Copyright, Piracy, Privacy and Security Issues: Acceptable or Unacceptable Actions for End Users?

Copyright, Piracy, Privacy and Security Issues: Acceptable or Unacceptable Actions for End Users?

Jennifer Kreie (University of Arkansas, USA) and Timothy Paul Cronan (University of Arkansas, USA)
Copyright: © 2002 |Pages: 17
DOI: 10.4018/978-1-931777-15-5.ch005
OnDemand PDF Download:
$37.50

Abstract

End user acceptable/unacceptable behavior related to computer information systems has caused significant losses to business and society. Some measures have been suggested to prevent losses or discourage unethical behavior. One approach is to identify factors that might better explain acceptable/unacceptable actions. In this study, we examined models of ethical behavior and selected factors from these models that might influence decision-making. We conducted an empirical study to determine perceptions of acceptable or unacceptable behavior and which factors were significant in influencing a person’s judgment of acceptable/unacceptable behavior. Identifying the factors that influence ethical decision-making is one approach suggested by researchers to find ways to discourage unethical behavior and help businesses prevent losses. The results of the study indicate there are significant factors that affected individuals’ assessment of what is acceptable behavior. The results also indicate that the factors which were influential were contingent on the characteristics of the ethical dilemma.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
Ali Salehnia
Chapter 1
Gurpreet S. Dhillon, Trevor T. Moores
The phenomenal growth in Internet commerce in recent years has brought privacy concerns to the fore. Although privacy as a concept has been well... Sample PDF
Internet Privacy: Interpreting Key Issues
$37.50
Chapter 2
Gerald Grant
Managers, IT practitioners, and IS researchers are easily seduced by the latest information technology wave. Consequently, we tend not to question... Sample PDF
One Size Does Not Fit All: Potential Diseconomics in Global Information Systems
$37.50
Chapter 3
Peter P. Mykytyn Jr.
Not too many years ago, hardly anyone had heard the terms “Web browser,” “Web,” or “electronic commerce.” Today, the World Wide Web, often referred... Sample PDF
Some Internet and E-Commerce Legal Perspectives Impacting the End User
$37.50
Chapter 4
Mo Adam Mahmood, Gary L. Sullivan, Ray-Lin Tung
Stimulated by recent high-profile incidents, concerns about business ethics have increased over the last decade. In response, research has focused... Sample PDF
A New Approach to Evaluating Business Ethics: An Artificial Neural Networks Application
$37.50
Chapter 5
Jennifer Kreie, Timothy Paul Cronan
End user acceptable/unacceptable behavior related to computer information systems has caused significant losses to business and society. Some... Sample PDF
Copyright, Piracy, Privacy and Security Issues: Acceptable or Unacceptable Actions for End Users?
$37.50
Chapter 6
J. Christopher Westland
Internet auction markets offer customers a compelling new model for price discovery. This model places much more power in the hands of the consumer... Sample PDF
Ten Lessons that Internet Auction Markets Can Learn from Securities Market Automation
$37.50
Chapter 7
Janice M. Burn, Karen D. Loch
Many lessons from history offer strong evidence that technology can have a definite effect on the social and political aspects of human life. At... Sample PDF
The Societal Impact of World Wide Web - Key Challenges for the 21st Century
$37.50
Chapter 8
Dieter Fink
Under the system of e-commerce, organisations leave themselves open to attack which can have catastrophic consequences. Recent well-publicised... Sample PDF
Method over Mayhem in Managing e-Commerce Risk
$37.50
Chapter 9
Darryl A. Seale
This study examines predictors of software piracy, a practice estimated to cost the software industry nearly $11 billion in lost revenue annually.... Sample PDF
Why Do We Do It If We Know It's Wrong? A Structural Model of Software Piracy
$37.50
Chapter 10
Ali Salehnia, Hassan Pournaghshband
The process of software development is usually described in terms of a progression from the project planning to the final code, passing through... Sample PDF
Ethical Issues in Software Engineering Revisited
$37.50
Chapter 11
Matthew Warren, William Hutchinson
We have seen a rise in computer misuse at a global level and also the development of new policies and strategies to describe organized computer... Sample PDF
Cyberspace Ethics and Information Warfare
$37.50
Chapter 12
Mark Campbell Williams
Should ethics be a significant importance in information systems educational research? In this chapter, I reflect on my heuristic and... Sample PDF
A Conversation Regarding Ethics in Information Systems Educational Research
$37.50
Chapter 13
Susan J. Harrington
Despite the existence of laws and much publicity surrounding software piracy, it is widely believed that software piracy is commonplace (Eining &... Sample PDF
Software Piracy: Are Robin Hood and Responsibility Denial at Work?
$37.50
Chapter 14
Anastasia Papazafeiropoulou, Athanasia Pouloudi
Policy implementation for electronic commerce is a complex process since policy makers, national governments in their majority, have to act in a... Sample PDF
Social Issues in Electronic Commerce: Implications for Policy Makers
$37.50
Chapter 15
Andrew Ward, Brian Prosser
In the last decade of the twentieth century, with the advent of computers networked through Internet Service Providers and the declining cost of... Sample PDF
Kierkegaard and the Internet: The Role and Formation of Community in Education
$37.50
Chapter 16
James Douglas Orton
The themes explored elsewhere in this volume, on the intersection between information technology and social responsibility, take on new shapes when... Sample PDF
Manufacturing Social Responsibility Benchmarks in the Competitive Intelligence Age
$37.50
Chapter 17
Randall C. Reid, Mario Pascalev
Outsourcing of information technology (IT) is the transfer of a company’s information technology functions to external vendors. Ordinarily, such... Sample PDF
Strategic and Ethical Issues in Outsourcing Information Technologies
$37.50
Chapter 18
Stephen K. Probert
This chapter describes research in progress on the philosophical concept of authenticity – used as a framing device for providing an interpretation... Sample PDF
Ethics Authenticity and Emancipation in Information Systems Development
$37.50
Chapter 19
Mikko T. Siponen
This chapter argues, following the scholars of the first category, that human morality has a role as a means for ensuring security. But to achieve... Sample PDF
On the Role of Human Morality in Information System Security: From the Problems of Descriptivism to Non-Descriptive Foundations
$37.50
Chapter 20
Geoffrey A. Sandy
In western tradition information ethics has its origins in Athenian democracy. It was characterised by an oral culture and freedom of speech. Later... Sample PDF
The Government "Downunder" Attempts to Censor the Net
$37.50
Chapter 21
Atefeh Sadri McCampbell, Linda Moorhead Clare
The following chapter defines the practice of DNA analysis and identifies the ethical considerations of human genetic testing in the workplace and... Sample PDF
The Genetic Revolution: Ethical Implications for the 21st Century
$37.50
About the Editor