메뉴 건너뛰기




Volumn 121, Issue 3, 2014, Pages 385-401

Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse

Author keywords

Collectivism; Computer abuse; Culture; Deontological evaluations; Ethics; Formalism; Individualism; Information security; Organizational security; Teleological evaluations; Utilitarianism

Indexed keywords


EID: 84901351658     PISSN: 01674544     EISSN: 15730697     Source Type: Journal    
DOI: 10.1007/s10551-013-1705-3     Document Type: Article
Times cited : (42)

References (126)
  • 1
    • 1242290069 scopus 로고
    • The validity of Haire's shopping list projective technique
    • Anderson, J. C. (1978). The validity of Haire's shopping list projective technique. Journal of Marketing Research, 15(4), 644-649.
    • (1978) Journal of Marketing Research , vol.15 , Issue.4 , pp. 644-649
    • Anderson, J.C.1
  • 2
    • 0036644509 scopus 로고    scopus 로고
    • Computer monitoring: Benefits and pitfalls facing management
    • Ariss, S. S. (2002). Computer monitoring: Benefits and pitfalls facing management. Information & Management, 39(7), 553-558.
    • (2002) Information & Management , vol.39 , Issue.7 , pp. 553-558
    • Ariss, S.S.1
  • 3
    • 38949115254 scopus 로고    scopus 로고
    • When does national identity matter? Convergence and divergence in international business ethics
    • Bailey, W. J., & Spicer, A. (2007). When does national identity matter? Convergence and divergence in international business ethics. Academy of Management Journal, 50(6), 1462-1480.
    • (2007) Academy of Management Journal , vol.50 , Issue.6 , pp. 1462-1480
    • Bailey, W.J.1    Spicer, A.2
  • 4
    • 0002520483 scopus 로고    scopus 로고
    • Modeling IT ethics: A study in situational ethics
    • Banerjee, D., Cronan, T. P., & Jones, T. M. (1998). Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22(1), 31-60.
    • (1998) MIS Quarterly , vol.22 , Issue.1 , pp. 31-60
    • Banerjee, D.1    Cronan, T.P.2    Jones, T.M.3
  • 5
    • 54149095626 scopus 로고    scopus 로고
    • An exploration of ethical decision-making processes in the United States and Egypt
    • Beekun, R. I., Hamdy, R., Westerman, J. W., & HassabElnaby, H. R. (2008). An exploration of ethical decision-making processes in the United States and Egypt. Journal of Business Ethics, 82(3), 587-605.
    • (2008) Journal of Business Ethics , vol.82 , Issue.3 , pp. 587-605
    • Beekun, R.I.1    Hamdy, R.2    Westerman, J.W.3    HassabElnaby, H.R.4
  • 6
    • 0034195071 scopus 로고    scopus 로고
    • Development of a measure of workplace deviance
    • Bennett, R. J., & Robinson, S. L. (2000). Development of a measure of workplace deviance. Journal of Applied Psychology, 85(3), 349-360.
    • (2000) Journal of Applied Psychology , vol.85 , Issue.3 , pp. 349-360
    • Bennett, R.J.1    Robinson, S.L.2
  • 7
    • 1842590346 scopus 로고    scopus 로고
    • Human research and data collection via the internet
    • Birnbaum, M. H. (2004). Human research and data collection via the internet. Annual Reviews of Psychology, 55, 803-832.
    • (2004) Annual Reviews of Psychology , vol.55 , pp. 803-832
    • Birnbaum, M.H.1
  • 9
    • 9744260316 scopus 로고    scopus 로고
    • Validation in information systems research: A state-of-the-art assessment
    • Boudreau, M. C., Gefen, D., & Straub, D. W. (2001). Validation in information systems research: A state-of-the-art assessment. MIS Quarterly, 25(1), 1-16.
    • (2001) MIS Quarterly , vol.25 , Issue.1 , pp. 1-16
    • Boudreau, M.C.1    Gefen, D.2    Straub, D.W.3
  • 10
    • 0000158425 scopus 로고
    • Business meta-ethics: An analysis of two theories
    • Brady, F. N., & Dunn, C. P. (1995). Business meta-ethics: An analysis of two theories. Business Ethics Quarterly, 3, 5.
    • (1995) Business Ethics Quarterly , vol.3 , pp. 5
    • Brady, F.N.1    Dunn, C.P.2
  • 11
    • 0030242162 scopus 로고    scopus 로고
    • An empirical study of ethical predispositions
    • Brady, F. N., & Wheeler, G. E. (1996). An empirical study of ethical predispositions. Journal of Business Ethics, 15(9), 927-940.
    • (1996) Journal of Business Ethics , vol.15 , Issue.9 , pp. 927-940
    • Brady, F.N.1    Wheeler, G.E.2
  • 12
    • 33750922314 scopus 로고    scopus 로고
    • Ethics in information technology and software use
    • Calluzzo, V. J., & Cante, C. J. (2004). Ethics in information technology and software use. Journal of Business Ethics, 51(3), 301-312.
    • (2004) Journal of Business Ethics , vol.51 , Issue.3 , pp. 301-312
    • Calluzzo, V.J.1    Cante, C.J.2
  • 13
    • 67649529385 scopus 로고    scopus 로고
    • Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
    • Cavusoglu, H., Raghunathan, S., & Cavusoglu, H. (2009). Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Information Systems Research, 20(2), 198-217.
    • (2009) Information Systems Research , vol.20 , Issue.2 , pp. 198-217
    • Cavusoglu, H.1    Raghunathan, S.2    Cavusoglu, H.3
  • 14
    • 72049101186 scopus 로고    scopus 로고
    • Interpretation of formative measurement in information systems research
    • Cenfetelli, R. T., & Bassellier, G. (2009). Interpretation of formative measurement in information systems research. MIS Quarterly, 33(4), 689-707.
    • (2009) MIS Quarterly , vol.33 , Issue.4 , pp. 689-707
    • Cenfetelli, R.T.1    Bassellier, G.2
  • 16
    • 27844581775 scopus 로고    scopus 로고
    • Cross-national differences in cooperative decision-making in mixed-motive business contexts: The mediating effect of vertical and horizontal individualism
    • Chen, X. P., & Li, S. (2005). Cross-national differences in cooperative decision-making in mixed-motive business contexts: The mediating effect of vertical and horizontal individualism. Journal of International Business Studies, 36, 622-636.
    • (2005) Journal of International Business Studies , vol.36 , pp. 622-636
    • Chen, X.P.1    Li, S.2
  • 19
    • 0042242856 scopus 로고    scopus 로고
    • A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail emotion/adoption study
    • Chin, W., Marcolin, B., & Newsted, P. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail emotion/adoption study. Information Systems Research, 14(2), 189-217.
    • (2003) Information Systems Research , vol.14 , Issue.2 , pp. 189-217
    • Chin, W.1    Marcolin, B.2    Newsted, P.3
  • 20
    • 0001003693 scopus 로고
    • A question of ethics: Developing information system ethics
    • Cohen, E., & Cornwell, L. (1989). A question of ethics: Developing information system ethics. Journal of Business Ethics, 8(6), 431-437.
    • (1989) Journal of Business Ethics , vol.8 , Issue.6 , pp. 431-437
    • Cohen, E.1    Cornwell, L.2
  • 22
    • 72049116025 scopus 로고    scopus 로고
    • How ethics can enhance organizational privacy: Lessons from the ChoicePoint and TJX data breaches
    • Culnan, M., & Williams, C. (2009). How ethics can enhance organizational privacy: Lessons from the ChoicePoint and TJX data breaches. MIS Quarterly, 33(4), 673-686.
    • (2009) MIS Quarterly , vol.33 , Issue.4 , pp. 673-686
    • Culnan, M.1    Williams, C.2
  • 23
    • 34848873123 scopus 로고    scopus 로고
    • Deterring internal information systems misuse
    • D'Arcy, J., & Hovav, A. (2007). Deterring internal information systems misuse. Communications of the ACM, 50(10), 113-117.
    • (2007) Communications of the ACM , vol.50 , Issue.10 , pp. 113-117
    • D'Arcy, J.1    Hovav, A.2
  • 24
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • D'Arcy, J., Hovav, A., & Galletta, D. F. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.F.3
  • 26
    • 33845439549 scopus 로고    scopus 로고
    • Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration
    • Diamantopoulos, A., & Siguaw, J. A. (2006). Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration. British Journal of Management, 17(2006), 263-282.
    • (2006) British Journal of Management , vol.17 , Issue.2006 , pp. 263-282
    • Diamantopoulos, A.1    Siguaw, J.A.2
  • 27
    • 0035534144 scopus 로고    scopus 로고
    • Index construction with formative indicators: An alternative to scale development
    • Diamantopoulos, A., & Winklhofer, H. M. (2001). Index construction with formative indicators: An alternative to scale development. Journal of Marketing Research, 38(2), 269-277.
    • (2001) Journal of Marketing Research , vol.38 , Issue.2 , pp. 269-277
    • Diamantopoulos, A.1    Winklhofer, H.M.2
  • 28
    • 0003100216 scopus 로고    scopus 로고
    • Values in tension: Ethics away from home
    • Donaldson, T. (1996). Values in tension: Ethics away from home. Harvard Business Review, 74(5), 48-62.
    • (1996) Harvard Business Review , vol.74 , Issue.5 , pp. 48-62
    • Donaldson, T.1
  • 29
    • 34447342255 scopus 로고    scopus 로고
    • Equity perceptions as a deterrent to software piracy behavior
    • Douglas, D. E., Cronan, T. P., & Behel, J. D. (2007). Equity perceptions as a deterrent to software piracy behavior. Information & Management, 44(5), 503-512.
    • (2007) Information & Management , vol.44 , Issue.5 , pp. 503-512
    • Douglas, D.E.1    Cronan, T.P.2    Behel, J.D.3
  • 31
    • 33744785923 scopus 로고    scopus 로고
    • Organizational behaviour across cultures: Theoretical and methodological issues for developing multi-level frameworks involving culture
    • Fischer, R., Ferreira, M. C., Assmar, E. M. L., Redford, P., & Harb, C. (2005). Organizational behaviour across cultures: Theoretical and methodological issues for developing multi-level frameworks involving culture. International Journal of Cross Cultural Management, 5(1), 27-48.
    • (2005) International Journal of Cross Cultural Management , vol.5 , Issue.1 , pp. 27-48
    • Fischer, R.1    Ferreira, M.C.2    Assmar, E.M.L.3    Redford, P.4    Harb, C.5
  • 32
    • 21144473928 scopus 로고
    • Social desirability bias and the validity of indirect questioning
    • Fisher, R. J. (1993). Social desirability bias and the validity of indirect questioning. Journal of Consumer Research, 20(2), 303-315.
    • (1993) Journal of Consumer Research , vol.20 , Issue.2 , pp. 303-315
    • Fisher, R.J.1
  • 33
    • 85047670115 scopus 로고    scopus 로고
    • Using individualism and collectivism to compare cultures-A critique of the validity and measurement of the constructs: Comment on Oyserman et al. (2002)
    • Fiske, A. P. (2002). Using individualism and collectivism to compare cultures-A critique of the validity and measurement of the constructs: Comment on Oyserman et al. (2002). Psychological Bulletin, 128(1), 78-88.
    • (2002) Psychological Bulletin , vol.128 , Issue.1 , pp. 78-88
    • Fiske, A.P.1
  • 34
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1981), 39-50.
    • (1981) Journal of Marketing Research , vol.18 , Issue.1981 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 35
    • 67650565830 scopus 로고    scopus 로고
    • Using the internet for personality research: What can be done, how to do it, and some concerns
    • R. W. Robins, R. C. Fraley, and R. F. Krueger (Eds.), New York: Guilford
    • Fraley, R. C. (2007). Using the internet for personality research: What can be done, how to do it, and some concerns. In R. W. Robins, R. C. Fraley, & R. F. Krueger (Eds.), Methods in personality psychology (pp. 130-148). New York: Guilford.
    • (2007) Methods in Personality Psychology , pp. 130-148
    • Fraley, R.C.1
  • 36
    • 33745932103 scopus 로고    scopus 로고
    • An empirical study of software piracy among tertiary institutions in Singapore
    • Gan, L. L., & Koh, H. C. (2006). An empirical study of software piracy among tertiary institutions in Singapore. Information & Management, 43(5), 640-649.
    • (2006) Information & Management , vol.43 , Issue.5 , pp. 640-649
    • Gan, L.L.1    Koh, H.C.2
  • 37
    • 0005766289 scopus 로고    scopus 로고
    • Morality and computers: Attitudes and differences in moral judgments
    • Gattiker, U. E., & Kelley, H. (1999). Morality and computers: Attitudes and differences in moral judgments. Information Systems Research, 10(3), 233-254.
    • (1999) Information Systems Research , vol.10 , Issue.3 , pp. 233-254
    • Gattiker, U.E.1    Kelley, H.2
  • 38
    • 29444460597 scopus 로고    scopus 로고
    • A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example
    • Gefen, D., & Straub, D. W. (2005). A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example. Communications of the Association for Information Systems, 16(5), 91-109.
    • (2005) Communications of the Association for Information Systems , vol.16 , Issue.5 , pp. 91-109
    • Gefen, D.1    Straub, D.W.2
  • 39
    • 34247845989 scopus 로고    scopus 로고
    • Situational influences on ethical decision-making in an IT context
    • Haines, R., & Leonard, L. N. K. (2007). Situational influences on ethical decision-making in an IT context. Information & Management, 44(3), 313-320.
    • (2007) Information & Management , vol.44 , Issue.3 , pp. 313-320
    • Haines, R.1    Leonard, L.N.K.2
  • 40
    • 34547798962 scopus 로고    scopus 로고
    • Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection
    • Hansen, J. V., Lowry, P. B., Meservy, R., & McDonald, D. (2007). Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems, 43(4), 1362-1374.
    • (2007) Decision Support Systems , vol.43 , Issue.4 , pp. 1362-1374
    • Hansen, J.V.1    Lowry, P.B.2    Meservy, R.3    McDonald, D.4
  • 41
    • 0000917858 scopus 로고    scopus 로고
    • The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
    • Harrington, S. J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20(3), 257-278.
    • (1996) MIS Quarterly , vol.20 , Issue.3 , pp. 257-278
    • Harrington, S.J.1
  • 42
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • Herath, T., & Rao, H. R. (2009a). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154-165.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 43
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Herath, T., & Rao, H. R. (2009b). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 44
    • 0346111578 scopus 로고    scopus 로고
    • Information systems ethics: A practitioner survey
    • Hilton, T. (2000). Information systems ethics: A practitioner survey. Journal of Business Ethics, 28(4), 279-284.
    • (2000) Journal of Business Ethics , vol.28 , Issue.4 , pp. 279-284
    • Hilton, T.1
  • 48
    • 23044529048 scopus 로고    scopus 로고
    • The pitfalls of cross-national survey research: A reply to the article by Spector et al. on the psychometric properties of the Hofstede value survey module 1994
    • Hofstede, G. (2002). The pitfalls of cross-national survey research: A reply to the article by Spector et al. on the psychometric properties of the Hofstede value survey module 1994. Applied Psychology: An International Review, 51(1), 170-178.
    • (2002) Applied Psychology: An International Review , vol.51 , Issue.1 , pp. 170-178
    • Hofstede, G.1
  • 49
    • 84970109540 scopus 로고
    • A general theory of marketing ethics
    • Hunt, S. D., & Vitell, S. J. (1986). A general theory of marketing ethics. Journal of Macromarketing, 6(Spring), 5-16.
    • (1986) Journal of Macromarketing , vol.6 , Issue.Spring , pp. 5-16
    • Hunt, S.D.1    Vitell, S.J.2
  • 50
    • 0034238348 scopus 로고    scopus 로고
    • The impact of national culture on software piracy
    • Husted, B. W. (2000). The impact of national culture on software piracy. Journal of Business Ethics, 26(3), 197-211.
    • (2000) Journal of Business Ethics , vol.26 , Issue.3 , pp. 197-211
    • Husted, B.W.1
  • 51
    • 53649094719 scopus 로고    scopus 로고
    • Toward a model of cross-cultural business ethics: The impact of individualism and collectivism on the ethical decision-making process
    • Husted, B., & Allen, D. (2008). Toward a model of cross-cultural business ethics: The impact of individualism and collectivism on the ethical decision-making process. Journal of Business Ethics, 82(2), 293-305.
    • (2008) Journal of Business Ethics , vol.82 , Issue.2 , pp. 293-305
    • Husted, B.1    Allen, D.2
  • 52
    • 0030501658 scopus 로고    scopus 로고
    • The impact of cross-national carriers of business ethics on attitudes about questionable practices and form of moral reasoning
    • Husted, B. W., Dozier, J. B., McMahon, J. T., & Kattan, M. W. (1996). The impact of cross-national carriers of business ethics on attitudes about questionable practices and form of moral reasoning. Journal of International Business Studies, 27(2), 391-411.
    • (1996) Journal of International Business Studies , vol.27 , Issue.2 , pp. 391-411
    • Husted, B.W.1    Dozier, J.B.2    McMahon, J.T.3    Kattan, M.W.4
  • 53
    • 0000842967 scopus 로고
    • Marketing jobs and management controls: Toward a framework
    • Jaworski, B. J., & MacInnis, D. J. (1989). Marketing jobs and management controls: Toward a framework. Journal of Marketing Research, 26, 406-419.
    • (1989) Journal of Marketing Research , vol.26 , pp. 406-419
    • Jaworski, B.J.1    MacInnis, D.J.2
  • 54
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34, 549-566.
    • (2010) MIS Quarterly , vol.34 , pp. 549-566
    • Johnston, A.C.1    Warkentin, M.2
  • 55
    • 1542633735 scopus 로고    scopus 로고
    • The link between ethical judgment and action in organizations: A moral approbation approach
    • Jones, T. M., & Ryan, L. V. (1997). The link between ethical judgment and action in organizations: A moral approbation approach. Organization Science, 8(6), 663-680.
    • (1997) Organization Science , vol.8 , Issue.6 , pp. 663-680
    • Jones, T.M.1    Ryan, L.V.2
  • 58
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • Lee, S. M., Lee, S. G., & Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information & Management, 41, 707-718.
    • (2004) Information & Management , vol.41 , pp. 707-718
    • Lee, S.M.1    Lee, S.G.2    Yoo, S.3
  • 59
    • 4644242309 scopus 로고    scopus 로고
    • Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences
    • Leonard, L. N. K., & Cronan, T. P. (2001). Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences. Journal of the Association for Information Systems, 1(12), 1-31.
    • (2001) Journal of the Association for Information Systems , vol.1 , Issue.12 , pp. 1-31
    • Leonard, L.N.K.1    Cronan, T.P.2
  • 60
    • 4544362187 scopus 로고    scopus 로고
    • What influences IT ethical behavior intentions-Planned behavior, reasoned action, perceived importance, or individual characteristics?
    • Leonard, L. N. K., Cronan, T. P., & Kreie, J. (2004). What influences IT ethical behavior intentions-Planned behavior, reasoned action, perceived importance, or individual characteristics? Information & Management, 42(2004), 143-158.
    • (2004) Information & Management , vol.42 , Issue.2004 , pp. 143-158
    • Leonard, L.N.K.1    Cronan, T.P.2    Kreie, J.3
  • 61
    • 33847761422 scopus 로고    scopus 로고
    • Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management
    • Liang, H., Saraf, N., Hu, Q., & Xue, Y. (2007). Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management. MIS Quarterly, 31(1), 59-87.
    • (2007) MIS Quarterly , vol.31 , Issue.1 , pp. 59-87
    • Liang, H.1    Saraf, N.2    Hu, Q.3    Xue, Y.4
  • 62
    • 0030194196 scopus 로고
    • Evaluating ethical decision making and computer use
    • Loch, K. D., & Conger, S. (1995). Evaluating ethical decision making and computer use. Communications of the ACM, 39(7), 74-83.
    • (1995) Communications of the ACM , vol.39 , Issue.7 , pp. 74-83
    • Loch, K.D.1    Conger, S.2
  • 63
    • 69249098534 scopus 로고    scopus 로고
    • The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups
    • Lowry, P. B., Romano, N. C., Jenkins, J. L., & Guthrie, R. W. (2009). The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups. Journal of Management Information Systems, 26(1), 159-200.
    • (2009) Journal of Management Information Systems , vol.26 , Issue.1 , pp. 159-200
    • Lowry, P.B.1    Romano, N.C.2    Jenkins, J.L.3    Guthrie, R.W.4
  • 64
    • 44249091185 scopus 로고    scopus 로고
    • Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites
    • Lowry, P. B., Vance, A., Moody, G., Beckman, B., & Read, A. (2008). Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites. Journal of Management Information Systems, 24(4), 199-224.
    • (2008) Journal of Management Information Systems , vol.24 , Issue.4 , pp. 199-224
    • Lowry, P.B.1    Vance, A.2    Moody, G.3    Beckman, B.4    Read, A.5
  • 65
    • 23444456749 scopus 로고    scopus 로고
    • Integrating national culture into IS research: The need for current individual-level measures
    • McCoy, S., Galletta, D. F., & King, W. R. (2005). Integrating national culture into IS research: The need for current individual-level measures. Communications of the AIS, 15, 211-224.
    • (2005) Communications of the AIS , vol.15 , pp. 211-224
    • McCoy, S.1    Galletta, D.F.2    King, W.R.3
  • 66
    • 67249144000 scopus 로고    scopus 로고
    • Information technology auditing: A value-added IT governance partnership between IT management and audit
    • Merhout, J. W., & Havelka, D. (2008). Information technology auditing: A value-added IT governance partnership between IT management and audit. Communications of the Association for Information Systems, 23(26), 463-482.
    • (2008) Communications of the Association for Information Systems , vol.23 , Issue.26 , pp. 463-482
    • Merhout, J.W.1    Havelka, D.2
  • 67
    • 0030516130 scopus 로고    scopus 로고
    • Are studies of dark side variables confounded by socially desirable responding? The case of materialism
    • Mick, D. G. (1996). Are studies of dark side variables confounded by socially desirable responding? The case of materialism. Journal of Consumer Research, 23(2), 106-111.
    • (1996) Journal of Consumer Research , vol.23 , Issue.2 , pp. 106-111
    • Mick, D.G.1
  • 68
    • 33845728874 scopus 로고    scopus 로고
    • Ethical decision making in software piracy: Initial development and test of a four-component model
    • Moores, T. T., & Chang, J. C.-J. (2006). Ethical decision making in software piracy: Initial development and test of a four-component model. MIS Quarterly, 30(1), 167-180.
    • (2006) MIS Quarterly , vol.30 , Issue.1 , pp. 167-180
    • Moores, T.T.1    Chang, J.C.-J.2
  • 69
    • 4344702911 scopus 로고    scopus 로고
    • A reversed context analysis of software piracy issues in Singapore
    • Moores, T. T., & Dhaliwal, J. (2004). A reversed context analysis of software piracy issues in Singapore. Information & Management, 41(8), 1037-1042.
    • (2004) Information & Management , vol.41 , Issue.8 , pp. 1037-1042
    • Moores, T.T.1    Dhaliwal, J.2
  • 70
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules? An empirical study
    • Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18(2), 126-139.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 72
    • 34248575340 scopus 로고    scopus 로고
    • High power, low power, and equality: Culture beyond individualism and collectivism
    • Oyserman, D. (2006). High power, low power, and equality: Culture beyond individualism and collectivism. Journal of Consumer Psychology, 16(4), 352-356.
    • (2006) Journal of Consumer Psychology , vol.16 , Issue.4 , pp. 352-356
    • Oyserman, D.1
  • 73
    • 0036370845 scopus 로고    scopus 로고
    • Rethinking individualism and collectivism: Evaluation of the theoretical assumptions and meta-analysis
    • Oyserman, D., Coon, M., & Kemmelmeier, M. (2002). Rethinking individualism and collectivism: Evaluation of the theoretical assumptions and meta-analysis. Psychological Bulletin, 128(1), 3-72.
    • (2002) Psychological Bulletin , vol.128 , Issue.1 , pp. 3-72
    • Oyserman, D.1    Coon, M.2    Kemmelmeier, M.3
  • 74
    • 40749152218 scopus 로고    scopus 로고
    • Does culture influence what and how we think? Effects of priming individualism and collectivism
    • Oyserman, D., & Lee, S. W. S. (2008). Does culture influence what and how we think? Effects of priming individualism and collectivism. Psychological Bulletin, 134(2), 311-342.
    • (2008) Psychological Bulletin , vol.134 , Issue.2 , pp. 311-342
    • Oyserman, D.1    Lee, S.W.S.2
  • 75
    • 84867141838 scopus 로고    scopus 로고
    • Making sense of the diversity of ethical decision making in business: An illustration of the Indian context
    • Patel, T., & Schaefe, A. (2009). Making sense of the diversity of ethical decision making in business: An illustration of the Indian context. Journal of Business Ethics, 90(2), 171-186.
    • (2009) Journal of Business Ethics , vol.90 , Issue.2 , pp. 171-186
    • Patel, T.1    Schaefe, A.2
  • 76
    • 33847764616 scopus 로고    scopus 로고
    • Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective
    • Pavlou, P., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31(1), 105-136.
    • (2007) MIS Quarterly , vol.31 , Issue.1 , pp. 105-136
    • Pavlou, P.1    Liang, H.2    Xue, Y.3
  • 78
    • 38549116762 scopus 로고    scopus 로고
    • Specifying formative constructs in information systems research
    • Petter, S., Straub, D. W., & Rai, A. (2007). Specifying formative constructs in information systems research. MIS Quarterly, 31(4), 623-656.
    • (2007) MIS Quarterly , vol.31 , Issue.4 , pp. 623-656
    • Petter, S.1    Straub, D.W.2    Rai, A.3
  • 79
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903.
    • (2003) Journal of Applied Psychology , vol.88 , Issue.5 , pp. 879-903
    • Podsakoff, P.M.1    MacKenzie, S.B.2    Lee, J.Y.3    Podsakoff, N.P.4
  • 80
    • 84875487357 scopus 로고    scopus 로고
    • When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse
    • Posey, C., Bennett, R., Roberts, T. L., & Lowry, P. B. (2011). When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse. Journal of Information System Security, 7(1), 24-47.
    • (2011) Journal of Information System Security , vol.7 , Issue.1 , pp. 24-47
    • Posey, C.1    Bennett, R.2    Roberts, T.L.3    Lowry, P.B.4
  • 81
    • 38049183252 scopus 로고    scopus 로고
    • The impact of national culture and economic ideology on managerial work values: A study of the United States, Russia, Japan, and China
    • Ralston, D. A., Holt, D. H., Terpstra, R. H., & Kai-Cheng, Y. (2008). The impact of national culture and economic ideology on managerial work values: A study of the United States, Russia, Japan, and China. Journal of International Business Studies, 39(1), 8-26.
    • (2008) Journal of International Business Studies , vol.39 , Issue.1 , pp. 8-26
    • Ralston, D.A.1    Holt, D.H.2    Terpstra, R.H.3    Kai-Cheng, Y.4
  • 82
    • 67649548424 scopus 로고    scopus 로고
    • Choice and chance: A conceptual model of paths to information security compromise
    • Ransbotham, S., & Mitra, S. (2009). Choice and chance: A conceptual model of paths to information security compromise. Information Systems Research, 20(1), 121-139.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 121-139
    • Ransbotham, S.1    Mitra, S.2
  • 83
    • 38349168980 scopus 로고    scopus 로고
    • Host country resource availability and information system control mechanisms in multinational corporations: An empirical test of resource dependence theory
    • Rao, M. T., Brown, C. V., & Perkins, W. C. (2007). Host country resource availability and information system control mechanisms in multinational corporations: An empirical test of resource dependence theory. Journal of Management Information Systems, 23(4), 11-28.
    • (2007) Journal of Management Information Systems , vol.23 , Issue.4 , pp. 11-28
    • Rao, M.T.1    Brown, C.V.2    Perkins, W.C.3
  • 85
    • 0037381651 scopus 로고    scopus 로고
    • Mapping moral philosophies: Strategic implications for multinational firms
    • Robertson, C. J., & Crittenden, W. F. (2002). Mapping moral philosophies: Strategic implications for multinational firms. Strategic Management Journal, 24(4), 327-338.
    • (2002) Strategic Management Journal , vol.24 , Issue.4 , pp. 327-338
    • Robertson, C.J.1    Crittenden, W.F.2
  • 87
    • 0033131830 scopus 로고    scopus 로고
    • Ethical decision making in multinational organizations: A culture-based model
    • Robertson, C., & Fadil, P. A. (1999). Ethical decision making in multinational organizations: A culture-based model. Journal of Business Ethics, 19(4), 385-392.
    • (1999) Journal of Business Ethics , vol.19 , Issue.4 , pp. 385-392
    • Robertson, C.1    Fadil, P.A.2
  • 88
    • 39749088673 scopus 로고    scopus 로고
    • Trade liberalization, corruption, and software piracy
    • Robertson, C., Gilley, K., & Crittenden, W. (2008). Trade liberalization, corruption, and software piracy. Journal of Business Ethics, 78(4), 623-634.
    • (2008) Journal of Business Ethics , vol.78 , Issue.4 , pp. 623-634
    • Robertson, C.1    Gilley, K.2    Crittenden, W.3
  • 89
    • 21844526560 scopus 로고
    • A typology of deviant workplace behaviors: A multidimensional scaling study
    • Robinson, S. L., & Bennett, R. J. (1995). A typology of deviant workplace behaviors: A multidimensional scaling study. Academy of Management Journal, 38(2), 555-572.
    • (1995) Academy of Management Journal , vol.38 , Issue.2 , pp. 555-572
    • Robinson, S.L.1    Bennett, R.J.2
  • 90
    • 0032218162 scopus 로고    scopus 로고
    • Monkey see, monkey do: The influence of work groups on the antisocial behavior of employees
    • Robinson, S. L., & O'Leary-Kelly, A. M. (1998). Monkey see, monkey do: The influence of work groups on the antisocial behavior of employees. Academy of Management Journal, 41(6), 658-672.
    • (1998) Academy of Management Journal , vol.41 , Issue.6 , pp. 658-672
    • Robinson, S.L.1    O'Leary-Kelly, A.M.2
  • 91
    • 85132290401 scopus 로고
    • The influence of country and industry on ethical perceptions of senior executives in the U.S. and Europe
    • Schlegelmilch, B. B., & Robertson, D. C. (1995). The influence of country and industry on ethical perceptions of senior executives in the U. S. and Europe. Journal of International Business Studies, 26(4), 859-881.
    • (1995) Journal of International Business Studies , vol.26 , Issue.4 , pp. 859-881
    • Schlegelmilch, B.B.1    Robertson, D.C.2
  • 92
    • 0031256491 scopus 로고    scopus 로고
    • The effect of ethical frameworks on perceptions of organizational justice
    • Schminke, M., Ambrose, M. L., & Noel, T. W. (1997). The effect of ethical frameworks on perceptions of organizational justice. Academy of Management Journal, 40(5), 1190-1207.
    • (1997) Academy of Management Journal , vol.40 , Issue.5 , pp. 1190-1207
    • Schminke, M.1    Ambrose, M.L.2    Noel, T.W.3
  • 93
    • 0007083048 scopus 로고    scopus 로고
    • Group processes and performance and their effects on individuals' ethical frameworks
    • Schminke, M., & Wells, D. (1999). Group processes and performance and their effects on individuals' ethical frameworks. Journal of Business Ethics, 18(4), 367-381.
    • (1999) Journal of Business Ethics , vol.18 , Issue.4 , pp. 367-381
    • Schminke, M.1    Wells, D.2
  • 94
    • 33847076149 scopus 로고    scopus 로고
    • An empirical investigation of socio-cultural factors of information sharing in China
    • Shin, S. K., Ishman, M., & Sanders, G. L. (2007). An empirical investigation of socio-cultural factors of information sharing in China. Information & Management, 44(2), 165-174.
    • (2007) Information & Management , vol.44 , Issue.2 , pp. 165-174
    • Shin, S.K.1    Ishman, M.2    Sanders, G.L.3
  • 95
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34, 487-502.
    • (2010) MIS Quarterly , vol.34 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 96
    • 4644234503 scopus 로고    scopus 로고
    • Unauthorized copying of software and levels of moral development: A literature analysis and its implications for research and practice
    • Siponen, M., & Vartiainen, T. (2007). Unauthorized copying of software and levels of moral development: A literature analysis and its implications for research and practice. Information Systems Journal, 14(4), 387-407.
    • (2007) Information Systems Journal , vol.14 , Issue.4 , pp. 387-407
    • Siponen, M.1    Vartiainen, T.2
  • 97
    • 0007137976 scopus 로고    scopus 로고
    • Ethics and information systems: The corporate domain
    • Smith, H. J., & Hasnas, J. (1999). Ethics and information systems: The corporate domain. MIS Quarterly, 23(1), 109-127.
    • (1999) MIS Quarterly , vol.23 , Issue.1 , pp. 109-127
    • Smith, H.J.1    Hasnas, J.2
  • 98
    • 0037227503 scopus 로고    scopus 로고
    • The reluctance to report bad news on troubled software projects: A theoretical model
    • Smith, H. J., & Keil, M. (2003). The reluctance to report bad news on troubled software projects: A theoretical model. Information Systems Journal, 13(1), 69-95.
    • (2003) Information Systems Journal , vol.13 , Issue.1 , pp. 69-95
    • Smith, H.J.1    Keil, M.2
  • 99
    • 14344281803 scopus 로고    scopus 로고
    • Keeping mum as the project goes under: Toward an explanatory model
    • Smith, H. J., Keil, M., & Depledge, G. (2001). Keeping mum as the project goes under: Toward an explanatory model. Journal of Management Information Systems, 18(2), 189-227.
    • (2001) Journal of Management Information Systems , vol.18 , Issue.2 , pp. 189-227
    • Smith, H.J.1    Keil, M.2    Depledge, G.3
  • 100
    • 50249151484 scopus 로고    scopus 로고
    • Internet users' information privacy-protective responses: A taxonomy and a nomological model
    • Son, J.-Y., & Kim, S. S. (2008). Internet users' information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32(3), 503-529.
    • (2008) MIS Quarterly , vol.32 , Issue.3 , pp. 503-529
    • Son, J.-Y.1    Kim, S.S.2
  • 102
    • 33846076044 scopus 로고    scopus 로고
    • The role of espoused national cultural values in technology acceptance
    • Srite, M., & Karahanna, E. (2006). The role of espoused national cultural values in technology acceptance. MIS Quarterly, 30(3), 679-704.
    • (2006) MIS Quarterly , vol.30 , Issue.3 , pp. 679-704
    • Srite, M.1    Karahanna, E.2
  • 103
    • 0033260584 scopus 로고    scopus 로고
    • A self-efficacy theory explanation for the management of remote workers in virtual organizations
    • Staples, D. S., Hulland, J. S., & Higgins, C. A. (1999). A self-efficacy theory explanation for the management of remote workers in virtual organizations. Organization Science, 10(6), 758-776.
    • (1999) Organization Science , vol.10 , Issue.6 , pp. 758-776
    • Staples, D.S.1    Hulland, J.S.2    Higgins, C.A.3
  • 104
    • 55249123249 scopus 로고
    • Validating instruments in MIS research
    • Straub, D. W. (1989). Validating instruments in MIS research. MIS Quarterly, 13(2), 147-169.
    • (1989) MIS Quarterly , vol.13 , Issue.2 , pp. 147-169
    • Straub, D.W.1
  • 105
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 107
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 108
    • 0032355201 scopus 로고    scopus 로고
    • Predicting and explaining intentions and behavior: How well are we doing?
    • Sutton, S. (1998). Predicting and explaining intentions and behavior: How well are we doing? Journal of Applied Social Psychology, 28(15), 1317-1338.
    • (1998) Journal of Applied Social Psychology , vol.28 , Issue.15 , pp. 1317-1338
    • Sutton, S.1
  • 109
    • 56949085904 scopus 로고    scopus 로고
    • Risk analysis in extended enterprise environments: Identification of critical risk factors in B2B e-commerce relationships
    • Sutton, S. G., Khazanchi, D., Hampton, C., & Arnold, V. (2008). Risk analysis in extended enterprise environments: Identification of critical risk factors in B2B e-commerce relationships. Journal of the Association for Information Systems, 9(3/4), 151-174.
    • (2008) Journal of the Association for Information Systems , vol.9 , Issue.3-4 , pp. 151-174
    • Sutton, S.G.1    Khazanchi, D.2    Hampton, C.3    Arnold, V.4
  • 110
    • 0001354192 scopus 로고
    • The morality of software piracy: A cross-cultural analysis
    • Swinyard, W. R., Rinne, H., & Kau, A. K. (1990). The morality of software piracy: A cross-cultural analysis. Journal of Business Ethics, 9(8), 655-664.
    • (1990) Journal of Business Ethics , vol.9 , Issue.8 , pp. 655-664
    • Swinyard, W.R.1    Rinne, H.2    Kau, A.K.3
  • 111
    • 0347301551 scopus 로고    scopus 로고
    • Culture and whistleblowing an empirical study of Croatian and United States managers utilizing Hofstede's cultural dimensions
    • Tavakoli, A. A., Keenan, J. P., & Crnjak-Karanovic, B. (2003). Culture and whistleblowing an empirical study of Croatian and United States managers utilizing Hofstede's cultural dimensions. Journal of Business Ethics, 43(1/2), 49-64.
    • (2003) Journal of Business Ethics , vol.43 , Issue.1-2 , pp. 49-64
    • Tavakoli, A.A.1    Keenan, J.P.2    Crnjak-Karanovic, B.3
  • 112
    • 0032223746 scopus 로고    scopus 로고
    • Testing an ethical decision-making theory: The case of softlifting
    • Thong, J. Y. L., & Yap, C.-s. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15(1), 213-237.
    • (1998) Journal of Management Information Systems , vol.15 , Issue.1 , pp. 213-237
    • Thong, J.Y.L.1    Yap, C.-S.2
  • 113
    • 33748425097 scopus 로고    scopus 로고
    • Individuality or conformity? The effects of independent and interdependent self-concepts on public judgments
    • Torelli, C. J. (2006). Individuality or conformity? The effects of independent and interdependent self-concepts on public judgments. Journal of Consumer Research, 16(3), 240-248.
    • (2006) Journal of Consumer Research , vol.16 , Issue.3 , pp. 240-248
    • Torelli, C.J.1
  • 114
    • 0032331156 scopus 로고    scopus 로고
    • Converging measurement of horizontal and vertical individualism and collectivism
    • Triandis, H. C., & Gelfand, M. J. (1998). Converging measurement of horizontal and vertical individualism and collectivism. Journal of Personality and Social Psychology, 74, 118-128.
    • (1998) Journal of Personality and Social Psychology , vol.74 , pp. 118-128
    • Triandis, H.C.1    Gelfand, M.J.2
  • 115
    • 0035343372 scopus 로고    scopus 로고
    • Some cross-cultural evidence on ethical reasoning
    • Tsui, J., & Windsor, C. (2001). Some cross-cultural evidence on ethical reasoning. Journal of Business Ethics, 31(2), 143-150.
    • (2001) Journal of Business Ethics , vol.31 , Issue.2 , pp. 143-150
    • Tsui, J.1    Windsor, C.2
  • 116
    • 0031288368 scopus 로고    scopus 로고
    • Moral hazard, ethical considerations, and the decision to implement an information system
    • Tuttle, B., Harrell, A., & Harrison, P. (1997). Moral hazard, ethical considerations, and the decision to implement an information system. Journal of Management Information Systems, 13(4), 7-27.
    • (1997) Journal of Management Information Systems , vol.13 , Issue.4 , pp. 7-27
    • Tuttle, B.1    Harrell, A.2    Harrison, P.3
  • 117
    • 0035255557 scopus 로고    scopus 로고
    • The effects of organizational and ethical climates on misconduct at work
    • Vardi, Y. (2001). The effects of organizational and ethical climates on misconduct at work. Journal of Business Ethics, 29, 325-337.
    • (2001) Journal of Business Ethics , vol.29 , pp. 325-337
    • Vardi, Y.1
  • 118
    • 0001440837 scopus 로고
    • The effects of culture on ethical decision-making: An application of Hofstede's typology
    • Vitell, S. J., Nwachukwu, S. L., & Barnes, J. H. (1993). The effects of culture on ethical decision-making: An application of Hofstede's typology. Journal of Business Ethics, 12(10), 753-760.
    • (1993) Journal of Business Ethics , vol.12 , Issue.10 , pp. 753-760
    • Vitell, S.J.1    Nwachukwu, S.L.2    Barnes, J.H.3
  • 119
    • 0036675216 scopus 로고    scopus 로고
    • The myth of individualism-collectivism: A critical review
    • Voronov, M., & Singer, J. A. (2002). The myth of individualism-collectivism: A critical review. Journal of Social Psychology, 142(4), 461-480.
    • (2002) Journal of Social Psychology , vol.142 , Issue.4 , pp. 461-480
    • Voronov, M.1    Singer, J.A.2
  • 120
    • 61349180141 scopus 로고    scopus 로고
    • A value-at-risk approach to information security investment
    • Wang, J., Chaudhury, A., & Rao, H. R. (2008). A value-at-risk approach to information security investment. Information Systems Research, 19(1), 106-123.
    • (2008) Information Systems Research , vol.19 , Issue.1 , pp. 106-123
    • Wang, J.1    Chaudhury, A.2    Rao, H.R.3
  • 121
    • 70350752562 scopus 로고    scopus 로고
    • Visual e-mail authentication and identification services: An investigation of the effects on e-mail use
    • Wang, J., Chen, R., Herath, T., & Rao, H. R. (2009). Visual e-mail authentication and identification services: An investigation of the effects on e-mail use. Decision Support Systems, 48(1), 92-102.
    • (2009) Decision Support Systems , vol.48 , Issue.1 , pp. 92-102
    • Wang, J.1    Chen, R.2    Herath, T.3    Rao, H.R.4
  • 123
    • 49249108825 scopus 로고    scopus 로고
    • Issues, limitations, and opportunities in cross-cultural research on collaborative software in information systems
    • Zhang, D., & Lowry, P. B. (2008). Issues, limitations, and opportunities in cross-cultural research on collaborative software in information systems. Journal of Global Information Management, 16(1), 61-92.
    • (2008) Journal of Global Information Management , vol.16 , Issue.1 , pp. 61-92
    • Zhang, D.1    Lowry, P.B.2
  • 124
    • 38349101624 scopus 로고    scopus 로고
    • The impact of individualism-collectivism, social presence, and group diversity on group decision making under majority influence
    • Zhang, D., Lowry, P. B., Zhou, L., & Fu, X. (2008). The impact of individualism-collectivism, social presence, and group diversity on group decision making under majority influence. Journal of Management Information Systems, 23(4), 53-80.
    • (2008) Journal of Management Information Systems , vol.23 , Issue.4 , pp. 53-80
    • Zhang, D.1    Lowry, P.B.2    Zhou, L.3    Fu, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.