Ethics vs. IT Ethics: Do Undergraduate Students Perceive a Difference?

Do undergraduate students perceive that it is more acceptable to ‹cheat’ using information technology (IT) than it is to cheat without the use of IT? Do business discipline-related majors cheat more than non-business discipline-related majors? Do undergraduate students perceive it to be more acceptable for them personally to cheat than for others to cheat? Questionnaires were administered to undergraduate students at five geographical academic locations in the spring, 2006 and fall 2006 and spring, 2007. A total of 708 usable questionnaires were returned including 532 from students majoring in business-related disciplines and 139 from students majoring in non-business related disciplines (37 were undecided). It appears that in terms of intellectual property violations, undergraduate students in general find cheating using IT more acceptable than cheating without the use of IT. It also appears that undergraduate students perceive that it is relatively more acceptable for them to personally cheat when using IT than for others to cheat when using IT, although this is reversed when IT is not involved. No significant differences on these issues were found between undergraduate students having business discipline-related majors and those having non-business discipline-related majors.

[1]  D. Ward,et al.  Gender and dishonesty. , 1990 .

[2]  Charles R. Tittle,et al.  Moral Appeal, Sanction Threat, and Deviance: An Experimental Test , 1973 .

[3]  Michael Bommer,et al.  A behavioral model of ethical and unethical decision making , 1987 .

[4]  R. Iyer,et al.  Academic Dishonesty: Are Business Students Different From Other College Students? , 2006 .

[5]  Goslin,et al.  Handbook of socialization theory and research , 1969 .

[6]  Russell Haines,et al.  Influences of different ethical issues on ethical decision-making in an IT context , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[7]  I. Ajzen The theory of planned behavior , 1991 .

[8]  B. Whitley,et al.  FACTORS ASSOCIATED WITH CHEATING AMONG COLLEGE STUDENTS: A Review , 1998 .

[9]  L. Kohlberg Essays On Moral Development , 1981 .

[10]  Miguel Roig,et al.  Attitudes toward Cheating of Self and Others by College Students and Professors , 1994 .

[11]  Mike Nicholls,et al.  On the internet , 2004, Biological Psychiatry.

[12]  M. Ronald Buckley,et al.  An Investigation into the Dimensions of Unethical Behavior. , 1998 .

[13]  L. Kohlberg Stage and sequence: The cognitive-developmental approach to socialization , 1969 .

[14]  D. Crown,et al.  Learning from the Literature on Collegiate Cheating: A Review of Empirical Research , 1998 .

[15]  J M Kuster,et al.  Ethics and the Internet. , 1997, ASHA.

[16]  Peter Lyman,et al.  Intellectual Property: In the Information Age , 1989 .

[17]  Melanie Killen,et al.  Morality: Its structure, functions, and vagaries. , 1987 .

[18]  L. Cronbach Coefficient alpha and the internal structure of tests , 1951 .

[19]  Gail Wood,et al.  Academic original sin: Plagiarism, the Internet, and librarians , 2004 .

[20]  S. L. Taylor,et al.  Music Piracy—Differences in the Ethical Perceptions of Business Majors and Music Business Majors , 2004 .

[21]  Patrick M. Scanlon Student Online Plagiarism: How Do We Respond? , 2003 .

[22]  Raef A. Lawson,et al.  Is Classroom Cheating Related to Business Students' Propensity to Cheat in the "Real World"? , 2004 .

[23]  Ernest A. Kallman,et al.  Ethical decision making and information technology , 1993 .

[24]  L. Kohlberg,et al.  1. Stages of moral development as a basis for moral education , 1971 .

[25]  L. Treviño,et al.  Cheating Among Business Students: a Challenge for Business Leaders and Educators , 1995 .

[26]  Jeff M. Allen,et al.  Academic Integrity: Behaviors, Rates, and Attitudes of Business Students toward Cheating , 1998 .

[27]  L. Treviño,et al.  Academic Dishonesty: Honor Codes and Other Contextual Influences , 1993 .

[28]  Shalom H. Schwartz,et al.  A test of a model for reducing measured attitude-behavior discrepancies. , 1972 .

[29]  Clark Power,et al.  The Just Community Approach to Moral Education. , 1988 .

[30]  I. Ajzen,et al.  Predicting dishonest actions using the theory of planned behavior , 1991 .

[31]  Anton Vedder Ethics and the Internet , 2018, Dental Abstracts.

[32]  Linda Klebe Trevino,et al.  Individual and Contextual Influences on Academic Dishonesty: A Multicampus Investigation , 1997 .

[33]  Karen S. Nantz,et al.  Social Accounts and Metaphors about Cheating , 1994 .

[34]  Timothy Paul Cronan,et al.  Making ethical decisions , 2000, CACM.

[35]  Vincent J. Calluzzo,et al.  Ethics in Information Technology and Software Use , 2004 .

[36]  David Hardisty,et al.  On the Internet , 2000, Biological Psychiatry.

[37]  L. Kohlberg From is to ought: How to commit the naturalistic fallacy and get away with , 1971 .

[38]  Herman T. Tavani,et al.  The uniqueness debate in computer ethics: What exactly is at issue, and why does it matter? , 2002, Ethics and Information Technology.

[39]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[40]  Lori N. K. Leonard,et al.  Illegal, Inappropriate, And Unethical Behavior In An Information Technology Context: A Study To Explain Influences , 2001, J. Assoc. Inf. Syst..

[41]  Seth Finn,et al.  Origins of Academic Dishonesty , 2006 .

[42]  Clifford Nowell,et al.  Undergraduate Student Cheating in the Fields of Business and Economics , 1997 .

[43]  E. Kallman,et al.  Ethical Decision Making and Information Technology: An Introduction with Cases , 1996 .

[44]  R. Sitgreaves Psychometric theory (2nd ed.). , 1979 .

[45]  D. Parker,et al.  Ethical conflicts in information and computer science, technology, and business , 1990 .

[46]  R. Hauptman,et al.  The Internet, cyberethics, and virtual morality , 1994 .

[47]  Marvin W. Berkowitz,et al.  Moral Education : Theory and Application , 1985 .

[48]  J. S. Leming,et al.  Cheating Behavior, Subject Variables, and Components of the Internal-External Scale under High and Low Risk Conditions , 1980 .

[49]  Cathy Owens Swift,et al.  Deterring Cheating Behavior in the Marketing Classroom: An Analysis of the Effects of Demographics, Attitudes, and In-Class Deterrent Strategies , 1998 .

[50]  Timothy Paul Cronan,et al.  Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..