Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse
详细信息    查看全文
  • 作者:Paul Benjamin Lowry (1)
    Clay Posey (2)
    Tom L. Roberts (3)
    Rebecca J. Bennett (3)
  • 关键词:Culture ; Computer abuse ; Deontological evaluations ; Ethics ; Formalism ; Information security ; Organizational security ; Teleological evaluations ; Utilitarianism ; Collectivism ; Individualism
  • 刊名:Journal of Business Ethics
  • 出版年:2014
  • 出版时间:May 2014
  • 年:2014
  • 卷:121
  • 期:3
  • 页码:385-401
  • 全文大小:
  • 参考文献:1. Anderson, J. C. (1978). The validity of Haire’s shopping list projective technique. / Journal of Marketing Research, / 15(4), 644-49. CrossRef
    2. Ariss, S. S. (2002). Computer monitoring: Benefits and pitfalls facing management. / Information & Management, / 39(7), 553-58. CrossRef
    3. Bailey, W. J., & Spicer, A. (2007). When does national identity matter? Convergence and divergence in international business ethics. / Academy of Management Journal, / 50(6), 1462-480. CrossRef
    4. Banerjee, D., Cronan, T. P., & Jones, T. M. (1998). Modeling IT ethics: A study in situational ethics. / MIS Quarterly, / 22(1), 31-0. CrossRef
    5. Beekun, R. I., Hamdy, R., Westerman, J. W., & HassabElnaby, H. R. (2008). An exploration of ethical decision-making processes in the United States and Egypt. / Journal of Business Ethics, / 82(3), 587-05. CrossRef
    6. Bennett, R. J., & Robinson, S. L. (2000). Development of a measure of workplace deviance. / Journal of Applied Psychology, / 85(3), 349-60. CrossRef
    7. Birnbaum, M. H. (2004). Human research and data collection via the internet. / Annual Reviews of Psychology, / 55, 803-32. CrossRef
    8. Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A., & Boss, R. W. (2009). If someone is watching, I’ll do what I’m asked: Mandatoriness, control, and information security. / European Journal of Information Systems, / 18(2), 151-64. CrossRef
    9. Boudreau, M. C., Gefen, D., & Straub, D. W. (2001). Validation in information systems research: A state-of-the-art assessment. / MIS Quarterly, / 25(1), 1-6. CrossRef
    10. Brady, F. N., & Dunn, C. P. (1995). Business meta-ethics: An analysis of two theories. / Business Ethics Quarterly, / 3, 5.
    11. Brady, F. N., & Wheeler, G. E. (1996). An empirical study of ethical predispositions. / Journal of Business Ethics, / 15(9), 927-40. CrossRef
    12. Calluzzo, V. J., & Cante, C. J. (2004). Ethics in information technology and software use. / Journal of Business Ethics, / 51(3), 301-12. CrossRef
    13. Cavusoglu, H., Raghunathan, S., & Cavusoglu, H. (2009). Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. / Information Systems Research, / 20(2), 198-17. CrossRef
    14. Cenfetelli, R. T., & Bassellier, G. (2009). Interpretation of formative measurement in information systems research. / MIS Quarterly, / 33(4), 689-07.
    15. Chatterjee, S., Sarker, S., & Fuller, M. (2009). Ethical information systems development: A Baumanian postmodernist perspective. / Journal of the Association for Information Systems, / 10(11), 787-15.
    16. Chen, X. P., & Li, S. (2005). Cross-national differences in cooperative decision-making in mixed-motive business contexts: The mediating effect of vertical and horizontal individualism. / Journal of International Business Studies, / 36, 622-36. CrossRef
    17. Cheng, H. K., Sims, R. R., & Teegen, H. (1997). To purchase or to pirate software: An empirical study. / Journal of Management Information Systems, / 13(4), 49-0.
    18. Chin, W. W., Marcolin, B. L., & Newsted, P. R. (1996, December 16-8). / A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and voice mail emotion/adoption study. Paper presented at the 17th International conference on information systems, Cleveland, OH, USA.
    19. Chin, W., Marcolin, B., & Newsted, P. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail emotion/adoption study. / Information Systems Research, / 14(2), 189-17. CrossRef
    20. Cohen, E., & Cornwell, L. (1989). A question of ethics: Developing information system ethics. / Journal of Business Ethics, / 8(6), 431-37. CrossRef
    21. Cook, T. D., & Campbell, D. T. (1979). / Quasi-experimentation: Design and analysis for field settings. Chicago: Rand McNally.
    22. Culnan, M., & Williams, C. (2009). How ethics can enhance organizational privacy: Lessons from the ChoicePoint and TJX data breaches. / MIS Quarterly, / 33(4), 673-86.
    23. D’Arcy, J., & Hovav, A. (2007). Deterring internal information systems misuse. / Communications of the ACM, / 50(10), 113-17. CrossRef
    24. D’Arcy, J., Hovav, A., & Galletta, D. F. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. / Information Systems Research, / 20(1), 79-8. CrossRef
    25. Davison, R. M., Martinsons, M. G., Ou, C. X. J., Murata, K., Drummond, D., Li, Y., et al. (2009). The ethics of IT professionals in Japan and China. / Journal of the Association for Information Systems, / 10(11), 834-59.
    26. Diamantopoulos, A., & Siguaw, J. A. (2006). Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration. / British Journal of Management, / 17(2006), 263-82. CrossRef
    27. Diamantopoulos, A., & Winklhofer, H. M. (2001). Index construction with formative indicators: An alternative to scale development. / Journal of Marketing Research, / 38(2), 269-77. CrossRef
    28. Donaldson, T. (1996). Values in tension: Ethics away from home. / Harvard Business Review, / 74(5), 48-2.
    29. Douglas, D. E., Cronan, T. P., & Behel, J. D. (2007). Equity perceptions as a deterrent to software piracy behavior. / Information & Management, / 44(5), 503-12. CrossRef
    30. Earley, P. C. (1989). Social loafing and collectivism. / Administrative Science Quarterly, / 34, 565-81. CrossRef
    31. Fischer, R., Ferreira, M. C., Assmar, E. M. L., Redford, P., & Harb, C. (2005). Organizational behaviour across cultures: Theoretical and methodological issues for developing multi-level frameworks involving culture. / International Journal of Cross Cultural Management, / 5(1), 27-8. CrossRef
    32. Fisher, R. J. (1993). Social desirability bias and the validity of indirect questioning. / Journal of Consumer Research, / 20(2), 303-15. CrossRef
    33. Fiske, A. P. (2002). Using individualism and collectivism to compare cultures—A critique of the validity and measurement of the constructs: Comment on Oyserman et al. (2002). / Psychological Bulletin, / 128(1), 78-8. CrossRef
    34. Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. / Journal of Marketing Research, / 18(1981), 39-0. CrossRef
    35. Fraley, R. C. (2007). Using the internet for personality research: What can be done, how to do it, and some concerns. In R. W. Robins, R. C. Fraley, & R. F. Krueger (Eds.), / Methods in personality psychology (pp. 130-48). New York: Guilford.
    36. Gan, L. L., & Koh, H. C. (2006). An empirical study of software piracy among tertiary institutions in Singapore. / Information & Management, / 43(5), 640-49. CrossRef
    37. Gattiker, U. E., & Kelley, H. (1999). Morality and computers: Attitudes and differences in moral judgments. / Information Systems Research, / 10(3), 233-54. CrossRef
    38. Gefen, D., & Straub, D. W. (2005). A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example. / Communications of the Association for Information Systems, / 16(5), 91-09.
    39. Haines, R., & Leonard, L. N. K. (2007). Situational influences on ethical decision-making in an IT context. / Information & Management, / 44(3), 313-20. CrossRef
    40. Hansen, J. V., Lowry, P. B., Meservy, R., & McDonald, D. (2007). Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. / Decision Support Systems, / 43(4), 1362-374. CrossRef
    41. Harrington, S. J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. / MIS Quarterly, / 20(3), 257-78. CrossRef
    42. Herath, T., & Rao, H. R. (2009a). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. / Decision Support Systems, / 47(2), 154-65. CrossRef
    43. Herath, T., & Rao, H. R. (2009b). Protection motivation and deterrence: A framework for security policy compliance in organisations. / European Journal of Information Systems, / 18(2), 106-25. CrossRef
    44. Hilton, T. (2000). Information systems ethics: A practitioner survey. / Journal of Business Ethics, / 28(4), 279-84. CrossRef
    45. Hofstede, G. (1984). / Culture’s consequences: International differences in work related values. London: Sage.
    46. Hofstede, G. (1991). / Cultures and organizations: Software of the mind. Berkshire: McGraw-Hill Book Company Europe.
    47. Hofstede, G. (2001). / Culture’s consequences—Comparing values, behaviors, institutions, and organizations across nations (2nd ed.). London: Sage.
    48. Hofstede, G. (2002). The pitfalls of cross-national survey research: A reply to the article by Spector et al. on the psychometric properties of the Hofstede value survey module 1994. / Applied Psychology: An International Review, / 51(1), 170-78. CrossRef
    49. Hunt, S. D., & Vitell, S. J. (1986). A general theory of marketing ethics. / Journal of Macromarketing, / 6(Spring), 5-6. CrossRef
    50. Husted, B. W. (2000). The impact of national culture on software piracy. / Journal of Business Ethics, / 26(3), 197-11. CrossRef
    51. Husted, B., & Allen, D. (2008). Toward a model of cross-cultural business ethics: The impact of individualism and collectivism on the ethical decision-making process. / Journal of Business Ethics, / 82(2), 293-05. CrossRef
    52. Husted, B. W., Dozier, J. B., McMahon, J. T., & Kattan, M. W. (1996). The impact of cross-national carriers of business ethics on attitudes about questionable practices and form of moral reasoning. / Journal of International Business Studies, / 27(2), 391-11. CrossRef
    53. Jaworski, B. J., & MacInnis, D. J. (1989). Marketing jobs and management controls: Toward a framework. / Journal of Marketing Research, / 26, 406-19. CrossRef
    54. Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. / MIS Quarterly, / 34, 549-66.
    55. Jones, T. M., & Ryan, L. V. (1997). The link between ethical judgment and action in organizations: A moral approbation approach. / Organization Science, / 8(6), 663-80. CrossRef
    56. Keith, M., Shao, B., & Steinbart, P. (2009). A behavioral analysis of passphrase design and effectiveness. / Journal of the Association for Information Systems, / 10(2), 63-9.
    57. Kock, N. (2010). / WarpPLS 1.0 user manual. Laredo, TX: ScriptWarp Systems.
    58. Lee, S. M., Lee, S. G., & Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. / Information & Management, / 41, 707-18. CrossRef
    59. Leonard, L. N. K., & Cronan, T. P. (2001). Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences. / Journal of the Association for Information Systems, / 1(12), 1-1.
    60. Leonard, L. N. K., Cronan, T. P., & Kreie, J. (2004). What influences IT ethical behavior intentions—Planned behavior, reasoned action, perceived importance, or individual characteristics? / Information & Management, / 42(2004), 143-58. CrossRef
    61. Liang, H., Saraf, N., Hu, Q., & Xue, Y. (2007). Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management. / MIS Quarterly, / 31(1), 59-7.
    62. Loch, K. D., & Conger, S. (1995). Evaluating ethical decision making and computer use. / Communications of the ACM, / 39(7), 74-3. CrossRef
    63. Lowry, P. B., Romano, N. C., Jenkins, J. L., & Guthrie, R. W. (2009). The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups. / Journal of Management Information Systems, / 26(1), 159-00. CrossRef
    64. Lowry, P. B., Vance, A., Moody, G., Beckman, B., & Read, A. (2008). Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites. / Journal of Management Information Systems, / 24(4), 199-24. CrossRef
    65. McCoy, S., Galletta, D. F., & King, W. R. (2005). Integrating national culture into IS research: The need for current individual-level measures. / Communications of the AIS, / 15, 211-24.
    66. Merhout, J. W., & Havelka, D. (2008). Information technology auditing: A value-added IT governance partnership between IT management and audit. / Communications of the Association for Information Systems, / 23(26), 463-82.
    67. Mick, D. G. (1996). Are studies of dark side variables confounded by socially desirable responding? The case of materialism. / Journal of Consumer Research, / 23(2), 106-11. CrossRef
    68. Moores, T. T., & Chang, J. C.-J. (2006). Ethical decision making in software piracy: Initial development and test of a four-component model. / MIS Quarterly, / 30(1), 167-80.
    69. Moores, T. T., & Dhaliwal, J. (2004). A reversed context analysis of software piracy issues in Singapore. / Information & Management, / 41(8), 1037-042. CrossRef
    70. Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. / European Journal of Information Systems, / 18(2), 126-39. CrossRef
    71. Nunnally, J. C., & Bernstein, I. H. (1994). / Psychometric theory. New York: McGraw-Hill.
    72. Oyserman, D. (2006). High power, low power, and equality: Culture beyond individualism and collectivism. / Journal of Consumer Psychology, / 16(4), 352-56. CrossRef
    73. Oyserman, D., Coon, M., & Kemmelmeier, M. (2002). Rethinking individualism and collectivism: Evaluation of the theoretical assumptions and meta-analysis. / Psychological Bulletin, / 128(1), 3-2. CrossRef
    74. Oyserman, D., & Lee, S. W. S. (2008). Does culture influence what and how we think? Effects of priming individualism and collectivism. / Psychological Bulletin, / 134(2), 311-42. CrossRef
    75. Patel, T., & Schaefe, A. (2009). Making sense of the diversity of ethical decision making in business: An illustration of the Indian context. / Journal of Business Ethics, / 90(2), 171-86. CrossRef
    76. Pavlou, P., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. / MIS Quarterly, / 31(1), 105-36.
    77. Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. / Journal of Management Information Systems, / 20(1), 153-77.
    78. Petter, S., Straub, D. W., & Rai, A. (2007). Specifying formative constructs in information systems research. / MIS Quarterly, / 31(4), 623-56.
    79. Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. / Journal of Applied Psychology, / 88(5), 879-03. CrossRef
    80. Posey, C., Bennett, R., Roberts, T. L., & Lowry, P. B. (2011). When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse. / Journal of Information System Security, / 7(1), 24-7.
    81. Ralston, D. A., Holt, D. H., Terpstra, R. H., & Kai-Cheng, Y. (2008). The impact of national culture and economic ideology on managerial work values: A study of the United States, Russia, Japan, and China. / Journal of International Business Studies, / 39(1), 8-6. CrossRef
    82. Ransbotham, S., & Mitra, S. (2009). Choice and chance: A conceptual model of paths to information security compromise. / Information Systems Research, / 20(1), 121-39. CrossRef
    83. Rao, M. T., Brown, C. V., & Perkins, W. C. (2007). Host country resource availability and information system control mechanisms in multinational corporations: An empirical test of resource dependence theory. / Journal of Management Information Systems, / 23(4), 11-8. CrossRef
    84. Ringle, C. M., Wende, S., & Will, S. (2005). SmartPLS 2.0 (M3) Beta. Retrieved September 17, 2010, from http://www.smartpls.de.
    85. Robertson, C. J., & Crittenden, W. F. (2002). Mapping moral philosophies: Strategic implications for multinational firms. / Strategic Management Journal, / 24(4), 327-38.
    86. Robertson, C., Crittenden, W., Brady, M., & Hoffman, J. (2002). Situational ethics across borders: A multicultural examination. / Journal of Business Ethics, / 38(4), 327-38. CrossRef
    87. Robertson, C., & Fadil, P. A. (1999). Ethical decision making in multinational organizations: A culture-based model. / Journal of Business Ethics, / 19(4), 385-92. CrossRef
    88. Robertson, C., Gilley, K., & Crittenden, W. (2008). Trade liberalization, corruption, and software piracy. / Journal of Business Ethics, / 78(4), 623-34. CrossRef
    89. Robinson, S. L., & Bennett, R. J. (1995). A typology of deviant workplace behaviors: A multidimensional scaling study. / Academy of Management Journal, / 38(2), 555-72. CrossRef
    90. Robinson, S. L., & O’Leary-Kelly, A. M. (1998). Monkey see, monkey do: The influence of work groups on the antisocial behavior of employees. / Academy of Management Journal, / 41(6), 658-72. CrossRef
    91. Schlegelmilch, B. B., & Robertson, D. C. (1995). The influence of country and industry on ethical perceptions of senior executives in the U.S. and Europe. / Journal of International Business Studies, / 26(4), 859-81. CrossRef
    92. Schminke, M., Ambrose, M. L., & Noel, T. W. (1997). The effect of ethical frameworks on perceptions of organizational justice. / Academy of Management Journal, / 40(5), 1190-207. CrossRef
    93. Schminke, M., & Wells, D. (1999). Group processes and performance and their effects on individuals-ethical frameworks. / Journal of Business Ethics, / 18(4), 367-81. CrossRef
    94. Shin, S. K., Ishman, M., & Sanders, G. L. (2007). An empirical investigation of socio-cultural factors of information sharing in China. / Information & Management, / 44(2), 165-74. CrossRef
    95. Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. / MIS Quarterly, / 34, 487-02.
    96. Siponen, M., & Vartiainen, T. (2007). Unauthorized copying of software and levels of moral development: A literature analysis and its implications for research and practice. / Information Systems Journal, / 14(4), 387-07. CrossRef
    97. Smith, H. J., & Hasnas, J. (1999). Ethics and information systems: The corporate domain. / MIS Quarterly, / 23(1), 109-27. CrossRef
    98. Smith, H. J., & Keil, M. (2003). The reluctance to report bad news on troubled software projects: A theoretical model. / Information Systems Journal, / 13(1), 69-5. CrossRef
    99. Smith, H. J., Keil, M., & Depledge, G. (2001). Keeping mum as the project goes under: Toward an explanatory model. / Journal of Management Information Systems, / 18(2), 189-27.
    100. Son, J.-Y., & Kim, S. S. (2008). Internet users-information privacy-protective responses: A taxonomy and a nomological model. / MIS Quarterly, / 32(3), 503-29.
    101. Sproull, L., & Kiesler, S. (1991). / Connections. Boston: MIT Press.
    102. Srite, M., & Karahanna, E. (2006). The role of espoused national cultural values in technology acceptance. / MIS Quarterly, / 30(3), 679-04.
    103. Staples, D. S., Hulland, J. S., & Higgins, C. A. (1999). A self-efficacy theory explanation for the management of remote workers in virtual organizations. / Organization Science, / 10(6), 758-76. CrossRef
    104. Straub, D. W. (1989). Validating instruments in MIS research. / MIS Quarterly, / 13(2), 147-69. CrossRef
    105. Straub, D. W. (1990). Effective IS security: An empirical study. / Information Systems Research, / 1(3), 255-76. CrossRef
    106. Straub, D. W., Boudreau, M. C., & Gefen, D. (2004). Validation guidelines for IS positivist research. / Communications of the Association for Information Systems, / 14(2004), 380-26.
    107. Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. / MIS Quarterly, / 22(4), 441-69. CrossRef
    108. Sutton, S. (1998). Predicting and explaining intentions and behavior: How well are we doing? / Journal of Applied Social Psychology, / 28(15), 1317-338. CrossRef
    109. Sutton, S. G., Khazanchi, D., Hampton, C., & Arnold, V. (2008). Risk analysis in extended enterprise environments: Identification of critical risk factors in B2B e-commerce relationships. / Journal of the Association for Information Systems, / 9(3/4), 151-74.
    110. Swinyard, W. R., Rinne, H., & Kau, A. K. (1990). The morality of software piracy: A cross-cultural analysis. / Journal of Business Ethics, / 9(8), 655-64. CrossRef
    111. Tavakoli, A. A., Keenan, J. P., & Crnjak-Karanovic, B. (2003). Culture and whistleblowing an empirical study of Croatian and United States managers utilizing Hofstede’s cultural dimensions. / Journal of Business Ethics, / 43(1/2), 49-4. CrossRef
    112. Thong, J. Y. L., & Yap, C.-s. (1998). Testing an ethical decision-making theory: The case of softlifting. / Journal of Management Information Systems, / 15(1), 213-37.
    113. Torelli, C. J. (2006). Individuality or conformity? The effects of independent and interdependent self-concepts on public judgments. / Journal of Consumer Research, / 16(3), 240-48. CrossRef
    114. Triandis, H. C., & Gelfand, M. J. (1998). Converging measurement of horizontal and vertical individualism and collectivism. / Journal of Personality and Social Psychology, / 74, 118-28. CrossRef
    115. Tsui, J., & Windsor, C. (2001). Some cross-cultural evidence on ethical reasoning. / Journal of Business Ethics, / 31(2), 143-50. CrossRef
    116. Tuttle, B., Harrell, A., & Harrison, P. (1997). Moral hazard, ethical considerations, and the decision to implement an information system. / Journal of Management Information Systems, / 13(4), 7-7.
    117. Vardi, Y. (2001). The effects of organizational and ethical climates on misconduct at work. / Journal of Business Ethics, / 29, 325-37. CrossRef
    118. Vitell, S. J., Nwachukwu, S. L., & Barnes, J. H. (1993). The effects of culture on ethical decision-making: An application of Hofstede’s typology. / Journal of Business Ethics, / 12(10), 753-60. CrossRef
    119. Voronov, M., & Singer, J. A. (2002). The myth of individualism-collectivism: A critical review. / Journal of Social Psychology, / 142(4), 461-80. CrossRef
    120. Wang, J., Chaudhury, A., & Rao, H. R. (2008). A value-at-risk approach to information security investment. / Information Systems Research, / 19(1), 106-23. CrossRef
    121. Wang, J., Chen, R., Herath, T., & Rao, H. R. (2009). Visual e-mail authentication and identification services: An investigation of the effects on e-mail use. / Decision Support Systems, / 48(1), 92-02. CrossRef
    122. Winter, S., Stylianou, A., & Giacalone, R. (2004). Case of Machiavellianism and ethical ideology. / Journal of Business Ethics, / 54(3), 279-01. CrossRef
    123. Zhang, D., & Lowry, P. B. (2008). Issues, limitations, and opportunities in cross-cultural research on collaborative software in information systems. / Journal of Global Information Management, / 16(1), 61-2. CrossRef
    124. Zhang, D., Lowry, P. B., Zhou, L., & Fu, X. (2008). The impact of individualism-collectivism, social presence, and group diversity on group decision making under majority influence. / Journal of Management Information Systems, / 23(4), 53-0. CrossRef
    125. Zhang, J., Luo, X., Akkaladevi, S., & Ziegelmayer, J. (2009). Improving multiple-password recall: An empirical study. / European Journal of Information Systems, / 18(2), 165-76. CrossRef
    126. Zviran, M., & Erlich, Z. (2006). Identification and authentication: Technology and implementation issues. / Communications of the Association for Information Systems, / 17(4), 90-05.
  • 作者单位:Paul Benjamin Lowry (1)
    Clay Posey (2)
    Tom L. Roberts (3)
    Rebecca J. Bennett (3)

    1. College of Business, City University of Hong Kong, P7912, Academic Building I, 83 Tat Chee Avenue, Hong Kong, China
    2. Information Systems, Statistics and Management Science, Culverhouse College of Commerce, The University of Alabama, Box 870226, Tuscaloosa, AL, 35487, USA
    3. Department of Management and Information Systems, College of Business, Louisiana Tech University, P.O. Box 10318, Ruston, LA, 71272, USA
  • ISSN:1573-0697
文摘
Computer abuse (CA) by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap (1998) to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals who adhere to a formalist ethical perspective are significantly less likely to engage in CA activities than those following a utilitarian ethical framework. In addition, the results provide evidence that employees with individualistic natures are linked to increased CA incidents, whereas collectivist tendencies are associated with decreases in CA behaviors. Our results also show that collectivism acts as a strong moderator that further decreases the relationships between formalism and CA, and utilitarianism and CA. Finally, we offer detailed suggestions on how organizations and researchers can leverage our findings to decrease CA occurrences.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700