User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
Intentional insider misuse of information systems resources (ie, IS misuse) represents a
significant threat to organizations. For example, industry statistics suggest that between 50 …
significant threat to organizations. For example, industry statistics suggest that between 50 …
Software piracy in the workplace: A model and empirical test
Theft of software and other intellectual property has become one of the most visible
problems in computing today. This paper details the development and empirical validation of …
problems in computing today. This paper details the development and empirical validation of …
Business students and ethics: A meta-analysis
Given the proliferation of research regarding the ethical development of students in general,
and business students in particular, it is difficult to draw conclusions from the contradictory …
and business students in particular, it is difficult to draw conclusions from the contradictory …
What influences IT ethical behavior intentions—planned behavior, reasoned action, perceived importance, or individual characteristics?
This study extends IT ethics research by proposing an IT ethical behavioral model that
includes attitude, perceived importance, subjective norms, situational factors, and individual …
includes attitude, perceived importance, subjective norms, situational factors, and individual …
Modeling IT ethics: A study in situational ethics
Misuse of computer information systems has caused significant losses to business and
society, even though computing has benefited both businesses and professionals. To this …
society, even though computing has benefited both businesses and professionals. To this …
Relationships among perceived organizational core values, corporate social responsibility, ethics, and organizational performance outcomes: An empirical study of …
KG **, RG Drozdenko - Journal of Business Ethics, 2010 - Springer
This study is an extension of our recent ethics research in direct marketing (2003) and
information technology (2007). In this study, we investigated the relationships among core …
information technology (2007). In this study, we investigated the relationships among core …
Behavioral intention in social networking sites ethical dilemmas: An extended model based on theory of planned behavior
The expanding use of social networking sites (SNSs) and their flexible functionalities allow
individuals to use these sites in unexpected and unethical ways. SNS users face ethical …
individuals to use these sites in unexpected and unethical ways. SNS users face ethical …
Neutralizing music piracy: An empirical examination
The current study sought to test the viability of employing Sykes and Matza's techniques of
neutralization as a framework for understanding online music piracy. Using data from a …
neutralization as a framework for understanding online music piracy. Using data from a …
Neutralization theory and online software piracy: An empirical analysis
S Hinduja - Ethics and Information Technology, 2007 - Springer
Accompanying the explosive growth of information technology is the increasing frequency of
antisocial and criminal behavior on the Internet. Online software piracy is one such behavior …
antisocial and criminal behavior on the Internet. Online software piracy is one such behavior …
Unethical behavior in information systems: The gender factor
D Khazanchi - Journal of Business Ethics, 1995 - Springer
This article reports the findings of a survey examining whether gender differences influence
the degree to which individuals recognize unethical conduct in the use and development of …
the degree to which individuals recognize unethical conduct in the use and development of …