126 research outputs found

    Evaluation of computer ethics: confirmatory factor models using PROC CALIS

    Get PDF
    The computer is considered one of the most essential technological advances and has become an everyday tool. Many tertiary institutions have become heavily dependent on computers, Internet and informations systems for educational purpose. Computers and the Internet also represent many people, organizations, and governments. However, at the same time they raise some ethical issues such as unauthorized access and use of computer systems, software piracy and information privacy. This study proposes the employment of computer use and computer security concepts for investigating students’ ethical conduct related to computer ethics. Specifically, an ethical computer awareness (ECA) construct concerning computer use and security is developed and validated. The process of evaluating a measurement instrument for reliability and investigating the factor structure are discussed using the scale of ethical computer awareness (SECA). SAS procedures served to provide an indication of the internal consistency, that is, reliability with PROC CORR, to explore the factor structure with exploratory factor analysis using PROC FACTOR, and to verify the factor structure with confirmatory factor analysis using PROC CALIS of the measurement instrument. The ECA construct developed from the study could be useful to research a wide range of computer ethics in the future

    Adoption of Information Technology and its Relative Contribution to a Firm's Agility

    Get PDF
    In the world of business, information technology (IT) continues to heighten competencies and ensure success of firms. But, investment in the emerging IT can lead to productivity gains only if it is accepted and effectively used. As a consequence, IT acceptance and utilization represent central concerns in recent information systems research. Therefore, the main objective of this research is to examine the influence of external variables on IT acceptance (Le., usage), and how IT acceptance contributes to a firm's ability to be an agile competitor. This research is an empirical attempt to investigate the influence of IT acceptance and usage on agility, based on a well-established theoretical model, that is, Technology Acceptance Model (TAM) from the management information system area. TAM was chosen as the theoretical basis (paradigm) within which an extended model was formulated. A few adaptations to this paradigm were introduced in order to make them applicable to the present context building upon, and integrating previous researches in a cumulative manner. This led to a research and integrating previous researches in a cumulative manner. This led to a research model which was tested by a seventeen-page survey questionnaire. This research used results from a survey among 329 managers and executives in manufacturing firms in the Klang Valley, Malaysia. A careful confirmatory factor analysis (CFA) and a reliability analysis (Cronbach's alpha coefficient) for the measure used in the survey were conducted. Correlation analysis, multiple regression analysis, and structural equation modeling (SEM) analysis using AMOS 4.0 were used as different data analysis techniques. The analysis in part gave good support for the initial model considered, but also revealed some shortcomings in the base model (TAM). The findings from this research indicated that information quality is a dominant factor in explaining agility, followed by top management support. The results also indicated that perceived usefulness has a strong effect on actual system use. Similarly, the results also indicated that exogenous variables (independent variables) influence actual system use, particularly system characteristics, job characteristics and top management support. The results then revealed that actual system use mediated the relationships between these exogenous variables and agility. The findings have several implications for information system (IS) management practice. Thus, implications for the acceptance of IT and agility, for theory and practice that follow, and future research are also discussed

    Overview of Data Security Issues in Hospital Information Systems

    Get PDF
    Nowadays, hospital information systems (HIS) provide real-time data and information in order to guide public health organizations especially in decision-making. The hospital information systems are integrated information systems designed to manage the administrative, financial and clinical tasks or aspects of a hospital. It plays an important role in planning, initiating, organizing and controlling the operations of the hospital, and a crucial role in providing quality healthcare services. The aims of this paper are to explore and provide a better understanding of data security aspects in hospital information systems, and add more body of knowledge in information systems (IS) field in the healthcare industry. The views of previous researches are presented and discussed, and new area of interest to the IS and HIS community then are proposed. Available at: https://aisel.aisnet.org/pajais/vol7/iss4/5

    Computer Ethics Awareness Among Undergraduate Students in Malaysian Higher Education Institutions

    Get PDF
    This study investigates the ethical awareness of computer use among undergraduate computer science students at two public Malaysian universities. One hundred and fifty-nine students were asked to evaluate the code of ethics pertaining to computer ethics. A comparison of undergraduate computer science students between two public universities was done to determine the level of ethical awareness of computer use. Independent Samples T-test for differences was performed across four distinct groups, that is, university, gender, age, and duration of computer use. The results of the tests conducted indicate that the ethical awareness of computer use of the students differ most significantly on the basis of the university itself. There were minimal differences across gender, age and duration of computer use. This suggests that computer ethics awareness training is needed for university users. The results are discussed and the implications for studies in an education context are outlined

    Users’ perception on the information security policy of the institutions of higher learning

    Get PDF
    Securing information is essential for safeguarding the organization business operations as information is a business asset to any organization including education sector.One of the most imperative information security (InfoSec) controls identified is InfoSec policy, a direction-giving document.The purpose of this study is to investigate the user awareness, understanding and acceptance of InfoSec policy in the Malaysian’s Institutes of Higher Learning.Survey questionnaires had been distributed to graduate students and non-IT staff of Universiti Teknologi Malaysia (UTM),International Campus, Kuala Lumpur.The result of this study had perceived consistent agreeable behaviors of the InfoSec policy within UTM

    Computer ethics awareness among undergraduate students in Malaysian higher education institutions

    Get PDF
    This study investigates the ethical awareness of computer use among undergraduate computer science students at two public Malaysian universities. One hundred and fifty-nine students were asked to evaluate the code of ethics pertaining to computer ethics. A comparison of undergraduate computer science students between two public universities was done to determine the level of ethical awareness of computer use. Independent Samples T-test for differences was performed across four distinct groups, that is, university, gender, age, and duration of computer use. The results of the tests conducted indicate that the ethical awareness of computer use of the students differ most significantly on the basis of the university itself. There were minimal differences across gender, age and duration of computer use. This suggests that computer ethics awareness training is needed for university users. The results are discussed and the implications for studies in an education context are outlined
    corecore