{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T00:23:05Z","timestamp":1773102185736,"version":"3.50.1"},"reference-count":95,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2012,11,23]],"date-time":"2012-11-23T00:00:00Z","timestamp":1353628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11,23]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The information technology (IT) related ethical issues will only increase in frequency and complexity with the increasing diffusion of IT in economies and societies. The purpose of this paper is to explore Egyptian students' attitudes towards the information ethics issues of privacy, access, property, and accuracy, and it evaluates the possible impact of a number of personal characteristics on such attitudes.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>This research utilized a cross\u2010sectional sample and data set to test five hypotheses. It adopted an instrument to collect the respondents' background information and assess their attitudes towards the information ethics issues of privacy, property, accuracy, and access. Egyptian business students at Alexandria University were asked to participate in the survey. A total of 305 responses were collected and analyzed.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The analysis revealed that students are sensitive to the ethicality of information privacy, information accuracy, and information access. However, students are insensitive to the ethicality of property (software) right. In addition, years of education have a main effect on students' attitudes towards property, and gender and age have an interaction effect on students' attitudes towards access.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The findings of this research are based on a cross\u2010sectional data set collected from a sample of business students at a public university. Students, however, may make poor surrogates for business or IT professionals. Future similar research designs that employ large samples from Egyptian working professionals and students in other private and public universities are needed to verify the findings of this research.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The findings suggest that the investigated university as well as the other similar Egyptian universities should consider integrating ethics education into their curricula. Teaching information ethics, especially from an Islamic perspective, is expected to positively influence students' information ethical attitudes. The enforcement of the existing property right protection laws should also curb software piracy in the Egyptian market.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>It is vital to expand the ethical research currently being performed in IT in order to help bridge the gap between behavior and IT. The findings of this research extend the understanding of students' attitudes towards the information ethics issues in Egyptian culture and contribute to the growing body of knowledge on global information ethics.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14779961211285872","type":"journal-article","created":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T05:18:15Z","timestamp":1353561495000},"page":"240-261","source":"Crossref","is-referenced-by-count":13,"title":["Attitudes towards information ethics: a view from Egypt"],"prefix":"10.1108","volume":"10","author":[{"given":"Omar E.M.","family":"Khalil","sequence":"first","affiliation":[]},{"given":"Ahmed A.S.","family":"Seleim","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031819530073600_b1","doi-asserted-by":"crossref","unstructured":"Abdolmohammadi, M. and Reevese, M.F. (2000), \u201cEffects of education and intervention on business students' ethical cognition: a cross sectional and longitudinal study\u201d, Teaching Business Ethics, Vol. 4 No. 3, pp. 269\u201084.","DOI":"10.1023\/A:1009834727902"},{"key":"key2022031819530073600_b2","doi-asserted-by":"crossref","unstructured":"Ahmed, M.M., Chung, K.Y. and Eichenseher, J.W. (2003), \u201cBusiness students' perception of ethics and moral judgment: a cross\u2010cultural study\u201d, Journal of Business Ethics, Vol. 43 Nos 1\/2, pp. 89\u2010102.","DOI":"10.1023\/A:1022915316112"},{"key":"key2022031819530073600_b3","doi-asserted-by":"crossref","unstructured":"Al\u2010A'ali, M. (2008), \u201cComputer ethics for the computer professional from an Islamic point of view\u201d, Journal of Information, Communication & Ethics in Society, Vol. 6 No. 1, pp. 28\u201045.","DOI":"10.1108\/14779960810866783"},{"key":"key2022031819530073600_b4","unstructured":"Al\u2010Lawati, H.M. (2003), \u201cComparing information systems ethics in the United States of America with information systems ethics in the Sultanate of Oman\u201d, unpublished doctoral dissertation, Utah State University, Logan, UT."},{"key":"key2022031819530073600_b5","doi-asserted-by":"crossref","unstructured":"Alshawaf, A., Adhikari, A. and Zhang, H. (2002), \u201cInformation ethics: an investigation of different subcultures in a society\u201d, Review of Accounting & Finance, Vol. 1 No. 3, pp. 54\u201073.","DOI":"10.1108\/eb026991"},{"key":"key2022031819530073600_b6","unstructured":"Altschuller, S. (2004), \u201cDeveloping an IT view\u2010based framework for IS ethics research\u201d, Working Paper No. CIS\u20102004\u201001, Zicklin School of Business, Baruch College, City University of New York, pp. 1\u201053."},{"key":"key2022031819530073600_b7","doi-asserted-by":"crossref","unstructured":"Anderson, R.E., Johnson, D.G., Gotterbarn, D. and Perrolle, J. (1993), \u201cUsing the new ACM code of ethics in decision making\u201d, Communications of the ACM, Vol. 36 No. 2, pp. 98\u2010107.","DOI":"10.1145\/151220.151231"},{"key":"key2022031819530073600_b8","doi-asserted-by":"crossref","unstructured":"Banerjee, D., Cronan, T.P. and Jones, T.W. (1998), \u201cModeling IT ethics: a study in situational ethics\u201d, MIS Quarterly, Vol. 22 No. 1, pp. 31\u201057.","DOI":"10.2307\/249677"},{"key":"key2022031819530073600_b9","doi-asserted-by":"crossref","unstructured":"Bhattacharjee, S., Gopal, R.D. and Sanders, G.L. (2003), \u201cDigital music and online sharing: software piracy 2.0?\u201d, Communications of the ACM, Vol. 46 No. 7, pp. 107\u201011.","DOI":"10.1145\/792704.792707"},{"key":"key2022031819530073600_b10","doi-asserted-by":"crossref","unstructured":"Biot\u2010Paquerot, G. and Hasnaoui, A. (2009), \u201cStakeholders perspective and ethics in financial information systems\u201d, Journal of Electronic Commerce in Organizations, Vol. 7 No. 1, pp. 59\u201070.","DOI":"10.4018\/jeco.2009010105"},{"key":"key2022031819530073600_b11","doi-asserted-by":"crossref","unstructured":"Boomer, M., Gratto, C., Gravander, J. and Tullie, M. (1987), \u201cA behavioral model of ethical and unethical decision making\u201d, Journal of Business Ethics, Vol. 6, pp. 265\u201080.","DOI":"10.1007\/BF00382936"},{"key":"key2022031819530073600_b12","doi-asserted-by":"crossref","unstructured":"Borkowski, S.C. and Ugras, Y.J. (1998), \u201cBusiness students and ethics: a meta\u2010analysis\u201d, Journal of Business Ethics, Vol. 17 No. 11, pp. 1117\u201027.","DOI":"10.1023\/A:1005748725174"},{"key":"key2022031819530073600_b13","doi-asserted-by":"crossref","unstructured":"Calkins, M. (2002), \u201cRippers, portal users, and profilers: three web\u2010based issues for business ethicists\u201d, Business & Society Review, Vol. 107 No. 1, pp. 61\u201075.","DOI":"10.1111\/0045-3609.00127"},{"key":"key2022031819530073600_b14","doi-asserted-by":"crossref","unstructured":"Cheng, H.K., Sims, R.R. and Teegen, H. (1997), \u201cTo purchase or to pirate software: an empirical study\u201d, Journal of Management Information Systems, Vol. 13 No. 4, pp. 49\u201060.","DOI":"10.1080\/07421222.1997.11518142"},{"key":"key2022031819530073600_b15","doi-asserted-by":"crossref","unstructured":"Chow, W.S. (2001), \u201cEthical belief and behavior of managers using information technology for decision making in Hong Kong\u201d, Journal of Managerial Psychology, Vol. 16 No. 4, pp. 258\u201067.","DOI":"10.1108\/02683940110392570"},{"key":"key2022031819530073600_b17","unstructured":"Cohen, J., Pant, L. and Sharp, D. (1998), \u201cThe effect of gender and academic discipline diversity on the ethical evaluations, ethical intention, and ethical orientation of potential public accounting recruits\u201d, Accounting Horizons, Vol. 12 No. 3, pp. 250\u201070."},{"key":"key2022031819530073600_b18","doi-asserted-by":"crossref","unstructured":"Cole, B.C. and Smith, D.L. (1996), \u201cPerceptions of business ethics: students vs. business people\u201d, Journal of Business Ethics, Vol. 15, pp. 889\u201096.","DOI":"10.1007\/BF00381856"},{"key":"key2022031819530073600_b16","doi-asserted-by":"crossref","unstructured":"Collste, G. (2008), \u201cGlobal ICT\u2010ethics: the case of privacy\u201d, Journal of Information, Communication & Ethics in Society, Vol. 6, pp. 76\u201087.","DOI":"10.1108\/14779960810866819"},{"key":"key2022031819530073600_b19","doi-asserted-by":"crossref","unstructured":"Conger, S., Loch, K.D. and Helft, B.L. (1995), \u201cEthics and information technology use: a factor analysis of attitudes to computer use\u201d, Information Systems Journal, Vol. 5 No. 3, pp. 161\u201083.","DOI":"10.1111\/j.1365-2575.1995.tb00106.x"},{"key":"key2022031819530073600_b20","doi-asserted-by":"crossref","unstructured":"Couger, J.D. (1989), \u201cPreparing IS students to deal with ethical issues\u201d, MIS Quarterly, Vol. 13 No. 2, pp. 211\u201018.","DOI":"10.2307\/248930"},{"key":"key2022031819530073600_b24","doi-asserted-by":"crossref","unstructured":"Davis, J.R. and Welton, R.E. (1991), \u201cProfessional ethics: business students' perceptions\u201d, Journal of Business Ethics, Vol. 10, pp. 451\u201063.","DOI":"10.1007\/BF00382829"},{"key":"key2022031819530073600_b22","doi-asserted-by":"crossref","unstructured":"Davison, R.M. (2000), \u201cProfessional ethics in information systems: a personal perspective\u201d, Communications of the AIS, Vol. 3 No. 8, available at: www.ais.org (accessed January 25, 2011).","DOI":"10.17705\/1CAIS.00308"},{"key":"key2022031819530073600_b23","doi-asserted-by":"crossref","unstructured":"Davison, R.M., Martinsons, M.G., Ou, C.X.J., Murata, K., Drummond, D., Li, Y. and Lo, H.W.H. (2009), \u201cThe ethics of IT professionals in China and Japan\u201d, Journal of the Association of Information Systems, Vol. 10 No. 11, pp. 834\u201059.","DOI":"10.17705\/1jais.00212"},{"key":"key2022031819530073600_b21","doi-asserted-by":"crossref","unstructured":"Dawson, L.M. (1997), \u201cEthics differences between men and women in the sales profession\u201d, Journal of Business Ethics, Vol. 16, pp. 1143\u201052.","DOI":"10.1023\/A:1005721916646"},{"key":"key2022031819530073600_b25","doi-asserted-by":"crossref","unstructured":"Deshpande, S.P. (1997), \u201cManagers' perception of proper ethical conduct: the effect of sex, age, and level of education\u201d, Journal of Business Ethics, Vol. 16 No. 1, pp. 79\u201085.","DOI":"10.1023\/A:1017917420433"},{"key":"key2022031819530073600_b26","unstructured":"Eining, M.M. and Lee, G.M. (1997), \u201cInformation ethics: an exploratory study from an international perspective\u201d, Journal of Information Systems, Vol. 11 No. 1, pp. 1\u201017."},{"key":"key2022031819530073600_b27","doi-asserted-by":"crossref","unstructured":"Erffmeyer, R.C., Keillor, B.D. and LeClair, D.T. (1999), \u201cAn empirical investigation of Japanese consumer ethics\u201d, Journal of Business Ethics, Vol. 18 No. 1, pp. 35\u201050.","DOI":"10.1023\/A:1006025724126"},{"key":"key2022031819530073600_b28","doi-asserted-by":"crossref","unstructured":"Fallis, D. (2007), \u201cInformation ethics for 21st century library professionals\u201d, Library Hi Tech, Vol. 25, pp. 23\u201036.","DOI":"10.1108\/07378830710735830"},{"key":"key2022031819530073600_b29","doi-asserted-by":"crossref","unstructured":"Ford, R. and Richardson, W. (1994), \u201cEthical decision making: a review of the empirical literature\u201d, Journal of Business Ethics, Vol. 13 No. 3, pp. 205\u201021.","DOI":"10.1007\/BF02074820"},{"key":"key2022031819530073600_b30","doi-asserted-by":"crossref","unstructured":"Gan, L.L. and Koh, H.C. (2006), \u201cAn empirical study of software piracy among tertiary institutions in Singapore\u201d, Information & Management, Vol. 43 No. 5, p. 640.","DOI":"10.1016\/j.im.2006.03.005"},{"key":"key2022031819530073600_b31","doi-asserted-by":"crossref","unstructured":"Gattiker, U.E. and Kelley, M. (1999), \u201cMorality and computers: attitudes and differences in moral judgments\u201d, Information Systems Research, Vol. 10 No. 3, pp. 233\u201054.","DOI":"10.1287\/isre.10.3.233"},{"key":"key2022031819530073600_b32","unstructured":"Gilligan, C. (1982), In a Different Voice, Harvard University Press, Cambridge, MA."},{"key":"key2022031819530073600_b33","doi-asserted-by":"crossref","unstructured":"Glover, S., Bumpus, M., Logan, J. and Ciesla, J. (1997), \u201cReexamining the influence of individual values on ethical decision making\u201d, Journal of Business Ethics, Vol. 16, pp. 1319\u201029.","DOI":"10.1023\/A:1005758402861"},{"key":"key2022031819530073600_b34","doi-asserted-by":"crossref","unstructured":"Gopal, R.D. and Sanders, G.L. (2000), \u201cGlobal software piracy: you can't get blood out of a turnip\u201d, Communications of the ACM, Vol. 43 No. 9, pp. 82\u20109.","DOI":"10.1145\/348941.349002"},{"key":"key2022031819530073600_b35","doi-asserted-by":"crossref","unstructured":"Grosso, A. (2000), \u201cThe promise and problems of the No Electronic Theft Act\u201d, Communications of the ACM, Vol. 43 No. 2, pp. 23\u20106.","DOI":"10.1145\/328236.328243"},{"key":"key2022031819530073600_b36","doi-asserted-by":"crossref","unstructured":"Grupe, F., Garcia\u2010Jay, T. and Kuechler, W. (2002), \u201cIs it time for an IT ethics program?\u201d, Information Systems Management, Vol. 19 No. 3, pp. 51\u20107.","DOI":"10.1201\/1078\/43201.19.3.20020601\/37170.7"},{"key":"key2022031819530073600_b37","unstructured":"Hejase, H.J. and Tabch, H. (2010), \u201cEthics education: an assessment case of the American University of Science & Technology \u2013 Lebanon\u201d, Proceedings of New Trends in Business Education Conference, Kuwait, February 15\u201017."},{"key":"key2022031819530073600_b38","doi-asserted-by":"crossref","unstructured":"Hsu, M.\u2010H. and Kuo, F.\u2010Y. (2003), \u201cThe effect of organization\u2010based self\u2010esteem and deindividuatioin in protecting personal information privacy\u201d, Journal of Business Ethics, Vol. 42 No. 4, pp. 305\u201020.","DOI":"10.1023\/A:1022500626298"},{"key":"key2022031819530073600_b39","doi-asserted-by":"crossref","unstructured":"Husted, B.W. (2000), \u201cThe impact of national culture on software piracy\u201d, Journal of Business Ethics, Vol. 26 No. 3, pp. 197\u2010211.","DOI":"10.1023\/A:1006250203828"},{"key":"key2022031819530073600_b40","doi-asserted-by":"crossref","unstructured":"Karande, K., Rao, C.P. and Singhapakdi, A. (2002), \u201cMoral philosophies of marketing managers: a comparison of American, Australian, and Malaysian cultures\u201d, European Journal of Marketing, Vol. 36 Nos 7\/8, pp. 768\u201091.","DOI":"10.1108\/03090560210430791"},{"key":"key2022031819530073600_b41","doi-asserted-by":"crossref","unstructured":"Khalil, O. (1993), \u201cArtificial decision\u2010making and artificial ethics: a management concern\u201d, Journal of Business Ethics, Vol. 12, pp. 313\u201021.","DOI":"10.1007\/BF01666535"},{"key":"key2022031819530073600_b42","doi-asserted-by":"crossref","unstructured":"Kohlberg, L. and Hersh, R.H. (1977), \u201cMoral development: a review of the theory\u201d, Theory into Practice, Vol. 16 No. 2, pp. 53\u20109.","DOI":"10.1080\/00405847709542675"},{"key":"key2022031819530073600_b43","unstructured":"Kowalski, S. and Kowalski, H. (1990), \u201cComputer ethics and computer abuse: a study of Swedish and Canadian university data processing students\u201d, Information Age, Vol. 12 No. 4, pp. 206\u201016."},{"key":"key2022031819530073600_b45","doi-asserted-by":"crossref","unstructured":"Kreie, J. and Cronan, T.P. (1998), \u201cHow men and women view ethics\u201d, Communications of the ACM, Vol. 41 No. 9, pp. 70\u20106.","DOI":"10.1145\/285070.285084"},{"key":"key2022031819530073600_b44","doi-asserted-by":"crossref","unstructured":"Kreie, J. and Cronan, T.P. (2000), \u201cMaking ethical decisions\u201d, Communications of the ACM, Vol. 43 No. 12, pp. 66\u201071.","DOI":"10.1145\/355112.355126"},{"key":"key2022031819530073600_b46","doi-asserted-by":"crossref","unstructured":"Kuo, F.Y. and Hsu, M.H. (2001), \u201cDevelopment and validation of ethical computer self\u2010efficacy measure: the case of softlifting\u201d, Journal of Business Ethics, Vol. 32 No. 4, pp. 299\u2010315.","DOI":"10.1023\/A:1010715504824"},{"key":"key2022031819530073600_b48","doi-asserted-by":"crossref","unstructured":"Lane, M.S. and Schaupp, D. (1989), \u201cEthics in education: a comparative study\u201d, Journal of Business Ethics, Vol. 8 No. 12, pp. 943\u20109.","DOI":"10.1007\/BF00383429"},{"key":"key2022031819530073600_b47","doi-asserted-by":"crossref","unstructured":"Lane, M.S., Schaupp, D. and Parsons, B. (1988), \u201cPygmalion effect: an issue for business education and ethics\u201d, Journal of Business Ethics, Vol. 7 No. 3, pp. 223\u20109.","DOI":"10.1007\/BF00381872"},{"key":"key2022031819530073600_b50","doi-asserted-by":"crossref","unstructured":"Leonard, L.N.K. and Cronan, T.P. (2001), \u201cIllegal, inappropriate, and unethical behavior in an information technology context: a study to explain the influences\u201d, Journal of the Association for Information Systems, Vol. 1 No. 12, pp. 1\u201031.","DOI":"10.17705\/1jais.00012"},{"key":"key2022031819530073600_b51","doi-asserted-by":"crossref","unstructured":"Leonard, L.N.K. and Cronan, T.P. (2005), \u201cAttitude toward ethical behavior in computer use: a shifting model\u201d, Industrial Management & Data Systems, Vol. 105, pp. 1150\u201071.","DOI":"10.1108\/02635570510633239"},{"key":"key2022031819530073600_b49","doi-asserted-by":"crossref","unstructured":"Loch, K. and Conger, S. (1996), \u201cEvaluating ethical decision making and computer use\u201d, Communication of the ACM, Vol. 39 No. 7, pp. 74\u201083.","DOI":"10.1145\/233977.233999"},{"key":"key2022031819530073600_b52","doi-asserted-by":"crossref","unstructured":"Lopez, Y.P., Rechner, P.L. and Olson\u2010Buchanan, J.B. (2005), \u201cShaping ethical perceptions: an empirical assessment of the influence of business education, culture, and demographic factors\u201d, Journal of Business Ethics, Vol. 60 No. 4, pp. 341\u201058.","DOI":"10.1007\/s10551-005-1834-4"},{"key":"key2022031819530073600_b57","doi-asserted-by":"crossref","unstructured":"McCabe, A.C., Ingram, R. and Dato\u2010on, M.C. (2006), \u201cThe business of ethics and gender\u201d, Journal of Business Ethics, Vol. 64 No. 2, pp. 101\u201016.","DOI":"10.1007\/s10551-005-3327-x"},{"key":"key2022031819530073600_b53","doi-asserted-by":"crossref","unstructured":"Maner, W. (1996), \u201cUnique ethical problems in information technology\u201d, Science and Engineering Ethics, Vol. 2 No. 2, pp. 137\u201054.","DOI":"10.1007\/BF02583549"},{"key":"key2022031819530073600_b54","doi-asserted-by":"crossref","unstructured":"Martinsons, M.G. and Ma, A. (2009), \u201cSub\u2010cultural differences in information ethics across China: focus on Chinese management generation gaps\u201d, Journal of the Association for Information Systems, Vol. 10 No. 11, pp. 816\u201033.","DOI":"10.17705\/1jais.00213"},{"key":"key2022031819530073600_b55","doi-asserted-by":"crossref","unstructured":"Mason, R.O. (1986), \u201cFour ethical issues of the information age\u201d, MIS Quarterly, Vol. 10 No. 1, pp. 4\u201012.","DOI":"10.2307\/248873"},{"key":"key2022031819530073600_b56","doi-asserted-by":"crossref","unstructured":"Mathieu, R.G. and Woodward, R.L. (1995), \u201cData integrity and the internet: implications for management\u201d, Information Management and Computer Security, Vol. 3 No. 2, pp. 3\u20107.","DOI":"10.1108\/09685229510088566"},{"key":"key2022031819530073600_b58","doi-asserted-by":"crossref","unstructured":"Merritt, S. (1991), \u201cMarketing ethics and education: some empirical findings\u201d, Journal of Business Ethics, Vol. 10 No. 8, pp. 625\u201032.","DOI":"10.1007\/BF00382883"},{"key":"key2022031819530073600_b60","doi-asserted-by":"crossref","unstructured":"Milberg, S.J., Smith, H.J. and Burke, S.J. (2000), \u201cInformation privacy: corporate management and national regulation\u201d, Organization Science, Vol. 11 No. 1, p. 35.","DOI":"10.1287\/orsc.11.1.35.12567"},{"key":"key2022031819530073600_b59","doi-asserted-by":"crossref","unstructured":"Milberg, S.J., Burke, S.J., Smith, H.J. and Kallman, E.A. (1995), \u201cValues, personal information privacy, and regulatory approaches\u201d, Communications of the ACM, Vol. 38 No. 12, pp. 65\u201073.","DOI":"10.1145\/219663.219683"},{"key":"key2022031819530073600_b61","doi-asserted-by":"crossref","unstructured":"Moor, J.H. (2005), \u201cWhy we need better ethics for emerging technologies\u201d, Ethics and Information Technology, Vol. 7 No. 3, pp. 111\u201019.","DOI":"10.1007\/s10676-006-0008-0"},{"key":"key2022031819530073600_b62","doi-asserted-by":"crossref","unstructured":"Moores, T. and Dhillon, G. (2000), \u201cSoftware piracy: a view from Hong Kong\u201d, Communications of the ACM, Vol. 43 No. 12, pp. 88\u201093.","DOI":"10.1145\/355112.355129"},{"key":"key2022031819530073600_b63","doi-asserted-by":"crossref","unstructured":"Mumford, E. (2003), \u201cInformation systems research and the quest for certainty\u201d, Journal of the Association for Information Systems, Vol. 4 No. 4, pp. 197\u2010205.","DOI":"10.17705\/1jais.00034"},{"key":"key2022031819530073600_b64","doi-asserted-by":"crossref","unstructured":"Murata, K. and Orito, K. (2008), \u201cRethinking the concept of the right to information privacy: a Japanese perspective\u201d, Journal of Information, Communication & Ethics in Society, Vol. 6 No. 3, pp. 233\u201045.","DOI":"10.1108\/14779960810916237"},{"key":"key2022031819530073600_b65","unstructured":"O'Boyle, E.J. (2002), \u201cAn ethical decision\u2010making process for computing professionals\u201d, Ethics and Information Technology, Vol. 4 No. 4, pp. 267\u201077."},{"key":"key2022031819530073600_b66","doi-asserted-by":"crossref","unstructured":"Peace, A.G., Galletta, D.F. and Thong, J.Y.L. (2003), \u201cSoftware piracy in the workplace: a model and empirical test\u201d, Journal of Management Information Systems, Vol. 20 No. 1, p. 153.","DOI":"10.1080\/07421222.2003.11045759"},{"key":"key2022031819530073600_b67","doi-asserted-by":"crossref","unstructured":"Pearson, J.M., Crosby, L. and Shim, J.P. (1997), \u201cMeasuring the importance of ethical behavior criteria\u201d, Communications of the ACM, Vol. 40 No. 9, pp. 94\u2010100.","DOI":"10.1145\/260750.260780"},{"key":"key2022031819530073600_b68","unstructured":"Peslak, A.R. (2006), \u201cAn exploratory investigation of information technology ethics factors\u201d, Issues in Information Systems, Vol. V, VII, pp. 339\u201043."},{"key":"key2022031819530073600_b69","unstructured":"Peterson, D., Rhoads, A. and Vaught, B.C. (2001), \u201cEthical beliefs of business professionals: a study of gender, age, and external factors\u201d, Journal of Business Ethics, Vol. 31 No. 3, pp. 225\u201032."},{"key":"key2022031819530073600_b70","doi-asserted-by":"crossref","unstructured":"Phukan, S. and Dhillon, G. (2000), \u201cEthics and information technology use: a survey of US based SMEs\u201d, Information Management & Computer Security, Vol. 8 No. 5, pp. 239\u201043.","DOI":"10.1108\/09685220010353907"},{"key":"key2022031819530073600_b71","unstructured":"Poorsoltan, K., Amin, S. and Tootoonchi, A. (1991), \u201cBusiness ethics: views of future leaders\u201d, SAM Advanced Management Journal, Vol. 56 No. 1, pp. 4\u201010."},{"key":"key2022031819530073600_b72","doi-asserted-by":"crossref","unstructured":"Rawwas, M.Y.A. and Isakson, H. (2000), \u201cEthics of tomorrow's business managers: the influence of personal beliefs and values, individual characteristics, and situational factors\u201d, The Journal of Education for Business, Vol. 75 No. 6, pp. 321\u201030.","DOI":"10.1080\/08832320009599035"},{"key":"key2022031819530073600_b73","doi-asserted-by":"crossref","unstructured":"Reiss, M. and Mitra, K. (1998), \u201cThe effects of individual differences factors on the acceptability of ethical and unethical workplace behaviors\u201d, Journal of Business Ethics, Vol. 17, pp. 1581\u201093.","DOI":"10.1023\/A:1005742408725"},{"key":"key2022031819530073600_b74","unstructured":"Rest, J. (1986), Moral Development: Advances in Research and Theory, Praeger, New York, NY."},{"key":"key2022031819530073600_b75","doi-asserted-by":"crossref","unstructured":"Robin, D.P. and Babin, L. (1997), \u201cMaking sense of the research on gender and ethics in business: a critical analysis and extension\u201d, Business Ethics Quarterly, Vol. 3 No. 4, pp. 61\u201090.","DOI":"10.2307\/3857209"},{"key":"key2022031819530073600_b76","doi-asserted-by":"crossref","unstructured":"Ruegger, D. and King, E.W. (1992), \u201cA study of the effect of age and gender upon student business ethics\u201d, Journal of Business Ethics, Vol. 11 No. 3, pp. 179\u201086.","DOI":"10.1007\/BF00871965"},{"key":"key2022031819530073600_b77","doi-asserted-by":"crossref","unstructured":"Serwinck, P.J. (1992), \u201cDemographic & related differences in ethics views among small businesses\u201d, Journal of Business Ethics, Vol. 11 No. 7, pp. 555\u201066.","DOI":"10.1007\/BF00881448"},{"key":"key2022031819530073600_b78","doi-asserted-by":"crossref","unstructured":"Siegfried, R.M. (2004), \u201cStudent attitudes on software piracy and related issues of computer ethics\u201d, Ethics and Information technology, Vol. 6 No. 4, pp. 215\u201022.","DOI":"10.1007\/s10676-004-3391-4"},{"key":"key2022031819530073600_b80","doi-asserted-by":"crossref","unstructured":"Sikula, S.A. and Costa, A.D. (1994), \u201cAre age and ethics related\u201d, Journal of Psychology, Vol. 128 No. 6, pp. 659\u201065.","DOI":"10.1080\/00223980.1994.9921294"},{"key":"key2022031819530073600_b81","doi-asserted-by":"crossref","unstructured":"Sims, R., Cheng, H. and Teegen, H. (1996), \u201cToward a profile of student software piraters\u201d, Journal of Business Ethics, Vol. 15 No. 8, pp. 839\u201049.","DOI":"10.1007\/BF00381852"},{"key":"key2022031819530073600_b79","doi-asserted-by":"crossref","unstructured":"Sipior, J.C. and Ward, B.T. (1998), \u201cEthical responsibility for software development\u201d, Information Systems Management, Vol. 15 No. 2, pp. 68\u201072.","DOI":"10.1201\/1078\/43184.15.2.19980301\/31123.12"},{"key":"key2022031819530073600_b82","doi-asserted-by":"crossref","unstructured":"Smith, H. (2002), \u201cEthics and information systems: resolving the quandaries\u201d, Data Base for Advances in Information Systems, Vol. 33 No. 3, pp. 8\u201020.","DOI":"10.1145\/569905.569908"},{"key":"key2022031819530073600_b83","doi-asserted-by":"crossref","unstructured":"Song, Y. and Yarbrough, T.E. (1978), \u201cTax ethics and taxpayer attitudes: a survey\u201d, Public Administration Review, Vol. 38 No. 5, pp. 442\u201052.","DOI":"10.2307\/975503"},{"key":"key2022031819530073600_b84","doi-asserted-by":"crossref","unstructured":"Spinello, R. (2005), \u201cCyberethics: morality and law in cyberspace\u201d, Journal of Information Ethics, Vol. 14 No. 1, pp. 70\u201090.","DOI":"10.3172\/JIE.14.1.70"},{"key":"key2022031819530073600_b85","doi-asserted-by":"crossref","unstructured":"Stedham, Y., Yamamura, J.H. and Beekun, R.I. (2007), \u201cGender differences in business ethics: justice and relativist perspectives\u201d, Business Ethics: A European Review, Vol. 16 No. 2, pp. 163\u201074.","DOI":"10.1111\/j.1467-8608.2007.00486.x"},{"key":"key2022031819530073600_b86","doi-asserted-by":"crossref","unstructured":"Swaidan, Z., Vitell, S.J. and Rawwas, M.Y.A. (2003), \u201cConsumer ethics: determinants of ethical beliefs of African Americans\u201d, Journal of Business Ethics, Vol. 46 No. 2, pp. 175\u201086.","DOI":"10.1023\/A:1025068902771"},{"key":"key2022031819530073600_b87","doi-asserted-by":"crossref","unstructured":"Tavani, H.T. (2002), \u201cThe uniqueness debate in computer ethics: what exactly is at issue, and why does it matter?\u201d, Ethics and Information technology, Vol. 4, pp. 37\u201054.","DOI":"10.1023\/A:1015283808882"},{"key":"key2022031819530073600_b88","doi-asserted-by":"crossref","unstructured":"Tavani, H.T. and Moor, J.H. (2001), \u201cPrivacy protection, control of information, and privacy\u2010enhancing technologies\u201d, ACM SIGCAS Newsletter, Vol. 31 No. 1, pp. 6\u201011.","DOI":"10.1145\/572277.572278"},{"key":"key2022031819530073600_b89","doi-asserted-by":"crossref","unstructured":"Thong, J.Y.L. and Yap, C.S. (1998), \u201cTesting an ethical decision\u2010making theory: the case of softlifting\u201d, Journal of Management Information Systems, Vol. 15 No. 1, pp. 213\u201037.","DOI":"10.1080\/07421222.1998.11518203"},{"key":"key2022031819530073600_b90","doi-asserted-by":"crossref","unstructured":"Trevino, L.K. (1986), \u201cEthical decision making in organizations: a person\u2010situation interactionist model\u201d, Academy of Management Review, Vol. 11 No. 3, pp. 610\u201017.","DOI":"10.5465\/amr.1986.4306235"},{"key":"key2022031819530073600_b91","unstructured":"Villazon, C.H. (2004), \u201cSoftware piracy: an empirical study of influencing factor\u201d, unpublished doctoral PhD dissertation, Wayne Huizenga School of Business Entrepreneurship, Nova Southeastern University."},{"key":"key2022031819530073600_b93","doi-asserted-by":"crossref","unstructured":"Whitman, M.E., Townsend, A.M. and Hendrickson, A.R. (1999), \u201cCross\u2010national differences in computer\u2010use ethics: a nine\u2010country study\u201d, Journal of International Business Studies, Vol. 30 No. 4, pp. 673\u201087.","DOI":"10.1057\/palgrave.jibs.8490833"},{"key":"key2022031819530073600_b92","doi-asserted-by":"crossref","unstructured":"Winter, S.J., Stylianou, A.C. and Giacalone, R.A. (2004), \u201cIndividual differences in the acceptability of unethical information technology practices: the case of Machiavellianism and ethical ideology\u201d, Journal of Business Ethics, Vol. 54 No. 3, pp. 279\u2010301.","DOI":"10.1007\/s10551-004-1772-6"},{"key":"key2022031819530073600_b95","unstructured":"Wood, W. and Glass, R. (1996), \u201cSex as a determinant of software piracy\u201d, Journal of Computer Information Systems, Vol. 37 No. 2, pp. 37\u201043."},{"key":"key2022031819530073600_b94","unstructured":"Wood\u2010Harper, A.T., Corder, S. and Byrne, B. (1999), \u201cEthically situated information systems development\u201d, Australian Computer Journal, Vol. 31 No. 3, pp. 66\u201071."}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14779961211285872","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961211285872\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961211285872\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:13:20Z","timestamp":1753402400000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/10\/4\/240-261\/218286"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,23]]},"references-count":95,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,11,23]]}},"alternative-id":["10.1108\/14779961211285872"],"URL":"https:\/\/doi.org\/10.1108\/14779961211285872","relation":{},"ISSN":["1477-996X"],"issn-type":[{"value":"1477-996X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,11,23]]}}}