Cyberethical behaviour of high school students in selected schools in uMhlathuze Municipality

Authors

DOI:

https://doi.org/10.25159/2663-659X/13249

Keywords:

Cyberethical behaviour, high schools, Cybertechnologies, cyberethics, uMhlathuze Municipality, grade 11 students

Abstract

Cybertechnology has become a basic aspect of schools and universities with students’ habitual use of these tools to communicate, learn, and play. However, schools and universities have faced numerous issues as a result of cyberethics activities in various settings. The study aimed to examine the cyberethical behaviour of high school students in selected schools in uMhlathuze Municipality. The objectives of this study were to explore the level of awareness about cyber ethical behaviour among the participants; identify the forms of cyberethics behaviour shown by the participants; demonstrate the application of the theory of planned behaviour (TPB) to the participants’ cyberethical behaviour intentions; and ascertain the challenges that high school students face to act ethically when using the Internet and cybertechnologies. The study adopted a quantitative approach and a survey research design. Probability sampling was used to enrol grade 11 students from three conveniently selected high schools in the uMhlathuze municipality of KwaZulu-Natal. Data were collected by means of 214 questionnaires that were distributed to the participants. The study discovered a substantial number of challenges related to effective cyber ethical behaviour. The findings indicated a need for awareness of cyber ethical technology and how to mitigate its misuses. In addition, the study contributes to existing literature on the application of the TPB.

Metrics

Metrics Loading ...

References

Aderibigbe, N. A. 2019. “Cyberethical Behaviour of Undergraduate Students at University of Zululand, South Africa, and the Federal University of Agriculture, Abeokuta, Nigeria.” PhD diss., University of Zululand. https://uzspace.unizulu.ac.za/items/725e9053-d9a2-4232-b5f9-7285eb9b5531

Aderibigbe, N. A., and D. N. Ocholla. 2020. “Insight into Ethical Cyber Behaviour of Undergraduate Students in Selected African Universities.” SA Journal of Information Management 22 (1). https://doi.org/10.4102/sajim.v22i1.1131 DOI: https://doi.org/10.4102/sajim.v22i1.1131

Aderibigbe, D., D. N. Ocholla, and J. Britz. 2021. “Differences in Ethical Cyber Behavioural Intention of Nigerian and South African Students: A Multi-Group Analysis Based on the Theory of Planned Behaviour.” Libri 71 (4): 389–406. https://doi.org/10.1515/libri-2019-0062 DOI: https://doi.org/10.1515/libri-2019-0062

Ajzen, I. 1991. “The Theory of Planned Behaviour.” Organizational Behaviour and Human Decision Processes 50 (2): 179–211. ResearchGate. https://doi.org/10.1016/0749-5978(91)90020-T DOI: https://doi.org/10.1016/0749-5978(91)90020-T

Ajzen, I. 1993. “Attitudes Theory and the Attitude Behaviour Relation.” In New Directions in Attitude Measurement, edited by D. Krebs and P. Schmidt, 41–57. Berlin: Walter de Gruyter.

Ajzen, I. 2011. “The Theory of Planned Behaviour: Reactions and Reflections.” Psychology and Health 26 (9): 1113–1127. https://doi.org/10.1080/08870446.2011.613995 DOI: https://doi.org/10.1080/08870446.2011.613995

Aliyu, M., N. A. Abdallah, N. A. Lasisi, D. Diyar, and A. M. Zeki. 2010. “Computer Security and Ethics Awareness among IIUM Students: An Empirical Study.” Paper presented at the Information and Communication Technology for the Muslim World (ICT4M) 2010 International Conference, Jakarta, 13–14 December. https://doi.org/10.1109/ICT4M.2010.5971884 DOI: https://doi.org/10.1109/ICT4M.2010.5971884

Al-Rafee, S., and T. P. Cronan. 2006. “Digital Piracy: Factors that Influence Attitude Toward Behaviour.” Journal of Business Ethics 63 (3): 237–259. https://doi.org/10.1007/s10551-005-1902-9 DOI: https://doi.org/10.1007/s10551-005-1902-9

Barakabitze, A., A. Kitindi, E., J. Sanga, C. Shabani, A., Philipo, J. and G. Kibirige. 2017. “New Technologies for Disseminating and Communicating Agriculture Knowledge and In-Formation: Challenges for Agricultural Research Institutes in Tanzania,” Electronic Journal of Information Systems in Developing Countries 70 (1): 1–22. https://doi.org/10.1002/j.1681-4835.2015.tb00502.x DOI: https://doi.org/10.1002/j.1681-4835.2015.tb00502.x

Buthelezi, N. N. 2022. “Cyberethical Behaviour of High School Students in Selected Schools in uMhlathuze Municipality.” MA thesis, University of Zululand. https://uzspace.unizulu.ac.za/items/e8ddc60a-571d-46fc-bc97-5a83b968e7d6

Calvani, A., A. Fini, M. Ranieri, and P. Picci. 2012. “Are Young Generations in Secondary School Digitally Competent? A Study on Italian Teenagers.” Computers & Education 58 (2): 797–807. https://doi.org/10.1016/j.compedu.2011.10.004 DOI: https://doi.org/10.1016/j.compedu.2011.10.004

Cesareo, L., and A. Pastore. 2014. “Consumer Attitude Behaviour Towards Online Music Piracy and Subscription-Based Services.” Journal of Consumer Marketing 31 (6/7): 515–525. https://doi.org/10.1108/JCM-07-2014-1070 DOI: https://doi.org/10.1108/JCM-07-2014-1070

Chai, C. S., X. Wang, and C. Xu. 2020. “An Extended Theory of Planned Behaviour for the Modelling of Chinese Secondary School Students’ Intention to Learn Artificial Intelligence.” MDPI Journal Mathematics 8 (11): 2089. https://doi.org/10.3390/math8112089 DOI: https://doi.org/10.3390/math8112089

Chan, H. C. O., and D. S. Wong. 2015. “The Overlap between School Bullying Perpetration and Victimization: Assessing the Psychological, Familial, and School Factors of Chinese Adolescents in Hong Kong.” Journal of Child and Family Studies 24 (11): 3224–3234. https://doi.org/10.1007/s10826-015-0125-7 DOI: https://doi.org/10.1007/s10826-015-0125-7

Chatterjee, S., S. Sarker, and J. S. Valacich. 2015. “The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use.” Journal of Management Information Systems 31 (4): 49–87. https://doi.org/10.1080/07421222.2014.1001257 DOI: https://doi.org/10.1080/07421222.2014.1001257

Chiang, L., and B. Lee. 2011. “Ethical Attitude and Behaviours Regarding Computer Use.” Ethics and Behaviour 21: 481–497. https://doi.org/10.1080/10508422.2011.622181 DOI: https://doi.org/10.1080/10508422.2011.622181

Council of the European Union. 2015. Evaluation Report on the Seventh Round of Mutual Evaluations: The Practical Implementation and Operation of European Policies on Prevention and Combating Cybercrime Report on Slovakia, Brussels, 22 September 2015, 9761/1/15 REV 1 DCL

Cronan, T. P., and S. Al-Rafee. 2008. “Factors that Influence the Intention to Pirate Software and Media.” Journal of Business Ethics 78 (4): 527–545. https://doi.org/10.1007/s10551-007-9366-8 DOI: https://doi.org/10.1007/s10551-007-9366-8

Cronan, T., and D. Douglas. 2006. “Information Technology Ethical Behaviour: Towards a Comprehensive Ethical Behaviour Model.” Journal of Organizational and End User Computing 18 (1).

De Melo, C., and T. De Sousa. 2017. “Reflections on Cyberethics Education for Millennial Software Engineers.” In 2017 IEEE/ACM 1st International Workshop on Software Engineering Curricula for Millennials (SECM), 40–46. Buenos Aires: IEEE. https://doi.org/10.1109/SECM.2017.10 DOI: https://doi.org/10.1109/SECM.2017.10

Goundar, S. 2012. Research Methodology and Research Method. Research Gate Publications.

Gunarto, H. 2003. Ethical Issues in Cyberspace and IT Society. Asia: Pacific University.

Harris, M., and S. Furnell. 2012. “Routes to Security Compliance: Be Good or Be Shamed?” Computer Fraud & Security 2012 (12): 12–20. https://doi.org/10.1016/S1361-3723(12)70122-7 DOI: https://doi.org/10.1016/S1361-3723(12)70122-7

Haughton, N. A., K. C. Yeh, J. Nworie, and L. Romero. 2013. “Digital Disturbances, Disorders, and Pathologies: A Discussion of Some Unintended Consequences of Technology in Higher Education.” Educational Technology 53 (4): 3–16.

Ibrahim, S. 2016. “Social and Contextual Taxonomy of Cybercrime: Socioeconomic Theory of Nigerian Cybercriminals.” International Journal of Law, Crime and Justice 47: 44–57. https://doi.org/10.1016/j.ijlcj.2016.07.002 DOI: https://doi.org/10.1016/j.ijlcj.2016.07.002

Jamal, A. 2014. Computer Ethics. Karnataka: Government Degree College.

Khalil, O. E., and A. A. Seleim. 2012. “Attitudes Towards Information Ethics: A View from Egypt.” Journal of Information, Communication and Ethics in Society 10 (4): 240–261. https://doi.org/10.1108/14779961211285872 DOI: https://doi.org/10.1108/14779961211285872

Kreie, J., and T. P. Cronan. 2000. “What is Computer Ethics?” Communications of the ACM 43 (12): 66–67. https://doi.org/10.1145/355112.355126 DOI: https://doi.org/10.1145/355112.355126

Leornard, L., and T. Cronan. 2005. “Unethical Behaviour in an Information Technology Context: A Study to Explain Influences. Journal of the Association for Information Systems 1 (12): 25–43.

Luppicini, R. 2009. “Technoethical Inquiry: From Technological Systems to Society.” Global Media Journal 2 (1): 5–21..

National Cyber Security Alliance. 2008. “National Cyberethics, Cybersafety, Cybersecurity Baseline Study.” https://www.edtechpolicy.org/cyberk12ARCHIVE/Documents/C3Awareness/NationalC3BaselineSurvey_Extract_sept_2010.pdf

Oyewole, O. 2017. “Awareness and Perception of Computer Ethics by Undergraduates of a Nigerian University.” Journal of Information Science Theory and Practice 5 (4): 68–80.

Ozer, N., C. T. Ugurlu, and K. Beycioglu. 2011. “Computer Teachers’ Attitudes Toward Ethical Use of Computers in Elementary Schools.” International Journal of Cyber Ethics in Education 1 (2): 15–24. https://doi.org/10.4018/ijcee.2011040102 DOI: https://doi.org/10.4018/ijcee.2011040102

Peace, A. G., D. F. Galletta, and J. Y. Thong. 2003. “Software Piracy in the Workplace: A Model and Empirical Test.” Journal of Management Information Systems 20 (1): 153–177. https://doi.org/10.1080/07421222.2003.11045759 DOI: https://doi.org/10.1080/07421222.2003.11045759

Plaisance, P. L. 2013. Media Ethics: Key Principles for Responsible Practice. Sage Publications. https://doi.org/10.4135/9781544308517 DOI: https://doi.org/10.4135/9781544308517

Polkowski, Z. 2015. “Ethical Issues in the Use and Implementation of ICT.” Journal of Management and Research 21 (2): 2–5.

Reddy, G. N., and G. J. Reddy. 2014. “A Study of Cyber Security Challenges and its Emerging Trends on Latest Technologies.” International Journal of Engineering and Technology 4 (1): 22–29. https://doi.org/10.48550/arXiv.1402.1842

Rujoiu, O., and V. Rujoiu. 2014. “Academic Dishonesty and Workplace Dishonesty: An Overview.” In Proceedings of the 8th International Management Conference on Management Science and Engineering Management, edited by Jiuping Xu, Virgílio António Cruz-Machado, Benjamin Lev, and Stefan Nickel, 928–938. Cham: Springer.

Russo, D., J. Stochl, M. Painter, and G. Shelley. 2015. “Use of the Theory of Planned Behaviour to Assess Factors Influencing the Identification of Students at Clinical High Risk for Psychosis in 16+ Education.” BMC Health Services Research 15 (1): 411. https://doi.org/10.1186/s12913-015-1074-y DOI: https://doi.org/10.1186/s12913-015-1074-y

Schweitzer, D., D. Gibson, D. Bibighaus, and J. Boleng. 2009. “Preparing Our Undergraduates to Enter a Cyber World.” In Information Assurance and Security Education and Training, edited by Ronald C. Dodge and Lynn Futcher, 123–130, Berlin: Springer. https://doi.org/10.1007/978-3-642-39377-8_13 DOI: https://doi.org/10.1007/978-3-642-39377-8_13

Shapiro, S., and S. J. Gross. 2013. “Ethical Educational Leadership in Turbulent Times: Resolving Moral Dilemmas.” ResearchGate. Accessed 5 September 2022. https://www.researchgate.net/publication/286666985_Ethical_Educational_Leadership_in_Turbulent_Times_ReSolving_Moral_Dilemmas DOI: https://doi.org/10.4324/9780203809310

Snyder, I., A. Jones, and J. Bianco. 2005. Using Information and Communication Technologies in Adult Literacy Education: New Practices, New Challenges. An Adult Literacy National Project Report. Adelaide: National Centre for Vocational Education Research Ltd.

Stahl, B. C., G. Eden, and M. Jirotka. 2013. “Responsible Research and Innovation in Information and Communication Technology: Identifying and Engaging with the Ethical Implications of ICTs.” In Responsible Innovation: Managing the Responsible Emergence of Science and Innovation in Society, edited by Richard Owen, John Bessant, and Maggy Heintz, 199–218. New York: Wiley. https://doi.org/10.1002/9781118551424.ch11 DOI: https://doi.org/10.1002/9781118551424.ch11

Stone, T. H., I. M. Jawahar, and J. L. Kisamore. 2010. “Predicting Academic Misconduct Intentions and Behaviour using the Theory of Planned Behaviour and Personality.” Basic and Applied Social Psychology 32 (1): 35–45. https://doi.org/10.1080/01973530903539895 DOI: https://doi.org/10.1080/01973530903539895

Stylianou, A. C., S. Winter, Y. Niu, R. A. Giacalone, and M. Campbell. 2013. “Understanding the Behavioural Intention to Report Unethical Information Technology Practices: The Role of Machiavellianism, Gender and Computer Expertise.” Journal of Business Ethics 117 (2): 333–343. https://doi.org/10.1007/s10551-012-1521-1 DOI: https://doi.org/10.1007/s10551-012-1521-1

Tavani, H. T. 2013. “Cyberethics.” In Encyclopaedia of Sciences and Religions, edited by A. L. C. Runehov and L. Oviedo, 565–570. Dordrecht: Springer. https://doi.org/10.1007/978-1-4020-8265-8_279 DOI: https://doi.org/10.1007/978-1-4020-8265-8_279

Vallor, S. 2010. “Social Networking Technology and the Virtues.” Ethics and Information Technology 12 (2): 157–170. https://doi.org/10.1007/s10676-009-9202-1 DOI: https://doi.org/10.1007/s10676-009-9202-1

Von Schomberg, R. 2012. “Prospects for Technology Assessment in a Framework of Responsible Research and Innovation.” In Technikfolgen abschätzen lehren, edited by M. Dusseldorp and R. Beecroft, 39–61. VS Verlag für Sozialwissenschaften. https://doi.org/10.1007/978-3-531-93468-6_2 DOI: https://doi.org/10.1007/978-3-531-93468-6_2

Yamano, T., and T. S. Jayne. 2004. “Measuring the Impact of Working Age Adult Morality on Small Scale Farm Household in Kenya.” Journal of World Development 32 (1): 91–119. https://doi.org/10.1016/j.worlddev.2003.07.004 DOI: https://doi.org/10.1016/j.worlddev.2003.07.004

Downloads

Published

2024-07-16

How to Cite

Buthelezi, Noxolo, Dennis Ngong Ocholla, and Lungile P. Luthuli. “Cyberethical Behaviour of High School Students in Selected Schools in UMhlathuze Municipality”. Mousaion: South African Journal of Information Studies, 18 pages . https://doi.org/10.25159/2663-659X/13249.

Issue

Section

Articles
Received 2023-02-27
Accepted 2024-06-03
Published 2024-07-16