Assessment of Cyber Ethics Behaviour among Undergraduate Students at the Nigerian Federal University of Agriculture and the University of Zululand in South Africa
Main Article Content
Abstract
There has been an alarming increase in cyber-technology misuse and abuse among young adults in recent years. This study examines types of cyber ethics behaviours exhibited by undergraduate students at the Federal University of Agriculture (FUA), Nigeria, and the University of Zululand (UZ), South Africa. Both quantitative and qualitative design and a survey method were used. The sample for the study was purposively selected, comprising 14 Information Technology (IT) professionals for the interview and 380 undergraduate students from the two universities. The findings of the study revealed that undergraduate students from the two universities exhibited a higher prevalence of cyberpiracy, cybersex, and cyber smearing. It has been established that these vices are more prevalent in undergraduate students from a Nigerian university. Based on the findings of the study, the study recommended more awareness of the negative effect of cyber ethics behaviours and the review of cyber ethics policies in both Nigeria and South Africa.
Article Details
Articles submitted to ZAJLIS should not have been published before in their current or substantially similar form, or be under consideration for publication with another journal. Authors submitting articles for publication warrant that the work is not an infringement of any existing copyright and will indemnify the publisher against any breach of such warranty. For ease of dissemination and to ensure proper policing of use, papers and contributions become the legal copyright of the publisher unless otherwise agreed. The editors may make use of software for checking the originality of submissions received.
Prior to article submission, authors should clear permission to use any content that has not been created by them. Failure to do so may lead to lengthy delays in publication. ZAJLIS is unable to publish any article which has permissions pending. The rights ZAJLIS require are:
- Non-exclusive rights to reproduce the material in the article or book chapter.
- Print and electronic rights.
- Worldwide English language rights.
- To use the material for the life of the work (i.e. there should be no time restrictions on the re-use of material e.g. a one-year licence).
References
Aderibigbe, N., Ocholla, D., &Britz, J. (2021). Differences in the ethical cyber behavioural intention of Nigerian and South African students: A multi-group analysis based on the theory of planned behaviour. Libri, 71(4), 389-406.
Aderibigbe, N. A., & Ocholla, D. N. (2018). Cyber-ethics and behavioural theories: A literature review. In International Conference on Information and Knowledge Management 2nd: 2018 (pp. 21-24).
Aggarwal, C. C. (2015). Outlier analysis. In Data mining, 237-263. Springer, Cham.
Case, C. J.,& Young, K. S. (2002). Employee internet management: Current business practices and outcomes. CyberPsychology and Behaviour, 5(4), 355-361.
Cilliers, L. (2017). Evaluation of information ethical issues among undergraduate students: An exploratory study. South African Journal of Information Management, 19(1), 1-6.
Cronan, T. P.,& Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527-545.
Folorunso, O., Vincent, R. O., Adekoya, A. F.,&Ogunde, A. O. (2010). Diffusion of innovation in social networking sites among university students. International journal of computer science and security, 4(3), 361-372.
Foltz, C., Schwager, P.,& Anderson, J. (2008). Porqué los usuarios (no) leenlasdirectivas de
uso del equipo. Gestión industrial y sistemas de datos, 108(6), 701-712.
Halder, D., Jaishankar, K., Periyar, E.,&Sivakumar, R. (2011). Cyber victimisation in India: An empirical analysis. At First International Conference of the South Asian Society of
Criminology and Victimology (SASCV), 15-17 January 2011, Jaipur, Rajasthan, India:
SASCV 2011 Conference Proceedings, 77.
Iyadat, W., Iyadat, Y., Ashour, R., &Khasawneh, S. (2012). University students and ethics of computer technology usage: Human resource development. E-learning and Digital Media, 9(1), 43-49.
Khalil, O. E., &Seleim, A. A. (2012). Attitudes towards information ethics: a view from Egypt. Journal of Information, Communication, and Ethics in Society.
Karim, N. S. A., Zamzuri, N. H. A.,& Nor, Y. M. (2009). Exploring the relationship between Internet ethics in university students and the big five models of personality. Computers and Education, 53(1), 86-93.
Kortjan, N. & von Solms, R. (2012). Cyber security education in developing countries: A South African perspective. In International conference on e-infrastructure and e-services for developing countries, 289-297. Springer, Berlin, Heidelberg.
Lau, W. W.,& Yuen, A. H. (2014). Internet ethics of adolescents: Understanding demographic differences. Computers and Education, 72, 378-385.
Lennie, S. (2013). Ethical complexities in the virtual world: Teacher perspectives of ICT-based issues and conflicts [Doctoral dissertation]. https://tspace.library.utoronto.ca/bitstream/1807/35879/7/Lennie_Shawn_SD_201306_PhD_thesis.pdf
Livingstone, S., Haddon, L., Görzig, A.,&Ólafsson, K. (2011). Risks and safety on the Internet: The perspective of European children: full findings and policy implications from the EU Kids Online survey of 9-16-year-olds and their parents in 25 countries.
Martin, N. L.,& Woodward, B. S. (2011). Computer ethics of American and European information technology students: A cross-cultural comparison. Issues in Information
Systems, 12(1), 78-87.
Mishna, F., Cook, C., Gadalla, T., Daciuk, J., & Solomon, S. (2010). Cyberbullying behaviours among middle and high school students. American Journal of Orthopsychiatry, 80(3), 362-374.
Molluzzo, J. C.,&Lawler, J. (2012). A study of the perceptions of college students on cyberbullying. Information Systems Education Journal, 10(4), 84.
North, M. M., Richardson, R.,& North, S. M. (2017). Information security and ethics awareness: A concise comparative investigation. Calitatea, 18(160), 141.
Pahuja, S. (2011). Decolonising international law: Development, economic growth and the
politics of universality. Vol. 86. Cambridge University Press.
Peslak, A. R. (2008). Current information technology issues and moral intensity influences. Journal of Computer Information Systems, 48(4), 77-86.
Phyo, A.H., Furnell, S.M.,&Phippen, A.D. (2007). Pre-requisites for monitoring insider IT
misuse. In Bleimann, U.G., Dowland, P.S.,& Furnell, S. M. (Eds.), Proceedings of
the Third Collaborative Research Symposium Security, E-Learning, Internet and
Networking, 41–52.
Olafson, L., Schraw, G., Nadelson, L., Nadelson, S., & Kehrwald, N. (2013). Exploring the judgment–action gap: College students and academic dishonesty. Ethics & Behavior, 23(2), 148-162.
Sendag, S., Duran, M., & Fraser, M. R. (2012). Surveying the extent of involvement in online
academic dishonesty (e-dishonesty) related practices among university students and the
rationale students provide: One university's experience. Computers in Human
Behaviour, 28(3), 849-860.
Simonson, M., Smaldino, S., &Zvacek, S. M. (Eds.). (2014). Teaching and learning at a
distance: Foundations of distance education. IAP.
Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee
information systems security policy violations. MIS Quarterly, 487-502.
Tade, O., & Aliyu, I. (2011). Social organisation of internet fraud among university undergraduates in Nigeria. International Journal of Cyber Criminology, 5(2).
Tavani H. T. (2013). Cyberethics. In Runehov A.L.C. Oviedo L. (Eds). Encyclopedia of sciences and religions. Springer, Dordrecht.
WeulenKranenbarg, M., Holt, T. J.,& van Gelder, J. L. (2017). Offending and victimisation in the digital age: Comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap.Deviant Behaviour, 1-16.
Yamano, P. (2006). Cyberethics in the elementary classroom: Teaching responsible use of technology. In Society for Information Technology & Teacher Education International Conference, 3667-3670. Association for the Advancement of Computing in Education (AACE).
Zetter, K. (2007,November). Is your boss spying on you? It's legal, it's happening, and it can get you fired. Reader's Digest, 97-103.