{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:00:45Z","timestamp":1754157645347,"version":"3.41.2"},"reference-count":8,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2000,12,1]],"date-time":"2000-12-01T00:00:00Z","timestamp":975628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000,12,1]]},"abstract":"<jats:p>The purpose of this paper is to study the beliefs and attitudes of small\u2010 and medium\u2010sized enterprises (SMEs) toward the ethical use of information technology (IT). This research in progress paper presents findings from an \u201cethics survey\u201d conducted in the USA. The initial data presented here suggest that even though IT has become an integral part of the US SMEs, there is a clear lack of awareness of basic ethical issues. The participants on this survey did not seem to understand the importance of their moral and ethical responsibilities in the use of IT. In a follow\u2010up of this study, we hope to extend and use the initial findings to conduct focused in\u2010depth interviews with some of the survey participants. In a subsequent stage we wish to conduct a similar research for large enterprises, so as to compare and contrast the extent of IT related ethical practices in businesses.<\/jats:p>","DOI":"10.1108\/09685220010353907","type":"journal-article","created":{"date-parts":[[2002,7,28]],"date-time":"2002-07-28T18:52:34Z","timestamp":1027882354000},"page":"239-243","source":"Crossref","is-referenced-by-count":9,"title":["Ethics and information technology use: a survey of US based SMEs"],"prefix":"10.1108","volume":"8","author":[{"given":"Sanjeev","family":"Phukan","sequence":"first","affiliation":[]},{"given":"Gurpreet","family":"Dhillon","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021420370929500_B1","doi-asserted-by":"crossref","unstructured":"Athey, S. (1990), \u201cA comparison of the Fortune 500 and AACSB\u2010accredited universities\u201d, Software Copying Policies, CIS Educator Forum, Vol. 2 No. 4, pp. 2\u201011.","DOI":"10.4018\/joeuc.1990040103"},{"key":"key2022021420370929500_B2","unstructured":"Cohen, E. and Cornwell, L. (1989), \u201cCollege students believe piracy is acceptable\u201d, CIS Educator Forum, March, pp. 2\u20105."},{"key":"key2022021420370929500_B3","unstructured":"Daly, J. (1991), \u201cSPA fights ignorance of software piracy laws\u201d, Computerworld,  25 March, p. 4"},{"key":"key2022021420370929500_B4","unstructured":"Davis, D.L. and Vitell, S.J. (1992), \u201cThe ethical problems, conflicts and beliefs of small business information personnel\u201d, The Journal of Computer Information Systems, Vol. 22 No. 4, pp. 53\u20107."},{"key":"key2022021420370929500_B5","doi-asserted-by":"crossref","unstructured":"Im, J.H. and van Epps, P.D. (1991), \u201cSoftware piracy and software security in business schools: an ethical perspective\u201d, Data Base, Summer, pp. 15\u201021.","DOI":"10.1145\/126743.126747"},{"key":"key2022021420370929500_B6","unstructured":"Reid, R.A., Thompson, J.K. and Logsdon, J.L. (1992), \u201cKnowledge and attitudes of management students toward software piracy\u201d, Journal of Computer Information Systems, Vol. 23 No. 1, pp. 46\u201051."},{"key":"key2022021420370929500_B7","unstructured":"Weise, E. (1992), \u201cCombating \u2018softlifters\u201d\u2019, Minneapolis Star\u2010Tribune, 18 November."},{"key":"key2022021420370929500_B8","unstructured":"Wickham, M., Plotnicki, J. and Athey, S. (1992), \u201cA survey of faculty attitudes towards personal computer software copying\u201d, The Journal of Computer Information Systems, Vol. 22 No. 4, pp. 47\u201052."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220010353907","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220010353907\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220010353907\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:32Z","timestamp":1753402112000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/8\/5\/239-243\/177094"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,12,1]]},"references-count":8,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2000,12,1]]}},"alternative-id":["10.1108\/09685220010353907"],"URL":"https:\/\/doi.org\/10.1108\/09685220010353907","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2000,12,1]]}}}