| 研究生: |
提姆康納 O'Connor, Timothy-Ross |
|---|---|
| 論文名稱: |
Privacy Awareness and Online Education: A Field Study into the Learning Effectiveness of Online Privacy Ethics Training on International Business Students in Taiwan Privacy Awareness and Online Education: A Field Study into the Learning Effectiveness of Online Privacy Ethics Training on International Business Students in Taiwan |
| 指導教授: |
陳正忠
Chen, Jeng-Chung |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 國際經營管理研究所碩士班 Institute of International Management (IIMBA--Master) |
| 論文出版年: | 2009 |
| 畢業學年度: | 97 |
| 語文別: | 英文 |
| 論文頁數: | 127 |
| 外文關鍵詞: | Online Education, Virtual Learning Environment, Cognitive Moral Reasoning, Information Privacy, Privacy Concerns, Privacy, Ethical Development, Computer-Mediated Communication, Learning Style Inventory, Constructivism, Perceived Learning Effectiveness, Ethics, Defining Issues Test, Privacy Training, Information Communication Technologies |
| 相關次數: | 點閱:128 下載:1 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
Corporations have suffered recently from a negative view of the ethics of its business practices. In the Information Technology field, this has lead to Corporate Social Responsibility policies including new “Green IT” initiatives. But ethical duties go beyond environmental responsibilities. Public concerns over the misuse of information in the modern world, especially with the exponential growth of information communication technologies, such as cyberspace, are being loudly expressed. Organizations must effectively train their IT staff in privacy issues. Managers of IT departments must be trained effectively and the universities where they are educated must also seek effective measures. This study will examine how factors, such as learning environment, learning activity, teaching pedagogy, curriculum development, and learning behavior, effect the efficient instruction of ethics. To do this, this study will measure their effects on the development of ethical reasoning, learning effectiveness, and their individual privacy concerns. This study found strengths and weaknesses with both integrated and non-integrated ethics instruction and a strong relationship between social interaction, context, and learning effectiveness.
Abrahamson, C. (1998). Issues in Interactive Communication in Distance Education. College Student Journal , 32 (1), 33-43.
Arbaugh, J. (2002). Managing the On-line Classroom: A study of technological and behavioral characteristics of web based MBA courses. Journal of High Technology Management , 13, 203-223.
Arnold, D., & Ponemon, L. A. (1991, Fall). Internal Auditors; Perceptions of Whistle-Blowing and the Influence of Moral Reasoning: An Experiment. Auditing: A Journal of Practice and Theory , 1-15.
Aron, C. (1999). On-line U. Across the Board , 26 (8), 62-66.
Badaracco, J. L., & R., E. R. (1989). Leadership and the Quest for Integraty. Boston: Harvard Business School Press.
Beetz, K. H. (1976). John Ruskin: A Bibliography, 1900-1974. Lanham, Maryland: Scarecrow Press.
Ben-Ze'ev, A. (2003). Privacy, emotional closeness, and openness in cyberspace . Computers in Human Behvior , 19, 451-467.
Brady, N., & Hart, D. (2007). An Exploration into the Developmental Psychology of Ethical Theory with Implications for Business Practice and Pedagogy. Journal of Business Ethics , 76 (4), 397-412.
Camp, L. J., & Y.T., C. (2000). The Internet as Public Space: Concepts, Issues, and Implications of Public Policy. Computers & Society , 30 (3), 13-19.
Carpenter, R. (1998). The Anywhere MBA. Canadian Business , 71, 62-67.
Cash, J., McFarlan, F., & McKenney, J. (1992). Corporate Information Systems Management: The Issues Facing Senior Executives (3rd ed.). Homewood, IL: Irwin.
Caudill, E. M., & Murphy, P. E. (2000). Consumer Online Privacy: Legal and Ethical Issues. Journal of Public Policy and Marketing , 19 (1), 72-86.
Cespedes, F. V., & Smith, H. J. (1993). Database Marketing: New Rules for Policy and Practice. Sloan Management Review , 34, 7-22.
Cho, H., & LaRose, R. (1999). Privacy Issues in Internet Surveys. Social Science Computer Review , 17 (4), 421-434.
Citera, M., Beaurgard, R., & Mitsuya, T. (2004). An Experimental Study of Cedibility in E-negotiations. Pyschologocial Marketing , 22 (2), 163-179.
Colby, A., & L., K. (1987). The Measurement of Moral Judgment (Vols. I-II). Cambridge: Cambridge University Press.
Cooper, T. M. (2005). Moral Judgement of Students Violating a University Disciplinary Code. Dissertation, The Florida State University, College of Education.
Culnan, M. J. (1993). How Did They Get My Name?: An Exploratory Investigation of Consumer Attitudes Towards Secondary Information Use. MIS Quarterly , 17 (3), 341-363.
Culnan, M. J. (2000). Protecting Privacy Online: Is Self-Regulation Working? Journal of Public Policy and Marketing , 19 (1), 20-26.
Dawson, S. (2006). A Study of the Relationship Between Student Communication Interaction and Sense of Community. The Internet and Higher Education , 9 (3), 153-162.
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents: measurement validity and a regression model. Behaviour & Information Technology , 23 (6), 413-422.
Equifax Inc. (1990). The Equifax Report on Consumers in the Information Age. Atlanta: Equifax Inc.
Falkenberg, A. W. (2004). When in Rome...Moral Maturity and Ethics for International Economic Organization. Journal of Business Ethics , 54, 17-32.
Ferrell, O. C., & Weaver, M. K. (1978, July). Ethical Beliefs of Marketing Managers. Journal of Marketing .
French, W. (2006). Business Ethics Training: Face to Face and at a Distance. Journal of Business Ethics , 66, 117-126.
Goldhaber, G. (1990). Organizational Communication. Dubuque, IA: Wm C. Brown.
Gotterbarn, D. (1999). Privacy Lost: The Net, autonomous agents, and 'virtual information'. Ethics and Information Technology , 1, 147-154.
Graber, M., D'eAlessandro, D., & Johnson-West, J. (2002). Reading Level of Privacy Policies on Internet Health Websites. The Journal of Family Practice , 51 (7), 642-645.
Hawk, T. F., & Shah, A. J. (2007). Using Learning Style Instruments to Enhance Student Leanring. Journal of Innovative Education , 5 (1), 1-16.
Hay, A., Hodgkinson, M., Peltier, J. W., & Drago, W. A. (2004). Interaction and Virtual Learning. Strategic Change , 13 (4), 193-204.
Hine, C., & Eve, J. (1998). Privacy in the Marketplace. Information Society , 14 (4), 253-262.
Hoffman, D. L., Novak, T. P., & Peralta, M. A. (1999). Information Privacy in the Marketspace: Implications for the Commercial Uses of Anonymity on the Web. Information Society , 15 (2), 129-139.
Hofstede, G. (1991). Cultures and Organizations. London: McGrawl-Hill Book Company.
Hsu, C.-w. J. (2006). Privacy concerns, privacy practices and web site categories: Toward a situational paradigm. Online Information Review , 30 (5), 569-586.
Jaju, A., Kwak, H., & M., Z. G. (2002). Learning Styles of Undergraduate Business Students: A Cross-Cultural Comparison Between the US, India, and Korea. Mrketing Education Review , 12 (2), 49-60.
Jonassen, D., Davidson, M., Collins, M., Campell, J., & Hagg, B. B. (1995). Constructivism and Computer-Mediated Communication in Distance Education. The American Journal of Distance Education , 9 (2), 7-26.
Kate, N. (1998). Women Want Privacy. American Demographics , 20 (1), 37.
Kling, R. (1978). Value Conflicts and Social Choices in Electronic Funds Transfer Systems Developments. Communications of the ACM , 21 (8), 642-657.
Kohlberg, L. (1976). Moral Stages and Moralization: the Cognitive Development Approach. In T. Lickona (Ed.), Moral Development and Behavior (pp. 31-55). New York: Holt, Rinehart and Winston.
Kohlberg, L. (1969). Stage and Sequence, Handbook of Socialization Theory and Research. Chicago: Rand McNally.
Kohlberg, L. (1975). The Cognitive-Developmental Approach to Moral Education. Phi Delta Kappan , 56, 670-677.
Kolb, D. A. (1984). Experiential Learning: Experience as a Source of Learning and Development. Englewood Cliffs, NJ: Prentice-Hall.
Kolb, D. A., Boyatzis, R. E., & Mainemelis, C. (2000). Perspectives on Cognitive . In S. R.J., & Z. L.F. (Eds.), Perspectives on Thinking, Learning, and Cognitive Styles (pp. 227-247). Mahwah, NJ: Lawrence Erlbaum.
Lally, l. (1996). Privacy versus Accessibility: The Impact of Situationally Conditioned Belief. Journal of Business Ethics , 15, 1221-1226.
Lan, G., Gowing, M., McMahon, S., Reiger, F., & King, N. (2008). A Study of the Relationship Between Personal Values and Moral Reasoning of Undergraduate Business Students. Journal of Business Ethics , 78 (1-2), 121-139.
Laudon, K. C. (1986). Markets and Privacy. Communications fo the ACM , 39 (9), 92-104.
Lemley, M. A. (2003). Place and Cyberspace. California Law Review , 91, 521.
Lewicki, R. J., Bruce, B., & Saunders, D. M. (2007). Essentials of Negotiation (Four ed.). New York, NY: McGrawl-Hill.
Lovell, A. (1995). Moral Reasoning and Moral Atmosphere in the Domain of Accounting. Accounting, Auditing, and Accountability Journal , 8 (3), 60-80.
Lowman, J., & V.A., M. (1993). What Should Graduate Teaching Assistants Know about Teaching? Teaching of Psychology , 29 (2), 84-88.
McKeachi, W. (1986). Teaching Tips: A Guibebook on for the Beginning Colege Teacher. Lexington, MA: D.C. Health.
Mehrabian, A. (2007). Non-Verbal Communication. Piscataway, NJ: Transaction Publishers.
Miller, A. (1982). Computers and Privacy. In W. M. Hoffman, & J. M. Moore (Eds.), Ethics and the Management of Computer Technology. Cambridge, MA: Oelgeschlager, Gunn and Hain Publishers Inc.
Milne, G. R., & Culnan, M. J. (2002). Using the Content of Online Privacy Notices to Inform Public Policy: A Longitudinal Analysis of the 1998-2001 U.S. Web Surveys. The Information Society , 18, 345-359.
Milne, G. R., & Rohm, A. J. (2000). Consumer Privacy and Name Removal Across Direct Marketing Channels: Exploring Opt-in and Opt-out Alternatives. Journal of Public Policy and Marketing , 19 (2), 238-249.
Milne, G., & Boza, M. (1999). Trust and Concern in Consumers' Perceptions of Marketing Information Management Practices. Journal of Interactive Marketing , 13 (1), 5-24.
Mintu-Wimsatt, A. (2001). Traditional Versus Technology Mediated Learning: a comparison of students' course evaluations. Marketing Education Review , 11 (2), 63-72.
Monga, M. (2007). Managers' Moral Reasoning: Evidence from large Indian manufacturing organizations. Journal of Business Ethics , 71 (2), 179-194.
Moor, J. H. (1997). Towards a Theory of Privacy in the Information Age. Computers and Society , 27 (3), 27-32.
Mowshowitz, A. (1976). The Conquest of Will. Reading, MA: Addison-Wesley.
Murphy, E. (2004). Recognizing and Promoting Collaboration in an Online Asynchronous Discussion. British Journal of Educational Technology , 35 (4), 421-431.
Nelson, R. R. (1991, December). Educational Needs as Perceived by IS and End-User Personnel: A Survey of Knowledge and Skill Requirements. MIS Quarterly , 503-525.
Niederman, F. B. (1991). Information Systems Management Issues for the 1990s. MIS Quarterly , 15 (4), 475-500.
O'Neil, D. (2001). Analysis of Internet Users' Level of Online Privacy Concerns. Social Science Computer Review , 19 (1), 17-31.
Ozdemir, S. (2008). E-learning's Effect on Knowledge: Can you download tacit knowledge? British Journal of Educational Technology , 39 (3), 552-554.
Penn, W. Y., & Boyd, C. D. (1985). Current Research in Moral Development as a Decision Support System. Journal of Business Ethics , 4, 131-136.
Pfeffer, J. (1992). Managing with Power: Politics and Influence in Organizations. Boston: Harvard Business School Press.
Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy and Marketing , 19 (1), 27-41.
Piaget, J. (1932). The Moral Judgment of the Child. New York: Free Press.
Ponemon, L., & Gabhart, D. R. (1990). Auditor Independence Judgments: A Cognitive Development Model and Experimental Evidence. Contemporary Accounting Research , 7 (1), 221-251.
Raab, C. D., & Mason, D. (2002). Privacy, Surveillance, Trust and regulation: A Series, Information. Communication & Society , 5 (2), 237-241.
Raab, C., & Bennett, C. J. (1998). The Distribution of Privacy Risks: Who Needs Protection. The Information Society , 14, 263-274.
Rahm, D. R. (1997). Going Remote: the use of distnace learning, the World Wide Web, and the Internet in graduate programmes of public affairs and administration. Public Productivity and Management Review , 20 (4), 459-471.
Rest, J. (1979). Defining Issues Test. Minneapolis, Minn.: University of Minnesota Press.
Rest, J. (1979). Development in Judging Moral Issues. Minneapolis: University of Minneapolis Press.
Rest, J., Narvaez, D., Bebeau, M., & Thoma, S. (1999). Postconventional Moral Thinking: A Neo-Kohlbergian Approach. Mahwah, N.J.: Lawrence Erlbaum Associates.
Richardson, W. (2006). Blogs, Wilis, Podcasts, and Other Powerful Tools for the Classrooms. Thousand Oaks, CA: Corwin Press.
Ryan, J. J. (2001). Moral Reasoning as a Determinant of Organizational Citizenship Behavirs: A Study in the Public Accounting Profession. Journal of Business Ethics , 12 (12), 901-918.
Saade, R. G., & Bahli, B. (2995). The impact of Cognitive Absorption on Perceived Usefulnes and Percieved Easy of Use in Online Learning: An Extension of the Technology Acceptance Model. Information Management , 42, 317-327.
Schwaig, K., Kane, G., & C., S. V. (2005). Pricay, Fair Information Practices and the Fortune 500: The Virtual Reality of Compliance. ACM SIGMIS Database , 36 (1), 49-63.
Shea, T. M. (2001, Nov/Dec). Internet-bases Distance Education: the administrator's perspective. Journal of Education for Business , 112-117.
Sheehan, K. B. (2002). Toward a Typology of internet Users and Online Privacy Concerns. The Information Society , 18, 21-32.
Singhapalcedi, A. C., & Vitell, S. (1996). Ethical Decision-making: An Investigation of Services Marketing Professions. Journal of Business Ethics , 15, 635-644.
Sitton, V. J. (2003, September/October). When the Right to Know and the Right to Privacy Collide. The Information Management Journal , 76-80.
Smith, H. J., Millberg, S. J., & Burke, S. J. (1996, June). Information Privacy: Measuring Individuals' Concern about Organizational Practices. MIS Quarterly , 167-196.
Smith, J. H., & Hasnas, J. (1999). Ethics and Information Systems: The Corporate Domain. MIS Quarterly , 21 (1), 109-127.
Snarey, J. (1985). Cross-Cultural Universality of Social-Moral Development: A Critical Review of Kohlbergian Research. 97, 202-232.
Sonner, B. (1999). Sucess in Capstone Business Course: assessinf the effectiveness of distance learning. Journal of Education for Business , 74, 243-247.
Stevens, B. (1997). Business Communication and the Ethical Context. (7th, Ed.) Effective Business Communication , 95-116.
Stevens, B. (1999). Communicating Ethcal Values: A study of Employee Perceptions. Journal of Business Ethics , 20, 113-120.
Stewart, A. K., & Segars, A. H. (2002). An Empirical Examination of the Concern for Information Privacy Instrument. Information Systems Research , 13 (1), 36-49.
Stone, E. F., Gardner, D. G., Gueutal, H., & McClure, S. (1983). A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations. Journal of Applied Psychology , 68 (3), 459-468.
Stone, E., & Stone, D. (1990). Privacy in Organizations: Theoretical Issues, Research Findings, and Protection Mechanisms. In M. a. Rowland, Research in Personal and Human Resources Management (8th ed., pp. 349-411). Greenwich, CT: JAI Press.
Sullivan, P. (2001). Gender Differences and the On-line Classroom: male and female college students evaluate their experiences. College Journal of Research and Practices , 25, 805-818.
Swan, K., & Shih, L.-F. (n.d.). On the Nature and Development of Social Presence in Online Course Discussions. Journal of Asynochronous Lwaerning Networks 2005, 115-136.
Tang, T., Chen, L.-P., & Chen, Y.-J. (2008). Intelligence Vs. Wisdom: The Love of Money, Machiavellianism, and Unethical Behavior across College Major and Gender. Journal of Business Ethics , 82 (1), 1-26.
Tavani, H. T. (2007). Ethics & Technology (Second Edition ed.). Hoboken, NJ: John Wiley & Sons, Inc.
Tavani, H. T., & Grodzinsky, F. S. (2002). Cyberstaking, Personal Privacy and Moral Responsibility. Ethics and Information Technology , 4, 123-132.
Trevino, L. K. (1992). Moral Reasoning and Business Ethics: Implications for Research, Education, and Management. Journal of Business Ethics , 11, 445-459.
Trevino, L., & Youngblood, S. A. (1990). Bad Apples in Bad Barrels: A Causal Analysis of Ethical Decision-Making Behavior. Journal of Applied Psychology , 75, 378-385.
Tsui, J., & Windsor, C. (2001). Some Cross-Cultural Evidence on Ethical Reasoning. Journal of Business Ethics , 31, 143-150.
Vygotsky, I. (1978). Mind in Society. Cambridge, MA: Harvard University Press.
Weber, J. (1990). Managers' Moral Reasoning: Assessing Their Responses to Three Moral Dilemmas. Human Relations , 43 (1), 687-702.
Webster J., H. P. (1997). Teaching Effectiveness in Technologically-Mediated Distance Learning. Academy of Management Journal , 40 (6), 128.
Weick, K. E., & L., B. D. (1986). Arguement and Narraration in Organizational Communication. Journal of Management , 12 (2), 243-259.
Werhane, P. H. (1998). Moral Imagination and the Search for Ethical Decision Making in Management. Business Ethics Quarterly Ruffin Series , 1, 75-98.
White, R. D. (1999). Organisational Design and Ethics: The Effects of Rigid Hierarchy on Moral Reasoning. International Journal of Organisational Theory and Behavior , 2, 431-456.
Whorf, B. (1956). Language, Thought, and Reality. Cambridge, MA: MIT Press.
Zviran, M. (2008, Summer). User's Perspectives on Privacy in Web-Based Applications. Journal of Computer Information Systems , 97-105.