Switch to: References

Add citations

You must login to add citations.
  1. It's All in the Game: A 3D Learning Model for Business Ethics.Suzy Jagger, Haytham Siala & Diane Sloan - 2016 - Journal of Business Ethics 137 (2):383-403.
    How can we improve business ethics education for the twenty first century? This study evaluates the effectiveness of a visual case exercise in the form of a 3D immersive game given to undergraduate students at two UK Universities as part of a mandatory business ethics module. We propose that due to evolving learning styles, the immersive nature of interactive games lends itself as a vehicle to make the learning of ethics more ‘concrete’ and ‘personal’ and therefore more engaging. To achieve (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Determinants of Consumer’s Willingness to Purchase Gray-Market Smartphones.Chun-Hsiung Liao & I. -Yu Hsieh - 2013 - Journal of Business Ethics 114 (3):409-424.
    The study analyzes the influential factors of consumers’ willingness to purchase gray-market smartphones by considering the model of novelty seeking, status consumption, integrity, and perceived risk. Attitude toward counterfeit is used as mediation in the model. The causalities in the model of problematic willingness of consumer to purchase gray-market smartphones are hypothesized. A total sample of 350 respondents with 238 effective samples is collected by interviewing with questionnaires at the service counters of telecommunications operators. Structure equation modeling (SEM) is adopted (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Illegal Downloading, Ethical Concern, and Illegal Behavior.Kirsten Robertson, Lisa McNeill, James Green & Claire Roberts - 2012 - Journal of Business Ethics 108 (2):215-227.
    Illegally downloading music through peer-topeer networks has persisted in spite of legal action to deter the behavior. This study examines the individual characteristics of downloaders which could explain why they are not dissuaded by messages that downloading is illegal. We compared downloaders to non-downloaders and examined whether downloaders were characterized by less ethical concern, engagement in illegal behavior, and a propensity toward stealing a CD from a music store under varying levels of risk. We also examined whether downloading or individual (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • Perceived risk and digital piracy: a moderated-moderation model.Kian Yeik Koay - 2023 - Journal of Information, Communication and Ethics in Society 21 (4):521-532.
    Purpose This study aims to examine the joint moderating effects of privacy risk and time risk on the relationship between financial risk and intentions to pirate digital products. Design/methodology/approach The author collected data from 247 participants using a survey method. Subsequently, PROCESS macro was used to evaluate the proposed hypotheses. Findings This study found that financial risk does not have a significant relationship with the consumer intention to pirate digital products. However, privacy risk moderates the negative relationship between financial risk (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • How does past behaviour stimulate consumers' intentions to repeat unethical behaviour? The roles of perceived risk and ethical beliefs.BaoChun Zhao, Mohammed Yahya Rawwas & ChengHao Zeng - 2020 - Business Ethics 29 (3):602-616.
    Repeated unethical behaviour by consumers is a serious challenge for participants in business transactions, including consumers, retailers, and those responsible for market supervision. Due to the inherent risk of such behaviours, we examine perceived risk to uncover the psychological mechanism by which consumers consider past behaviour (PAB) when deciding to repeat unethical behaviour. We divide perceived risk into two categories, material risk (MAR) and nonmaterial risk (NMR), based on two kinds of ethical evaluation and explore their mediating effects in the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • E-textbook piracy behavior.Sri Rahayu Hijrah Hati, Rahma Fitriasih & Anya Safira - 2019 - Journal of Information, Communication and Ethics in Society 18 (1):105-123.
    The purpose of this paper is to examine the factors that influence the intention of students to pirate academic e-books by integrating three main theories: ethics theory, deterrence theory, and the theory of planned behavior. The study also examines the moderating role of past piracy behavior on the relationship between the factors in the previously mentioned theories and students’ piracy intention.,The data were collected using a convenience sample of 662 university students. Based on their past behaviors, the students were grouped (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Self-Service Technologies and e-Services Risks in Social Commerce Era.Mauricio S. Featherman & Nick Hajli - 2016 - Journal of Business Ethics 139 (2):251-269.
    Social commerce as a subset of e-commerce has been emerged in part due to the popularity of social networking sites. Social commerce brings new challenges to marketing activities. And social commerce transactions like e-commerce transactions can be dangerous and cause harmful losses to personal finances, time, and information privacy. This article examines ethical issues and consumer assessments of the risks of using an e-service and how risk affects consumer evaluations and usage of Internet-based services and self-service technologies. Results from two (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • (2 other versions)Subjective probability assessments of the incidence of unethical behavior: the importance of scenario-respondent fit.Darlene Bay & Alexey Nikitkov - 2011 - Business Ethics: A European Review 20 (1):1-11.
    Largely due to the difficulty of observing behavior, empirical business ethics research relies heavily on the scenario methodology. While not disputing the usefulness of the technique, this paper highlights the importance of a careful assessment of the fit between the context of the situation described in the scenario and the knowledge and experience of the respondents. Based on a study of online auctions, we provide evidence that even respondents who have direct knowledge of the situation portrayed in the scenario may (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • One Sail Fits All? A Psychographic Segmentation of Digital Pirates.Charlotte Emily De Corte & Patrick Van Kenhove - 2017 - Journal of Business Ethics 143 (3):441-465.
    This paper focuses on segmenting digital movie and TV series pirates and on investigating the effectiveness of piracy-combatting measures i.e., legal and educational strategies, in light of these segments. To address these research objectives, two online studies were conducted. First, 1277 valid responses were gathered with an online survey. Four pirate segments were found based on differing combinations of attitude toward piracy, ethical evaluation of piracy and feelings of guilt. The anti-pirate, conflicted pirate, cavalier pirate, and die-hard pirate can be (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Explaining the Misuse of Information Systems Resources in the Workplace: A Dual-Process Approach.Amanda M. Y. Chu, Patrick Y. K. Chau & Mike K. P. So - 2015 - Journal of Business Ethics 131 (1):209-225.
    The aim of this study is to gain an understanding of why employees misuse information systems resources in the workplace. Rather than consider “intention,” as existing behavioral research commonly does, this study investigates actual behavior and employs IS resource misuse as the dependent variable. Data from a web-based survey are analyzed using the partial least squares approach. In light of the dual-process approach and the theory of planned behavior, the findings suggest that IS resource misuse may be both an intentional (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation.Mateja Kos Koklic, Monika Kukar-Kinney & Irena Vida - 2016 - Journal of Business Ethics 134 (1):15-27.
    Digital piracy as a continuing problem significantly impacts various stakeholders, including consumers, enterprises, and countries. This study develops a three-level mechanism of determinants of consumer digital piracy behavior, with personal risk as an individual factor, susceptibility to interpersonal influence as an inter-personal factor, and moral intensity as a broad societal factor. Further, it explores the role of rationalization and future piracy intent as outcomes of past piracy behaviors. The authors use survey data from four countries in the European Union to (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • How ethical and political identifications drive adaptive behavior in the digital piracy context.Dario Miocevic & Ivana Kursan Milakovic - 2022 - Business Ethics, the Environment and Responsibility 32 (1):256-273.
    Today, digital piracy remains a growing challenge for both legislators and businesses operating in the entertainment industry. This study explores when and why consumers make trade-offs between illegal and legal streaming services. By drawing on protection motivation theory, we find that consumers' threat and coping appraisals increase their adaptive behavior, i.e., lower intention to consume illegal and higher intention to consume legal streaming services. We also show that the strength of consumers' inherent ethical (relativism) and political (economic liberalism) identities conditions (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The association of moral development and moral intensity with music piracy.Darryl J. Woolley - 2015 - Ethics and Information Technology 17 (3):211-218.
    Prior research has not found a meaningful relationship between digital piracy and moral development, possibly because students do not recognize digital piracy as a moral issue. Rather than measure moral development as an individual characteristic, this study tests which components of moral development are seen as relevant to digital piracy. If some of the stages of moral development are applicable to music piracy behavior, people are more likely to pirate than to engage in other more morally intense behaviors. Some of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Interactive Role of Consumer Discrimination and Branding against Counterfeiting: A Study of Multinational Managers' Perception of Global Brands in China. [REVIEW]Mahmut Sonmez, Deli Yang & Gerald Fryxell - 2013 - Journal of Business Ethics 115 (1):195-211.
    Prior research has examined consumer intentions to purchase fakes, branding strategies and anti-counterfeiting actions, but little attention seems to have been paid to the role of consumers’ ability to discern fakes and branding strategies against counterfeiting. This article, thus, based on a study of 128 multinational managers’ experience in China, examines these inter-relationships. As a result, we address how knowledgeable and experienced managers in branding, consumer consumption and anti-counterfeiting effort perceive consumers’ ability to discriminate fakes from originals interacts with branding (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • (2 other versions)Subjective probability assessments of the incidence of unethical behavior: the importance of scenario–respondent fit.Darlene Bay & Alexey Nikitkov - 2011 - Business Ethics, the Environment and Responsibility 20 (1):1-11.
    Largely due to the difficulty of observing behavior, empirical business ethics research relies heavily on the scenario methodology. While not disputing the usefulness of the technique, this paper highlights the importance of a careful assessment of the fit between the context of the situation described in the scenario and the knowledge and experience of the respondents. Based on a study of online auctions, we provide evidence that even respondents who have direct knowledge of the situation portrayed in the scenario may (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  • A Configurational Analysis of the Causes of Consumer Indirect Misbehaviors in Access-Based Consumption.Xiao-Ling Jin, Zhongyun Zhou & Yiwei Tian - 2020 - Journal of Business Ethics 175 (1):135-166.
    Consumer indirect misbehavior in access-based consumption is a significant challenge for enterprises. The literature is in short of a deep understanding of the antecedent conditions of consumer indirect misbehavior in this context and limited by inconsistent findings, calling for developing a holistic and integrative theoretical framework. This study integrates three commonly used theoretical perspectives in the consumer misbehavior literature to present holistic archetypes of consumer indirect misbehavior formation. In accordance with this theoretical objective, we adopted an emerging approach for configurational (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Ethical Behavioral Intention in an Academic Setting: Models and Predictors.Lori N. K. Leonard, Cynthia K. Riemenschneider & Tracy S. Manly - 2017 - Journal of Academic Ethics 15 (2):141-166.
    This study examines the theory of planned behavior and the multidimensional ethics scale. Variables from both are included to determine which ones significantly correlate with student ethical behavioral intention in an academic setting. Using a survey, responses are collected from undergraduate business students from two southwestern universities in the United States using a scenario-based approach, looking at individual situations and group situations. SmartPLS was used to assess the results for four scenarios. From the theory of planned behavior, attitude was a (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations