User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach

J D'Arcy, A Hovav, D Galletta - Information systems research, 2009 - pubsonline.informs.org
Intentional insider misuse of information systems resources (ie, IS misuse) represents a
significant threat to organizations. For example, industry statistics suggest that between 50 …

Software piracy in the workplace: A model and empirical test

AG Peace, DF Galletta, JYL Thong - Journal of Management …, 2003 - Taylor & Francis
Theft of software and other intellectual property has become one of the most visible
problems in computing today. This paper details the development and empirical validation of …

Business students and ethics: A meta-analysis

SC Borkowski, YJ Ugras - Journal of business ethics, 1998 - Springer
Given the proliferation of research regarding the ethical development of students in general,
and business students in particular, it is difficult to draw conclusions from the contradictory …

What influences IT ethical behavior intentions—planned behavior, reasoned action, perceived importance, or individual characteristics?

LNK Leonard, TP Cronan, J Kreie - Information & Management, 2004 - Elsevier
This study extends IT ethics research by proposing an IT ethical behavioral model that
includes attitude, perceived importance, subjective norms, situational factors, and individual …

Modeling IT ethics: A study in situational ethics

D Banerjee, TP Cronan, TW Jones - Mis Quarterly, 1998 - JSTOR
Misuse of computer information systems has caused significant losses to business and
society, even though computing has benefited both businesses and professionals. To this …

Relationships among perceived organizational core values, corporate social responsibility, ethics, and organizational performance outcomes: An empirical study of …

KG **, RG Drozdenko - Journal of Business Ethics, 2010 - Springer
This study is an extension of our recent ethics research in direct marketing (2003) and
information technology (2007). In this study, we investigated the relationships among core …

Behavioral intention in social networking sites ethical dilemmas: An extended model based on theory of planned behavior

H Jafarkarimi, R Saadatdoost, ATH Sim… - Computers in human …, 2016 - Elsevier
The expanding use of social networking sites (SNSs) and their flexible functionalities allow
individuals to use these sites in unexpected and unethical ways. SNS users face ethical …

Neutralizing music piracy: An empirical examination

JR Ingram, S Hinduja - Deviant Behavior, 2008 - Taylor & Francis
The current study sought to test the viability of employing Sykes and Matza's techniques of
neutralization as a framework for understanding online music piracy. Using data from a …

Neutralization theory and online software piracy: An empirical analysis

S Hinduja - Ethics and Information Technology, 2007 - Springer
Accompanying the explosive growth of information technology is the increasing frequency of
antisocial and criminal behavior on the Internet. Online software piracy is one such behavior …

Unethical behavior in information systems: The gender factor

D Khazanchi - Journal of Business Ethics, 1995 - Springer
This article reports the findings of a survey examining whether gender differences influence
the degree to which individuals recognize unethical conduct in the use and development of …