883
Views
7
CrossRef citations to date
0
Altmetric
Articles

Ethical Attitude and Behaviors Regarding Computer Use

&
Pages 481-497 | Published online: 04 Nov 2011

REFERENCES

  • Amnesty International (2006). Amnesty international statement at the opening of the Internet governance forum. http://www.amnesty.org/en/library/asset/POL30/054/2006/en/b3a46826-f9d1-11dd-b1b0-c961f7df9c35/pol300542006en.pdf (http://www.amnesty.org/en/library/asset/POL30/054/2006/en/b3a46826-f9d1-11dd-b1b0-c961f7df9c35/pol300542006en.pdf) (Accessed: 27 October 2010 ).
  • Ajzen , I. 1985 . “ From intentions to actions: A theory of planned behavior ” . In Action-control: From cognition to behavior , Edited by: Kuhl , J. and Beckman , J. 11 – 39 . Heidelberg : Springer .
  • Ajzen , I. 1991 . The theory of planned behavior . Organizational Behavior and Human Decision Processes , 50 : 179 – 211 .
  • Ajzen , I. and Fishbein , M. 1980 . Understanding attitudes and predicting social behavior , Englewood Cliffs, NJ : Prentice-Hall .
  • Al-Rafee , S. and Cronan , T. P. 2006 . Digital piracy: Factors that influence attitude toward behavior . Journal of Business Ethics , 63 : 237 – 259 .
  • Anderson , J. C. and Gerbing , D. W. 1988 . Structural equation modeling in practice: A review and recommended two-step approach . Psychological Bulletin , 103 : 411 – 423 .
  • Bagozzi , R. P. and Yi , Y. 1988 . On the evaluation of structural equation models . Journal of the Academy of Marketing Science , 16 : 74 – 94 .
  • Bandura , A. 1991 . “ Social cognitive theory of moral thought and action ” . In Handbook of moral behavior and development Vol. 1: Theory , Edited by: Kuritines , W. M. and Gewirtz , J. L. 45 – 103 . Hillsdale, NJ : Erlbaum .
  • Batson , C. and Coke , J. 1981 . A source of altruism and helping behavior: social, personality and developmental perspective , Hillsdale, NJ : Erlbaum .
  • Bebetsosi , E. and Antoniou , P. 2009 . Gender differences on attitudes, computer use and physical activity among Greek University students . The Turkish Online Journal of Educational Technology , 8 : 63 – 68 .
  • Bentler , P. M. 1990 . Comparative fit indexes in structural models . Psychological Bulletin , 107 : 238 – 246 .
  • Bentler , P. M. 1992 . On the fit of models to covariance and methodology . Psychological Bulletin , 112 : 400 – 404 .
  • Burnkrant , R. E. and Page , T. J. Jr. 1988 . The structure and antecedents of the normative and attitudinal components of Fishbein's theory of reasoned action . Journal of Experimental Social Psychology , 24 : 66 – 87 .
  • Bynum , T. W. and Rogerson , S. 1996 . Introduction and overview: Global Information Ethics . Science and Engineering Ethics , 2 : 131 – 136 .
  • Cappel , J. J. and Windsor , J. C. 1998 . A comparative investigation of ethical decision making: Information systems professionals versus students . The DATABASE for Advances in Information Systems , 29 ( 2 ) : 20 – 34 .
  • Courneya , K. S. and Bobick , T. M. 2000 . Integrating the theory of planned behavior with the processes and stages of change in the exercise domain . Psychology of Sport and Exercise , 1 : 41 – 56 .
  • Engel , J. F. , Blackwell , R. D. and Miniard , P.W. 1995 . Consumer behavior , 8th , ForthWorth, TX : Dryden Press .
  • Grube , J.W. , Morgan , M. and McGree , S.T. 1986 . Attitudes normative beliefs as predictor of smoking intentions and behaviors: A test of three models . British Intention of Social Psychology , 25 : 81 – 93 .
  • Haines , R. and Leonard , L. N. K. 2007 . Individual characteristics and ethical decision-making in an IT context . Industrial Management & Data Systems , 107 ( 1 ) : 5 – 20 .
  • Hair , J. F. Jr. , Anderson , R. E. , Tatham , R. L. and Black , W. C. 1998 . Multivariate data analysis , 5th , Englewood Cliffs, NJ : Prentice-Hall .
  • Hauptman , R. 1988 . Ethical challenges in librarianship , Phoenix, AZ : Oryx Press .
  • Himma , K. E. 2007 . Foundational issues in information ethics . Library Hi TECH , 25 : 79 – 94 .
  • Hsu , M. H. and Kuo , F. Y. 2003 . The effect of organization-based self-esteem and deindividuation in protecting personal information privacy . Journal of Business Ethics , 42 : 305 – 320 .
  • Hu , L. and Bentler , P.M. 1995 . “ Evaluating model fit ” . In Structural equation modeling: Concepts, issues, and applications , Edited by: Hoyle , R. H. 76 – 99 . Thousand Oaks, CA : Sage .
  • Iacobucci , D. , Saldanha , N. and Deng , X. 2007 . A meditation on mediation: Evidence that structural equations models perform better than regressions . Journal of Consumer Psychology , 17 ( 2 ) : 139 – 153 .
  • Jöreskog , K. G. and Sörbom , D. 1992 . LISREL: A guide to the program and applications , 3rd , Lincolnwood, IL : Scientific Software International .
  • Jung , I. 2009 . Ethical judgments and behaviors: Applying a multidimensional ethics scale to measuring ICT ethics of college students . Computers & Education , 53 : 940 – 949 .
  • Khouja , M. and Smith , M. A. 2007 . Optimal pricing for information goods with piracy and saturation effect . European Journal of Operational Research , 176 ( 1 ) : 482 – 497 .
  • Kostrewski , B. J. and Oppenheim , C. 1980 . Ethics in information science . Journal of Information Science , 1 : 277 – 283 .
  • Kuo , F. Y. and Hsu , M. H. 2001 . Development and validation of ethical computer self-efficacy measures: The case of soft lifting . Journal of Business Ethics , 32 : 299 – 315 .
  • Kuzu , A. 2009 . Problems related to computer ethics: Origins of the problems and suggested . The Turkish Online Journal of Educational Technology , 8 : 91 – 111 .
  • Leonard , L. N. K. , Cronan , T. P. and Kreie , J. 2004 . What influences IT ethical behavior intentions—Planned behavior, reasoned action, perceived importance, or individual characteristics? . Information & Management , 42 : 143 – 158 .
  • Maner , W. 1996 . Unique ethical problems in information technology . Science and Engineering Ethics , 2 : 137 – 154 .
  • Mathiesen , K. 2004 . What is information ethics? . ACM SIGCAS Computers and Society , 34 ( 1 ) : 6 – 19 .
  • Millar , R. and Shevlin , M. 2003 . Predicting career information-seeking behavior of school pupils using the theory of planned behavior . Journal of Vocational Behavior , 62 : 26 – 42 .
  • Molnar , K. K. , Kletke , M. G. and Chongwatpol , J. 2008 . Ethics vs. IT ethics: Do undergraduate students perceive a difference? . Journal of Business Ethics , 83 : 657 – 671 .
  • Moor , J. H. 1985 . What is computer ethics? . Metaphilosophy , 16 : 266 – 275 .
  • Parker , D. B. 1968 . Rules of ethics in information processing . Communications of the ACM , 11 : 198 – 201 .
  • Peace , A. G. , Galletta , D. and Thong , J. 2003 . Software piracy in the workplace: A model and empirical test . Journal of Management Information Systems , 20 ( 1 ) : 153 – 177 .
  • Peitz , M. and Waelbroeck , P. 2006 . Why the music iIndustry may gain from free downloading—The role of sampling . International Journal of Industrial Organization , 24 ( 5 ) : 907 – 913 .
  • Phukan , S. and Dhillon , G. 2000 . Ethics and information technology use: A survey of US based SMEs . Information Management & Computer Security , 8 : 239 – 243 .
  • Rhee , H. S. , Kim , C. and Ryu , Y. U. 2009 . Self-efficacy in information security: its influence on end users' information security practice behavior . Computer & Security , 28 : 816 – 826 .
  • Rhodes , R. E. , Courneya , K. S. and Jones , L. W. 2004 . Personality and social cognitive influences on exercise behaviour: adding the activity trait to the theory of planned behaviour . Psychology of Sport and Exercise , 5 : 243 – 254 .
  • Rivis , A. and Sheeran , P. 2003 . Social influences and the theory of planned behaviour: Evidence for a direct relationship between prototypes and young people's exercise behavior . Psychology and Health , 18 : 567 – 583 .
  • Snyder, M. G. (2005). Cyberethics & Internet downloads: An age-by-age guide to teaching children what they need to know. PARENTGUIDE News. Available from http://www.tweensandteensnews.com/archives/2005/editorial_oct05/CyberEthics.php (http://www.tweensandteensnews.com/archives/2005/editorial_oct05/CyberEthics.php)
  • Solomon , S. L. and O'Brien , J. A. 1990 . The effect of demographic factors on attitudes toward software piracy . Journal of Information System , 30 : 40 – 46 .
  • Suandi , T. B. 1991 . Commitment of 4-B youth leader towards volunteerism (Unpublished doctoral dissertation) , The Ohio State University : Columbus .
  • United Daily News Group. Digital divide in Taiwan. Available from http://eng.dgbas.gov.tw/ct.asp?xItem= 25562&CtNode=5210&mp=2 (http://eng.dgbas.gov.tw/ct.asp?xItem= 25562&CtNode=5210&mp=2)
  • Van den Hoven , M. J. 1995 . Equal access and social justice: Information as a primary good . ETHICOM95 , : 1 – 17 .
  • Wiener , N. 1948 . Cybernetics: Or control and communication in the animal and the machine , New York, NY : Technology Press/Wiley .
  • Wiener , N. 1950 . The human use of human beings: Cybernetics and society , Boston, MA : Houghton Mifflin .
  • Wu , J. J. and Tsang , A. S. L. 2008 . Factors affecting members' trust belief and behavior intention in virtual communities . Behavior & Information Technology , 27 : 115 – 125 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.