Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse

Journal of Business Ethics 121 (3):385-401 (2014)
  Copy   BIBTEX

Abstract

Computer abuse by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals who adhere to a formalist ethical perspective are significantly less likely to engage in CA activities than those following a utilitarian ethical framework. In addition, the results provide evidence that employees with individualistic natures are linked to increased CA incidents, whereas collectivist tendencies are associated with decreases in CA behaviors. Our results also show that collectivism acts as a strong moderator that further decreases the relationships between formalism and CA, and utilitarianism and CA. Finally, we offer detailed suggestions on how organizations and researchers can leverage our findings to decrease CA occurrences.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,219

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Information systems ethics: A practitioner survey. [REVIEW]Thomas Hilton - 2000 - Journal of Business Ethics 28 (4):279 - 284.
Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
The hierarchical abuse of power in work organizations.Donald Vredenburgh & Yael Brender - 1998 - Journal of Business Ethics 17 (12):1337-1347.
Introduction and overview: Global information ethics.Terrell Ward Bynum & Simon Rogerson - 1996 - Science and Engineering Ethics 2 (2):131-136.
Just consequentialism and computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.

Analytics

Added to PP
2014-01-16

Downloads
36 (#421,132)

6 months
5 (#544,079)

Historical graph of downloads
How can I increase my downloads?

Author's Profile