:::

詳目顯示

回上一頁
題名:資訊倫理守則現況--以社會層級及倫理議題分析
書刊名:中山管理評論
作者:許孟祥 引用關係林東清 引用關係
作者(外文):Hsu, Meng-hsiangLin, Tung-ching
出版日期:1997
卷期:5:2
頁次:頁383-412
主題關鍵詞:資訊管理資訊倫理倫理守則倫理議題Ethical codeInformation systemEthical issues
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(7) 博士論文(3) 專書(0) 專書論文(1)
  • 排除自我引用排除自我引用:6
  • 共同引用共同引用:0
  • 點閱點閱:181
     本文探討的主題包括當前資訊人員對專業倫理的信念,將世界五大資訊專業組織:ACM(The Association for Computing Machinery)、DPMA (The Data Processing Management Association)、CIPS (The Canadian Information Processing Society)、BCS (The British Computer Society)、及ICCP(The Institute for Certification of Computer Professions)的資訊人員倫理守則內容,以「社會層級」及「倫理議題」為分析主軸,探討五個IS組織中倫理守則在社會層面及倫理議題上的異同。希望從以上的主題分析,可以了解當前資訊界的倫理現況,以提供國內資訊專業組織或協會在制定資訊人員共通的專業倫理守則時應該注意的現象。研究結果發現:五個IS組織的倫理守則中,在社會層級方面的重視程度依序為公眾、雇主、顧客、專業組織、專業、及同僚;對倫理議題的重視程度依序為專業品質、責任、利益衝突、軟體風險、財產權、隱私權、公平、機密及未授權存取。另外,我們發現五個IS組織的倫理守則都有不同的著眼點,主要是因為每個組織的定位與成立宗旨、及其主要的參與成員有所差異。最後,本文以「社會層級」及「倫理議題」的分析結果對國內企業或IS組織提出建議。
     The purpose of this study is to analyze and compare the ethical codes of five largest information professional association(ACM, DPMA, CIPS, BCS, ICCP) from two criterion "social level" and "ethical issues". The results indicate: among others, "society" is regarded as the most important social level, followed by employers, clients, professional organization, profession, and colleagues. And on the ethical issues, top priority is given to "profession quality", followed by liability, conflicts of interest, software risks, property rights, privacy, fairness or discrimination, confidentiality, and unauthorized access to computer systems. In addition, each of the organizations, based on their individual interest and objectives, varies to some degree in stressing some particular ethical issues or social level.
期刊論文
1.Vitell, Scott J.、Davis, David L.(1990)。Ethical Beliefs of MIS Professionals: The Frequency and Opportunity for Unethical Behavior。Journal of Business Ethics,9(1),63-70。  new window
2.Conger, S.、Loch, K. D.、Helft, B. L.(1995)。Ethics and Information Technology Use: A Factor Analysis of attitudes to Computer Use。Information Systems Journal,5,161-184。  new window
3.Oz, E.(1993)。Ethical standards for computer professionals: a comparative analysis of four major codes。Journal of Business Ethics,12,709-726。  new window
4.Association for Computing Machinery(1992)。ACM codes of ethics and professional conduct。Communications of the ACM,30(5),94-99。  new window
5.Frankel, M. S.(1989)。Professional codes: why, how and with what impacts?。Journal of Business Ethics,8,31-38。  new window
6.Khazanchi, D.(1995)。Unethical Behavior in Information Systems: the Gender Factor。Journal of Business Ethics,14(9),741-749。  new window
7.Huff, C.、Martin, C. D.(1995)。Computing consequences: A framework for teaching ethical computing。Communications of the ACM,38(12),75-84。  new window
8.Bommer, M.、Grato, C.、Gravander, J.、Tuttle, M.(1987)。A behavioral model of ethical and unethical decision making。Journal of Business Ethics,6(4),265-281。  new window
9.Lewis, P. V.(1985)。Defining Business Ethics: Like Nailing Jello to a Wall。Journal of Business Ethics,4(5),377-383。  new window
10.Anderson, R. E.、Johnson, D. G.、GotterbarN, D.、Perrole Judith(1993)。Using the new ACM code of etnics in decision making。Commu. of the ACM,36(2),98-107。  new window
11.Abbott, Andrew(1983)。Professional ethics。American Journal of Sociology,88,855-885。  new window
12.Collins, W. R.、Miller, K. W.、Spielman, B. J.、Wherry, P.(1994)。How good is good enough。Comm. of the ACM,37(1),37-81。  new window
13.Brooks, L. J.(1989)。Corporate ethical performance: Trend, forecasts and outlooks。Journal of Business Ethic,8,31-38。  new window
14.Elmer-Dewitt, P.(1994)。Nabbing the Pirates of Cyberspace。Time,143(24),62-63。  new window
15.Conger, S.、Loch, K. D.(1995)。Ethics and computer use。Commun. of the ACM,38(12),31-39。  new window
16.Mason, R. O.(1986)。Four Ethical Issues of the Information Age。MIS Quarterly,10(4),5-12。  new window
17.Forester, T.(1990)。Software theft and the problem of the intellectual property rights。Comput Soc.,20(1),2-11。  new window
18.Frenkel, K. A.(1990)。Woman and computing。Commun. of the ACM,33(11),34-46。  new window
19.Gotterbam, D.(1991)。Computer ethics: Responsibility regained。National Forum, Summer。  new window
20.Johnson, D. G.(1985)。Equal access to computing, computer expertise, and decision making about computer。Business and professional ethics journal,4,95-103。  new window
21.Lee, G. M.、Eining, M. M.、Long, C. P.(1994)。Information ethics: A comparison among college students from Mainland China, Hong Kong and Taiwan。Hong Kong Journal of Business Management,7,17-35。  new window
22.Mason, R. O.(1995)。Ethics to iformation technology issues。Comma, of the ACM,38(12),55-57。  new window
23.Paradice, D. B.、Dejoie, R. M.(1991)。The ethical decision-making process of information systems workers。Journal of Business Ethics,10,57-77。  new window
24.Smith, H. J.、Milberg, S. J.、Burke, S. J.(1996)。Information privacy: Measuring individuals' concerns about organizational pratices.。MIS Quarterly,1996(Jun.),167-195。  new window
25.Stevens, B.(1994)。An analysis of corporate ethical code studies: Where do we go from here?。Journal of Business Ethics,13(1),63-69。  new window
26.Taylor, G. S.、Davis, J. S.(1989)。Individual privacy and computer-based human resource resource information system。Journal of Business Ethics,8,569-576。  new window
27.Susan, A.(1993)。A comparison of expert's and high tech students' ethical beliefs in compter-related situations。Journal of Business Ethics,12,359-370。  new window
28.Oz, Effy(1992)。Ethical Standards for Information System Professionals: A Case for a Unified Code。MIS Quarterly,16(4),423-433。  new window
會議論文
1.Parker, D. B.(1981)。Ethical Dilemmas in Computer Technology: Ethics and Management of computer Technology。The Fourth National Conference on Business Ethics。Waltham, MA:Bentley College。  new window
2.Hoffman, W. M.、Moore, J. M.(1981)。Ethics and the management of computer technology。the fourth national conference on business ethics。Waltham, Massachusetts:Bentley College。  new window
3.Kao, R. H. F.、Oh, M. D.(1991)。A comparative analysis of the influence of confucianism on management practices: The cases of China, Japan, and Korea。The 4th international conference on comparative management,164-170。  new window
4.Lee, G. M.、Lee, T. S.、Tuan, C.、Qi, Y. A.(1991)。Cross-cultural study of information ethics。The 4th international conference on comparative management。  new window
圖書
1.Weinberg, G. M.(1971)。The psychology of computer programming。New York, NY:Van Nostrand Reinhold Company。  new window
2.Bayles, M. D.(1981)。Professional ethics。Wadsworth, Belmont, Calif。  new window
3.Clark, D.(1990)。Computers at risk: Safe computing in the information age。Washington, D.C.:National Research Council, National Academy Press。  new window
4.Bynum, T. W.、Maner, W.、Fodor, J.(1992)。Software ownership and intellectual property rights。New Haven, Conn:Research Center on Computing and Society, Southern Connecticut State University。  new window
5.Deipie, R.、Flower, G.、Paradice, D.(1992)。Ethical isues in information system。Boston, MA:Boyd & Fraster Publishing Company。  new window
6.Frankena, W. K.(1963)。Ethics。Englewood Cliffs, NJ:Prentice Hall。  new window
7.Parker, D. B.(1990)。Ethical Conflicts in Computer Science and Technology。AFIP Press。  new window
8.Johnson, D. G.(1984)。Computer ethics。Englewood Cliffs, New Jersey:Prentice Hall。  new window
9.Johnson, D. W.(1985)。Computer ethics: A guide for the new age。Elgin, Illions:The Brethren Press。  new window
10.Laudon, K. C.(1986)。Dossier society: Value choice in the design of national information system。New York:Columbia University Press。  new window
11.Perrolle, J. A.(1987)。Computers and social change: Information, property and power。Belmont, Calif.:Wadsworth。  new window
12.Smith, G. V.、Parr, R. L.(1993)。Intellectual property。New York:John Wiley & Sons。  new window
13.Stevenson, J. T.(1987)。Engineering ethics: Pratices and principles。Toronto:Canadian Scholars Press。  new window
圖書論文
1.Miller, A.(1991)。Computers and privacy。Ethical issues in information system。Bostom:Boyd&Fraser。  new window
2.Perrolle, J.(1991)。Conversations and trust in computer interfaces。Computerization and controversy。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top