Switch to: References

Add citations

You must login to add citations.
  1. Ethics vs. IT Ethics: Do Undergraduate Students Perceive a Difference?Kathleen K. Molnar, Marilyn G. Kletke & Jongsawas Chongwatpol - 2008 - Journal of Business Ethics 83 (4):657-671.
    Do undergraduate students perceive that it is more acceptable to ‹cheat’ using information technology (IT) than it is to cheat without the use of IT? Do business discipline-related majors cheat more than non-business discipline-related majors? Do undergraduate students perceive it to be more acceptable for them personally to cheat than for others to cheat? Questionnaires were administered to undergraduate students at five geographical academic locations in the spring, 2006 and fall 2006 and spring, 2007. A total of 708 usable questionnaires (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • Explaining the Misuse of Information Systems Resources in the Workplace: A Dual-Process Approach.Amanda M. Y. Chu, Patrick Y. K. Chau & Mike K. P. So - 2015 - Journal of Business Ethics 131 (1):209-225.
    The aim of this study is to gain an understanding of why employees misuse information systems resources in the workplace. Rather than consider “intention,” as existing behavioral research commonly does, this study investigates actual behavior and employs IS resource misuse as the dependent variable. Data from a web-based survey are analyzed using the partial least squares approach. In light of the dual-process approach and the theory of planned behavior, the findings suggest that IS resource misuse may be both an intentional (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Ethical Decision Making with Information Systems Students.Samer Alhawari & Amine Nehari Talet - 2011 - International Journal of Cyber Ethics in Education 1 (2):41-53.
    Information Technology is a new tool in education that continually changes and offers new opportunities for teaching and learning. In general, the effects of IT are complex and depend upon people’s decisions about development and use. This study investigates the ethical issues in education in terms of Information Systems students’ attitudes at Saudi universities towards digital piracy. The differences in the ethical decision-making process, ethical awareness, and intention to perform questionable acts is examined. The authors tested for differences in attitudes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse.Paul Benjamin Lowry, Clay Posey, Tom L. Roberts & Rebecca J. Bennett - 2014 - Journal of Business Ethics 121 (3):385-401.
    Computer abuse by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals who (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Understanding the Behavioral Intention to Report Unethical Information Technology Practices: The Role of Machiavellianism, Gender, and Computer Expertise. [REVIEW]Antonis C. Stylianou, Susan Winter, Yuan Niu, Robert A. Giacalone & Matt Campbell - 2013 - Journal of Business Ethics 117 (2):333-343.
    Although organizations can derive competitive advantage from developing and implementing information systems, they are confronted with a rising number of unethical information practices. Because end-users and computer experts are the conduit to an ethical organizational environment, their intention to report unethical IT-related practices plays a critical role in protecting intellectual property and privacy rights. Using the survey methodology, this article investigates the relationship between willingness to report intellectual property and privacy violations and Machiavellianism, gender and computer literacy in the form (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Ethics Vs IT Ethics: a Comparative Study between the USA and the Middle East.Nada Almasri & Luay Tahat - 2018 - Journal of Academic Ethics 16 (4):329-358.
    This paper aims at investigating the perceived difference between ethics and IT ethics in college students. The study mainly investigates whether university students in the Middle East and their counterpart in the USA hold the same ethical values both in a traditional context and in an IT context. The study also investigates possible differences in students’ ethics considering their level of study and whether they have prior business ethics knowledge or not. Furthermore, the study controls for possible self-others bias in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Technology Regulation Policy for Business Ethics: An Example of RFID in Supply Chain Management. [REVIEW]Wei Zhou & Selwyn Piramuthu - 2013 - Journal of Business Ethics 116 (2):327-340.
    With the increase in use of a technology, its misuse possibility also increases in general. Moreover, there are instances where new technologies are implemented without thoroughly testing for vulnerabilities. We consider RFID, a disruptive technology, and related vulnerabilities in existing supply chain applications from an ethics perspective. We develop an extended ethics model to incorporate the effects of emerging information and communication technologies, specifically that of RFID systems, including technology selection, social consequences, and practitioners’ rationality. We introduce a set of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations