Browse > Article
http://dx.doi.org/10.14400/JDC.2017.15.8.169

Behavior Improvement of Unethical Information-Sharing by The Ethical Program : Social Capital and Ripple Effect  

Jung, Byoung-Ho (Dept. of Management Information Systems, Hankuk University of Foreign Studies)
Kim, Byung-Cho (Dept. Global Business & Technology, Hankuk University of Foreign Studies)
Publication Information
Journal of Digital Convergence / v.15, no.8, 2017 , pp. 169-182 More about this Journal
Abstract
The purpose of this study is to empirically examine a behavior improvement of unethical information sharing through the ethics program in organization. An unethical behavior of information sharing on organization members is to be get to private interests through divulgence of company's confidential information. An unethical information-sharing of individual is the opportunist and selfish behavior for an expansion of social capital and shows a negative ripple effect in organization. When conducting the research methods, the analysis order performs the cluster, discriminant, t-test and multiple regressions. According to the study, There are differences the behavior of unethical information sharing between opportunist and non-opportunist. The opportunist member for unethical behavior improvement required the program operation both value and compliance oriented program. Non-opportunist member required only the value-oriented program. The upcoming research needs to explore both ethics program's frequency and action of a punished person.
Keywords
Unethical Behavior; Ethics Program; Information Sharing; Ripple Effect; Social Capital;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Lindsay, R. M., Lindsay, L. M., & Irvine, V. B. "Instilling ethical behavior in organizations: A survey of Canadian companies." Journal of Business Ethics, Vol. 15, No. 4, pp. 393-407, 1996.   DOI
2 Donaldson, T., & Dunfee, T. W. "Toward a unified conception of business ethics: Integrative social contracts theory." Academy of management review, Vol. 19, No. 2, 252-284, 1994.   DOI
3 Kilduff, M., & Tsai, W. "Social networks and organizations." Sage, 2003.
4 Burt, R. S. "Brokerage and closure: An introduction to social capital." Oxford university press, 2005.
5 Watts, D. J. "Small worlds: the dynamics of networks between order and randomness." Princeton university press1, 1999.
6 Wolff, H. G., & Moser, K. "Effects of networking on career success: a longitudinal study." Journal of Applied Psychology, Vol. 94, No. 1, pp. 196-206, 2009.   DOI
7 Robbins, S. P., DeCenzo, D. A., & Coulter, M. K. "Fundamentals of management: essential concepts and applications." Upper Saddle River, NJ: Pearson Prentice Hall, 2008.
8 Scott, J."Social network analysis." Sage, 2012.
9 Schwartz, M. S. & Carroll, A. B. "Corporate social responsibility: A three-domain approach." Business ethics quarterly, Vol. 13, No. 4, pp. 503-530, 2003.   DOI
10 Young-Bok Kim & Man-Kee Choe. "An Empirical Study of Corporate Ethical Management, Perceived Image, and Perceived Stakeholders' Favorable Response." Journal of Business Research, Vol. 26, No. 4, pp. 113-142, 2011.
11 Kulkarni, S. P. "Environmental ethics and information asymmetry among organizational stakeholders." Journal of Business Ethics, Vol. 27, No. 3, pp. 215-228, 2000.   DOI
12 Eun-Young Cho. "ethical management, corporate image, consumer perception, consumer trust, consumer selection, purchasing behavior, convergence effect." Journal of Digital Convergence, Vol. 13, No. 8, pp. 113-121, 2015.   DOI
13 Brass, D. J., Butterfield, K. D., & Skaggs, B. C. "Relationships and unethical behavior: A social network perspective." Academy of Management Review, Vol. 23, No. 1, pp. 14-31, 1998.   DOI
14 Kelley, S. W., Skinner, S. J., & Ferrell, O. C. "Opportunistic behavior in marketing research organizations." Journal of Business Research, Vol. 18, No. 4, pp. 327-340, 1989.   DOI
15 Weber, M. "Legitimate authority and bureaucracy. Organization theory: Selected readings." pp. 3-15, 1924.
16 Turner, J. C. "Explaining the nature of power: a three‐process theory." European Journal of Social Psychology, Vol. 35, No. 1, 1-22, 2005.   DOI
17 Raven, B. H. "Legitimate power, coercive power, and observability in social influence." Sociometry, Vol. 21, No. 2, pp. 83-97, 1958.   DOI
18 Kang-Min Lee, Shi-Gak Choo & Sang-Gil Jeon. "Business ethics, Transformational leadership, Unethical pro-organizational behavior, Organizational identification, Social identity theory." Journal of Digital Convergence, Vol. 14, No. 2, pp. 83-98, 2016.   DOI
19 Barsade, S. G. "The ripple effect: Emotional contagion and its influence on group behavior." Administrative Science Quarterly, Vol. 47, No. 4, pp. 644-675, 2002.   DOI
20 Kulkarni, S. P. "Environmental ethics and information asymmetry among organizational stakeholders." Journal of Business Ethics, Vol. 27, No. 3, pp. 215-228, 2000.   DOI
21 Paine, L. S. "Managing for organizational integrity." Harvard business review, Vol. 72, No. 2, pp. 106-117, 1994.
22 Eisenbeiss, S. A., & Brodbeck, F. "Ethical and unethical leadership: Across-cultural and cross-sectoral analysis." Journal of Business Ethics, Vol. 122, No. 2, pp. 343-359, 2014.   DOI
23 Weaver, G. R., & Trevino, L. K. "Compliance and Values Oriented Ethics Programs: Influenceson Employees' Attitudes and Behavior." Business Ethics Quarterly, Vol. 9, No. 2, pp. 315-335, 1999.   DOI
24 Weaver, G. R., & Trevino, L. K. "The role of human resources in ethics/compliance management: A fairness perspective." Human Resource Management Review, Vol. 11, No. 1, pp. 113-134, 2001.   DOI
25 Bowen, P., Hash, J., & Wilson, M. "Information security handbook: a guide for managers. In NIST Special Publication 800-100" National Institute of Standards and Technology, 2006.
26 Cohen, F. "Managing network security-Part 5: Risk management or risk analysis." Network Security, 4, pp. 15-19, 1997.
27 Young-Hyung Kim, Hye-Kyoung Kim. "The moderating roles of employees' self-efficacy and trust in leader on the relationship between ethical leadership and employees' behaviors." Journal of Digital Convergence, Vol. 14, No. 3, pp. 71-81, 2016.   DOI
28 Khazanchi, D. "Unethical behavior in information systems: The gender factor. Journal of Business Ethics." Vol. 14, No. 9, pp. 741-749, 1995.   DOI
29 Weaver, G. R., Trevino, L. K., & Cochran, P. L. "Integrated and decoupled corporate social performance: Management commitments, external pressures, and corporate ethics practices." Academy of Management Journal, Vol. 42, No. 5, pp. 539-552, 1999.   DOI
30 Kil-Hong Kim, Dong-Woo Yang. "A Study on the Effect of CEO ethics on the business performance of company -Focusing on construction companies-." Journal of Digital Convergence, Vol. 14, No. 4, pp. 173-183, 2016.   DOI
31 Ferrell, O. C., & Skinner, S. J. "Ethical behavior and bureaucratic structure in marketing research organizations." journal of Marketing Research, pp. 103-109, 1988.
32 Lowry, P. B., Posey, C., Roberts, T. L., & Bennett, R. J. "Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse." Journal of Business Ethics, Vol. 121, No. 3, 385-401, 2014.   DOI
33 Tae-Sik Rhee, Sang-Chil Kim & Deog-Ro Lee. "A Study on the Effect of Practices of Business Ethics Programs on Individual Performance: The Mediating Effect of Corporate Social Responsibility." The Korean Academic Association of Business Administration, Vol. 25, No. 2, pp. 1237-1258, 2012.
34 Miceli, M. P., Near, J. P., & Dworkin, T. M. "Whistle-blowing in organizations." Psychology Press, 2013.
35 Trevino, L. K., & Weaver, G. R. "Organizational Justice and Ethics Program Tollow-Through': Influences on Employees' Harmful and Helpful Behavior." Business Ethics Quarterly, Vol. 11, No. 4, pp. 651-671, 2001.   DOI
36 Schwartz, M. S. & Carroll, A. B."Corporate social responsibility: A three-domain approach. Business ethics quarterly." Vol.13, No.4, pp.503-530, 2003.   DOI
37 McCabe, D. L., Trevino, L. K., & Butterfield, K. D. "The influence of collegiate and corporate codes of conduct on ethics-related behavior in the workplace." Business Ethics Quarterly, Vol. 6, No. 4, pp. 461-476, 1996.   DOI
38 Kish-Gephart, J. J., Harrison, D. A., & Trevino, L. K. "Bad apples, bad cases, and bad barrels: meta-analytic evidence about sources of unethical decisions at work." Journal of applied psychology, Vol. 95, No. 1, pp.1-31, 2010.   DOI
39 Trevino, L. K., Weaver, G. R., & Reynolds, S. J. "Behavioral ethics in organizations: A review." Journal of management, Vol. 32, No. 6, pp. 951-990, 2006.   DOI
40 Hair, J. F. "Multivariate data analysis." Pearson College Division, 2010.
41 Hartman, L. P., DesJardins, J. R., & MacDonald, "Business ethics: Decision making for personal integrity and social responsibility". McGraw-Hill., C., 2014.
42 Tae-Hyuk Ahn, Bong-Gyu Park. "The Effects of Corporate Social Responsibility on Customer Satisfaction and Customer Citizenship Behavior: Mediating Effects of Company Image and CSV." Journal of Digital Convergence, Vol. 15, No. 4, pp. 223-231, 2017.   DOI
43 Ferrell, O. C., & Fraedrich, J. "Business ethics: Ethical decision making & cases." Nelson Education, 2015.
44 Han-Jin Hwan, Keyong-Hwa Yeon. "The Moderating Effect of Corporate Governance betweenManagement of Ethics and Firm Performance." Journal of Digital Convergence, Vol. 11, No. 1, pp. 133-140, 2012.
45 Kinicki, A., & Kreitner, R. "Organizational behavior." McGraw-Hill/Irwin, 2011.
46 Jones, T. M. "Ethical decision making by individuals in organizations: An issue-contingent model." Academy of management review, Vol.16, No. 2, pp. 366-395, 1991.   DOI
47 Jeong-Hwan Lee, Byoung-Ho Jung & Byung-Cho Kim. "Incident Response Competence by The Security Types of Firms : Socio-Technical System Perspective." Korea Society of IT Services, Vol. 12, No. 1, pp. 289-308, 2013.
48 Myung-Seong Yim. "The Effect of Characteristics of Information Security Policy on Security Policy Compliance Intention of Employees." Journal of Digital Convergence, Vol. 11, No. 1, pp. 27-38, 2012.   DOI
49 Anderson, E. E., & Choobineh, J. "Enterprise information security strategies." Computers & Security, Vol. 27, No. 1, pp. 22-29, 2008.   DOI