2015
DOI: 10.1080/07421222.2014.1001257
|View full text |Cite
|
Sign up to set email alerts
|

The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
53
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 100 publications
(58 citation statements)
references
References 112 publications
0
53
0
1
Order By: Relevance
“…This is consistent with prior research, which views moral beliefs as playing a role on self-imposed punishment of deviant behavior (ibid), one that has been empirically supported in multiple studies that argue that higher moral beliefs tend to negatively influence deviant intention. Since moral beliefs are often formed during primary and secondary socialization [8], it may be difficult to modify them in adulthood. What is more feasible in an immediate context is to design IT artifacts that can dissipate CI, thereby leading to more conformist and less deviant behaviors.…”
Section: Discussion Of Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…This is consistent with prior research, which views moral beliefs as playing a role on self-imposed punishment of deviant behavior (ibid), one that has been empirically supported in multiple studies that argue that higher moral beliefs tend to negatively influence deviant intention. Since moral beliefs are often formed during primary and secondary socialization [8], it may be difficult to modify them in adulthood. What is more feasible in an immediate context is to design IT artifacts that can dissipate CI, thereby leading to more conformist and less deviant behaviors.…”
Section: Discussion Of Resultsmentioning
confidence: 99%
“…Empirically, research has consistently demonstrated that moral beliefs have a negative and independent impact on deviance [2]. Thus, moral beliefs are significant deterrents to deviant acts [8], thereby justifying their inclusion in our model.…”
Section: Control Balance Theory (Cbt)mentioning
confidence: 99%
See 2 more Smart Citations
“…These schemes represent a growing concern because many of the same technology-mediated business practices that enable online commerce also enable online consumer fraud (Albrecht et al, 2006;Grazioli & Jarvenpaa, 2000). Although research has explored how computermediation affects deception detection (Carlson, George, Burgoon, Adkins, & White, 2004;Nunamaker, Dennis, Valacich, & Vogel, 1991;George, Carlson, & Valacich, capabilities that affect communication performance (Dennis et al, 2008); (2) during deceptive communications cues of deceit are leaked into conversation affecting the success of subsequent deception (Ekman, 1997;Buller & Burgoon, 1996;George et al, 2013); (3) a reduced sense of social presence can foster antisocial behaviors (Bente, Rüggenberg, Krämer, & Eschenburg, 2008;Chatterjee, Sarker, & Valacich, 2015); and (4) individuals rationalize fraudulent behaviors before enactment (Rest, Bebeau, & Thoma, 1999;Murphy & Dacin, 2011). These theoretical perspectives support a position suggesting that prior to enactment, perpetrators deliberately consider whether or not a medium will support their efforts to successfully commit fraud.…”
Section: Introductionmentioning
confidence: 99%