{"title":"用伦理理论预测和解释网络伦理","authors":"Winfred Yaokumah","doi":"10.4018/ijcwt.2020040103","DOIUrl":null,"url":null,"abstract":"Peoplefacemultipledecisionsthathaveethicaldimensionsandareoftenunabletoresolveappropriately thoseethicaldilemmasintheuseofthecyberspace.Individualsfinditdifficulttoexplaintherationale behindtheirmoraljudgmentsintheirinteractionsandaccesstodigitalcontent.Identifyingethicaland moralorientationthatpromptsacceptableorunacceptableethicaljudgmentsisanimportantfactor incyberethics.Thegoalofthisstudyistoemploythreeprominentethicaltheoriestopredictand explaincyberethicaljudgementsintermsofcomputerethics,privacy,intellectualpropertyrights,and academicintegrity.Thestudydevelopsconceptualandpredictivemodelstotestasetofhypotheses. Theresultsshowconsequentialethicsasthemostsignificantpredictorofcomputerethics,cyber privacy,andacademicintegrity.Deontologicalethicsmostsignificantlypredictintellectualproperty rightsbutisnotasignificantpredictorofacademicintegrity. KEyWoRdS Academic Integrity, Consequentialism, Cyber Ethics, Cyber Security, Deontology, Ethical Theory, Intellectual Property, Piracy, Plagiarism, Privacy, Virtue Ethics","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"30 1","pages":"46-63"},"PeriodicalIF":0.2000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Predicting and Explaining Cyber Ethics with Ethical Theories\",\"authors\":\"Winfred Yaokumah\",\"doi\":\"10.4018/ijcwt.2020040103\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Peoplefacemultipledecisionsthathaveethicaldimensionsandareoftenunabletoresolveappropriately thoseethicaldilemmasintheuseofthecyberspace.Individualsfinditdifficulttoexplaintherationale behindtheirmoraljudgmentsintheirinteractionsandaccesstodigitalcontent.Identifyingethicaland moralorientationthatpromptsacceptableorunacceptableethicaljudgmentsisanimportantfactor incyberethics.Thegoalofthisstudyistoemploythreeprominentethicaltheoriestopredictand explaincyberethicaljudgementsintermsofcomputerethics,privacy,intellectualpropertyrights,and academicintegrity.Thestudydevelopsconceptualandpredictivemodelstotestasetofhypotheses. Theresultsshowconsequentialethicsasthemostsignificantpredictorofcomputerethics,cyber privacy,andacademicintegrity.Deontologicalethicsmostsignificantlypredictintellectualproperty rightsbutisnotasignificantpredictorofacademicintegrity. KEyWoRdS Academic Integrity, Consequentialism, Cyber Ethics, Cyber Security, Deontology, Ethical Theory, Intellectual Property, Piracy, Plagiarism, Privacy, Virtue Ethics\",\"PeriodicalId\":41462,\"journal\":{\"name\":\"International Journal of Cyber Warfare and Terrorism\",\"volume\":\"30 1\",\"pages\":\"46-63\"},\"PeriodicalIF\":0.2000,\"publicationDate\":\"2020-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Cyber Warfare and Terrorism\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijcwt.2020040103\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"POLITICAL SCIENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Warfare and Terrorism","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijcwt.2020040103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"POLITICAL SCIENCE","Score":null,"Total":0}
引用次数: 6
Predicting and Explaining Cyber Ethics with Ethical Theories
Peoplefacemultipledecisionsthathaveethicaldimensionsandareoftenunabletoresolveappropriately thoseethicaldilemmasintheuseofthecyberspace.Individualsfinditdifficulttoexplaintherationale behindtheirmoraljudgmentsintheirinteractionsandaccesstodigitalcontent.Identifyingethicaland moralorientationthatpromptsacceptableorunacceptableethicaljudgmentsisanimportantfactor incyberethics.Thegoalofthisstudyistoemploythreeprominentethicaltheoriestopredictand explaincyberethicaljudgementsintermsofcomputerethics,privacy,intellectualpropertyrights,and academicintegrity.Thestudydevelopsconceptualandpredictivemodelstotestasetofhypotheses. Theresultsshowconsequentialethicsasthemostsignificantpredictorofcomputerethics,cyber privacy,andacademicintegrity.Deontologicalethicsmostsignificantlypredictintellectualproperty rightsbutisnotasignificantpredictorofacademicintegrity. KEyWoRdS Academic Integrity, Consequentialism, Cyber Ethics, Cyber Security, Deontology, Ethical Theory, Intellectual Property, Piracy, Plagiarism, Privacy, Virtue Ethics