Abstract-The present study is conducted among 283 students from University of Zabol to identify the harm and ethical and social issues in the field of information technology and to classify the immoral practices that students are doing in this field. First various important issues in the field of IT in the social and ethical areas are discussed. Then the cases considered as the most commonly used immoral activities, are selected for evaluation, and the participants ranked these activities according to the method presented in the questionnaire. These activities are examined and analyzed descriptively by SPSS program, reliability of the questionnaire is measured by Cronbach's alpha coefficient, Bartlett Test of Sphericity and KMO index and the validity of the results is verified using T-test and the results are ranked based on the first performance that happens frequently and the last performance that happens rarely or never. Finally, a set of strategies are presented for preventing ethical abuse in the field of Information Technology so that the challenges are reduced.
Various electronic business-to-consumer models have been presented during the past years with different classifications. Each of these models has different dimensions. This paper uses expert knowledge to identify two key dimensions of business to customer models. Each researcher has his own list of business-to-consumer models, and there are differences in the existing lists. In this paper, some appropriate models are identified through interview with experts and fuzzy Delphi method for launching a business. The positions of these models are determined in terms of identified aspects then. Based on the obtained results, ten electronic business-toconsumer models were specified and the dimensions of the type of product and the type of financial relationship with the customer were determined to provide two-dimensional map. Then using fuzzy Delphi method, the position of these models in two-dimensional map was identified.
Abstract-Intellectual property rights (IPR) of computer software is the right to assign the software to its creator, not limited to time and space, and non-transferable. Proving IPR of the creators of computer software requires a rigorous review of the ways in which these rights may be violated. The present study was conducted by comparing two populations in Iran with the aim of identifying the level of familiarity and observance of software IPR: 1) 96 software engineers member of IEEE Association and 2) 386 students randomly. Results are analyzed by SPSS software and the validity of the results is verified using T-test. By comparing the results, it was concluded that the first population significantly observed these cases more. Then a model was presented for protecting software IPR so that the challenges are reduced. This research is the completion of our previous work that was discussed as a future work.
Nowadays, electronic business is one of the most important issues. The importance of E-business has caused more attention to this topic and various studies have tried to clarify features of e-business models. Several studies have been conducted to identify e-business models but a few discussions are in the field of electronic business model resources, but in the field of resourced of electronic business models have not been discussed. This study considers one of the famous classifications of electronic business models and checks that each model has which of three resources, including relationship, data and transaction. For this study, interview with experts and fuzzy Delphi method is used.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.