Switch to: References

Add citations

You must login to add citations.
  1. Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145-160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Digital Piracy: Factors that Influence Attitude Toward Behavior.Sulaiman Al-Rafee & Timothy Paul Cronan - 2006 - Journal of Business Ethics 63 (3):237-259.
    A new form of software piracy known as digital piracy has taken the spotlight. Lost revenues due to digital piracy could reach $5 billion by the end of 2005.Preventives and deterrents do not seem to be working – losses are increasing. This study examines factors that influence an individual’s attitude toward pirating digital material. The results of this study suggest that attitude toward digital pirating is influenced by beliefs about the outcome of behavior (cognitive beliefs), happiness and excitement (affective beliefs), (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  • Corporate Sustainable Development: Testing a New Scale Based on the Mainland Chinese Context. [REVIEW]Wing S. Chow & Yang Chen - 2012 - Journal of Business Ethics 105 (4):519-533.
    According to the predominant corporate sustainable development (CSD) framework, this exploratory paper verifies that CSD construct can be modeled by integrating the dimensions of social, economic, and environmental development. We first developed and validated measurement scales for these three dimensions based on a survey of 314 managers in mainland China. Then, using structural equation modelling, we confirmed that the proposed model is valid. Therefore, our findings may allow researchers to explore CSD further, and practitioners to develop their understanding of CSD (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Developing an Instrument for Assessing Self-Efficacy in Data Mining and Analysis.Yu-Min Wang, Chei-Chang Chiou, Wen-Chang Wang & Chun-Jung Chen - 2021 - Frontiers in Psychology 11.
    With the continuous progress and penetration of automated data collection technology, enterprises and organizations are facing the problem of information overload. The demand for expertise in data mining and analysis is increasing. Self-efficacy is a pivotal construct that is significantly related to willingness and ability to perform a particular task. Thus, the objective of this study is to develop an instrument for assessing self-efficacy in data mining and analysis. An initial measurement list was developed based on the skills and abilities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • The Joint Moderating Impact of Moral Intensity and Moral Judgment on Consumer’s Use Intention of Pirated Software.Mei-Fang Chen, Ching-Ti Pan & Ming-Chuan Pan - 2009 - Journal of Business Ethics 90 (3):361-373.
    Moral issues have been included in the studies of consumer misbehavior research, but little is known about the joint moderating effect of moral intensity and moral judgment on the consumer's use intention of pirated software. This study aims to understand the consumer's use intention of pirated software in Taiwan based on the theory of planned behavior proposed by Ajzen. In addition, moral intensity and moral judgment are adopted as a joint moderator to examine their combined influence on the proposed research (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • “To Pirate or Not to Pirate”: A Comparative Study of the Ethical Versus Other Influences on the Consumer’s Software Acquisition-Mode Decision.Pola B. Gupta, Stephen J. Gould & Bharath Pola - 2004 - Journal of Business Ethics 55 (3):255-274.
    Consumers of software often face an acquisition-mode decision, namely whether to purchase or pirate that software. In terms of consumer welfare, consumers who pirate software may stand in opposition to those who purchase it. Marketers also face a decision whether to attempt to thwart that piracy or to ignore, if not encourage it as an aid to their software's diffusion, and policymakers face the decision whether to adopt interventionist policies, which are government-centric, or laissez faire policies, which are marketer-centric. Here (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • The Impact of Normative Influence and Locus of Control on Ethical Judgments and Intentions: a Cross-Cultural Comparison.John Cherry - 2006 - Journal of Business Ethics 68 (2):113-132.
    The study extends the Theory of Planned Behavior (TPB) in a cross-cultural setting, incorporating ethical judgments and locus of control in a comparison of Taiwanese and US businesspersons. A self-administered survey of 698 businesspersons from the US and Taiwan examined several hypothesized differences. Results indicate that while Taiwanese respondents have a more favorable attitude toward a requested bribe than US counterparts, and are less likely to view it as an ethical issue, their higher locus externality causes ethical judgments and behavioral (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  • The Relationship Between General Ethical Judgments and Copying Behavior at Work.Tracy A. Suter, Steven W. Kopp & David M. Hardesty - 2004 - Journal of Business Ethics 55 (1):61-70.
    Electronic technologies, in general, and computer-oriented technologies specifically have had a tremendous impact on all aspects of business. One area of increased concern is the protection of intellectual properties -- notably copyrights -- within the boundaries of the broadly defined technology industry. While the ability to share copyrighted information has always existed at the most basic levels, the advent of the information age has allowed the sharing of this information to take place in potentially greater quantities and without a loss (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • One Sail Fits All? A Psychographic Segmentation of Digital Pirates.Charlotte Emily De Corte & Patrick Van Kenhove - 2017 - Journal of Business Ethics 143 (3):441-465.
    This paper focuses on segmenting digital movie and TV series pirates and on investigating the effectiveness of piracy-combatting measures i.e., legal and educational strategies, in light of these segments. To address these research objectives, two online studies were conducted. First, 1277 valid responses were gathered with an online survey. Four pirate segments were found based on differing combinations of attitude toward piracy, ethical evaluation of piracy and feelings of guilt. The anti-pirate, conflicted pirate, cavalier pirate, and die-hard pirate can be (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Predictors of Usage Intentions of Pirated Software.Ian Phau & James Ng - 2010 - Journal of Business Ethics 94 (1):23-37.
    The purpose of this study is to investigate the salient factors influencing consumers’ attitudes and usage intentions towards pirated software. Using the Theory of Planned Behaviour, this study investigates the relationships between three sets of factors, i.e. personal, social and perceived behavioural control onto attitudes towards pirated software. Through a multiple regression, only personal factors have shown significant relationship with attitudes towards software piracy. Further results from this study have supported that favourable attitudes towards pirated software is likely to result (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Factors that Influence the Intention to Pirate Software and Media.Timothy Paul Cronan & Sulaiman Al-Rafee - 2008 - Journal of Business Ethics 78 (4):527-545.
    This study focuses on one of the newer forms of software piracy, known as digital piracy, and uses the Theory of Planned Behavior (TPB) as a framework to attempt to determine factors that influence digital piracy (the illegal copying/downloading of copyrighted software and media files). This study examines factors, which could determine an individual’s intention to pirate digital material (software, media, etc.). Past piracy behavior and moral obligation, in addition to the prevailing theories of behavior (Theory of Planned Behavior), were (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  • Explaining the Misuse of Information Systems Resources in the Workplace: A Dual-Process Approach.Amanda M. Y. Chu, Patrick Y. K. Chau & Mike K. P. So - 2015 - Journal of Business Ethics 131 (1):209-225.
    The aim of this study is to gain an understanding of why employees misuse information systems resources in the workplace. Rather than consider “intention,” as existing behavioral research commonly does, this study investigates actual behavior and employs IS resource misuse as the dependent variable. Data from a web-based survey are analyzed using the partial least squares approach. In light of the dual-process approach and the theory of planned behavior, the findings suggest that IS resource misuse may be both an intentional (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Modeling information ethics: The joint moderating role of locus of control and job insecurity. [REVIEW]Chieh-Peng Lin & Cherng G. Ding - 2003 - Journal of Business Ethics 48 (4):335-346.
    Information unethical behavior is concerned with ethical behavioural conflicts in the use of information, information technologies, and information systems. This study examines the combination of locus of control and job insecurity as a joint moderator on the decision making process for information ethical behavioral intentions. A conceptual model is proposed to see the joint moderating role of LOC and JI. In the model, ethical behavioral intentions are influenced directly by ethical attitude, personal values, and perceived behavioural control. Simultaneously, personal values (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • Attitudes towards information ethics: a view from Egypt.Omar E. M. Khalil & Ahmed A. S. Seleim - 2012 - Journal of Information, Communication and Ethics in Society 10 (4):240-261.
    PurposeThe information technology related ethical issues will only increase in frequency and complexity with the increasing diffusion of IT in economies and societies. The purpose of this paper is to explore Egyptian students' attitudes towards the information ethics issues of privacy, access, property, and accuracy, and it evaluates the possible impact of a number of personal characteristics on such attitudes.Design/methodology/approachThis research utilized a cross‐sectional sample and data set to test five hypotheses. It adopted an instrument to collect the respondents' background (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Costs and Utilities Perspective of Consumers' Intentions to Engage in Online Music Sharing: Consumers' Knowledge Matters.Mei-Fang Chen & Ya-Hui Yen - 2011 - Ethics and Behavior 21 (4):283 - 300.
    Online music sharing, deemed illegal for invading intellectual property rights under current laws, has become a crucial issue for the music industry in the modern digital age, but few have investigated the potential costs and utilities for individuals involved in such online misbehavior. This study aimed to fill in this gap to predict consumers' intentions to engage in online music sharing and further consider consumers' online music sharing knowledge as a moderator in the research model. The results of repeated measures (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical Attitude and Behaviors Regarding Computer Use.Lichun Chiang & Boywe Lee - 2011 - Ethics and Behavior 21 (6):481 - 497.
    This study explores the ethical attitudes, behaviors, and perceptions of a sampling of political science students in Taiwan. It investigates their intentions toward observing ethics in the area of digital rights, on topics such as the freedom of expression, freedom of association, equal access to information, confidentiality, security, and protection of intellectual property while using computers. Based on preliminary studies, a questionnaire was designed and distributed to 660 political science and public administration students throughout colleges in Taiwan. Data collected from (...)
    Download  
     
    Export citation  
     
    Bookmark