Journal of Business Ethics 121 (3):385-401 (2014)

Computer abuse by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals who adhere to a formalist ethical perspective are significantly less likely to engage in CA activities than those following a utilitarian ethical framework. In addition, the results provide evidence that employees with individualistic natures are linked to increased CA incidents, whereas collectivist tendencies are associated with decreases in CA behaviors. Our results also show that collectivism acts as a strong moderator that further decreases the relationships between formalism and CA, and utilitarianism and CA. Finally, we offer detailed suggestions on how organizations and researchers can leverage our findings to decrease CA occurrences.
Keywords Culture  Computer abuse  Deontological evaluations  Ethics  Formalism  Information security  Organizational security  Teleological evaluations  Utilitarianism  Collectivism  Individualism
Categories (categorize this paper)
DOI 10.1007/s10551-013-1705-3
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

PhilArchive copy

Upload a copy of this paper     Check publisher's policy     Papers currently archived: 71,290
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

The Impact of National Culture on Software Piracy.Bryan W. Husted - 2000 - Journal of Business Ethics 26 (3):197 - 211.
An Empirical Study of Ethical Predispositions.F. Neil Brady & Gloria E. Wheeler - 1996 - Journal of Business Ethics 15 (9):927-940.

View all 19 references / Add more references

Citations of this work BETA

Add more citations

Similar books and articles

Where Computer Security Meets National Security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Information Systems Ethics: A Practitioner Survey. [REVIEW]Thomas Hilton - 2000 - Journal of Business Ethics 28 (4):279 - 284.
Privacy, Secrecy and Security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
Computer Abuse and Computer Crime as Organizational Activities.Rob Kling - 1981 - Acm Sigcas Computers and Society 11 (4):12-24.
The Hierarchical Abuse of Power in Work Organizations.Donald Vredenburgh & Yael Brender - 1998 - Journal of Business Ethics 17 (12):1337-1347.
Introduction and Overview: Global Information Ethics.Terrell Ward Bynum & Simon Rogerson - 1996 - Science and Engineering Ethics 2 (2):131-136.
Just Consequentialism and Computing.James H. Moor - 1999 - Ethics and Information Technology 1 (1):61-65.


Added to PP index

Total views
30 ( #383,434 of 2,518,865 )

Recent downloads (6 months)
1 ( #407,861 of 2,518,865 )

How can I increase my downloads?


My notes