Search results

1 – 3 of 3
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 December 2005

Lori N.K. Leonard and Timothy Paul Cronan

In this study the researchers attempt to identify factors that could influence an individual's attitude toward ethical behavior in the information systems (IS) environment and…

4363

Abstract

Purpose

In this study the researchers attempt to identify factors that could influence an individual's attitude toward ethical behavior in the information systems (IS) environment and compare them to the findings of an earlier study to determine any changes.

Design/methodology/approach

A sample of university students is used to assess environmental influences (societal, belief system, personal, professional, legal, and business), moral obligation, consequences of the action, and gender, in order to determine what influences an individual's attitude toward a behavior. Discriminant analysis is used to assess the factor influences.

Findings

The findings indicate that many factors influence attitude toward ethical decisions and are dependent upon the type of ethical issue involved. Moreover, based on two time periods, the ethical attitude influencers have shifted over time. The gender findings indicate that attitude influencers are also dependent on the sex of the individual.

Originality/value

The findings show that attitude influencers have shifted over time (since an earlier study), which means that organizations must periodically reassess their employees' ethical climate and adjust their ethics' programs as attitude influencers change. The findings also show that training programs need to focus on the different influencers for males and females.

Details

Industrial Management & Data Systems, vol. 105 no. 9
Type: Research Article
ISSN: 0263-5577

Keywords

Access Restricted. View access options
Article
Publication date: 1 May 1996

Debasish Banerjee, Thomas W. Jones and Timothy Paul Cronan

The area of computer abuse and professional ethics in computing is of interest to companies as well as ethics researchers. Expands the research in ethical behaviour of information…

1302

Abstract

The area of computer abuse and professional ethics in computing is of interest to companies as well as ethics researchers. Expands the research in ethical behaviour of information system employees. Identifies empirically a few demographic variables that are associated with the ethical behaviour of information system (IS) personnel and raises a few issues for IS managers. In addition, indicates that the existing models of ethical behaviour, when used in the computing context, need to be suitably modified by including demographic variables.

Details

Industrial Management & Data Systems, vol. 96 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Access Restricted. View access options
Article
Publication date: 1 February 2005

Charles B. Foltz, Timothy Paul Cronan and Thomas W. Jones

This paper aims to examine the effectiveness of computer usage policies in university settings.

1532

Abstract

Purpose

This paper aims to examine the effectiveness of computer usage policies in university settings.

Design/methodology/approach

Students enrolled in business courses at three midwestern universities were divided, by class, into control and experimental groups. All subjects were asked to complete a survey regarding their awareness of university computer usage policies, consequences of misuse, and methods of policy distribution. The experimental group was exposed to sample computer usage policies. Two weeks later, all subjects were asked to complete the same survey again.

Findings

Results suggest that most students have not read their university computer usage policies. However, the presence of a computer usage policy does influence students who have read those policies, but a single exposure is insufficient to influence all subjects.

Research limitations/implications

The sample is limited to students from three universities.

Practical implications

Written policy statements alone cannot serve as a cornerstone of security; multiple factors must be used to communicate the content of the deterrents.

Originality/value

This study notes that the existence of computer usage policies within a university (or organization) does not ensure that all users are familiar with the content of those policies and the penalties imposed for their violation. Providing a copy of computer usage policies to students (or employees) and verbally highlighting major points are not sufficient exposure to eliminate indifference about computer misuse.

Details

Industrial Management & Data Systems, vol. 105 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

1 – 3 of 3
Per page
102050