Affiliation:
1. University of Ghana, Accra, Ghana
Abstract
People face multiple decisions that have ethical dimensions and are often unable to resolve appropriately those ethical dilemmas in the use of the cyberspace. Individuals find it difficult to explain the rationale behind their moral judgments in their interactions and access to digital content. Identifying ethical and moral orientation that prompts acceptable or unacceptable ethical judgments is an important factor in cyber ethics. The goal of this study is to employ three prominent ethical theories to predict and explain cyber ethical judgements in terms of computer ethics, privacy, intellectual property rights, and academic integrity. The study develops conceptual and predictive models to test a set of hypotheses. The results show consequential ethics as the most significant predictor of computer ethics, cyber privacy, and academic integrity. Deontological ethics most significantly predict intellectual property rights but is not a significant predictor of academic integrity.
Subject
Information Systems and Management,Computer Networks and Communications,Hardware and Architecture,Safety Research,Safety, Risk, Reliability and Quality,Software
Reference63 articles.
1. Technoethical Inquiry into Ethical Hacking at a Canadian University
2. Alexander, L., & Moore, M. (2015). Deontological ethics. In E. N. Zalta (Ed.), The Stanford encyclopedia of philosophy (Spring 2015 ed.). Stanford University Press. Retrieved from http://plato.stanford.edu/archives/spr2015/entries/ethics-deontological/
3. A practical road map for assessing cyber risk
4. Association for Computing Machinery. (2018). ACM code of ethics and professional conduct. Retrieved from https://www.acm.org/code-of-ethics
5. Virtue ethics in theory and practice
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献