Computer misuse: search for a solution

This paper argues that, in order to manage computer misuse, a greater understanding of its origins along with its effects is imperative. Further, it argues that individual attitudes and social norms with respect to illicit behaviour must be examined in the context of the personality factors, work situation and opportunities that may exist within organisations. While conducting the argument, the paper uses the theory of reasoned action (Fishbein and Ajzen, 1975). The theory is used to interpret computer misuse in two case studies: Barings Bank (a merchant bank) and the Centre for Malaria Research (CEFORMA) in Latin America. The paper draws on the findings in the two case studies to identify some core ethical principles that organisations need to adopt in order to minimise or prevent computer misuse.

[1]  T. Forester,et al.  Computer ethics: Cautionary tales and ethical dilemmas in computing , 1990 .

[2]  Simon Rogerson,et al.  Developing ethical practices to minimise computer misuse , 1997, 1997 International Symposium on Technology and Society Technology and Society at a Time of Sweeping Change. Proceedings.

[3]  James Backhouse,et al.  Understanding Information: An Introduction , 1990 .

[4]  I. Ajzen,et al.  Factors Influencing Intentions and the Intention-Behavior Relation , 1974 .

[5]  D. Randall Taking stock: Can the theory of reasoned action explain unethical conduct? , 1989 .

[6]  Effy Oz Ethics for the Information Age , 1993 .

[7]  Nigel Fielding,et al.  Power, Crime and Mystification , 1985 .

[8]  Michael Clarke,et al.  Business Crime: Its Nature and Control , 1990 .

[9]  Bart Victor,et al.  The Organizational Bases of Ethical Work Climates , 1988 .

[10]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[11]  David Bainbridge Introduction to Computer Law , 1993 .

[12]  John W. Snapper Ethics and the Management of Computer Technology , 1985 .

[13]  Karen D. Loch,et al.  Ethics and information technology use: a factor analysis of attitudes to computer use , 1995, Inf. Syst. J..

[14]  D. Parker Crime by computer , 1976 .

[15]  Phillip W. Balsmeier,et al.  The ethics of sentencing white-collar criminals , 1996 .

[16]  Michael Levi,et al.  Crisis? What crisis? Reactions to commercial fraud in the United Kingdom , 1987 .

[17]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.