Download Download PDF (2024)

(1)

PERCEPTION OF UNDERGRADUATES’ ABOUT COMPUTER

PERCEPTION OF UNDERGRADUATES’ ABOUT COMPUTER

PERCEPTION OF UNDERGRADUATES’ ABOUT COMPUTER

PERCEPTION OF UNDERGRADUATES’ ABOUT COMPUTER

111

1DEPARTMENT OF EDUCATION2

22

2DEPARTMENT OF EDUCATION,MOHI

EEE

E----mmmmailailailail addressesaddressesaddressesaddresses

ABSTRACTABSTRACTABSTRACTABSTRACT CCC

Computer and internet has omputer and internet has omputer and internet has omputer and internet has brought innovative changes inbrought innovative changes inbrought innovative changes inbrought innovative changes in

computer and IT related courses have recently been included as compulsory subjects in all disciplines at undergraduate computer and IT related courses have recently been included as compulsory subjects in all disciplines at undergraduate computer and IT related courses have recently been included as compulsory subjects in all disciplines at undergraduate computer and IT related courses have recently been included as compulsory subjects in all disciplines at undergraduate level. Therefore,

level. Therefore, level. Therefore,

level. Therefore, it was important to know the perceptual understanding it was important to know the perceptual understanding it was important to know the perceptual understanding it was important to know the perceptual understanding undergraduate students about the

undergraduate students about theundergraduate students about the

undergraduate students about the ethical use of ethical use of ethical use of ethical use of students

students students

students from four different universities from four different universities from four different universities from four different universities demographic information.

demographic information. demographic information.

demographic information. Overall, Overall, Overall, Overall, the results were not very highly appreciated regarding the awareness the results were not very highly appreciated regarding the awareness the results were not very highly appreciated regarding the awareness the results were not very highly appreciated regarding the awareness and IT ethics

and IT ethicsand IT ethics

and IT ethics. But teachers from private. But teachers from private. But teachers from private. But teachers from private

universities were found perceptually more positive than to others.universities were found perceptually more positive than to others.universities were found perceptually more positive than to others.universities were found perceptually more positive than to others.training is needed for

training is needed for training is needed for

training is needed for all the stakeholders of all all the stakeholders of all all the stakeholders of all all the stakeholders of all

Keywords:Keywords:Keywords:

Keywords: computer ethics, undergraduate perceptions, IT ethics, IT ethics awareness, cyber ethics

1. 1. 1.

1. INTRODUCTIONINTRODUCTIONINTRODUCTIONINTRODUCTION

Ethics is the question of right and wrong in human conduct [4, 16] and computer ethics are the ethics regarding the use of computer and IT

same context [30] explained that ‘computer ethics deals with how to make moral decisions while using technology whether in workplace or in society in general’. Advancement in information and communication technologies (ICTs) has

the users [23] and their frequent accessutilization increased the chance of unethical

these resources. These unethical uses may harm individuals or even societies. These activities may include hacking, spam, denial of service attacks, identity theft, unauthorized duplication of softwaredigital plagiarism and improper uses of digital resources [1, 3, 5, 18, 25].

Iskandarani, El-Refae and El-Etter

explained that internet – in the very beginning two simple rules i.e., anyone could say anything and nothing was official. This was the best method of finding solid solutions for technical problems. But it was miss-interpreted and now there are networks, forums and websites where anarchy

were categorized and explained by

PERCEPTION OF UNDERGRADUATES’ ABOUT COMPUTER

PERCEPTION OF UNDERGRADUATES’ ABOUT COMPUTER

PERCEPTION OF UNDERGRADUATES’ ABOUT COMPUTER

PERCEPTION OF UNDERGRADUATES’ ABOUT COMPUTER

ETHICS

ETHICS

ETHICS

ETHICS IN PAKISTAN

IN PAKISTAN

IN PAKISTAN

IN PAKISTAN

M

M

M

M.... Jamil

Jamil

Jamil

Jamil

1,1,1,1,****

and J

and J.... H

and J

and J

H

H

H.... Shah

Shah

Shah

Shah

2222

DUCATION,BAHAUDDIN ZAKARIYA UNIVERSITY,MULTAN,

OHI-UD-DIN ISLAMIC UNIVERSITY,AZAD JAMMU AND K

addressesaddressesaddresses

addresses:::: 1111 mubashrahj@gmail.com , 2222 jamilshah@email.com

brought innovative changes inbrought innovative changes inbrought innovative changes in

brought innovative changes in education all over the worldeducation all over the worldeducation all over the worldeducation all over the world. In the universities of Pakistan, . In the universities of Pakistan, . In the universities of Pakistan, . In the universities of Pakistan, computer and IT related courses have recently been included as compulsory subjects in all disciplines at undergraduate computer and IT related courses have recently been included as compulsory subjects in all disciplines at undergraduate computer and IT related courses have recently been included as compulsory subjects in all disciplines at undergraduate computer and IT related courses have recently been included as compulsory subjects in all disciplines at undergraduate

it was important to know the perceptual understanding it was important to know the perceptual understanding it was important to know the perceptual understanding

it was important to know the perceptual understanding and awareness of university teand awareness of university teand awareness of university teand awareness of university teethical use of

ethical use of ethical use of

ethical use of computer and computer and computer and incomputer and inininternetternetternet through a surveyternetthrough a surveythrough a surveythrough a survey.... A tA tA tA tfrom four different universities

from four different universities from four different universities

from four different universities participated in the study and the results were interpreted on the bases of their participated in the study and the results were interpreted on the bases of their participated in the study and the results were interpreted on the bases of their participated in the study and the results were interpreted on the bases of their the results were not very highly appreciated regarding the awareness

the results were not very highly appreciated regarding the awareness the results were not very highly appreciated regarding the awareness the results were not very highly appreciated regarding the awareness . But teachers from private

. But teachers from private. But teachers from private

. But teachers from private sectorsectorsectorsector universituniversituniversituniversities ies ies and male students from both private and public sector ies and male students from both private and public sector and male students from both private and public sector and male students from both private and public sector universities were found perceptually more positive than to others.

universities were found perceptually more positive than to others.universities were found perceptually more positive than to others.

universities were found perceptually more positive than to others. IIIIt was t was t was t was recommendedrecommendedrecommended that computer ethics awareness recommendedthat computer ethics awareness that computer ethics awareness that computer ethics awareness all the stakeholders of all

all the stakeholders of all all the stakeholders of all

all the stakeholders of all universituniversituniversitiesuniversitiesiesies. . . .

computer ethics, undergraduate perceptions, IT ethics, IT ethics awareness, cyber ethics

Ethics is the question of right and wrong in human and computer ethics are the ethics regarding the use of computer and IT [10, 21]. In the explained that ‘computer ethics deals with how to make moral decisions while using technology whether in workplace or in society in in information and has empowered and their frequent accessibility and unethical use of unethical uses may harm individuals or even societies. These activities may hacking, spam, denial of service attacks, identity theft, unauthorized duplication of software, digital plagiarism and improper uses of digital

Etter[12] critically in the very beginning – has two simple rules i.e., anyone could say anything and nothing was official. This was the best method of problems. But it there are networks, forums and websites where anarchy reigns. These were categorized and explained by [24, 27] which

presented architecture for teaching computer ethics online. They quoted from Forester and Mor

following seven categories of unethical uses or abuses of ICTs: computer crime and computer security, software theft and intellectual property rights, computer hacking and creating of viruses

and information systems failure; invasion of

the social implications of artificial intelligence and expert systems; and workplace computerization. handle these problems,

identifying the meaning of computer and IT ethics by the users; discuss ethical problems by considering each other’s point of view; then explain the

problems in terms of real life problems; create a situation for them and then analyze how they woulbe able to provide the solution of the problem.

Data processing and sharing of information are basic characteristics of computer and information technologies [7] which are

utilization of the same resources. or IT ethics’ applicationauthors expressed and anexample:

Article [28] expressed that

about copyright laws and ethical issues regarding the Copyright© Faculty of Engineering, University of Nigeria, Nsukka, ISSN: 1115

http://dx.doi.org/10.4314/njt.v33i4.12

PERCEPTION OF UNDERGRADUATES’ ABOUT COMPUTER

PERCEPTION OF UNDERGRADUATES’ ABOUT COMPUTER

PERCEPTION OF UNDERGRADUATES’ ABOUT COMPUTER

PERCEPTION OF UNDERGRADUATES’ ABOUT COMPUTER AN

AN

AN

AND

D

D

D INTERNET

INTERNET

INTERNET

INTERNET

,PAKISTAN

KASHMIR, PAKISTAN

jamilshah@email.com

. In the universities of Pakistan, . In the universities of Pakistan, . In the universities of Pakistan, . In the universities of Pakistan, computer and IT related courses have recently been included as compulsory subjects in all disciplines at undergraduate computer and IT related courses have recently been included as compulsory subjects in all disciplines at undergraduate computer and IT related courses have recently been included as compulsory subjects in all disciplines at undergraduate computer and IT related courses have recently been included as compulsory subjects in all disciplines at undergraduate

and awareness of university teand awareness of university teand awareness of university te

and awareness of university teachers and achers and achers and achers and A t

A tA t

A total otal otal of otal of of of 378 teachers and 378 teachers and 378 teachers and 378 teachers and 643 643 643 643 participated in the study and the results were interpreted on the bases of their participated in the study and the results were interpreted on the bases of their participated in the study and the results were interpreted on the bases of their participated in the study and the results were interpreted on the bases of their the results were not very highly appreciated regarding the awareness

the results were not very highly appreciated regarding the awareness the results were not very highly appreciated regarding the awareness

the results were not very highly appreciated regarding the awareness about computer about computer about computer about computer and male students from both private and public sector and male students from both private and public sector and male students from both private and public sector and male students from both private and public sector that computer ethics awareness that computer ethics awareness that computer ethics awareness that computer ethics awareness

computer ethics, undergraduate perceptions, IT ethics, IT ethics awareness, cyber ethics

presented architecture for teaching computer ethics online. They quoted from Forester and Morrison the following seven categories of unethical uses or abuses of ICTs: computer crime and computer security, software theft and intellectual property rights, computer hacking and creating of viruses; computer and information systems failure; invasion of privacy; the social implications of artificial intelligence and expert systems; and workplace computerization. To handle these problems, authors suggested for identifying the meaning of computer and IT ethics by the users; discuss ethical problems by considering each other’s point of view; then explain the ethical problems in terms of real life problems; create a situation for them and then analyze how they would be able to provide the solution of the problem.

Data processing and sharing of information are basic characteristics of computer and information which are also the roots of unethical lization of the same resources. Regarding computer or IT ethics’ applications in education different authors expressed and analyzed differently. For

] expressed that there are misconceptions about copyright laws and ethical issues regarding the

Copyright© Faculty of Engineering,University of Nigeria, Nsukka, ISSN: 1115-8443

www.nijotech.com

(2)

PPP

PERCEPTION OERCEPTION ERCEPTION ERCEPTION OOOF F F F UUUUNDERGRADUATESNDERGRADUATESNDERGRADUATESNDERGRADUATES’’’’ AABOUT AABOUT BOUT BOUT CCCCOMPUTER OMPUTER OMPUTER OMPUTER AAAAND ND ND ND IIIINTERNET NTERNET NTERNET NTERNET EEEETHICS THICS IIIIN THICS THICS N N N PPPPAKISTANAKISTANAKISTANAKISTAN,,,, M. Jamil &M. Jamil M. Jamil M. Jamil &&& J. H. ShahJ. H. ShahJ. H. ShahJ. H. Shah

Nigerian Journal of Technology, Nigerian Journal of Technology, Nigerian Journal of Technology,

Nigerian Journal of Technology, Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014

513

use of computer among students, therefore, it would

be effectiveness to include this in curriculum; it was confirmed by [25] and added that computer and IT are widely being used in educational settings, it seems reasonable and necessary to include computer and IT ethics in curriculum [19]; related to these two papers, it was studied the differences between plagiarism acts from printed sources and internet sources[2]. They revealed that the students were unable to distinguish printed and internet sources because they perceived the information on the internet was free for use. In this regard they suggested treating potential information sources separately in research, in order to gain a full understanding of the phenomenon. They highlighted:

a) Perfect students' insights regarding the ethical use of online information;

b) teach them how to cite internet sources properly and

c) explain the importance of protecting intellectual property rights.

By doing so, universities can reduce the extent of plagiarism, and particularly internet plagiarism, committed by students; students from different disciplines are using computers as research tools and to communicate with friends and colleagues[3]; therefore, it is very important to educate them meaningfully to use these resources effectively and properly; students’ ethical attitudes were surveyed towards computer use, it was found that the median rank for all activities is in the range of somewhat unethical to very unethical[18]. Personal use of software or downloads was judged more as being just somewhat unethical as was hacking into a computer system for reasons of intellectual curiosity [17]. Malicious activity was judged primarily in the unethical to very unethical range [6, 22]. Accessing other peoples records, changing code for personal gain and causing reduced response time for a company that was believed to exploit its workers and was unfriendly to the environment was viewed no more negatively than the same activity performed without malicious intent [30]. On the other hand, teaching of computer ethics to students will raise the awareness and understanding among them which will ultimately affect the effective utilization of computer and IT tools[13]; it was highlighted and focused by [5] that plagiarism, copyright and software theft, hacking, improper use of computer resources, and harassment are the common practices among teachers and students from higher educational institutions; in the

same directions [29] found in their studies that students of elementary level believe that software piracy is a legal act.

According to [11], ‘ICT received a significant amount of attention from ethicists as well as sociologists, anthropologists, and scholars in law, education, and communication studies. Recently, computer ethics broadened to ethics of information technology and information ethics, a more general field that includes computer ethics, media ethics, library ethics, and bio-information ethics’. Computer and IT ethics studies have been conducted in developed countries; however under developed countries are in the process of identifying the importance and role and establishing the culture about the ethical use of computer and IT. Pakistan is one of the under developed countries where Government is spending a significant amount of resources to improve the quality of education at all levels but especially at higher educational institutions. There have been many significant developments and changes in teaching and learning techniques and resources. It was surveyed by [15] that teachers are preparing lectures and notes (i.e., by downloading materials from internet), constructing question papers online, emailing assignments online, online marking of assignments and answer sheets, declaring students results online, using email to send and receive feedback to/from students and also providing CDs and web links related to course content to students in the classrooms. Authors of the same study further explained that basic IT resources i.e., computer, printer and internet are provided to all teachers in their offices. Each department / or discipline has their own computer lab for students. Moreover, trainings are being provided to teachers and students to utilize these resources effectively by the Higher Education Commission, Pakistan. It was observed and experienced by the authors of the current study that recently, all public and private sector universities have included compulsory courses related to the training of computer and internet in all the disciplines of undergraduate studies. This increased use of computer and internet across the curriculum compels our teachers and students to be knowledgeable about computer and IT ethics.

(3)

Nigerian Journal of Technology, Nigerian Journal of Technology, Nigerian Journal of Technology,

Nigerian Journal of Technology, Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014

514

teaching - learning activities that require sound

knowledge and professional understanding – in the absence of which – may have negative impact on learning. By addressing computer ethics within the context of teaching profession, not only expose the level of awareness among the teachers and students but will also bring attention of higher authorities to train teachers and students in this particular direction as well, so that the C&IT resources provided by the government could be utilized properly and effectively.

2. RESEARCH QUESTIONS2. RESEARCH QUESTIONS2. RESEARCH QUESTIONS2. RESEARCH QUESTIONS

Following research questions were formulated for the study:

Q1: whether sampled teachers and undergraduate students have same ethical believes?

Q2: whether sampled teachers in Public and Private Universities have same ethical believes?

Q3: whether undergraduate students in Public and Private Universities have same ethical believes? Q4: whether male and female teachers in Public and

Private Universities have same ethical believes? Q5: whether male and female students in Public and

Private Universities have same ethical believes?

3. METHODOLOGY3. METHODOLOGY3. METHODOLOGY3. METHODOLOGY 3

33

3.1 .1 .1 Tool of the Study.1 Tool of the StudyTool of the StudyTool of the Study

Study was descriptive; therefore, a self-reported questionnaire was designed to collect data from teachers and undergraduate students during the semesters of 2011–12 from two public and two private sector. The research was greatly inspired by the studies of [8], [20] and [26]. Two parts of the questionnaire were designed to solicit responses. Part – I was designed to collect demographic information which included: university and gender (see Fig. 1 – 4). Information regarding the prior knowledge and training of IT and IT ethics were also inquired in this section of the questionnaire. While, Part – II was comprised of 16 statements in which respondents were required to respond for the given statement in terms of Right, Wrong and Neither Right Nor Wrong. All statements were presenting some activities/ conditions related to the ethical use of computer and internet; which helped to portray their awareness about the ethical use of computer or IT.

333

3.2 .2 .2 Data Analysis.2 Data AnalysisData AnalysisData Analysis

The scale was rated from 1 to 3 i.e., 1 = Right, 2 = Wrong and 3 = Neither Right Nor Wrong (NRNW). The collected responses were fed in MS Excel 2007©

and were analyzed demographically. Statistically, frequencies and percentages were calculated to conclude the results. The Cronbach Alpha test was used to measure the reliability of the items in the tool. Result of the reliability test was 0.73, and hence was acceptable [9].

333

3.3 .3 .3 .3 Sampling andSampling andSampling andSampling and RespondentsRespondentsRespondentsRespondents

All the four universities were delimited on the bases of convenience based sampling. Regarding the private sector universities, only those were included in the study, which were recognized as degree awarding institution by Higher Education Commission Pakistan. Another delimitation of the study was those undergraduate students who were in semesters 3 and 4 during January – December 2012; which constituted the population of this study. These semesters were delimited because basic computer and internet training courses were compulsory for all students in these two semesters. The questionnaires were distributed among the students within their classrooms and teachers were traced within their offices to ensure the maximum feedback, which resulted for 643 students and 378 teachers. Therefore, 643 students and 378 teachers were considered to be the sample of the study.

Figures 1 and 2 showed the overall presentation of sampled teachers and students from both public sector and private sector universities. It was interpreted from the data that both teachers and students from public sector universities were greater in terms of percentages.

Figure 3 exhibited the gender wise distribution of the sampled teachers. It was portrayed that overall male teachers’ responses were greater than that of female teachers. Same situation was found in case of private sector universities teachers.

Figure 1: Overall Sampled Teachers

222, 59%156, 41

%

Pub. Uni.

(4)

PPP

PERCEPTION ERCEPTION ERCEPTION ERCEPTION OOOOF F F F UUUUNDERGRADUATESNDERGRADUATESNDERGRADUATESNDERGRADUATES’’’’ AAAABOUT BOUT BOUT BOUT

Nigerian Journal of Technology, Nigerian Journal of Technology, Nigerian Journal of Technology, Nigerian Journal of Technology, Figure 2: Sampled Students

Figure 3: Gender wise distribution of sampled Teachers

Figure 4: Gender wise distribution of sampled Students

Table 1: Responses of Overall Sampled Teachers and Students

Sr.

No. Statements

2. Downloading music or movies from net is:

3.

Information about ethical use of computer and technology is important:

349, 54%294, 46

%

BOUT BOUT BOUT

BOUT CCCCOMPUTER OMPUTER OMPUTER OMPUTER AAND AAND ND ND IIIINTERNET NTERNET NTERNET NTERNET EEEETHICS THICS IIIIN THICS THICS N N N PPPPAKISTANAKISTANAKISTANAKISTAN,,,,

Nigerian Journal of Technology, Nigerian Journal of Technology, Nigerian Journal of Technology,

Nigerian Journal of Technology, Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Figure 2: Sampled Students

: Gender wise distribution of sampled

: Gender wise distribution of sampled

Figure 4 demonstrated the gender wise distribution of the sampled students. It was

female students’ participation was greater than that of male students. Same situation was found in case of public sector universities.

Moreover, it was found that total 53% teachers admitted that they have no IT training certificate.the other hand 56% teachers and 58% students disclosed that they have no prior knowledge about IT and computer ethics.

4. RESULTS4. RESULTS4. RESULTS4. RESULTS

Q1: whether sampled teachers and Q1: whether sampled teachers and Q1: whether sampled teachers and Q1: whether sampled teachers and

students in Public and Private Sector Universities students in Public and Private Sector Universities students in Public and Private Sector Universities students in Public and Private Sector Universities have same ethical belie

have same ethical beliehave same ethical beliehave same ethical belie

Form Table 1 it was depicted that

teachers (99%, n=375) and students (75%

strongly believe that knowledge about ethical use of computer and IT is important for all

statement 2, 66% (n=250)

downloading music or movies from internet free of cost is NRNW while 41%

this is not an ethical issueteachers and 66% (n=304)

that buying a paper online and submitting it as your own is an unethical activity

overall sampled teachers and students were found in statements 6, 10 and 13. In statement 6, 55%

teachers expressed that it is author during lecture while 66%

understand that it is wrong to explain a topic without quoting the real author during presentation.

90% (n=342) teachers and 52%

that it is important to quote authors even pasting a single sentence from online

Overall 65% (n=413) students said it is true that cheap access of computer and IT tools is one of the reasons for unethical utilization of computer and IT resources students but 72%

believe on this.

: Responses of Overall Sampled Teachers and Students – Part II of the QuestionnaireOverall Teachers (n=378) Overall Students

Right Wrong NRNW Right

or movies from

34 94 250 261

375 - 3 481

Pub. Uni.

Pvt. Uni

M. Jamil M. Jamil M. Jamil M. Jamil &&&& J. H. ShahJ. H. ShahJ. H. ShahJ. H. Shah

Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014

515

Figure 4 demonstrated the gender wise distribution of the sampled students. It was portrayed that overall female students’ participation was greater than that of male students. Same situation was found in case of

Moreover, it was found that total 53% teachers admitted that they have no IT training certificate. On the other hand 56% teachers and 58% students disclosed that they have no prior knowledge about IT

Q1: whether sampled teachers and Q1: whether sampled teachers and Q1: whether sampled teachers and

Q1: whether sampled teachers and undergraduate undergraduate undergraduate undergraduate students in Public and Private Sector Universities students in Public and Private Sector Universities students in Public and Private Sector Universities students in Public and Private Sector Universities have same ethical belie

have same ethical beliehave same ethical beliehave same ethical believes?ves?ves? ves?

it was depicted that overall sampled ) and students (75%, n=481) strongly believe that knowledge about ethical use of computer and IT is important for all. Regarding (n=250) teachers believe that downloading music or movies from internet free of while 41% (n=229) students believe this is not an ethical issue; 76% (n=286) of the (n=304) of the students expressed that buying a paper online and submitting it as your s an unethical activity. Major differences among overall sampled teachers and students were found in In statement 6, 55% (n=207) teachers expressed that it is NRNW to quote every author during lecture while 66% (n=422) students erstand that it is wrong to explain a topic without quoting the real author during presentation. Similarly, and 52% (n=332) expressed important to quote authors even copying and a single sentence from online resources. students said it is true that cheap access of computer and IT tools is one of the reasons for unethical utilization of computer and IT resources students but 72% (n=271) teachers do not

Part II of the Questionnaire Overall Students (n=643)

Wrong NRNW

153 229

(5)

Nigerian Journal of Technology, Nigerian Journal of Technology, Nigerian Journal of Technology,

Nigerian Journal of Technology, Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014

516

Sr.

No. Statements

Overall Teachers (n=378) Overall Students (n=643)

Right Wrong NRNW Right Wrong NRNW

4. Buying a paper online and

submitting it as your own is: 57 286 35 188 304 151

6.

Explaining a topic during lecture/presentation without quoting the author is:

51 120 207 99 422 122

10.

Copying and pasting one sentence from an online source, in your research work, without acknowledging the source is:

23 342 13 119 332 192

11.

Downloading diagrams or illustrations from web sites with complete reference is:

293 63 22 127 288 228

13.

Economically cheap access of computer and technology makes it easier to perform different wrong activities:

69 271 38 413 93 137

Q2: whether Q2: whether Q2: whether

Q2: whether sampledsampledsampledsampled teachers in Public and Private teachers in Public and Private teachers in Public and Private teachers in Public and Private Sector Universities have same ethical believes?

Sector Universities have same ethical believes?Sector Universities have same ethical believes?Sector Universities have same ethical believes?

From Table 2 it was found that 52% (n=114) teachers from public universities expressed that it is not an unethical issue to share original software for educational purposes while 71% (n=110) teachers from private universities strictly expressed that this is wrong; 74% (n=164) public sector 55% (n=86) private sector teachers expressed that it is NRNW to download music and movies; 54% (n=119) public sector while 65% (n=102) while private sector teachers were unable to decide whether it is right or wrong to download and use online research tools without quoting the real author; 56% (n=125) public sector and 66% (n=104) private sector teachers believe that it is wrong to including references in bibliography list without quoting them in the main text; and 64% (n=143) teachers public universities believe that sharing and solve research or subject related problems through on line chatting is ethically right while teachers from private sector universities’ responses were unable to decide whether it is right or wrong.

Q3: whether undergraduate students from Public andQ3: whether undergraduate students from Public andQ3: whether undergraduate students from Public andQ3: whether undergraduate students from Public and

Private Sector Universities have same ethical Private Sector Universities have same ethical Private Sector Universities have same ethical Private Sector Universities have same ethical believes?

believes?believes?believes?

From Table 3 it was disclosed that 62% each from public (n=218) and private (n=182) sector university students expressed that it is right to copy original software for education purpose; 70% (n=245) public sector and 60% (n=177) students from private universities believe that it is ethically wrong to explain

a topic without quoting the real authors; 60% (n=211) students of public sector understands that it is ethically wrong to use an online research tool without getting permission is ethically wrong but students from private universities were unable to decide whether it is right or wrong; students from both sides were not clear about statements 11, 12, 14 and 16. These results reflect that they have poor knowledge about ethical utilization of computer and IT resources.

Q4: whether male and female teachers in Public and Q4: whether male and female teachers in Public and Q4: whether male and female teachers in Public and Q4: whether male and female teachers in Public and Private Sector Universities have same ethical Private Sector Universities have same ethical Private Sector Universities have same ethical Private Sector Universities have same ethical believes?

believes?believes?believes?

From Table 4 it was explored that 100% teachers from both public (n=107) and private (n=115) universities understands the importance of information regarding ethical use of technological resources in education; 67% (n=72) male and 80% (n=92) female teachers of public universities marked on NRNW in the response of the activity to download music or movies available online; 70% (n=74) male and 76% (n=87) female believe it is ethically wrong to copy and paste any online essay/research paper or any topic related to their subject and present as it their own; responses of statements 9, 12 and 16 from both male and female teachers responses were not supportive to decide about their awareness; but 91% (n=105) female teachers expressed that sharing original software with friends is ethically right.

(6)

PPP

PERCEPTION OERCEPTION ERCEPTION ERCEPTION OOOF F F F UUUUNDERGRADUATESNDERGRADUATESNDERGRADUATESNDERGRADUATES’’’’ AABOUT AABOUT BOUT BOUT CCCCOMPUTER OMPUTER OMPUTER OMPUTER AAAAND ND ND ND IIIINTERNET NTERNET NTERNET NTERNET EEEETHICS THICS IIIIN THICS THICS N N N PPPPAKISTANAKISTANAKISTANAKISTAN,,,, M. Jamil &M. Jamil M. Jamil M. Jamil &&& J. H. ShahJ. H. ShahJ. H. ShahJ. H. Shah

Nigerian Journal of Technology, Nigerian Journal of Technology, Nigerian Journal of Technology,

Nigerian Journal of Technology, Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014

517

purpose is ethically right; 58% (n=53) male and 51%

(n=33) female teachers responded that it is NRNW to download music or movies file from net; and 100% (n=91) male and 65% (n=56) female teachers

expressed that copying and pasting a single line from a web page is NRNW activity.

Table 2: Responses of Sampled Teachers from Public (n=222) and Private (n=156) Universities Sr.

No. Statements

Teachers from Public Uni. Teachers from Private Uni.

Right Wrong NRNW Right Wrong NRNW

1. Copying original software for

education purposes is: 114 34 8 39 110 7

2. Downloading music or movies from

net is: 12 46 164 22 48 86

7.

Downloading and using a research tool for your own research work but ignoring the real author is:

24 79 119 20 34 102

8.

Listing web sites that you do not use to complete a research paper in the bibliography is:

48 125 49 31 104 21

9.

Copying two lines from a printed source, in your research work, without acknowledging the source is:

47 123 52 36 90 30

12. Using internet chat rooms to ask

about your subject is: 112 36 74 60 35 61

14. Unauthorized sharing of original

software with friends is: 143 57 22 94 31 31

16.

Writing a summary based on an online abstract of a journal article rather than reading the article itself:

90 56 76 80 34 42

Table 3: Responses of Sampled Students from Public (n=349) and Private (n=294) Universities

Sr.

No. Statements

Students from Public Uni. Students from Private Uni.

Right Wrong NRNW Right Wrong NRNW

1. Copying original software for

education purposes is: 218 58 73 182 54 58

6.

Explaining a topic during lecture/presentation without quoting the author is:

46 245 58 53 177 64

7.

Downloading and using a research tool for your own research work but ignoring copy right acts is:

48 211 90 72 143 79

11.

Downloading diagrams or illustrations from web sites with complete reference is:

73 164 112 54 124 116

12. Using internet chat rooms to ask

about your subject is: 87 161 101 112 83 99

14. Unauthorized sharing of original

software with friends is: 194 83 72 135 71 88

16.

Writing a summary based on an online abstract of a journal article rather than reading the article itself:

(7)

Nigerian Journal of Technology, Nigerian Journal of Technology, Nigerian Journal of Technology,

Nigerian Journal of Technology, Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014

518

T

TT

Table 4: Responses of Male (n=107) and Female (n=115) Teachers from Public Universities

Sr.

No. Statements

Male Teachers Female Teachers

Right Wrong NRNW Right Wrong NRNW

2. Downloading music or movies

from net is: 4 31 72 8 15 92

3.

Information about ethical use of computer and technology is important:

107 - - 115 - -

5.

Copying and pasting an essay from the Internet and submitting it as your own is:

24 74 9 17 87 11

9.

Copying two lines from a printed source, in your research work, without acknowledging the source is:

26 58 23 21 65 29

12. Using internet chat rooms to

ask about your subject is: 52 18 37 60 18 37

14.

Unauthorized sharing of original software with friends is:

38 57 12 105 - 10

16.

Writing a summary based on an online abstract of a journal article rather than reading the article itself:

46 27 34 44 29 42

Table 5: Responses of Male (n=91) and Female (n=65) Teachers from Private UniversitiesSr.

No. statements

Male Teachers Female Teachers

Right Wrong NRNW Right Wrong NRNW

1. Copying original software for

education purposes is: 66 17 8 48 17 -

2. Downloading music or movies

from net is: 8 30 53 14 18 33

4. Buying a paper online and

submitting it as your own is: 21 62 8 9 50 6

7.

Downloading and using a research tool for your own research work but ignoring copy right acts is:

17 13 61 3 21 41

10.

Copying and pasting one sentence from an online source, in your research work, without acknowledging the source is:

- - 91 7 2 56

13.

Economically cheap access of computer and technology makes it easier to perform different wrong activities:

29 51 11 2 53 10

Q5: whether male and female Q5: whether male and female Q5: whether male and female

Q5: whether male and female studentsstudentsstudentsstudents in Public and in Public and in Public and in Public and Private Sector Universities have same ethical Private Sector Universities have same ethical Private Sector Universities have same ethical Private Sector Universities have same ethical believes?

believes?believes?believes?

Table 6 portrayed that 59% (n=95) male and 66% (n=123) female students from public sector universities believed that copying original software for educational purposes is ethically right activity; regarding statement 2 their responses were apparently scattered and were not supportive to make any decision regarding their awareness but majority

(8)

PPP

PERCEPTION OERCEPTION ERCEPTION ERCEPTION OOOF F F F UUUUNDERGRADUATESNDERGRADUATESNDERGRADUATESNDERGRADUATES’’’’ AABOUT AABOUT BOUT BOUT CCCCOMPUTER OMPUTER OMPUTER OMPUTER AAAAND ND ND ND IIIINTERNET NTERNET NTERNET NTERNET EEEETHICS THICS IIIIN THICS THICS N N N PPPPAKISTANAKISTANAKISTANAKISTAN,,,, M. Jamil &M. Jamil M. Jamil M. Jamil &&& J. H. ShahJ. H. ShahJ. H. ShahJ. H. Shah

Nigerian Journal of Technology, Nigerian Journal of Technology, Nigerian Journal of Technology,

Nigerian Journal of Technology, Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014

519

original software among the friend is ethically right to

them.

Table 7 showed that 68% (n=103) male and 56% (n=79) female students from private sector universities were believe in copying original software for educational purposes is ethically right activity; regarding statements 4 and 5 their responses were apparently scattered and were not supportive to make any decision regarding their awareness but majority of them were marked the option Wrong; 51% (n=78) male students believe that it is ethically wrong to listing irrelevant website references in the assignments or research works while female were indecisive again; 59% (n=89) male and 55% (n=78) female students expressed that copying text from printed sources without acknowledging the real author is ethically wrong; each male and female students’ responses from private universities were scattered among the ranges, and hence therefore unable to decide about their awareness about statement 15.

5. CONCLUSIONS5. CONCLUSIONS5. CONCLUSIONS5. CONCLUSIONS

Results found from the survey were not very highly appreciated because overall sampled teachers and

students were not properly educated about computer and IT ethics. Regarding the information about computer and IT training and prior knowledge about computer and IT ethics it was found that majority of the teachers were using IT resources professionally because of their personal interest and have not been properly trained from any institution, while majority of both sampled teachers and students disclosed that they have not been provided proper knowledge or information (i.e., included in their course outline or generally discussed in their classes between or among teachers and students) regarding the use of computer and IT ethics during their previous educational durations.

From the calculated frequencies and percentages it was concluded that there were no significant differences found between the responses of overall sampled teachers and students regarding the ethical use of computer and IT resources except on two situations: one is in which, teachers believe that it is good to quote every author during lecture or presentations but not necessarily important and cheap access of Computer and IT resources is not the only reason of unethical utilization of these resources, while students do not.

Table 6: Responses of Male (n=162) and Female (n=187) Students from Public UniversitiesSr.

No. Statements

Male Students Female Students

Right Wrong NRNW Right Wrong NRNW

1. Copying original software for

education purposes is: 95 21 46 123 37 27

2. Downloading music or movies from

net is: 54 47 61 83 55 49

8.

Listing web sites that you do not use to complete a research paper in the bibliography is:

35 87 40 60 105 22

9.

Copying two lines from a printed source, in your research work, without acknowledging the source is:

20 96 46 34 116 37

10.

Copying and pasting one sentence from an online source, in your research work, without acknowledging the source is:

31 73 58 37 102 48

14. Unauthorized sharing of original

software with friends is: 80 37 45 114 46 27

16.

Writing a summary based on an online abstract of a journal article rather than reading the article itself:

(9)

Nigerian Journal of Technology, Nigerian Journal of Technology, Nigerian Journal of Technology,

Nigerian Journal of Technology, Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014

520

Table 7: Responses of Male (n=153) and Female (n=141) Students from Private Universities

Sr.

No. statements

Male Students Female Students

Right Wrong NRNW Right Wrong NRNW

1. Copying original software for

education purposes is: 103 23 27 79 31 31

4. Buying a paper online and

submitting it as your own is: 57 61 35 40 61 40

5.

Copying and pasting an essay from the Internet and submitting it as your own is:

59 61 33 37 63 41

8.

Listing web sites that you do not use to complete a research paper in the bibliography is:

43 78 32 37 63 41

9.

Copying two lines from a printed source, in your research work, without acknowledging the source is:

30 89 34 27 78 36

14. Unauthorized sharing of original

software with friends is: 72 35 46 63 36 42

15. Unauthorized sharing of music and

movies files with friends is: 53 57 43 26 66 49

Regarding the awareness about the ethical use of computer and IT resources of sampled teachers from public and private universities; it was found that teachers from private sector universities were more clearer in their believes than to the public sector university teachers. On the other hand, no significant differences found between the responses of sampled students either from public or private sector universities.

No significant differences found from the responses of male and female teaches either from public sector and private sector universities regarding the ethical utilization of computer and IT resources. Similarly, no drastic differences found from the responses of male and female students either from public and private universities. This helped to conclude that their ethical believes regarding the utilizations of computer and IT resources were same.

Regarding the activities (i.e., reflecting the ethical or unethical utilization of computer and IT resources) given in sixteen different statements in Part – II of the questionnaire, it was concluded that sampled teachers believed that: knowledge about ethical use of computer and IT, downloading diagrams or illustrations with complete references, unauthorized sharing of original software among friends and summarizing an article with the help of abstracts only for citation is ethically RIGHT. Copying original software for educational purposes, buying and submitting an online paper with their name, listing

irrelevant websites in the reference list, downloading on online research tool for your own research work by ignoring the copy right acts and copying text either from online text or from printed content are ethically WRONG activities. Downloading music or movies from NET and explain a topic during lecture or demonstration without quoting each author are ethically Neither Right Nor Wrong (NRNW).

In case of students: majority of the sampled students copying original software for educational purposes, downloading music or movies, information regarding ethical use of IT, economically cheap access of IT based resources are the reasons of immorality, and unauthorized sharing of original software among friends is ethically RIGHT. Buying a paper online and submitting it as their own, copying and pasting text either from online resources or printed resources, explain a topic without quoting the real authors is ethically WRONG. And downloading on online research tool for your own research work by ignoring the copy right acts, listing irrelevant websites in references list and sharing of unauthorized sharing music and movies is ethically Neither Right Nor Wrong (NRNW) activities.

(10)

PPP

PERCEPTION OERCEPTION ERCEPTION ERCEPTION OOOF F F F UUUUNDERGRADUATESNDERGRADUATESNDERGRADUATESNDERGRADUATES’’’’ AABOUT AABOUT BOUT BOUT CCCCOMPUTER OMPUTER OMPUTER OMPUTER AAAAND ND ND ND IIIINTERNET NTERNET NTERNET NTERNET EEEETHICS THICS IIIIN THICS THICS N N N PPPPAKISTANAKISTANAKISTANAKISTAN,,,, M. Jamil &M. Jamil M. Jamil M. Jamil &&& J. H. ShahJ. H. ShahJ. H. ShahJ. H. Shah

Nigerian Journal of Technology, Nigerian Journal of Technology, Nigerian Journal of Technology,

Nigerian Journal of Technology, Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014

521

for not only highlighting the importance of computer

and IT ethics but also broaden the awareness about the same. Sample size and targeted population of this research was limited. Therefore, it is also recommended to include more universities from different regions and provinces of the country to explore teachers and students understanding regarding the ethical use of computer and IT.

6. 6. 6.

6. REFERENCESREFERENCESREFERENCES REFERENCES

[1] Alexandra, A., & Miller, S. (2010). Law, Ethics and Governance Series: Integrity Systems for Occupations. England: Asgate. PP: 61, and 113. [2] Baruchson-Arbib, S., and Yaari, E. (2004). Printed

Versus Internet Plagiarism: A Study of Students’ Perception. International Journal of Information

Ethics, 1(6). Retrieved from

http://container.zkm.de/ijie/ijie/no001/ijie_001_05_baruchson.pdf

[3] Ben-Jacob, M. G. (2005). Integrating Computer Ethics across the Curriculum: A Case Study. Educational Technology & Society, 8(4), 198 – 204.

[4] Benn, P. (1998). Ethics. London: UCL Press. PP: 1-5. [5] Brey, P. (2007). Computer Ethics in (Higher)

Education. Retrieved from

http://www.utwente.nl/gw/wijsb/organization/bre

y/Publicaties_Brey/Brey_2007_Higher-Education.pdf

[6] Bynum, T. W. (2008). Computer and Information Ethics. Retrieved on December 12, 2011 from http://stanford.library.usyd.edu.au/entries/ethics-computer/

[7] David, N. (2009). The impact of ICT in rural education: case study – ENUGU State. Nigerian Journal of Technology (NIJOTECH), 28(2), 70 – 79. [8] Etter S., Cramer J. J., and Finn, S. S. (2006). Origins of

academic dishonesty: Ethical orientations and personality factors associated with attitudes about cheating with information technology. Journal of Research on Technology in Education, 39(2), 133 – 155.

[9] Gliem, J. A., and Gliem, R. R. (2003). Calculating, Interpreting and Reporting Cronbach’s Alpha Reliability Coefficient for Likert Type Scales.

Retrieved from

https://scholarworks.iupui.edu/bitstream/handle/1805/344/Gliem%20&%20..?sequence=1

[10] Goessl, L. (2008). How Computer Ethics Impact

Society. Retrieved from

http://www.helium.com/items/845336-how-computer-ethics-impact-society

[11] Heersmink, R., Hoven, J., Eck, N. J., Berg, J. (2011). Biometric mapping of computer and information ethics. DOI: 10.1007/s10676-011-9273-7.

[12] Iskandarani, M., El-Refae, G., El-Etter, S. F. (2006). A rubber band ethics model for computing and information technology practices. American Journal of Applied Sciences, 3(7), 1910 – 1915.

[13] Irons, A. (2007). Teaching Computer Ethics to Computer Forensics Students. Retrieved from http://www.ics.heacademy.ac.uk/events/8th-annual-conf/Papers/Alastair%20Irons.pdf

[14] Jaggar, S. & Strain, J. (2007). Assessing students’ ethical development in computing with the defining issues test: Challenges to be addressed. Journal of Information, Communication and Ethics in Society. 5(1), 33 – 42.

[15] Jamil, M. and Shah, J. H. (2011). Technology: Its potential effects on teaching in higher education. Journal of New Horizons in Education, 59(1), 38 – 51.

[16] Kizza, J. M. (2003). Ethical and Social Issues in the Information Age (2nd Edition). New York: Springer. PP: 38 – 48.

[17] Kuzu, A. (2009). Problems Related to Computer Ethics: Origins of the Problems and Suggested Solutions. The Turkish Journal of Educational Technology – TOJET. ISSN: 1303-6521, 8(2), Article 9.

[18] Lee, W. W. & Chan, K. C. C. (2008). Computer Ethics: A Potent Weapon for Information Security

Management. Retrieved from

http://www.isaca.org/Journal/Past-Issues/2008/Volume-6/Documents/jpdf0806-computer-ethics.pdf

[19] Lorents, A. C., Maris, J. M., Morgan, J. N. and Neal, G. L. (2006). Ethics of Computer Use: A Survey of Student Attitudes. Retrieved from http://www.franke.nau.edu/Faculty/Intellectual/workingpapers/pdf/Morgan_Ethics.pdf

[20] Masrom, M., Ismail, Z. and Hussein, R. (2009). Ethical Awareness of Computer Use Among Undergraduate Students. ACM SIGCAS Computers and Society, 39(1), 27 – 40.

[21] Masrom, M., Ismail, Z., Hussein, R., & Mohamed, N. (2010). An Ethical Assessment of Computer Ethics using Scenario Approach. International Journal of Electronic Commerce Studies. 1 (1), 25 – 36.

[22] McCarthy, R. V., Halawi, L., & Aronson, J. E. (2005). Information Technology Ethics: A Research Framework. Issues in Information Systems, VI (2). Pages: 64 – 69.

[23] Obanor, A. I. and Kawasi-Effah, C. C. (2013). Assessment of university-industry collaboration and technology transfer in schools of engineering and sciences in Nigeria. Nigerian Journal of Technology (NIJOTECH), 32(2), 286 – 293.

(11)

Nigerian Journal of Technology, Nigerian Journal of Technology, Nigerian Journal of Technology,

Nigerian Journal of Technology, Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014 Vol. 33, No. 4, October 2014

522

online learning. Proceedings of the 6th WSEAS

International Conference on Applied Informatics and Communications, Elounda, Greece, August 18 – 20. 265-269.

[25] Rolstad, C. (2003). A Course in Computer Ethics for Engineering Students. Proceeding of International Conference on Engineering Education,

Valencia, Spain. Retrieved from

http://www.ineer.org/events/icee2003/proceedings/pdf/3583.pdf

[26] Siegfried, R. M. (2004). Student attitudes on software piracy and related issues of computer

ethics. Retrieved from

http://home.adelphi.edu/~siegfried/ETIN2004.pdf [27] Siegfried, R. M., Ashley, A. S. (2006). Is it theft or

sampling? Student attitudes on the copying of commercial software and music. Retrieved from

http://www.academia.edu/2807904/Is_it_theft_or_sampling_Student_attitudes_on_the_copying_of_commercial_software_and_music

[28] Swain, C., and Gilmore, E. (2001). Repacking for the 21st Century: Teaching Copyright and Computer Ethics in Teacher Education Courses. Contemporary Issues in Technology and Teacher Education, (online), 1 (4), 535 – 545.

[29] Teston, G. (2008). Software Piracy among Technology Education Students: Investigating Property Rights in a Culture of Innovation. Journal of Technology Education, 20 (1), pp: 66 – 78.

Download										Download PDF (2024)

References

Top Articles
Luigi Und Daisy Comicstrips
Three top scholars receive 2024 Nemmers Prize
Gilbert Public Schools Infinite Campus
Blackstone Launchpad Ucf
Sarah Bustani Boobs
Boost Mobile 69Th Ashland
Best Transmission Service Margate
Dtm Urban Dictionary
Osage actor talks Scorsese, 'Big Uncle Energy' and 'Killers of the Flower Moon'
Chase Bank Pensacola Fl
Telegram X (Android)
Peraton Sso
Slmd Skincare Appointment
20 Cozy and Creative Fall Front Porch Ideas to Welcome the Season in Style
Chicken Coop Brookhaven Ms
Smith And Wesson Nra Instructor Discount
Icl Urban Dictionary
Employment Vacancies - Find Jobs with our recruitment team
Six Oaks Rv Park Mooresburg Tn
Mhrb Near Me
Koal Bargain Bin
Troy Bilt Belt Diagram
Takeaways from AP's report updating the cult massacre that claimed hundreds of lives in Kenya
Anna Shumate Leaks
Student Exploration Gravity Pitch
Dragon Ball Devolution 2 Unblocked
Taylorsince1909
In Branch Chase Atm Near Me
Knock At The Cabin Showtimes Near Alamo Drafthouse Raleigh
Joy Jenkins Barnett Obituary
Understanding P Value: Definition, Calculation, and Interpretation - Decoding Data Science
Killing Self Gif
Aerospace Engineering | Graduate Degrees and Requirements
Greenland Outer Drive
neither of the twins was arrested,传说中的800句记7000词
Kino am Raschplatz - Vorschau
Acadis Portal Missouri
Top French Cities - Saint-Etienne at a glance
Assume The Slave Position Natashas Bedroom
Watch ESPN - Stream Live Sports & ESPN Originals
Sveta Håkansson
Craigslist Tools Las Cruces Nm
Lmsyduycdmt
Sacramento Library Overdrive
Thc Detox Drinks At Walgreens
Busted Newspaper Zapata Tx
City Of Omaha Efinance
Pkittens
Gunsmoke Noonday Devil Cast
Hollyday Med Spa Prairie Village
Boyle County Busted Newspaper
Yvi Eulb Meaning In Latin
Latest Posts
Article information

Author: Kelle Weber

Last Updated:

Views: 5643

Rating: 4.2 / 5 (73 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Kelle Weber

Birthday: 2000-08-05

Address: 6796 Juan Square, Markfort, MN 58988

Phone: +8215934114615

Job: Hospitality Director

Hobby: tabletop games, Foreign language learning, Leather crafting, Horseback riding, Swimming, Knapping, Handball

Introduction: My name is Kelle Weber, I am a magnificent, enchanting, fair, joyous, light, determined, joyous person who loves writing and wants to share my knowledge and understanding with you.