Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse
Computer abuse (CA) by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered...
Authors: | ; ; ; |
---|---|
Tipo de documento: | Recurso Electrónico Artigo |
Idioma: | Inglês |
Verificar disponibilidade: | HBZ Gateway |
Journals Online & Print: | |
Fernleihe: | Fernleihe für die Fachinformationsdienste |
Publicado em: |
Springer Science + Business Media B. V
2014
|
Em: |
Journal of business ethics
Ano: 2014, Volume: 121, Número: 3, Páginas: 385-401 |
Outras palavras-chave: | B
Ethics
B Deontological evaluations B Individualism B Utilitarianism B computer abuse B information security B Organizational security B Teleological evaluations B Formalism B Collectivism B Culture |
Acesso em linha: |
Volltext (JSTOR) Volltext (lizenzpflichtig) |
MARC
LEADER | 00000caa a22000002 4500 | ||
---|---|---|---|
001 | 1785650793 | ||
003 | DE-627 | ||
005 | 20230331053420.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220112s2014 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s10551-013-1705-3 |2 doi | |
035 | |a (DE-627)1785650793 | ||
035 | |a (DE-599)KXP1785650793 | ||
035 | |a (DE-He213)s10551-013-1705-3-e | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 1 |2 ssgn | ||
100 | 1 | |a Lowry, Paul Benjamin |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse |
264 | 1 | |c 2014 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Computer abuse (CA) by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap (1998) to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals who adhere to a formalist ethical perspective are significantly less likely to engage in CA activities than those following a utilitarian ethical framework. In addition, the results provide evidence that employees with individualistic natures are linked to increased CA incidents, whereas collectivist tendencies are associated with decreases in CA behaviors. Our results also show that collectivism acts as a strong moderator that further decreases the relationships between formalism and CA, and utilitarianism and CA. Finally, we offer detailed suggestions on how organizations and researchers can leverage our findings to decrease CA occurrences. | ||
650 | 4 | |a Individualism | |
650 | 4 | |a Collectivism | |
650 | 4 | |a Utilitarianism | |
650 | 4 | |a Teleological evaluations | |
650 | 4 | |a Organizational security | |
650 | 4 | |a information security | |
650 | 4 | |a Formalism | |
650 | 4 | |a Ethics | |
650 | 4 | |a Deontological evaluations | |
650 | 4 | |a computer abuse | |
650 | 4 | |a Culture | |
700 | 1 | |a Posey, Clay |e VerfasserIn |4 aut | |
700 | 1 | |a Roberts, Tom L. |e VerfasserIn |4 aut | |
700 | 1 | |a Bennett, Rebecca J. |e VerfasserIn |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Journal of business ethics |d Dordrecht [u.a.] : Springer Science + Business Media B.V, 1982 |g 121(2014), 3, Seite 385-401 |h Online-Ressource |w (DE-627)270937129 |w (DE-600)1478688-6 |w (DE-576)121465284 |x 1573-0697 |7 nnns |
773 | 1 | 8 | |g volume:121 |g year:2014 |g number:3 |g pages:385-401 |
856 | |3 Volltext |u http://www.jstor.org/stable/42921390 |x JSTOR | ||
856 | 4 | 0 | |u https://doi.org/10.1007/s10551-013-1705-3 |x Resolving-System |z lizenzpflichtig |3 Volltext |
935 | |a mteo | ||
936 | u | w | |d 121 |j 2014 |e 3 |h 385-401 |
951 | |a AR | ||
ELC | |a 1 | ||
ITA | |a 1 |t 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4033709681 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1785650793 | ||
LOK | |0 005 20220112043811 | ||
LOK | |0 008 220112||||||||||||||||ger||||||| | ||
LOK | |0 035 |a (DE-Tue135)IxTheo#2021-12-30#655A1767290BBEF4FAEE7A7C665FA33FA7356503 | ||
LOK | |0 040 |a DE-Tue135 |c DE-627 |d DE-Tue135 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-Tue135 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 866 |x JSTOR#http://www.jstor.org/stable/42921390 | ||
LOK | |0 935 |a ixzs |a ixrk |a zota | ||
ORI | |a SA-MARC-ixtheoa001.raw |