Matches in SemOpenAlex for { <https://semopenalex.org/work/W293780289> ?p ?o ?g. }
Showing items 1 to 62 of
62
with 100 items per page.
- W293780289 startingPage "66" @default.
- W293780289 abstract "Executive Summary Previous research studied on information ethics have addressed the issue of misuse of computer technology through the concepts of reasoned action and planned behavior. These studies are based on attitudes toward behavior, subjective norms, and perceived behavioral control. Current evidence from research indicates self-efficacy can be an important factor with the level of commitment and persistence in the attempt to influence human behavior. Since information ethics requires businesses to assess the ethical behavior of their employees and the security of their information systems, this paper empirically examines the effect of gender, age, education and religious commitment on ethical computer self-efficacy as it relates to software piracy. The data analysis revealed age and education have an effect on the propensity to pirate software. However, no significant differences between genders or religious commitment and the propensity to commit software piracy were found. This research discusses the significance of these findings and makes recommendations for future research. Introduction Information ethics is receiving considerable attention as software manufacturers begin to hire watchdog agencies to enforce compliance with their software licensing agreements. According to a survey by the Software & Information Industry Association and KPMG LLP in 2001, more than 50% of the business respondents stated they did not know if a company policy existed pertaining to the redistribution of illegally acquired software and content on the web (SIIA & KPMG, 2001). There accordingly is an interest to develop ethical awareness or social conscience with the use of technology in the work environment. The misuse of computers, such as copying of unprotected software, impacted the nation's economy in the year 2000 causing 109,000 lost jobs, $4.5 billion in lost wages and almost $1 billion in lost tax revenues (Geller, 2002). Many factors have been proposed to explain an interest in information ethics, including resource constraint (Eining & Christensen, 1991), social norm (Harrington, 1996), personal gain, (Simpson, Banerjee, & Simpson, 1994), environmental stimulus, (Loch & Conger, 1996), and legal factors (Bommer, Gratto, Gavander & Turtle, 1987). The rapid growth of the Internet has prompted the development of ethical norms and legislation to deal with issues of ownership, responsibility, personal privacy, and access (Mason, 1986; Loch & Conger, 1996). The development of a generic code of ethics attempts to address concerns of all parties in the milieus: society at large, nations, companies, professional organizations, and individuals. According to Anderson, Johnson, Gotterbarn, and Perrolle (1993), one such generic code is the Association for Computing Machinery (ACM) Code of Ethics and Professional Conduct. The philosophy of this generic code of ethics recognizes the importance of a set of commitments by members to an association such as the ACM or other societies may play. The set of commitments may be expressed in the form of rules and ideals that explain the ethical requirements considered important to the group as a professional association. Anderson et al. (1993) recognizes that an educationally oriented code of ethics is useful because it identifies the professional responsibilities to society. The benefit of having a code of ethics is the accountability of the profession to the public. Lastly, the most important function of a code of ethics is if it enhances the decision making process by providing examples of practicable applications through case analysis. However, Loch and Conger (1996) believe generic codes cannot address all ethical behaviors because they attempt to span milieus over which they have limited influence. Kreie and Cronan (2000) indicate the need for businesses to consider specific guidelines, policies, and training. They state: Businesses can encourage ethical decision-making by having a written code of ethics and providing ethics training, such as discussion of ethical scenarios, to help employees understand what is expected. …" @default.
- W293780289 created "2016-06-24" @default.
- W293780289 creator A5037740588 @default.
- W293780289 creator A5059638366 @default.
- W293780289 date "2004-10-01" @default.
- W293780289 modified "2023-09-27" @default.
- W293780289 title "Software Piracy: A Study of Formative Factors" @default.
- W293780289 hasPublicationYear "2004" @default.
- W293780289 type Work @default.
- W293780289 sameAs 293780289 @default.
- W293780289 citedByCount "5" @default.
- W293780289 countsByYear W2937802892012 @default.
- W293780289 countsByYear W2937802892013 @default.
- W293780289 crossrefType "journal-article" @default.
- W293780289 hasAuthorship W293780289A5037740588 @default.
- W293780289 hasAuthorship W293780289A5059638366 @default.
- W293780289 hasConcept C153180980 @default.
- W293780289 hasConcept C15744967 @default.
- W293780289 hasConcept C17744445 @default.
- W293780289 hasConcept C39549134 @default.
- W293780289 hasConcept C41008148 @default.
- W293780289 hasConcept C56739046 @default.
- W293780289 hasConcept C77088390 @default.
- W293780289 hasConcept C77805123 @default.
- W293780289 hasConceptScore W293780289C153180980 @default.
- W293780289 hasConceptScore W293780289C15744967 @default.
- W293780289 hasConceptScore W293780289C17744445 @default.
- W293780289 hasConceptScore W293780289C39549134 @default.
- W293780289 hasConceptScore W293780289C41008148 @default.
- W293780289 hasConceptScore W293780289C56739046 @default.
- W293780289 hasConceptScore W293780289C77088390 @default.
- W293780289 hasConceptScore W293780289C77805123 @default.
- W293780289 hasIssue "4" @default.
- W293780289 hasLocation W2937802891 @default.
- W293780289 hasOpenAccess W293780289 @default.
- W293780289 hasPrimaryLocation W2937802891 @default.
- W293780289 hasRelatedWork W10077100 @default.
- W293780289 hasRelatedWork W126387780 @default.
- W293780289 hasRelatedWork W129633986 @default.
- W293780289 hasRelatedWork W1499820579 @default.
- W293780289 hasRelatedWork W1558849624 @default.
- W293780289 hasRelatedWork W1568135533 @default.
- W293780289 hasRelatedWork W1968045708 @default.
- W293780289 hasRelatedWork W1977155733 @default.
- W293780289 hasRelatedWork W2030172204 @default.
- W293780289 hasRelatedWork W2034712930 @default.
- W293780289 hasRelatedWork W2137705772 @default.
- W293780289 hasRelatedWork W220128464 @default.
- W293780289 hasRelatedWork W229995961 @default.
- W293780289 hasRelatedWork W231530420 @default.
- W293780289 hasRelatedWork W2337915725 @default.
- W293780289 hasRelatedWork W2503082483 @default.
- W293780289 hasRelatedWork W2994146702 @default.
- W293780289 hasRelatedWork W310453030 @default.
- W293780289 hasRelatedWork W90935590 @default.
- W293780289 hasRelatedWork W2972027433 @default.
- W293780289 hasVolume "9" @default.
- W293780289 isParatext "false" @default.
- W293780289 isRetracted "false" @default.
- W293780289 magId "293780289" @default.
- W293780289 workType "article" @default.