Switch to: References

Add citations

You must login to add citations.
  1. Information technology and moral values.John Sullins - forthcoming - Stanford Encyclopedia of Philosophy.
    A encyclopedia entry on the moral impacts that happen when information technologies are used to record, communicate and organize information. including the moral challenges of information technology, specific moral and cultural challenges such as online games, virtual worlds, malware, the technology transparency paradox, ethical issues in AI and robotics, and the acceleration of change in technologies. It concludes with a look at information technology as a model for moral change, moral systems and moral agents.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Characteristics and challenges in the industries towards responsible AI: a systematic literature review.Marianna Anagnostou, Olga Karvounidou, Chrysovalantou Katritzidaki, Christina Kechagia, Kyriaki Melidou, Eleni Mpeza, Ioannis Konstantinidis, Eleni Kapantai, Christos Berberidis, Ioannis Magnisalis & Vassilios Peristeras - 2022 - Ethics and Information Technology 24 (3):1-18.
    Today humanity is in the midst of the massive expansion of new and fundamental technology, represented by advanced artificial intelligence (AI) systems. The ongoing revolution of these technologies and their profound impact across various sectors, has triggered discussions about the characteristics and values that should guide their use and development in a responsible manner. In this paper, we conduct a systematic literature review with the aim of pointing out existing challenges and required principles in AI-based systems in different industries. We (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Information and Computer Ethics.Richard A. Spinello - 2012 - Journal of Information Ethics 21 (2):17-32.
    This paper reviews the intriguing history of information and computer ethics. Information ethics began as a branch of applied ethics concerned with the responsible management of information resources, while computer ethics was originally concerned with the training of computer professionals. Thanks to the Internet and the Web, these two fields merged together as access and communications issues became more prominent. In more recent years, responding to the ongoing debate about this discipline's structural foundations, philosophers like Floridi have given information ethics (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Ethics, Information Manipulation and Cyber Security in Social Media.Aynur Tekke & Aybala Lale - 2021 - Akademik İncelemeler Dergisi 16 (2):44-62.
    The aim of this study is to analyze the information in the social media which is being produced and included into the stream by mass media in the context of digital ethics and cyber security. The principles of digital ethics includes norms that takes individual’s privacy of life into consideration. In addition to being a concept related to cyberspace, computer, and computer networks, it also includes the whole human-made activities, for this reason manipulation techniques in cyberspace appear as an important (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Information systems ethics – challenges and opportunities.Simon Rogerson, Keith W. Miller, Jenifer Sunrise Winter & David Larson - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):87-97.
    Purpose The purpose of this paper is to explore the ethical issues surrounding information systems practice with a view to encouraging greater involvement in this aspect of IS research. Information integrity relies upon the development and operation of computer-based information systems. Those who undertake the planning, development and operation of these information systems have obligations to assure information integrity and overall to contribute to the public good. This ethical dimension of information systems has attracted mixed attention in the IS academic (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Ethical considerations of using information obtained from online file sharing sites.Aimee van Wynsberghe & Jeroen van der Ham - 2015 - Journal of Information, Communication and Ethics in Society 13 (3/4):256-267.
    Purpose – The purpose of this paper is to develop a novel approach for the ethical analysis of data collected from an online file-sharing site known as The PirateBay. Since the creation of Napster back in the late 1990s for the sharing and distribution of MP3 files across the Internet, the entertainment industry has struggled to deal with the regulation of information sharing at large. Added to the ethical questions of censorship and distributive justice are questions related to the use (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • A comparative study on the information ethics of junior high school students cognition and behavior between taiwan and china: Kaohsiung and nanjing regions used as examples.Wen-Jiuh Chiang, Chihchia Chen, ChiaChien Teng & Jiangjun Gu - 2008 - Science and Engineering Ethics 14 (1):121-138.
    A great deal of progress has been made on information ethics. Which portion is not sufficient? That might be the comparison from countries to countries. The purpose of this study was closely examined using the cross-cultural method for comparison. To determine the ethics cognitions and behaviors of the students, a comprehensive survey was distributed. The questionnaire for the study used Mason’s four essential factors in information ethics that included Privacy, Accuracy, Property and Accessibility (PAPA). The samples were comprised of Kaohsiung (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The ethical decision-making processes of information systems workers.David B. Paradice & Roy M. Dejoie - 1991 - Journal of Business Ethics 10 (1):1 - 21.
    An empirical investigation was conducted to determine whether management information systems (MIS) majors, on average, exhibit ethical decision-making processes that differ from students in other functional business areas. The research also examined whether the existence of a computer-based information system in an ethical dilemma influences ethical desision-making processes. Although student subjects were used, the research instrument has been highly correlated with educational levels attained by adult subjects in similar studies. Thus, we feel that our results have a high likelihood of (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145-160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • PAPA knows best: Principles for the ethical sharing of information on social networking sites. [REVIEW]James L. Parrish - 2010 - Ethics and Information Technology 12 (2):187-193.
    The advent of social networking sites has changed the face of the information society Mason wrote of 23 years ago necessitating a reevaluation of the social contracts designed to protect the members of the society. Despite the technological and societal changes that have happened over the years, the information society is still based on the exchange of information. This paper examines various historical events involving social networking sites through the lens of the PAPA framework (Mason 1986 ) to highlight select (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Individual Differences in the Acceptability of Unethical Information Technology Practices: The Case of Machiavellianism and Ethical Ideology.Susan J. Winter, Antonis C. Stylianou & Robert A. Giacalone - 2004 - Journal of Business Ethics 54 (3):275-296.
    While information technologies present organizations with opportunities to become more competitive, unsettled social norms and lagging legislation guiding the use of these technologies present organizations and individuals with ethical dilemmas. This paper presents two studies investigating the relationship between intellectual property and privacy attitudes, Machiavellianism and Ethical Ideology, and working in R&D and computer literacy in the form of programming experience. In Study 1, Machiavellians believed it was more acceptable to ignore the intellectual property and privacy rights of others. Programmers (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Attitudes towards information ethics: a view from Egypt.Omar E. M. Khalil & Ahmed A. S. Seleim - 2012 - Journal of Information, Communication and Ethics in Society 10 (4):240-261.
    PurposeThe information technology related ethical issues will only increase in frequency and complexity with the increasing diffusion of IT in economies and societies. The purpose of this paper is to explore Egyptian students' attitudes towards the information ethics issues of privacy, access, property, and accuracy, and it evaluates the possible impact of a number of personal characteristics on such attitudes.Design/methodology/approachThis research utilized a cross‐sectional sample and data set to test five hypotheses. It adopted an instrument to collect the respondents' background (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Ethical Considerations When Using Mobile Technology in the Pre-Service Teacher Practicum.Leanne Cameron & Chris Campbell - 2012 - International Journal of Cyber Ethics in Education 2 (2):1-11.
    In this paper, the authors revisit the pre-service teacher practicum experience and propose that mobile technology, with its ability to provide instant communication and immediate access to resources, could minimise the “disconnect” between theory and the school classroom and improve the experience for all parties involved. However, before this project began, the wide-ranging ethical considerations surrounding the use of mobile technologies had to be addressed. This paper outlines a range of issues that should be considered whenever mobile technologies are to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Unauthorized copying of software: an empirical study of reasons for and against.Mikko T. Siponen & Tero Vartiainen - 2007 - Acm Sigcas Computers and Society 37 (1):30-43.
    Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of computer software, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Big data, little wisdom: trouble brewing? Ethical implications for the information systems discipline.David J. Purleen, David Rooney & Ali Intezari - 2017 - Social Epistemology 31 (4):400-416.
    The question we pose in this paper is: How can wisdom and its inherent drive for integration help information systems in the development of practices for responsibly and ethically managing and using big data, ubiquitous information and algorithmic knowledge and so make the world a better place? We use the recent financial crises to illustrate the perils of an overreliance on and misuse of data, information and predictive knowledge when global Information Systems are not wisely integrated. Our analysis shows that (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Costs and Utilities Perspective of Consumers' Intentions to Engage in Online Music Sharing: Consumers' Knowledge Matters.Mei-Fang Chen & Ya-Hui Yen - 2011 - Ethics and Behavior 21 (4):283 - 300.
    Online music sharing, deemed illegal for invading intellectual property rights under current laws, has become a crucial issue for the music industry in the modern digital age, but few have investigated the potential costs and utilities for individuals involved in such online misbehavior. This study aimed to fill in this gap to predict consumers' intentions to engage in online music sharing and further consider consumers' online music sharing knowledge as a moderator in the research model. The results of repeated measures (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Artificial decision-making and artificial ethics: A management concern. [REVIEW]Omar E. M. Khalil - 1993 - Journal of Business Ethics 12 (4):313 - 321.
    Expert systems are knowledge-based information systems which are expected to have human attributes in order to replicate human capacity in ethical decision making. An expert system functions by virtue of its information, its inferential rules, and its decision criteria, each of which may be problematic. This paper addresses three basic reasons for ethical concern when using the currently available expert systems in a decisions-making capacity. These reasons are (1) expert systems' lack of human intelligence, (2) expert systems' lack of emotions (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Socio-ethical implications of using AI in accelerating SDG3 in Least Developed Countries.Kutoma Wakunuma, Tilimbe Jiya & Suleiman Aliyu - 2020 - Journal of Responsible Technology 4:100006.
    Download  
     
    Export citation  
     
    Bookmark  
  • Implications of an ethic of privacy for human-centred systems engineering.Peter J. Carew, Larry Stapleton & Gabriel J. Byrne - 2008 - AI and Society 22 (3):385-403.
    Privacy remains an intractable ethical issue for the information society, and one that is exacerbated by modern applications of artificial intelligence. Given its complicity, there is a moral obligation to redress privacy issues in systems engineering practice itself. This paper investigates the role the concept of privacy plays in contemporary systems engineering practice. Ontologically a nominalist human concept, privacy is considered from an appropriate engineering perspective: human-centred design. Two human-centred design standards are selected as exemplars of best practice, and are (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Cyberbullying, student nurses’ ethical awareness and the Covid-19 pandemic.Ka Young Kim & Jeong Sil Choi - 2021 - Nursing Ethics 28 (7-8):1258-1268.
    Background: The global COVID-19 pandemic has increased cyber communication, causing nursing students’ clinical practice to be held in cyberspace. Thus, it is essential to ensure that nursing students develop comprehensive cyber ethics awareness. Moreover, cyberbullying is becoming more widespread and is an increasingly relevant new concept. Objectives: This study aimed to assess the experiences of cyberbullying among nursing students during clinical practice and determine the effects of cyberbullying victimization and cyber environments on their cyber ethics awareness. Research design: Data for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • “Privacy by default” and active “informed consent” by layers.Amaya Noain-Sánchez - 2016 - Journal of Information, Communication and Ethics in Society 14 (2):124-138.
    Purpose The purpose of this paper is to lay out an approach to addressing the problem of privacy protection in the global digital environment based on the importance that information has to improve users’ informational self-determination. Following this reasoning, this paper focuses on the suitable way to provide user with the correct amount of information they may need to maintain a desirable grade of autonomy as far as their privacy protection is concerned and decide whether or not to put their (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • An Empirical Validation of Perceived Importance and Behavior Intention in IT Ethics.Timothy Paul Cronan, Lori N. K. Leonard & Jennifer Kreie - 2005 - Journal of Business Ethics 56 (3):231-238.
    Robin et al. (1996) suggested a new construct when studying ethical behavioral intention which they entitled PIE (perceived importance). They empirically tested the PIE construct and found it to significantly impact both ethical judgment and behavioral intention. The present study extends and validates Robin et al.s work on PIE using a different context, different scenarios and a different sample. The findings indicate strong support for the validity of Robin et al.s PIE instrument and show PIE to significantly influence ethical judgment (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Development and emancipation.Bernd Carsten Stahl, Neil McBride & Ibrahim Elbeltagi - 2010 - Journal of Information, Communication and Ethics in Society 8 (1):85-107.
    PurposeThe purpose of this paper is to investigate the emancipatory promises and realities of information and communication technology in Egypt.Design/methodology/approachThe combination of Habermasian and Foucauldian ideas implemented by a critical discourse analysis of the Egyptian Information Society Policy and interviews with employees of local decision support systems employees. Promises and rhetoric are contrasted with findings and questioned with regards to their validity.FindingsOn the policy level, analysis shows that the emancipating rhetoric of ICT is not followed through. ICT is mostly seen (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Perceptions of Productivity and Digital Ethics in Smart Phone Use in a Chinese Context.Mary Lind, Chi Anyansi-Archibong & Obasi H. Akan - 2012 - International Journal of Cyber Ethics in Education 2 (2):34-43.
    The networked society is impacting all aspects of people’s lives and changing the way that information is obtained and used. For students this impact is changing how information is shared and tasks are performed. A digital enabled culture is resulting in changed norms on collaboration and providing more opportunities for teams to collaborate on a moment’s notice. The digital ethics code of the 1980s is addressed in the current digital culture. This research will develop a measurement scale for digital ethics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The relevance of software rights: An anthology of the divergence of sociopolitical doctrines. [REVIEW]Mikko Siponen - 2001 - AI and Society 15 (1-2):128-148.
    The relevance of different concepts of computer software (henceforth SW) rights is analysed from the viewpoint of divergent sociopolitical doctrines. The question of software rights is considered from the ontological assumptions, on one extreme, to the relevance of current practical applications of SW rights (such as copyright and patent), on the other extreme. It will be argued (from a non-descriptive/non-cognitive account) that the current expression of SW rights in Western societies (namely copyright, excluding patent) can be seen to be fair (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The role of control and other factors in the electronic surveillance workplace.Jengchung V. Chen & Yangil Park - 2005 - Journal of Information, Communication and Ethics in Society 3 (2):79-91.
    Many office workers use computers and the Internet not only to get their daily jobs done but also to deal with their personal businesses. Therefore employers nowadays monitor their employees electronically to prevent the misuse of the company resources. The use of electronic monitoring in organizations causes issues of trust and privacy. This study is dedicated to developing a conceptual model on the two issues under electronic monitoring. Control, considered as the essence of the definition of privacy as well as (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Ethical considerations in an online community: the balancing act. [REVIEW]Cecile Paris, Nathalie Colineau, Surya Nepal, Sanat Kumar Bista & Gina Beschorner - 2013 - Ethics and Information Technology 15 (4):301-316.
    With the emergence and rapid growth of Social Media, a number of government departments in several countries have embraced Social Media as a privilege channel to interact with their constituency. We are exploring, in collaboration with the Australian Department of Human Services, the possibility to exploit the potential of social networks to support specific groups of citizens. To this end, we have developed Next Step, an online community to help people currently receiving welfare payments find a job and become financially (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical Decisions About Sharing Music Files in the P2P Environment.Rong-An Shang, Yu-Chen Chen & Pin-Cheng Chen - 2008 - Journal of Business Ethics 80 (2):349-365.
    Digitized information and network have made an enormous impact on the music and movie industries. Internet piracy is popular and has greatly threatened the companies in these industries. This study tests Hunt-Vitell’s ethical decision model and attempts to understand why and how people share unauthorized music files with others in the peer-to-peer (P2P) network. The norm of anti-piracy, the ideology of free software, the norm of reciprocity, and the ideology of consumer rights are proposed as four deontological norms related to (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • An Ethical Exploration of Privacy and Radio Frequency Identification.Alan R. Peslak - 2005 - Journal of Business Ethics 59 (4):327-345.
    This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • ACTIVE ethics: an information systems ethics for the internet age.Neil Kenneth McBride - 2014 - Journal of Information, Communication and Ethics in Society 12 (1):21-44.
    Purpose– The purpose of this paper is to present a novel mnemonic, ACTIVE, inspired by Mason's 1985 PAPA mnemonic, which will help researchers and IT professionals develop an understanding of the major issues in information ethics.Design/methodology/approach– Theoretical foundations are developed for each element of the mnemonic by reference to philosophical definitions of the terms used and to virtue ethics, particularly MacIntyrean virtue ethics. The paper starts with a critique of the elements of the PAPA mnemonic and then proceeds to develop (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. [REVIEW]Hassan Aleassa, John Michael Pearson & Scott McClurg - 2011 - Journal of Business Ethics 98 (4):663-676.
    Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance, over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Ethics in the IT Classroom.David Larson & Keith W. Miller - 2009 - Journal of Information Ethics 18 (2):38-49.
    Download  
     
    Export citation  
     
    Bookmark  
  • Individual privacy and computer-based human resource information systems.G. Stephen Taylor & J. Stephen Davis - 1989 - Journal of Business Ethics 8 (7):569 - 576.
    The proliferation of computers in the business realm may lead to ethical problems between individual and societal rights, and the organization's need to control costs. In an attempt to explore the causes of this potential conflict, this study examined the varying levels of sensitivity 223 respondents assigned to different types of information typically stored in computer-based human resource information systems. It was found that information most directly related to the job — pay rate, fringe benefits, educational history — was considered (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Softlifting: A model of motivating factors. [REVIEW]Penny M. Simpson, Debasish Banerjee & Claude L. Simpson - 1994 - Journal of Business Ethics 13 (6):431 - 438.
    Softlifting (software piracy by individuals) is an unethical behavior that pervades today''s computer dependent society. Since a better understanding of underlying considerations of the behavior may provide a basis for remedy, a model of potential determinants of softlifting behavior is developed and tested. The analysis provides some support for the hypothesized model, specifically situational variables, such as delayed acquisition times, and personal gain variables, such as the challenge of copying, affect softlifting behavior. Most importantly, the analysis indicated that ethical perception (...)
    Download  
     
    Export citation  
     
    Bookmark   42 citations  
  • Ethical practice in sharing and mining medical data.Kevin Watson & Dinah M. Payne - 2021 - Journal of Information, Communication and Ethics in Society 19 (1):1-19.
    Purpose The purpose of this paper is to review current practice in sharing and mining medical data revealing benefits, costs and ethical issues. Based on stakeholder perspectives and values, the authors create an ethical code to regulate the sharing and mining of medical information. Design/methodology/approach The framework is based on a review of academic, practitioner and legal research. Findings Owing to the inability of current safeguards to protect consumers from risks related to the disclosure of medical information, the authors develop (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges.Corey M. Angst - 2009 - Journal of Business Ethics 90 (S2):169 - 178.
    When information is transformed from what has traditionally been a paper-based format into digitized elements with meaning associated to them, new and intriguing discussions begin surrounding proper and improper uses of this codified and easily transmittable information. As these discussions continue, some health care providers, insurers, laboratories, pharmacies, and other healthcare stakeholders are creating and retroactively digitizing our medical information with the unambiguous endorsement of the federal government.Some argue that these enormous databases of medical information offer improved access to timely (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Privacy versus accessibility: The impact of situationally conditioned belief. [REVIEW]Laura Lally - 1996 - Journal of Business Ethics 15 (11):1221 - 1226.
    The information age we are living in and the technology that supports it, raises new ethical concerns. Among these concerns are privacy — the rights of individuals to withold information they consider sensitive, and accessibility — the rights of individuals to obtain information that is relevant to the decisions they must make. Arguments about potential impacts of information technology on privacy and accessibility mask and underlying conflict — that one person's beliefs about their right to relevant information is likely to (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Examining the differences between information professional groups in perceiving information ethics: An analytic hierarchy process study.Hsiu-Ping Yueh, Ching-Yin Huang & Weijane Lin - 2022 - Frontiers in Psychology 13.
    Information and communication technology has a great impact on contemporary society and people’s lives. Especially with the pervasive access to rapidly developing technology, the impact of ICT on society and human values, the norms of ICT use, and the ethical issues derived from them are beyond the past ethical framework and deserve more research attention. The purpose of this study was to explore the key factors that influence the decision-making behaviors of information professionals when they are faced with information ethics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Understanding the Behavioral Intention to Report Unethical Information Technology Practices: The Role of Machiavellianism, Gender, and Computer Expertise. [REVIEW]Antonis C. Stylianou, Susan Winter, Yuan Niu, Robert A. Giacalone & Matt Campbell - 2013 - Journal of Business Ethics 117 (2):333-343.
    Although organizations can derive competitive advantage from developing and implementing information systems, they are confronted with a rising number of unethical information practices. Because end-users and computer experts are the conduit to an ethical organizational environment, their intention to report unethical IT-related practices plays a critical role in protecting intellectual property and privacy rights. Using the survey methodology, this article investigates the relationship between willingness to report intellectual property and privacy violations and Machiavellianism, gender and computer literacy in the form (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The Elephant in the Server Room.Shana R. Ponelis & Johannes J. Britz - 2012 - Journal of Information Ethics 21 (1):27-39.
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical Issues in Technology-Mediated Education.John Nnaji - 2012 - International Journal of Cyber Ethics in Education 2 (2):44-51.
    Contemporary system of education has been strongly revolutionised as a result of the current trends of facilitating learning and improving performance through creation, usage, and management of appropriate technological processes and resources. Manipulating technology in a way to use information correctly and realize information flow effectively has become a necessity. However, such necessity has been beclouded by variety of ethical issues that range from privacy, accuracy, accessibility to question of intellectual property rights. It is such ethical problems that this paper (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • To Disclose or Not to Disclose: The Ironic Effects of the Disclosure of Personal Information About Ethnically Distinct Newcomers to a Team.Bret Crane, Melissa Thomas-Hunt & Selin Kesebir - 2019 - Journal of Business Ethics 158 (4):909-921.
    Recently, scholars have argued that disclosure of personal information is an effective mechanism for building high-quality relationships. However, personal information can focus attention on differences in demographically diverse teams. In an experiment using 37 undergraduate teams, we examine how sharing personal information by ethnically similar and ethnically distinct newcomers to a team affects team perceptions, performance, and behavior. Our findings indicate that the disclosure of personal information by ethnically distinct newcomers improves team performance. However, the positive impact on team performance (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • The Significance of a Suitable Information Ethical Code.Christina Ling-Hsing Chang - 2011 - Journal of Information Ethics 20 (1):54-85.
    Download  
     
    Export citation  
     
    Bookmark  
  • Toward an Ethical Understanding of the Controversial Technology of Online Reverse Auctions.Mohamed Hédi Charki, Emmanuel Josserand & Nabila Boukef Charki - 2011 - Journal of Business Ethics 98 (1):17-37.
    B2B online reverse auctions technology (ORAs) emerged as a popular tool for large buying firms in the late 1990s. However, its growing use has been accompanied by a corresponding increase in unethical behaviors to a point that it has been described as the technology that has triggered more ethical concerns in the e-commerce arena than in any other segment of activity. Our findings first indicate that the establishment of formal ethical criteria based on the restrictive interpretation of ethics as honesty (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation