Ethical IT Behaviour as a Function of Environment

By Jewels, Tony; Evans, Nina | Issues in Informing Science & Information Technology, Annual 2005 | Go to article overview

Ethical IT Behaviour as a Function of Environment


Jewels, Tony, Evans, Nina, Issues in Informing Science & Information Technology


Background

At the 2003 Informing Science conference in Pori, Finland, a South African and an Australian researcher first met and started a conversation about a topic that they are mutually interested in, namely ethical behaviour in the world of Information and Communication Technology (ICT). During the exchange of information about their respective countries and cultures, the topic of the security and crime situation in South Africa took centre stage. When told that South African airport officials search passengers returning from other countries for illegal copies of music CD's and brand name goods as they enter the country, the Australian researcher exclaimed: "It is ironic that, in a country where people are murdered, hijacked, raped and viciously attacked by the hour, there is still room to worry about ethical issues such as the illegal copying of music CD's!"

A philosophical question was posed as to what extent ethical IT behaviour might be a function of environment and to what extent the country of origin and residence might influence ethically bound decisions. This question was then specifically related to ethical decisions made by IT students at the universities represented by the two researchers. At that moment a collaborative research project was conceptualised, and now after a visit to Australia and South Africa respectively, this idea will be put into practice with an investigation in both the South African and Australian context.

Introduction

South Africa and Australia are in many ways quite similar; they both have multi-cultural populations, are both in the southern hemisphere, both were ruled by Britain for many years, the weather, seasons, plants and flowers are very similar and people from both countries love sport, the outdoors and good food and wine.

Yet, in many other respects, the two countries are worlds apart and this is especially true with their respective safety and security situations. Australia, it must be remembered, was colonised predominantly by British convicts sent to the 'Australian penal colony' in order to overcome the problem of Britain's overcrowded jails, with scant regard given to its existing indigenous population. But whilst still having its own share of crime and violence, these levels pale into relative insignificance when compared to the current levels of crime and violence in South Africa. South Africa has become a country where security companies and security villages in which people are fenced in to keep criminals out, flourish. Vehicle hijacking is common with victims regarding themselves as 'lucky' if they escape from the ordeal alive, but nevertheless remaining highly traumatised. As far as ethics and morality are concerned, South Africa is a 'rudderless ship' where action plans are urgently necessary to prevent further degeneration (Hilliard & Ferreira 2000). In this environment in which Hilliard and Ferreira (2000) suggest that some people seem to find difficulty distinguishing between ethical and unethical behaviour (moral ambiguity), corruption has become a problem and they believe that the high crime rate is testament to a lack of morality in the country.

One of the main problems in the area of computer ethics is that the general public has not realised the value of ethics and IT security, even though they concern everyone involved in computing (Siponen & Kajava 1997). In order to reap the benefits of global IT processes such as ecommerce, not only must there be an agreed level of legal certainty and uniformity, as any legal framework can only complement the trust relationship that is at the heart of all commercial transactions (Farhoomand & Lovelock 2001).

"A code of ethics is necessary to good business in that it allows business transactions to take place in an atmosphere of mutual trust". (Stearns, 1981, p26).

In his work discussing the relationships between international meta-teams Fernandez (2003) suggests that ultimately it is not important what levels of trust exist between various organisations, but that it is important to balance trust against the controls that must be imposed within those relationships. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Ethical IT Behaviour as a Function of Environment
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Author Advanced search

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.