Author List: Gattiker, Urs E.; Kelley, Helen;
Information Systems Research, 1999, Volume 10, Issue 3, Page 233.
Business ethics is an emerging area of research in many subfields of management, including information systems (IS). Empirical IS research has studied differences in users' attitudes and in moral judgments regarding ethical computer-related behavior. This study applied the "domains of morality" approach to determine how users felt about certain computer-related behaviors. Vignettes describing ethical dilemmas involving computer technology (e.g., uploading a computer virus on an electronic network/bulletin board system) were presented to a sample of Internet users. The research findings offered several interesting and, in some cases, unexpected results. The empirical results indicated that older computer users have a less permissive sense of what is right and wrong for an illegal game. When computers were used to test a banned game, men and women differed in their assessment of its appropriateness. A surprising finding was that participants were not likely to endorse civil liberties, and were more concerned about the harm to, and violations of, social norms when the scenario described a situation involving a computer virus. How users perceive, prejudge, and discriminate computer ethics and abusive computer actions raises numerous questions and implications for IS researchers, IS practitioners, and policy makers. The results of this study foster a better understanding of Internet users' moral categorization of specific computer behaviors and, hopefully, help to further reduce risks and vulnerabilities of systems by identifying computer actions deemed ethically acceptable by users. Opportunities for IS researchers to further explore this timely issue are also discussed.
Keywords: Age; Computer Security; Computer Viruses; Data Encryption; Domain Theory of Moral Development; Ethics; Gender; Socioeconomic Status
Algorithm:

List of Topics

#156 0.180 ethical ethics ambidexterity responsibility codes moral judgments code behavior professional act abuse judgment professionals morality effect issues unethical intentions personal
#56 0.101 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice
#127 0.098 systems information research theory implications practice discussed findings field paper practitioners role general important key grounded researchers domain new identified
#51 0.088 results study research experiment experiments influence implications conducted laboratory field different indicate impact effectiveness future participants evidence test controlled involving
#284 0.084 users user new resistance likely benefits potential perspective status actual behavior recognition propose user's social associated existing base using acceptance
#218 0.070 role roles gender differences women significant play age men plays sample differ played vary understand critical greater implications relatively offered
#48 0.053 dimensions electronic multidimensional game transactions relative contrast channels theory sustained model predict dimension mixture evolutionary results unique traditional likely finite