排序方式: 共有33条查询结果,搜索用时 15 毫秒
21.
Effy Oz 《Journal of Business Ethics》2001,34(2):137-142
IS professionals have been reported to have one of the highest turnover rates. They have also often been accused of unethical conduct, specifically, pirating software, hacking, giving professional opinion that exceeds their knowledge, and not protecting people's privacy. In a sample of 71 IS professionals and 250 members of other professions we found that IS professionals were more committed to their organizations than the other professionals, and that IS professionals were, indeed, less ethical with respect to software piracy and hacking. However, we found that they were not less ethical regarding professional opinions that exceed one's knowledge and protecting people's privacy. 相似文献
22.
This paper investigates industry-wide agreements on joint refund policies, and how they influence price competition. We compute the profit of fully-colluding, competing, and semicolluding service providers who offer refunds to those consumers who do not show up at the time of service. Our main findings are that both a monopoly serving all consumer types, and semicollusive service providers offer full refunds. In contrast, competing service providers offer only partial refunds. Finally, refund policies are investigated under moral hazard behavior. 相似文献
23.
A panel held at the International Conference on Information Systems, December 5–7, 1993, addressed the importance and ethicality of several issues relating to ethics and information technology use. The substance of the debate and results of audience votes on the issues are presented in this paper as a means of initiating a broader debate on the issues, for it is with debate that we reach a group consensus on acceptable behavior and practice. With consensus, we can begin to develop codes and policies that are feasible and practical for ethical computer use.Specific dilemmas debated involved the issues of privacy and ownership, including the ethicality of using company resources for personal use and monitoring compliance to company policies about computer use. In general, we found little consensus about ethicality of any of the types of conduct, although we found a high degree of consensus that the debated issues were important and should continue to be discussed. The final question concerned policies and codes. While policies and codes were believed to be necessary, they were also perceived as ineffective. Several suggestions for practical action to enhance the efficacy of ethical codes are presented. 相似文献
24.
Abstract. We investigate firms' outsourcing decisions when production requires a large number of inputs. The novelty of our approach is that it provides a testable framework to characterize the equilibrium fraction of outsourced inputs. We demonstrate that intensified competition in a Cournot market for the final good typically enlarges the set of outsourced components relative to those produced in‐house. The proportions of outsourced inputs are found to be strategic substitutes independently of whether firms compete with respect to quantities or prices in the market for the final good. JEL classification: D20, L22 相似文献
25.
This study evaluates the effects of institutional investors' common ownership of firms competing in the same market. Overall, common ownership has two opposing effects: (a) it serves as a device for weakening market competition, and (b) it induces diversification, thereby reducing portfolio risk. We conduct a detailed welfare analysis within which the competition‐softening effects of an increased degree of common ownership is weighted against the associated diversification benefits. 相似文献
26.
Effy Oz 《Journal of Business Ethics》1993,12(9):709-726
Professions have adopted ethical codes and codes of conduct. Physicians, lawyers, engineers, and other professionals have moral responsibilities. They know to whom they are responsible. Professionals in the data processing field, too, need to know that they have moral responsibilities and to whom they are responsible. This paper compares and evaluates the ethical codes of four major organizations of computer professionals in America. The analysis is done along the following obligations that every professional has: to society, to the employer, to clients, to colleagues, to the professional organization, and to the profession.Professionals in the information technology field have no single, agreed upon code of conduct. In the US alone there are four organizations promoting four different codes. While some of the behavioral precepts are similar, others are not. People who are members of more than one organization may wonder how they should act in certain circumstances. Furthermore, computer professionals are not provided with any guidance for cases of ethical conflicts.Flaws of the four codes and differences among them are discussed, examples of moral dilemmas are given, and points for improvement are suggested.Effy Oz is an assistant professor of Management Information Systems in the School of Business Administration at Wayne State University, and the coordinator of the MIS program. He has published articles inInformation Executive, OMEGA, Decision Sciences, Information & Management, Journal of Systems Management, andMiS Quarterly. 相似文献
27.
We analyze how different degrees of privacy protection affect industry profits, consumer welfare, and total welfare in a model with switching costs. Firms earn higher profits under weak privacy protection compared with strong or no privacy protection. The relationship between the degree of privacy protection and equilibrium profits is not monotonic. Consumer surplus and total welfare increase with the degree of privacy protection unless firms recognize consumer‐specific switching costs. In that case, pricing conditional on switching costs has favorable implications for consumer surplus and total welfare. 相似文献
28.
Copyright protection and hardware taxation 总被引:2,自引:0,他引:2
This paper investigates the recently practiced method of taxing hardware and transferring the proceeds to software makers, or artists in general. We characterize the conditions under which the policy of compensating copyright owners for infringements on their intellectual property using hardware taxation is inefficient. 相似文献
29.
Seda Oz 《The Financial Review》2020,55(4):557-581
Beginning in 2010, mandated Financial Accounting Standards No. 166 and 167 (SFAS 166/167) changed the consolidation rules of securitization entities and required more information about their securitization activities. I find that securitizing banks experienced a decrease in information asymmetry from the pre- to the post-SFAS 166/167 periods, and that more visible securitizing banks are less sensitive to SFAS 166/167. These inferences are robust to a number of sensitivity analyses. This study is one of the first to provide evidence of the effects of SFAS 166/167 on the information asymmetry of securitizing banks. 相似文献
30.
This paper demonstrates that there is a strategic reason why software firms have followed consumers' desire to drop software protection. We analyze software protection policies in a price-setting duopoly software industry selling differentiated software packages, where consumers' preference for particular software is affected by the number of other consumers who (legally or illegally) use the same software. Increasing network effects make software more attractive to consumers, thereby enabling firms to raise prices. However, it also generates a competitive effect resulting from feircer competition for market shares. We show that when network effects are strong, unprotecting is an equilibrium for a noncooperative industry. 相似文献