Skip to main content
Log in

Ethics in Information Technology and Software Use

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

The emerging concern about software piracy and illegal or unauthorized use of information technology and software has been evident in the media and open literature for the last few years. In the course of conducting their academic assignments, the authors began to compare observations from classroom experiences related to ethics in the use of software and information technology and systems. Qualitatively and anecdotally, it appeared that many if not most, students had misconceptions about what represented ethical and unethical behaviors in these realms. Clearly, one can argue that if college students are uncertain about what constitutes appropriate and inappropriate behavior then this uncertainty will be carried forward into their workplaces upon graduation. Furthermore, if their workplaces don't provide ethics training as a component of a new employee orientation program, one can project a potential for unintentional violations and infringements of copyrights and law in the field. This study was conducted among graduate and undergraduate students to gain insight into their attitudes, perceptions and understanding of some of the relevant ethics issues. A questionnaire of 11 statements was employed that described ubiquitous but most likely unethical (or surely dubious) behaviors in the prevailing business and academic environments. Each respondent was asked to evaluate each statement twice (once for “self” and once for “colleague”) on a five-option highly ethical (5) to neutral (3) to highly unethical (1) scale. The statements were worded such that lower instrument score was associated with higher ethical responses. The questionnaire's two-part structure was designed to solicit honest answers. The encouraging learning from this study was that the overall sample and its various sub-samples did not consider any of the eleven behaviors to be “ethical” or “highly ethical.” It was also encouraging to note that the overall sample and all sub-samples considered “highly unethical” those behaviors associated with personal privacy or property or outright theft. This indicated that moral judgment and probity prevail. The discouraging learning was that behaviors associated with the use of enterprise property were viewed as “neutral” i.e., neither “ethical” nor “unethical.” These findings suggested confusion and lack of clarity and definition around workplace deportment as it regards ethics in software and information technology use. The current study suggests that additional research needs to be conducted to define and clarify the issues, which in turn can form the basis for programs to rectify or at least ameliorate the situation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Alexander, S.: 1998, 'Those Flippin' Recruiters!' Computerworld 23 Nov., 67-69.

  • Belsie, L.: 1998, 'Watching for Technology Abuse at Work', Christian Science Monitor 17 Aug., 136.

  • 'By the numbers': 1998, Information Security June, 12.

  • Chan, A., S. Wong and P. Leung: 1998, 'Ethical Beliefs of Chinese Consumers in Hong Kong', J. Business Ethics Aug., 1163-1170.

  • 'China cracks down on IPR violations': 1998, Asia Computer Weekly 23 Nov., 1.

  • Cohen, E. and L. Cornwell: 1989, 'College Students Believe Piracy is Acceptable', CIS Educator Forum 1(3), 2-5.

    Google Scholar 

  • 'Corporate strategies': 1998, Computerworld 4, 37.

    Google Scholar 

  • 'CSC, other tech companies join ITAA and Department of Justice to unveil cybercitizen partnership; new alliance to promote computer ethics, civic responsibility': 1999, PR Newswire 15 Mar.

  • D'Aquila, J. M.: 2001, 'Financial Accountants' Perception of Managements' Ethical Standards', J. Business Ethics 31(3), 233 (June).

    Google Scholar 

  • 'Ever done something illicit at work using technology?': 1999, PC/Computing Jan., 306.

  • Grimsley, K. D.: 1998, ' “Ethical” Employer is a Software Cheat', The Washington Post 27 Sep., 1104.

  • 'Is that work-related?': 1999, The Journal News 22 Nov., 1D.

  • Kohanski, D.: 1998, 'Computers that Spy on Us/Unethical Programmers Insert Code that Serves their Interest, Not Ours', San Francisco Chronicle 1 Dec, A23.

  • Machlis, A.: 1998, Financial Times (London) 27 May, 7.

  • Maharaj, D.: 1998, 'A Pitch to Snitch: Software Firms Urge Employees to Turn in Bosses', The Los Angeles Times 14 August, 1.

  • Manley, J. F., G. F. Conlin and C. L. Williams: 1998, 'Factors that Contribute to the Ethical Judgements of Business Students: An Empirical Study', The Management of Values: Organizational and Educational Issues 5 Dec., 363-370.

  • Pemberton, J. M.: 1998, 'Through a Glass Darkly: Ethics and Information Technology', Records Management Quarterly Jan., 76.

  • Sibley, K.: 1998, 'Technology Complicates Workplace Ethics: KPMG Survey', Computer Dealer News (Canada) 15 June, 14.

  • Silbert, M. D.: 1998, Canadian Chemical News Feb., 50.

  • Wood, W., R. Behling and A. Y. Ang: 1999, 'Software Piracy: Issues and Perceptions of Australian University Students', International Information Management 7(2), 17-26.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Calluzzo, V.J., Cante, C.J. Ethics in Information Technology and Software Use. Journal of Business Ethics 51, 301–312 (2004). https://doi.org/10.1023/B:BUSI.0000032658.12032.4e

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:BUSI.0000032658.12032.4e

Navigation