Abstract
A panel held at the International Conference on Information Systems, December 5–7, 1993, addressed the importance and ethicality of several issues relating to ethics and information technology use. The substance of the debate and results of audience votes on the issues are presented in this paper as a means of initiating a broader debate on the issues, for it is with debate that we reach a group consensus on acceptable behavior and practice. With consensus, we can begin to develop codes and policies that are feasible and practical for ethical computer use.
Specific dilemmas debated involved the issues of privacy and ownership, including the ethicality of using company resources for personal use and monitoring compliance to company policies about computer use. In general, we found little consensus about ethicality of any of the types of conduct, although we found a high degree of consensus that the debated issues were important and should continue to be discussed. The final question concerned policies and codes. While policies and codes were believed to be necessary, they were also perceived as ineffective. Several suggestions for practical action to enhance the efficacy of ethical codes are presented.
Similar content being viewed by others
References
Anderson, R. E., D. G. Johnson, D. Gotterbarn and J. Perrolle: 1993, ‘Using the ACM Code of Ethics in Decision Making’, Communications of the ACM 36(2), 98–107.
Betts, M.: 1994, ‘Campaign Address Computer Ethics “Void”,’ Computerworld 28(24), 33.
Brown, B.: 1994, ‘In-Depth: Companies Own E-mail and Can Monitor It’, Computerworld 28(26), 135, 137.
Cespedes, F. V. and H. J. Smith: 1993, ‘Database Marketing: New Rules for Policy and Practice’, Sloan Management Review 34(4), 7–22.
Conger, S., K. D. Loch and B. L. Helft: 1995, ‘Ethics and Information Technology Use: A Factor Analysis of Attitudes to Computer Use’, Information Systems Journal 5, 161–184.
Culnan, M.: 1993, ‘“How Did They Get My Name?”: An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use’, MIS Quarterly 17(3), 341–361.
Donagan, A.: 1977, The Theory of Morality(University of Chicago Press, Chicago).
Donaldson, T. and T. W. Dunfee: 1994, ‘Toward a Unified Conception of Business Ethics: Integrative Social Contracts Theory’, Academy of Management Review 19(2), 252–284.
Dyson, E.: 1994, ‘The Trouble with Cyberspace’, Computerworld 28(29), 37.
Facione, P. A., D. Scherer and T. Attig: 1991, Ethics and Society, 2nd edition (Prentice-Hall, Inc., Englewood Cliffs, NJ).
Ferrell, O. C. and L. G. Gresham: 1985, ‘A Contingency Framework for Understanding Ethical Decision Making in Marketing’, Journal of Marketing 49, 87–96.
George, J. F.: 1994, ‘Computer-Based Monitoring: Common Perceptions and Empirical Results’, working paper, College of Business, Florida State University.
Gilligan, C., ed.: 1989, Mapping the Moral Domain: A Contribution of Women's Thinking to Psychological Theory & Education(Harvard University Press, Cambridge, MA).
Gotterbarn, D.: 1992, ‘The Use and Abuse of Computer Ethics’, Journal of Systems and Software 17(1), 75–80.
Horwitt, E.: 1994, ‘Not On My Internet’, Computerworld 28(28), 57–60.
Kahn, W. A.: 1990, ‘Toward an Agenda for Business Ethics Research’, Academy of Management Review 15(2), 311–328.
Kohlberg, L.: 1981, The Philosophy of Moral Development(Harper & Row, San Francisco).
Laudon, K.: 1993, ‘Markets and Privacy’, Proceedings of the 14th International Conference on Information Systems, Orlando, FL, pp. 65–75.
Loch, K. D., S. Conger and B. Helft: 1994, ‘An Exploration of Ethics and Information Technology Use: Issues, Perspectives, Consensus and Consistency’, (Under review).
Loch, K. D., H. H. Carr and M. E. Warkentin: 1992,’ Threats to Information Systems: Today's Reality, Yesterday's Understanding’, MIS Quarterly 16(2), 173–186.
Mason, R. O.: 1986, ‘Four Ethical Issues of the Information Age’, MIS Quarterly 10(1), 4–12.
Mason, J.: 1990, ‘Warning: Here Comes the Software Police’, Datamation(October), 40–45.
Nelson, C.: 1994, ‘In-Depth: Employers Have No Right to Snoop through Mail’, Computerworld 28(26), 135, 137.
Neumann, P. G.: 1994, ‘Technology, Laws, and Society’, Communications of the ACM 37(3), 138.
Oz, E.: 1992, ‘Ethical Standards for Information Systems Professionals: A Case for a Unified Code’, MIS Quarterly 16(4), 423–433.
Oz., E.: 1994, Ethics for the Information age(Wm. C. Brown Communications, Inc., Dubuque, IA).
Parker, D. B.: 1988, ‘Ethics for Information Systems Personnel’, Journal of Information Systems Management 5(3), 44–48.
Pillar, C.: 1993, ‘Special Report on Electronic Privacy: Bosses with X-Ray Eyes’, MacWorld( July), 118–120.
Sipior, J. and B. Ward: 1995, ‘The Ethical and Legal Quandary of E-mail Privacy’, Communications of the ACM 38(12), 40–47.
Smith, H. J.: 1994, Managing Privacy: Information Technology and Corporate America(The University of North Carolina Press, Chapel Hill, NC).
Starbuck, W. H. and J. Webster: 1991, ‘When Is Play Productive?’, Accounting, Management, and Information Technology 1(1), 71–90.
Straub, D. W. Jr. and R. Collins: 1990, ‘Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy’, MIS Quarterly 14(2), 143–158.
Webster, J. and J. J. Martocchio: 1992, ‘Microcomputer Playfulness: Development of a Measure with Workplace Implications’, MIS Quarterly 16(2), 201–226.
Rights and permissions
About this article
Cite this article
Loch, K.D., Conger, S. & Oz, E. Ownership, Privacy and Monitoring in the Workplace: A Debate on Technology and Ethics. Journal of Business Ethics 17, 653–663 (1998). https://doi.org/10.1023/A:1005720606763
Issue Date:
DOI: https://doi.org/10.1023/A:1005720606763