Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse

Computer abuse (CA) by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered...

ver descrição completa

Na minha lista:  
Detalhes bibliográficos
Authors: Lowry, Paul Benjamin (Author) ; Posey, Clay (Author) ; Roberts, Tom L. (Author) ; Bennett, Rebecca J. (Author)
Tipo de documento: Recurso Electrónico Artigo
Idioma:Inglês
Verificar disponibilidade: HBZ Gateway
Journals Online & Print:
Carregar...
Fernleihe:Fernleihe für die Fachinformationsdienste
Publicado em: Springer Science + Business Media B. V 2014
Em: Journal of business ethics
Ano: 2014, Volume: 121, Número: 3, Páginas: 385-401
Outras palavras-chave:B Ethics
B Deontological evaluations
B Individualism
B Utilitarianism
B computer abuse
B information security
B Organizational security
B Teleological evaluations
B Formalism
B Collectivism
B Culture
Acesso em linha: Volltext (JSTOR)
Volltext (lizenzpflichtig)

MARC

LEADER 00000caa a22000002 4500
001 1785650793
003 DE-627
005 20230331053420.0
007 cr uuu---uuuuu
008 220112s2014 xx |||||o 00| ||eng c
024 7 |a 10.1007/s10551-013-1705-3  |2 doi 
035 |a (DE-627)1785650793 
035 |a (DE-599)KXP1785650793 
035 |a (DE-He213)s10551-013-1705-3-e 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 1  |2 ssgn 
100 1 |a Lowry, Paul Benjamin  |e VerfasserIn  |4 aut 
245 1 0 |a Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse 
264 1 |c 2014 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Computer abuse (CA) by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap (1998) to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals who adhere to a formalist ethical perspective are significantly less likely to engage in CA activities than those following a utilitarian ethical framework. In addition, the results provide evidence that employees with individualistic natures are linked to increased CA incidents, whereas collectivist tendencies are associated with decreases in CA behaviors. Our results also show that collectivism acts as a strong moderator that further decreases the relationships between formalism and CA, and utilitarianism and CA. Finally, we offer detailed suggestions on how organizations and researchers can leverage our findings to decrease CA occurrences. 
650 4 |a Individualism 
650 4 |a Collectivism 
650 4 |a Utilitarianism 
650 4 |a Teleological evaluations 
650 4 |a Organizational security 
650 4 |a information security 
650 4 |a Formalism 
650 4 |a Ethics 
650 4 |a Deontological evaluations 
650 4 |a computer abuse 
650 4 |a Culture 
700 1 |a Posey, Clay  |e VerfasserIn  |4 aut 
700 1 |a Roberts, Tom L.  |e VerfasserIn  |4 aut 
700 1 |a Bennett, Rebecca J.  |e VerfasserIn  |4 aut 
773 0 8 |i Enthalten in  |t Journal of business ethics  |d Dordrecht [u.a.] : Springer Science + Business Media B.V, 1982  |g 121(2014), 3, Seite 385-401  |h Online-Ressource  |w (DE-627)270937129  |w (DE-600)1478688-6  |w (DE-576)121465284  |x 1573-0697  |7 nnns 
773 1 8 |g volume:121  |g year:2014  |g number:3  |g pages:385-401 
856 |3 Volltext  |u http://www.jstor.org/stable/42921390  |x JSTOR 
856 4 0 |u https://doi.org/10.1007/s10551-013-1705-3  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mteo 
936 u w |d 121  |j 2014  |e 3  |h 385-401 
951 |a AR 
ELC |a 1 
ITA |a 1  |t 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4033709681 
LOK |0 003 DE-627 
LOK |0 004 1785650793 
LOK |0 005 20220112043811 
LOK |0 008 220112||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-Tue135)IxTheo#2021-12-30#655A1767290BBEF4FAEE7A7C665FA33FA7356503 
LOK |0 040   |a DE-Tue135  |c DE-627  |d DE-Tue135 
LOK |0 092   |o n 
LOK |0 852   |a DE-Tue135 
LOK |0 852 1  |9 00 
LOK |0 866   |x JSTOR#http://www.jstor.org/stable/42921390 
LOK |0 935   |a ixzs  |a ixrk  |a zota 
ORI |a SA-MARC-ixtheoa001.raw