Linking the Researchers, Developing the Innovations Manuscripts submittal opens till 10 May 2024. Please submit your papers at or

  • Volume 2014

    Appraisal of Individual Understanding of Social and Ethical Circumstances; Information Technology Utilization
    (International Journal of Engineering Works)

    Vol. 1, Issue 3, PP. 64-69, Dec. 2014
    Keywords: Computer Ethics, Technology Acceptance, Ethical Circumstances, Intention to Use, Attitude toward Usage, Customer Satisfaction

    Download PDF


    During the growth of information technology (IT), we can define smart cards as an ideal device for any transaction such as e-commerce, banking, telecommunication, transportation and numerous other technologies. According to users’ security and customization, smart card enhanced the quality of services. Identify aspects that affect the use of smart cards is very significant for complex consumer, of course with respect to ethical interaction, where the main part in any decision-making process should be knowing the clients ethical and behavioral intention to employ smart cards. A short evaluation on ethical settings are introduced in this study to recognize individual understanding of ethical settings by utilizing smart cards and moreover,  a model has been adopted to developed from the ethical and social perspective based on previous acceptance models, ethical frameworks and ethical circumstances.


    Hamed Taherdoost, Shamsul Sahibuddin, and Neda Jalaliyoon

    Vol. 1, Issue 3, PP. 64-69, Dec.  2014

    Full Text


    Hamed Taherdoost, Shamsul Sahibuddin, and Neda Jalaliyoon

    Vol. 1, Issue 3, PP. 64-69, Dec.  2014


    [1]     I. Ajzen, “From intentions to actions: A theory of planned behavior’. Action control: From cognition to behavior 2: 11-39, 1985.

    [2]     I. Ajzen, “The Theory of Planned Behavior”. Organizational Behavior and Human Decision Processes. 50(2): 179-211, 1991.

    [3]     A. I. Al-Alawi and M. A.  Al-Amer, “Young generation attitudes and awareness towards the implementation of smart card in Bahrain: an exploratory study”, Journal of Computer Science, 2 (5), 441-446, 2006.

    [4]     B. A. Aubert and G. Hamel, “Adoption of Smart Cards in the Medical Sector: The Canadian Experience”. Social Science and Medicine. 53(7): 879-894, 2001.

    [5]     J. E. Bailey and S. W. Pearson, “Development of a tool for measuring and analyzing computer user satisfaction”, Management Science, 29, 530–544, 1983.

    [6]     A. Bandura, “Self-efficacy mechanism in human agency”, American Psychologist, 37 (2), 122-147, 1982.

    [7]     J. A. Cruz and W. J. Frey, “An Effective Strategy for Integration Ethics           Across the Curriculum in Engineering: An ABET 2000 Challenge,”         Science and Engineering Ethics, p. 543-568, 2003.

    [8]     M. Fishbein, and I. Ajzen,   Intention and Behavior: An Introduction to Theory and Research. 1975. Boston, MA: Addition-Wesley.

    [9]     L. Floridi, Philosophy and Computing, 1999. London: Routledge.

    [10]  C. Fornell,  M. D. Johnson, E. W. Anderson, J. Cha, and B. E. Bryant. 1996. The American customer satisfaction index: Nature, purpose and findings. Journal of Marketing 60 (October): 7-18.

    [11]  B. Friedman,  (Ed.) 1997. Human values and the design of computer technology. New York: Cambridge University Press and CSLI, Stanford University.

    [12]  D. Gollman, Computer Security. 1999. John Wile & Sons, UK.

    [13]  L. Halawi, J. Aronson and R. McCarthy, Resource-based view of knowledge management for competitive advantage. Journal of Knowledge Management, 3(2),pp. 75-86, 2005.

    [14]  F. Heider, The Psychology of Interpersonal Relations. 1958. New York: Wiley.

    [15]  R. A. Howard, “ Decision analysis: practice and promise. Management Science, 346, 679-695, 1988.

    [16]  C. Huff,  and Frey, W. 2005. Moral Pedagogy and Practical Ethics, in             Science    and Engineering Ethics (Forthcoming).

    [17]  M. Igbaria, and Parasuraman, S. “A path analytic study of individual characteristics, computer anxiety, and attitudes towards microcomputers”. Journal of Management, 15 (3), 373-388, 1989.

    [18]  Kim, Soyoung and Leslie Stoel, “Apparel retailers: website quality dimensions and satisfaction”. Journal of Retailing and Consumer Services, 11.109-117, 2004.

    [19]  R. O. Mason, “Four Ethical Issues of the Information Age”, Management Information Systems Quarterly, 10, 1, 5-12, 1986.

    [20]  K. Mathieson, ‘Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior”. Information Systems Research 2(3): 173-191, 1991.

    [21]  R. W. McGee, “The Ethics of Tax Evasion: A Survey of International Business Academics”. Presented at the 60th International Atlantic Economic Conference, New York, October 6–9, 2005.

    [22]  D. Mellisa, 2006. A Framework for Information Security in Ethics Education system.  University of Maryland.

    [23]  D. Michael , Johnson, L. Nilsson, “The Importance of Reliability and Customization from Goods to Services”. Quality Management Journal. Vol 10, No 1, 2006.

    [24]  M. Namayandeh, M.  Masrom, and Ismail Z, “Development of Computer Ethics Framework for Information Security within Educational Context”. SEATUC. Shibuara University, Japan., pp. 235-240, 2009.

    [25]  NBS Technologies Inc., 2004. Smart Card Frequently Asked Questions.

    [26]  R.L.Oliver, A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions, Journal of Marketing Research, Vol. 17, No. 4, pp. 460−469. 1980.

    [27]  A. C. Raub, Correlates of computer anxiety in college students. Unpublished doctoral dissertation, University of Pennsylvania. 1981.

    [28]  H. Taherdoost., Masrom. M, Ismail. Z. Evaluation of Smart Card Acceptance: Security, Technology and Usage. Conference Proceedings of 3th International Conference on e-Commerce, e-Administration, e-Society, and e-Education (e-CASE). The Grand Copthorne Waterfront, Singapore, January 8-10, 2009, pp. 765-779.

    [29]  S. Taylor, and Todd, P. (1995). Assessing IT usage: the role of prior experience. MIS Quarterly. 19(4), 561–570. 2004.

    [30]  G. Terrell. A Critique of Design Approaches for Notification Systems. Technical Report TR-04-29, Computer Science, Virginia Tech.

    [31]  G.J. Walters, Privacy and Security: An Ethical Analysis, Computers and         Society, 31, 2, 8-23. 2001.

    [32]  M. Wolfinbarger,, Gilly, M.C., 2003. eTailQ: Dimensionalizing, Measuring and Predicting Etail Quality. Journal of Retailing. 79(3), 183-198.

    [33]  Yoon, Sung-Joon, 2002. The antecedents and consequences of trust in online-purchase decisions. Journal of Interactive Marketing, 16: 47-63.

    [34]  H. Taherdoost, , Sahibuddin, S., Jalaliyoon, N. 2011. Smart Card Security; Technology and Adoption, International Journal of Security (IJS),Volume: 5, Issue: 2, Page: 74 – 84.

    [35]  H. Taherdoost, Jalaliyoon, N., Namayandeh, M., Forghani, A., Zamani, M. Adoption Framework Expansion based on the Computer Ethics Related Research Models and Ethical Scenarios Analysis, International Conference on Economics, Business and Management, Page: 219 – 223. 4-5, December 2010, Manila, Philippines.

    [36]  H. Taherdoost, Sahibuddin, S., Namayandeh, M., Jalaliyoon, N. Proposed an educational plan for computer ethics and information security, WCETR , Procedia - Social and Behavioral Sciences. Volume 28, Pages: 815–819. 2011.

    [37]  H. Taherdoost, Masrom, M. An examination of smart card technology acceptance using adoption model, 31st International Conference Information Technology Interfaces (ITI09), Cavtat / Dubrovnik, Croatia, June 22-25, Pages: 329-334. 2009.

    [38]  H. Taherdoost, Zamani, M., Namayandeh, M. Study of Smart Card Technology and Probe User Awareness about It: A Case Study of Middle Eastern Students. International Conference on Management Technology and Applications (ICMTA 2009). Beijing, China, 8-11 August, Volume 5, Pages 334-338.

    [39]  H. Taherdoost, Sahibuddin, S., Namayandeh, M., Jalaliyoon, N. (2013). Computer and Information Security Ethics’ Models. International Conference on Advanced Computer Science Applications and Technologies, 145-149.

    [40]  H. Taherdoost, Sahibuddin, S., Namayandeh, M., Jalaliyoon, N., Kalantari. A., Chaeikar, S,S. (2012). International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 3, No. 4, 1792-1796.