Abstract
Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of computer software, and we then asked how these results compared with the theoretical reasons offered by computer ethics scholars. The results shed a new light on students' moral attitudes with respect to the unauthorized copying of software. In particular, this new knowledge is useful for computer ethics teachers, and for organizations seeking to combat this practice.
- Ajzen, I., 1991. The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179--211.Google ScholarCross Ref
- Anderson, R. E., Johnson, D. G., Gotterbarn, D., Perrole, J., 1993. Using the New ACM code of ethics in Decision Making. Communications of the ACM, 36 (2), 98--107. Google ScholarDigital Library
- Baase, S., 1997. A Gift of Fire. Upper Saddle River, New Jersey: Prentice Hall.Google Scholar
- Bowyer, K. K., 2001. Ethics and Computing - Living Responsibility in a Computerized World. Los Alamitos, California: IEEE Computer Society Press. Google ScholarDigital Library
- Cheng Y., Png, I. P. L. 1999. Software pricing and copyright enforcement: private profit vis-à-vis social welfare. Proceeding of the 20th international conference on Information Systems, pp. 119--123. Google ScholarDigital Library
- Cheng, H. K., Sims, R. R., Teegen, H., 1997. To purchase or to pirate software: an empirical study. Journal of Management Information Systems, 13 (4), 49--51. Google ScholarDigital Library
- Collins, W. R., Miller, K. W., Spielman, B. J., Wherry, P., 1994. How Good Is Good Enough? Communications of ACM, 37 (1) 81--91. Google ScholarDigital Library
- Dancy, J., 1993. An ethic of prima facie duties in P. Singer, ed. A Companion to Ethics, Oxford: Basil Blackwell, 219--229.Google Scholar
- Fishbein, M., Ajzen, I., 1975. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading: Addison-Wesley.Google Scholar
- Forester, T., Morrison, P., 1993. Computer Ethics: Cautionary Tales and Ethical Dilemmas in computing, MIT Press. Google ScholarDigital Library
- Gattiker, U. E., Kelley, H., 1999. Morality and Computers: Attitudes and Differences in Moral Judgements. Information Systems Research, 10 (3) 233--254. Google ScholarDigital Library
- Gopal, R. D., Sanders, G. L., 1998. International Software Piracy: Analysis of Key Issues and Impacts. Information Systems Research, 9 (4) 380--395. Google ScholarDigital Library
- Gopal, R. D, Ram, D., Sanders, G. L., 1997. Preventive and Deterrent Controls for Software Piracy. Journal of Management Information Systems, 13 (4) 29--38. Google ScholarDigital Library
- Hare, R. M, 1981. Moral Thinking: its levels, methods and point. Oxford, UK: Clarendon Press.Google Scholar
- Hare, R. M., 1976. Value Education in a Pluralist Society: A Philosophical glance at the Humanities Curriculum Project. Proceedings of the Education Society of Great Britain.Google ScholarCross Ref
- Hare, R. M., 1975. Autonomy as an Educational Idea. In S. C. Brown, ed., Philosophers Discuss Education. London: Macmillan.Google Scholar
- Hare, R. M., 1963. Freedom and Reason, Oxford: Oxford University Press.Google Scholar
- Johnson, D. G., 2000. Computer Ethics. Upper Saddle River, New Jersey: Prentice Hall.Google Scholar
- Kallman, E., Grillo, J., 1993. Ethical Decision Making and Information Technology. New York: McGraw-Hill. Google ScholarDigital Library
- Kant, I., 1993. The Moral Law: Groundwork of the Metaphysic of Morals. London: Routledge.Google Scholar
- Kuflik, A., 1995. Moral Foundations of Intellectual Property Rights. In: D. G. Johnson, H. Nissenbaum, eds., Computers, Ethics & Social Values. New Jersey: Prentice Hall. 169--180.Google Scholar
- Lacity, M. C., Janson, M. A., 1994. Understanding Qualitatitve Data: A Framework of Text Analysis Methods. Journal of Management Information Systems, 11 (2) 137--155. Google ScholarDigital Library
- Ladd, J., 1997. Ethics and the Computer World: a New Challenge for Philosophers. Computers & Society, 27 (3) 8--13. Google ScholarDigital Library
- Langford, D., 1995. Practical Computer Ethics. Guildford, Surrey: McGraw-Hill. Google ScholarDigital Library
- Lending, D., Slaughter, S. A., 1999. Understanding differences in ethical beliefs and behaviors toward software copying: the effects of organization culture. Proceedings of the 1999 ACM SIGCPR conference on Computer personnel research. April 08--10, New Orleans, Louisiana. 253--260. Google ScholarDigital Library
- Limayem, M., Khalifa M., Wynne, W. C., 1999. Factors motivating software piracy: a longitudinal study. Proceeding of the 20th International Conference on Information Systems, Charlotte, North Carolina. 124--131. Google ScholarDigital Library
- Lisman, C. D., 1998. Ethics Education in Schools. Encyclopedia of Applied Ethics, Volume 2, San Diego: Academic Press.Google Scholar
- Lin, T. C, Hsu, M. H., Kuo, F. Y., Sun, P-C., 1999. An intention model-based study of software piracy. Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. January 5--8, Maui, Hawaii. Google ScholarDigital Library
- Loch, K. D, Conger, S., 1996. Evaluating Ethical Decision-Making and Computer Use. Communications of the ACM, 39 (7) 74--83. Google ScholarDigital Library
- Mackie, J. L., 1981. Ethics, Inventing Right and Wrong. London: Penguin.Google Scholar
- Macklin, R., 1980. Problems in the Teaching of Ethics: Pluralism and Indoctrination. D., Callahan, S., Bok, eds., Ethics Teaching in Higher Education. New York: Plenum Press. 81--101.Google Scholar
- Malhotra, Y, 1994. Controlling Copyright infringements of intellectual property: the case of computer software. Journal of Systems Management, July.Google Scholar
- Mason, R. O., 1986. Four ethical issues of the information age. MIS Quarterly, 10 (1) 5--12.Google ScholarDigital Library
- Moor, J. H., 1985. What is computer ethics? Metaphilosophy, 16, 266--275.Google ScholarCross Ref
- Moores, T., Dhillon, G., 2000. Software piracy: a view from Hong Kong. Communications of the ACM, 43 (12) 88--93. Google ScholarDigital Library
- Nissenbaum, H., 1995. Should I copy my neighbours' software. In D. G. Johnson, H. Nissenbaum, eds, Computers, Ethics & Social Values. New Jersey: Prentice Hall.Google Scholar
- Pence, G., 1993. Virtue Theory In P. Singer, ed., A Companion to Ethics. Oxford, UK: Basil Blackwell. 249--258.Google Scholar
- Pettit, P., 1993. Consequentialism. In P. Singer, ed., A Companion to Ethics, Oxford, UK: Basil Blackwell. 230--240.Google Scholar
- Piaget, J., 1977. The Moral Judgment of the Child. Harmonsdsworth: Penguin.Google Scholar
- Randall, D. M., 1989. Taking stock: can the theory of reasoned action explain unethical conduct? Journal of Business Ethics, 8, 873--882.Google ScholarCross Ref
- Rawls, J., 1971. A Theory of Justice. London: Oxford University Press.Google Scholar
- Rest, J. R., 1994. Background: Theory and Research. In J. R. Rest, D. Narvaez, eds., Moral Development in the Professions: Psychology and Applied Ethics, Lawrence Erlbaum Associates, UK. 1--26.Google Scholar
- Ross, D., 1930. The Right and the Good. Oxford: Oxford University Press.Google Scholar
- Seale, D. A., Polakowski, M., Schneider, S., 1998. It's not really theft!: personal and workplace ethics that enable software piracy. Behaviour and Information Technology, 17 (1) 27--40.Google ScholarCross Ref
- Simpson, P. M., Banerjee, D., Simpson, C. L., 1994. Softlifting: A model of motivating factors. Journal of Business Ethics, 13 (3) 431--438.Google ScholarCross Ref
- Siponen, M. T., 2001. The Relevance of Software Rights: An Anthology of the Divergence of Sociopolitical Doctrines. AI & Society, 15 (1&2), 128--148. Google ScholarDigital Library
- Stallman, R., 1995. Why software should be free. In: D. G. Johnson, H. Nissenbaum, eds., Computers, Ethics & Social Values. New Jersey: Prentice Hall.Google Scholar
- Stallman, R., 1997. The GNU Manifesto. In M. D. Ermann, M. B. Williams, M. S. Shauf, eds., Computers, Ethics and Society. Oxford: Oxford University Press. Google ScholarDigital Library
- Strikweda, R. B., Ross, J. M., 1992. Software and Ethical Softness. Collegiate Microcomputer 3, 143--156. Google ScholarDigital Library
- Sumner, M., Werner, K., 1997. On-line ethics: a comparison of the attitudes of freshmen, MIS majors, and practitioners. Proceedings of the 1997 Conference on Computer Personnel Research, San Francisco, California, April 3--5. 1--8. Google ScholarDigital Library
- Takeyama, L. N., 2002. Piracy, Asymmetric Information, and Product Quality revelation. http://www.serci.org/, 24th October 2002, Society of Economic Research on Copyright Issues.Google Scholar
- Thong, J. Y. L., Yap, C-S., 1998. Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15 (1) 213--237. Google ScholarDigital Library
- Traphagan, M., Griffith, A., 1998. Software Piracy and Global Competitiveness: Report on Global Software Piracy. International Review of Law, Computers & Technology, 12 (3) 431--451.Google ScholarCross Ref
- Warnock, M., 1975. The Neutral Teacher. In M. Taylor, ed., Progress & problems in moral education, Windsor: NFER Publishing Company.Google Scholar
- Weckert, J., 1997. Intellectual Property Rights and Computer Software. Journal of Business Ethics. 6 (2) 101--109.Google ScholarCross Ref
- Weckert, J., Adeney, D., 1997. Computer and Information Ethics. Westport, Connecticut: Greenwood Press. Google ScholarDigital Library
- Weisband, S. P., Goodman, S. E., 1992. International software piracy. IEEE Computer, 25 (11) 87--90.Google ScholarDigital Library
- Vitell, S. J., Davis, D. L., 1990. Ethical beliefs of MIS professionals: The frequency and opportunity for unethical behaviour. Journal of Business Ethics, 9 (1) 63--70.Google ScholarCross Ref
Index Terms
- Unauthorized copying of software: an empirical study of reasons for and against
Recommendations
Moral luck and computer ethics: Gauguin in cyberspace
I argue that the problem of `moral luck' is an unjustly neglected topic within Computer Ethics. This is unfortunate given that the very nature of computer technology, its `logical malleability', leads to ever greater levels of complexity, unreliability ...
Testing an ethical decision-making theory: the case of softlifting
There is a lack of both theoretical and empirical research on the process of ethical decision making in the domain of information systems (IS). As a step in this direction, we describe and test a general ethical decision-making theory developed in the ...
Computer Ethics and Neoplatonic Virtue: A Reconsideration of Cyberethics in the Light of Plotinus' Ethical Theory
In normative ethical theory, computer ethics belongs to the area of applied ethics dealing with practical and everyday moral problems arising from the use of computers and computer networks in the information society. Modern scholarship usually approves ...
Comments