Author List: Harrington, Susan J.;
MIS Quarterly, 1996, Volume 20, Issue 3, Page 257-278.
This research asks whether codes of ethics affect computer abuse judgments and intentions of information systems (IS) employees. Codes of ethics examined include both company codes of ethics and those written specifically to deal with IS issues. In addition, since the intent of codes of ethics is to clarify responsibility and deter unethical behavior, both the psychological trait of responsibility denial and its moderating effect on codes was studied. While company codes did not affect the computer abuse judgments and intentions of all IS personnel, they did affect those IS personnel who tend to deny responsibility, thus suggesting that company codes may clarify responsibility and reduce rationalizations for some people. Unlike company codes, IS-specific codes of ethics had a direct effect an computer sabotage judgments and intentions, but had no differential effect on those high in responsibility denial. Finally, responsibility denial was directly related to all computer abuse judgments and intentions studied. Overall, codes had little effect on computer abuse judgments and intentions relative to the psychological trait of responsibility denial.
Keywords: abuse and crime; codes of ethics; Computer crime; deterrence; IS security; manage- merit of security; responsibility
Algorithm:

List of Topics

#156 0.585 ethical ethics ambidexterity responsibility codes moral judgments code behavior professional act abuse judgment professionals morality effect issues unethical intentions personal
#173 0.144 effect impact affect results positive effects direct findings influence important positively model data suggest test factors negative affects significant relationship
#298 0.126 job employees satisfaction work role turnover employee organizations organizational information ambiguity characteristics personnel stress professionals conflict organization intention variables systems
#186 0.064 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection