Moral Psychology and Information Ethics: Psychological Distance and The Components of Moral Action in A Digital World
Moral Psychology and Information Ethics: Psychological Distance and The Components of Moral Action in A Digital World
Moral Psychology and Information Ethics: Psychological Distance and The Components of Moral Action in A Digital World
work is a model of moral behavior that identifies the joint action of four
psychological processes: sensitivity, judgment, motivation, and action (Narvaez &
Rest, 1995).
Certainly, the information age has been accompanied by its share of
technology-related ethical issues and challenges. Interestingly, many (if not most) of
these challenges are not fundamentally new (Barger, 2001). Although there may well
be exceptions, information technology appears to have created new and different
ways to engage in the same kinds of unethical behaviors seen throughout history,
from stealing property to invading personal privacy (Johnson, 2001). Because these
issues have been studied and analyzed for years in other contexts, it is all the more
important for information science researchers and practitioners to be well acquainted
with general principles of moral and ethical development. Indeed, it is now wellattested that our perceptions of the moral landscape are influenced by developmental
and social-cognitive factors (Lapsley & Narvaez, in press). In order to plan
educational interventions that help technology users develop appropriate ethical
attitudes and behaviors with respect to their use of information technology, educators
can take advantage of a wealth of knowledge about moral development from the
field of moral psychology.
The purpose of this chapter is to acquaint those working in the field of
Information Science with a psychological perspective on moral or ethical behavior.
In this chapter we examine key psychological processes that are critical for moral
behavior, discuss the function of these processes in the domain of technology, and
suggest strategies to enhance education related to information ethics.
At the outset, it is important to draw attention to our use of certain terms. While
we make no substantive distinction between the terms moral and ethical, there is
an important difference between what may be considered moral and what is
legal, or conversely between what is immoral and what is illegal. To be
legal is to conform ones behavior to the laws established by the societies in which
we live. Morality, on the other hand, is a matter of conformity to divine law or
codes of conduct derived from principles of right and wrong that transcend societal
strictures. There is no automatic correspondence between that which is legal and
that which is moral, or vice versa. That is, depending on the society, what many
would consider immoral practices may be considered legal (e.g., prostitution in
Nevada) while some illegal practices (e.g., harboring Jewish fugitives in Nazi
Germany during World War 2) may be quite moral.
A FOUR COMPONENT MODEL OF MORAL BEHAVIOR
We ignore ethics and computing at our peril! (Rogerson & Bynum, 1995)
Unethical behavior is pervasive and timeless, as is the question of why people do
bad things. What makes some people behave morally or ethically and others not?
Psychologists interested in moral development have attempted to answer such
questions by examining the psychological components of morality, the elements that
work in concert to bring about moral behavior (Rest, 1979). Emerging from this
The Four Component Model (Narvaez & Rest, 1995; Rest, 1979) represents the
internal processes necessary for a moral act to ensue: moral sensitivity, moral
judgment, moral motivation, and moral action. These components are not
personality traits or virtues; rather they are major units of analysis used to trace how
a person responds in a particular social situation. The model depicts an ensemble of
processes, not a single, unitary one. Therefore, the operation of a single component
does not predict moral behavior. Instead, behaving morally depends upon each
process and the execution of the entire ensemble. Each process involves cognitive,
affective, and behavioral aspects that function together in fostering the completion of
a moral action.
Collectively, the following processes comprise the Four Component Model and
are presented in logical order: (1) Ethical sensitivity involves perceiving the
relevant elements in the situation and constructing an interpretation of those
elements. This first component also includes consideration of what actions are
possible, who and what might be affected by each possible action, and how the
involved parties might react to possible outcomes. (2) Ethical judgment relates to
reasoning about the possible actions and deciding which is most moral or ethical. (3)
Ethical motivation involves prioritizing what is considered to be the most moral or
ethical action over all others and being intent upon following that course. (4)
Ethical action combines the strength of will with the social and psychological
skills necessary to carry out the intended course of action. This fourth component,
then, is dependent both on having the requisite skills and on persisting in the face of
any obstacles or challenges to the action that may arise.
When considering moral or ethical behavior, a post-hoc analysis of the situation
is often most helpful. In this way, we can point out where the processes might have
failed. Consider the young adult who is tempted to download copyrighted music that
has been illegally placed on a file sharing system in violation of the owners rights.
Lets call this young adult, Jim, and examine the four component processes in an
effort to understand what might happen. Moreover, lets assume that downloading
music for which one has not paid under these circumstances is both illegal and
immoral.
Ethical Sensitivity
To respond to a situation in a moral way, a person must be able to perceive and
interpret events in a way that leads to ethical action. The person must be sensitive to
situational cues and must be able to visualize various alternative actions in response
to that situation. A morally sensitive person draws on many aspects, skills,
techniques and components of interpersonal sensitivity. These include taking the
perspectives of others (role taking), cultivating empathy for and a sense of
connection to others, and interpreting a situation based on imagining what might
happen and who might be affected. Individuals with higher empathy for others and
with better perspective-taking skills are more likely to behave for the good of others
in a manner that is said to be pro-social (Eisenberg, 1992). So if Jim, our young
adult, has highly developed ethical sensitivity skills, he takes the perspectives of all
the people involved in producing the music. He feels empathy for their welfare and a
sense of concern for them. He considers the ramifications of downloading
copyrighted material including his and other peoples welfare and reactions.
Ethical Judgment
After Jim has identified the lay of the land through an active set of ethical
sensitivity skills, he must determine which action to take. Ethical judgment has to do
with assessing the possible actions and determining which is the most moral.
Hundreds of research studies have demonstrated that individuals (male and female)
develop increasingly sophisticated moral reasoning structures based on age and
experience, especially related to education (Rest, Narvaez, Bebeau, & Thoma, 1999).
Jim could use one of several moral schemas (conceptual structures) in making a
decision about what to do.
Rest et al. (1999) have identified three schemas individuals access depending on
their level of moral judgment development. Using the Personal Interests Schema
(common in high school students and younger), Jim would consider what benefits
himself the most and perhaps choose to download the music from the file-sharing
server. Alternatively, he might be worried about being caught and having to suffer the
consequences, leading him to choose not to download. Based on recent threats in the
news about how record companies intend to bring lawsuits against those who are
participating in illegal sharing of copyrighted music files over the Internet, Jims
mother might have warned him about doing such things. That she may find out also
might deter him, because he wants to be a good son. If his reasoning is even more
sophisticated he would be concerned about societal laws and social order
(Maintaining Norms Schema). This would likely deter him, unless he subscribes to
some other non-civil set of laws (e.g., cult norms). Yet even more sophisticated
(Postconventional Schema) reasoning would lead Jim to think of ideal social
cooperation. At this level, he could behave as an Idealist by seeking to take an action
that he could demand of anyone in his position (Kants Categorical Imperative), or he
could adopt the view of a Pragmatist by choosing his actions according to what
would bring about the greatest good for the greatest number. In either case, at the
postconventional level of reasoning, Jim is likely to resist downloading.
In fact, Friedman (1997) has shown that moral sensitivity and reasoning are
critical to adolescents decisions and opinions regarding the acceptability of taking
actions such as violating copyright protection by making illegal copies of computer
programs (i.e., pirating) or invading someones privacy through unauthorized access
to (i.e., hacking) their computer files. Friedman (1997) demonstrated that adolescents
who viewed as permissible pirating and hacking did so not out of lack of respect for
property and privacy rights in general but because they judged computer property to
be different than other types of property (see Technology and Ethical Behavior
section below), suggesting that moral sensitivity (i.e., assigning moral relevance to
some kinds of property and not others) was more at issue here than was moral
judgment. The difference in question seems to be related to the relative lack of
tangibility associated with digital instantiations of things like documents or songs
(i.e., computer property) compared to things like bicycles or cars (i.e., physical
property).
Ethical Motivation
In this section, we will briefly review some of the known ways in which technology
can exert such influences.
Technology-Mediated Communication and Psychological Distance
After deciding that a particular action is the most moral, Jim must set aside other
goals and interests to further its completion. He may have developed the necessary
dispositional skills to maintain a sense of moral integrity such as the ability to
distract himself from his original (impulsive) goal to download. Jim can more easily
acquire these skills if he is already conscientious and has cultivated a sense of
responsibility to others, or if he has a religious orientation in which he derives
meaning from a power greater than himself. Research suggests that persons who
chronically maintain moral standards as central to the self are more likely to interpret
situations and react in ways that are consistent with these standards (Lapsley &
Narvaez, in press). So, if Jim has not developed these qualities, he may give in to his
initial impulse to download at this point. In so doing, Jim would elevate other values
(e.g., status, power, pleasure, or excitement) above the moral standards related to
ethical action.
Ethical Action
The final component of the model is comprised of the skills that facilitate
successful implementation of the moral action. Jim must know what steps are
necessary to complete a moral action and possess the perseverance necessary to
follow them. This component may be less salient in our hypothetical situation
because it involves a singular personal decision to download or not download. But,
imagine a more complex situation in which Jim has a friend who did illegally
download copyrighted material on a campus computer. What should Jim do? If he
decides to report the friend, he would need to know what steps to take and would
need to have the motivation to follow through even if it costs him the friendship.
Recall that the Four Component Model is a set of processes that, working in
concert, result in moral behavior. This implies that the course of moral behavior may
fail at any point due to a weakness in one or more processes. Some people may
function well in one process but may be deficient in another. For instance, Jim may
demonstrate great sensitivity but poor judgment skills, or he might make an excellent
judgment but fail in follow-through. We next examine the domain of technology to
see how it potentially affects information ethics and the four component processes
outlined above.
TECHNOLOGY AND ETHICAL BEHAVIOR
While technology itself may not pose fundamentally new ethical challenges, it
may well impinge in unique and important ways on one or more components of the
model presented above. This, in turn, would be expected to affect ethical behavior.
taken together, these findings reveal that digital instantiations of objects (e.g.,
programs) or materials (e.g., computer files) are viewed differently than their
physical counterparts (e.g., diaries).
Digital Objects and Ethical Judgments
The apparent differential perceptions of digital and non-digital materials reported
by Friedman (1997) and Teston (2002) beg this question: How might ethical
judgments (mediated by Component 2) differ with respect to these materials? One
might expect that behavior considered ethically wrong in connection with tangible
property or materials could be viewed differently when it comes to digital property or
materials. That is, to the extent that digital objects or materials are perceived as
being less private than their more tangible counterparts, a greater moral
permissiveness is likely to be attached to behavior involving those objects or
materials.
Both Friedmans (1997) and Testons (2002) findings confirmed these suspicions.
In terms of property, Friedman observed that none of the students in her sample
thought it was alright to take someone elses physical property (a bicycle). In
contrast, 77% felt is was okay to copy someone elses computer program (i.e., pirate
it) for their own use; 47% said it was alright to pirate a program to give to someone
else; and 40% even approved of piracy for purposes of making a profit by selling the
copies. In addition, 62% also thought it was okay to pirate music to give away. With
respect to materials, only 3% of the students said it was okay to read someone elses
private diary, and only 10% said it was acceptable to read an open letter lying on
someone elses desk. But when it came to materials in electronic form, 43% said it
was fine to access someone elses computer files if you didnt read them, and 16%
said it was okay to access and read someone elses files. Interestingly, however, no
one in the sample approved of accessing and changing information in those files.
Teston (2002) found a similar pattern of results with younger adolescents. While
only 10% of the students advocated taking someone elses bicycle, 52% thought it
was okay to pirate software, and 65% found it all right to pirate music CDs. When
the possibility of pirating digital objects via the internet was explored, even greater
latitude was observed. That is, 60% of the students said it was okay to pirate
software from the Internet, and 85% found it acceptable to pirate commercial music
files in MP3 format. The increased permissiveness associated with digital property
was highlighted by Testons (2002) overall finding that 88% of those who advocated
software piracy were opposed to stealing a bicycle.
Thus, it seems that perceptions of digital objects and materials, as well as
judgments about what constitutes appropriate behavior with respect to such
materials, differ from those associated with more tangible objects. Just as was noted
for computer-mediated communication, wherein the electronic medium seems to
distance communicator from audience, digital instantiations of property (i.e.,
programs, music, or information) seem to distance users from property owners.
Consequently, in both cases, a kind of increased permissiveness can arise resulting in
situational behaviors (e.g., flaming, piracy) that may deviate from that which would
Two further points about the effects of technology on behavior should be noted
here. First, we must acknowledge that this medium may have many other influences
on human action than those we have focused on here. We do not pretend to have
offered an exhaustive look at all the possibilities in this regard. Second, not all of the
consequences of technology are bad. Even in terms of the psychological distance
factor we have identified, there are some instances in which enhanced self-disclosure
or a reduced sense of evaluation anxiety mediated by a technological format may in
fact be beneficial. For example, using technologically-mediated communication
channels, shy patients may feel more comfortable revealing important kinds of
information to doctors or therapists. Similarly, students reluctant to participate in
class might open up using electronic discussion boards or chat rooms.
information technology, the gap between communicator and audience or user and
property owner imposed by the technologically-inspired psychological distance we
have described above must be narrowed so that proper ethical sensitivity can be
achieved. Here we would recommend exercises designed to enhance personal
empathy skills, particularly as they relate to technology use. These exercises would
focus on highlighting who is affected by personal technology use. Who is on the
other end of that communication, or who really owns that resource? How would you
react or what would you expect if you were in their position? Students might be
encouraged to imagine the person on the other end of the communication as someone
they know, as usually happens in instant messaging behavior with friends.
Developing Ethical Judgment
allow for exploration of existing mandates (or laws) and consequences related to
domains like privacy, intellectual property, and intellectual honesty.
Developing Ethical Action
Ethical action skills include planning to implement decisions (e.g., thinking
strategically) and cultivating courage (e.g., standing up under pressure). To increase
the ability to complete an ethical action, students need to develop ego strength (i.e.,
strength of will) and specific implementation skills. To increase ego strength,
students should learn self-talk that allows them to encourage themselves towards a
moral goal and distracts them from temptation. They should also know how to
mobilize support from others for the ethical action. To increase implementation
skills, students need to observe models implementing specific skills. They need to
practice implementing, step by step, a particular ethical action in multiple contexts.
For information ethics, a primary focus might be on identifying obstacles and
challenges to ethical action: What tends to get in the way of doing that which is right
and how can such challenges be managed? Of course, peer pressure often is a
perennial challenge in this regard that should be considered at some length.
CONCLUSION
In this chapter, we have argued that information ethics can be informed by moral
psychology: specifically, the Four Component Model of moral behavior. Moreover,
we have examined some of the ways in which technology may impinge on the
components of moral action through the creation of psychological distance.
Further research is needed to study such questions as how a sense of social
embeddedness can be facilitated and how psychological distance can be reduced in
the cyber-world. For example, in technology-mediated communication, can
psychological distance be reduced by incorporating visual representations of the
audience through photos, video, or digital representations (i.e., avatars)?
There is no doubt that technology use will continue and even escalate with time.
Therefore, it is imperative continuously to examine ways in which our understanding
of technologys impact and implications for personal and societal behavior can be
guided by principles derived from other fields of study. Establishing clear ties
between the fields of moral psychology and information ethics is a good place to
start.
References
Barger, R. (2001). Is Computer Ethics Unique in Relation to other Fields of Ethics? Available
at http://www.nd.edu/~rbarger/ce-unique.html.
Barquin, R. C. (1992). In pursuit of a ten commandments for computer ethics. Computer
Ethics Institute. Retrieved September 9, 2003 on the World Wide Web:
http://www.brook.edu/dybdocroot/its/cei/papers/Barquin_Pursuit_1992.htm
6
Day, S., & Schneider, P. L. (2002). Psychotherapy using distance technology: A comparison of
face-to-face, video, and audio treatment. Journal of Counseling Psychology, 49, 499503.
Eisenberg, N. (1992). The caring child. Cambridge, MA: Harvard University Press.
Friedman, B. (1997). Social judgments and technological innovation: Adolescents
understanding of property, privacy, and electronic information. Computers in Human
Behavior, 13(3), 327-351.
Grusec, J. , & Redler, E. (1980). Attribution, reinforcement, and altruism: A developmental
analysis. Developmental Psychology, 16, 525-534.
Johnson, D. G. (2001). Computer ethics. (3rd Ed.). Upper Saddle River: NJ: Prentice Hall
Lapsley, D. K., Enright, R. D., & Serlin, R. (1989). Moral and social education. In J. Worell &
F. Danner (Eds.), The adolescent as decision-maker: Applications to development and
education (pp. 111-143). San Diego: Academic Press.
Lapsley, D., & Narvaez, D. (in press). A social-cognitive view of moral character. In D.
Lapsley & D. Narvaez (Eds.), Moral development: Self and identity. Mahwah, NJ:
Erlbaum.
Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of computermediated communication. American Psychologist, 39, 1123-1134.
Keisler, S., & Sproull, L. (1986). Response effects in the electronic survey. Public Opinion
Quarterly, 50, 402-413.
Narvaez, D. (2001). Moral text comprehension: Implications for education and research.
Journal of Moral Education, 30 (1), 43-54.
Narvaez, D. (in press). The Neo-Kohlbergian Tradition and Beyond: Schemas, Expertise and
Character. In C. Pope-Edwards & G. Carlo (Eds.), Nebraska Symposium Conference
Papers, Vol. 51. Lincoln, NE: University of Nebraska Press.
Narvaez, D., Bock, T., & Endicott, L. (2003). Who should I become? Citizenship, Goodness,
Human Flourishing, and Ethical Expertise. W. Veugelers & F. K. Oser (Eds.), Teaching in
Moral and Democratic Education (pp. 43-63). Bern, Switzerland: Peter Lang.
Narvaez, D. Endicott, L., Bock, T., & Lies, J. (in press). Foundations of character in the
middle school: Developing and Nurturing the Ethical Student. Chapel Hill, NC:
Character Development Publishing.
Narvaez, D., & Rest, J. (1995). The four components of acting morally. In W. Kurtines & J.
Gewirtz (Eds.), Moral behavior and moral development: An introduction (pp. 385-400).
New York: McGraw-Hill.
Rest, J.R. (1979). Developing in judging moral issues. Minneapolis, MN: University of
Minnesota Press.
Rest, J.R. & Narvaez, D. (Eds.) (1994). Moral development in the professions: Psychology
and applied ethics. Hillsdale, NJ: Lawrence Erlbaum.
Rest, J. R., Narvaez, D., Bebeau, M., & Thoma, S. (1999). Postconventional moral thinking: A
neo-Kohlbergian approach. Mahwah, NJ: Erlbaum.
Rogerson, S., & Bynum, T. (1995). Cyberspace: the ethical frontier. The Times Higher
Education Supplement, No 1179, 9 (June), p. iv.
Smith, M. W. (1992). Professional ethics in the information systems classroom: Getting
started. Journal of Information Systems Education, 4(1), 6-11.
Sproull, L., & Keisler, S. (1991). Connections: New ways of working in the networked
organization. Cambridge, MA: MIT Press.
Sumner, M., & Hostetler, D. (2002). A comparative study of computer conferencing and faceto-face communications in systems design. Journal of Interactive Learning Research,
13(3), 277-291.