An ethical assessment of computer ethics using scenario approach
Ethics refers to a set of rules that define right and wrong behavior, used for moral decision making. In this case, computer ethics is one of the major issues in information technology (IT) and information system (IS). The ethical behaviour of IT students and professionals need to be studied in an a...
| Main Authors: | Masrom, Maslin, Ismail, Zuraini, Hussein, Ramlah, Mohamed, Norshidah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Academy of Taiwan Information Systems Research
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/1256/ http://irep.iium.edu.my/1256/1/An_Ethical_Assessment_of_Computer_Ethics_Using_Scenario_Approach.pdf |
Similar Items
Ethical awareness of computer use among undergraduate
students
by: Masrom, Maslin, et al.
Published: (2009)
by: Masrom, Maslin, et al.
Published: (2009)
Computer ethics awareness among undergraduate students in Malaysian higher education institutions
by: Masrom, Maslin, et al.
Published: (2008)
by: Masrom, Maslin, et al.
Published: (2008)
Linking Islamic work ethic to computer use ethics, job satisfaction and organisational commitment in Malaysia
by: Mohamed, Norshidah, et al.
Published: (2010)
by: Mohamed, Norshidah, et al.
Published: (2010)
Evaluation of computer ethics: confirmatory factor models using PROC CALIS
by: Masrom, Maslin, et al.
Published: (2008)
by: Masrom, Maslin, et al.
Published: (2008)
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)
by: Abdul Rahim, Fiza
Published: (2009)
Development of an instrument to measure smart card technology acceptance
by: Taherdoost, Hamed, et al.
Published: (2009)
by: Taherdoost, Hamed, et al.
Published: (2009)
Analyzing accuracy and accessibility in ICT ethical scenario context
by: Masrom, Maslin, et al.
Published: (2010)
by: Masrom, Maslin, et al.
Published: (2010)
Investigating the student’s awareness on computer security and ethics
by: Aliyu, Mansur, et al.
Published: (2011)
by: Aliyu, Mansur, et al.
Published: (2011)
Study of Islamic perspectives of professional code of ethics in the field of computing and informatics
by: Shuriye, Abdi Omar
Published: (2008)
by: Shuriye, Abdi Omar
Published: (2008)
Development of scenario management and requirements tool (SMaRT):Towards supporting scenario-based requirements engineering methodology
by: Nordin, Azlin, et al.
Published: (2018)
by: Nordin, Azlin, et al.
Published: (2018)
Scenario Management and Requirements Tool (SMaRT)
by: Nordin, Azlin, et al.
Published: (2014)
by: Nordin, Azlin, et al.
Published: (2014)
A confirmatory factor analysis on task-technology fit for a student portal
by: Norshidah, Mohamed, et al.
Published: (2011)
by: Norshidah, Mohamed, et al.
Published: (2011)
Morphing engines classification by code histogram
by: Babak Bashari Rad,, et al.
Published: (2011)
by: Babak Bashari Rad,, et al.
Published: (2011)
A simulation model for crowd evacuation of fire emergency scenario
by: Noor Akma, Abu Bakar, et al.
Published: (2017)
by: Noor Akma, Abu Bakar, et al.
Published: (2017)
Internet banking adoption : information content richness, convenience and computer self-efficacy
by: Ramlah Hussein, *, et al.
Published: (2011)
by: Ramlah Hussein, *, et al.
Published: (2011)
A descriptive analysis of IT adoption in Malaysian small software firms
by: Mohamed, Norshidah, et al.
Published: (2009)
by: Mohamed, Norshidah, et al.
Published: (2009)
Computer Aided Instructions (CAI) Mathematics Using Learner Centered Approach
by: Teng, Sze Le
Published: (2017)
by: Teng, Sze Le
Published: (2017)
Assessing Attention and Meditation Levels in Learning Process using Brain Computer Interface
by: Rahmah, Mokhtar, et al.
Published: (2016)
by: Rahmah, Mokhtar, et al.
Published: (2016)
Roles selection: a computational approach using ELECTRE and CFFR based on multi criteria tacit knowledge acquisition
by: Yau’mee Hayati, Hj Mohamed Yusof, et al.
Published: (2021)
by: Yau’mee Hayati, Hj Mohamed Yusof, et al.
Published: (2021)
Computation Offloading – an Effective Approach to Enhance Smartphone Capabilities
by: Muhammad Wasif, Nabeel Qureshi, et al.
Published: (2015)
by: Muhammad Wasif, Nabeel Qureshi, et al.
Published: (2015)
Availability Analysis of Shared Backup Path Protection
Under Multiple-link Failure Scenario in WDM Networks
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
Information disclosure behaviour in social media among Malaysian youth : the impact of privacy concern, risk and trust
by: Norsaremah Salleh,, et al.
Published: (2011)
by: Norsaremah Salleh,, et al.
Published: (2011)
Combinatorial Rules Approach to Improve Priority Rules Scheduler in Grid Computing Environment
by: Zafril Rizal, M Azmi, et al.
Published: (2012)
by: Zafril Rizal, M Azmi, et al.
Published: (2012)
Hybrid Soft Computing Approach for Determining Water Quality Indicator: Euphrates River
by: Jing, Li, et al.
Published: (2017)
by: Jing, Li, et al.
Published: (2017)
Inventory visibility scenario to reduce safety stock in supply chain network using blockchain hyperledger composer
by: Arwa, Mukhtar, et al.
Published: (2012)
by: Arwa, Mukhtar, et al.
Published: (2012)
A Review of Software Component Reusability Assessment Approaches
by: Fazal, E. Amin, et al.
Published: (2010)
by: Fazal, E. Amin, et al.
Published: (2010)
Computer assisted alerts using mental model approach for customer service improvement
by: Ghaffar, Abid, et al.
Published: (2013)
by: Ghaffar, Abid, et al.
Published: (2013)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Ethical Framework On Breast Self-Examination System
by: Khana, Rajes
Published: (2022)
by: Khana, Rajes
Published: (2022)
Halal Computer Systems Validation Quality Assurance, Risk Assessment and Regulatory Compliance For The Pharmaceutical and Healthcare Industry
by: Raja Ikram, Raja Rina, et al.
Published: (2012)
by: Raja Ikram, Raja Rina, et al.
Published: (2012)
Exploring The Religio-Socio Ethical Dimensions of Ai-Driven Evangelism:
Opportunities, Challenges, And Implications
by: Alao, Oluwafemi Joseph, et al.
Published: (2024)
by: Alao, Oluwafemi Joseph, et al.
Published: (2024)
Computer security and ethics awareness among IIUM students: an empirical study
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)
by: Khan, Nawsher, et al.
Published: (2011)
Proposal for Evaluation of Software Reusability Assessment Approach Employing a Mixed Method
by: Fazal, E. Amin, et al.
Published: (2010)
by: Fazal, E. Amin, et al.
Published: (2010)
Using computer analysis of student writing to improve lesson planning
by: Fooks, Ian, et al.
Published: (2018)
by: Fooks, Ian, et al.
Published: (2018)
Modelling the movement of crowd evacuation using computational simulation technique
by: Noor Akma, Abu Bakar, et al.
Published: (2018)
by: Noor Akma, Abu Bakar, et al.
Published: (2018)
A Computational System Approach
To Develop Students’ Emotion Oriented System as Feedback Tool for
Lecturers to Enhance Teaching and Learning
by: Deshinta, Arrova Dewi, et al.
Published: (2012)
by: Deshinta, Arrova Dewi, et al.
Published: (2012)
Development of computer ethical framework for information security (educational context)
by: Namayander, Meysam
Published: (2009)
by: Namayander, Meysam
Published: (2009)
Behavious based computer user clustering using rough set theory
by: Wang , Le Wei
Published: (2013)
by: Wang , Le Wei
Published: (2013)
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
Similar Items
-
Ethical awareness of computer use among undergraduate
students
by: Masrom, Maslin, et al.
Published: (2009) -
Computer ethics awareness among undergraduate students in Malaysian higher education institutions
by: Masrom, Maslin, et al.
Published: (2008) -
Linking Islamic work ethic to computer use ethics, job satisfaction and organisational commitment in Malaysia
by: Mohamed, Norshidah, et al.
Published: (2010) -
Evaluation of computer ethics: confirmatory factor models using PROC CALIS
by: Masrom, Maslin, et al.
Published: (2008) -
Comprehensive analysis on the influences of computer ethics on information security
by: Abdul Rahim, Fiza
Published: (2009)