Semantic Filter
show all semantic filters
Found 5 articles
  • When Do Firms Crack Under Pressure? Legal Professionals, Negative Role Models, and Organizational Misconduct

    PDF

    2023 | Organization Science | Citations: 0

    Authors: Gonsalves, Leroy

    Abstract: Strain theory has long been invoked to explain organizational misconduct, with u ... Expand

    Semantic filters: general strain theory

    Topics: social media Slack decision making database system missing data

    Methods: longitudinal research descriptive statistic robustness check SEC EDGAR Compustat

    Theories: general strain theory

  • Volitional Non-Malicious Insider Threats: At The Intersection of COVID-19, WFH and Cloud-Facilitated Shadow-Apps

    2021 | Americas Conference on Information Systems | Citations: 0

    Authors: Akello, Patricia

    Abstract: In 2020, business operations were changed around the world due to disruptions o ... Expand

    Semantic filters: general strain theory

    Topics: insider threat cloud computing social norm pandemic organization structure

    Methods: structural equation modeling company material survey

    Theories: theory of planned behavior general strain theory

  • Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes

    PDF

    2021 | Information Systems Frontiers | Citations: 0

    Authors: Silic, Mario; Lowry, Paul Benjamin

    Abstract: What is happening in hacker’s minds when they are committing criminal activities ... Expand

    Semantic filters: general strain theory

    Topics: criminality decision making computer crime IT policy anonymity

    Methods: qualitative interview grounded theory theory development qualitative coding cluster analysis

    Theories: general strain theory activity theory

  • How Much is Too Much: Employee Monitoring, Surveillance, and Strain

    2019 | International Conference on Information Systems | Citations: 1

    Authors: Singh, Tripti; Johnston, Allen; Thatcher, Jason

    Abstract: To maintain security, organizations use increasingly sophisticated methods to mo ... Expand

    Semantic filters: general strain theory

    Topics: security policy privacy

    Methods: personal interview mixed method

    Theories: general strain theory

  • An Integrated Model on Computer Abuse: A Pilot Study

    2001 | Americas Conference on Information Systems | Citations: 1

    Authors: Lee, Sang-Jun; Nah, Fiona; Yoo, Sangjin

    Abstract: In spite of continuous organizational efforts and investments based on systemati ... Expand

    Semantic filters: general strain theory

    Topics: IT security threat missing data

    Methods: SEM tool path analysis statistical hypothesis test survey

    Theories: general strain theory general deterrence theory