Professional Documents
Culture Documents
Abstract--The purpose of this study was to iden* the dishonest or disgruntled employees account for as much as
inherent characteristics that are correlated with an individual’s 25 percent of all computer abuse [lo]. The motivating
predisposition to “ga computer-related ethical judgment in factors of greed, financial concerns, and other personal
accordance with a behavioral model of ethical and unethical issues were the reasons cited by employees for committing
decision making developed by Harrington [9]. The inherent
crimes. The rationale and decision making process that
characteristics identitied were negative-affectvity, other-
directedness, moral perspective, locus-ofatrol, and denial-of-
an individual undertakes in making an unethical vs. an
responsibility. Data for this study were gathered using ethical decision must be understood. Behavior that is
questionnaires. The questionnaires were administered to ethical or unethical may not always be clear-cut. This has
undergraduate and graduate business students enrolled in a to be of concern to the business college since
computer related course. Analysis of the data indicated an undergraduate students will soon be a part of the business
individual’s intent to @om the computer abuse was found to world and many graduate students are currently employed
be a fbnction of negative4kctivity and the interaction of the
individual factors of otherdirectedness, moral Perspective and The ultimate decision an individml makes, whether
denial-of-responsibility. Negative-affectivity was sigdicant to
ethical or unethical, depends on a number of factors, such
understanding decision making in different kinds of situations
and the degree to which individuals are likely to attribute as the mailable information, individual attributes, and
personal control in the same situation. This study would prove cognitive cqabfities. The Harrington’s model was
beneficial to those who teach ethics, Write ethical codes of consulted in this research in an effort to test the
conduct or business professionals who must make decisions on relationship of individual characteristics as they relate to
how to use and implementcompukr technology. its corresponding decision making step.
Despite the use of computers as a productivity tool in Harrington [SI provides a synthesis of ethical decision
eveq aspect of business, computer crime has become one lnaking models collected fkom Rest [23], Krebs and Miller
of the most publicized aspects of computer use. Computer [14] and Kohlberg [13]. Using Rest’s 1231 four-stage
crimes can involve stealing computer time, unlawful access model as a foundation, the model begins with identification
to files, the acquisition of privileged information, and the of the ethical issues. KohIberg’s cognitive moral
actual destruction of computer files. The Software development model is used in the identikation of the next
Publishers Association - oc ‘vely estimates that one two stages. Stage two involves the judgment about the
out of every two copies of business software in use today is ethical issue itself. Stage three has the decision maker
an unauthorized copy [HI.Companies throughout the establishing ethical conviction and commitment to act
United States are losing more than $2 billion a year from before engaging in the ethical behavior. The most
software piracy and five times as much from overseas important cognitive and affective variables that influence
software thefl [lq. Commercial savings banks which characteristics and affect individual decision making are
have provided a safe and secure environment for an identified with the individual characteristics of self-focus,
individual’s money, have according to the FBI’s economic denial of responsibility and locus of control [I$].
crimes unit experienced an increase in electronicthee [22]. Harrhgton [9]associated these variables with steps in the
ethical decision making model that her research
Contrary to popular belief that hackers are responsible established.
for the majority of computer crimes, the greatest threats to
computer security come from a company’s own employees. Harrington did not hypothesize relationships: (1)
According to the National Computer S d t y ikwciatioq between other-directedness and moral perspe&ve, (2)
$4
z
C. Private Self-Consciousnessand Negative-Affectivity
ElHUiL
The link between NA' ard PSC' can be seen in the
research conducted by several researchers, ([ll], [15],
[29]), who established a correlation between self-focused
-
Awarenessof Others disposition, as measured by the PSC subscale, and
depression, as measured by the Depression Inventory
or of an developed by Beck [l]. The research of Halsten and Stokes
ethical dik-1 [SI implied a strong correlation between anxiety
Negative
Affectivity
-
'
Derrial
of
ResponsiMii
-
Iresponsibihty
experiencesand NA
48
Table 1 Demographics for the Respondents Table 2
-egory biveasity A Universky B Total Summary of Hypotheses Related to the Main Hypothesis
( N a (N=72) (N=I70) R2 P Analysis
Gender: Male 51 42 93 - U-. Ethical i u h e n t is relatedto 5 ofthe 7 factors indicated a
Female 42 26 68 knowle&eof demographic
*Iu' diEerenm (Reference
Non-responsive 5 4 9 factors. Table 3)
Race: White 83 62 145 H G ~ Ethical judgment is relatedto .0854 .0006 Supported
Black 5 4 9 knowledge of an mdividual's
Hispanic 1 0 1 inherent &aradaiStic of NA
mer 5 0 5 and DOR
Non-responsive 4 6 lo H G ~ J3hical judgment is related to ,0716 .0020 Supported
Nationality: American 86 57 143 knowledge of an individual's
Chinese 3 4 7 inherent &araderiStic of NA
Japanese 0 0 0 and intemal LOC.
Korean 4 0 4 H G 4 Ethicaljudgmentis relatedto .1619 .OOOO Supported
other 2 6 8 knowledge of an mdividual's
Non-responsive 3 5 8 inherat charaderistic of OD
Marital status: Sinde 57 37 94 and MP.
&ed 33 28 61
Widowed 0 0 0
Divorced 4 3 7 The results of this survey will provide insight into what
Non-response 4 4 8 inherent characteristic would be predominant within each
Employed: Yes 58 51 log person in every situation. Individuals could then be taught
No 35 14 49
Non-responsive 5 7 12 how to take control of those negative feelings and turn an
Education:Some College 57 34 91 adverse situation into something over which they can assert
Badelor Degree 26 27 53 control.
-Degree 10 6 16
Non-responsive 5 5 10
Ethics course:Yes 4 0 4 Technological innovations are developing at a rate
No 90 67 157 faster than what codes of ethics or the legal system can
Non-response 4 5 9
address. Currently a number of issues need attention.
Among these are intellectual property, privacy, computer
According to the responses to this survey, nearly 93%
crime, and computer security. Enunciating a code is just
of the respondents reported never taking a course in
the first but most important step in acknowledging the
computer ethics. Any instructor who wants to instill a
issues. The code should be easy to understand and direct
sense of ethical use of computers in students might address
yet intuitively address the characteristics identified with
the topics of spreading viruses, sabotage, h a b g , fraud,
the decision making process. For example, a written code
and illegal sohare copying. The ethical decision making
that states a person shall not intentionally cause harm to
model and its corresponding indiviw characteristics will
another individual's data incorporates negative-affectivity
prove helpful in getting everyone to see a situation fiom
and deniahf-wponsibility. A code written that states a
the same perspective. Instructcm of computer ethics
courses could compose scenarios similar to the ones posed person should not misrepresent themself to another
individual for illegal gains incowrates other-directedness
in this study and ask students to compose an answer to
and moral perspective. A code written to deal with the
each one. In the discussion between the instructor and the
issue of illegally copying software could state that an
students that would follow, detailed lists of perceived
negative features with each scenario would be collected
individual shall not copy software without proper authority
would address negative-af€ectivity and locus-of-control.
Table 3
Analvsis Summarv of Demomvhic Variables
c 0 G m VARIABLES
INDEPENDENTVARIABLES DOR LOC MP NA FRAUD HACKING
.674 .773 .126 .579 .560 .738
.001' .942 .381 .026* .079 .614
Nationality .005' .166 .529 .038* .165 .360
Maritalstatus .287 .125 .026* .152 .ooo* .288
Employment .401 .149 .819 .091 .794 .037* .262
Education .125 .041' .678 .157 .159 .030* .155
.221 .207 .609 .491 .436 .712 .690
Note. * Indicates a detected difference.
49
The results of this study have identified the [8] Halsten, 3. & Stokes, J. (1988). The interrelations of
characteristics that individuals possess and use in making nemtive affdvity, anxietv sensitivity. and
ethical decisions. These characteristics should be taken fearfulness. Paper presented at the annual meeting
into consideration when establishing policies outlining of the American Psychological Association, Atlanta,
acceptable use of technology within the company. GA
Knowing what characteristics are important within
individuals when posed with certain ethical situations that [9] Harrington, S.J. (1992). The characteristics and
ultimately guide their judgment might prove beneficial to ethical judgments of members of the computer
employers screening candidates for employment within the profession: A behavioral model. Doctoral
company. Through the use of the ethical decision making dissertation Kent State University Graduate School
model in identiEjing the enduring characteristics correlated of Management.
with decision making we may be able to understand the
thought processes of the computer abuser. [lo1 Harper, D. (1994). Computer crime may be close to
home (employees responsible for the most illegal
XI. BIBLIOGRAPHY activity). Industrial Distribution 83, 4 1.
Beck, AT. (1967). Demession: Clinical> Ingram, RE. & Smi& T.W. (1984). Depression
experimental and theoretical asaects. New York: and internal versus external focus of attention.
Hoeber. Comitive Therapy and Research, 8.139-152.
Burkhardt, M. E. (1994). Social interaction effects Ke- H.C. & Hamilton, V.L. (1989). Crimes of
following a technological change: A longitudinal Mente. New Haven, CT: Yale University Press.
investigation. Academv of Management Journal,
37(4), 869-898.
- Kohlberg L. (1969). Stage and sequence: The
cognitive-developmental approach to socialization.
Collins, B. E. (1974). Four components of the In D.A Goslin (Ed-), Handbook of socialization @p.
Rotter inted-external scale: Belief in a difficult 347-480). Chiago, IL:Rand-MCNally.
world, a just world, a predictable world, and a
politically responsive world J o d of Personality Krebs, D.L. & Miller, D.T. (1985). Altruism andl
and Social P ~ c h o l o29(3),
~ . 381-391. aggression. In Gardner Lindzey & Elliot konson
(Eds.) The handbook of social psychology (3rded.)
Fazio, R H. (1990). Multiple processes by which (pp. 1-71). New York: Random House.
attitudes guide behavior: The MODE model as an
integrative framework Advances in Exmrimental Lewinsohq P.M, Hobennan, H., Ted, L., &
Social Pwchologv, 23, (pp. 75-109). San Diego, Haulzinger, M. (1985). An integrative theory of
CA: Academic Press. depression. In S. Reiss & R Bootzh (Eds.),
Theoretical issues in behavior theram (pp. 331-
Fazio, RH., Powell, M.C., & Herr, P.M. (1983). 352). New York: Academic Press.
Toward a process model of the amtude-behavior
relation: Accessing one's attitude upon mere Lain, I. & Stokes, J. (1989). Dispositional
observation of the attitude object. Journal of approach to job satisfaction: Role of negative
Personality and Social Psvchology,~723-735. affectivity. Journal of Applied Psvchologv, 74(5),
752-758.
Franzoi, S.L., Davis, M.H., & MarMese, B.
(1986). A motivational emlanation of private self- Marshall, P. G. (1993). Software piracy: Can the
consciousness. Paper presented at the annual government help stop the drain on profits? a
convention of the American Psychological Researcher. 3(19), 433-448.
Association, Washington, DC.
Mason, J. (1990). Crackdown on software pirates.
Glass, D.C., & Singer, J.E. (1972). Urban stress: ~OmDuterWor~d 107-1 15.
Emriments on noise and social stressors. New
York: Academic Press.
50
[19] Meyerowik, B.E., Williams, J.G., & Gessner, J.,
(1984, August). Percations of controllabilitv and [24] Schwartz, S.H. (1977). Normative influences on
attitudes toward cancer. Paper presented at t the altruism. In Leonard Berkowik (Ed.) Advances in
annual convention of the American Psychological exnerimental social wcholom. 10 (pp. 221-279).
Association,Toronto, Ontario, Canada. New York: Academic Press.
1201 N o h 4 M.P., Feldmen, RH., & Burt, J.J. (1981). [26] Singer, J.L., & Antrobus, J.S. (1966).
The efficacv of a new model to explain exercise ImaFjnal.txacesses inventory. New York: City
behavior. Paper presented at the annual meeting of College of CUNNY.
the American Alliance for Health, Physical
Educaiion, Recreation and Dance, Boston, MA. [25] Snyder, M. (1974). Self-monitoring of expressive
behavior. Journal c)f Personality and Social
1201 Norman, R (1975). Af€&vecognitive P ~ C h O l O30(4),
~ . 526-537.
consistency, attitudes, conformity and behavior.
Journal of Personaliw and Social Psvchologv, 32, [26] Snyder, M. & Ickes, W. (1985). Personality and
83-91. social behavior. In G. Lindzey and E. Aronson
(Eds.), Handbook of social wcholopy @p. 883-
1211 Radigan, J. (1993). The growing problem of 943, New York: Random House.
electronic theft (computer crimes agamst banh; PC
and Lan security measures). United States Banker, [27l Strack S., Blaney, P.H., Ganellen, RJ., & Cope,
103,37-8. J.C. (1985). Pe~simiStic ~ l f - p r e o c c U p a t ~ ~
performance deficits, and depression. Journal of
1221 Rest, J.R (1986). Moral develoDment: Advances in Personality and Social Psvchologv, 49,1076-1085.
research and theory. New York, NJ: Praeger.
[28] Watson, D. & Clark, L.A. (1984). Negative
affectivity: The disposition to experience aversive
1231 Rosenberg M.J. (1968). Hedonism, huthenticity,
emotional states. Psvcholonical Bulletin, 96(3),
and other goals toward expansion of a CoIlSistency
465-490.
theory. In RP. Abelson et al. (Exis.), Theories of
comitive Consistency: A sourcebook (pp. 73-111).
X. BIOGRAPHY
Chicago: Rand McNally.
51