xref>). To this end, although EDTs can considerably lessen data transparency, they form the foundation for citizens to comprehend and monitor how these technologies deliver services.</p>
</sec>
<sec id="s30030">
<title>Accountability</title>
<p>With the growing application of ICT, accountability becomes a cornerstone for informed decision-making processes through which public sector officials are held liable for using those EDTs (Akhundov <xref ref-type="bibr" rid="CIT0003">2025</xref>; Baloyi &#x0026; Beyers <xref ref-type="bibr" rid="CIT0009">2019</xref>). According to the United Nations (<xref ref-type="bibr" rid="CIT0054">2024</xref>), accountability is at the heart of the public space, and the public sector&#x2019;s improvement of EDTs (e.g. AI) can leverage the security facets of ethics. To this effect, accountability techniques such as the Ethical Committees and other governing bodies can contribute to ensuring that EDTs comply with the legislative frameworks and ethical principles of the public sector. While accountability for EDTs remains the most significant ethical concern in enhancing the internal algorithms of the public sector, its significance in leveraging the application of those technologies cannot be ignored (Ionescu <xref ref-type="bibr" rid="CIT0028">2025</xref>). This is consistent with Saheb and Saheb (<xref ref-type="bibr" rid="CIT0049">2024</xref>), who advocate that accountability issues pose obfuscations when inappropriate algorithms obstruct the efficient functioning of EDTs. Thus, introducing punitive measures against perpetrators can influence responsible conduct by public officials (Alhosani &#x0026; Alhashmi <xref ref-type="bibr" rid="CIT0004">2024</xref>).</p>
</sec>
<sec id="s30031">
<title>Fairness</title>
<p>Fairness is regarded as an essential facet of the ethics of EDTs, focusing on the importance of curbing prejudices and discrimination against their application (Dhirani et al. <xref ref-type="bibr" rid="CIT0019">2023</xref>). Succinctly, fairness involves impartial treatment of EDT users, even with their demographic variables (such as culture, traditions and sex), which can positively or adversely influence these technologies. It plays a central part in decision-making procedures and the development of ethical EDTs. Although inequalities and the digital divide may exist, the government must take practical and reasonable steps to diminish these contrary factors, thereby maximising access to EDTs for the citizens (Olorunfemi et al. <xref ref-type="bibr" rid="CIT0045">2024</xref>). By implication, ensuring fairness in using EDTs shall not be treated as a once-off activity but should involve a continuous nurturing and appraisal process by devising proactive strategies for dealing with such.</p>
</sec>
<sec id="s30032">
<title>Privacy</title>
<p>Privacy issues occur when ICT systems and repositories gather, handle, manage and store the most critical data (e.g. personal, educational and employment) for individuals. As one of the most significant and persistent ethical concerns, privacy in EDTs (e.g. AI) presents drawbacks (such as the lack of trust) in relation to their usage by citizens, which then negatively impacts governments (Madan &#x0026; Ashok <xref ref-type="bibr" rid="CIT0034">2023</xref>). Generally, scholars&#x2019; development of ethical frameworks iterates the implication of safeguarding the users&#x2019; rights to privacy while endorsing that EDTs shall abide by the pertinent legislative and regulatory frameworks governing the entire process (Alkhasawneh, Cob &#x0026; Latif <xref ref-type="bibr" rid="CIT0005">2025</xref>; Obinna &#x0026; Kess-Momoh <xref ref-type="bibr" rid="CIT0044">2024</xref>; Ukeje et al. <xref ref-type="bibr" rid="CIT0053">2024</xref>). With that being the case, as the application of EDTs proliferate in the everyday lives of citizens, governments must enhance data privacy to prevent any potential harm that may arise because of improper security (Prathomwong &#x0026; Singsuriya <xref ref-type="bibr" rid="CIT0048">2022</xref>).</p>
</sec>
<sec id="s30033">
<title>Data security</title>
<p>Data security refers to &#x2018;the protection of data from unauthorised access or modification or deletion or theft&#x2019; (Duggineni <xref ref-type="bibr" rid="CIT0022">2023</xref>:29). Data security is an ethical concern driving the adoption of public sector&#x2019;s EDTs in terms of affirming confidentiality, honesty and integrity of collected data based on <italic>standards</italic> to circumvent any security breach (Alkhasawneh et al. <xref ref-type="bibr" rid="CIT0005">2025</xref>; Madan &#x0026; Ashok <xref ref-type="bibr" rid="CIT0034">2023</xref>). Security standards entail the process of establishing and enforcing a security regulatory framework and practices that intend to guard against any organised or illegal acts associated with the EDTs to ensure the safety of data from any possible attacks (e.g. cyberattacks) (Olorunfemi et al. <xref ref-type="bibr" rid="CIT0045">2024</xref>). To this end, however, it is cardinal for governments to impose regulations guiding how data should be secured and managed digitally. Further to this, consistently reviewing security measures and strategies and conversing with security changes and enhancements globally is fundamental to avoiding any wicked acts affecting the EDT application (Akhundov <xref ref-type="bibr" rid="CIT0003">2025</xref>; Mkhatshwa &#x0026; Mawela <xref ref-type="bibr" rid="CIT0040">2023</xref>). While governments exploit data security, it boosts citizens&#x2019; trust and confidence in utilising digital technologies (Prathomwong &#x0026; Singsuriya <xref ref-type="bibr" rid="CIT0048">2022</xref>).</p>
<p>The following conceptual framework for the South African public sector (Refer to <xref ref-type="fig" rid="F0003">Figure 3</xref>) is suggested based on the above findings.</p>
<fig id="F0003">
<label>FIGURE 3</label>
<caption><p>A conceptual framework integrating ethics into emerging digital technologies.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="AC-26-1503-g003.tif"/>
</fig>
</sec>
</sec>
<sec id="s20034">
<title>Managerial implications and recommendations</title>
<p>The primary objective of this study was to present a conceptual framework for ethical EDTs (mainly AI, the IoT, big data, cloud computing and virtual platforms) of the South African public sector. Given the absence of ethical frameworks for navigating EDTs in the South African public sector, this study proposes a conceptual framework to guide the public sector&#x2019;s policymakers, designers, practitioners, strategists and ICT developers in ensuring that ethical principles and standards are embedded into EDTs. The ethical principles include transparency, accountability, fairness, privacy and security. To this end, however, the implications of this study can enable the three spheres of government (national, provincial and local) in South Africa to devise strategies and propose policy development initiatives that are crucial for addressing ethical concerns regarding EDTs in rendering public administration and providing public services to the citizens and manifold stakeholders.</p>
<p>While the study has identified the benefits of incorporating ethics into EDTs, it also sheds further light on the ethical issues associated with disparate EDTs, which are prevalent in improving public services to citizens. More concretely, this study contributes to the body of knowledge in the IS and public administration research disciplines by critically delving into the ethical conundrums and dilemmas impacting EDTs in the public sector, culminating in the development of a conceptual framework. The conceptual framework offers a valuable understanding and new insights regarding ethical principles that can be of paramount significance to other scholars in academia, particularly in the South African context and other emerging economies facing similar challenges. It is proposed that the South African public sector adopt the conceptual framework in the process of assimilating EDTs into the value chain while also investing in skills development, digital infrastructure and reliable Internet connectivity, especially in rural areas where marginalised and designated groups are located.</p>
</sec>
</sec>
<sec id="s0035">
<title>Conclusion</title>
<p>Despite the ethical concerns raised above, EDTs play a prominent role in streamlining public services. Therefore, the critical evaluation of literature has led to the discovery of the benefits of incorporating ethics into EDTs, such as reduced cyberattacks, diminished bureaucracy, increased efficiency and enhanced productivity. These factors are the outcome of the study&#x2019;s findings and are pivotal in providing direction to the public sector regarding ethical EDTs. Although there are laws (e.g. PoPIA, MISS, MIOS, ECTA and SITA) governing ethics in the South African public sector, the precise regulatory frameworks that administer EDTs remain blurry. Using the PRISMA technique, this study presents a conceptual framework for ethical EDTs, offering guidelines to the South African public sector. The conceptual framework outlines the most significant ethical determinants (e.g. transparency, accountability, fairness, privacy and security) that underpin the development of a framework for the South African public sector.</p>
<p>The consideration of ethical principles in adopting EDTs has been crucial not only in enhancing their application but also in fostering citizens&#x2019; trust and improving public services. Consequently, normative theories (utilitarianism, deontology and virtue ethics) have been prevalent in directing this study and are also significant in policy-making regarding the EDTs within the South African public sector. In essence, this will also help take into cognisance the accountability and transparency of their usage by holding responsible individuals accountable while simultaneously reducing bias and unethical activities that may occur in the future. Additionally, the South African public sector can benefit immensely by building citizens&#x2019; trust, promoting stakeholder involvement and ensuring legal compliance, which in turn adheres to data privacy and security standards in the digital landscape.</p>
<sec id="s20036">
<title>Future research</title>
<p>As the study focused on systematic analysis using the PRISMA technique, future studies can conduct empirical research using both quantitative (e.g. survey questionnaires) and qualitative methods and materials (e.g. focus groups, in-depth interviews and case studies) to gather primary data directly from participants. This can enable the validation of the study&#x2019;s findings. More to this, while considering a larger sample for a quantitative approach can offer generalisability of research findings, in-depth interviews, on the other hand, can provide insight into the ethical application of EDTs in the public sector. Furthermore, the suggested conceptual framework developed in this study can be tested through the underlying approaches stressed above (quantitative and qualitative).</p>
</sec>
</sec>
</body>
<back>
<ack>
<title>Acknowledgements</title>
<p>This article is based on research conducted as part of Wiston Mbhazima Baloyi&#x2019;s current doctoral thesis titled &#x2018;The nexus of digital orientation and organisational readiness in advancing public sector digital innovation&#x2019; at the Department of Business Management, College of Business and Economics, University of Johannesburg. The thesis is being supervised by Prof. Natanya Meyer and Dr Dirk Rossouw. The manuscript has been revised and adapted for journal publication.</p>
<sec id="s20037" sec-type="COI-statement">
<title>Competing interests</title>
<p>The authors declare that they have no financial or personal relationships that may have inappropriately influenced them in writing this article.</p>
</sec>
<sec id="s20038">
<title>CRediT authorship contribution</title>
<p>Wiston M. Baloyi: Conceptualisation, Data curation, Formal analysis, Investigation, Methodology, Project administration, Resources, Software, Visualisation, Writing &#x2013; original draft, Writing &#x2013; review&#x0026; editing. Natanya Meyer: Conceptualisation, Data curation, Formal analysis, Investigation, Methodology, Project administration, Resources, Supervision, Software, Visualisation, Writing &#x2013; original draft, Writing &#x2013; review and editing. Dirk Rossouw: Conceptualisation, Data curation, Formal analysis, Funding acquisition, Investigation, Methodology, Project administration, Resources, Supervision, Software, Visualisation, Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing. All authors reviewed the article, contributed to the discussion of results, approved the final version for submission and publication and take responsibility for the integrity of its findings.</p>
</sec>
<sec id="s20039" sec-type="data-availability">
<title>Data availability</title>
<p>The data that support the findings of this study are available within the article and its listed sources.</p>
</sec>
<sec id="s20040">
<title>Disclaimer</title>
<p>The views and opinions expressed in this article are those of the authors and are the product of professional research. They do not necessarily reflect the official policy or position of any affiliated institution, funder, agency or that of the publisher. The authors are responsible for this article&#x2019;s results, findings and content.</p>
</sec>
</ack>
<ref-list id="references">
<title>References</title>
<ref id="CIT0001"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Abdullah Sani</surname>, <given-names>H.A</given-names></string-name>. &#x0026; <string-name><surname>Jaafar</surname>, <given-names>N.I</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<article-title>A bibliometric and content analysis of Internet of Things (IoT) in the public sector</article-title>&#x2019;, <source><italic>Journal of Science and Technology Policy Management</italic></source> <volume>16</volume>(<issue>6</issue>), <fpage>977</fpage>&#x2013;<lpage>1110</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/JSTPM-04-2024-0154">https://doi.org/10.1108/JSTPM-04-2024-0154</ext-link></comment></mixed-citation></ref>
<ref id="CIT0002"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Adegbayibi</surname>, <given-names>A.T</given-names></string-name>. &#x0026; <string-name><surname>Ajape</surname>, <given-names>M.K</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<chapter-title>Integration of artificial intelligence into taxation processes</chapter-title>&#x2019;, in <source><italic>Artificial intelligence in accounting, auditing and finance: A guide for implementation and use</italic></source>, pp. <fpage>103</fpage>&#x2013;<lpage>125</lpage>, <publisher-name>Springer Nature Switzerland</publisher-name>, <publisher-loc>Cham</publisher-loc>, <comment>viewed 25 July 2025, from <ext-link ext-link-type="uri" xlink:href="https://link.springer.com/chapter/10.1007/978-3-031-87368-3_7">https://link.springer.com/chapter/10.1007/978-3-031-87368-3_7</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0003"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Akhundov</surname>, <given-names>A</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<article-title>The role of ethics in modern technology development</article-title>&#x2019;, <source><italic>Porta Universorum</italic></source> <volume>1</volume>(<issue>4</issue>), <fpage>169</fpage>&#x2013;<lpage>177</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.69760/portuni.0104017">https://doi.org/10.69760/portuni.0104017</ext-link></comment></mixed-citation></ref>
<ref id="CIT0004"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alhosani</surname>, <given-names>K</given-names></string-name>. &#x0026; <string-name><surname>Alhashmi</surname>, <given-names>S.M</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Opportunities, challenges and benefits of AI innovation in government services: A review</article-title>&#x2019;, <source><italic>Discover Artificial Intelligence</italic></source> <volume>4</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>19</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s44163-024-00111-w">https://doi.org/10.1007/s44163-024-00111-w</ext-link></comment></mixed-citation></ref>
<ref id="CIT0005"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alkhasawneh</surname>, <given-names>R</given-names></string-name>., <string-name><surname>Cob</surname>, <given-names>Z.C</given-names></string-name>. &#x0026; <string-name><surname>Latif</surname>, <given-names>A.B.A</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<article-title>Cloud computing adoption in government organisations in developing countries: A systematic literature review and future research directions</article-title>&#x2019;, <source><italic>International Journal of Public Administration in the Digital Age</italic></source> <volume>12</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>27</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4018/IJPADA.368246">https://doi.org/10.4018/IJPADA.368246</ext-link></comment></mixed-citation></ref>
<ref id="CIT0006"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ashok</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Madan</surname>, <given-names>R</given-names></string-name>., <string-name><surname>Joha</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Sivarajah</surname>, <given-names>U</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Ethical framework for artificial intelligence and digital technologies</article-title>&#x2019;, <source><italic>International Journal of Information Management</italic></source> <volume>62</volume>, <fpage>1</fpage>&#x2013;<lpage>17</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ijinfomgt.2021.102433">https://doi.org/10.1016/j.ijinfomgt.2021.102433</ext-link></comment></mixed-citation></ref>
<ref id="CIT0007"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Bajpai</surname>, <given-names>N</given-names></string-name>. &#x0026; <string-name><surname>Singh</surname>, <given-names>S</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<chapter-title>Ethics in a modern technological world</chapter-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>R.K.</given-names> <surname>Kushwaha</surname></string-name>, <string-name><given-names>P.K.</given-names> <surname>Yadav</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Sonker</surname></string-name> &#x0026; <string-name><given-names>A.</given-names> <surname>Devi</surname></string-name> (eds.)</person-group>, <source><italic>Ethical frameworks in special education: A guide for researchers</italic></source>, vol. <volume>2</volume>, pp. <fpage>62</fpage>&#x2013;<lpage>78</lpage>, <publisher-name>Blue ros&#x00E9; Publishers</publisher-name>, <publisher-loc>New Delhi</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0008"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Baloyi</surname>, <given-names>W.M</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<article-title>A systematic analysis of ethical and governance concerns relating to artificial intelligence adoption in the South African public sector</article-title>&#x2019;, <source><italic>International Journal of Research and Innovation in Social Science (IJRISS)</italic></source> <volume>9</volume>(<issue>9</issue>), <fpage>3177</fpage>&#x2013;<lpage>3190</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.47772/IJRISS.2025.909000269">https://doi.org/10.47772/IJRISS.2025.909000269</ext-link></comment></mixed-citation></ref>
<ref id="CIT0009"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Baloyi</surname>, <given-names>W.M</given-names></string-name>. &#x0026; <string-name><surname>Beyers</surname>, <given-names>L.J.E</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>The impact of financial malpractice on service delivery: A conceptual examination of literature</article-title>&#x2019;, in <conf-name>4th Annual International Conference on Public Administration and Development Alternatives</conf-name>, <conf-date>03&#x2013;05 July</conf-date>, <conf-loc>Johannesburg</conf-loc>, <comment>viewed 29 August 2025, from <ext-link ext-link-type="uri" xlink:href="http://ulspace.ul.ac.za/bitstream/handle/10386/2756/baloyi_impact_2019.pdf?sequence=1">http://ulspace.ul.ac.za/bitstream/handle/10386/2756/baloyi_impact_2019.pdf?sequence=1</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0010"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bawole</surname>, <given-names>J.N</given-names></string-name>. &#x0026; <string-name><surname>Langnel</surname>, <given-names>Z</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Administrative reforms in the Ghanaian public services for government business continuity during the COVID-19 crisis</article-title>&#x2019;, <source><italic>Public Organisation Review</italic></source> <volume>23</volume>(<issue>1</issue>), <fpage>181</fpage>&#x2013;<lpage>196</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s11115-022-00687-w">https://doi.org/10.1007/s11115-022-00687-w</ext-link></comment></mixed-citation></ref>
<ref id="CIT0011"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bednar</surname>, <given-names>K</given-names></string-name>. &#x0026; <string-name><surname>Spiekermann</surname>, <given-names>S</given-names></string-name></person-group>., <year>2024</year>. &#x2018;<article-title>Eliciting values for technology design with moral philosophy: An empirical exploration of effects and shortcomings</article-title>&#x2019;, <source><italic>Science, Technology &#x0026; Human Values</italic></source> <volume>49</volume>(<issue>3</issue>), <fpage>611</fpage>&#x2013;<lpage>645</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/01622439221122595">https://doi.org/10.1177/01622439221122595</ext-link></comment></mixed-citation></ref>
<ref id="CIT0012"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Brzozowska-Rup</surname>, <given-names>K</given-names></string-name>., <string-name><surname>Nowakowska</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>Zdradzisz</surname>, <given-names>M</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Cloud computing in the Polish public administration: Current state and development prospects</article-title>&#x2019;, <source><italic>Technological Forecasting and Social Change</italic></source> <volume>205</volume>, <fpage>1</fpage>&#x2013;<lpage>10</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.techfore.2024.123500">https://doi.org/10.1016/j.techfore.2024.123500</ext-link></comment></mixed-citation></ref>
<ref id="CIT0013"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cassim</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Chapanduka</surname>, <given-names>Z.C</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Cyberattack on the National Health Laboratory Service of South Africa&#x2013;Implications, response and recommendations</article-title>&#x2019;, <source><italic>South African Medical Journal</italic></source> <volume>114</volume>(<issue>12</issue>), <fpage>19</fpage>&#x2013;<lpage>22</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.7196/SAMJ.2024.v114i12.2549">https://doi.org/10.7196/SAMJ.2024.v114i12.2549</ext-link></comment></mixed-citation></ref>
<ref id="CIT0014"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dagada</surname>, <given-names>R</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>The advancement of 4IR technologies and increasing cyberattacks in South Africa</article-title>&#x2019;, <source><italic>Southern African Journal of Security</italic></source> <volume>2</volume>, <fpage>1</fpage>&#x2013;<lpage>27</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.25159/3005-4222/15157">https://doi.org/10.25159/3005-4222/15157</ext-link></comment></mixed-citation></ref>
<ref id="CIT0015"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>Department of Communications and Digital Technologies (DCDT)</collab></person-group>, <year>2023</year>, <source><italic>South Africa&#x2019;s Artificial Intelligence (AI) planning</italic></source>, <publisher-name>Government Printer</publisher-name>, <publisher-loc>Pretoria</publisher-loc>, <comment>viewed 30 September 2024, from <ext-link ext-link-type="uri" xlink:href="https://fwblaw.co.za/wp-content/uploads/2024/10/South-Africa-National-AI-Policy-Framework-1.pdf">https://fwblaw.co.za/wp-content/uploads/2024/10/South-Africa-National-AI-Policy-Framework-1.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0016"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>Department of Communications and Digital Technologies (DCDT)</collab></person-group>, <year>2024a</year>, <source><italic>National policy on data and cloud</italic></source>, <publisher-name>Government Printer</publisher-name>, <publisher-loc>Pretoria</publisher-loc>, <comment>viewed 30 September 2024, from <ext-link ext-link-type="uri" xlink:href="https://www.gov.za/sites/default/files/gcis_document/202406/50741gen2533.pdf">https://www.gov.za/sites/default/files/gcis_document/202406/50741gen2533.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0017"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>Department of Communications and Digital Technologies (DCDT)</collab></person-group>, <year>2024b</year>, <source><italic>South Africa&#x2019;s national artificial intelligence policy framework</italic></source>, <publisher-name>Government Printer</publisher-name>, <publisher-loc>Pretoria</publisher-loc>, <comment>viewed 30 September 2024, from <ext-link ext-link-type="uri" xlink:href="https://www.dcdt.gov.za/sa-national-ai-policy-framework/file/338-sa-national-ai-policy-framework.html">https://www.dcdt.gov.za/sa-national-ai-policy-framework/file/338-sa-national-ai-policy-framework.html</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0018"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>Department of Public Service and Administration</collab></person-group>, <year>2024</year>, <source><italic>Draft digital government policy framework</italic></source>, <publisher-name>Government Printer</publisher-name>, <publisher-loc>Pretoria</publisher-loc>, <comment>viewed 30 September 2024, from <ext-link ext-link-type="uri" xlink:href="https://www.dpsa.gov.za/dpsa2g/documents/egov/2024/DRAFT&#x0025;20DIGITAL&#x0025;20GOVERNMENT&#x0025;20POLICY&#x0025;20FRAMEWORK.pdf">https://www.dpsa.gov.za/dpsa2g/documents/egov/2024/DRAFT&#x0025;20DIGITAL&#x0025;20GOVERNMENT&#x0025;20POLICY&#x0025;20FRAMEWORK.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0019"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dhirani</surname>, <given-names>L.L</given-names></string-name>., <string-name><surname>Mukhtiar</surname>, <given-names>N</given-names></string-name>., <string-name><surname>Chowdhry</surname>, <given-names>B.S</given-names></string-name>. &#x0026; <string-name><surname>Newe</surname>, <given-names>T</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Ethical dilemmas and privacy issues in emerging technologies: A review</article-title>&#x2019;, <source><italic>Sensors</italic></source> <volume>23</volume>(<issue>3</issue>), <fpage>1</fpage>&#x2013;<lpage>18</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/s23031151">https://doi.org/10.3390/s23031151</ext-link></comment></mixed-citation></ref>
<ref id="CIT0020"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Diallo</surname>, <given-names>K</given-names></string-name>., <string-name><surname>Smith</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Okolo</surname>, <given-names>C.T</given-names></string-name>., <string-name><surname>Nyamwaya</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Kgomo</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Ngamita</surname>, <given-names>R</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<article-title>Case studies of AI policy development in Africa</article-title>&#x2019;, <source><italic>Data and Policy</italic></source> <volume>7</volume>, <fpage>1</fpage>&#x2013;<lpage>12</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1017/dap.2024.71">https://doi.org/10.1017/dap.2024.71</ext-link></comment></mixed-citation></ref>
<ref id="CIT0021"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dra&#x0161;&#x010D;ek</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Rejc Buhovac</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Mesner Andol&#x0161;ek</surname>, <given-names>D</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Moral pragmatism as a bridge between duty, utility, and virtue in managers&#x2019; ethical decision-making</article-title>&#x2019;, <source><italic>Journal of Business Ethics</italic></source> <volume>172</volume>(<issue>4</issue>), <fpage>803</fpage>&#x2013;<lpage>819</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10551-020-04489-2">https://doi.org/10.1007/s10551-020-04489-2</ext-link></comment></mixed-citation></ref>
<ref id="CIT0022"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Duggineni</surname>, <given-names>S</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Impact of controls on data integrity and information systems</article-title>&#x2019;, <source><italic>Science and Technology</italic></source> <volume>13</volume>(<issue>2</issue>), <fpage>29</fpage>&#x2013;<lpage>35</lpage>.</mixed-citation></ref>
<ref id="CIT0023"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Entsie</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Hurson</surname>, <given-names>I.B</given-names></string-name>. &#x0026; <string-name><surname>Vaz</surname>, <given-names>A</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<article-title>Assessing the mediating role of top management support in the adoption of cloud computing in the public sector: The case of Ghana</article-title>&#x2019;, <source><italic>Multidisciplinary Science Journal</italic></source> <volume>7</volume>(<issue>8</issue>), <fpage>1</fpage>&#x2013;<lpage>11</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.31893/multiscience.2025345">https://doi.org/10.31893/multiscience.2025345</ext-link></comment></mixed-citation></ref>
<ref id="CIT0024"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Farayola</surname>, <given-names>O.A</given-names></string-name>. &#x0026; <string-name><surname>Olorunfemi</surname>, <given-names>O.L</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Ethical decision-making in IT governance: A review of models and frameworks</article-title>&#x2019;, <source><italic>International Journal of Science and Research Archive</italic></source> <volume>11</volume>(<issue>2</issue>), <fpage>130</fpage>&#x2013;<lpage>138</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.30574/ijsra.2024.11.2.0373">https://doi.org/10.30574/ijsra.2024.11.2.0373</ext-link></comment></mixed-citation></ref>
<ref id="CIT0025"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Frey</surname>, <given-names>T.K</given-names></string-name>. &#x0026; <string-name><surname>Bloch</surname>, <given-names>B.S</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Using Microsoft Teams to facilitate asynchronous online focus groups</article-title>&#x2019;, <source><italic>International Journal of Qualitative Methods</italic></source> <volume>22</volume>, <fpage>1</fpage>&#x2013;<lpage>15</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/16094069231211251">https://doi.org/10.1177/16094069231211251</ext-link></comment></mixed-citation></ref>
<ref id="CIT0026"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Henrico</surname>, <given-names>S</given-names></string-name>. &#x0026; <string-name><surname>Els</surname>, <given-names>S</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<article-title>Cyberattacks in South Africa: Geopolitical and legal implications</article-title>&#x2019;, <source><italic>African Security Review</italic></source> <volume>34</volume>(<issue>3</issue>), <fpage>312</fpage>&#x2013;<lpage>336</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/10246029.2025.2489352">https://doi.org/10.1080/10246029.2025.2489352</ext-link></comment></mixed-citation></ref>
<ref id="CIT0027"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Igwama</surname>, <given-names>G.T</given-names></string-name>., <string-name><surname>Olaboye</surname>, <given-names>J.A</given-names></string-name>., <string-name><surname>Maha</surname>, <given-names>C.C</given-names></string-name>., <string-name><surname>Ajegbile</surname>, <given-names>M.D</given-names></string-name>. &#x0026; <string-name><surname>Abdul</surname>, <given-names>S</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Big data analytics for epidemic forecasting: Policy frameworks and technical approaches</article-title>&#x2019;, <source><italic>International Journal of Applied Research in Social Sciences</italic></source> <volume>6</volume>(<issue>7</issue>), <fpage>1449</fpage>&#x2013;<lpage>1460</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.51594/ijarss.v6i7.1334">https://doi.org/10.51594/ijarss.v6i7.1334</ext-link></comment></mixed-citation></ref>
<ref id="CIT0028"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ionescu</surname>, <given-names>R</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<article-title>Adopting cloud computing and big data analytics to enhance public sector transparency and accountability through artificial intelligence</article-title>&#x2019;, <source><italic>Nuvern Machine Learning Reviews</italic></source> <volume>2</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>18</lpage>, <comment>viewed 03 July 2025, from <ext-link ext-link-type="uri" xlink:href="https://nuvern.com/index.php/nmlr/article/view/4">https://nuvern.com/index.php/nmlr/article/view/4</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0029"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jakoet-Salie</surname>, <given-names>A</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>E-government strategies in South Africa</article-title>&#x2019;, <source><italic>Administratio Publica</italic></source> <volume>28</volume>(<issue>3</issue>), <fpage>1</fpage>&#x2013;<lpage>22</lpage>, <comment>viewed 17 July 2025, from <ext-link ext-link-type="uri" xlink:href="https://hdl.handle.net/10520/ejc-adminpub-v28-n3-a2">https://hdl.handle.net/10520/ejc-adminpub-v28-n3-a2</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0030"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>James</surname>, <given-names>M</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>The ethical and legal implications of using big data and artificial intelligence for public relations campaigns in the United States</article-title>&#x2019;, <source><italic>International Journal of Communication and Public Relations</italic></source> <volume>9</volume>(<issue>1</issue>), <fpage>38</fpage>&#x2013;<lpage>52</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.47604/ijcpr.2273">https://doi.org/10.47604/ijcpr.2273</ext-link></comment></mixed-citation></ref>
<ref id="CIT0031"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Karl</surname>, <given-names>K.A</given-names></string-name>., <string-name><surname>Peluchette</surname>, <given-names>J.V</given-names></string-name>. &#x0026; <string-name><surname>Aghakhani</surname>, <given-names>N</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Virtual work meetings during the COVID-19 pandemic: The good, bad and ugly</article-title>&#x2019;, <source><italic>Small Group Research</italic></source> <volume>53</volume>(<issue>3</issue>), <fpage>343</fpage>&#x2013;<lpage>365</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/10464964211015286">https://doi.org/10.1177/10464964211015286</ext-link></comment></mixed-citation></ref>
<ref id="CIT0032"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Komna</surname>, <given-names>L</given-names></string-name>. &#x0026; <string-name><surname>Mpungose</surname>, <given-names>S</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Investigating the impact of digital transformation in the public sector: A case study of the State Information Technology Agency (SITA), South Africa</article-title>&#x2019;, <source><italic>International Journal of Business Ecosystem &#x0026; Strategy</italic></source> <volume>6</volume>(<issue>4</issue>), <fpage>218</fpage>&#x2013;<lpage>234</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.36096/ijbes.v6i4.610">https://doi.org/10.36096/ijbes.v6i4.610</ext-link></comment></mixed-citation></ref>
<ref id="CIT0033"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Koohang</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Sargent</surname>, <given-names>C.S</given-names></string-name>., <string-name><surname>Nord</surname>, <given-names>J.H</given-names></string-name>. &#x0026; <string-name><surname>Paliszkiewicz</surname>, <given-names>J</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Internet of Things (IoT): From awareness to continued use</article-title>&#x2019;, <source><italic>International Journal of Information Management</italic></source> <volume>62</volume>, <fpage>1</fpage>&#x2013;<lpage>10</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ijinfomgt.2021.102442">https://doi.org/10.1016/j.ijinfomgt.2021.102442</ext-link></comment></mixed-citation></ref>
<ref id="CIT0034"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Madan</surname>, <given-names>R</given-names></string-name>. &#x0026; <string-name><surname>Ashok</surname>, <given-names>M</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>AI adoption and diffusion in public administration: A systematic literature review and future research agenda</article-title>&#x2019;, <source><italic>Government Information Quarterly</italic></source> <volume>40</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>18</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.giq.2022.101774">https://doi.org/10.1016/j.giq.2022.101774</ext-link></comment></mixed-citation></ref>
<ref id="CIT0035"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mahalingam</surname>, <given-names>S</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>The power behind cloud adoption in healthcare digital government</article-title>&#x2019;, <source><italic>Journal of Emerging Technologies and Industrial Applications</italic></source> <volume>3</volume>(<issue>2</issue>), <fpage>1</fpage>&#x2013;<lpage>6</lpage>, <comment>viewed 10 July 2025, from <ext-link ext-link-type="uri" xlink:href="https://jetia.mbot.org.my/index.php/jetia/index">https://jetia.mbot.org.my/index.php/jetia/index</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0036"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Marienfeldt</surname>, <given-names>J</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Does digital government hollow out the essence of street-level bureaucracy? A systematic literature review of how digital tools foster curtailment, enablement and continuation of street-level decision-making</article-title>&#x2019;, <source><italic>Social Policy and Administration</italic></source> <volume>58</volume>(<issue>5</issue>), <fpage>1</fpage>&#x2013;<lpage>25</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/spol.12991">https://doi.org/10.1111/spol.12991</ext-link></comment></mixed-citation></ref>
<ref id="CIT0037"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Masilela</surname>, <given-names>L</given-names></string-name>. &#x0026; <string-name><surname>Nel-Sanders</surname>, <given-names>D</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Cyber threat intelligence practices in the national sphere of government in South Africa</article-title>&#x2019;, <source><italic>International Journal of Research in Business and Social Science</italic></source> <volume>12</volume>(<issue>8</issue>), <fpage>402</fpage>&#x2013;<lpage>414</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.20525/ijrbs.v12i8.2914">https://doi.org/10.20525/ijrbs.v12i8.2914</ext-link></comment></mixed-citation></ref>
<ref id="CIT0038"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mergel</surname>, <given-names>I</given-names></string-name>., <string-name><surname>Dickinson</surname>, <given-names>H</given-names></string-name>., <string-name><surname>Stenvall</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Gasco</surname>, <given-names>M</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Implementing AI in the public sector</article-title>&#x2019;, <source><italic>Public Management Review</italic></source> <volume>25</volume>, <fpage>1</fpage>&#x2013;<lpage>14</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/14719037.2023.2231950">https://doi.org/10.1080/14719037.2023.2231950</ext-link></comment></mixed-citation></ref>
<ref id="CIT0039"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Milukutu</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Siachisa</surname>, <given-names>M</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Assessing the impact of digital transformation on employee performance in the public sector: A case study of Zambia&#x2019;s Ministry of Health Headquarters (2017&#x2013;2022)</article-title>&#x2019;, <source><italic>International Journal of Humanities, Social Sciences and Education</italic></source> <volume>10</volume>(<issue>9</issue>), <fpage>118</fpage>&#x2013;<lpage>126</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.20431/2349-0381.1009013">https://doi.org/10.20431/2349-0381.1009013</ext-link></comment></mixed-citation></ref>
<ref id="CIT0040"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mkhatshwa</surname>, <given-names>B</given-names></string-name>. &#x0026; <string-name><surname>Mawela</surname>, <given-names>T</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<article-title>Cloud computing adoption in the South African public sector</article-title>&#x2019;, <source><italic>Indonesian Journal of Electrical Engineering and Informatics</italic></source> <volume>11</volume>(<issue>2</issue>), <fpage>537</fpage>&#x2013;<lpage>552</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.52549/ijeei.v11i2.4464">https://doi.org/10.52549/ijeei.v11i2.4464</ext-link></comment></mixed-citation></ref>
<ref id="CIT0041"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Morgan</surname>, <given-names>H</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Conducting a qualitative document analysis</article-title>&#x2019;, <source><italic>Qualitative Report</italic></source> <volume>27</volume>(<issue>1</issue>), <fpage>64</fpage>&#x2013;<lpage>77</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.46743/2160-3715/2022.5044">https://doi.org/10.46743/2160-3715/2022.5044</ext-link></comment></mixed-citation></ref>
<ref id="CIT0042"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mtuze</surname>, <given-names>S.S.K</given-names></string-name>. &#x0026; <string-name><surname>Morige</surname>, <given-names>M</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Towards drafting artificial intelligence (AI) legislation in South Africa</article-title>&#x2019;, <source><italic>Obiter</italic></source> <volume>45</volume>(<issue>1</issue>), <fpage>161</fpage>&#x2013;<lpage>179</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.17159/obiter.v45i1.18399">https://doi.org/10.17159/obiter.v45i1.18399</ext-link></comment></mixed-citation></ref>
<ref id="CIT0043"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nkgapele</surname>, <given-names>S.M</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>The usability of e-government as a mechanism to enhance public service delivery in the South African government: Lessons from practices</article-title>&#x2019;, <source><italic>Digital Policy Studies</italic></source> <volume>3</volume>(<issue>1</issue>), <fpage>116</fpage>&#x2013;<lpage>132</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.36615/w2sjk817">https://doi.org/10.36615/w2sjk817</ext-link></comment></mixed-citation></ref>
<ref id="CIT0044"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Obinna</surname>, <given-names>A.J</given-names></string-name>. &#x0026; <string-name><surname>Kess-Momoh</surname>, <given-names>A.J</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Comparative technical analysis of legal and ethical frameworks in AI-enhanced procurement processes</article-title>&#x2019;, <source><italic>World Journal of Advanced Research and Reviews</italic></source> <volume>22</volume>(<issue>1</issue>), <fpage>1415</fpage>&#x2013;<lpage>1430</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.30574/wjarr.2024.22.1.1241">https://doi.org/10.30574/wjarr.2024.22.1.1241</ext-link></comment></mixed-citation></ref>
<ref id="CIT0045"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Olorunfemi</surname>, <given-names>O.L</given-names></string-name>., <string-name><surname>Amoo</surname>, <given-names>O.O</given-names></string-name>., <string-name><surname>Atadoga</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Fayayola</surname>, <given-names>O.A</given-names></string-name>., <string-name><surname>Abrahams</surname>, <given-names>T.O</given-names></string-name>. &#x0026; <string-name><surname>Shoetan</surname>, <given-names>P.O</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Towards a conceptual framework for ethical AI development in its systems</article-title>&#x2019;, <source><italic>Computer Science and IT Research Journal</italic></source> <volume>5</volume>(<issue>3</issue>), <fpage>616</fpage>&#x2013;<lpage>627</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.51594/csitrj.v5i3.910">https://doi.org/10.51594/csitrj.v5i3.910</ext-link></comment></mixed-citation></ref>
<ref id="CIT0046"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Page</surname>, <given-names>M.J</given-names></string-name>., <string-name><surname>McKenzie</surname>, <given-names>J.E</given-names></string-name>., <string-name><surname>Bossuyt</surname>, <given-names>P.M</given-names></string-name>., <string-name><surname>Boutron</surname>, <given-names>I</given-names></string-name>., <string-name><surname>Hoffmann</surname>, <given-names>T.C</given-names></string-name>., <string-name><surname>Mulrow</surname>, <given-names>C.D</given-names></string-name>. <etal>et al</etal></person-group>., <year>2021</year>, &#x2018;<article-title>The PRISMA 2020 statement: An updated guideline for reporting systematic reviews</article-title>&#x2019;, <source><italic>Research Methods and Reporting</italic></source> <volume>10</volume>(<issue>89</issue>), <fpage>1</fpage>&#x2013;<lpage>11</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1136/bmj.n71">https://doi.org/10.1136/bmj.n71</ext-link></comment></mixed-citation></ref>
<ref id="CIT0047"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pillay</surname>, <given-names>T.S</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Cyberattack on the NHLS network: Highlighting the crucial role of laboratory medicine</article-title>&#x2019;, <source><italic>Journal of the Colleges of Medicine of South Africa</italic></source> <volume>2</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>3</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/jcmsa.v2i1.108">https://doi.org/10.4102/jcmsa.v2i1.108</ext-link></comment></mixed-citation></ref>
<ref id="CIT0048"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Prathomwong</surname>, <given-names>P</given-names></string-name>. &#x0026; <string-name><surname>Singsuriya</surname>, <given-names>P</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Ethical framework of digital technology, artificial intelligence and health equity</article-title>&#x2019;, <source><italic>Asia Social Issues</italic></source> <volume>15</volume>(<issue>5</issue>), <fpage>1</fpage>&#x2013;<lpage>14</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.48048/asi.2022.252136">https://doi.org/10.48048/asi.2022.252136</ext-link></comment></mixed-citation></ref>
<ref id="CIT0049"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Saheb</surname>, <given-names>T</given-names></string-name>. &#x0026; <string-name><surname>Saheb</surname>, <given-names>T</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Mapping ethical artificial intelligence policy landscape: A mixed method analysis</article-title>&#x2019;, <source><italic>Science and Engineering Ethics</italic></source> <volume>30</volume>(<issue>2</issue>), <fpage>1</fpage>&#x2013;<lpage>26</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s11948-024-00472-6">https://doi.org/10.1007/s11948-024-00472-6</ext-link></comment></mixed-citation></ref>
<ref id="CIT0050"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Siphambili</surname>, <given-names>N</given-names></string-name>., <string-name><surname>Mahlasela</surname>, <given-names>O</given-names></string-name>., <string-name><surname>Baloyi</surname>, <given-names>E</given-names></string-name>. &#x0026; <string-name><surname>Mukondeleli</surname>, <given-names>E</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>A review of the South African public sector&#x2019;s capability in combating ransomware</article-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>T.</given-names> <surname>Zuva</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Brown</surname></string-name> &#x0026; <string-name><given-names>M.</given-names> <surname>Rikhotso</surname></string-name> (eds.)</person-group>, <conf-name>2024 4th International Multidisciplinary Information Technology and Engineering Conference (IMITEC)</conf-name>, <conf-loc>Vanderbijlpark, South Africa</conf-loc>, <publisher-name>IEEE</publisher-name>, <publisher-loc>New Jersey, USA</publisher-loc>, <conf-date>November 27&#x2013;29, 2024</conf-date>, pp. <fpage>493</fpage>&#x2013;<lpage>499</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/IMITEC60221.2024.10850969">https://doi.org/10.1109/IMITEC60221.2024.10850969</ext-link></comment></mixed-citation></ref>
<ref id="CIT0051"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Tsou</surname>, <given-names>J.Y</given-names></string-name>. &#x0026; <string-name><surname>Walsh</surname>, <given-names>K.P</given-names></string-name></person-group>., <year>2023</year>, &#x2018;<chapter-title>Ethical theory and technology</chapter-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>G.J.</given-names> <surname>Robson</surname></string-name> &#x0026; <string-name><given-names>J.Y.</given-names> <surname>Tsou</surname></string-name> (eds)</person-group>, <source><italic>Technology ethics</italic></source>, pp. <fpage>62</fpage>&#x2013;<lpage>72</lpage>, <publisher-name>Routledge</publisher-name>, <publisher-loc>New York, NY</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0052"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Udo</surname>, <given-names>W.S</given-names></string-name>., <string-name><surname>Ochuba</surname>, <given-names>N.A</given-names></string-name>., <string-name><surname>Akinrinola</surname>, <given-names>O</given-names></string-name>. &#x0026; <string-name><surname>Ololade</surname>, <given-names>Y.J</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Conceptualising emerging technologies and ICT adoption: Trends and challenges in Africa-US contexts</article-title>&#x2019;, <source><italic>World Journal of Advanced Research and Reviews</italic></source> <volume>21</volume>(<issue>3</issue>), <fpage>1676</fpage>&#x2013;<lpage>1683</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.30574/wjarr.2024.21.3.0872">https://doi.org/10.30574/wjarr.2024.21.3.0872</ext-link></comment></mixed-citation></ref>
<ref id="CIT0053"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ukeje</surname>, <given-names>N</given-names></string-name>., <string-name><surname>Gutierrez</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Petrova</surname>, <given-names>K</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>Information security and privacy challenges of cloud computing for government adoption: A systematic review</article-title>&#x2019;, <source><italic>International Journal of Information Security</italic></source> <volume>23</volume>(<issue>2</issue>), <fpage>1459</fpage>&#x2013;<lpage>1475</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.21203/rs.3.rs-3351319/v1">https://doi.org/10.21203/rs.3.rs-3351319/v1</ext-link></comment></mixed-citation></ref>
<ref id="CIT0054"><mixed-citation publication-type="journal"><person-group person-group-type="author"><collab>United Nations</collab></person-group>, <year>2024</year>, <source><italic>E-government survey 2024: Accelerating digital transformation for sustainable development with the addendum on artificial intelligence</italic></source>, <comment>viewed 30 November 2024, from <ext-link ext-link-type="uri" xlink:href="https://desapublications.un.org/sites/default/files/publications/2024-09/&#x0025;28Web&#x0025;20version&#x0025;29&#x0025;20E-Government&#x0025;20Survey&#x0025;202024&#x0025;201392024.pdf">https://desapublications.un.org/sites/default/files/publications/2024-09/&#x0025;28Web&#x0025;20version&#x0025;29&#x0025;20E-Government&#x0025;20Survey&#x0025;202024&#x0025;201392024.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0055"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Valle-Cruz</surname>, <given-names>D</given-names></string-name>. &#x0026; <string-name><surname>Garc&#x00ED;a-Contreras</surname>, <given-names>R</given-names></string-name></person-group>., <year>2025</year>, &#x2018;<article-title>Towards AI-driven transformation and smart data management: Emerging technological change in the public sector value chain</article-title>&#x2019;, <source><italic>Public Policy and Administration</italic></source> <volume>40</volume>(<issue>2</issue>), <fpage>254</fpage>&#x2013;<lpage>275</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.techfore.2025.124076">https://doi.org/10.1016/j.techfore.2025.124076</ext-link></comment></mixed-citation></ref>
<ref id="CIT0056"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Worku</surname>, <given-names>Z</given-names></string-name></person-group>., <year>2024</year>, &#x2018;<article-title>The benefits of artificial intelligence for enhancing the quality and efficiency of service delivery in South Africa</article-title>&#x2019;, <source><italic>Boletin de Literatura Oral-The Literary Journal</italic></source> <volume>11</volume>(<issue>1</issue>), <fpage>482</fpage>&#x2013;<lpage>497</lpage>.</mixed-citation></ref>
</ref-list>
<fn-group>
<fn><p><bold>How to cite this article:</bold> Baloyi, W.M., Meyer, N. &#x0026; Rossouw, D., 2026, &#x2018;A conceptual framework for ethical emerging digital technologies: A South African public sector perspective&#x2019;, <italic>Acta Commercii</italic> 26(1), a1503. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/ac.v26i1.1503">https://doi.org/10.4102/ac.v26i1.1503</ext-link></p></fn>
</fn-group>
</back>
</article>