ABSTRACT
Because most organizations depend on computer systems that electronically store important data to perform crucial business functions, the integrity of these information systems is paramount. Securing company systems, however, is not always an easy task. More sophisticated systems often provide widespread access to computer resources and increased user knowledge, which may lead to added difficulties in maintaining security. This paper explores whistleblowing-employees ' exposing illegal or unethical computer practices taking place in the organization~as a method of computer security and the support for whistleblowing found in codes of ethical conduct formulated by professional societies.
INTRODUCTION Whistleblowing is the term applied to the reporting by employees of illegal, immoral, or illegitimate practices under the control of their employers to parties who can take corrective action (Elliston 1985). Whistleblowing is a controversial organizational issue. On the positive side, whistleblowers can help organizations correct unsafe products or working conditions and curb fraudulent or wasteful practices. Whistleblowers may provide a previously underutilized source of information critical in maintaining the performance of large complex organizations (Ewing 1983, Miceli & Near 1985). Conversely, whistleblowers may threaten an organization 's authority structure, cohesiveness, and public image (Weinstein 1979). Despite the problems, there is an increased interest on the part of managers in the issue of whistleblowing and how to handle such incidents (Bamett 1993, Ewing 1983, Keenan 1988a, Rowe & Baker 1984). Codes of ethics provide guidance for professionals in such fields as accounting, law, engineering, medicine, and education, as well as in information systems. This paper
References: Barker, Richard A. (1993), "An Evaluation of the Ethics Program at General Dynamics," Journal of Business Ethics, Vol 12, No 3, pp 165-177. Bamett, Tim, Cochran, Daniel S., and Taylor, G. Stephen (1993) "The Internal Disclosure Policies of Private Sector Employees: An Initial Look at Their Relationship to Employee Whistleblowing," Journal of Business Ethics, Vol 12, No 2, pp 127-136. September 1993 61 Bommer, Michael, Gratto, Clarence, Gravander, Jerry, and Tuttle, Mark (1987) "A Behavior Model of Ethical and Unethical Decision Making," Journal of Business Ethics, Vol 6, pp 265-280. Brody, Michael (1986) "Listen to your Whistleblower," Fortune, Vol 114, pp 77-78. Charney, Scott (1992) "The Justice Department Responds to the Growing Threat of Computer Crime," Computer Security Journal, Vol VIII, No 2, pp 1-12. Dworkin, Terry Morehead, and Near, Janet P. (1987) "Whistleblowing Statutes: Are They Working," American Business Law Journal, Vol 25, pp 241-264. Elliston, F. A., (1982) "Civil Disobedience and Whistleblowing: A Comparative Appraisal of Two Forms of Dissent," Journal of Business Ethics, Vol 1, pp 167-177. Ewing, D. W. (1983) Do It My Way--0r You 're Fired, New York: John Wiley and Sons. Fimbel, Nancie and Burstein, Jerome S. (1990) "Defining the Ethical Standards of the HighTechnology Industry," Journal of Business Ethics, Vol 9, pp 929-948. Gordon, Richard (1992) "The Long Road to Responsible Computing," Computer Security Journal, Vol VIII, No l.pp 69-80. Hauserman, John L. (1986) "Whistleblowing: Individual Morality in a Corporate Society," Business Horizons, Vol 29, No 4, pp 28-38. Keenan, John P. (1988a) "Communication Climate, Whistleblowing, and the First-Level Manager: A Preliminary Study," Academy of Management Best Papers Proceedings, pp 247-251. Keenan, John P., (1988b) "Comparing Employee and Managerial Whistleblowing: A Preliminary Study and Evaluation," Proceedings, Annual National Conference of the Council on Employee Responsibilities and Rights, October, Virginia Beach, Virginia. Malone, David (1993) "The Ethical Issues of Automated Information Processing," Journal of Computer Information Systems, Vol XXXIII, No 3, pp 82-84. Miceli, M. P. and Near, J. P. (1985) "Characteristics of Organizational Climate and Perceived Wrongdoing Associated with Whistleblowing Decisions," Personnel Psychology, Vol 38, No 3, pp 525-544. Oz, Effy (1992), "Ethical Standards for Information Systems Professionals: A Case for a Unified Code," MIS Quarterly, Vol 16, No 4, pp 423-433. Parmerlee, Marcia A., Near, Janet P., and Jensen, Tamila C. (1982), "Correlates of Whistleblowers ' Perceptions of Organizational Retaliation," Administrative Science Quarterly, Vol 27, pp 17-34. Pierson, J. K., and Forcht, Karen (1990) "Whistleblowing as a Computer Abuse Countermeasure," Data Security Management, New York: Auerbach Publishers. Rowe, M. P. and Baker, M. (1984) "Are You Hearing Enough Employee Concerns?" Harvard Business Review, May-June, pp 27-35. United States Merit Systems Protection Board (1981) Whistleblowing and the Federal Employee, Washington: Government Printing Office. Vitell, Scott J. and Davis, Donald L. (1990) "Ethical Beliefs of MIS Professionals: The Frequency and Opportunity for Unethical Behavior," Journal of Business Ethics, Vol 9, pp 63-70. Weinstein, D. (1979) Bureaucratic Opposition, New York: Pergamon Press. 62 AJIS