Dety Nurfadilah


This research seeks to understand the employee's perception as well as to investigate personal characteristics which can influence the employee's attitude towards computer use ethics at the workplace. The personal characteristics that are being discussed here are gender, job satisfaction, religious belief and position in the organization. The research design involved the collection of in-depth and semi-structured interviews from six people in the private sector and four people in the public sector. From the total of 10 respondents, there were five males and five females. The result found that computer use ethics is important in the organization modern and must be addressed by employers tactfully. Respondents also agreed that position in organization and religious belief have the biggest impact in guiding and influence employees towards ethical computer usage at work.


Etika bisnis; etika penggunaan komputer; kepercayaan agama; cyber slacking; Indonesia

Full Text:



Akbulut, Y., Uysal, O., Odabasi, H.F. and Kuzu, A. (2008). Influence of gender, program of study and PC experience on unethical computer using behaviors of Turkish undergraduate. Computers & Education , 51 (2), 1-8.

Aliyu, Mansur; Abdallah, Nahel A.O; Lasisi, Nojeem A; Diyar, Dahir; Zeki, Ahmed M;. (2010). Computer Security and Ethics awareness among IIUM Students: An Empirical Study. Journal of Information Technology , 1 (4), 265-269.

Baneerje, D., Jones, T.W. and Cronan, T.P. (1996). The association of demographic variables and ethical behavior of information system personnel. Industrial Management & Data Systems, 96 (3), 3-10.

Bommer, M., Gratto, C., Gravande, J. and Tuttle, M. (1987). A behavior model of ethical and. Journal of Business Ethic , 6 (4), 265-80.

Cappel, J.J. and Windsor, J.C. (1998). A comparative investigation of ethical decision making information systems professionals versus students. The Database for Advances in Information Systems , 29 (2), 20-34.

Chow, W.S. and Choi, K.Y. (2003). Identifying managers who need ethics training in using IT at work. Behavior & Information Technology, 22 (2), 117-25.

Clark, J.W. and Dawson, L.E. (1996). Personal religiousness and ethical judgements: an empirical analysis. Journal of Business Ethics, 15 (3), 1359-72.

Conger, S. and Loch, K.D. (1995). Ethics and computer use. Communications of the ACM, 38 (12), 30-2.

Dawson, L.M. (1997). Ethical differences between men and women in the sales profession. Journal of Business Ethics, 16 (11), 1143-52.

Dorantes, C.A., Hewitt, B. and Goles, T. (2006). Ethical decision-making in an IT context: the roles of personal moral philosophies and moral intensity. Proceedings of the 39th Hawaii International Conference on Systems Sciences, 1-10.

Ecommerce (n.d). Computer ethics- computer ethics in the workplace, privacy, computer ethics as education. Retrieved 20 November 2013, from

Floridi, L and Sanders, J.W. (2002). Mapping the foundationalist debate in computer ethics. Ethics and Information Technology, 4 (1), 1-9.

Ford, R.C. and Richardson, W.D. (1994). Ethical decision making: a review of the empirical. Journal of Business Ethics, 13 (3), pp. 205-21.

Gibson. (1993). Organisasi: Perilaku, Struktur, Proses. Terjemahan Nunuk Andriani. Jakarta: Binarupa Aksara.

Greenfield, D. N., & Davis, R. A. (2002). Lost in cyberspace: The web @ work. CyberPsychology and Behavior, 5, 347–353.

Greengard, S. (2002). The high cost of cyberslacking. Workforce, 12, 22–24

Griffiths, M. (2003). Internet abuse in the workplace: Issues and concerns for employers and employment counselors. Journal of Employment Counseling, 40, 87–96.

Haines, R. and Leonard, L.N.K. (2007). Individual characteristics and ethical decision-making in an IT context. Industrial Management & Data Systems, 107 (1), 5-20.

Karen A. Forcht, Robert G. Brookshire, Scott P. Stevens, Rodney Clarke, (1993) "Computer Ethics of University Students: An International Exploratory Study", Information Management & Computer Security, 1 (5).

Karim, N.S.A., Zamzuri, N.H.A. and Mohamad, Y.N. (2009). Exploring the Relationship between Exploring the Relationship between. Computers & Education, 53 (1), 86-93.

Kim, K. (2003). A study of the conduct of Korean IT participants in ethical decision-making. Lecture Notes in Computer Science, 64-74.

Kreie, J. and Cronan, T.P. (1998). How men and women view ethics. Communications of the ACM, 41 (9), 70-6.

Langford, D. (1995). Practical Computer Ethics, London: McGraw Hill. Leonard, L. a. (2005). Attitude toward ethical behavior in computer use: a shifting model. Industrial Management & Data Systems, 105 (9), 1150-71.

Leonard, L. C. (2004). What influences IT ethical behavior intentions– planned behavior, reasoned action, perceived importance, individual characteristics?. Information and Management, 42 (1), 143-58.

Loch, K.D. and Conger, S. (1996). Evaluating ethical decision making and computer use. Communications of the ACM, 39 (7), 74-83.

Loe, T.W., Ferrell, L. & Mansfield, P. Journal of Business Ethics (2000) 25:185.doi:10.1023/A:1006083612239

Paradice, D.B. (1990), “Ethical attitudes of entry-level MIS personnel”, Information & Management, 18 (3), pp. 143-51.

Pierce, M.A. and Henry, J.W. (2000), “Judgements about computer ethics: do individual, coworker and company judgements differ? Do company codes make a difference?”, Journal of Business Ethics, 28 (4), pp. 307-22.

McCarthy, R.V., Halawi, L. and Aronson, J.E. (2005). Information technology ethics: a research framework. Issues in Information Systems , VI (2), 64-8.

McCabe, A.C., Ingram, R. & Dato-on, M.C.J Business Ethics (2006) 64: 101. doi:10.1007/s10551-005-3327-x

Mills, J. E., Hu, B., Beldona, S., & Clay, J. (2001). Cyberslacking! A liability issue for wired workplaces. Cornell Hotel and Restaurant Administration Quarterly, 42, 34–47.

Minet, D., Ruhi, H.Y. & Denizci, B. (2009). Leadership styles and ethical decision-making in hospitality management. International Journal of Hospitality Management, 28(4), 486-493.

Mohamed, N., Abdul Karim, N. S., & Hussein, R. (2012). computer use ethics among university students and staffs. The influence of gender, religious work value and organization level, 29 (5), 328-343.

Moores, T.T. and Chang, J. (2006). Ethical decision making in software piracy: initial development Ethical decision making in software piracy: initial development. MIS Quarterly, 30 (10), 167-80.

Moor, J.H. (1985), “What is computer ethics?”, Metaphilosophy, 16 (4), pp. 266-75.

O'Donnel, B. (2008). Inappropriate computer use: is your workplace protected? accountancy ireland , 56-8

Pearson, J.M., Crosby, L. and Shim, J.P. (1997). Measuring the importance of ethical behavior criteria. Communications of the ACM, 40 (9), 94-100.

Peterson, D. (2002). Computer ethics: the influence of guidelines and universal moral beliefs. Information Technology and People, 15 (4), 346-61.

Peterson, D.K. (2002). Computer ethics: the influence of guidelines and universal moral beliefs. Information Technology and People, 15 (4), 346-61.

Walgito. (1997). Pengantar Psikologi Umum. Yogyakarta: Andi Offset.

Wong, K. (1985). Computer crime-risk management and computer security. Computers and Security, 4 (4), 287-95.


Copyright (c) 2016 Dety Nurfadilah

Editorial Office
Jurnal Manajamen Bisnis Krisnadwipayana (JMBK)

Universitas Krisnadwipayana
Kampus Unkris Jatiwaringin Pondok Gede Jakarta Timur 17411
Phone: 0816 1353 180


Creative Commons Licence

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.