Assessment of Cyber Ethics Behaviour among Undergraduate Students at the Nigerian Federal University of Agriculture and the University of Zululand in South Africa

Main Article Content

Aderibigbe N A Kehinde Abayomi Owolabi Nancy Chituru Okorie Olawale Gabriel Sola

Abstract

There has been an alarming increase in cyber-technology misuse and abuse among young adults in recent years. This study examines types of cyber ethics behaviours exhibited by undergraduate students at the Federal University of Agriculture (FUA), Nigeria, and the University of Zululand (UZ), South Africa. Both quantitative and qualitative design and a survey method were used.  The sample for the study was purposively selected, comprising 14 Information Technology (IT) professionals for the interview and 380 undergraduate students from the two universities. The findings of the study revealed that undergraduate students from the two universities exhibited a higher prevalence of cyberpiracy, cybersex, and cyber smearing. It has been established that these vices are more prevalent in undergraduate students from a Nigerian university.  Based on the findings of the study, the study recommended more awareness of the negative effect of cyber ethics behaviours and the review of cyber ethics policies in both Nigeria and South Africa.


 

Article Details

How to Cite
A, Aderibigbe N et al. Assessment of Cyber Ethics Behaviour among Undergraduate Students at the Nigerian Federal University of Agriculture and the University of Zululand in South Africa. Zambia Journal of Library & Information Science (ZAJLIS ), ISSN: 2708-2695, [S.l.], v. 6, n. 1, p. 11-18, june 2022. ISSN 2708-2695. Available at: <http://41.63.0.109/index.php/journal/article/view/73>. Date accessed: 14 may 2024.
Section
Information Ethics

References

Aderibigbe, N. A., & Ocholla, D. N. (2020). Insight into ethical cyber behaviour of undergraduate students at selected African universities. South African Journal of Information Management, 22(1), 1-8.
Aderibigbe, N., Ocholla, D., &Britz, J. (2021). Differences in the ethical cyber behavioural intention of Nigerian and South African students: A multi-group analysis based on the theory of planned behaviour. Libri, 71(4), 389-406.
Aderibigbe, N. A., & Ocholla, D. N. (2018). Cyber-ethics and behavioural theories: A literature review. In International Conference on Information and Knowledge Management 2nd: 2018 (pp. 21-24).
Aggarwal, C. C. (2015). Outlier analysis. In Data mining, 237-263. Springer, Cham.
Case, C. J.,& Young, K. S. (2002). Employee internet management: Current business practices and outcomes. CyberPsychology and Behaviour, 5(4), 355-361.
Cilliers, L. (2017). Evaluation of information ethical issues among undergraduate students: An exploratory study. South African Journal of Information Management, 19(1), 1-6.
Cronan, T. P.,& Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527-545.
Folorunso, O., Vincent, R. O., Adekoya, A. F.,&Ogunde, A. O. (2010). Diffusion of innovation in social networking sites among university students. International journal of computer science and security, 4(3), 361-372.
Foltz, C., Schwager, P.,& Anderson, J. (2008). Porqué los usuarios (no) leenlasdirectivas de
uso del equipo. Gestión industrial y sistemas de datos, 108(6), 701-712.
Halder, D., Jaishankar, K., Periyar, E.,&Sivakumar, R. (2011). Cyber victimisation in India: An empirical analysis. At First International Conference of the South Asian Society of
Criminology and Victimology (SASCV), 15-17 January 2011, Jaipur, Rajasthan, India:
SASCV 2011 Conference Proceedings, 77.
Iyadat, W., Iyadat, Y., Ashour, R., &Khasawneh, S. (2012). University students and ethics of computer technology usage: Human resource development. E-learning and Digital Media, 9(1), 43-49.
Khalil, O. E., &Seleim, A. A. (2012). Attitudes towards information ethics: a view from Egypt. Journal of Information, Communication, and Ethics in Society.
Karim, N. S. A., Zamzuri, N. H. A.,& Nor, Y. M. (2009). Exploring the relationship between Internet ethics in university students and the big five models of personality. Computers and Education, 53(1), 86-93.
Kortjan, N. & von Solms, R. (2012). Cyber security education in developing countries: A South African perspective. In International conference on e-infrastructure and e-services for developing countries, 289-297. Springer, Berlin, Heidelberg.
Lau, W. W.,& Yuen, A. H. (2014). Internet ethics of adolescents: Understanding demographic differences. Computers and Education, 72, 378-385.
Lennie, S. (2013). Ethical complexities in the virtual world: Teacher perspectives of ICT-based issues and conflicts [Doctoral dissertation]. https://tspace.library.utoronto.ca/bitstream/1807/35879/7/Lennie_Shawn_SD_201306_PhD_thesis.pdf
Livingstone, S., Haddon, L., Görzig, A.,&Ólafsson, K. (2011). Risks and safety on the Internet: The perspective of European children: full findings and policy implications from the EU Kids Online survey of 9-16-year-olds and their parents in 25 countries.
Martin, N. L.,& Woodward, B. S. (2011). Computer ethics of American and European information technology students: A cross-cultural comparison. Issues in Information
Systems, 12(1), 78-87.
Mishna, F., Cook, C., Gadalla, T., Daciuk, J., & Solomon, S. (2010). Cyberbullying behaviours among middle and high school students. American Journal of Orthopsychiatry, 80(3), 362-374.
Molluzzo, J. C.,&Lawler, J. (2012). A study of the perceptions of college students on cyberbullying. Information Systems Education Journal, 10(4), 84.
North, M. M., Richardson, R.,& North, S. M. (2017). Information security and ethics awareness: A concise comparative investigation. Calitatea, 18(160), 141.
Pahuja, S. (2011). Decolonising international law: Development, economic growth and the
politics of universality. Vol. 86. Cambridge University Press.
Peslak, A. R. (2008). Current information technology issues and moral intensity influences. Journal of Computer Information Systems, 48(4), 77-86.
Phyo, A.H., Furnell, S.M.,&Phippen, A.D. (2007). Pre-requisites for monitoring insider IT
misuse. In Bleimann, U.G., Dowland, P.S.,& Furnell, S. M. (Eds.), Proceedings of
the Third Collaborative Research Symposium Security, E-Learning, Internet and
Networking, 41–52.
Olafson, L., Schraw, G., Nadelson, L., Nadelson, S., & Kehrwald, N. (2013). Exploring the judgment–action gap: College students and academic dishonesty. Ethics & Behavior, 23(2), 148-162.
Sendag, S., Duran, M., & Fraser, M. R. (2012). Surveying the extent of involvement in online
academic dishonesty (e-dishonesty) related practices among university students and the
rationale students provide: One university's experience. Computers in Human
Behaviour, 28(3), 849-860.
Simonson, M., Smaldino, S., &Zvacek, S. M. (Eds.). (2014). Teaching and learning at a
distance: Foundations of distance education. IAP.
Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee
information systems security policy violations. MIS Quarterly, 487-502.
Tade, O., & Aliyu, I. (2011). Social organisation of internet fraud among university undergraduates in Nigeria. International Journal of Cyber Criminology, 5(2).
Tavani H. T. (2013). Cyberethics. In Runehov A.L.C. Oviedo L. (Eds). Encyclopedia of sciences and religions. Springer, Dordrecht.
WeulenKranenbarg, M., Holt, T. J.,& van Gelder, J. L. (2017). Offending and victimisation in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap.Deviant Behaviour, 1-16.
Yamano, P. (2006). Cyberethics in the elementary classroom: Teaching responsible use of technology. In Society for Information Technology & Teacher Education International Conference, 3667-3670. Association for the Advancement of Computing in Education (AACE).
Zetter, K. (2007,November). Is your boss spying on you? It's legal, it's happening, and it can get you fired. Reader's Digest, 97-103.