• English
    • français
    • Deutsch
    • español
    • português (Brasil)
    • Bahasa Indonesia
    • русский
    • العربية
    • 中文
  • English 
    • English
    • français
    • Deutsch
    • español
    • português (Brasil)
    • Bahasa Indonesia
    • русский
    • العربية
    • 中文
  • Login
View Item 
  •   Home
  • Philosophy collections
  • Philosophical Ethics
  • View Item
  •   Home
  • Philosophy collections
  • Philosophical Ethics
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Browse

All of the LibraryCommunitiesPublication DateTitlesSubjectsAuthorsThis CollectionPublication DateTitlesSubjectsAuthorsProfilesView

My Account

Login

The Library

AboutNew SubmissionSubmission GuideSearch GuideRepository PolicyContact

Statistics

Most Popular ItemsStatistics by CountryMost Popular Authors

A Model of Unethical Usage of Information Technology

  • CSV
  • RefMan
  • EndNote
  • BibTex
  • RefWorks
Author(s)
Chatterjee, Sutirtha
Keywords
Unethical IT Usage
Ethical Philosophy
Net Gain
Deindividuation

Full record
Show full item record
URI
http://hdl.handle.net/20.500.12424/646642
Online Access
http://aisel.aisnet.org/amcis2005/51
http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1555&context=amcis2005
Abstract
The widespread adoption of the Computers and Information Technology in every field has opened up immense possibilities for using Information Technology in an unethical manner. Cases of hacking, software piracy etc. have become major concerns. However the IS literature is somewhat limited on this. Specifically, the factors leading to such behavior have not been generically studied in detail. The paper aims to fill this gap and tries to develop a model of unethical IT usage based on the underlying framework of the Theory of Reasoned Action (TRA). Drawing from research in IS, psychology, ethics and a little of Transaction Cost Economics, it adapts the TRA to the IS context and posits individual, social and technological factors as important in understanding unethical IT usage. This paper, currently research in progress, develops the model and includes propositions that can be developed into testable hypotheses for empirical work.
Date
2005-01-01
Type
text
Identifier
oai:aisel.aisnet.org:amcis2005-1555
http://aisel.aisnet.org/amcis2005/51
http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1555&context=amcis2005
Collections
Philosophical Ethics

entitlement

 
DSpace software (copyright © 2002 - 2023)  DuraSpace
Quick Guide | Contact Us
Open Repository is a service operated by 
Atmire NV
 

Export search results

The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.