The quest for a code of professional ethics: an intellectual and moral confusion
Ethical issues in the use of computers
Designing information systems security
Designing information systems security
Ethical conflicts: in information and computer science, technology, and business
Ethical conflicts: in information and computer science, technology, and business
Ethical issues in information systems: a book of readings
Ethical issues in information systems: a book of readings
Cyberpunk: outlaws and hackers on the computer frontier
Cyberpunk: outlaws and hackers on the computer frontier
Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
When professional standards are lax: the CONFIRM failure and its lessons
Communications of the ACM
Ethical concepts and information technology
Communications of the ACM
Accountability and computer decision systems
Communications of the ACM
Communications of the ACM
Ethics for an Information Age
Computer Security Management
Computer Addiction: Study of Computer Dependency
Computer Addiction: Study of Computer Dependency
Computer Security
Information Systems Security
How to Prevent Computer Crime: A Guide for Managers
How to Prevent Computer Crime: A Guide for Managers
Fighting Computer Crime
Computer Fraud and Countermeasures
Computer Fraud and Countermeasures
Factors motivating software piracy: a longitudinal study
ICIS '99 Proceedings of the 20th international conference on Information Systems
Exploring the role of identification in the privacy decisions of webmasters
ICIS '98 Proceedings of the international conference on Information systems
The evaluation of IT ethical scenarios using a multidimensional scale
ACM SIGMIS Database
The ethical attitudes of information systems professionals: outcomes of an initial survey
Telematics and Informatics
Information systems ethics in the USA and in the Arab world
Current security management & Ethical issues of information technology
Advanced topics in information resources management
Moral intensity and ethical decision-making: a contextual extension
ACM SIGMIS Database
A review of information security issues and respective research contributions
ACM SIGMIS Database
Understanding the perpetration of employee computer crime in the organisational context
Information and Organization
Are interface agents scapegoats? Attributions of responsibility in human-agent interaction
Interacting with Computers
Software Piracy in the Workplace: A Model and Empirical Test
Journal of Management Information Systems
An empirical investigation of anti-spyware software adoption: A multitheoretical perspective
Information and Management
The development of student perceptions of ethical issues in the use of IS
Journal of Computing Sciences in Colleges
Computers in Human Behavior
Gaining Access with Social Engineering: An Empirical Study of the Threat
Information Systems Security
Structural equation model for EDI controls: Controls design perspective
Expert Systems with Applications: An International Journal
Information Systems Research
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
Information Systems Research
Willingness to Pay in an Open Source Software Environment
Information Systems Research
Individual Swift Trust and Knowledge-Based Trust in Face-to-Face and Virtual Team Members
Journal of Management Information Systems
The relationship among formal EDI controls, knowledge of EDI controls, and EDI performance
Information Technology and Management
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Journal of Management Information Systems
In defense of the realm: understanding the threats to information security
International Journal of Information Management: The Journal for Information Professionals
Gandhigiri in cyberspace: a novel approach to information ethics
ACM SIGCAS Computers and Society
Theorizing Information Security Success: Towards Secure E-Government
International Journal of Electronic Government Research
International Journal of Technoethics
The effects of sanctions and stigmas on cyberloafing
Computers in Human Behavior
Information Resources Management Journal
Perceptions of Productivity and Digital Ethics in Smart Phone Use in a Chinese Context
International Journal of Cyber Ethics in Education
IS Security Policy Violations: A Rational Choice Perspective
Journal of Organizational and End User Computing
Modifying smartphone user locking behavior
Proceedings of the Ninth Symposium on Usable Privacy and Security
URL Manipulation and the Slippery Slope: The Case of the Harvard 119 Revisited
International Journal of Interdisciplinary Telecommunications and Networking
Hi-index | 0.00 |
This research asks whether codes of ethics affect computer abuse judgments and intentions of information systems (IS) employees. Codes of ethics examined include both company codes of ethics and those written specifically to deal with IS issues. In addition, since the intent of codes of ethics is to clarify responsibility and deter unethical behavior, both the psychological trait of responsibility denial and its moderating effect on codes was studied. While company codes did not affect the computer abuse judgments and intentions of all IS personnel, they did affect those IS personnel who tend to deny responsibility, thus suggesting that company codes may clarify responsibility and reduce rationalizations for some people. Unlike company codes, IS-specific codes of ethics had a direct effect on computer sabotage judgments and intentions, but had no differential effect on those high in responsibility denial. Finally, responsibility denial was directly related to all computer abuse judgments and intentions studied. Overall, codes had little effect on computer abuse judgments and intentions relative to the psychological trait of responsibility denial.