Developing Ethical Practices to Minimize Computer Misuse

Various researchers have suggested the need to develop sound ethical information technology practices to combat the increased incidence of computer misuse. Relating to the ubiquity of information technology, this article presents a basis to understand the nature of computer misuse. Such an analysis will help in developing ethical practices to minimize computer misuse. Finally, this article argues that by addressing ethical issues at both formal and informal levels, the risks associated with information technology usage can be minimized.

[1]  D. Parker Crime by computer , 1976 .

[2]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[3]  D. Parker,et al.  Ethical conflicts in information and computer science, technology, and business , 1990 .

[4]  James Backhouse,et al.  Understanding Information: An Introduction , 1990 .

[5]  Michael Clarke,et al.  Business Crime: Its Nature and Control , 1990 .

[6]  Keith Jackson,et al.  Computer ethics: Cautionary tales and ethical dilemmas in computing , 1990 .

[7]  J. T. Delaney,et al.  Do company ethics training programs make a difference? An empirical analysis , 1992 .

[8]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[9]  Terrell Ward Bynum,et al.  Computer ethics in the computer science curriculum , 1992 .

[10]  Donald Gotterbarn,et al.  The use and abuse of computer ethics , 1992, J. Syst. Softw..

[11]  Helen Z. Margetts,et al.  Computerization and Controversy: Value Conflicts and Social Choices , 1993, J. Inf. Technol..

[12]  Karen A. Forcht,et al.  Computer Security Management , 1993 .

[13]  Keith W. Miller,et al.  How good is good enough?: an ethical analysis of software construction and use , 1994, CACM.

[14]  Gurpreet Dhillon,et al.  Computer Security within Organizations , 1994 .

[15]  Deborah G. Johnson,et al.  Computer ethics (2nd ed.) , 1994 .

[16]  Richard A. Spinello Ethical Aspects of Information Technology , 1994 .

[17]  Thomas W. Dunfee,et al.  Toward A Unified Conception Of Business Ethics: Integrative Social Contracts Theory , 1994 .

[18]  Ronald E. Anderson,et al.  The ACM code of ethics: history, process, and implications , 1994 .

[19]  Thomas A. Finholt,et al.  Social Issues in Computing: Putting Computing in Its Place , 1994 .

[20]  Karen D. Loch,et al.  Ethics and information technology use: a factor analysis of attitudes to computer use , 1995, Inf. Syst. J..

[21]  R L Simpson,et al.  Ethics in the information age. , 1995, Nursing management.

[22]  James Backhouse,et al.  Managing computer crime: a research outlook , 1995, Comput. Secur..

[23]  David F. Linowes Your Personal Information Has Gone Public , 1996, Computerization and Controversy, 2nd Ed..

[24]  J. Lozano,et al.  Ethics and management: A controversial issue , 1996 .

[25]  J. R. G. Wood,et al.  How we profess: the ethical systems analyst , 1996, CACM.

[26]  Karen D. Loch,et al.  Evaluating ethical decision making and computer use , 1996, CACM.

[27]  Enid Mumford,et al.  Systems Design Ethical Tools for Ethical Change , 1996 .

[28]  Phillip W. Balsmeier,et al.  The ethics of sentencing white-collar criminals , 1996 .

[29]  Walter Maner Unique ethical problems in information technology , 1996 .

[30]  James Backhouse,et al.  Risks in the use of information technology within organizations , 1996 .

[31]  Tracy Hall,et al.  Software Project Management Ethics , 1997 .

[32]  Mark Shelton,et al.  Computer and Information Ethics , 1999 .