Title page for 86423035


[Back to Results | New Search]

Student Number 86423035
Author Chih-Yang Wang(汪智揚)
Author's Email Address No Public.
Statistics This thesis had been viewed 493 times. Download 10 times.
Department Information Management
Year 1998
Semester 2
Degree Master
Type of Document Master's Thesis
Language zh-TW.Big5 Chinese
Title
Date of Defense
Page Count 193
Keyword

No Any Keyword Information.

Abstract
Table of Content 第壹章 緒論 1
第一節 研究背景…..…………………………………………………………..1
第二節 研究動機……..………………………………………………………..2
第三節 研究目的…………..…………………………………………………..3
第四節 研究範圍..…..……………..…………………………………………..3
第五節 預期貢獻.....…..………….……………………………………………3
第六節 論文架構與研究程序….………..…………………………………….4
第貳章 文獻探討 6
第一節 倫理是什麼…………...……..………………………………………...8
第二節 資訊時代的論理議題 …………………....………………………….11
第三節 理性行為理論與規劃行為理論 ………....………………………….14
第四節 倫理決策理論………………………………………………………...19
第五節 以理性行為理論為基礎的倫理相關決策模式實徵研究 …………..23
第六節 其他倫理相關決策實徵研究 ……………………………………….29
第七節 非實徵性倫理相關決策模式研究 ………………………………….34
第八節 影響倫理決策之因素與模式 ……………….………………………37
第九節 名詞解釋 ……………………………………………………………44
第十節 顯著的倫理相關模式總整理 ……………………………………….49
第參章 研究方法 50
第一節 研究架構與假說 ……………………………………………………50
第二節 研究方法 ……………………………………………………………62
第三節 問卷設計與變數衡量 ………………………………………………62
第四節 前測與試測 …………………………………………………………65
第五節 資料收集程序 ………………………………………………………66
第肆章 資料分析 67
第一節 隱私權 ………………………………………………………………69
第二節 正確權 ………………………………………………………………90
第三節 財產權 ………………………………………………………………111
第四節 存取權 ………………………………………….………………….132
第五節 隱私權、正確權、財產權與存取權之比較……………………….153
第伍章 結論 165
第一節 研究結論 ……..……………………………………………………165
第二節 研究貢獻與建議 …………………………………………………..170
第三節 研究限制與未來研究方向 ….…...………………………………..172
Reference 一、中文部份
石世豪,大西洋兩岸資訊冷戰的啟示,中國時報,1998年11月17日。
宋鎧等,管理資訊系統,國立空中大學,1993年8月。
林子銘,台灣被撕裂的隱私權,中國時報,1998年11月4日。
高思謙,中外倫理哲學比較研究,台北:中央文物供應社,1983年12月。
周科鈞,電腦軟體個人盜版行為之結構性分析,國立台灣大學國際企業研究所未出版碩士論文,1996年6月。
唐日新,范錚強、郭鴻志,軟體盜版的因素探討,國立中央大學資訊管理學系未出版碩士論文,1996年6月。
許孟祥,林東清,以意向模式研究資訊人員之專業倫理行為,國立中山大學資訊管理學系未出版博士論文,1998年6月。
許孟祥,林東清,IT使用之倫理決策分析,資訊管理研究,第二卷,第一期,1997年7月,77-105。
黃俊英,多變量分析,台北:華泰文化事業公司,1998年1月。
張紹勳,林秀娟,SPSS for Windows統計分析,台北:松崗,1998年10月。
章倩萍,侵犯通信秘密者將處徒刑或科罰金,聯合報,1998年12月20日。
楊國樞等,社會及行為科學研究法,台北:東華,1997年5月。
二、英文部份
ABA. "Report on Computer Crime," pamphlet prepared by the Task Force on Computer Crime, American Bar Association, Section on Criminal Justice, 1800 M Street, Washington, D. C., 20036, 1984.
Anderson, R. E., Johnson, D. G., Gotterbarn, D., and Perrolle, J., "Using the New ACM Code of Ethics in Decision Making," Communication of the ACM, Vol. 36, No. 2, 1993, 98-107.
Aiken, R. M., "Reflections on Teaching Computer Ethics," paper presented at the Fourteenth SIGCSE Technical Symposium on Computer Science Education, 1988, 8-11.
Ajzen, I., "From Intentions to Actions," In Ajzen I., Attitudes, Personaliity, and Behavior, The Dorsey Press, 1988.
Baker, S., "Europe's Privacy Cops," Business Week, November 2, 1998, 21-22.
Baki, H., and Harwick, J., "Rethinking the Concept of User Involvement," MIS Quarterly, March , 1989, 53-63.
Banerjee, D., Cronan, T. P., and Jones, T. W., "Modeling IT Ethics: A Study in Situational Ethics," MIS Quarterly, March, 1998, 31-60.
Behar, R., "Who's Reading Your E-mail?" Fortune, February 3, 1997, 57-70.
Bentler, P. M., and Speckart, G., "Models of Attitude-Behavior Relations," Psychological Review, Vol. 86, No. 5, 1979, 452-464.
Bommer, M., Gratto, C., Gravander, J., and Tuttle. M., "A Behavioral Model of Ethical and Unethical Decision Making," Journal of Business Ethics, 6, 1987, 265-280.
Couger, J. D. "Preparing IS Students to Deal with Ethical Issues," MIS Quarterly, June, 1989, 211-218.
Dejoie, R., Flower, G., and Paradice, D. (eds), Ethical Issues in Information System, Boyd & Fraster Publishing Company, Boston, MA 02116, 1991.
Dubinsky, A. J., and Loken, B., "Analyzing Ethical Decision Making in Marketing," Journal of Business Research, 19, 1989, 83-107.
Eining, M. M. and Christensen A. L., "A Psycho-Social Model of Software Piracy: The Development and Test of a Model," In Dejoie, R., Flower, G., and Paradice D., Ethical Issues in Information Systems, 1991, 182-188.
Fishbein, M., "Attitude and Prediction of Behavior," in Fishbein, M., Reading in Attitude Theory and Measurement, New York: John Wiley & Son, 1966, 477-492.
Ford, R. C., and Richardson, W. D., "Ethical Decision Making: A Review of the Empirical Literature," Journal of Business Ethics, 13, 1994, 205-221.
Fredricks, A. J., and Dossett, D. L., "Attitude-Behavior Relations: A Comparison of the Fishebin-Ajzen and Bentler-Speckart Models," Journal of Personality and Social Psychology, Vol, 45, No. 3, 1983, 501-512.
Glover, S. H., Bumpus, M. A., Logan, J. E., and Ciesla, J. R., "Re-examining the Influence of Individual Values on Ethical Decision Making," Journal of Business Ethics, 16, 1997, 1319-1329.
Harrington, S. J., "A Test of a Person -- Issue Contingent Model of Ethical Decision Making in Organizations," Journal of Business Ethics, 16, 1997, 363-375.
Harrington, S. J., "The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions," MIS Quarterly, September, 1996, 257-278.
Heide, D., and Hightower, J. K., "Teaching Ethics in the Information Sciences Curricula," Proceedings of the 1988 Annual Meeting of the Decision Sciences Institute (1), 1988, 198-200.
Herndon, N. C., "A New Context for Ethics Education Objectives in a College of Business: Ethical Decision-Making Models," Journal of Business Ethics, 15, 1996, 501-510.
Hunt, S. D., and Vitell, S. J., "A General Theory of Marketing Ethics," Journal of Macromarketing, 6, Spring, 1986, 5-16.
Hunt, T. G., and Jennings, D. F., "Ethics and Performance: A Simulation Analysis of Team Decision Making," Journal of Business Ethics, 16, 1997, 195-203.
Huff, C., and Martin, C. D., "Computing Consequences: A Framework for Teaching Ethical Computing," Communications of the ACM, Vol. 38, No. 12, 1995, 76-84.
Johnson, D. G., "Philosophical Ethics," In Johnson, D. G., Computer Ethics, Prentice-Hall, 1994.
Jones, T. M., "Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model," Academy of Management Reivew, Vol. 16, No. 2, 1991, 366-395.
Kallman, E. A., and Grillo, J. P., Ethical Decision Making and Information Technology, McGraw-Hill Press, 1996.
Kreie, J., and Gronan, T. P., "How Men and Women View Ethics," Communications of the ACM, Vol. 41, No. 9, 1998, 70-76.
Loch, K. D., and Conger, S., "Evaluating Ethical Decision Making and Computer Use," Communication of the ACM, Vol. 39, No. 7, 1996, 74-83.
Logsdon, J. M., Thompson, J. K., and Reid, R. A., "Software Piracy: Is It Related to Level of Moral Judgement?" Journal of Business Ethics, 13, 849-857.
Mason, R. O., "Applying Ethics to Information Technology Issues," Communications of the ACM, Vol. 38, No.12, 1995, 55-57.
Mason, R. O., "Four Ethical Issues of the Information Age," MIS Quarterly, Vol. 10, No. 1, 1986, 5-12.
Moseley, O. B., and Whitis, R. E., "Preventing software piracy," Management Accounting, Vol. 77, Iss. 6, December, 1995, 42-43.
Oz, Effy, "What is Ethics?" In Oz, Effy, Ethics for the Information Age, Wm. C. Brown Communications, Inc., 1994.
Panettieri, J. C., "Security," Information Week (555), November 27, 1995, 32-40.
Parker, D. B., Ethical Conflicts in Computer Science and Technology. American Federation in Information Processing Societies (AFIPS) Press, Reston, VA, 1980.
Parker, D., Swope, D., and Baker, B. Ethical Conflicts in Information and Computer Science, Technology, and Business, Wellesley, MA: QED Information Sciences, 1990.
Research Institute of American, "Safeguarding Your Business Against Theft and Vandalism," Computer Crime Digest, November 1983, 5.
Saari, J. "Computer Crime - Numbers Lie," Computers and Security (6), June, 1987, 111-117.
Simpon, P. M., Banerjee, D., Simpson, C. L., "Softlifting: A Model of Motivating Factors," Journal of Business Ethics, 13, 1994, 431-438.
Straub, D. W., and Nance, W. D., "Discovering and Disciplining Computer Abuse in Organizations: A Field Study," MIS Quarterly, March, 1990, 45-60.
Thong, J. Y. L., and Yap, C. S., "Testing an Ethical Decision-Making Theory: The Case of Softlifting," Journal of Management Information Systems, Vol. 15, No.1, 1998, 213-237.
Trevino, L. K., "Ethical Decision Making in Organizations: A Person-Situation Interactionist Model," Academy of Management Review, Vol. 11, No. 3, 1986, 601-617.
Advisor
  • (林子銘)
  • Files No Any Full Text File.
    Date of Submission

    [Back to Results | New Search]


    Browse | Search All Available ETDs

    If you have dissertation-related questions, please contact with the NCU library extension service section.
    Our service phone is (03)422-7151 Ext. 57407,E-mail is also welcomed.