INFORMATION TECHNOLOGY INTELLECTUAL PROPERTY ETHICS: ISSUES AND ANALYSIS
|
|
|
- Leonard Sims
- 10 years ago
- Views:
Transcription
1 INFORMATION TECHNOLOGY INTELLECTUAL PROPERTY ETHICS: ISSUES AND ANALYSIS Alan R. Peslak, Ph.D., Penn State University, ABSTRACT Unethical information technology behavior is estimated to cost billions of dollars of losses for businesses and corporations. This includes issues associated with information technology property. As an example, software piracy is resulting in extremely large costs for IT (information technology) firms. This paper examines current views of information technology property as measured by a series of six current information technology related property ethical The study surveys a cross-section of students, faculty, and professionals and analyzes recognition of an ethical issue for each individual topic. First, the study confirms that all the studied information technology property issues are generally recognized as important ethical topics. Age and gender are studied to determine demographic influences. Significant differences were found by age and gender for some but not all property A discussion and implications of this research are also presented. Keywords: information technology (IT), property, IT ethics, business ethics, intellectual property Intellectual Property INTRODUCTION This paper deals with the ethical issues associated with information technology property. A common legal definition of property includes both real and personal property or any interest therein and means anything that may be the subject of ownership. (Dorchester County, 2005) Property generally takes two forms physical and intellectual. Physical property includes all tangible items such as land, housing, or possessions. Intellectual property represents the property of your mind or intellect. It can be an invention, trademark, original design or the practical application of a good idea. In business terms, this means your proprietary knowledge a key component of success in business today. It is often the edge that sets successful companies apart and as world markets become increasingly competitive, protecting your intellectual property becomes essential. (Commonwealth of Australia, 2005) Though many studies have examined ethical positions on intellectual property, little work has been performed on the overall concept of property associated with the information age including hardware, software, data, and communications infrastructure. Kini, H.V. Ramakrishna, B.S. Vijayaraman (2004) and Gupta, Gould, and Pola (2004) deal almost exclusively with software piracy. One of the few studies to examine the importance of more information technology property issues was Calluzzo and Cante (2004), who included in their information ethics survey other aspects of information property. This, then, is a broad study of information technology property including intellectual as well as physical information technology property. Property rights Traditionally, property rights, both physical and intellectual, have been guaranteed in the US and many other countries constitutions. Even the United Nations in Article 17 of its Universal Declaration of Human Rights (1948) states: (1) Everyone has the right to own property alone as well as in association with others. (2) No one shall be arbitrarily deprived of his property. Due to the fundamental nature of these rights, the ethical views of individuals on information technology property issues hold important significance. Property in the Information Age is a complex concept involving many diverse topics. Ethical issues that affect information technology property abound. Protecting property rights has become difficult with the rise of intellectual property and the increase in violations of electronic physical property through electronic invaders such as viruses and worms. This report reviews six current information technology property issues and surveys a sample of the population to see if they recognize the importance of ethics related to these issues and/or technologies. Recognition of an ethical issue The recognition of the importance of ethical issues is based on Rest s (1986) multi-step model in ethical decision making. The first step in this process is recognition of an ethical issue. Yuthas and Dillard Volume VIII, No. 2, Issues in Information Systems
2 (1999) suggest that the complexity of issues dealing with advanced technology has resulted in unique challenges for ethics development. According to the authors, moral issues are not issues until we recognize them as such. This work is an attempt to determine the level of recognition and importance of specific property topics as ethical issues, and addresses this first step in the ethical decision making process. This paper deals exclusively with the first component in Rest s (1986) ethical decision making model, recognizing moral This model is supported by many researchers including Jones (1991) and Harrington (1997) who refined this recognition into interpretation of the situation or recognition of a moral issue. Recognition of ethical issues is a necessary first step in moral development (Rest, Thoma, and Edwards, 1997) and has been shown to correlate to higher levels of moral development (Sweeney and Roberts, 1997). MOTIVATION FOR THE STUDY The importance of ethical behavior in the use of information technology holds high relevance for both businesses and researchers. Numerous research studies have been performed to assess the influences of various factors on information technology ethical decisions. Peterson (2002, p.346) notes that identifying factors that contribute to unethical behavior and developing methods of controlling inappropriate behavior in organizations is an area of increasing interest to academicians and practitioners. Laudon (1995) noted the ethical vacuum in information technology. Smith and Hasnas (1999) suggest that corporations are instituting many new technologies and information systems initiatives without addressing the ambiguous ethical environment and dangerous behaviors that can result. The economic impact of unethical IT behavior is staggering. Caluzzo and Cante (2004) note many instances of IT ethics shortcomings. They note surveys that have shown that 45% of IT professionals acknowledge engaging in unethical behavior. Another study recorded a 69% acknowledgment rate. They note a 1995 study that suggested worldwide software piracy losses were estimated at $8 to 12 billion and a 1999 study that reported that 50% of all software in use in 1996 was illegally copied. In 1998, they note that 98% of software in China was illegally copied. Dean (2005) discusses the impact and importance of software piracy and intellectual property violations suggesting a $64 billion negative impact on taxes and reduction of 1.5 million jobs due to piracy. Kini, Rominger, and Vijayaraman (2000) demonstrated the pervasive nature of software piracy in the US today. Understanding the influences on unethical IT behavior can have major returns if addressed. Peterson (2002) notes the importance of improving computer ethics citing many of the recent problems with unethical behavior including software piracy, virus development and illegal access estimated at costing corporations losses of billions of dollars per year. Bass, Barnett, and Brown support the importance of business ethics study suggesting that unethical behavior costs billions of dollars each year, damages the image of corporate America, and has implications for the legitimacy of our social institutions and the well-being of our society. Banerjee, Cronan, and Jones (1998) note the importance of understanding information technology ethical issues due to their potential in the corporate arena for significant security and productivity losses. They suggest that computer misuse has cost the US billions of dollars per year and note that nearly half of clients surveyed suffered security related losses in the last year. They also note that security measures can have some impact in reducing losses but suggest that individual ethical behavior can be improved. If ethical behavior can be improved, then these losses and crimes can be reduced saving corporations millions if not billions of dollars. They suggest that in order to improve IT ethics, an overlooked and potentially effective deterrent is the identification of unique and situational characteristics of IS personnel who act ethically/unethically. Identification of unique characteristics could lead to the formulation of more effective ways of solving the problem of unethical use or inappropriate use of computers. They suggest that methods to improve behavior after identification include education and organizational environment. HYPOTHESES DEVELOPMENT There has been considerable research that has found that information technology ethical issues are being recognized by students and professionals alike. Hay, Larres, Oyere, and Fisher (2001) found ethical perceptions of undergraduate students in computerrelated situations. Oz (2001) found ethical recognition of IT situations among IT professionals. In the specific area of information technology property, little comprehensive study has been performed. As a result, we propose hypothesis one to confirm the likely scenario that as with other ethical issues, there will be strong recognition of IT property ethical issues among the surveyed population. As Volume VIII, No. 2, Issues in Information Systems
3 noted, this paper deals exclusively with the first component in Rest s (1986) ethical decision making model, recognizing moral Hypothesis 1: Information technology property ethical issues will viewed as important ethical The exploration of the influences on IT ethical decision making has been shown to be an important goal for this study. Many researchers have studied the impact of age on ethical decision making. Two demographic factors have been shown to sometimes affect ethical decision making age and gender. Age has often been shown to affect ethical decision making. Vitell (2003) found that older individuals more readily follow ethical norms. As a result, we propose that age will significantly affect views on information technology property To test the effect of age, hypothesis two was developed. Hypothesis 2: Age will significantly affect A large body of research has investigated the impact of gender on ethical decision making. Loch and Conger (1996) note evidence of gender differences in ethical intention formation. Krete and Cronan (1998) found in all their information technology ethical scenarios that men were less likely to consider a behavior as unethical. Hay, Larres, Oyelere, and Fisher (2001) studied the computer related situations and undergraduate students ethical perceptions. The authors noted the significant body of literature that has suggested gender difference in business and IT ethics decisions. Sigma-Mugan, Daly, Onkal, and Kavut (2005) studied the gender influence of ethical sensitivity. We propose that gender will have an impact on property ethics recognition. Hypothesis 3: Gender will significantly affect Questionnaire METHODOLOGY As a part of a broader study, six items were included in a questionnaire to explore recognition of current information technology privacy topics as ethical The specific items were prepared after review of the literature. The first item is Use by others of software or other intellectual property you have created without your consent. This is found in Calluzzo and Cante (2004) who ask a similar question in their survey Copying software from the job or school for personal use. Their question is also similar to the last topic in this survey but this first question personalizes the intellectual property violation to ascertain if individuals are more concerned about use of their intellectual property versus others intellectual property. Peterson (2002) includes a similar question. Nefarious attacks on network and computer personal property are explored in the next survey items. Development of viruses, worms, and Trojan horses is included as well as Distribution of viruses, worms, and Trojan horses. The remaining factor is Cracking into computers and networks with evil intent. Smith (2004) suggests that Perhaps the most malicious and dangerous form of hacking has to do with the building and distribution of viruses, worms, and Trojan horses. Webopedia (2004) notes: Cracking is seen as breaking into a computer system. The term was coined in the mid- 80s by hackers who wanted to differentiate themselves from individuals whose sole purpose is to sneak through security systems. Whereas crackers sole aim is to break into secure systems, hackers are more interested in gaining knowledge about computer systems and possibly using this knowledge for playful pranks. Piscatello (2004) notes For our purposes, we'll expand the definition of cracker found in the Jargon Dictionary to "one who breaks security on a system or network or application". Cracking typically involves writing software specifically designed to discover and exploit flaws in someone else's software. This survey utilized short statements similar to Calluzzo and Cante (2002) and Kini, Ramakrishna, and Vijayaraman (2004). The length of scenarios only allows for a few ethical situations. And the specific content endemic to ethical scenarios limit the generalizations that can be made. According to Rest, Edwards, and Thoma (1997) short statements tend to have less bias than longer orations. The six item survey is presented in Table 1 Table 1. Property ethics issues Use by others of software or other intellectual property you have created without your consent Development of Viruses, worms, and Trojan horses Hacking without evil intent Cracking with evil intent Distribution of Viruses, Worms, and Trojan horses Making copies of someone else s software for your personal use An online questionnaire was developed and tested to explore recognition of these current information Volume VIII, No. 2, Issues in Information Systems
4 technology topics as ethical Included in the survey were the six items previously noted as property topics. Similar to Loch and Conger (1996), ethical statements were generally personalized for the study. The anonymous responses to the statements relate directly to how the individual views the ethical statement. The questionnaire was developed as an online survey and sent to several listservs including Information Resources Management Association (IRMA) Two Major University Faculty/staff listserv The survey was also conducted in the author s undergraduate classes. Response rates ranged from 100% in the author s classes to approximately 10-30% of the respective faculty/staff listservs, and less than 5% from the IRMA listserv. All surveys had high response rates except the IRMA listserv. Caution is thus appropriate in the results relating to this subsegment. All analyses were performed using SPSS Respondents Overall 224 responses were received with 219 valid. Some survey questions had slightly less participation due to non-response on specific questions. A broad cross section of age groups was included, from 40 at all the way to 67 at Overall, the average age is approximately 41. The gender mix was about 2 to 1 male to female but this mirrors the IT professional and student mix of male majority. Only 27 % of the sample was students with the largest group being faculty and staff. This reflects the response rate of the survey based on the listservs. RESULTS Hypothesis 1: Information technology property ethical issues will viewed as important ethical Table 2 present the overall results of the property statement survey and the relative importance placed on each topic with regard to whether or not it was recognized as an ethical issue. The issue that received the highest importance was Distribution of viruses, worms, and Trojan horses. With a 3.89 rating nearly everyone recognized how important this issue is to property ethics. This issue was closely followed by its companion issue, Development of viruses etc. Cracking with evil intent was noted as a key ethical issue with a rating of The fourth item, Use of software or other intellectual property you have created without your consent was seen as very important ethical issue at 3.6. Finally, Hacking and Use of others software were seen as lower on the list but still somewhat important at 3.33 and 3.17 respectively. The first hypothesis was that currently information technology property issues are viewed as important ethical A review of each of the questions exploring current information technology property issues resulted in averages above somewhat important. Dispersion was also somewhat limited around the mean as noted by the standard deviations. As a result, hypothesis one was supported. Information technology property ethics issues are currently viewed as important ethical Table 2. Overall Survey Descriptive Statistics N Minimum Maximum Mean Std. Deviation Unauthorized Use of Your IP Development of Viruses Hacking Cracking with Evil Intent Distribution of Viruses Copying Others Software Hypothesis 2: Age will significantly affect A series of hypotheses were tested to determine demographic variances in the IT property ethics A preliminary review of the distributions of the responses suggested that the distributions were non-normal. As a result, the non-parametric Kruskal- Wallis Test was used to determine significance of difference among the demographic groups. Kruskal- Wallis test is a nonparametric equivalent to one-way ANOVA. Tests whether several independent samples are from the same population. Assumes that the underlying variable has a continuous distribution, and requires an ordinal level of measurement. (SPSS, 1999) In the past, age has been shown to be a significant factor in ethical decision making. In this study, ranking of importance of Cracking with evil intent, Distribution of viruses, and Copying others software Volume VIII, No. 2, Issues in Information Systems
5 were significantly different among age categories (p <.05) (Table 3) and generally directly increased with age. This confirms a similar finding of Vitell (2003) that suggested older individuals more readily follow ethical norms. Hacking, Use of your IP, and Development of Viruses showed no such age difference. This supports Glover, Bumpus, Logan, and Ciesla (1997) who found that age was not a factor in recognition of ethical Overall hypothesis two was partly supported. Age significantly affected three of the six ethical property Table 3. Significance Levels of Demographic Analyses Age Gender Unauthorized Use of Your IP Development of Viruses Hacking Cracking with Evil Intent Distribution of Viruses Copying Others' Software Hypothesis 3: Gender will significantly affect Significance levels based on gender are also displayed in table 3. This study found that five of the six property issues did not show a gender difference. According to this study, females had a higher recognition of Copying others software than males. This was significant at p <.05. This supports Krete and Cronan (1998) who found in all their information technology ethical scenarios that men were less likely to consider a behavior as unethical. Vitell (2003) suggests ethics relationships with gender are not definitive at this point. Athey (1993) also tested gender differences in determining ethical decisions. Her results did not show significant differences in gender. Hypothesis three was generally rejected. Gender did not significantly affect recognition of property ethical issues with the one exception of Copying others software. LIMITATIONS, DISCUSSION, AND CONCLUSION The study provides interesting and useful results but as with any study there are limitations that must be recognized. The sample was drawn from a convenience population of students, faculty, and practitioners and may not be applicable to the population as a whole. More extensive and varied sampling would be necessary to verify results. This study should be rightly viewed as the start of an exploration of specific information property issues and can be extended. Though there have been many past studies that have examined intellectual property and others that have reviewed demographic differences in ethical judgments, this is the first study that examines a range of information age property issues both real and intangible. It is also the first to then study demographic difference within information technology property ethics. Calluzzo and Cante (2004) called for further study of ethics in information technology to define and clarify the issues, which in turn can form the basis for programs to rectify or at least ameliorate the situation. This work has explored information technology ethics in several ways. First, the work analyzes whether information technology property is viewed by individuals as an ethical topic. Second the study is the first to consider and analyze property in a multidimensional fashion. Finally, demographic differences were explored. Significant differences were found in many cases between demographic groups based on property These findings can be used to target and address ethical education and enforcement to reduce information technology property losses. In order to improve IT ethical decision making, Loch and Conger (1996) propose clear corporate definition of acceptable behavior and norms. They also suggest specific policies and guidelines, and corporate ethical training. This should increase ethical computing among employees. Specific IT property ethical behavior should be defined, promulgated, and enforced. Peterson (2002, p.346) has suggested that identifying factors that contribute to unethical behavior and developing methods of controlling inappropriate behavior in organizations is an area of increasing interest to academicians and practitioners. This paper provides insight into the ethical positions of students, employees, and future IT employees. It was found that gender held little significance in views towards intellectual property ethical To control inappropriate behavior in organizations, efforts should generally be targeted at all individuals regardless of gender. Copying others software however was shown to be significantly related to gender. More efforts should be placed on education and training and rule enforcement for male employees. Age was also shown to significantly affect attitudes towards intellectual property Programs should more directly target younger employees. This work supports Banerjee, Cronan, Volume VIII, No. 2, Issues in Information Systems
6 and Jones (1998) who note the importance of understanding information technology ethical issues due to their potential in the corporate arena for significant security and productivity losses. In order to improve IT ethics, an overlooked and potentially effective deterrent is the identification of unique and situational characteristics of IS personnel who act ethically/unethically. Identification of unique characteristics could lead to the formulation of more effective ways of solving the problem of unethical use or inappropriate use of computers. Our study noted some significant demographic influences on information technology ethics. Banerjee, Cronan, and Jones (1998) suggest that methods to improve behavior after identification include education and organizational environment. This work analyzed the ethics of information technology property. As noted, the complexity of property in an electronic world has created an environment where ethical issues are unclear. The importance of these issues, however, is clear. The United Nations has declared property to be a fundamental right. It is imperative that proper ethical issues be studied and analyzed to clarify current electronic property Rest (1986) suggests that moral education programs designed to stimulate moral judgment development do produce modest but significant gains. With identification of problem areas, programs can be instituted to improve ethical awareness, education, and enforcement. Further study can to be performed to extend this analysis through the other stages of ethical decision making and identify specific actions to ameliorate the identified ethical dilemmas. REFERENCES 1. Athey, S. (1993). A Comparison of Experts' and High Tech Students' Ethical Beliefs In Computer-Related Situations. Journal of Business Ethics. 12(5), Banerjee, D., Cronan, T., Jones, T. (1998). Modeling IT Ethics: A Study in Situational Ethics. MIS Quarterly. 22(1), Bass, K., Barnett, T., and Brown, G. (1999). Individual Difference Variables, Ethical Judgments, and Ethical Behavior Intentions. Business Ethics Quarterly. 9(2), Calluzzo V. and Cante C. (2004). Ethics in Information Technology and Software Use. Journal of Business Ethics. 51, Commonwealth of Australia (2005). What is Intellectual property? Retrieved March 5, 2005 from 6. Dean, K. (2005). Focus on Software Piracy Problem. Retrieved March 7, 2005 from ,58306,00.html 7. Dorchester County. (2005). Definition of Terms. Retrieved January 13, 2005 from 8. Glover, S., Bumpus, M., Logan, J., and Ciesla, J. (1997). Re-examining the Influence of Individual Values on Ethical Decision Making. Journal of Business Ethics. 16, Gupta, P., Gould, S., Pola, B. (2004). To Pirate or Not to Pirate: A Comparative Study of the Ethical Versus Other Influences on the Consumers Software Acquisition- Mode Decision. Journal of Business Ethics. 55(3), Harrington, S. (1997). A Test of a Person Issue Contingent Model of Ethical Decision Making in Organizations. Journal of Business Ethics. 16, Hay, D., Larres, P., Oyelere, P., and Fisher, A. (2001). The Ethical Perception of Undergraduate Students in Computer- Related Situations: An Analysis of the Effects of Culture, Gender, and Prior Education. Teaching Business Ethics, 8, Jones, T. (1991). Ethical Decision Making by Individuals in Organizations: An Issue- Contingent Model. The Academy of Management Review. 16(2), Kini, R., Ramakrishna, H., and Vijayaraman, B. (2004). Shaping of Moral Intensity Regarding Software Piracy: A Comparison Between Thailand and U.S. Students. Journal of Business Ethics. 49(1), Kini, R., Rominger, A., and Vijayaraman, B. (2000). An Empirical Study of Software Piracy and Moral Intensity Among University Students. Journal of Computer Information Systems. 40(3), Krete, J. and Cronan, T. (1998). How Men and Women View Ethics. Communications of the ACM. 41(9), Laudon, K. (1995). Ethical concepts and information technology. Communications of the ACM. 38(12), Volume VIII, No. 2, Issues in Information Systems
7 17. Loch, K. and Conger, S. (1996). Evaluating Ethical Decision Making and Computer Use. Communications of the ACM. 39(7), Oz, E. (2001). Organizational Commitment and Ethical Behavior: An Empirical Study of Information System Professionals. Journal of Business Ethics. 34, Peterson, D. (2002). Computer Ethics: The Influence of Guidelines and Universal Moral Beliefs. Information Technology & People. 15(4), Piscatello, D. (2004). Ethical Hacking Could Be So Much More Than An Oxymoron. Retrieved January 24, 2005 from Rest, J. (1986). Moral Development : Advances In Research and Theory. New York: Praeger. 22. Rest, J., Thoma, S., and Edwards, L. (1997). Designing and Validating a Measure of Moral Judgment: Stage Preference and Stage Consistency Approaches. Journal of Educational Psychology. 89(1), Sigma-Mugan, C., Daly, B. Onkal, D. and Kavut, L. (2005). The Influence of Nationality and Gender on Ethical Sensitivity: An Application of the Issue- Contingent Model. Journal of Business Ethics. 57, Smith, D. (2004). Hackers and Hacking. Retrieved December 18, 2004 from Smith, H. and Hasnas, J. (1999). Ethics and Information Systems: The Corporate Domain. MIS Quarterly. 23(1), SPSS (1999). SPSS Help. 27. Sweeney, J. and Roberts, R. (1997). Cognitive Moral Development and Auditor Independence. Accounting, Organizations, and Society. 22(3/4), United Nations General Assembly. (1948). Universal Declaration of Human Rights. Retrieved February 5, 2005 from Vitell. S. (2003). Consumer Ethics Research: Review, Synthesis and Suggestions for the Future. Journal of Business Ethics. 43, Webopedia (2004). Crack. Retrieved December 18, 2004 from html 31. Yuthas, K. and Dillard, J. (1999). Ethical Development of Advanced Technology: A Postmodern Stakeholder Perspective. Journal of Business Ethics. 19, Volume VIII, No. 2, Issues in Information Systems
INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK
INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK Richard V. McCarthy, Quinnipiac University, [email protected] Leila Halawi, Nova Southeastern University, [email protected] Jay E. Aronson,
MARKET ANALYSIS OF STUDENT S ATTITUDES ABOUT CREDIT CARDS
9 J.C. Arias, Robert Miller 23 MARKET ANALYSIS OF STUDENT S ATTITUDES ABOUT CREDIT CARDS J.C. Arias (PhD, DBA), Robert Miller Abstract The attitudes of students to the use of credit cards is a complex
SOFTWARE PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION
SOFTWARE PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION Pamela A. Dupin-Bryant, Utah State University, [email protected] ABSTRACT Software piracy,
The Impact of Management Information Systems on the Performance of Governmental Organizations- Study at Jordanian Ministry of Planning
The Impact of Management Information Systems on the Performance of Governmental Organizations- Study at Jordanian Ministry of Planning Dr. Shehadeh M.A.AL-Gharaibeh Assistant prof. Business Administration
Online Reputation in a Connected World
Online Reputation in a Connected World Abstract This research examines the expanding role of online reputation in both professional and personal lives. It studies how recruiters and HR professionals use
Intellectual Property
Intellectual Property Ethics and Computing Chapter 8 Summer 2001 CSE 4317: Intellectual Property 1 Motivation Most new ideas in the computer field involve intellectual property Intellectual property must
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
Intellectual Property, Copyright and Fair Use: What Students Should Know
Intellectual Property, Copyright and Fair Use: What Students Should Know UMBC Faculty Development Center March 10, 2004 David McDonald Towson University Please Note: The information provided in this presentation
International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 2554 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 2554 Impact of Non-Financial Rewards on Employee Attitude &Performance in the workplace A case study of Business
EVALUATION OF THE EFFECTIVENESS OF ACCOUNTING INFORMATION SYSTEMS
49 International Journal of Information Science and Technology EVALUATION OF THE EFFECTIVENESS OF ACCOUNTING INFORMATION SYSTEMS H. Sajady, Ph.D. M. Dastgir, Ph.D. Department of Economics and Social Sciences
Acceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
ACCOUNTING STUDENTS PERCEPTION OF ETHICAL DILLEMAS IN POLAND
Ewa Wanda Maruszewska University of Economics in Katowice, Poland ACCOUNTING STUDENTS PERCEPTION OF ETHICAL DILLEMAS IN POLAND Abstract The article presents the results of a survey performed in a public
Statistical Analysis on Relation between Workers Information Security Awareness and the Behaviors in Japan
Statistical Analysis on Relation between Workers Information Security Awareness and the Behaviors in Japan Toshihiko Takemura Kansai University This paper discusses the relationship between information
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).
Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the
An investigation of the Issues and Solutions to Cyberspace Identity Theft and Crimes
Volume 1 Issue, Jan 13 @1 IJSK & K.J.A. All rights reserved ISSN 3-193 An investigation of the Issues and Solutions to Cyberspace Identity Theft and Crimes Amos Olagunju 1, Solomon Demmessie Computer Science
High School Counselors Influence
High School Counselors Influence Katey O Donnell and Katie Logan Undergraduate Students, Human Development and Family Studies Key Words: College freshmen, school counselors, high school, adequately prepared
Section Three. Nursing: MSN Research Procedures. Page 25
Section Three Nursing Research Procedures Page 25 Research Competency Nursing majors are expected to develop their research skills throughout the program and demonstrate this skill in the final research
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS Effective Date June 9, 2014 INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT Table of Contents 1.
Digital Piracy and Stealing: A Comparison on Criminal Propensity
International Journal of Criminal Justice Sciences Vol 5 Issue 2 July December 2010 Copyright 2010 International Journal of Criminal Justice Sciences (IJCJS) Official Journal of the South Asian Society
Acceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
Let the Pirates Patch? An Economic Analysis of Network Software Security Patch Restrictions
Let the Pirates Patch? An Economic Analysis of Network Software Security Patch Restrictions Terrence August and Tunay I. Tunca Graduate School of Business, Stanford University Stanford, CA, 94305 Extended
Understanding Security Complexity in 21 st Century IT Environments:
Understanding Security Complexity in 21 st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies Independently conducted
February 2008 Dr. José-Marie Griffiths, Dean and Professor Donald W. King, Distinguished Research Professor University of North Carolina at Chapel
February 2008 Dr. José-Marie Griffiths, Dean and Professor Donald W. King, Distinguished Research Professor University of North Carolina at Chapel Hill TABLE OF CONTENTS Introduction... 4 Conceptual Model...
Assessment Plan Department of Psychology Park University. Preparing learners to think critically. Preparing learners to think
Assessment Plan Department of Psychology Park University The approach adopted by the Department of Psychology stems from the mission of Park University to prepare learners to think, communicate effectively
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
Introduction to Ethical Hacking and Network Defense. Objectives. Hackers
Introduction to Ethical Hacking and Network Defense January 14, 2010 MIS 4600 - Abdou Illia Objectives Describe the role of an ethical hacker Describe what can an ethical hacker legally do Describe what
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
Analysis of the perceptions of accounting students and practitioners regarding the ethnicity of earnings management post Sarbanes-Oxley
Analysis of the perceptions of accounting students and practitioners regarding the ethnicity of earnings management post Sarbanes-Oxley ABSTRACT Deborah M. Pendarvis University of Tampa David E. Morris,
EDUCATION AND LAW ENFORCEMENT 1. Education and Law Enforcement: Final Version of Research Proposal. Ralphie Manzano
EDUCATION AND LAW ENFORCEMENT 1 Education and Law Enforcement: Final Version of Research Proposal Ralphie Manzano University of South Florida, Sarasota-Manatee EDUCATION AND LAW ENFORCEMENT 2 Abstract
Spirituality and Moral Development Among Students at a Christian College Krista M. Hernandez
Spirituality and Moral Development Among Students at a Christian College Krista M. Hernandez Abstract This descriptive comparative study describes the spirituality of college students at different levels
ijcrb.webs.com INTERDISCIPLINARY JOURNAL OF CONTEMPORARY RESEARCH IN BUSINESS OCTOBER 2013 VOL 5, NO 6 Abstract 1. Introduction:
Impact of Management Information Systems to Improve Performance in Municipalities in North of Jordan Fawzi Hasan Altaany Management Information Systems Department, Faculty of Administrative Sciences, Irbid
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Data Security in Development & Testing
Data Security in Development & Testing Sponsored by Micro Focus Independently conducted by Ponemon Institute LLC Publication Date: July 31, 2009 Ponemon Institute Research Report Data Security in Development
An Ethical Assessment of Computer Ethics Using Scenario Approach *
International Journal of Electronic Commerce Studies Vol.1, No.1, pp.25-36, 2010 An Ethical Assessment of Computer Ethics Using Scenario Approach * Maslin Masrom University Teknologi Malaysia, Malaysia
ANALYSIS OF USER ACCEPTANCE OF A NETWORK MONITORING SYSTEM WITH A FOCUS ON ICT TEACHERS
ANALYSIS OF USER ACCEPTANCE OF A NETWORK MONITORING SYSTEM WITH A FOCUS ON ICT TEACHERS Siti Rahayu Abdul Aziz 1, Mohamad Ibrahim 2, and Suhaimi Sauti 3 1 Universiti Teknologi MARA, Malaysia, [email protected]
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
An International Comparison of the Career of Social Work by Students in Social Work
Acta Medicina et Sociologica Vol 5., 2014 5 An International Comparison of the Career of Social Work by Students in Social Work Gergely Fábián*, Thomas R. Lawson**, Mihály Fónai***, János Kiss*, Eric R.
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
CALIFORNIA STATE UNIVERSITY, FRESNO DEPARTMENT OF PSYCHOLOGY UNDERGRADUATE PROGRAM
CALIFORNIA STATE UNIVERSITY, FRESNO DEPARTMENT OF PSYCHOLOGY UNDERGRADUATE PROGRAM GOALS AND OBJECTIVES FOR UNDERGRADUATE PSYCHOLOGY MAJORS Goals -- Knowledge, skills and values unique to psychology 1.
Perceptions of College Students in Long Distance Relationships
Perceptions of College Students in Long Distance Relationships Breeana Skinner Faculty Advisor: Carmen Wilson-VanVoorhis, Department of Psychology ABSTRACT This study examined women s perceptions of a
RUNNING HEAD: Evaluation of nursing student s informatics competency
RUNNING HEAD: Evaluation of nursing student s informatics competency Evaluation of Nursing Students Informatics Competency Using an Adapted Self-Assessment of Nursing Informatics Competency Scale (SANICS)
Obstacles to Integrating Forensic Accounting in the Accounting Curriculum: The Case of Bahrain
Global Review of Accounting and Finance Vol. 6. No. 1. March 2015 Issue. Pp. 165 175 Obstacles to Integrating Forensic Accounting in the Accounting Curriculum: The Case of Bahrain Abdullah Al-Hadrami *
Forensic Accounting Education In Bahrain: A Survey on Educators Opinion
nternational Journal of Pedagogical nnovations SSN 2210-1543 nt. J. Ped. nn. 3, No. 1, (Jan. 2015) Forensic Accounting Education n Bahrain: A Survey on Educators Opinion Sutan Emir Hidayat 1, Abdullah
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
PERCEIVED VALUE OF BENEFITS FOR PROJECT MANAGERS COMPENSATION. Răzvan NISTOR 1 Ioana BELEIU 2 Marius RADU 3
PERCEIVED VALUE OF BENEFITS FOR PROJECT MANAGERS COMPENSATION Răzvan NISTOR 1 Ioana BELEIU 2 Marius RADU 3 ABSTRACT The article examines how the manager role characteristics are perceived, valued and promoted
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
Developing and Validating Customer Relationship Management (CRM) Practices Construct
International Journal of Business and Behavioral Sciences Vol., No.; January 0 Developing and Validating Customer Relationship Management (CRM) Practices Construct Zuliana Zulkifli, *Izah Mohd Tahir Faculty
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
Introduction to Information Management IIM, NCKU
Introduction to Information Management IIM, NCKU Based on Chapter 4 of Laudon and Laudon (2010). Management Information Systems: Managing the Digital Firm (11th edition), Pearson/PrenticeHall Ethics Principles
Cyber Security Issues on E-Commerce
Cyber Security Issues on E-Commerce L.Madhava Reddy, Librarian, Andhra Muslim College, Guntur L.Jyothsna,B.Tech,ECM, K.L.University ABSTRACT: Cyber security is at a sensitive and critical juncture in the
Journal of Student Success and Retention Vol. 2, No. 1, October 2015 THE EFFECTS OF CONDITIONAL RELEASE OF COURSE MATERIALS ON STUDENT PERFORMANCE
THE EFFECTS OF CONDITIONAL RELEASE OF COURSE MATERIALS ON STUDENT PERFORMANCE Lawanna Fisher Middle Tennessee State University [email protected] Thomas M. Brinthaupt Middle Tennessee State University
Concepts. Economic psychology: from tax compliance and evading to psychological contract. Basic model of tax evasion. Economic theory of crime
Economic psychology: from tax compliance and evading to psychological contract Velli Parts, MSc Concepts tax avoidance - an attempt to reduce tax payments by legal means (e.g. by exploiting taxloopholes)
Obstacles to Integrating Forensic Accounting in the Accounting Curriculum: The Case of Bahrain
6-8 June 204, Nippon Hotel, Istanbul, Turkey, ISBN: 978--922069-54-2 Obstacles to Integrating Forensic Accounting in the Accounting Curriculum: The Case of Bahrain Abdullah Al-Hadrami * and Sutan Hidayat
Issues in Information Systems Volume 15, Issue I, pp. 81-87, 2014
SECURITY REQUIREMENTS IN SOCIAL NETWORKS Mehdi Sagheb-Tehrani (PhD), Columbus State University, [email protected] Arbi Ghazarian (PhD), Arizona State University, [email protected] ABSTRACT
THE GENERATION GAP IN COMPUTER SECURITY:
Introduction The broad adoption of digital media and social networking combined with the increasing amount of sensitive data stored online is making personal computer security more important than ever.
School of Advanced Studies Doctor Of Education In Educational Leadership With A Specialization In Educational Technology. EDD/ET 003 Requirements
School of Advanced Studies Doctor Of Education In Educational Leadership With A Specialization In Educational Technology The mission of the Doctor of Education in Educational Leadership degree program
Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices
A Forrester Consulting Thought Leadership Paper Commissioned By Xively By LogMeIn August 2015 Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices Table
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
PREPARING FOR THE FUTURE: FACULTY DEVELOPMENT FOR LEADERSHIP SUCCESSION. Julie Adams Wheeler North
PREPARING FOR THE FUTURE: FACULTY DEVELOPMENT FOR LEADERSHIP SUCCESSION 1 Julie Adams Wheeler North AGENDA The problem Need for leadership Research on local senate leadership Recommendations Questions
Barriers & Incentives to Obtaining a Bachelor of Science Degree in Nursing
Southern Adventist Univeristy KnowledgeExchange@Southern Graduate Research Projects Nursing 4-2011 Barriers & Incentives to Obtaining a Bachelor of Science Degree in Nursing Tiffany Boring Brianna Burnette
National Mental Health Survey of Doctors and Medical Students Executive summary
National Mental Health Survey of Doctors and Medical Students Executive summary www.beyondblue.org.au 13 22 4636 October 213 Acknowledgements The National Mental Health Survey of Doctors and Medical Students
The Implementation of e-procurement System in Health Sector in Greece: Attitudes of Potential Users and Implications for Hospital Management
International Journal of Health Research and Innovation, vol. 1, no. 1, 2013, 15-23 ISSN: 2051-5057 (print version), 2051-5065 (online) Scienpress, 2013 The Implementation of e-procurement System in Health
Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013
Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,
Cablelynx Acceptable Use Policy
Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing
Model for E-Learning in Higher Education of Agricultural Extension and Education in Iran
Model for E-Learning in Higher Education of Agricultural Extension and Education in Iran Jafar Yaghoubi 1 and Iraj Malekmohammadi 2 1. Assistant Professor, Zanjan University, Iran, [email protected] 2.
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Hacking, Viruses and Firewall
Professional issues in interactive media CS6032 Hacking, Viruses and Firewall BY Haifa ALwahaby 10161953 Introduction: Ethics refers to a set of rules that define right and wrong behavior, used for moral
Research of Female Consumer Behavior in Cosmetics Market Case Study of Female Consumers in Hsinchu Area Taiwan
usiness, 2010, 2, 348-353 doi:10.4236/ib.2010.24045 Published Online December 2010 (http://www.scirp.org/journal/ib) Research of Female Consumer Behavior in Cosmetics Market Case Study of Female Consumers
Consumer Perception of Mobile Phone Attributes
Consumer Perception of Mobile Phone Attributes Tao Zhang 1, Pei-Luen Patrick Rau 2, Jia Zhou 2 1 Department of Electrical Engineering and Computer Science Vanderbilt University, TN 37211, USA 2 Department
Attitudes Toward Science of Students Enrolled in Introductory Level Science Courses at UW-La Crosse
Attitudes Toward Science of Students Enrolled in Introductory Level Science Courses at UW-La Crosse Dana E. Craker Faculty Sponsor: Abdulaziz Elfessi, Department of Mathematics ABSTRACT Nearly fifty percent
Petrus UW-L Journal of Undergraduate Research X (2007)
Fighting the Addiction: The Effectiveness of the La Crosse County Drug Court Program Erin R. Petrus Faculty Sponsor: William G. Zollweg, Department of Sociology/Archeology ABSTRACT The purpose of the research
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New
JHSPH Acceptable Use Policy
1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose
Teaching Digital Citizenship
32 Government of Newfoundland and Labrador - Education I A School-Wide Approach - Positive Behaviour Supports 2013 Education Teaching Digital Citizenship Digital citizenship can be defined as the norms
