65
Views
7
CrossRef citations to date
0
Altmetric
 

Abstract

A recent survey shows that most people access computer resources without the benefit of clear standards of ethical and legal behavior in the MIS environment. This uninformed access leaves the organization – which is the legal custodian of computer data and software–susceptible to theft of resources and privacy and copyright violations as well as legal prosecution from law enforcement authorities. This article describes a survey of a cross section of MIS personnel and other system users in business, academia, and law enforcement and analyzes its results in the context of the current legal and ethical environment. It also suggests several remedies for reducing an organizations exposure to computer crime.

Additional information

Notes on contributors

Ella Paton Gardner

Ella Paton Gardner is assistant manager of strategy forum support at the Corporation for Open Systems International in McLean VA. She earned a BS at MIT, an MBA at the University of Michigan, and a DBA at George Washington University.

Linda B. Samuels

Linda B. Samuels is an associate professor of business legal studies at George Mason University. She has a JD degree from the University of Virginia and an MPA from the State University of New York at Albany.

Barry Render

Barry Render is the Charles Harwood Professor of Operations Management at the Roy E. Crummer Grduate School of Business, Rollins College, Winter Park FL. He holds a PhD in quantitative analysis from the University of Cincinnati.

Richard L. Coffinberger

Richard L. Coffinberger is the associate dean for academic programs in the School of Business Administration and an associate professor of business legal studies at George Mason University. He holds a JD from Wake Forest University Law School and an MS in business administration.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.