skip to main content
research-article

Ethical awareness of computer use among undergraduate students

Published: 01 June 2009 Publication History

Abstract

This study investigates the ethical awareness of computer use among undergraduate computer science students at two public Malaysian universities. One hundred and fifty-nine students were asked to evaluate the code of ethics pertaining to computer ethics. A comparison of undergraduate computer science students between two public universities was done to determine the level of ethical awareness of computer use. Independent Samples t-tests for differences were performed across four distinct groups: university, gender, age, and duration of computer use. The results of the tests conducted indicate that the ethical awareness of computer use of the students differ most significantly on the basis of the university itself. There were minimal differences across gender, age and duration of computer use. This suggests that computer ethics awareness training is needed for university users. The results are discussed and the implications for studies in an educational context are outlined.

References

[1]
Al-A'ali, M. 2008. "Computer Ethics for the Computer Professional from an Islamic Point of View," Journal of Information, Communication&Ethics in Society, (6:1), pp 28--45.
[2]
Baase, S. 2003. A Gift of Fire: Social, Legal and Ethical Issues for Computers and the Internet (2nd Ed.). New Jersey: Prentice-Hall.
[3]
Barnard, A., de Ridder, C., and Pretorius, L. 2001. "Teaching Computer Ethics as Part of Computer Science and Information Systems Curricula." Retrieved 28 October, 2007, from http://www.cs.unisa.ac.za/
[4]
Barnard, A., de Ridder, C., Pretorius, L., and Cohen, E. 2003. "Integrating Computer Ethics into the Computing Curriculum: A Framework for Implementation." Retrieved 28 October, 2007, from http://proceedings.informingscience.org/IS2003Proceedings/docs/043Barna.pdf/
[5]
Ben-Jacob, M. G. 2005. "Integrating Computer Ethics across the Curriculum: A Case Study," Educational Technology&Society, (8:4), pp 198--204.
[6]
Breij, P. A. 2001. "The Role of Social and Ethical Studies of IT in the University Curriculum," In: 2nd Int. Workshop for Foundations of Information Ethics, FINE, Hiroshima, Japan. 10. Hiroshima Univ. Press.
[7]
Couger, J. D. 1989. "Preparing IS Students to Deal with Ethical Issues," Management Information Systems Quarterly (13), pp 211--217.
[8]
Dolado, J. 2000. "Is it Worthwhile to Teach Computer Ethics?" Retrieved 30 October, 2007, from http://www.ccsr.cse.dmu.ac.uk/
[9]
Gan, L. L., and Koh, H. C. 2006. "An Empirical Study of Software Piracy among Tertiary Institutions in Singapore," Journal of Business Ethics (43:5), pp 640--647.
[10]
Hay, D., McCourt, L. P., Oyelere, P. and Fisher, A. 2001, "The Ethical Perception of Undergraduate Students in Computer-Related Situations: An Analysis of the Effects of Culture, Gender, and Prior Education," Teaching Business Ethics (5:3), pp 331--356.
[11]
Johnson, D. G. 1985. Computer Ethics. Prentice-Hall (end 1994; 3rd edn 2001).
[12]
Johnson, D. G., and Snapper, J. W. 1985. Ethical Issues in the Use of Computers. California: Wadsworth Publishing Company.
[13]
Lockhorst, G. C. 1998. "The Digital Phoenix: How Computers are Changing Philosophy. Terrell Ward Bynum and James H. Moor, editor," Ethics and Information Technology (1:1), January, pp 67--71.
[14]
Lucas, R., and Weckert, J. 2008. "Ethics and the ICT Industry -- A Research Agenda," Proceedings of ETHICOMP 2008, pp 550--557.
[15]
Maner, W. 1980. Starter Kit in Computer Ethics. Helvetica Press (published in cooperation with the National Information and Resources Center for Teaching Philosophy). (Originally self-published by Maner in 1978.)
[16]
Martin, C. D., and Yale-Weltz, E. 1999. "From Awareness to Action: Integrating Ethics and Social Responsibility into the Computer Science Curriculum," Computers and Society (29), pp 2, 6--13.
[17]
McCarthy, R. V., Halavi, L., and Aronson, J. E. 2005. "Information Technology Ethics: A Research Framework," Issues in Information Systems (VI: 2), pp 64--69.
[18]
Moor, J. H. 1985. What is Computer Ethics. In Terrell Ward Bynum, ed., Computers&Ethics. Blackwell, pp 266--275.
[19]
Namlu, A. G., and H. F. Odabasi, H. F. 2007. "Unethical Computer Using Behavior Scale: A Study of Reliability and Validity on Turkish University Students," Computers&Education, pp 205--215.
[20]
North, M. M., George, R., and North, S. M. 2006. "Computer Security and Ethics Awareness in University Environments: A Challenge for Management of Information Systems," ACM SE'06, pp 434--439.
[21]
North, M. M., George, R., and North, S. M. 2007. "A Brief Study of Information Security and Ethics Awareness as an Imperative Components of Management Information Systems," ACM SE'07, pp 515--516.
[22]
Rosenberg, R. S. 1997. The Social Impact of Computers. San Diego: Academic Press.
[23]
Sackson, M. 1996. "Computer Ethics: Are Students Concerned?" Retrieved 3 September, 2008, from http://webpages.cs.luc.edu/~laufer/ethics96/papers/sackson.doc
[24]
Sims, R. R., Cheng, H. K., and Teegen, H. 1996. "Toward a Profile of Student Software Pirates," Journal of Business Ethics (15:8), pp 839--849.
[25]
Turner, E., and Roberts, P. 2001. "Teaching Computer Ethics to IT Students in Higher Education: An Exploration of Provision, Practice and Perspective." Retrieved 2 November, 2007, from http://www.ccsr.cse.dmu.ac.uk/

Cited By

View all
  • (2024)Psychometric Properties and Measurement Invariance of the Chinese Version of the Internet Moral Literacy ScaleAsian Journal of Social Health and Behavior10.4103/shb.shb_374_237:2(67-76)Online publication date: 28-May-2024
  • (2012)Towards a conceptual model of software piracyInternational Journal of Business Information Systems10.1504/IJBIS.2012.05017611:4(442-460)Online publication date: 1-Nov-2012
  • (2011)Privacy measures awareness, privacy setting use and information privacy concern with Social Networking Sites2011 International Conference on Research and Innovation in Information Systems10.1109/ICRIIS.2011.6125736(1-6)Online publication date: Nov-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCAS Computers and Society
ACM SIGCAS Computers and Society  Volume 39, Issue 1
June 2009
30 pages
ISSN:0095-2737
DOI:10.1145/1565795
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2009
Published in SIGCAS Volume 39, Issue 1

Check for updates

Author Tags

  1. Malaysia
  2. awareness
  3. computer
  4. ethics
  5. higher education

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Psychometric Properties and Measurement Invariance of the Chinese Version of the Internet Moral Literacy ScaleAsian Journal of Social Health and Behavior10.4103/shb.shb_374_237:2(67-76)Online publication date: 28-May-2024
  • (2012)Towards a conceptual model of software piracyInternational Journal of Business Information Systems10.1504/IJBIS.2012.05017611:4(442-460)Online publication date: 1-Nov-2012
  • (2011)Privacy measures awareness, privacy setting use and information privacy concern with Social Networking Sites2011 International Conference on Research and Innovation in Information Systems10.1109/ICRIIS.2011.6125736(1-6)Online publication date: Nov-2011
  • (2010)The Demographic Factors Affecting University Students’ Intention to Pirate SoftwareWhat Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience10.1007/978-3-642-15479-9_3(22-32)Online publication date: 2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media