题名

兩岸三地資訊專業人員對資訊倫理認知之詮釋性研究

并列篇名

An Interpretation Study of MIS professionals' Information Ethics Cognition between the Taiwan Strait

作者

張玲星(Christina Ling-Hsing Chang)

关键词

資訊倫理守則 ; 資訊專業人員 ; 隱私權 ; 智慧財產權 ; 存取權 ; 精確權 ; Information Ethical Code ; MIS professional ; Privacy ; Intellectual Property ; Accessibility ; Accuracy

期刊名称

管理與系統

卷期/出版年月

21卷1期(2014 / 01 / 01)

页次

1 - 37

内容语文

繁體中文

中文摘要

資訊科技的發展,對社會的結構與規範帶來了變革性的影響,進而影響了人們的行為模式。然而為了維持社會的穩定與和諧,人們必須遵守某些規範、守則,以維護大家的權益,因此資訊倫理守則的重要性不言而喻,然而人們對資訊倫理的認知與判斷,卻深深受到文化的影響。如今許多企業都開始體認到二十一世紀是華人的世紀,尤其中國大陸更是全球化企業進駐的首要目的地。有鑑於此,本研究從「華人關係文化」觀點切入,以CHSyst公司(匿名)為研究標的,探討資訊專業人員在面對資訊倫理兩難議題之判斷、想法與行為時,提出更深層的剖析與瞭解,並發現兩岸三地雖然在政治經濟各方面有數十年來的差異,但是對於「關係」的看重,卻有一致的看法。對實務的貢獻則建議業界應該注意「華人關係文化」觀點的議題、提出一套適用於華人社會之資訊倫理守則架構,並提醒業者在推動資訊倫理守則時應該注意的重點,未來國際化企業在管理華人員工的同時,瞭解應該如何規範資訊專業人員,以免因為員工不當的倫理抉擇,為公司帶來負面的影響。

英文摘要

The development of information technology has had a significant impact on social structure, norms and human behavior. Vital for the maintenance of social stability and harmony are respect for social norms and codes by individuals and the protection of the rights of those individuals. An important means of achieving such respect and protection is the presence of, and adherence to, ”information ethics codes”, which are profoundly shaped by the culture in which they are created. In view of the role of China, particularly Mainland China, as a hugely important 21st Century market for global enterprises, this study provides insight into the influence of the Chinese guanxi cultural perspective on the reactive processes of MIS professionals when facing ethical dilemmas. The study finds the same guanxi perspective being adopted by MIS professionals in CHSyst (pseudonym) in Taiwan, Hong Kong and Mainland China, despite the long-established divergence in political and economic policies operating in these societies. In practice, this study highlights the importance of the Chinese guanxi cultural perspective for Chinese enterprises wishing to build an appropriate ethical code for their MIS professionals. The study may be regarded as a good reference source for global enterprises seeking to develop strategies to prevent unethical conduct in the workplace among Chinese MIS professionals. Reference to this study may help enterprises to reduce the number of negative consequences stemming from such conduct in the workplace.

主题分类 基礎與應用科學 > 統計
社會科學 > 財金及會計學
社會科學 > 管理學
参考文献
  1. 吳明隆、簡妙如(2009)。青少年網路霸凌行為探究。中等教育,60(3),90-109。
    連結:
  2. 周倩、吳歡鵲、陳茵嵐、王美鴻(2009)。『資訊素養與倫理』大學通識教育課程─理念、主題、教學策略與執行成效。大學圖書館,13(2),24-44。
    連結:
  3. 柯雲娥(2006)。傳播學門大學生資訊素養能力的研究。圖書與資訊學刊,56,96-116。
    連結:
  4. 莊雅茹、郭俊宏(2008)。台灣企業資訊倫理政策現況調查。輔仁管理評論,15(1),155-176。
    連結:
  5. 許孟祥、郭峰淵、孫思源(2000)。自我效能在資訊倫理的應用:軟體盜版倫理效能量表的建構與驗證。資訊管理學報,7(1),85-102。
    連結:
  6. 黃營杉、呂姿瑩(2008)。資訊倫理行為與官僚層級結構組織關係之研究。醫護科技學刊,10(4),221-233。
    連結:
  7. 謝建成、洪范文、陳建傑(2009)。台灣圖書館網頁標記語言正確性之探討。教育資料與圖書館學,46(4),469-496。
    連結:
  8. NASW, National Association of Social Workers, Code of Ethics, Washington DC, 1996.
  9. Chen, G. C., “The Students of National Cheng Kung University download MP3. Did They Violated the Copyright?” URL: http://www.dyjh.tyc.edu.tw/copyrit/right.htm (Retrieved 2001/04/23), 2001.
  10. Association for Computing Machinery (ACM), URL: http://www.acm.org/about/code-of-ethics, 2011.
  11. Adams, J. S.,Tashchian, A.,Shore, T.(2001).Codes of Ethics as Signals for Ethical Behavior.Journal of Business Ethics,29(3),199-211.
  12. Alston, J. P.(1989).Wa, Guanxi, and Inwha: Managerial Principles in Japan, China, and Korea.Business Horizon,32(1),26-31.
  13. Appelbaum, R.(Ed.),Felstiner, W.(Ed.),Gessner, V.(Ed.)(2001).Rules and Networks: The Legal Culture of Global Business Transactions.Oxford, England:Hart Publishing.
  14. Bloombecker, B.(1990).Spectacular Computer Crime.Homewood, IL:Dow Johns-Irwin.
  15. Bontis, N.,Choo, C. W.(2002).Strategic Management of Intellectural Capital and Organizational Knowledge.Oxford University Press.
  16. Canary, H. E.,Jennings, M. M.(2008).Principles and Influence in Codes of Ethics: A Centering Resonance Analysis Comparing Pre- and Post-Sarbanes-Oxley Code of Ethics.Journal of Business Ethics,80(2),263-278.
  17. Chang, C. L. H.(2009).Ethical Value of IT Professionals in Chinese Cultural Societies.Journal of Information Ethics,18(1),25-53.
  18. Chiou, J. S.,Pan, L. Y.(2008).The Impact of Social Darwinism Perception, Status Anxiety, Perceived Trust of People, and Cultural Orientation on Consumer Ethical Beliefs.Journal of Business Ethics,78(4),487-502.
  19. Chiu, H. C.,Hsieh, Y. C.,Wang, M. C.(2008).How to Encourage Customers to Use Legal Software.Journal of Business Ethics,80(3),583-595.
  20. Choi, C. U.,Kim, S. W.(2008).Women and Globalization: Ethical Dimensions of Knowledge Transfer in Global Organizations.Journal of Business Ethics,81(1),53-61.
  21. Chung, K. Y.,Eichenseher, J. W.,Taniguchi, T.(2008).Ethical Perceptions of Business Students: Differences Between East Asia and the USA and Among 'Confucian' Cultures.Journal of Business Ethics,79(1-2),121-132.
  22. Davison, R. M.,Martinsons, M. G.,Lo, H. W. H.,Kam, C. S. P.(2006).Ethical Values of IT Professionals: Evidence From Hong Kong.IEEE Transactions on Engineering Management,53(1),48-58.
  23. de Bary, W. T.(1970).Individualism and Humanitarianism in Late Ming Thought.Self and Society in Ming Thought,NY:
  24. Donaldson, T.(1996).Values in Tension: Ethics Away from Home.Harvard Business Review,1996(September-October),48-62.
  25. Einings, M. M.,Lee, G. M.(1997).Information Ethics: An Exploratory Study from an International Perspective.Journal of Information Systems,11(1),1-17.
  26. Falkenberg, L.,Woiceshyn, J.(2008).Enhancing Business Ethics: Using Cases to Teach Moral Reasoning.Journal of Business Ethics,79(3),213-217.
  27. Farh, J. L.,Tsui, A.S.,Xin, K.,Cheng, B.S.(1998).The Influence of Relational Demography and Guanxi: The Chinese Case.Organization Science,9(4),471-488.
  28. Farrell, H.,Farrell, B.(1998).The Language of Business Codes of Ethics, Implications of Knowledge and Power.Journal of Business Ethics,17(6),587-601.
  29. Fei, X.,Hamilton, Gary G.(Trans.),Zheng, Wang(Trans.)(1992).From the Soil, the Foundations of Chinese Society.Berkely, Cal.:University of California Press.
  30. Fimbel, N.,Burstein, J. S.(1990).Defining the ethical standards of the high-technology industry.Journal of Business Ethics,9(11),929-948.
  31. Glass, R. S,Wood, W. A.(1996).Situational Determinants of Software Piracy: An Equity Theory Perspective.Journal of Business Ethics,15(12),1189-1198.
  32. Golden-Biddle, K.,Locke, K.(1993).Appealing Work: An Investigation of How Ethnographic Texts Convince.Organization Science,4(4),595-616.
  33. Gotterbarn, D.(1998).Raising the Bar: A Software Engineering Code of Ethics and Professional Practice.ACM SIGCAS Computers and Society,28(2),26-28.
  34. Guillen, M.,Mele, D.,Murphy, P.(2002).European vs. American Approaches to Institutionalisation of Business Ethics: The Spanish case.Business Ethics: An European Review,11(2),167-178.
  35. Hafner, K.,Markoff, J.(1991).Cyberpunk: Outlaws and Hackers on the Computer Frontier.New York:Simon & Schuster.
  36. Haines, R.,Leonard, L. N. K.(2007).Situational Influences on Ethical Decision-making in an IT Context.Information & Management,44(3),313-320.
  37. Harrington, S.(1994).The Impact of Codes of Ethics on Information Systems Personnel.Special Interest Group on Computer Personnel Research Annual Conference Proceedings of the 1994 Computer Personnel Research Conference on Reinventing I.S.: Managing Information Technology in Changing Organizations,New York:
  38. Ho, D. Y. F.(1998).Interpersonal Relationships and Relationship Dominance: An Analysis Based on Methodological Relationalism.Asian Journal of Social Psychology,1(1),1-16.
  39. Ho, D. Y. F.,Chiu, C. Y.(1998).Collective Representations as a Metaconstruct: An Analysis Based on Methodological Relationalism.Culture and Psychology,4(3),349-369.
  40. Hofstede, G.(1997).Cultures and Organizations: Software of the Mind.New York:McGraw Hill.
  41. Hui, K. L.,Teo, H. H.,Lee, S. Y. T.(2007).The Value of Privacy Assurance: An Exploratory Field Experiment.MIS Quarterly,31(1),19-33.
  42. Hung, H.(2008).Normalized Collective Corruption in a Transitional Economy: Small Treasuries in Large Chinese Enterprises.Journal of Business Ethics,79(1-2),69-83.
  43. Hunt, S. D.,Wood, V.,Chonko, L.(1989).Corporate Ethical Values and Organizational Commitment in Marketing.Journal of Marketing,53(1),79-90.
  44. Hused, B. W.(2000).The Impact of National Culture on Software Piracy.Journal of Business Ethics,26(3),197-211.
  45. Hwang, K. K(1995).Knowledge and Action: A Social-Psychological interpretation of Chinese Cultural Tradition.Taipei:Sin-Li.
  46. Hwang, K. K.(2000).Chinese Relationlism: Theoretical Construction and Methodological Considerations.Journal for the Theory of Social Behaviour,30(2),155-178.
  47. Hwang, K. K.(1998).Two Moralities: Reinterpreting the Findings of Empirical Research on Moral Reasoning in Taiwan.Asian Journal of Social Psychology,1(3),211-238.
  48. Hwang, K. K.(1987).Face and Favor: The Chinese Power Game.American Journal of Sociology,92(4),944-974.
  49. IFIP Panel(1992).Towards an IFIP Frame Code of Ethics.Information Processing 92: Proceedings of the 12th World Computer Congress, Madrid Spain,North Holland:
  50. Jacobs, B. J.(1979).A Preliminary Model of Particularistic Ties in Chinese Political Alliances: 'Renqing' and 'Guanxi' in a Rural Taiwanese Township.China Quarterly,78,237-273.
  51. Jing, R.,Graham, J. L.(2008).Values versus Regulations: How Culture Plays Its Role.Journal of Business Ethics,80(4),791-806.
  52. Jose, A.,Thibodeaux, M. S.(1999).Institutionalization of Ethics: The Perspective of Mangers.Journal of Business Ethics,22(2),133-143.
  53. Kaptein, M.,Wempe, J.(1998).Twelve Gordian Knots When Developing an Organizational Code of Ethics.Journal of Business Ethics,17(8),853-869.
  54. Keith-Spiegel, P.,Koocher, G. P.(1985).Ethics in Psychology: Professional Standards and Cases.New York:Random House.
  55. Kim, U.(Ed.),Berry, J. W.(Ed.)(1993).Indigenous Psychologies: Research and Experience in Cultural Context.Newbury Park CA:Sage.
  56. King, A. Y.(1991).Kuan-his and Network Building: A Socialogical Interpretation.Deadalus,120,63-84.
  57. Klein, H. K.,Myers, M. D.(1999).A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems.MIS Quarterly,23(1),67-94.
  58. Lam, K. C.,Shi, G.(2008).Factors Affecting Ethical Attitudes in Mainland China and Hong Kong.Journal of Business Ethics,77(4),463-479.
  59. Lou, Y.(1997).Guanxi and Performance of Foreign-invested Enterprises in China: An Empirical Inquiry.Management International Review,37(1),51-70.
  60. Manley, W. J.(1991).Executive's Handbook of Model Business Conduct Codes.Englewood Cliffs NJ:Prentice-Hall.
  61. Martin, D. C.(1998).Deconstructing the ACM Code of Ethics and Professional Conduct.ACM SIGCSE Bulletin,30(4),8-9.
  62. Martin, D. C.(2001).Ethics @ .Coms: Why Internet Start-Ups Need Ethics Codes.ACM SIGCSE Bulletin,33(2),7-8.
  63. Mason, R. O.(1986).Four Ethical Issues of the Information Age.MIS Quarterly,10(1),5-12.
  64. McCabe, D. L.,Trevino, L. K.,Butterfield, K. D.(1996).The Influence of Collegiate and Corporate Codes of Conduct on Ethics-Related Behavior in the Workplace.Business Ethics Quarterly,6(4),461-476.
  65. McKinney, J. A.,Moore, C. W.(2008).Internaitonal Bribery: Does a Written Code of Ethics Make a Difference in Perceptions of Business Professionals.Journal of Business Ethics,79(1),103-111.
  66. Mele, D.,Debeljuh, P.,Arruda, M. C.(2006).Corporate Ethical Policies in Large Corporations in Argentina, Brazil and Spain.Journal of Business Ethics,63(1),21-38.
  67. Milberg, S. J.,Burke, S. J.,Smith, J. H.,Kallman, E. A.(1995).Rethinking Copyright Issues and Ethics on the Net: Values, Personal Information Privacy, and Regulatory Approaches.Communication of the ACM,38(12),65-73.
  68. Moores, T. T.(2008).An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates.Journal of Business Ethics,81(1),39-51.
  69. Moores, T. T.,Chang, J. C. J.(2006).Ethical Decision Making in Software Piracy: Initial Development and Test of A Four-Component Model.MIS Quarterly,30(1),167-180.
  70. Pearson, F. S.,Weiner, N. A.(1985).Criminology: Toward an Integration of Criminological Theories.The Journal of Criminal Law & Criminology,76(1),116-150.
  71. Provis, C.(2008).Guanxi and Conflicts of Interest.Journal of Business Ethics,79(1),57-68.
  72. Reichert, A. K.,Webb, M.,Thomas, E.(2000).Corporate Support for Ethical and Environmental Policies: A Financial Management Perspective.Journal of Business Ethics,25(1),53-64.
  73. Rhodes, M. L.(1986).Ethical Dilemmas in Social Work Practice.Milwaukee, WI:Family Service America.
  74. Robertson, C. J.,Gilley, K. M.,Bao, Y.(2008).A Cross-Cultural Comparison of Ethical Orientations and Willingness to Sacrifice Ethical Standards: China Versus Peru.Journal of Business Ethics,81(2),413-425.
  75. Robin, D.,Giallourakis, M.,David, F. R.,Moritz, T. E.(1989).A different look at codes of ethics.Business Horizons,32(1),66-73.
  76. Rosenberg, R. S.(1998).Beyond the Code of Ethics: The Responsibility of Professional Societies.ACM SIGCAS Computers and Society,28(2),18-25.
  77. Seligman, S. D.(1999).Guanxi: Grease for the Wheels of China.China Business Review,1999(Sep.-Oct.),34-38.
  78. Shapiro, S.(1994).Boundaries and Quandaries: Establishing a Professional Context for IT.Information Technology of People,7(1),48-68.
  79. Shin, S. K.,Ishman, M.,Sanders, G. L.(2007).An Empirical Investigation of Socio-Cultural Factors of Information Sharing in China.Information & Management,44(2),165-174.
  80. Shore, B.,Venkatachalam, A. R.,Solorzano, E.,Burn, J. M.,Hassan, S. Z.,Janczewski, L. J.(2001).Softlifting and Piracy: Behavior Across Cultures.Technology in Society,23(4),563-581.
  81. Sims, R. L.,Keon, T. L.(1999).Determinants of Ethical Decision Making: The Relationship of the Perceived Organizational Environment.Journal of Business Ethics,19(4),393-401.
  82. Singhapakdi, A.,Vitell, S. J.(1991).Analyzing the Ethical Decision Making of Sales Professionals.Journal of Personal Selling and Sales Management,11(1),1-12.
  83. Singhapakdi, A.,Vitell, S. J.(1990).Marketing Ethics: Factors Influencing Perceptions of Ethical Problems and Alternatives.Journal of Macromarketing,10(1),4-18.
  84. Siponen, M.,Vartiainen, T.(2004).Unauthorized Copying of Software and Levels of Moral Development: A Literature Analysis and Its Implications for Research and Practice.Information Systems Journal,14(4),387-407.
  85. Steidlmeier, P.(1993).The Moral Legitimacy of Intellectual Property Claims: American Business and Developing Country Perspectives.Journal of Business Ethics,12(12),157-164.
  86. Stevens, B.(2008).Corporate Ethical Codes: Effective Instruments for Influencing Behavior.Journal of Business Ethics,78(4),601-609.
  87. Strauss, A.,Corbin, J.(1990).Basics of Qualitative Research: Grounded Theory, Procedures, and Techniques.Newbury Park CA:Sage Publications.
  88. Su, C.,Littlefield, J. E.(2001).Entering Guanxi: A Business Ethical Dilemma in Mainland China.Journal of Business Ethics,33(3),199-210.
  89. Suen, H.,Cheung, S. O.,Mondejar, R.(2007).Managing Ethical Behaviour in Construction Organizations in Asia: How do the Teachings of Confucianism, Taoism and Buddhism and Globalization Influence Ethics Management?.International Journal of Project Management,25(3),257-265.
  90. Swinyard, W. R.,Rinne, H.,Kau, A. K.(1990).The Morality of Software Piracy: A Cross-Cultural Analysis.Journal of Business Ethics,9(11),655-664.
  91. Tian, Q.(2008).Perception of Business Bribery in China: the Impact of Moral Philosophy.Journal of Business Ethics,80(3),437-445.
  92. Tian, Z.,Gao, H.,Cone, M.(2008).A Study of the Ethical Issues of Private Entrepreneurs Participating in Politics in China.Journal of Business Ethics,80(3),627-642.
  93. Triandis, H. C.(1994).Culture and Social Behavior.New York:McGraw-Hill.
  94. Triands, H. C.(Ed.),Dunnette, M. D.(Ed.),Hough, L. M.(Ed.)(1994).Handbook of Industrial and Organizational Psychology.Palo Alto CA:Consulting Psychologists Press.
  95. Vitell, S. J.,Davis D. L.(1990).Ethical beliefs of MIS professionals: The frequency and opportunity for unethical behavior.Journal of Business Ethics,9(11),63-70.
  96. Vitell, S. J.,Nwachhukwu, S. L.,Barnes, J. H.(1993).The Effects of Culture on Ethical Decision-making: An Application of Hofstede's Typology.Journal of Business Ethics,12(12),753-760.
  97. Weiss, R. A.(1990).Self-Assessment.Communications of the ACM,33(11),110-132.
  98. Whitman, M. E.,Townsend, A. M.,Hendrickson, A. R.,Rensvold, R. B.(1998).Computer Aversion and Computer-use Ethics in U. S and Asian Cultures.The Journal of Computer Information Systems,4(1),19-24.
  99. Wiley, C.(2000).Ethical Standards for Human Resource Management Professionals: A Comparative Analysis of Five Major Codes.Journal of Business Ethics,25(2),93-114.
  100. Wood, G.,Svensson, G.,Singh, J.,Carasco, E.,Callaghan, M.(2004).Implementing the Ethos of Corporate Codes of Ethics: Australlia, Canada, and Sweden.Business Ethics: An European Review,13(4),15-26.
  101. Yang, K. S.Ed.、Wen, C. I.Ed.(1982)。The Sincization of Social and Behavioral Science Research in China。Taipei, R. O. C.:Academia Sinica。
  102. Yang, M. M. H.(1994).Gifts, Favors, and Banquets: The Art of Social relations in Chinese society.Ithaca NY:Cornell University.
  103. Zhuang, G.,Tsang, A. S. L.(2008).A Study on Ethically Problematic Selling Methods in China with a Broaden Concept of Gray-marketing.Journal of Business Ethics,79(1-2),85-101.
  104. Zhuang, G.,Xi, Y.,Tsang, A. S. L.(2010).Power, Conflict, and Cooperation: The Impact of Guanxi in Chinese Marketing Channels.Industrial Marketing Management,39(1),137-149.
  105. 呂伯雲(2010)。建構『電腦稽核人員專業倫理規範』之雙循環行動研究。電腦稽核期刊,22,136-147。
  106. 莊道明(1998)。我國學術資訊網路使用及資訊倫理教育之研究。圖書館學刊,13,169-197。
  107. 郭鴻志、宋鎧、李志宏(1994)。兩岸檔案交流在隱私權及取用權上之探討。海峽兩岸檔案暨微縮學術交流會論文集,台北:
  108. 楊中芳(1991)。回顧港、台「自我」研究:反省與展望。中國人‧中國心〔人格與社會篇〕,台北:
  109. 楊中芳(1990)。試論中國人道德思慮的發展:一個自我發展的觀點。道德教育論文集,香港:
  110. 楊中芳(1991)。試論中國人的「自己」:理論與研究方向。中國人‧中國心〔人格與社會篇〕,台北:
  111. 雷霆(1991)。「中國人的「自我」與「自己」:形上與形下」,新理與心理。中國人‧中國心〔人格與社會篇〕,台北:
  112. 賴苑玲(1998)。資訊網路時代國小圖書館利用教育發展的新方向。社會科教育研究,3,121-140。
  113. 鍾斌賢、張思恩、王晃三(1996)。溶入資訊工程之倫理教學經驗。通識教育季刊,3(2),69-81。
被引用次数
  1. 廖瑩、張玲星、吳盛(2017)。消費者線上團購意圖的剖析。Electronic Commerce Studies,15(1),47-82。
  2. 謝炎君、林栢章、林晏瑜、林玥秀(2016)。以Tenbrunsel and Smith-Crowe 倫理決策模型探討餐旅系學生之倫理察覺與決策行為。觀光休閒學報,22(3),251-276。