Developing ethical practices to minimise computer misuse

Various researchers have suggested the need to develop sound ethical information technology practices to combat the increased incidence of computer misuse. Relating to the ubiquity of information technology, the paper presents a basis to understand the nature of computer misuse. Such an analysis will help in developing ethical practices so as to minimise computer misuse. Finally, the paper argues that by addressing ethical issues at both formal and informal levels, the risks associated with information technology usage can be minimised.

[1]  Adrian R. Warman Computer Security within Organizations , 1993 .

[2]  D. Parker,et al.  Ethical conflicts in information and computer science, technology, and business , 1990 .

[3]  David Davies The Nature of computer crime - a risk management perspective , 1986, Comput. Law Secur. Rev..

[4]  James Backhouse,et al.  Managing computer crime: a research outlook , 1995, Comput. Secur..

[5]  Walter Maner Unique ethical problems in information technology , 1996 .

[6]  Ronald E. Anderson,et al.  The ACM code of ethics: history, process, and implications , 1994 .

[7]  D. Parker Computer Security Management , 1981 .

[8]  James Backhouse,et al.  Understanding Information: An Introduction , 1990 .

[9]  Michael Clarke,et al.  Business Crime: Its Nature and Control , 1990 .

[10]  R. Kling Computerization and Controversy , 1997 .

[11]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[12]  Keith W. Miller,et al.  How good is good enough?: an ethical analysis of software construction and use , 1994, CACM.

[13]  Donald Gotterbarn,et al.  The use and abuse of computer ethics , 1992, J. Syst. Softw..

[14]  Terrell Ward Bynum,et al.  Teaching computer ethics , 1992 .

[15]  David Icove,et al.  Computer crime - a crimefighter's handbook , 1995, Computer security.

[16]  Enid Mumford,et al.  Systems Design Ethical Tools for Ethical Change , 1996 .

[17]  R. Kling,et al.  Book Review: Computerization and Controversy: Value Conflicts and Social Choices , 1991 .

[18]  Karen D. Loch,et al.  Ethics and information technology use: a factor analysis of attitudes to computer use , 1995, Inf. Syst. J..

[19]  Deborah G. Johnson Computer Ethics , 1985 .

[20]  Houston H. Carr,et al.  Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..

[21]  Karen D. Loch,et al.  Evaluating ethical decision making and computer use , 1996, CACM.

[22]  James Backhouse,et al.  Risks in the use of information technology within organizations , 1996 .

[23]  D. Parker Crime by computer , 1976 .

[24]  Phillip W. Balsmeier,et al.  The ethics of sentencing white-collar criminals , 1996 .

[25]  Thomas W. Dunfee,et al.  Toward A Unified Conception Of Business Ethics: Integrative Social Contracts Theory , 1994 .

[26]  J. T. Delaney,et al.  Do company ethics training programs make a difference? An empirical analysis , 1992 .

[27]  J. R. G. Wood,et al.  How we profess: the ethical systems analyst , 1996, CACM.

[28]  Terrell Ward Bynum,et al.  Computer ethics in the computer science curriculum , 1992 .

[29]  J. Lozano,et al.  Ethics and management: A controversial issue , 1996 .

[30]  Richard A. Spinello Ethical Aspects of Information Technology , 1994 .

[31]  Leslie Regan Shade Book Review: Social Issues in Computing: Putting Computing In Its Place Edited by Chuck Huff and Thomas Finholt (McGraw-Hill, Inc., 1994) , 1994, CSOC.