Abstract
This article synthesizes research presented in several models of unethical behavior to develop propositions about the factors that facilitate and mitigate deception in online business communications. The work expands the social network perspective to incorporate the medium of communication as a significant influence on deception. We go beyond existing models by developing seven propositions that identify how social network and issue moral intensity characteristics influence the probability of deception in online business communication in comparison to traditional communication channels. Remedies to detect and discourage deception in online business networks are also offered, as well as limitations and future research directions.
Similar content being viewed by others
References
Agre, P.E.: 2002, ‘Real-Time Politics: The Internet and Political Process’, Information Society 18, 311-331.
Baker, C.R.: 2002, ‘Crime, Fraud and Deceit on the Internet: Is There Hyperreality in Cyberspace?’ Critical Perspectives on Accounting 13, 1-15.
Balestra, M., and A. Cabot: 2004, Internet Gambling Report: An Evolving Conflict between Technology and Law, 7th ed., (River City Group, LLC, St. Charles, MO).
Bok, S.: 1978, Lying: Moral Choice in Public and Private Life, (Pantheon Press, New York).
Borgatti, S.P., and P.C. Foster: 2003, ‘The Network Paradigm in Organizational Research: A Review and Typology’. Journal of Management 29, 991-1013.
Brass, D.J., K.D. Butterfield, and B.C. Skaggs: 1998, ‘Relationships and Unethical Behavior: A Social Network Perspective’, Academy of Management Review 23, 14-31.
Brass, D.J., J. Galaskiewicz, H.R.Greve, and W. Tsai: 2004, ‘Taking Stock of Networks and Organizations: A Multilevel Perspective’, Academy of Management Journal 47: 795-817.
Brown, M.E., L.K. Trevino, and D.A. Harrison: 2005, ‘Ethical Leadership: A Social Learning Perspective for Construct Development and Testing’, Organizational Behavior and Human Decision Processes 97, 117-134.
Burgoon, J.K., and J.F. Nunamaker Jr.: 2004, ‘Toward Computer-aided Support for the Detection of Deception’, Group Decision and Negotiation 13: 1-4.
Chia, A., and L.S. Mee: 2000, ‘The Effects of Issue Characteristics on the Recognition of Moral Issues’, Journal of Business Ethics 27(3), 255-269.
Cornwell, B., and D.C. Lundgren: 2001, ‘Love on the Internet: Involvement and Misrepresentation in Romantic Relationships in Cyberspace vs. Realspace’, Computers in Human Behavior 17, 197-211.
Daft, R.L., and R.H. Lengel: 1986, ‘Organizational Information Requirements, Media Richness and Structural Design’, Management Science 32(5), 554-571.
DePaulo, B.M., J.J. Lindsay, B.E. Malone, L. Muhlenbruck, K. Charlton, and H. Cooper: 2003, ‘Cues to Deception’, Psychological Bulletin 129, 74-118.
Ducheneaut, N.B.: 2002, ‘The Social Impacts of Electronic Mail in Organizations: A Case Study of Electronic Power Games Using Communication Genres’, Information, Communication & Society 5(2), 153-188.
Feldman, M.S.: 1987, ‘Electronic Mail and Weak Ties in Organizations’, Information Technology and People 3, 83-101.
Fox, A.B., D. Bukatko, M. Hallahan, and M. Crawford: 2007, ‘The Medium Makes a Difference: Gender Similarities and Differences in Instant Messaging’, Journal of Language and Social Psychology 26, 389-397.
Galaskiewicz, J., and R. Burt: 1991, ‘Interorganization Contagion in Corporate Philanthropy’, Administrative Science Quarterly 36, 88-105.
Glynn, M.A., and R. Abzug: 2002, ‘Institutionalizing Identity: Symbolic Isomorphism and Organizational Names’, Academy of Management Journal 45, 267-280.
Granovetter, M.: 1973, ‘The Strength of Weak Ties’, American Journal of Sociology 78, 1360-1380.
Granovetter, M.: 1985, ‘Economic Action and Social Structure: The Problem of Embeddedness’, American Journal of Sociology 91, 481-510.
Grazioli, S.: 2004: Where Did They Go Wrong? An Analysis of the Failure of Knowledgeable Internet Consumers to Detect Deception over the Internet’, Group Decision and Negotiation 13, 149-172.
Hancock, J.T.: 2007, ‘Digital Deception: Why, When and How People Lie Online’, in A.N. Joinson, K.Y.A. McKenna, T. Postmes, and U-D. Reips (eds.), The Oxford Handbook of Internet Psychology, (Oxford University Press, Oxford, UK), pp. 289-301.
Hancock, J.T., L.E. Curry, S. Goorha, and M. Woodworth: 2008, On Lying and Being Lied to: A Linguistic Analysis of Deception in Computer-mediated Communication’, Discourse Processes 45, 1-23.
Internet Crime Complaint Center: 2008, ‘2007 Internet Crime Report’, National White Collar Crime Center, http://www.ic3.gov/media/annualreports.aspx.
Jones, T.M.: 1991, ‘Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model’, Academy of Management Review 16, 366-395.
Jones, C., W.S. Hesterly, and S.P. Borgatti: 1997, ‘A General Theory of Network Governance: Exchange Conditions and Social Mechanisms’, Academy of Management Review 22(4), 911-945.
Kurtzberg, T.R., C.E. Naquin, and L.Y. Belkin: 2005, ‘Electronic Performance Appraisals: The Effects of E-mail Communication on Peer Ratings in Actual and Simulated Environments’, Organizational Behavior and Human Decision Processes 98, 216-226.
Lee, A. S.: 1994, ‘Electronic Mail as a Medium for Rich Communication: An Empirical Investigation Using Hermeneutic Interpretation’, MIS Quarterly 18(2), 143-157.
Marquis, C., M.A. Glynn, and G.F. Davis: 2007, ‘Community Isomorphism and Corporate Social Action’, Academy of Management Review 32, 925-945.
McMahon, J.M. and R.J. Harvey: 2006, ‘An Analysis of the Factor Structure of Jones’ Moral Intensity Construct’, Journal of Business Ethics 64, 381-404.
Morris, S.A. and R.A. McDonald: 1995, ‘The Role of Moral Intensity in Moral Judgments: An Empirical Investigation’, Journal of Business Ethics 14(9), 715-726.
Papakyriazis, N. V. and M. A. Boudourides: 2001, ‘Electronic Weak Ties in Network Organisations’, Paper Presented at the 4th GOR Conference, Gottingen, Germany.
Patterson, K. D. W., M. Washington, D. Cavazos and K. Brigham: 2010, `Process and Emergence in Contested Terrain', International Journal of Organizational Analysis 18(1), 105–128
Schein, E.H.: 2004, ‘Learning When and How to Lie: A Neglected Aspect of Organizational and Occupational Socialization’, Human Relations 57, 260-273.
Singer, M.S.: 1996, ‘The Role of Moral Intensity and Fairness Perception in Judgments of Ethicality: A Comparison of Managerial Professionals and the General Public’, Journal of Business Ethics 15, 459-474.
Singer, M.S., and A.E. Singer: 1997, ‘Observer Judgments about Moral Agents’ Ethical Decisions: The Role of Scope of Justice and Moral Intensity’, Journal of Business Ethics 16, 473-484.
Singhapakdi, A., S.J. Vitell, and K.L. Kraft: 1996, ‘Moral Intensity and Ethical Decision-making of Marketing Professionals’, Journal of Business Research 36, 245-255.
Slote, M.: 2007, The Ethics of Care and Empathy, (Routledge, Oxford, UK).
Sproull, L. and S. Kiesler: 1986, ‘Reducing Social Context Cues: Electronic Mail in Organizational Communication’, Management Science 32, 1492-1512.
Trevino, L.K.: 1986, ‘Ethical Decision-making in Organizations: A Person-Situation Interactionist Model’, Academy of Management Review 11, 601-617.
Utz, S.: 2005, ‘Types of Deception and Underlying Motivation: What People Think’, Social Science Computer Review 23, 49-56.
Wallace, P.: 1999, The Psychology of the Internet, (Cambridge University Press, Cambridge, UK).
Watley, L.D., and D.R. May: 2004, ‘Enhancing Moral Intensity: The Roles of Personal and Consequential Information in Ethical Decision-making’, Journal of Business Ethics 50, 105-126.
Wellman, B., J. Salaff, D. Dimitrova, L. Garton, M. Gulia, and C. Haythornthwaite: 1996, ‘Computer Networks as Social Networks: Collaborative Work, Telework, and Virtual Community’, Annual Review of Sociology 22, 213-238.
Whitty, M.T., and A.N. Joinson: 2009, Truth, Lies and Trust on the Internet, (Routledge, New York).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Logsdon, J.M., Patterson, K.D.W. Deception in Business Networks: Is It Easier to Lie Online?. J Bus Ethics 90 (Suppl 4), 537–549 (2009). https://doi.org/10.1007/s10551-010-0605-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-010-0605-z