Predicting and Explaining Cyber Ethics with Ethical Theories

被引:3
|
作者
Yaokumah, Winfred [1 ]
机构
[1] Univ Ghana, Dept Comp Sci, Accra, Ghana
关键词
Academic Integrity; Consequentialism; Cyber Ethics; Cyber Security; Deontology; Ethical Theory; Intellectual Property; Piracy; Plagiarism; Privacy; Virtue Ethics; DIGITAL PIRACY;
D O I
10.4018/IJCWT.2020040103
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
People face multiple decisions that have ethical dimensions and are often unable to resolve appropriately those ethical dilemmas in the use of the cyberspace. Individuals find it difficult to explain the rationale behind their moral judgments in their interactions and access to digital content. Identifying ethical and moral orientation that prompts acceptable or unacceptable ethical judgments is an important factor in cyber ethics. The goal of this study is to employ three prominent ethical theories to predict and explain cyber ethical judgements in terms of computer ethics, privacy, intellectual property rights, and academic integrity. The study develops conceptual and predictive models to test a set of hypotheses. The results show consequential ethics as the most significant predictor of computer ethics, cyber privacy, and academic integrity. Deontological ethics most significantly predict intellectual property rights but is not a significant predictor of academic integrity.
引用
收藏
页码:46 / 63
页数:18
相关论文
共 50 条
  • [31] Predicting Proficiency in Cyber Defense Team Exercises
    Henshel, Diane S.
    Deckard, Gary M.
    Lufkin, Brad
    Buchler, Norbou
    Hoffman, Blaine
    Rajivan, Prashanth
    Collman, Steve
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 776 - 781
  • [32] THE POTENTIAL OF VIRTUE ETHICS IN ETHICAL EDUCATION IN SLOVAKIA
    Badurova, Barbora
    METODICKI OGLEDI-METHODICAL REVIEW, 2018, 25 (02): : 67 - 84
  • [33] Predicting Cyber Vulnerability Exploits with Machine Learning
    Edkrantz, Michel
    Said, Alan
    THIRTEENTH SCANDINAVIAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (SCAI 2015), 2015, 278 : 48 - 57
  • [34] Trophy hunting and conservation: Do the major ethical theories converge in opposition to trophy hunting?
    Ghasemi, Benjamin
    PEOPLE AND NATURE, 2021, 3 (01) : 77 - 87
  • [35] Moral Sources and Emergent Ethical Theories in Social Work
    Gray, Mel
    BRITISH JOURNAL OF SOCIAL WORK, 2010, 40 (06) : 1794 - 1811
  • [36] When ethics matters - Interpreting the ethical discourse of small nature-based entrepreneurs
    Lahdesmaki, M
    JOURNAL OF BUSINESS ETHICS, 2005, 61 (01) : 55 - 68
  • [37] When Ethics Matters – Interpreting the Ethical Discourse of Small Nature-Based Entrepreneurs
    M. Lahdesmaki
    Journal of Business Ethics, 2005, 61 : 55 - 68
  • [38] Is ethics evaporating in the cyber era? Part 2: Feeling framed
    Ronchi, Alfredo M.
    INTERNATIONAL REVIEW OF INFORMATION ETHICS, 2022, 32 : 9 - 9
  • [39] Ethics behind Cyber Warfare: A study of Arab Citizens Awareness
    Al Barghuthi, Nedaa Baker
    Said, Huwida
    2014 IEEE INTERNATIONAL SYMPOSIUM ON ETHICS IN SCIENCE, TECHNOLOGY AND ENGINEERING, 2014,
  • [40] Entrapment behind the firewall: the ethics of internal cyber-stings
    Luck, Morgan
    AUSTRALASIAN JOURNAL OF INFORMATION SYSTEMS, 2019, 23