{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:51:11Z","timestamp":1765356671151,"version":"3.40.5"},"reference-count":63,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"abstract":"<jats:p>People face multiple decisions that have ethical dimensions and are often unable to resolve appropriately those ethical dilemmas in the use of the cyberspace. Individuals find it difficult to explain the rationale behind their moral judgments in their interactions and access to digital content. Identifying ethical and moral orientation that prompts acceptable or unacceptable ethical judgments is an important factor in cyber ethics. The goal of this study is to employ three prominent ethical theories to predict and explain cyber ethical judgements in terms of computer ethics, privacy, intellectual property rights, and academic integrity. The study develops conceptual and predictive models to test a set of hypotheses. The results show consequential ethics as the most significant predictor of computer ethics, cyber privacy, and academic integrity. Deontological ethics most significantly predict intellectual property rights but is not a significant predictor of academic integrity.<\/jats:p>","DOI":"10.4018\/ijcwt.2020040103","type":"journal-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:56:47Z","timestamp":1583510207000},"page":"46-63","source":"Crossref","is-referenced-by-count":6,"title":["Predicting and Explaining Cyber Ethics with Ethical Theories"],"prefix":"10.4018","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7756-1832","authenticated-orcid":true,"given":"Winfred","family":"Yaokumah","sequence":"first","affiliation":[{"name":"University of Ghana, Accra, Ghana"}]}],"member":"2432","reference":[{"key":"IJCWT.2020040103-0","doi-asserted-by":"publisher","DOI":"10.4018\/IJT.2016010105"},{"key":"IJCWT.2020040103-1","unstructured":"Alexander, L., & Moore, M. (2015). Deontological ethics. In E. N. Zalta (Ed.), The Stanford encyclopedia of philosophy (Spring 2015 ed.). Stanford University Press. Retrieved from http:\/\/plato.stanford.edu\/archives\/spr2015\/entries\/ethics-deontological\/"},{"key":"IJCWT.2020040103-2","doi-asserted-by":"publisher","DOI":"10.1080\/13669877.2017.1351467"},{"key":"IJCWT.2020040103-3","unstructured":"Association for Computing Machinery. (2018). ACM code of ethics and professional conduct. Retrieved from https:\/\/www.acm.org\/code-of-ethics"},{"key":"IJCWT.2020040103-4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316156766.010"},{"key":"IJCWT.2020040103-5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804151.015"},{"journal-title":"An introduction of the principles of morals and legislation","year":"1970","author":"J.Bentham","key":"IJCWT.2020040103-6"},{"key":"IJCWT.2020040103-7","first-page":"25","article-title":"Achieving the goal of a global computing code of ethics through an international-localisation hybrid, Ethical Space.","volume":"10","author":"O. K.Burmeister","year":"2013","journal-title":"The International Journal of Communication Ethics"},{"key":"IJCWT.2020040103-8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815102.010"},{"key":"IJCWT.2020040103-9","doi-asserted-by":"publisher","DOI":"10.4018\/jte.2012010103"},{"key":"IJCWT.2020040103-10","unstructured":"Christakis, E., & Christakis, N. A. (2012). Harvard Cheating Scandal: Is Academic Dishonesty on the Rise? Retrieved from http:\/\/ideas.time.com\/2012\/09\/04\/harvard-cheating-scandal"},{"key":"IJCWT.2020040103-11","doi-asserted-by":"publisher","DOI":"10.4018\/IJT.2019010102"},{"key":"IJCWT.2020040103-12","unstructured":"Computer Ethics Institute. (1992). Ten commandments of computer ethics. Retrieved from http:\/\/computerethicsinstitute.org\/publications\/tencommandments.html"},{"key":"IJCWT.2020040103-13","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-013-9484-z"},{"key":"IJCWT.2020040103-14","unstructured":"Copyright Act. (2005). Copyright Act 2005. Retrieved from https:\/\/www.aripo.org\/wp-content\/uploads\/2018\/12\/Ghana-Copyright-Act.pdf"},{"issue":"3","key":"IJCWT.2020040103-15","first-page":"366","article-title":"Do ethics classes teach ethics?","volume":"12","author":"H. J.Curzer","year":"2014","journal-title":"School Field"},{"key":"IJCWT.2020040103-16","unstructured":"Cybersecurity Ventures (2019). Cybercrime Damages $6 Trillion By 2021. Retrieved from https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/"},{"key":"IJCWT.2020040103-17","unstructured":"Data Protection Commission. (2012). The Data Protection Act, 2012 (Act 843). Retrieved from https:\/\/www.dataprotection.org.gh\/index.php\/data-protection\/data-protection-acts-2012"},{"key":"IJCWT.2020040103-18","doi-asserted-by":"publisher","DOI":"10.18311\/gjeis\/2017\/16191"},{"key":"IJCWT.2020040103-19","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780190221072.003.0004"},{"key":"IJCWT.2020040103-20","unstructured":"Driver, J. (2014). The history of utilitarianism. In E. N. Zalta (Ed.), The Stanford encyclopedia of philosophy (Winter 2014 ed.). Stanford University Press. Retrieved from http:\/\/plato.stanford.edu\/archives\/win2014\/entries\/utilitarianism-history\/"},{"key":"IJCWT.2020040103-21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804168.010"},{"journal-title":"The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy","year":"2011","author":"P.Engebretson","key":"IJCWT.2020040103-22"},{"key":"IJCWT.2020040103-23","unstructured":"Ethics guide. Introduction to ethics. (2014). BBC. Retrieved from http:\/\/www.bbc.co.uk\/ethics\/introduction\/"},{"journal-title":"National Cyberethics, Cybersafety, Cybersecurity Baseline Study. Educational Technology Policy Research and Outreach (ETPRO), National Cyber Security Alliance","year":"2008","author":"D.Pruitt-Mentle","key":"IJCWT.2020040103-24"},{"key":"IJCWT.2020040103-25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316151075.013"},{"key":"IJCWT.2020040103-26","doi-asserted-by":"publisher","DOI":"10.4018\/jte.2012010102"},{"issue":"3","key":"IJCWT.2020040103-27","first-page":"1","article-title":"Privacy and security online: Best practices for cybersecurity.","volume":"54","author":"N.Hennig","year":"2018","journal-title":"Library Technology Reports"},{"key":"IJCWT.2020040103-28","doi-asserted-by":"publisher","DOI":"10.1007\/s00180-012-0317-1"},{"key":"IJCWT.2020040103-29","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"key":"IJCWT.2020040103-30","doi-asserted-by":"publisher","DOI":"10.4324\/9781315509938"},{"key":"IJCWT.2020040103-31","unstructured":"Indvik, L. (2013). 92% of e-book downloads in Russia are pirated. Mashable. Retrieved from https:\/\/mashable.com\/2013\/07\/09\/russia-ebook-piracy\/"},{"key":"IJCWT.2020040103-32","doi-asserted-by":"crossref","first-page":"8","DOI":"10.47657\/201516725","article-title":"Cyber-ethics and the perceptions of Internet users: A case study of university students of Islamabad.","volume":"16","author":"A.Jamal","year":"2015","journal-title":"Pakistan Journal of Information Management & Libraries"},{"journal-title":"Grounding for the metaphysics of morals","year":"1993","author":"I.Kant","key":"IJCWT.2020040103-33"},{"key":"IJCWT.2020040103-34","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804649"},{"key":"IJCWT.2020040103-35","doi-asserted-by":"publisher","DOI":"10.1080\/03071847.2016.1232880"},{"key":"IJCWT.2020040103-36","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-022-6.ch001"},{"key":"IJCWT.2020040103-37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107445666.015"},{"journal-title":"Utilitarianism, edited with an introduction by Roger Crisp","year":"1998","author":"J. S.Mill","key":"IJCWT.2020040103-38"},{"key":"IJCWT.2020040103-39","unstructured":"Mill, S. J. (1961). Utilitarianism. Doubleday."},{"key":"IJCWT.2020040103-40","doi-asserted-by":"publisher","DOI":"10.1177\/0969733013505308"},{"issue":"1","key":"IJCWT.2020040103-41","first-page":"441","article-title":"Neutralizations and Rationalizations of Digital Piracy: A Qualitative Analysis of University Students.","volume":"3","author":"R.Moore","year":"2009","journal-title":"International Journal of Cyber Criminology"},{"key":"IJCWT.2020040103-42","doi-asserted-by":"publisher","DOI":"10.1353\/cbq.2018.0000"},{"key":"IJCWT.2020040103-43","doi-asserted-by":"crossref","unstructured":"Novotney, A. (2011). Beat the cheat: Psychologists are providing insight into why students cheat and what faculty, schools and even students can do about it. American Psychological Association, 42(6), 54.","DOI":"10.1037\/e569102011-021"},{"journal-title":"Psychometric theory","year":"1978","author":"J. C.Nunnally","key":"IJCWT.2020040103-44"},{"key":"IJCWT.2020040103-45","unstructured":"Omosalewa, A., Aasheim, C. L., & Rutner, P. (2013). Development and Testing of a Survey Instrument to Assess Ethical Perceptions of IT and IS Students. Information Technology Faculty Publications, 9. Retrieved from https:\/\/digitalcommons.georgiasouthern.edu\/information-tech-facpubs\/9"},{"issue":"15","key":"IJCWT.2020040103-46","first-page":"132","article-title":"Relationship between customer personality, service features and customer loyalty in the banking sector: A survey of banks in Homabay County, Kenya.","volume":"4","author":"A. A.Onditi","year":"2013","journal-title":"International Journal of Business and Social Science"},{"key":"IJCWT.2020040103-47","doi-asserted-by":"publisher","DOI":"10.1108\/LHT-04-2015-0033"},{"key":"IJCWT.2020040103-48","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107589834.002"},{"key":"IJCWT.2020040103-49","unstructured":"Perez-Pena, R. (2012, August 31). Harvard Students in Cheating Scandal Say Collaboration Was Accepted. The New York Times."},{"key":"IJCWT.2020040103-50","unstructured":"Reeves, G. (2010). Off-duty discussion groups can be off-limits to employers. 4Hoteliers. Retrieved from http:\/\/www.4hoteliers.com\/4hots_fshw.php?mwi=4880"},{"key":"IJCWT.2020040103-51","doi-asserted-by":"crossref","unstructured":"Schultz, R. A. (2010). IT-Enabled Global Ethical Problems. In R. Schultz (Ed.), Information Technology and the Ethics of Globalization: Transnational Issues and Implications. Hershey, PA: IGI Global.","DOI":"10.4018\/978-1-60566-922-9.ch001"},{"key":"IJCWT.2020040103-52","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316676042.002"},{"key":"IJCWT.2020040103-53","unstructured":"Sinnott-Armstrong, W. (2014). Consequentialism. In E. N. Zalta (Ed.), The Stanford encyclopedia of philosophy (Spring 2014 ed.). Stanford University Press. Retrieved from http:\/\/plato.stanford.edu\/archives\/spr2014\/entries\/consequentialism\/"},{"journal-title":"Readings in Cyberethics","year":"2004","author":"R. A.Spinello","key":"IJCWT.2020040103-54"},{"key":"IJCWT.2020040103-55","doi-asserted-by":"publisher","DOI":"10.4018\/ijcee.2011010101"},{"issue":"2","key":"IJCWT.2020040103-56","first-page":"57","article-title":"A study on the academic dishonesty, anomia and unethical behaviour among business graduates.","volume":"8","author":"M. M.Sulphey","year":"2013","journal-title":"Journal of Contemporary Management Research"},{"issue":"1","key":"IJCWT.2020040103-57","first-page":"102","article-title":"Students\u2019 perception of academic integrity in online business education courses.","volume":"4","author":"L. B.Swartz","year":"2013","journal-title":"Journal of Business and Educational Leadership"},{"key":"IJCWT.2020040103-58","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139047234.008"},{"key":"IJCWT.2020040103-59","doi-asserted-by":"publisher","DOI":"10.1108\/08876041211266404"},{"key":"IJCWT.2020040103-60","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2016.1165716"},{"key":"IJCWT.2020040103-61","first-page":"58","article-title":"The Practice of Downloading copyrighted files among adolescents in Poland: Correlations between piracy and other risky and protective behaviours online and offline.","author":"L.Tomczyk","year":"2019","journal-title":"Technology in Society"},{"key":"IJCWT.2020040103-62","unstructured":"Verrier, R. (2013). Online piracy of entertainment content keeps soaring. LA Times. Retrieved from https:\/\/www.latimes.com\/entertainment\/envelope\/cotown\/la-fi-ct-piracy-bandwith-20130917-story.html"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=250905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T00:11:28Z","timestamp":1651795888000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCWT.2020040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":63,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2020040103","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"type":"print","value":"1947-3435"},{"type":"electronic","value":"1947-3443"}],"subject":[],"published":{"date-parts":[[2020,4]]}}}