2018
DOI: 10.1016/j.im.2018.03.012
|View full text |Cite
|
Sign up to set email alerts
|

From improper to acceptable: How perpetrators neutralize workplace bullying behaviors in the cyber world

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 41 publications
(46 citation statements)
references
References 77 publications
0
41
0
Order By: Relevance
“…The theory's philosophical underpinning gave a new direction and perspective to explaining other crimes and deviant acts. In the information system discipline, the theory has been used to explain illegal acts and deviant acts such as software piracy (Siponen et al 2012), cyberbullying (Zhang and Leidner 2018), and security policy compliance (Vance et al 2019). Most of the studies have examined a subset of the neutralization techniques namely denial of injury, denial of responsibility, denial of victim, condemning of the condemners, metaphor of the ledger, appeal to higher loyalties, and defense of necessity, when all the techniques may not be applicable.…”
Section: Neutralization Theorymentioning
confidence: 99%
See 3 more Smart Citations
“…The theory's philosophical underpinning gave a new direction and perspective to explaining other crimes and deviant acts. In the information system discipline, the theory has been used to explain illegal acts and deviant acts such as software piracy (Siponen et al 2012), cyberbullying (Zhang and Leidner 2018), and security policy compliance (Vance et al 2019). Most of the studies have examined a subset of the neutralization techniques namely denial of injury, denial of responsibility, denial of victim, condemning of the condemners, metaphor of the ledger, appeal to higher loyalties, and defense of necessity, when all the techniques may not be applicable.…”
Section: Neutralization Theorymentioning
confidence: 99%
“…While denial of the victim and metaphor of the ledger have been found to influence computer abuse intention (Willison et al 2018), only defense of necessity influences intention to violate security policy (Barlow et al 2013). The use of subsets has been employed in several contexts (e.g., Cao 2004;Zhang and Leidner 2018). In fact, rape offenders employed denial of injury, denial of victim and denial responsibility subset of neutralization techniques to justify their actions (Williams 1986).…”
Section: Neutralization Theorymentioning
confidence: 99%
See 2 more Smart Citations
“…Young individuals, divorced, faculty members, and have chronic diseases were found to have high perceptions of bullying in the workplace and have an impact on increasing anxiety, depression, negative self-image, and hostility (Duru et al, 2018). Oppression in cyberspace or cyber-bullying in the workplace was found as a phenomenon that developed with fatal consequences, ranging from causing employee mental tension and low job satisfaction, to hostile organizational climate (Zhang and Leidner, 2018). The perpetrators of cyber-bullying in the workplace justified their bullying behavior and the results of cyber communication feature apparently influenced cyberbullying behavior in the workplace.…”
Section: Introductionmentioning
confidence: 99%