1 |
R. J. Bennett & S. L. Robinson. (2003). The past, present, and future of workplace deviance research. Organizational behavior: the state of the science, 2nd edition. Mahwah, NJ: Lawrence Erlbaum.
|
2 |
J. F. Hair, W. C. Black, B. J. Babin, R. E. Anderson & R. L. Tatham. (2006). Multivariate data analysis. Upper Saddle River, NJ: Prentice hall, 1998.
|
3 |
W. W. Chin. (1998). The Partial Least Squares Approach for Structural Equation Modeling. Modern Methods of Business Research, 295(2), 295-336.
|
4 |
O. C. Ferrell & J. Fraedrich. (2015). Business ethics: Ethical decision making & cases. Nelson Education.
|
5 |
A. Kinicki & R. Kreitner. (2011). Organizational behavior. McGraw-Hill/Irwin.
|
6 |
Y. H. Kim & H. K. Kim. (2016). The moderating roles of employees' self-efficacy and trust in leader on the relationship between ethical leadership and employees' behaviors. Journal of Digital Convergence, 14(3), 71-81.
DOI
|
7 |
D. J. Shin & Y. Y. You. (2014). Research on the Effects of a Project Manager's Competency on a Consultant's Ethical Attitude and the Consulting Achievement with the Regulation Effects of CEO Support. Journal of Digital Convergence, 12(5), 191-201.
DOI
|
8 |
E. Keri, S. Pearlson & C. Saunders. (2006). Managing and using information systems: A strategic approach. New York, NY: Wiley.
|
9 |
M. Kaptein & M. S. Schwartz. (2008). The effectiveness of business codes: A critical examination of existing studies and the development of an integrated research model. Journal of Business Ethics, 77(2), 111-127.
DOI
|
10 |
J. H. Lee, B. H. Jung & B. C. Kim. (2013). Incident Response Competence by The Security Types of Firm s : Socio-Technical System Perspective. Korea Society of IT Services, 12(1), 289-308.
|
11 |
H. C. Kelman & V. L. Hamilton. (1989). Crimes of obedience: Toward a social psychology of authority and responsibility. Yale University Press.
|
12 |
K. C. Laudon & J. P. Laudon. (2016). Management information system. Pearson Education India.
|
13 |
M. S. Schwartz & A. B. Carroll. (2003) Corporate social responsibility: A three-domain approach. Business ethics quarterly. 13(4), 503-530.
DOI
|
14 |
M. Shadnam & T. B. Lawrence. (2011). Understanding widespread misconduct in organizations. Business Ethics Quarterly, 21(3), 379-407.
DOI
|
15 |
J. Q. Wilson & G. L. Kelling. (1982). Broken windows. Atlantic monthly, 249(3), 29-38.
|
16 |
T. Donaldson & T. W. Dunfee. (1994). Toward a unified conception of business ethics: Integrative social contracts theory. Academy of management review, 19(2), 252-284.
DOI
|
17 |
R. S. Burt. (2005). Brokerage and closure: An introduction to social capital. Oxford university press.
|
18 |
B. H. Jung & B. C. Kim. (2017). Behavior Improvement of Unethical Information-Sharing by The Ethical Program : Social Capital and Ripple Effect. Journal of Digital Convergence, 15(8), 169-182.
DOI
|
19 |
S. E. Seibert, M. L. Kraimer & R. C. Liden. (2001). A social capital theory of career success. Academy of management journal, 44(2), 219-237.
DOI
|
20 |
S. P. Robbins & T. Judge. (2012). Essentials of organizational behavior. Upper Saddle River: Prentice Hall.
|
21 |
S. P. Robbins, D. A. DeCenzo & M. Coulter. (2008). Fundamentals of management: essential concepts and applications. Upper Saddle River, NJ: Pearson Prentice Hall.
|
22 |
D. J. Kim, D. L. Ferrin & H. R. Rao. (2008). A Trust-based Consumer Decision-making Model in Electronic Commerce: The Role of Trust, Perceived Risk, and Their Antecedents. Decision Support Systems, 44(2), 544-564.
DOI
|
23 |
C. Yoon. (2011). Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model. Journal of Business Ethics, 100(3), 405-417.
DOI
|
24 |
O. E. Williamson. (1980). The organization of work a comparative institutional assessment. Journal of Economic Behavior and Organization, 1(1), 5-38.
DOI
|
25 |
J. R. Rest. (1986). Moral Development: Advances in Research and Theory. New York.
|
26 |
M. Weber. (1947). Legitimate authority and bureaucracy. The theory of social and economic organisation, 328-340.
|
27 |
O. C. Ferrell & L. G. Gresham. (1985). A Contingency Framework for Understanding Ethical Decision Making in Marketing. Journal of Marketing, 49, 87-96.
DOI
|
28 |
K. E. Pearlson & C. Saunders. (2009). Managing and using information systems. New York, NY: Wiley.
|
29 |
C. Hill. (1990). Cooperation, Opportunism, and the Invisible Hand: Implications for Transaction Cost Theory. Academy of Management Review, 15(3), 500-513.
DOI
|
30 |
S. W. Kelley, S. J. Skinner & O. C. Ferrell. (1989). Opportunistic behavior in marketing research organizations. Journal of Business Research, 18(4), 327-340.
DOI
|
31 |
O. C. Ferrell & S. J. Skinner. (1988). Ethical behavior and bureaucratic structure in marketing research organizations. Journal of Marketing Research, 25(1), 103-109.
DOI
|
32 |
J. J. Kish-Gephart, D. A. Harrison & L. K. Trevino. (2010). Bad apples, bad cases, and bad barrels: Meta-analytic evidence about sources of unethical decisions at work. Journal of applied psychology, 95(1), 1-31.
DOI
|
33 |
P. R. Nayyar. (1993). Performance effects of information asymmetry and economies of scope in diversified service firms. Academy of Management Journal, 36(1), 28-57.
DOI
|
34 |
M. J. O'Fallon & K. D. Butterfield. (2005). A review of the empirical ethical decision-making literature: 1996-2003. Journal of Business Ethics, 59(4), 375-413.
DOI
|
35 |
T. M. Jones. (1991). Ethical decision making by individuals in organizations: An issue-contingent model, Academy of management review, 16(2), 366-395.
DOI
|
36 |
G. Clarkson, T. E. Jacobsen & A. L. Batcheller. (2007). Information asymmetry and information sharing. Government Information Quarterly, 24(4), 827-839.
DOI
|
37 |
S. Kulkarni. (2000). Environmental ethics and information asymmetry among organizational stakeholders. Journal of Business Ethics, 27(4), 215-228.
DOI
|
38 |
S. D. Williamson. (1986). Costly monitoring, financial intermediation, and equilibrium credit rationing. Journal of Monetary Economics, 18(2), 159-179.
DOI
|