1,055
Views
16
CrossRef citations to date
0
Altmetric
Original Articles

“THAT’S HOW THEY TAUGHT US TO DO IT”: Learned Deviance and Inadequate Deterrents in Retail Banking

&
Pages 603-616 | Received 09 Oct 2016, Accepted 10 Jan 2017, Published online: 28 Feb 2017

References

  • Akers, Ronald L. 2011. Social Learning and Social Structure: A General Theory of Crime and Deviance. New Brunswick, NJ: Transaction Publishers.
  • Akers, Ronald L., Marvin D. Krohn, Lonn Lanza-Kaduce, and Marcia Radosevich. 1979. “Social Learning and Deviant Behavior: A Specific Test of a General Theory.” American Sociological Review 44:636–655.
  • Akers, Ronald L. 1990. “Rational Choice, Deterrence, and Social Learning Theory in Criminology: The Path Not Taken.” The Journal of Criminal Law and Criminology 81:653–676.
  • Akers, Ronald L. and Gary F. Jensen. 2006. “The Empirical Status of Social Learning Theory of Crime and Deviance: The Past, Present, and Future.” Taking Stock: The Status of Criminological Theory 37–76.
  • Andrews, Don A., James Bonta, and J. Stephen Wormith. 2006. “The Recent Past and Near Future of Risk and/or Need Assessment.” Crime and Delinquency 52:7–27.
  • Bandura, Albert and Richard H. Walters. 1977. Social Learning Theory. New York, NY: General Learning Press.
  • Boss, Scott R., Laurie J. Kirsch, Ingo Angermeier, Raymond A. Shingler, and R. Wayne Boss. 2009. “If Someone is Watching, I’ll Do What I’m Asked: Mandatoriness, Control, and Information Security.” European Journal of Information Systems 18:151–164.
  • Braithwaite, John and Toni Makkai. 1991. “Testing an Expected Utility Model of Corporate Deterrence.” Law & Society Review 25:7–40.
  • Cao, Liqun. 2004. Major Criminological Theories: Concepts and Measurements. Belmont, CA: Wadsworth/Thomson Learning.
  • Charmaz, Kathy. 2006. Constructing Grounded Theory: A Practical Guide through Qualitative Analysis (Introducing Qualitative Methods Series). Thousand Oaks, CA: Sage Publications.
  • Cohn, Michael. 2012. “Informant Blew the Whistle on Price Fixing at ADM.” Retrieved from http://www.accountingtoday.com/blogs/debits-credits/informant-mark-whitacre-price-fixing-adm-acfe-63051-1.html.
  • Corbin, Juliet and Anselm Strauss. 2008. Basics of Qualitative Research. Newbury Park, CA: Sage Publications.
  • Cornish, Derek and Ronald Clarke. 1986. The Reasoning Criminal. New York, NY: Springer-Verlag.
  • Crabtree, Benjamin F. and William L. Miller. 1999. Doing Qualitative Research. Thousand Oaks, CA: Sage Publications.
  • Cullen, Francis, William Maakestad, and Gray Cavender. 2006. Corporate Crime under Attack: The Ford Pinto Case. Cincinnati, OH: Anderson.
  • Cullen, Francis T., John Wright, and Kristie Blevins. 2011. Taking Stock: The Status of Criminological Theory. New Brunswick, NJ: Transaction Publishers.
  • Dabney, Dean. 2010. “Neutralization and Deviance in the Workplace: Theft of Supplies and Medicines by Hospital Nurses.” in Their Own Words: Criminals on Crime, edited by Paul F. Cromwell, 5th ed. New York, NY: Oxford University Press.
  • D’Arcy, John, Anat Hovav, and Dennis Galletta. 2009. “User Awareness of security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach.” Information Systems Research 20:79–98.
  • Egan, Matt. 2016. “5,300 Wells Fargo Employees Fired over 2 Million Phony Accounts CNN Money.” Retrieved from http://money.cnn.com/2016/09/08/investing/wells-fargo-created-phony-accounts-bank-fees/.
  • Engdahl, Oskar. 2009. “Barriers and Back Regions as Opportunity Structures for White-Collar Crime.” Deviant Behavior 30:115–143.
  • Engdahl, Oskar. 2014. “Ensuring Regulatory Compliance in Banking and Finance through Effective Controls: The Principle of Duality in the Segregation of Duties.” Regulation & Governance, 8:332–349.
  • Federal Trade Commission. 2013. “Consumer Sentinel Network Data Book.” Retrieved from www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-januarydecember-2013/sentinel-cy2013.pdf.
  • Frailing, Kelly and Dee Wood Harper. 2013. Fundamentals of Criminology: New Dimensions. Durham, NC: Carolina Academic Press.
  • Gendreau, Paul, Claire E. Goggin, and Moira A. Law. 1997. “Predicting Prison Misconducts.” Criminal Justice and Behavior 24:414–431.
  • Gottschalk, P. and Maria Tcherni-Buzzeo. 2017. “Reasons for Gaps in Crime Reporting: The Case of White-Collar Criminals Investigated by Private Fraud Examiners in Norway.” Deviant Behavior 38:1–15.
  • Gottschalk, Petter. 2016. “Convenience in White-Collar Crime: Introducing a Core Concept.” Deviant Behavior 1–15. doi:10.1080/01639625.2016.1197585
  • Grasmick, Harold G. and Emiko Kobayashi. 2002. “Workplace Deviance in Japan: Applying an Extended Model of Deterrence.” Deviant Behavior 23:21–43.
  • Herath, Tejaswini and H. Raghav Rao. 2009a. “Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness.” Decision Support Systems 47:154–165.
  • Herath, Tejaswini and H. Raghav Rao. 2009b. “Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations.” European Journal of Information Systems 18:106–125.
  • Hu, Qing, Zhengchuan Xu, Tamara Dinev, and Hong Ling. 2011. “Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?” Communications of the ACM 54:54–60.
  • Huff, Rodney, Christian Desilets, and John Kane. 2010. The 2010 National Public Survey on White Collar Crime. Fairmont, WV: National White Collar Crime Center.
  • Kobayashi, Emiko and Harold R. Kerbo. 2016. “The Deterrent Effects of Punishments for Noncompliance and Rewards for Compliance: A Comparison of Hospital Employees in Japan and the United States.” Deviant Behavior 37:1–18.
  • Krefting, Laura. 1991. “Rigor in Qualitative Research: The Assessment of Trustworthiness.” Journal of Occupational Therapy 45:214–22.
  • Leasure, Peter. 2016a. “Neutralizations in Retail Banking: A Qualitative Analysis.” Deviant Behavior 1–13. doi:10.1080/01639625.2016.1197018
  • Leasure, Peter. 2016b. “General Strain and Procedural Justice in Retail Banking: A Qualitative Case Study with a Multi-Theoretical Approach to Improving Compliance Policy.” Journal of Financial Crime 23:588–604.
  • Lipsey, Mark W. and James H. Derzon. 1998. “Predictors of Violent or Serious Delinquency in Adolescence and Early Adulthood: A Synthesis of Longitudinal Research.” pp. 86–105 in From Serious and Violent Juvenile Offenders: Risk Factors and Successful Interventions edited by R. Loeber, and D.P. Farrington. Thousand Oaks, CA: Sage.
  • Makkai, Toni and John Braithwaite. 1994. “The Dialectics of Corporate Deterrence.” Journal of Research in Crime and Delinquency 31:347–73.
  • McCoy, Kevin. 2012. “HSBC Will Pay $1.9 Billion for Money Laundering.” USA Today. Retrieved from http://www.usatoday.com/story/money/business/2012/12/11/hsbc-laundering-probe/1760351/.
  • Ouchi, William G. and Mary Ann Maguire. 1975. “Organizational Control: Two Functions.” Administrative Science Quarterly 20:559–569.
  • Paternoster, Raymond and Sally Simpson. 1996. “Sanction Threats and Appeals to Morality: Testing a Rational Choice Model of Corporate Crime.” Law and Society Review 30:549–584.
  • Patton, Michael. 1990. Qualitative Evaluation and Research Methods. Newbury Park, CA: Sage.
  • Pratt, Travis C. and Francis T. Cullen. 2000. “The Empirical Status of Gottfredson and Hirschi’s General Theory of Crime: A Meta‐Analysis.” Criminology 38:931–964.
  • Simpson, Sally and Christopher Koper. 1992. “Deterring Corporate Crime.” Criminology 30:347–376.
  • Sitren, Alicia H. and Brandon K. Applegate. 2007. “Testing the Deterrent Effects of Personal and Vicarious Experience with Punishment and Punishment Avoidance.” Deviant Behavior 28:29–55.
  • Son, Jai-Yeol. 2011. “Out of Fear or Desire? Toward a Better Understanding of Employees’ Motivation to Follow IS Security Policies.” Information and Management 48:296–302.
  • Stafford, Mark C. and Mark Warr. 1993. “A Reconceptualization of General and Specific Deterrence.” Journal of Research in Crime and Delinquency 30:123–135.
  • Stake, Robert E. 1995. The Art of Case Study Research. Thousand Oaks, CA: Sage.
  • Sutherland, Edwin. 1947. “A Theory of Crime: Differential Association.” Crime: Readings 1:170–172.
  • Sutherland, Edwin. 1983. White Collar Crime: The Uncut Version. New Haven, CT: Yale University Press.
  • Vance, Anthony and Mikko T. Siponen. 2013. “IS Security Policy Violations: A Rational Choice Perspective.” Journal of Organizational and End User Computing 24:21–41.
  • Warr, Mark. 2002. Companions in Crime: The Social Aspects of Criminal Conduct. New York, NY: Cambridge University Press.
  • Weisburd, David, Stanton Wheeler, Elin Waring, and Nancy Bode. 1994. Crimes of the Middle Classes: White-Collar Offenders in the Federal Courts. New Haven, CT: Yale University Press.
  • Yin, Robert. 2003. Case Study Research: Design and Methods. Thousand Oaks, CA: Sage.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.