File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/s10551-013-1705-3
- Scopus: eid_2-s2.0-84901351658
- WOS: WOS:000336399900005
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse
Title | Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse |
---|---|
Authors | |
Keywords | Teleological evaluations Information security Collectivism Computer abuse Culture Deontological evaluations Ethics Formalism Individualism Utilitarianism Organizational security |
Issue Date | 2014 |
Citation | Journal of Business Ethics, 2014, v. 121, n. 3, p. 385-401 How to Cite? |
Abstract | Computer abuse (CA) by employees is a critical concern for managers. Misuse of an organization's information assets leads to costly damage to an organization's reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap (1998) to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals who adhere to a formalist ethical perspective are significantly less likely to engage in CA activities than those following a utilitarian ethical framework. In addition, the results provide evidence that employees with individualistic natures are linked to increased CA incidents, whereas collectivist tendencies are associated with decreases in CA behaviors. Our results also show that collectivism acts as a strong moderator that further decreases the relationships between formalism and CA, and utilitarianism and CA. Finally, we offer detailed suggestions on how organizations and researchers can leverage our findings to decrease CA occurrences. © 2013 Springer Science+Business Media Dordrecht. |
Persistent Identifier | http://hdl.handle.net/10722/233839 |
ISSN | 2023 Impact Factor: 5.9 2023 SCImago Journal Rankings: 2.624 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lowry, Paul Benjamin | - |
dc.contributor.author | Posey, Clay | - |
dc.contributor.author | Roberts, Tom L. | - |
dc.contributor.author | Bennett, Rebecca J. | - |
dc.date.accessioned | 2016-09-27T07:21:47Z | - |
dc.date.available | 2016-09-27T07:21:47Z | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | Journal of Business Ethics, 2014, v. 121, n. 3, p. 385-401 | - |
dc.identifier.issn | 0167-4544 | - |
dc.identifier.uri | http://hdl.handle.net/10722/233839 | - |
dc.description.abstract | Computer abuse (CA) by employees is a critical concern for managers. Misuse of an organization's information assets leads to costly damage to an organization's reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap (1998) to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals who adhere to a formalist ethical perspective are significantly less likely to engage in CA activities than those following a utilitarian ethical framework. In addition, the results provide evidence that employees with individualistic natures are linked to increased CA incidents, whereas collectivist tendencies are associated with decreases in CA behaviors. Our results also show that collectivism acts as a strong moderator that further decreases the relationships between formalism and CA, and utilitarianism and CA. Finally, we offer detailed suggestions on how organizations and researchers can leverage our findings to decrease CA occurrences. © 2013 Springer Science+Business Media Dordrecht. | - |
dc.language | eng | - |
dc.relation.ispartof | Journal of Business Ethics | - |
dc.subject | Teleological evaluations | - |
dc.subject | Information security | - |
dc.subject | Collectivism | - |
dc.subject | Computer abuse | - |
dc.subject | Culture | - |
dc.subject | Deontological evaluations | - |
dc.subject | Ethics | - |
dc.subject | Formalism | - |
dc.subject | Individualism | - |
dc.subject | Utilitarianism | - |
dc.subject | Organizational security | - |
dc.title | Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/s10551-013-1705-3 | - |
dc.identifier.scopus | eid_2-s2.0-84901351658 | - |
dc.identifier.volume | 121 | - |
dc.identifier.issue | 3 | - |
dc.identifier.spage | 385 | - |
dc.identifier.epage | 401 | - |
dc.identifier.eissn | 1573-0697 | - |
dc.identifier.isi | WOS:000336399900005 | - |
dc.identifier.issnl | 0167-4544 | - |