Ethical aspects on software piracy and information and communication technologies misuse
International Stability, Volume # 1 | Part# 1
Suduc, Ana-Maria; Bizoi, Mihai; Filip, Florin Gheorghe
Digital Object Identifier (DOI)
computer ethics,software piracy,information systems misuse
The illegal copying of software (software piracy), illegal access and interception, misuse of devices, computer-related forgery, fraud, offences related to child pornography, offences related to infringements of copyright and related rights are all considered ethical issues on cyberspace. The paper presents some ethical aspects on information and communication technology usage. The results of a moral attitude investigation of 126 Romanian engineering students highlight the students' perception on and reasons for software piracy and intentionally information and communication technology misuse.
 Banerjee, D., Cronan, T. P., & Jones, T. W. (1998). Modeling IT Ethics: A Study in Situational Ethics. MIS Quarterly, 22 (1), pp. 31-60.  Bizoi, M., Gorghiu, G., Suduc, A.-M., & Alexandru, A. (2006, March). Computer Supported Cooperative Work -- An Example for Implementing a Web-based Platform Application. Studies in Informatics and Control, 15 (1), pp. 71-78.  BSA. (2008, May). Fifth Annual BSA and IDC Global Software Piracy Study. Retrieved June 23, 2009, from http://www.bsa.org/country/Research%20and%20Statistics/~/ media/BEE6DC1E056F4B9699B30E69E7E1DD68.ashx  Cheng, H. K., Sims, R. R., & Teegen, H. (1997). To Purchase or to Pirate Software: An Empirtical Study. Journal of Management Information Systems, 13 (4), pp. 49-60.  D'Arcy, J. (2005). Improving Information Systems Security through Procedural and Technical Countermeasures. Retrieved June 23, 2009, from Irwin L. Gross eBusiness Institute, Temple University: http://ibit.temple.edu/research/ResearchReports/ISSecuri tyMeasures.pdf  Garg, A., Curtis, J., & Halper, H. (2004). Quantifying the Financial Impact of IT Security Breaches. Information Management & Computer Security, 11 (2), pp. 74-83.  George, George, K., Kalajdzic, B., Bittman, M., McLaughlin, R., & Yingling, R. (2000). An Analysis of Software Piracy. Retrieved June 23, 2009, from http://www.georges.nu/computer/piracy.html  Gotterbarn, D., & Miller, K. W. (2009, June). The Public is the Priority: Making Decisions Using the Software Engineering Code of Ethics. Software Engineering Ethics, 42 (6), pp. 66-73.  Limayem, M., Khalifa, M., & Chin, W. W. (1999). Factors Motivating Software Piracy: A Longitudinal Study. Proceedings of the Twentieth International Conference on Information Systems, (pp. 124-131).  Lin, T.-C., Hsu, M. H., & Kuo, F.-Y. (1999). An Intention Model-based Study of Software Piracy. Proceedings of the 32nd Hawaii International Conference on System Sciences. Maui, Hawaii.  Lynch, M. (2000). Ethical Issues in Electronic Information Systems. Retrieved June 22, 2009, from University of Colorado at Boulder: http://www.colorado.edu/geography/gcraft/notes/ethics/ethics_f.html  Manrique de Lara, P. Z., & Tacoronte, D. V. (2007). Supervising Employee Misuse of Information Systems in the Workplace: An Organizational Behavior Study. Empresa global y mercados locales: XXI Congreso Anual AEDEM. 1, pp. 31-43. Madrid: Universidad Rey Juan Carlos.  Marcu, F. (2000). Marele dictionar de neologisme. Bucharest: Saeculum Publishing House (in Romanian).  Moores, T. T., & Chang, J. C.-J. (2006). Ethical Decision Making in Software Piracy: Initial Development and Test of a Four-Component Model. MIS Quarterly, 30 (1), pp. 167-180.  OECD. (2002). OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security. Retrieved June 22, 2009, from http://www.oecd.org/dataoecd/16/22/15582260.pdf  Oz, E. (1992, December). Ethical Standards for Information Systems Professionals: A Case for a Unified Code. MIS Quarterly, pp. 423-433.  Pascu, C., Filip, F. G. (Eds.). (2005). Visions on the future of information society in an enlarged Europe. Romanian Academy Publishing House.  Radding, A. (2008, October 28). New study pinpoints bad staff behaviors, not hackers as primary source of data leakage. Retrieved June 23, 2009, from CISCO: http://newsroom.cisco.com/dlls/2008/ts_102808.html  Ramayah, T., Ahmad, N. H., Chin, L. G., & Lo, M.-C. (2009). Testing a Causal Model of Internet Piracy Behavior Among University Students. European Journal of Scientific Research, 29 (2), pp. 206-214.  Ranjan, B., Ramakrishna, H. V., & Vijayaraman, B. S. (2003). An exploratory study of moral intensity regarding software piracy of students in Thailand. Behaviour & Information Technology, 22 (1).  Rashid, A., Weckert, J., & Lucas, R. (2009, June). Software Engineering Ethics in a Digital World. Software Engineering Ethics, 42 (6), pp. 34-41.  Siegfried, R. M., & Ashley, A. S. (2006). Is It Theft or Sampling? Student Attitudes on the Copying of Commercial Software and Music. Proceedings of the 23th Annual Information Systems Education Conference. Dallas, Texas.  Siponen, M. T., & Vartiainen, T. (2007, June). Unauthorized Copying of Software - An Empirical Study of Reasons For and Against. SIGCAS Computers and Society, 37 (1), pp. 30-43.  Srinivasan, S. (2003, July). On Piracy and Privacy. IEEE Computer, pp. 36-38.  Suduc, A. M. (2009, February). Arhitectura unei interfete avansate pentru un Sistem Suport pentru Decizii (Advanced Interface Architecture of a DSS). Retrieved from http://www.racai.ro/Referate/REFERAT_2_ SUDUC_ANA.pdf, (in Romanian).  Suduc, A.-M., & Filip, F. G. (2008). Riscuri ale utilizarii inadecvate a sistemelor informatice (Risks of Information Systems Misuse). Studii si cercetari economice, 72, (In Romanian).  Swinyard, W. R., Rinne, H., & Keng Kau, A. (1990). The morality of software piracy: A cross-cultural analysis. Journal of Business Ethics, 9 (8).  Triandis, C. H. (1980). Values, Attitudes and Interpersonal Behavior. Nebraska Symposium on Motivation, 1979 (pp. 159-295). Lincoln, NE: University of Nebraska Press.  Wolfe, S. E., & Higgins, G. E. (2009). Explaining Deviant Peer Associations: An Examination of Low Self-Control, Ethical Predispositions, Definitions, and Digital Piracy. Western Criminology Review, 10 (1), pp. 43-55.