13,382 research outputs found

    Understanding Compliance with Internet Use Policy: An Integrative Model Based on Command-and- Control and Self-Regulatory Approaches

    Get PDF
    Internet security risks, the leading security threats confronting today’s organizations, often result from employees’ non-compliance with the Internet use policy (IUP). Extant studies on the compliance with security policies have largely ignored the impact of intrinsic motivations on employees’ compliance intention. This paper proposes a theoretical model that integrates an extrinsic sanction-based command-and-control approach with an intrinsic self-regulatory approach to examine employees’ IUP compliance intention. The self-regulatory approach centers on the effect of organizational justice and personal moral beliefs against Internet abuses. The results of this study suggest that the self-regulatory approach is more effective than the sanctionbased command-and-control approach. Organizational justice not only influences IUP compliance intention directly, but also indirectly through fostering favorable personal moral beliefs against Internet abuses

    Effects of Neutralization Techniques and Rational Choice Theory on Internet Abuse in the Workplace

    Get PDF
    This research aims to identify the antecedents that drive an employee to commit Internet abuses at the workplace. Drawing on literatures in criminology, this present study developed a theoretical model based on neutralization techniques and rational choice theory. The model was validated using survey data from 428 employees. Our results indicate that neutralization techniques significantly influence employees’ Internet abuse intentions except denial of responsibility. The cost-benefits analysis of perceived security risks and perceived benefits are also found to play an important role in affecting Internet abuse intentions while the risks of perceived formal sanctions have no significant effect. We then discuss key implications of our findings for research and practice

    Introduction

    Get PDF
    This chapter provides an overview of the central concepts in a textbook that examines the role of media in the political sphere in comparative perspective. The book has a particular focus on media models, theories of news production, the journalistic profession as well as the performance of the media in elections, war, terrorism and on line. The book focuses on the media and journalists in the United States, the United Kingdom and the Russian Federation

    The Ethical Dimension of Economic Choices

    Get PDF
    In general, capitalist countries display sustained growth, dynamism and innovation, and a high adaptability in response to external shocks. Yet in the last twenty years discontent over the notorious drawbacks of capitalism – corporate frauds, corruption, abuses of market power – has grown continually. In this paper, we argue that no remedy to these difficulties can be found if ethical dilemmas are not anticipated and addressed at the individual, firm and economy-wide level. While pro-ethical changes in business regulation would help, government action alone may not be effective enough. Given that the social sciences provide the general framework of reference for human action, better integration of the ethical dimension by these disciplines would bring about additional benefits. In particular, economic theory would gain from developing more in-depth reflection on human end-goals and values.Calculativeness; Capitalism; Corporate social responsibility; Economics; Virtue Ethics

    Trust conceptualized as a corporate knowledge asset

    Get PDF
    To most individuals, "trust" can be viewed as a knowledge corporate asset that may add, or rest, value to the company. The role of knowledge in achieving a competitive advantage is becoming and increasingly important management issue in all business and non-business sectors. As such, our Throughput Modeling approach indicates how six different trust behaviors can be guided, how trust decision making can be improved and made defensible, and how special problems facing individuals can be dealt with via decision-making pathways leading to an action

    Privacy, Public Goods, and the Tragedy of the Trust Commons: A Response to Professors Fairfield and Engel

    Get PDF
    User trust is an essential resource for the information economy. Without it, users would not provide their personal information and digital businesses could not operate. Digital companies do not protect this trust sufficiently. Instead, many take advantage of it for short-term gain. They act in ways that, over time, will undermine user trust. In so doing, they act against their own best interest. This Article shows that companies behave this way because they face a tragedy of the commons. When a company takes advantage of user trust for profit, it appropriates the full benefit of this action. However, it shares the cost with all other companies that rely on the wellspring of user trust. Each company, acting rationally, has an incentive to appropriate as much of the trust resource as it can. That is why such companies collect, analyze, and “monetize” our personal information in such an unrestrained way. This behavior poses a longer term risk. User trust is like a fishery. It can withstand a certain level of exploitation and renew itself. But over-exploitation can cause it to collapse. Were digital companies collectively to undermine user trust this would not only hurt the users, it would damage the companies themselves. This Article explores commons-management theory for potential solutions to this impending tragedy of the trust commons

    Employees’ workplace cyberloafing: based on the perspective of guanxi

    Get PDF
    Cyberloafing is the biggest time waster in organization, 69 percent of respondents admitted waste time on non-work related activities each day. This number might be higher in China for a larger population of cyber citizens. Previous Studies have investigated the antecedents from various perspectives, such as organization justice, deterrence and work stressor. No one addressed cyberloafing from the perspective of guanxi, even though the strength of guanxi directly determines the appropriate behavior of employees , and employees are grounded by such behavioral norms. To fill this gap, we proposed a research model from the perspective of guanxi theory to understand employees’ cyberloafing behavior

    Mutual Fund Expense Disclosures: A Behavioral Perspective

    Get PDF
    Mutual funds have enjoyed phenomenal growth with their numbers exceeding the number of public companies and their assets aggregating in excess of $9 trillion. Increasingly they are the investment instrument of choice by the proverbial widows, widowers and orphans, and a few school teachers are included as well. But how are best can that choice be one that is not only informed but informed in a way more likely to elicit a wise decision? This paper examines from a behavioral perspective how regulation can best disclose information related to two key factors for investors to compare competing mutual funds: fund returns and fund expenses. Our analysis reflects that the current disclosure process is deficient because it fails to reflect the insights of research on judgment and decision making, and particularly the need to distinguish between the availability of information and its processability by its user. The message of our article is straightforward: if regulators adhered to the insights provided by our paper, not only investors, but also the fund\u27s directors, would be greatly empowered so that better returns and lower costs could be expected

    Manager Unethical Behavior During The New Economy Bubble

    Get PDF
    This paper investigates factors that brought about the surge in manager unethical behavior within the US economy. Key structural causes are the weak internal control, perverse incentives related to managers’ compensation, conflicts of interest in the banking and auditing sectors. Unethical behavior was further enhanced by the large economic noise specific to the IT bubble, which emerged in the late nineties against the background of increased deregulation in the goods and financial markets. The US administration opposed to the proliferation of CEO unethical behavior the Sarbanes-Oxley Act of 2002; we argue why some of its provisions might be taken one step furtherUnethical behavior; CEOs; Financial deregulation; Activism; Sarbanes-Oxely Act
    corecore