SlideShare a Scribd company logo
Issues in Information Systems
Volume XII, No. 2, pp. 67-73-, 2011
Information Technology Ethics: A Research Framework
Issues in Information Systems
Volume X, Issue X, pp. x-x, Year
INFORMATION TECHNOLOGY ETHICS: A RESEARCH
FRAMEWORK
Richard V. McCarthy, Quinnipiac University, [email protected]
Leila Halawi, Nova Southeastern University, [email protected]
Jay E. Aronson, The University of Georgia, [email protected]
ABSTRACT
Information technology has become so pervasive that
opportunities for abuses abound. IT Ethics has taken on
increasing importance as the size and complexity of IT issues
continues to grow. This paper outlines a research framework to
analyze: Do significant ethical differences exist amongst
undergraduate and graduate MIS students?
Keywords: Information Technology (IT), Ethics, IT and Ethics
INTRODUCTION
We live in an information society. Most people live and work
within the context of information technology (Abratt, Nel, &
Higgs, 1992). IT enhances leisure time and enriches culture by
expanding the distribution of information, relieves pressures on
urban areas by enabling individuals to work from home or
remote-site offices (Garcia, 2009), changes the way we work,
and the way we work with one another. In terms of productivity
and speed of communications, these changes have been mostly
positive (Benham, 1995). But what have been the costs? IT
introduces change that creates new ethical issues.
Ethical Theories and IT
Gates (1995) suggested that the study of computer ethics is
needed because there is a vacuum of policies surrounding the
new possibilities. He defines computer ethics as the analysis of
the nature and social impact of computer technology and the
corresponding formulation and justification of policies for the
ethical use of such a technology.
RESEARCH METHODOLOGY
Our research centered upon the following research question: Do
significant ethical differences exist amongst undergraduate and
graduate MIS students in the United States?
The research hypotheses to be tested are as follows:
H1: Computer information systems undergraduate and graduate
students have the same ethical beliefs
H2: Female computer information systems students and male
computer information systems students have the
same ethical beliefs.
To test these hypotheses a subset of five ethical scenarios that
were utilized by Athey (2011) to test if significant ethical
differences existed amongst manager was used along with one
ethical scenario that was developed based upon an actual case
from the researcher’s university. According to Jones (2014),
“the scenario technique has been shown to be useful in eliciting
attitudes by personalizing the issues” (p. 15).
RESULTS
Eighty-seven scenarios were administered and the demographics
of the sample population are shown in Table 1. The sample
population had more males (70.1%) than females (29.9%).
A Chi-Square test was performed to test each of the three
hypotheses. The first hypothesis tested whether undergraduate
and graduate computer information systems students hold the
same ethical beliefs. Responses from MBA students were not
considered as part of this analysis. A p-value was calculated
for each of the six scenarios
and any value less than .05 was rejected. Scenarios 2 and 6 were
rejected on this basis, but scenarios 1, 3, 4, and 5 were
accepted.
Table 1. Demographics
Gender
Program
Responses
Female
Undergraduate CIS student
4
Graduate CIS student
6
Graduate MBA student
16
Male
Undergraduate CIS student
27
Graduate CIS student
19
Graduate MBA student
15
The second hypothesis tested whether female and male
computer information systems students hold the same ethical
beliefs. Responses from MBA students were not considered as
part of this analysis. A p-value was calculated for each of the
six scenarios and any value less than .05 was rejected.
Scenarios 1, 2, 3 and 6 were rejected on this basis, but scenarios
4 and 5 were accepted.
Figure 1. Technology Adoption Life Cycle
The third hypothesis tested whether computer information
systems graduate students and masters of business
administration graduate students hold the same ethical beliefs.
Responses from undergraduate students were not considered as
part of this analysis. A p-value was calculated for each of the
six scenarios and none of the scenarios exhibited a value less
than .05.
SUMMARY
It was very clear from the responses that there were no
significant differences in ethical beliefs amongst MBA and MS-
CIS graduate students. It should be noted that in both cases the
students had not received formal training related to computer
ethics within there program of study, though in both cases the
topic was covered in sections within their curriculum. The
curriculum for the MBA students is changing next year to
include a formal course in business ethics that will include
information technology related topics.
Based upon the results of our study, we concluded that
significant differences existed between male and female
computer information systems students in their ethical beliefs.
Though as noted previously, there was a small sample
population of female students. This is significant because it
supports the industry study gender differences that show that
software piracy and hacking tend to be more prevalent amongst
males than females.
REFERENCES
Abratt, R., Nel D., & Higgs, S. N. (1992). An examination of
the ethical beliefs of managers using selected scenarios in a
cross-cultural environment. Journal of Business Ethics, 11(1),
29-35.
Benham, H. C., & Wagner, J. L. (1995). Ethical attitudes of
business students and MIS personnel. Proceedings of the ACM
SIGCPR Conference [online], Nashville TN USA, 44-49.
Available:
www.acm.org/pubs/articles/proceedings/cpr/212490/p44-
wagner/p44-wagner.pdf
Gates, B. (1995). The road ahead. New York, NY: Viking
Penguin Group.
0.00%
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
Eager
Beavers
Early
Adopters
Early
Majority
Late Majority
Technically
Adverse
Percentage
Traditional TALC
Surveyed Individuals
Surveyed Organizations

More Related Content

Similar to Issues in Information SystemsVolume XII, No. 2, pp. 67-73-.docx

2008 Annual Review Presentation
2008 Annual Review Presentation2008 Annual Review Presentation
2008 Annual Review Presentation
Bang Dinh
 
Identifying students’ profiles for MOOCs – a social media analysis
Identifying students’ profiles for MOOCs – a social media analysisIdentifying students’ profiles for MOOCs – a social media analysis
Identifying students’ profiles for MOOCs – a social media analysis
Gabriela Grosseck
 
Computational Social Science
Computational Social ScienceComputational Social Science
Computational Social Science
journal ijrtem
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
AIRCC Publishing Corporation
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
ijcsit
 
Attitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremAttitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measurem
haifa rzem
 
Effects of Developers’ Training on User-Developer Interactions in Information...
Effects of Developers’ Training on User-Developer Interactions in Information...Effects of Developers’ Training on User-Developer Interactions in Information...
Effects of Developers’ Training on User-Developer Interactions in Information...
Jennifer McCauley
 
The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docx
todd241
 
1 An Introduction to Data Ethics MODULE AUTHOR1 S
1 An Introduction to Data Ethics MODULE AUTHOR1   S1 An Introduction to Data Ethics MODULE AUTHOR1   S
1 An Introduction to Data Ethics MODULE AUTHOR1 S
MerrileeDelvalle969
 
Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [
Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [
Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [
AlyciaGold776
 
Predicting user behavior using data profiling and hidden Markov model
Predicting user behavior using data profiling and hidden Markov modelPredicting user behavior using data profiling and hidden Markov model
Predicting user behavior using data profiling and hidden Markov model
IJECEIAES
 
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...
IJCSES Journal
 
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...
IJCSES Journal
 
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfTwin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Sreevalsan V.K.
 
Running head LITERATURE REVIEW .docx
Running head LITERATURE REVIEW                                   .docxRunning head LITERATURE REVIEW                                   .docx
Running head LITERATURE REVIEW .docx
charisellington63520
 
INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...
INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...
INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...
IJCI JOURNAL
 
APPLYING QUALITATIVE RESEARCH IN E-LEARNING DISCUSSION AND FINDINGS FROM THR...
APPLYING QUALITATIVE RESEARCH IN E-LEARNING  DISCUSSION AND FINDINGS FROM THR...APPLYING QUALITATIVE RESEARCH IN E-LEARNING  DISCUSSION AND FINDINGS FROM THR...
APPLYING QUALITATIVE RESEARCH IN E-LEARNING DISCUSSION AND FINDINGS FROM THR...
Monica Waters
 
ppt1 - Copy (1).pptx
ppt1 - Copy (1).pptxppt1 - Copy (1).pptx
ppt1 - Copy (1).pptx
SRINIVASARAOKALUPUKU
 
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docxRunning head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
jenkinsmandie
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Turner Sparks
 

Similar to Issues in Information SystemsVolume XII, No. 2, pp. 67-73-.docx (20)

2008 Annual Review Presentation
2008 Annual Review Presentation2008 Annual Review Presentation
2008 Annual Review Presentation
 
Identifying students’ profiles for MOOCs – a social media analysis
Identifying students’ profiles for MOOCs – a social media analysisIdentifying students’ profiles for MOOCs – a social media analysis
Identifying students’ profiles for MOOCs – a social media analysis
 
Computational Social Science
Computational Social ScienceComputational Social Science
Computational Social Science
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
Attitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremAttitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measurem
 
Effects of Developers’ Training on User-Developer Interactions in Information...
Effects of Developers’ Training on User-Developer Interactions in Information...Effects of Developers’ Training on User-Developer Interactions in Information...
Effects of Developers’ Training on User-Developer Interactions in Information...
 
The Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docxThe Darth” Side of Technology Use AnInductively Derived Ty.docx
The Darth” Side of Technology Use AnInductively Derived Ty.docx
 
1 An Introduction to Data Ethics MODULE AUTHOR1 S
1 An Introduction to Data Ethics MODULE AUTHOR1   S1 An Introduction to Data Ethics MODULE AUTHOR1   S
1 An Introduction to Data Ethics MODULE AUTHOR1 S
 
Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [
Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [
Discussion # 1 Due Weds 081921Wk 1 Discussion 1 - Statistics [
 
Predicting user behavior using data profiling and hidden Markov model
Predicting user behavior using data profiling and hidden Markov modelPredicting user behavior using data profiling and hidden Markov model
Predicting user behavior using data profiling and hidden Markov model
 
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...
 
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...
 
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfTwin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
 
Running head LITERATURE REVIEW .docx
Running head LITERATURE REVIEW                                   .docxRunning head LITERATURE REVIEW                                   .docx
Running head LITERATURE REVIEW .docx
 
INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...
INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...
INVESTIGATING THE FUTURE OF ‘ENGINEER OF 2020’ ATTRIBUTES: MOVING FROM ACCESS...
 
APPLYING QUALITATIVE RESEARCH IN E-LEARNING DISCUSSION AND FINDINGS FROM THR...
APPLYING QUALITATIVE RESEARCH IN E-LEARNING  DISCUSSION AND FINDINGS FROM THR...APPLYING QUALITATIVE RESEARCH IN E-LEARNING  DISCUSSION AND FINDINGS FROM THR...
APPLYING QUALITATIVE RESEARCH IN E-LEARNING DISCUSSION AND FINDINGS FROM THR...
 
ppt1 - Copy (1).pptx
ppt1 - Copy (1).pptxppt1 - Copy (1).pptx
ppt1 - Copy (1).pptx
 
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docxRunning head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
 

More from vrickens

1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx
vrickens
 
1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx
vrickens
 
1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx
vrickens
 
10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx
vrickens
 
100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx
vrickens
 
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
vrickens
 
1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx
vrickens
 
100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx
vrickens
 
100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx
vrickens
 
100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx
vrickens
 
100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx
vrickens
 
100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx
vrickens
 
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
vrickens
 
100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx
vrickens
 
100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx
vrickens
 
100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx
vrickens
 
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
vrickens
 
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
vrickens
 
10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx
vrickens
 
10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx
vrickens
 

More from vrickens (20)

1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx
 
1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx
 
1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx
 
10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx
 
100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx
 
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
 
1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx
 
100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx
 
100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx
 
100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx
 
100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx
 
100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx
 
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
 
100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx
 
100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx
 
100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx
 
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
 
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
 
10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx
 
10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx
 

Recently uploaded

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 

Recently uploaded (20)

Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 

Issues in Information SystemsVolume XII, No. 2, pp. 67-73-.docx

  • 1. Issues in Information Systems Volume XII, No. 2, pp. 67-73-, 2011 Information Technology Ethics: A Research Framework Issues in Information Systems Volume X, Issue X, pp. x-x, Year INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK Richard V. McCarthy, Quinnipiac University, [email protected] Leila Halawi, Nova Southeastern University, [email protected] Jay E. Aronson, The University of Georgia, [email protected] ABSTRACT Information technology has become so pervasive that opportunities for abuses abound. IT Ethics has taken on increasing importance as the size and complexity of IT issues continues to grow. This paper outlines a research framework to analyze: Do significant ethical differences exist amongst undergraduate and graduate MIS students? Keywords: Information Technology (IT), Ethics, IT and Ethics INTRODUCTION We live in an information society. Most people live and work within the context of information technology (Abratt, Nel, & Higgs, 1992). IT enhances leisure time and enriches culture by expanding the distribution of information, relieves pressures on urban areas by enabling individuals to work from home or
  • 2. remote-site offices (Garcia, 2009), changes the way we work, and the way we work with one another. In terms of productivity and speed of communications, these changes have been mostly positive (Benham, 1995). But what have been the costs? IT introduces change that creates new ethical issues. Ethical Theories and IT Gates (1995) suggested that the study of computer ethics is needed because there is a vacuum of policies surrounding the new possibilities. He defines computer ethics as the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such a technology. RESEARCH METHODOLOGY Our research centered upon the following research question: Do significant ethical differences exist amongst undergraduate and graduate MIS students in the United States? The research hypotheses to be tested are as follows: H1: Computer information systems undergraduate and graduate students have the same ethical beliefs H2: Female computer information systems students and male computer information systems students have the same ethical beliefs. To test these hypotheses a subset of five ethical scenarios that were utilized by Athey (2011) to test if significant ethical differences existed amongst manager was used along with one ethical scenario that was developed based upon an actual case from the researcher’s university. According to Jones (2014),
  • 3. “the scenario technique has been shown to be useful in eliciting attitudes by personalizing the issues” (p. 15). RESULTS Eighty-seven scenarios were administered and the demographics of the sample population are shown in Table 1. The sample population had more males (70.1%) than females (29.9%). A Chi-Square test was performed to test each of the three hypotheses. The first hypothesis tested whether undergraduate and graduate computer information systems students hold the same ethical beliefs. Responses from MBA students were not considered as part of this analysis. A p-value was calculated for each of the six scenarios and any value less than .05 was rejected. Scenarios 2 and 6 were rejected on this basis, but scenarios 1, 3, 4, and 5 were accepted. Table 1. Demographics Gender Program Responses Female Undergraduate CIS student 4 Graduate CIS student 6 Graduate MBA student 16 Male Undergraduate CIS student 27 Graduate CIS student 19
  • 4. Graduate MBA student 15 The second hypothesis tested whether female and male computer information systems students hold the same ethical beliefs. Responses from MBA students were not considered as part of this analysis. A p-value was calculated for each of the six scenarios and any value less than .05 was rejected. Scenarios 1, 2, 3 and 6 were rejected on this basis, but scenarios 4 and 5 were accepted. Figure 1. Technology Adoption Life Cycle The third hypothesis tested whether computer information systems graduate students and masters of business administration graduate students hold the same ethical beliefs. Responses from undergraduate students were not considered as part of this analysis. A p-value was calculated for each of the six scenarios and none of the scenarios exhibited a value less than .05. SUMMARY It was very clear from the responses that there were no significant differences in ethical beliefs amongst MBA and MS- CIS graduate students. It should be noted that in both cases the students had not received formal training related to computer ethics within there program of study, though in both cases the topic was covered in sections within their curriculum. The curriculum for the MBA students is changing next year to include a formal course in business ethics that will include information technology related topics. Based upon the results of our study, we concluded that significant differences existed between male and female computer information systems students in their ethical beliefs. Though as noted previously, there was a small sample population of female students. This is significant because it supports the industry study gender differences that show that
  • 5. software piracy and hacking tend to be more prevalent amongst males than females. REFERENCES Abratt, R., Nel D., & Higgs, S. N. (1992). An examination of the ethical beliefs of managers using selected scenarios in a cross-cultural environment. Journal of Business Ethics, 11(1), 29-35. Benham, H. C., & Wagner, J. L. (1995). Ethical attitudes of business students and MIS personnel. Proceedings of the ACM SIGCPR Conference [online], Nashville TN USA, 44-49. Available: www.acm.org/pubs/articles/proceedings/cpr/212490/p44- wagner/p44-wagner.pdf Gates, B. (1995). The road ahead. New York, NY: Viking Penguin Group. 0.00% 10.00% 20.00% 30.00% 40.00%