Switch to: References

Add citations

You must login to add citations.
  1. Towards Enforceable Bans on Illicit Businesses: From Moral Relativism to Human Rights.Edmund F. Byrne - 2014 - Journal of Business Ethics 119 (1):119-130.
    Many scholars and activists favor banning illicit businesses, especially given that such businesses constitute a large part of the global economy. But these businesses are commonly operated as if they are subject only to the ethical norms their management chooses to recognize, and as a result they sometimes harm innocent people. This can happen in part because there are no effective legal constraints on illicit businesses, and in part because it seems theoretically impossible to dispose definitively of arguments that support (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Organizational Ethics Research: A Systematic Review of Methods and Analytical Techniques.Michael S. McLeod, G. Tyge Payne & Robert E. Evert - 2016 - Journal of Business Ethics 134 (3):429-443.
    Ethics are of interest to business scholars because they influence decisions, behaviors, and outcomes. While scholars have increasingly shown interest in business ethics as a research topic, there are a mounting number of studies that examine ethical issues at the organizational level of analysis. This manuscript reports the results of a systematic review of empirical research on organizational ethics published in a broad sample of business journals over a 33-year period. A total of 184 articles are analyzed to reveal gaps (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  • Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse.Paul Benjamin Lowry, Clay Posey, Tom L. Roberts & Rebecca J. Bennett - 2014 - Journal of Business Ethics 121 (3):385-401.
    Computer abuse by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals who (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Fighting Software Piracy: Which Governance Tools Matter in Africa?Antonio R. Andrés & Simplice A. Asongu - 2013 - Journal of Business Ethics 118 (3):667-682.
    This article integrates previously missing components of government quality into the governance-piracy nexus in exploring governance mechanisms by which global obligations for the treatment of IPRs are effectively transmitted from international to the national level in the battle against piracy. It assesses the best governance tools in the fight against piracy and upholding of intellectual property rights (IPRs). The instrumentality of IPR laws (treaties) in tackling piracy through good governance mechanisms is also examined. Findings demonstrate that: (1) while all governance (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations