Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter Saur October 20, 2021

Differences in Ethical Cyber Behavioural Intention of Nigerian and South African Students: A Multi-Group Analysis Based on the Theory of Planned Behaviour

  • Nurudeen Aderibigbe ORCID logo EMAIL logo , Dennis Ocholla ORCID logo and Johannes Britz
From the journal Libri

Abstract

Cybertechnology has become a fundamental part of educational institutions, with the student’s routine to use these technologies to communicate, learn and play, causing a need for understanding the impact and general principles of ethical computer use in academia. However, the practice of cyberethics in these environments has presented many challenges for the institutions. This study, based on the theory of planned behaviour, examined the differences in ethical cyber behavioural intention of Nigerian and South African students using a multi-group analysis. The study adopted a survey research design– structured questionnaires were randomly distributed among students of two purposively selected universities, one in South Africa and the other Nigeria. Structural equation modelling was employed to test the proposed model fit. Overall, 450 undergraduate students participated in the survey; 343 respondents completed and returned the questionnaire, resulting in a response rate of 76.2%. The subjective norm was found to be statistically significant in influencing students’ ethical cyber behavioural intention with cyber technologies. The study contributes to the extant literature on the application of the Theory of Planned Behaviour (TPB). The originality and value of this study can be viewed from the application of a socio-psychology theory to determine ethical cyber behavioural intention in relation to cybertechnology, which provides further evidence that the TPB can be applied to cyberethics research. Moreover, to the best of authors’ knowledge, this is a pioneer study that comprehensively examines the linkage of components of TPB with ethical cyber behavioural intention in joint samples from South Africa and Nigeria.


Corresponding author: Nurudeen Aderibigbe, Department of Information Studies, Faculty of Arts, University of Zululand, KwaDlangezwa, Empangeni, KwaZulu-Natal, South Africa, E-mail:

References

Aderibigbe, N. A., and D. N. Ocholla. 2019. “Cyber-ethics and Behavioural Theories: A Literature Review.” In Digital Technologies for Information and Knowledge Management: Proceedings of the International Knowledge Management Conference, Nairobi, Kenya 2018 Conference, edited by T. Kwanya, J. Kiplang’at, and D. Njiraine, 270–9. The Technical University of Kenya.Search in Google Scholar

Aiken, M., and C. Mc Mahon. 2014. “A Primer on Research in Mediated Environments: Reflections on Cybertechnology.” http://doi.org/10.2139/ssrn.2462700.10.2139/ssrn.2462700Search in Google Scholar

Ajzen, I. 1991. “The Theory of Planned Behaviour.” Organizational Behavior and Human Decision Processes 50 (2): 179–211, https://doi.org/10.1016/0749-5978(91)90020-t.Search in Google Scholar

Ajzen, I. 2011. “The Theory of Planned Behaviour: Reactions and Reflections.” Psychology and Health 26 (9): 1113–27, https://doi.org/10.1080/08870446.2011.613995.Search in Google Scholar

Ajzen, I. 1985. “From Intentions to Actions: A Theory of Planned Behavior.” In Action Control, edited by J. Kuhl, and J. Beckmann, 11–39. Berlin: Springer.10.1007/978-3-642-69746-3_2Search in Google Scholar

Ajzen, I., and M. Fishbein. 1980. Understanding Attitudes and Predicting Social Behaviour. Englewood-Cliffs: Prentice-Hall.Search in Google Scholar

Ajzen, I. 2006. Behavioral Interventions Based on the Theory of Planned Behavior. https://people.umass.edu/aizen/pdf/tpb.intervention.pdf (accessed June 12, 2021).Search in Google Scholar

Alleyne, P., S. Soleyn, and T. Harris. 2015. “Predicting Accounting Students’ Intentions to Engage in Software and Music Piracy.” Journal of Academic Ethics 13 (4): 291–309, https://doi.org/10.1007/s10805-015-9241-7.Search in Google Scholar

Al-Lozi, E. 2011. Explaining Users’ Intentions to Continue Participating in Web 2.0 Communities: The Case of Facebook in the Hashemite Kingdom of Jordan, Unpublished doctoral thesis. London: Brunel University. http://dspace.brunel.ac.uk/bitstream/2438/6292/1/FulltextThesis.pdf (accessed January 1, 2021).Search in Google Scholar

Anderson, J. C., and D. W. Gerbing. 1988. “Structural Equation Modelling in Practice: A Review and Recommended Two-step Approach.” Psychological Bulletin 103 (3): 411–23, https://doi.org/10.1037/0033-2909.103.3.411.Search in Google Scholar

Armitage, C. J., and M. Conner. 2001. “Efficacy of the Theory of Planned Behaviour: A Meta Analytic Review.” British Journal of Social Psychology 40 (4): 471–99, https://doi.org/10.1348/014466601164939.Search in Google Scholar

Attuquayefio, S., and H. Addo. 2014. “Using the UTAUT Model to Analyse Students’ ICT Adoption.” International Journal of Education and Development Using ICT 10 (3): 75–86.Search in Google Scholar

Bagozzi, R., and Y. Yi. 1988. “On the Evaluation of Structural Equation Models.” Journal of the Academy of Marketing Science 16 (1): 74–94, https://doi.org/10.1007/bf02723327.Search in Google Scholar

Beck, L., and I. Ajzen. 1991. “Predicting Dishonest Actions Using the Theory of Planned Behavior.” Journal of Research in Personality 25 (3): 285–301, https://doi.org/10.1016/0092-6566(91)90021-h.Search in Google Scholar

Bentler, P. M., and D. G. Bonett. 1980. “Significance Tests and Goodness of Fit in the Analysis of Covariance Structures.” Psychological Bulletin 88 (3): 588–606, https://doi.org/10.1037/0033-2909.88.3.588.Search in Google Scholar

Brey, P. 2009. “Chapter Twenty-Five Computer Ethics in (Higher) Education.” In Computation, Information, Cognition: The Nexus and the Liminal, edited by G. Dodig-Crnkovic, and S. Stuart, 341–63. Cambridge: Cambridge Scholars Press.Search in Google Scholar

Brown, T. 2006. Confirmatory Factor Analysis for Applied Researcher, 2nd ed. New York: Guilford Press.Search in Google Scholar

Bynum, T. W. 2008. “Milestones in the History of Information and Computer Ethics.” In The Handbook of Information and Computer Ethics, edited by K. E. Himma, and H. T. Tavani, 25–48. New Jersey: John Wiley and Sons, Inc.10.1002/9780470281819.ch2Search in Google Scholar

Cassim, F. 2011. “Addressing the Growing Spectre of Cyber Crime in Africa: Evaluating Measures Adopted by South Africa and Other Regional Role Players.” The Comparative and International Law Journal of Southern Africa 44 (1): 123–38.Search in Google Scholar

Chaabane, A., P. Manils, and M. A. Kaafar. 2010. “Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network.” In 2010 Fourth International Conference on Network and System Security, Melbourne, Australia, 167–74. IEEE.10.1109/NSS.2010.47Search in Google Scholar

Chandarman, R., and B. Van Niekerk. 2017. “Students’ Cybersecurity Awareness at a Private Tertiary Educational Institution.” The African Journal of Information and Communication (AJIC) 20: 133–55, https://doi.org/10.23962/10539/23572.Search in Google Scholar

Chang, Y. P., and D. H. Zhu. 2011. “Understanding Social Networking Sites Adoption in China: A Comparison of Pre-adoption and Post-adoption.” Computers in Human Behavior 27 (5): 1840–8, https://doi.org/10.1016/j.chb.2011.04.006.Search in Google Scholar

Chatterjee, S., S. Sarker, and J. S. Valacich. 2015. “The Behavioural Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use.” Journal of Management Information Systems 31 (4): 49–87, https://doi.org/10.1080/07421222.2014.1001257.Search in Google Scholar

Chiang, L., and B. Lee. 2011. “Ethical Attitude and Behaviours Regarding Computer Use.” Ethics & Behavior 21 (6): 481–97, https://doi.org/10.1080/10508422.2011.622181.Search in Google Scholar

Clough, J. 2015. “Possession of “Extreme” Pornography: Where’s the Harm?” Canadian Journal of Law and Technology 13 (2): 131–69.Search in Google Scholar

Cohen, J. 1992. “A Power Primer.” Psychological Bulletin 112 (1): 155–9, https://doi.org/10.1037/0033-2909.112.1.155.Search in Google Scholar

Cronan, T. P., and S. Al-Rafee. 2008. “Factors that Influence the Intention to Pirate Software and Media.” Journal of Business Ethics 78 (4): 527–45, https://doi.org/10.1007/s10551-007-9366-8.Search in Google Scholar

Curran, K., S. Graham, and C. Temple. 2011. “Advertising on Facebook.” International Journal of E-Business Development (IJED) 1 (1): 26–33.Search in Google Scholar

Cvijikj, I. P., and F. Michahelles. 2013. “Online Engagement Factors on Facebook Brand Pages.” Social Network Analysis and Mining 3 (4): 843–61, https://doi.org/10.1007/s13278-013-0098-8.Search in Google Scholar

Cybercrime Act. 2015. https://www.cert.gov.ng/ngcert/resources/CyberCrime__Prohibition_Prevention_etc__Act__2015.pdf (accessed June 12, 2021).Search in Google Scholar

Davinson, N., and E. Sillence. 2010. “It Won’t Happen to Me: Promoting Secure Behaviour Among Internet Users.” Computers in Human Behavior 26 (6): 1739–47, https://doi.org/10.1016/j.chb.2010.06.023.Search in Google Scholar

Davis, F. 1993. “User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioural Impacts.” International Journal of Man-Machine Studies 38 (3): 475–87, https://doi.org/10.1006/imms.1993.1022.Search in Google Scholar

Echebarria-Echabe, A. 2013. “Mortality Salience and Uncertainty: Similar Effects but Different Processes?” European Journal of Social Psychology 43 (3): 185–91, https://doi.org/10.1002/ejsp.1938.Search in Google Scholar

Eldakak, S. 2010. “Does Applying Ethics in Education Have an Effective Impact in the Classroom?” Online Submission. https://files.eric.ed.gov/fulltext/ED511723.pdf (accessed June 12, 2021).Search in Google Scholar

Federal University of Agriculture. 2013. “Abeokuta.” FUNAAB ICT Policy. https://ceadese.unaab.edu.ng/download/FUNAAB%20ICT%20POLICY.pdf (accessed January 1, 2021).Search in Google Scholar

Fischer, D., and C. Fick. 1993. “Measuring Social Desirability: Short Forms of the Marlowe-Crowne Social Desirability Scale.” Educational and Psychological Measurement 53 (2): 417–24, https://doi.org/10.1177/0013164493053002011.Search in Google Scholar

Fishbein, M., and I. Ajzen. 1975. Belief, Attitude, Intention and Behaviour: An Introduction to Theory and Research. Massachusetts: Addison-Wesley Publishing Company.Search in Google Scholar

Fornell, C., and D. F. Larcker. 1981. “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error.” Journal of Marketing Research 18: 39–50, https://doi.org/10.1177/002224378101800104.Search in Google Scholar

George, J. 2004. “The Theory of Planned Behaviour and Internet Purchasing.” Internet Research 14 (3): 198–212, https://doi.org/10.1108/10662240410542634.Search in Google Scholar

Glanz, K., and D. Bishop. 2010. “The Role of Behavioural Science Theory in Development and Implementation of Public Health Interventions.” Annual Review of Public Health 31: 399–418, https://doi.org/10.1146/annurev.publhealth.012809.103604.Search in Google Scholar

Goles, T., B. Jayatilaka, B. George, L. Parsons, V. Chambers, D. Taylor, and R. Brune. 2008. “Softlifting: Exploring Determinants of Attitude.” Journal of Business Ethics 77 (4): 481–99, https://doi.org/10.1007/s10551-007-9361-0.Search in Google Scholar

Hair, J., W. Black, B. Babin, and R. Anderson. 2009. Multivariate Data Analysis, 7th ed. Upper Saddle River: Pearson Prentice Hall.Search in Google Scholar

Hair, J., G. T. Hult, C. Ringle, and M. Sarstedt. 2014. A Primer on Partial Least Squares Structural Equation Modelling (PLS-SEM), 1st ed. Los Angeles: Sage Publications.Search in Google Scholar

Hair, J., C. Ringle, and M. Sarstedt. 2011. “PLS-SEM: Indeed, a Silver Bullet.” Journal of Marketing Theory and Practice 19 (2): 139–52, https://doi.org/10.2753/mtp1069-6679190202.Search in Google Scholar

Harding, T., M. Mayhew, C. Finelli, and D. Carpenter. 2007. “The Theory of Planned Behavior as a Model of Academic Dishonesty in Engineering and Humanities Undergraduates.” Ethics & Behavior 17 (3): 255–79, https://doi.org/10.1080/10508420701519239.Search in Google Scholar

Head, K., and S. Noar. 2014. “Facilitating Progress in Health Behaviour Theory Development and Modification: The Reasoned Action Approach as a Case Study.” Health Psychology Review 8 (1): 34–52, https://doi.org/10.1080/17437199.2013.778165.Search in Google Scholar

Helvaci, M. 2015. “Schools’ Readiness towards Change.” The Anthropologist 19 (3): 723–34, https://doi.org/10.1080/09720073.2015.11891708.Search in Google Scholar

Henseler, J., C. Ringle, and M. Sarstedt. 2015. “A New Criterion for Assessing Discriminant Validity in Variance-Based Structural Equation Modelling.” Journal of the Academy of Marketing Science 43 (1): 115–35, https://doi.org/10.1007/s11747-014-0403-8.Search in Google Scholar

Hu, L. -T., and P. M. Bentler. 1999. “Cutoff Criteria for Fit Indexes in Covariance Structure Analysis: Conventional Criteria versus New Alternatives.” Structural Equation Modeling: A Multidisciplinary Journal 6 (1): 1–55, https://doi.org/10.1080/10705519909540118.Search in Google Scholar

International Telecommunication Union. 2018. Measuring the Information Society Report 2018, Vol. 1. Geneva: ITU. https://www.itu.int/en/ITU-D/Statistics/Documents/publications/misr2018/MISR-2018-Vol-1-E.pdf (accessed December 19, 2018).Search in Google Scholar

Intellectual Property Right (IPR) Act. 2008. http://www.rcips.uct.ac.za/usr/rcips/images/news/home/IP_Act_2008.pdf (accessed June 12, 2021).Search in Google Scholar

Jamil, M., J. Shah, and T. Riaz-ul-Haq. 2013. “IT Ethics: Undergraduates’ Perception Based on Their Awareness.” Journal of Education and Practice 4 (12): 110–22.Search in Google Scholar

Jamwal, S., and N. Gupta. 2012. “Software Piracy Among IT Students of J & K: Ethical or Unethical.” In International Conference on Recent Advances and Future Trends in Information Technology, Patiala, Punjab, India, 33–6.Search in Google Scholar

Johnson, D. G. 1985. “Should Computer Programs Be Owned?” Metaphilosophy 16 (4): 276–88, https://doi.org/10.1111/j.1467-9973.1985.tb00174.x.Search in Google Scholar

Jorgensen, T. D., S. Pornprasertmanit, A. M. Schoemann, and Y. Rosseel. 2018. semTools: Useful Tools for Structural Equation Modeling (Version 0.5-1) [Computer software]. Comprehensive R Archive Network. Also available at https://CRAN.R-project.org/package=semTools.Search in Google Scholar

Kaptein, M. 2011. “Understanding Unethical Behavior by Unravelling Ethical Culture.” Human Relations 64 (6): 843–69, https://doi.org/10.1177/0018726710390536.Search in Google Scholar

Kaufman, L. 2011. “How Private Is the Internet?” IEEE Security & Privacy 9 (1): 73–5, https://doi.org/10.1109/msp.2011.11.Search in Google Scholar

Kavuk, M., H. Keser, and N. Teker. 2011. “Reviewing Unethical Behaviors of Primary Education Students’ Internet Usage.” Procedia-Social and Behavioral Sciences 28: 1043–52, https://doi.org/10.1016/j.sbspro.2011.11.190.Search in Google Scholar

Kim, E. S., C. Cao, Y. Wang, and D. Nguyen. 2017. “Measurement Invariance Testing with Many Groups: A Comparison of Five Approaches.” Structural Equation Modeling: A Multidisciplinary Journal 24 (4): 524–44, https://doi.org/10.1080/10705511.2017.1304822.Search in Google Scholar

Kizza, J. 2015. “Security Motives and Threats to Computer Networks.” In Guide To Computer Network Security, edited by A. J. Sammes, 61–86. London: Springer.10.1007/978-1-4471-6654-2_3Search in Google Scholar

Kline, R. 2010. Principles and Practice of Structural Equation Modelling, 3rd ed. New York: Guilford Press.Search in Google Scholar

Liao, C., H. -N. Lin, and Y. -P. Liu. 2010. “Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behaviour.” Journal of Business Ethics 91 (2): 237–52, https://doi.org/10.1007/s10551-009-0081-5.Search in Google Scholar

Lindell, M., and D. Whitney. 2001. “Accounting for Common Method Variance in Cross-Sectional Research Designs.” Journal of Applied Psychology 86 (1): 114, https://doi.org/10.1037/0021-9010.86.1.114.Search in Google Scholar

Logan, K. 2014. “Why Isn’t Everyone Doing it? A Comparison of Antecedents to Following Brands on Twitter and Facebook.” Journal of Interactive Advertising 14 (2): 60–72, https://doi.org/10.1080/15252019.2014.935536.Search in Google Scholar

MacCord, A. 2015. “Infringing a Standard-Essential Patent or Not.” IEEE Power and Energy Magazine 2 (4): 14–62, https://doi.org/10.1109/mpel.2015.2484678.Search in Google Scholar

Martin, N., and B. S. Woodward. 2011. “Computer Ethics of American and European Information Technology Students: A Cross-Cultural Comparison.” Issues in Information Systems 12 (1): 78–87.Search in Google Scholar

Mardia, K. 1970. “Measures of Multivariate Skewness and Kurtosis with Applications.” Biometrika 57 (3): 519–30, https://doi.org/10.1093/biomet/57.3.519.Search in Google Scholar

Martz, W. B., and M. Shepherd. 2007. “The Influence of Media Factors on Ethical Behavior.” In 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07), 247a. Big Island: IEEE.10.1109/HICSS.2007.543Search in Google Scholar

Mason, R. 1986. “Four Ethical Issues of the Information Age.” MIS Quarterly 10 (1): 5–12, https://doi.org/10.2307/248873.Search in Google Scholar

de Melo, C., and T. de Sousa. 2017. “Reflections on Cyberethics Education for Millennial Software Engineers.” In 2017 IEEE/ACM 1st International Workshop on Software Engineering Curricula for Millennials (SECM), 40–6. Buenos Aires: IEEE.10.1109/SECM.2017.10Search in Google Scholar

McEachan, R. R. C., M. Conner, N. J. Taylor, and R. J. Lawton. 2011. “Prospective Prediction of Health-Related Behaviours with the Theory of Planned Behaviour: A Meta-Analysis.” Health Psychology Review 5 (2): 97–144, https://doi.org/10.1080/17437199.2010.521684.Search in Google Scholar

Moor, J. 1985. “What Is Computer Ethics?” Metaphilosophy 16 (4): 266–75, https://doi.org/10.1111/j.1467-9973.1985.tb00173.x.Search in Google Scholar

Moskowitz, S. L. 2017. Cybercrime and Business: Strategies for Global Corporate Security. Kidlington: Butterworth-Heinemann (An Imprint of Elsevier).10.1016/B978-0-12-800353-4.00013-0Search in Google Scholar

Muntanda, M. C., M. Badia, R. Cladellas, and C. Gotzens. 2013. “Academic Cheating and Gender Differences in Barcelona (Spain).” Summa psicológica UST (Enlínea) 10 (1): 65–72.10.18774/448x.2013.10.37Search in Google Scholar

Muthén, L. K., and B. O. Muthén. (1998) 2018. Mplus: Statistical Analysis with Latent Variables: User’s Guide, 8th ed. Loss Angeles: Muthén & Muthén Los Angeles.Search in Google Scholar

National ICT Policy of 2012. 2012. https://ictpolicyafrica.org/en/document/3fb9w5vigsn?page=1 (accessed June 12, 2021).Search in Google Scholar

O’Driscoll, F. 2013. “The Employee-Organisation Relationship of University Academics: Social Exchange, Psychological Contract & Organisational Support Perspectives.” PhD diss., University of Limerick. Also available at https://ulir.ul.ie/bitstream/handle/10344/3597/ODriscoll_2013_employee.pdf.Search in Google Scholar

Ocholla, D. 2009. “Information Ethics Education in Africa. Where Do We Stand?” TheInternational Information & Library Review 41 (2): 79–88, https://doi.org/10.1080/10572317.2009.10762802.Search in Google Scholar

O’Fallon, M. J., and K. D. Butterfield. 2005. “A Review of the Empirical Ethical Decision-Making Literature: 1996-2003.” Journal of Business Ethics 59: 375–413.10.1007/978-94-007-4126-3_11Search in Google Scholar

Quigley, M., ed. 2005. Information Security and Ethics: Social and Organizational Issues. Australia: Monash University.10.4018/978-1-59140-286-2Search in Google Scholar

R Core Team. 2018. R: A Language and Environment for Statistical Computing, (Version 1.2.5033) [computer software]. Vienna: R Foundation for Statistical Computing. https://www.R-project.org/ (accessed June 12, 2021).Search in Google Scholar

Ramirez, E., M. E. David, and M. J. Brusco. 2013. “Marketing’s SEM Based Nomological Network: Constructs and Research Streams in 1987–1997 and in 1998–2008.” Journal of Business Research 66 (9): 1255–60, https://doi.org/10.1016/j.jbusres.2012.02.022.Search in Google Scholar

Revelle, W. 2019. Psych: Procedure for Psychological, Psychometric, and Personality Research, R package version 1.9.12. Evanston Illinois: North western University. https://CRAN.R-project.org/package=psych (accessed June 12, 2021).Search in Google Scholar

Rogers, E. M. 1995. “Diffusion of Innovations: Modifications of a Model for Telecommunications.” In Die diffusion von innovation in der telecommunication, edited by M. W. Stoetzer, and A. Mahler, 25–38. Berlin: Springer.10.1007/978-3-642-79868-9_2Search in Google Scholar

Rosseel, Y. 2012. “Lavaan: An R Package for Structural Equation Modelling and More. Version 0.5-12 (BETA).” Journal of Statistical Software 48 (2): 1–36, https://doi.org/10.18637/jss.v048.i02.Search in Google Scholar

Rutkowski, L., and D. Svetina. 2014. “Assessing the Hypothesis of Measurement Invariance in the Context of Large-Scale International Surveys.” Educational and Psychological Measurement 74 (1): 31–57, https://doi.org/10.1177/0013164413498257.Search in Google Scholar

Rutkowski, L., and D. Svetina. 2017. “Measurement Invariance in International Surveys: Categorical Indicators and Fit Measure Performance.” Applied Measurement in Education 30 (1): 39–51, https://doi.org/10.1080/08957347.2016.1243540.Search in Google Scholar

Sabatier, P. A., and C. M. Weible, eds. 2014. Theories of the Policy Process. Boulder: Westview Press.Search in Google Scholar

Saias, M. A. 2014. “Unlawful Acquisition of Trade Secrets by Cyber Theft: between the Proposed Directive on Trade Secrets and the Directive on Cyber Attacks.” Journal of Intellectual Property Law & Practice 9 (9): 721–9, https://doi.org/10.1093/jiplp/jpu117.Search in Google Scholar

Schepers, J., W. Voordeckers, T. Steijvers, and E. Laveren. 2014. “The Entrepreneurial Orientation–Performance Relationship in Private Family Firms: the Moderating Role of Socioemotional Wealth.” Small Business Economics 43 (1): 39–55, https://doi.org/10.1007/s11187-013-9533-5.Search in Google Scholar

Schultz, W. 2006. “Behavioural Theories and the Neurophysiology of Reward.” Annual Review of Psychology 57: 87–115, https://doi.org/10.1146/annurev.psych.56.091103.070229.Search in Google Scholar

Stone, T. H., I. M. Jawahar, and J. L. Kisamore. 2010. “Predicting Academic Misconduct Intentions and Behavior Using the Theory of Planned Behavior and Personality.” Basic and Applied Social Psychology 32 (1): 35–45, https://doi.org/10.1080/01973530903539895.Search in Google Scholar

Stylianou, A., S. Winter, N. Yuan, R. Giacalone, and M. Campbell. 2013. “Understanding the Behavioural Intention to Report Unethical Information Technology Practices: The Role of Machiavellianism, Gender, and Computer Expertise.” Journal of Business Ethics 117 (2): 333–43, https://doi.org/10.1007/s10551-012-1521-1.Search in Google Scholar

Sureshchandar, G. S., C. Rajendran, and T. J. Kamalanabhan. 2001. “Customer Perceptions of Service Quality: a Critique.” Total Quality Management 12 (1): 111–24, https://doi.org/10.1080/09544120020010138.Search in Google Scholar

Tabachnick, B. G., L. S. Fidell, and J. B. Ullman. 2007. Using Multivariate Statistics, Vol. 5. Boston: Pearson.Search in Google Scholar

Tavani, H. T. 2013. “ICT Ethics Bibliography 2012–2014: A Select List of Recent Books.” Ethics and Information Technology 15 (3): 243–7, https://doi.org/10.1007/s10676-013-9327-0.Search in Google Scholar

Taylor, S., and P. A. Todd. 1995. “Understanding Information Technology Usage: A Test of Competing Models.” Information Systems Research 6 (2): 144–76, https://doi.org/10.1287/isre.6.2.144.Search in Google Scholar

The Freedom of Information (FOI) Act. 2011. https://www.icrc.gov.ng/foi/ (accessed June 12, 2021).Search in Google Scholar

The National Health Policy. 2016. https://health.gov.ng/doc/National-Health-Policy-2016-21032019.pdf (accessed June 12, 2021).Search in Google Scholar

Thomas, T., and M. Ahyick. 2010. “Can We Help Information Systems Students Improve Their Ethical Decision Making?” Interdisciplinary Journal of Information, Knowledge, and Management 5 (2010): 209–24, https://doi.org/10.28945/1160.Search in Google Scholar

Truong, Y. 2009. “An Evaluation of the Theory of Planned Behaviour in Consumer Acceptance of Online Video and Television Services.” Electronic Journal of Information Systems Evaluation 12 (2): 177–86.Search in Google Scholar

University of Zululand. 2013a. “Policy and Procedure on Research Ethics.” http://uzsite.unizulu.ac.za/research-and-innovation/policies-and-guidelines/ (accessed June 12, 2021).Search in Google Scholar

University of Zululand. 2013b. “Policy and Procedures on Intellectual Property.” http://www.unizulu.ac.za/wp-content/uploads/2017/08/RI-P6.pdf (accessed June 12, 2021).Search in Google Scholar

University of Zululand. 2013c. “Policy and Procedure on Managing and Preventing Acts of Plagiarism.” http://www.unizulu.ac.za/wp-content/uploads/2017/08/RIP4.pdf (accessed June 12, 2021).Search in Google Scholar

University of Zululand. 2013d. “Research Ethics Guide.” http://www.unizulu.ac.za/wp-content/uploads/2017/08/RI-P3.pdf (accessed June 12, 2021).Search in Google Scholar

Vanclay, F., J. T. Baines, and C. N. Taylor. 2013. “Principles for Ethical Research Involving Humans: Ethical Professional Practice in Impact Assessment Part I.” Impact Assessment and Project Appraisal 31 (4): 243–53, https://doi.org/10.1080/14615517.2013.850307.Search in Google Scholar

Venkatesh, V., M. G. Morris, G. B. Davis, and F. D. Davis. 2003. “User Acceptance of Information Technology: Toward a Unified View.” MIS Quarterly 27 (3): 425–78, https://doi.org/10.2307/30036540.Search in Google Scholar

Walden, I. 2013. “Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent.” In Privacy and Security for Cloud Computing, edited by S. Pearson, and G. Yee, 45–71. London: Springer.10.1093/oso/9780198716662.003.0013Search in Google Scholar

Wang, Y., and S. Sun. 2010. “Assessing Beliefs, Attitudes, and Behavioral Responses toward Online Advertising in Three Countries.” International Business Review 19 (4): 333–44, https://doi.org/10.1016/j.ibusrev.2010.01.004.Search in Google Scholar

Wu, H., and R. Estabrook. 2016. “Identification of Confirmatory Factor Analysis Models of Different Levels of Invariance for Ordered Categorical Outcomes.” Psychometrika 81 (4): 1014–45, https://doi.org/10.1007/s11336-016-9506-0.Search in Google Scholar

Xu, Z., Q. Hu, and C. Zhang. 2013. “Why Computer Talents Become Computer Hackers.” Communications of the ACM 56 (4): 64–74, https://doi.org/10.1145/2436256.24362710.1145/2436256.2436272.Search in Google Scholar

Yoon, C. 2010. “Ethical Decision-Making in the Internet Context: Development and Test of an Initial Model Based on Moral Philosophy.” Computers in Human Behavior 27 (6): 2401–9.10.1016/j.chb.2011.08.007Search in Google Scholar

Yuan, K. -H., and W. Chan. 2016. “Measurement Invariance via Multigroup SEM: Issues and Solutions with Chi-Square Difference Tests.” Psychological Methods 21 (3): 405–26, https://doi.org/10.1037/met0000080.Search in Google Scholar

Published Online: 2021-10-20
Published in Print: 2021-12-20

© 2021 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 28.3.2024 from https://www.degruyter.com/document/doi/10.1515/libri-2019-0062/pdf
Scroll to top button