Attitudes Towards Information Ethics: A View from Egypt

Purpose – The information technology (IT) related ethical issues will only increase in frequency and complexity with the increasing diffusion of IT in economies and societies. The purpose of this paper is to explore Egyptian students' attitudes towards the information ethics issues of privacy, access, property, and accuracy, and it evaluates the possible impact of a number of personal characteristics on such attitudes.Design/methodology/approach – This research utilized a cross‐sectional sample and data set to test five hypotheses. It adopted an instrument to collect the respondents' background information and assess their attitudes towards the information ethics issues of privacy, property, accuracy, and access. Egyptian business students at Alexandria University were asked to participate in the survey. A total of 305 responses were collected and analyzed.Findings – The analysis revealed that students are sensitive to the ethicality of information privacy, information accuracy, and information access. Ho...

[1]  James R. Davis,et al.  Professional ethics: Business students' perceptions , 1991 .

[2]  Janice C. Sipior,et al.  Ethical Responsibility for Software Development , 1998, Inf. Syst. Manag..

[3]  Alan R. Peslak,et al.  AN EXPLORATORY INVESTIGATION OF INFORMATION TECHNOLOGY ETHICS FACTORS , 2006 .

[4]  Anthony R. Hendrickson,et al.  Cross-national Differences in Computer-Use Ethics: A Nine-country Study , 1999 .

[5]  Sudip Bhattacharjee,et al.  Digital music and online sharing: software piracy 2.0? , 2003, CACM.

[6]  Mary Conway Dato-on,et al.  ‘The Business of Ethics and Gender’ , 2006 .

[7]  Kiyoshi Murata,et al.  Rethinking the concept of the right to information privacy: a Japanese perspective , 2008, J. Inf. Commun. Ethics Soc..

[8]  Sharyne. Merritt Marketing ethics and education: Some empirical findings , 1991 .

[9]  Walter Maner Unique ethical problems in information technology , 1996 .

[10]  Herman T. Tavani,et al.  Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.

[11]  Lori N. K. Leonard,et al.  Illegal, Inappropriate, And Unethical Behavior In An Information Technology Context: A Study To Explain Influences , 2001, J. Assoc. Inf. Syst..

[12]  Göran Collste,et al.  Global ICT-ethics: the case of privacy , 2008, J. Inf. Commun. Ethics Soc..

[13]  Helen Kelley,et al.  Morality and Computers: Attitudes and Differences in Moral Judgments , 1999, Inf. Syst. Res..

[14]  Timothy Paul Cronan,et al.  Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..

[15]  Omar E. M. Khalil,et al.  Artificial decision-making and artificial ethics: A management concern , 1993 .

[16]  A. Sikula,et al.  Are age and ethics related? , 1994, The Journal of psychology.

[17]  Ajay Adhikari,et al.  Information Ethics: An investigation of different subcultures in a society , 2002 .

[18]  S. Vitell,et al.  Consumer Ethics: Determinants of Ethical Beliefs of African Americans , 2003 .

[19]  Feng-Yang Kuo,et al.  Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting , 2001 .

[20]  Martin Calkins Rippers, Portal Users, and Profilers: Three Web-Based Issues for Business Ethicists , 2002 .

[21]  Tinsley E. Yarbrough,et al.  Tax Ethics and Taxpayer Attitudes: A Survey , 1978 .

[22]  Kaushik Mitra,et al.  The Effects of Individual Difference Factors on the Acceptability of Ethical and Unethical Workplace Behaviors , 1998 .

[23]  Mohamed M. Ahmed,et al.  Business Students' Perception of Ethics and Moral Judgment: A Cross-Cultural Study , 2003 .

[24]  Lydia L. Gan,et al.  An empirical study of software piracy among tertiary institutions in Singapore , 2006, Inf. Manag..

[25]  Mohammed Y. A. Rawwas,et al.  Ethics of Tomorrow's Business Managers the Influence of Personal Beliefs and Values, Individual Characteristics, and Situational Factors , 2000 .

[26]  Lori N. K. Leonard,et al.  Attitude toward ethical behavior in computer use: a shifting model , 2005, Ind. Manag. Data Syst..

[27]  M. Lane,et al.  Ethics in education: A comparative study , 1989 .

[28]  Wing S. Chow,et al.  Ethical belief and behavior of managers using information technology for decision making in Hong Kong , 2001 .

[29]  Hsing Kenneth Cheng,et al.  Toward a profile of student software piraters , 1996 .

[30]  David Ma,et al.  Sub-Cultural Differences in Information Ethics across China: Focus On Chinese Management Generation Gaps , 2009, J. Assoc. Inf. Syst..

[31]  Sandra J. Milberg,et al.  Information Privacy: Corporate Management and National Regulation , 2000 .

[32]  Antonis C. Stylianou,et al.  Individual Differences in the Acceptability of Unethical Information Technology Practices: The Case of Machiavellianism and Ethical Ideology , 2004 .

[33]  Fritz H. Grupe,et al.  Is it Time for an it Ethics Program? , 2002, Inf. Syst. Manag..

[34]  Trevor Wood-Harper,et al.  Ethically Situated Information Systems Development , 1999, Aust. Comput. J..

[35]  Dane K. Peterson,et al.  Ethical Beliefs of Business Professionals: A Study of Gender, Age and External Factors , 2001 .

[36]  C. Gilligan In a Different Voice: Psychological Theory and Women''s , 1982 .

[37]  J. Moor Why We Need Better Ethics for Emerging Technologies , 2005, Ethics and Information Technology.

[38]  Gurpreet Dhillon,et al.  Software piracy: a view from Hong Kong , 2000, CACM.

[39]  Michael Bommer,et al.  A behavioral model of ethical and unethical decision making , 1987 .

[40]  H. Hejase,et al.  Ethics education: An assessment case of the American University of Science and Technology – Lebanon , 2012 .

[41]  Robert C. Ford,et al.  Ethical decision making: A review of the empirical literature , 1994 .

[42]  Paul Serwinek,et al.  Demographic & related differences in ethical views among small businesses , 1992 .

[43]  Gurpreet Dhillon,et al.  Ethics and information technology use: a survey of US based SMEs , 2000, Inf. Manag. Comput. Secur..

[44]  S. Altschuller DEVELOPING AN IT VIEW-BASED FRAMEWORK FOR IS ETHICS RESEARCH , 2004 .

[45]  Andrew Grosso Legally speaking: the promise and problems of the No Electronic Theft Act , 2000, CACM.

[46]  R. Beekun,et al.  Gender differences in business ethics: Justice and relativist perspectives , 2007 .

[47]  Edward J. O'Boyle,et al.  An ethical decision-making process for computing professionals , 2002, Ethics and Information Technology.

[48]  J. Michael Pearson,et al.  Measuring the importance of ethical behavior criteria , 1997, CACM.

[49]  Amir Hasnaoui,et al.  Stakeholders Perspective and Ethics in Financial Information Systems , 2009, J. Electron. Commer. Organ..

[50]  L. Kohlberg,et al.  Moral development: A review of the theory , 1977 .

[51]  James R. Ciesla,et al.  Re-examining the Influence of Individual Values on Ethical Decision Making , 1997 .

[52]  J. Daniel Couger,et al.  Preparing IS Students to Deal with Ethical Issues , 1989, MIS Q..

[53]  Timothy Paul Cronan,et al.  How men and women view ethics , 1998, CACM.

[54]  Robert M. Davison,et al.  The Ethics of IT Professionals in Japan and China , 2009, J. Assoc. Inf. Syst..

[55]  Judy Anderson Cyberethics: Morality and Law in Cyberspace , 2005 .

[56]  Don Fallis,et al.  Information ethics for twenty-first century library professionals , 2007, Libr. Hi Tech.

[57]  Chee-Sing Yap,et al.  Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..

[58]  L. Dawson,et al.  Ethical Differences Between Men and Women in The Sales Profession , 1997 .

[59]  Stewart Kowalski,et al.  Computer ethics and computer abuse: a study of Swedish and Canadian university data processing students , 1990 .

[60]  Karen D. Loch,et al.  Ethics and information technology use: a factor analysis of attitudes to computer use , 1995, Inf. Syst. J..

[61]  Susan C. Borkowski,et al.  Business Students and Ethics: A Meta-Analysis , 1998 .

[62]  Enid Mumford,et al.  Information Systems Research and the Quest for Certainty , 2003, J. Assoc. Inf. Syst..

[63]  H. Jeff Smith,et al.  Values, personal information privacy, and regulatory approaches , 1995, CACM.

[64]  Durwood Ruegger,et al.  A study of the effect of age and gender upon student business ethics , 1992 .

[65]  Richard G. Mathieu,et al.  Data integrity and the Internet: implications for management , 1995, Inf. Manag. Comput. Secur..

[66]  R. Erffmeyer,et al.  An Empirical Investigation of Japanese Consumer Ethics , 1999 .

[67]  Donald P. Robin,et al.  Making Sense of The Research on Gender and Ethics in Business: A Critical Analysis and Extension , 1997, Business Ethics Quarterly.

[68]  Kiran Karande,et al.  Moral philosophies of marketing managers A comparison of American , Australian , and Malaysian cultures , 2000 .

[69]  Mohammad J. Abdolmohammadi,et al.  Effects of Education and Intervention on Business Students’ Ethical Cognition: A Cross Sectional and Longitudinal Study , 2000 .

[70]  Mansoor Al-A'Ali,et al.  Computer ethics for the computer professional from an Islamic point of view , 2008, J. Inf. Commun. Ethics Soc..

[71]  James R. Rest Moral Development: Advances in Research and Theory , 1986 .

[72]  Ram D. Gopal,et al.  Global software piracy: you can't get blood out of a turnip , 2000, CACM.

[73]  B. Husted The Impact of National Culture on Software Piracy , 2000 .

[74]  Hsing K. Cheng,et al.  To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..

[75]  Robert M. Siegfried,et al.  Student Attitudes on Software Piracy and Related Issues of Computer Ethics , 2004, Ethics and Information Technology.

[76]  R. Mason Four ethical issues of the information age , 1986 .

[77]  Dennis F. Galletta,et al.  Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..

[78]  Kiran Karande,et al.  Moral philosophies of marketing managers , 2002 .

[79]  Paula L. Rechner,et al.  Shaping Ethical Perceptions: An Empirical Assessment of the Influence of Business Education, Culture, and Demographic Factors , 2005 .

[80]  H. Jeff Smith,et al.  Ethics and information systems , 2002, Data Base.

[81]  Karen D. Loch,et al.  Evaluating ethical decision making and computer use , 1996, CACM.

[82]  Herman T. Tavani,et al.  The uniqueness debate in computer ethics: What exactly is at issue, and why does it matter? , 2002, Ethics and Information Technology.

[83]  Donald Gotterbarn,et al.  Using the new ACM code of ethics in decision making , 1993, CACM.

[84]  M. Lane,et al.  Pygmalion effect: An issue for business education and ethics , 1988 .

[85]  Don Fallis,et al.  Information Ethics for 21st Century Library Professionals , 2005 .

[86]  Feng-Yang Kuo,et al.  The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy , 2003 .

[87]  Timothy Paul Cronan,et al.  Making ethical decisions , 2000, CACM.

[88]  Satish P. Deshpande,et al.  Managers' Perception of Proper Ethical Conduct: The Effect of Sex, Age, and Level of Education , 1997 .

[89]  L. Treviño Ethical Decision Making in Organizations: A Person-Situation Interactionist Model , 1986 .

[90]  Robert M. Davison,et al.  Professional Ethics in Information Systems: A Personal Perspective , 2000, Commun. Assoc. Inf. Syst..