Morality and computers: Attitudes and differences in moral judgments

被引:65
|
作者
Gattiker, UE
Kelley, H
机构
[1] Univ Aalborg, Dept Prod, DK-9220 Aalborg, Denmark
[2] Univ Lethbridge, Fac Management, Lethbridge, AB T1K 3M4, Canada
关键词
computer security; domain theory of moral development; data encryption; computer viruses; gender; ethics; socioeconomic status; age;
D O I
10.1287/isre.10.3.233
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Business ethics is an emerging area of research in many subfields of management, including information systems (IS). Empirical IS research has studied differences in users' attitudes and in moral judgments regarding ethical computer-related behavior. This study applied the "domains of morality" approach to determine how users felt about certain computer-related behaviors. Vignettes describing ethical dilemmas involving computer technology (e.g., uploading a computer virus on an electronic network/bulletin board system) were presented to a sample of Internet users. The research findings offered several interesting and, in some cases, unexpected results. The empirical results indicated that older computer users have a less permissive sense of what is right and wrong for an illegal game. When computers were used to test a banned game, men and women differed in their assessment of its appropriateness. A surprising finding was that participants were not likely to endorse civil liberties, and were more concerned about the harm to, and violations of, social norms when the scenario described a situation involving a computer virus. How users perceive, prejudge, and discriminate computer ethics and abusive computer actions raises numerous questions and implications for IS researchers, IS practitioners, and policy makers. The results of this study foster a better understanding of Internet users' moral categorization of specific computer behaviors and, hopefully, help to further reduce risks and vulnerabilities of systems by identifying computer actions deemed ethically acceptable by users. Opportunities for IS researchers to further explore this timely issue are also discussed.
引用
收藏
页码:233 / 254
页数:22
相关论文
共 50 条