ETIKA PENGGUNAAN KOMPUTER DI TEMPAT KERJA (STUDI KASUS DI INDONESIA)
Abstract
Keywords
Full Text:
PDFReferences
Akbulut, Y., Uysal, O., Odabasi, H.F. and Kuzu, A. (2008). Influence of gender, program of study and PC experience on unethical computer using behaviors of Turkish undergraduate. Computers & Education , 51 (2), 1-8.
Aliyu, Mansur; Abdallah, Nahel A.O; Lasisi, Nojeem A; Diyar, Dahir; Zeki, Ahmed M;. (2010). Computer Security and Ethics awareness among IIUM Students: An Empirical Study. Journal of Information Technology , 1 (4), 265-269.
Baneerje, D., Jones, T.W. and Cronan, T.P. (1996). The association of demographic variables and ethical behavior of information system personnel. Industrial Management & Data Systems, 96 (3), 3-10.
Bommer, M., Gratto, C., Gravande, J. and Tuttle, M. (1987). A behavior model of ethical and. Journal of Business Ethic , 6 (4), 265-80.
Cappel, J.J. and Windsor, J.C. (1998). A comparative investigation of ethical decision making information systems professionals versus students. The Database for Advances in Information Systems , 29 (2), 20-34.
Chow, W.S. and Choi, K.Y. (2003). Identifying managers who need ethics training in using IT at work. Behavior & Information Technology, 22 (2), 117-25.
Clark, J.W. and Dawson, L.E. (1996). Personal religiousness and ethical judgements: an empirical analysis. Journal of Business Ethics, 15 (3), 1359-72.
Conger, S. and Loch, K.D. (1995). Ethics and computer use. Communications of the ACM, 38 (12), 30-2.
Dawson, L.M. (1997). Ethical differences between men and women in the sales profession. Journal of Business Ethics, 16 (11), 1143-52.
Dorantes, C.A., Hewitt, B. and Goles, T. (2006). Ethical decision-making in an IT context: the roles of personal moral philosophies and moral intensity. Proceedings of the 39th Hawaii International Conference on Systems Sciences, 1-10.
Ecommerce (n.d). Computer ethics- computer ethics in the workplace, privacy, computer ethics as education. Retrieved 20 November 2013, from http://ecommerce.hostip.info/pages/246/Computer-Ethics.html
Floridi, L and Sanders, J.W. (2002). Mapping the foundationalist debate in computer ethics. Ethics and Information Technology, 4 (1), 1-9.
Ford, R.C. and Richardson, W.D. (1994). Ethical decision making: a review of the empirical. Journal of Business Ethics, 13 (3), pp. 205-21.
Gibson. (1993). Organisasi: Perilaku, Struktur, Proses. Terjemahan Nunuk Andriani. Jakarta: Binarupa Aksara.
Greenfield, D. N., & Davis, R. A. (2002). Lost in cyberspace: The web @ work. CyberPsychology and Behavior, 5, 347–353.
Greengard, S. (2002). The high cost of cyberslacking. Workforce, 12, 22–24
Griffiths, M. (2003). Internet abuse in the workplace: Issues and concerns for employers and employment counselors. Journal of Employment Counseling, 40, 87–96.
Haines, R. and Leonard, L.N.K. (2007). Individual characteristics and ethical decision-making in an IT context. Industrial Management & Data Systems, 107 (1), 5-20.
Karen A. Forcht, Robert G. Brookshire, Scott P. Stevens, Rodney Clarke, (1993) "Computer Ethics of University Students: An International Exploratory Study", Information Management & Computer Security, 1 (5).
Karim, N.S.A., Zamzuri, N.H.A. and Mohamad, Y.N. (2009). Exploring the Relationship between Exploring the Relationship between. Computers & Education, 53 (1), 86-93.
Kim, K. (2003). A study of the conduct of Korean IT participants in ethical decision-making. Lecture Notes in Computer Science, 64-74.
Kreie, J. and Cronan, T.P. (1998). How men and women view ethics. Communications of the ACM, 41 (9), 70-6.
Langford, D. (1995). Practical Computer Ethics, London: McGraw Hill. Leonard, L. a. (2005). Attitude toward ethical behavior in computer use: a shifting model. Industrial Management & Data Systems, 105 (9), 1150-71.
Leonard, L. C. (2004). What influences IT ethical behavior intentions– planned behavior, reasoned action, perceived importance, individual characteristics?. Information and Management, 42 (1), 143-58.
Loch, K.D. and Conger, S. (1996). Evaluating ethical decision making and computer use. Communications of the ACM, 39 (7), 74-83.
Loe, T.W., Ferrell, L. & Mansfield, P. Journal of Business Ethics (2000) 25:185.doi:10.1023/A:1006083612239
Paradice, D.B. (1990), “Ethical attitudes of entry-level MIS personnel”, Information & Management, 18 (3), pp. 143-51.
Pierce, M.A. and Henry, J.W. (2000), “Judgements about computer ethics: do individual, coworker and company judgements differ? Do company codes make a difference?”, Journal of Business Ethics, 28 (4), pp. 307-22.
McCarthy, R.V., Halawi, L. and Aronson, J.E. (2005). Information technology ethics: a research framework. Issues in Information Systems , VI (2), 64-8.
McCabe, A.C., Ingram, R. & Dato-on, M.C.J Business Ethics (2006) 64: 101. doi:10.1007/s10551-005-3327-x
Mills, J. E., Hu, B., Beldona, S., & Clay, J. (2001). Cyberslacking! A liability issue for wired workplaces. Cornell Hotel and Restaurant Administration Quarterly, 42, 34–47.
Minet, D., Ruhi, H.Y. & Denizci, B. (2009). Leadership styles and ethical decision-making in hospitality management. International Journal of Hospitality Management, 28(4), 486-493.
Mohamed, N., Abdul Karim, N. S., & Hussein, R. (2012). computer use ethics among university students and staffs. The influence of gender, religious work value and organization level, 29 (5), 328-343.
Moores, T.T. and Chang, J. (2006). Ethical decision making in software piracy: initial development Ethical decision making in software piracy: initial development. MIS Quarterly, 30 (10), 167-80.
Moor, J.H. (1985), “What is computer ethics?”, Metaphilosophy, 16 (4), pp. 266-75.
O'Donnel, B. (2008). Inappropriate computer use: is your workplace protected? accountancy ireland , 56-8
Pearson, J.M., Crosby, L. and Shim, J.P. (1997). Measuring the importance of ethical behavior criteria. Communications of the ACM, 40 (9), 94-100.
Peterson, D. (2002). Computer ethics: the influence of guidelines and universal moral beliefs. Information Technology and People, 15 (4), 346-61.
Peterson, D.K. (2002). Computer ethics: the influence of guidelines and universal moral beliefs. Information Technology and People, 15 (4), 346-61.
Walgito. (1997). Pengantar Psikologi Umum. Yogyakarta: Andi Offset.
Wong, K. (1985). Computer crime-risk management and computer security. Computers and Security, 4 (4), 287-95.
DOI: http://dx.doi.org/10.35137/jmbk.v4i3.66
Copyright (c) 2016 Dety Nurfadilah
Editorial Office
Jurnal Manajamen Bisnis Krisnadwipayana (JMBK)
Universitas Krisnadwipayana
Kampus Unkris Jatiwaringin Pondok Gede Jakarta Timur 17411
Phone: 0816 1353 180
Email: jmbk.fe@gmail.com
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.