5 found
Order:
  1.  44
    The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy.Meng-Hsiang Hsu & Feng-Yang Kuo - 2003 - Journal of Business Ethics 42 (4):305 - 320.
    In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  2.  53
    Assessing gender differences in computer professionals' self-regulatory efficacy concerning information privacy practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145 - 160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  3.  14
    Assessing Gender Differences in Computer Professionals’ Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2006 - Journal of Business Ethics 73 (2):145-160.
    Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization's systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  4. Approaching internet abuse: A psychoanalytic perspective.Feng-Yang Kuo - 2003 - Journal of Information Ethics 12 (2):31-42.
     
    Export citation  
     
    Bookmark  
  5.  82
    Development and validation of ethical computer self-efficacy measure: The case of softlifting. [REVIEW]Feng-Yang Kuo & Meng-Hsiang Hsu - 2001 - Journal of Business Ethics 32 (4):299 - 315.
    The concept of self-efficacy is concerned with people''s beliefs in their ability to produce given attainment. It has been widely applied to study human conduct in various settings. This study, based on Albert Bandura''s social cognitive theory, proposes the employment of self-efficacy for investigating people''s ethical conduct related to computer use. Specifically, an ethical computer self-efficacy (ECSE) construct concerning software piracy is developed and validated. The measurement model of the construct was rigorously tested and validated through confirmatory factor analysis. The (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   24 citations