An Examination of Commitment to Information Systems Ethics among an University Personnel

Authors

1 Instructor of Management Department, Shahid Chamran University of Ahvaz, Ahvaz, Iran.

2 Master student of Business Management, Shahid Chamran University of Ahvaz, Ahvaz, Iran.

Abstract

In the complexity of modern world, management information systems have a vital role and influence on society. Universities and training organizations which need correct, precise and up-to-date information to take exact decisions are not exceptions to the rule. In this connection the abservance of ethics is very important. This research is about the examination of commitment of Shahid Chamran University personnel to ethics in using information systems. The research method is descriptive-analytic and its population is Shahid Chamran University's specialists and personnel. A number of 85 employees are selected randomly using a simple sampling method. To collect data, we use questionnaires, and for qualitative data, non-structure interview was conducted. Quantitative data were analyzed by descriptive-comprehensive method and qualitative data by editing method. The research results show that there has been and atmosphere of trust among the management and subordinates and little supervisions on the personnel's system, which means they have been committed to ethics in using information systems . Besides, there is no difference between men and women in using the internet and computers, but men have more used information systems for their own interests.

Keywords

دانایی‌فر، حسن و دیگران، (1386)، روش شناسی پژوهش کیفی در مدیریت: رویکردی جامع، تهران، انتشارات صفار-اشراقی، چاپ دوم.
Adam, A. (2001), "Computer ethics in a different voice", Information and Organization Journal, Vol. 11.
Al-A’ali, M. (2008), "Computer ethics for the computer professional from an Islamic point of view, Journal of  Information, Communication & Ethics in Society, Vol. 6, No. 1.
Baase, S. (2003), A Gift of Fire, Social, Legal and Ethical Issues for Computers and the Internet, Prentice-Hall, Englewood Cliffs, NJ, 2nd ed.
Bommer, M., Gratto, C., Gravander, J. and Tuttle, M., (1987), "A behavioural model of ethical and unethical decision making", Journal of Business Ethics, 6.
Bynum, T.W. (2006), "Flourishing ethics", Ethics and Information Technology Journal, Vol. 8, No. 4.
Eining, M.M. and Christensen, A.L., (2006) "A psychosocial model of software piracy: the development and test of a model", in Dejoie, R., Fowler, G. and Paradice, D., Ethical Issues in Information Systems, Boyd & Fraser, Boston, MA,
Ferrell, O.C. and Gresham, L.G. (1985), "A contingency framework for understanding ethical decision making in marketing", Journal of Marketing, 49.
Floridi, L. (2001), "Ethics in the Infosphere", The Philosophers’ Magazine, 6.
Floridi ,L. Sanders, J.W (2002), "Mapping the foundationalist debate in computer ethics", Ethics and Information Technology, 4.
Forcht, K.A., Mason, R.O. and McFarlan, F.W. (1989) "Ethical use of computers: an international perspective", in DeGross, J.I.,Henderson, J.C. and Konsynski, B.R., Proceedings of the Tenth International Conference on Information Systems, Boston, MA,4-6 December.
Gotterbarn, D.W. (1992), "The Use and Abuse of Computer Ethics", special ethics issue of  The Journal of Systems and Software: www.southernct.edu/ organizations/ rccs/ resources/ teaching/ teaching_mono/ gotterbarn02/ gotter barn02_intro.html.
Guthrie, R. (1997), "The ethics of telework", Journal of iInformation system management, 14, 4.
Hilton, T. & etc. (2006), "information systems ethics in the triad", Journal of computer  summery, 8.
LaPlante, A., (1987), "Computer fraud threat increasing,study says", Infoworld Journal, 18.
Miller, S. and Wecker, J. (2004), "Privacy, the workplace and the Internet", Journal of Business Ethics, Vol. 28, No. 3.
Namlu, A.G. and Odabasi, H.F. (2007), "Unethical computer using behavior scale: a study of reliability and validity on Turkish university students", Computers & Education, Vol.48, No. 2.
Naresh, S. (1999), Ethical Norms for the Information Society, Proceedingsof the First Session of UNESCO’s COMEST, Oslo April 1999, Paris: UNESCO.
Orito, Y. and Murata , K. (2008), "Socio-cultural analysis of personal information leakage in Japan", Journal of Information, Communication & Ethics in Society, Vol.6, No. 2.
Parker, Donn. (1968),"Rules of Ethics in Information Processing", Communications of the ACM, 11.
Rest, J.R., (1979), Development in Judging Moral Issues, University of Minnesota Press, Minneapolis, MN.
Straub, D.W. and Nance, W.D. (1990), "Discovering and disciplining computer abuse in organizations:a field study", MIS Quarterly, Vol.14, No. 1.
Thome, L. and S.B Saunders (2002), "the socio-cultural embededness of individuals", Journal of  business of ethical, 35.
Tsui, J.and C. Windsor (2001), "some cross-culture evidence on ethical reasoning", Journal of Business ethics, 31, 2.
Whitman, Michael E., Townsend, Anthony M., Hendrickson, Anthony R. (1999), "Cross national Differences in Computer-use Ethics: A Nine-country study", Journal of International Business Studies, 30, 4.
Volume 2, Issue 2 - Serial Number 2
October 2008
Pages 71-94
  • Receive Date: 24 April 2008
  • Revise Date: 22 September 2008
  • Accept Date: 05 August 2008