2,839
Views
32
CrossRef citations to date
0
Altmetric
Articles

Where do consumers draw the line? Factors informing perceptions and justifications of deviant consumer behaviour

, , &
Pages 750-776 | Received 01 Jan 2015, Accepted 09 Dec 2015, Published online: 20 Jan 2016

References

  • Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30, 47–88. doi:10.1111/j.1745-9125.1992.tb01093.x
  • Akers, R. L., & Sellers, C. S. (2004). Criminological theories: Introduction, evaluation, and application. Los Angeles, CA: L Roxbury Publishing.
  • Amine, A., & Gicquel, Y. (2011). Rethinking resistance and anti-consumption behaviours in the light of the concept of deviance. European Journal of Marketing, 45(11/12), 1809–1819. doi:10.1108/03090561111167450
  • Aquino, K., & Reed, A. I. (2002). The self-importance of moral identity. Journal of Personality and Social Psychology, 83, 1423–1440. doi:10.1037/0022-3514.83.6.1423
  • Bandura, A. (1991a). Social cognitive theory of self-regulation. Organizational Behavior and Human Decision Processes, 50(2), 248–287. doi:10.1016/0749-5978(91)90022-L
  • Bandura, A. (1991b). Social cognitive theory of moral thought and action. In W. M. Kurtines & J. L. Gewirtz (Eds.), Handbook of moral behaviour and development: Vol. 1 theory (pp. 45–104). Hillsdale, NJ: Erlbaum.
  • Bandura, A. (1999). Moral disengagement in the perpetration of inhumanities. Personality and Social Psychology Review, 3(3), 193–209. doi:10.1207/s15327957pspr0303_3
  • Blasi, A. (1984). Moral identity: Its role in moral functioning. In W. Kurtines & J. Gewirtz (Eds.), Morality, moral behaviour and moral development (pp. 128–139). New York, NY: Wiley.
  • Bonner, S., & O’Higgins, E. (2010). Music piracy: Ethical perspectives. Management Decisions, 48(9), 1341–1354.
  • Cialdini, R. B. (1988). Influence. New York, NY: HarperCollins.
  • Cialdini, R. B., Cacioppo, J. T., Bassett, R., & Miller, J. A. (1978). Low-ball procedure for producing compliance: Commitment then cost. Journal of Personality and Social Psychology, 36(5), 463–476. doi:10.1037/0022-3514.36.5.463
  • Cialdini, R. B., Demaine, L. J., Sagarin, B. J., Barrett, D. W., Rhoads, K., & Winter, P. L. (2006). Managing social norms for persuasive impact. Social Influence, 1(1), 3–15. doi:10.1080/15534510500181459
  • Coleman, J. W. (1994). Neutralization theory: An empirical application and assessment. ( PhD thesis). Oklahoma State University, Stillwater, OK.
  • Cooter, R. D. (2000). Three effects of social norms on law: Expression, deterrence, and internalisation. Oregon Law Review, 79(1), 1–22. Retrieved from EBSCOhost, Accession number 502335054.
  • Cromwell, P., & Thurman, Q. (2003). The devil made me do it: Use of neutralizations by shoplifters. Deviant Behavior, 24(6), 535–550. doi:10.1080/713840271
  • Daunt, K. L., & Harris, L. C. (2012). Motives of dysfunctional customer behavior: An empirical study. Journal of Services Marketing, 26(4), 293–308. doi:10.1108/08876041211237587
  • Davis, M. A., Johnson, N. B., & Ohmer, D. G. (1998). Issue-contingent effects on ethical decision-making: A cross-cultural comparison. Journal of Business Ethics, 17, 373–389. doi:10.1023/A:1005760606745
  • Festinger, L. (1954). A theory of social comparison processes. Human Relations, 7(2), 117–140. doi:10.1177/001872675400700202
  • Festinger, L. (1957). A theory of cognitive dissonance. Stanford, CA: Stanford University Press.
  • Fincher, S., & Tenenberg, J. (2005). Making sense of card sorting data. Expert Systems, 22(3), 89–93. doi:10.1111/j.1468-0394.2005.00299.x
  • Freeman, J., Liossis, P., & David, N. (2006). Deterrence, defiance and deviance: An investigation into a group of recidivist drink drivers’ self-reported offending behaviours. Australian & New Zealand Journal of Criminology, 39(1), 1–19. doi:10.1375/acri.39.1.1
  • Freestone, O., & Mitchell, V. W. (2004). Generation Y attitudes towards E-ethics and internet-related misbehaviours. Journal of Business Ethics, 54, 121–128. doi:10.1007/s10551-004-1571-0
  • Fullerton, R. A., & Punj, G. (1993). Choosing to misbehave: A structural model of aberrant consumer behavior. Advances in Consumer Research, 20, 570–574. Retrieved from EBSCOhost, Accession number 83386346.
  • Fullerton, R. A., & Punj, G. (1997). Can consumer misbehavior be controlled? A critical analysis of two major control techniques. Advances in Consumer Research, 24, 340–344. Retrieved from EBSCOhost, Accession number 83112735.
  • Fullerton, R. A., & Punj, G. (2004). Repercussions of promoting an ideology of consumption: Consumer misbehavior. Journal of Business Research, 57, 1239–1249. doi:10.1016/S0148-2963(02)00455-1
  • Fullerton, S., Neale, L., & Dootson, P. (2014). Consumer misbehaviour: A concurrent look at the impact that the size of the victim and size of the loss have on opinions regarding the acceptance or unacceptance of 12 questionable consumer actions. In R. VanMeter & J. Weiser Eds., Society for marketing advances conference (pp. 19–26). New Orleans, LA: Society for Marketing Advances. Retrieved from http://c.ymcdn.com/sites/www.marketingadvances.org/resource/resmgr/2014_SMA_Proceedings.pdf
  • Genereux, R. L., & McLeod, B. A. (1995). Circumstances surrounding cheating: A questionnaire study of college students. Research in Higher Education, 36(6), 687–704. doi:10.1007/BF02208251
  • Gerber, A. S., & Rogers, T. (2009). Descriptive social norms and motivation to vote: Everybody’s voting and so should you. The Journal of Politics, 71(1), 178–191. doi:10.1017/S0022381608090117
  • Goldstein, N. J., Cialdini, R. B., & Griskevicius, V. (2008). A room with a viewpoint: Using social norms to motivate environmental conservation in hotels. Journal of Consumer Research, 35, 472–482. doi:10.1086/586910
  • Grasmick, H. G., & Green, D. E. (1980). Legal punishment, social disapproval and internalization as inhibitors of illegal behavior. The Journal of Criminal Law and Criminology, 71(3), 325–335. doi:10.2307/1142704
  • Gregoire, Y., & Fisher, R. J. (2007). Customer betrayal and retaliation: When your best customers become your worst enemies. Journal of the Academy of Marketing Sciences, 36, 247–261. doi:10.1007/s11747-007-0054-0
  • Harris, L. C., & Daunt, K. L. (2011). Deviant customer behaviour: A study of techniques of neutralisation. Journal of Marketing Management, 27(7–8), 834–853. doi:10.1080/0267257X.2010.498149
  • Harris, L. C., & Dumas, A. (2009). Online consumer misbehaviour: An application of neutralization theory. Marketing Theory, 9(4), 379–402. doi:10.1177/1470593109346895
  • Henry, S. (1990). Degrees of deviance, student accounts of their deviant behavior. Salem, WI: Sheffield Publishing.
  • Henry, S., & Eaton, R. (1989). Degrees of deviance: Student accounts of their deviant behaviour. Salem, WI: Sheffield.
  • Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9, 187–204. doi:10.1007/s10676-007-9143-5
  • Hunt, S. D., & Vitell, S. (1986). A general theory of marketing ethics. Journal of Macromarketing, 6(1), 5–16. doi:10.1177/027614678600600103
  • Jager, C. (2013). Shoplifting is costing you $290 a year. Retrieved January 23, 2014, from http://www.lifehacker.com.au/2013/11/shoplifting-is-costing-you-290-a-year/
  • Jenni, K. E., & Loewenstein, G. (1997). Explaining the ‘Identifiable Victim Effect’. Journal of Risk and Uncertainty, 14, 235–257. doi:10.1023/A:1007740225484
  • Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. The Academy of Management Review, 16(2), 366–395. doi:10.5465/AMR.1991.4278958
  • Kant, I. (2002). Groundwork for the metaphysics of morals. (A. W. Wood, Trans.). (Original work published 1785). Binghamton, NY: Vail-Ballou Press.
  • Kelly, G. (1955). The psychology of personal constructs. New York, NY: W.W. Norton.
  • Klockers, C. B. (1974). The professional fence. New York, NY: Free Press.
  • Lin, B., Hastings, D. A., & Martin, C. (1994). Shoplifting in retail clothing outlets. International Journal of Retail & Distribution Management, 22(7), 24–29. doi:10.1108/09590559410069909
  • Mazar, N., Amir, O., & Ariely, D. (2008). The dishonesty of honest people: A theory of self-concept maintenance. Journal of Marketing Research, 45, 633–644. doi:10.1509/jmkr.45.6.633
  • McGregor, S. L. T. (2008). Conceptualizing immoral and unethical consumption using neutralization theory. Family and Consumer Sciences Research Journal, 36(3), 261–276. doi:10.1177/1077727X07312190
  • McMahon, J. M., & Cohen, R. (2009). Lost in cyberspace: Ethical decision making in the online environment. Ethics and Information Technology, 11, 1–17. doi:10.1007/s10676-008-9165-7
  • Merritt, A. C., Effron, D. A., & Monin, B. (2010). Moral self-licensing: When being good frees us to be bad. Social and Personality Psychology Compass, 4(5), 344–357. doi:10.1111/j.1751-9004.2010.00263.x
  • Minor, W. W. (1981). Techniques of neutralization: A reconceptualization and empirical examination. Journal of Research in Crime and Delinquency, 18(2), 295–318. doi:10.1177/002242788101800206
  • Mitchell, V.-W., & Chan, J. K. L. (2002). Investigating UK consumers’ unethical attitudes and behaviours. Journal of Marketing Management, 18, 5–26. doi:10.1362/0267257022775873
  • Moore, D. A., & Loewenstein, G. (2004). Self-interest, automaticity, and the psychology of conflict of interest. Social Justice Research, 17(2), 189–202. doi:10.1023/B:SORE.0000027409.88372.b4
  • Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34, 173–195. doi:10.1177/0734016808325034
  • Moschis, G. P., & Cox, D. (1989). Deviant consumer behavior. Advances in Consumer Research, 16, 732–737. Retrieved from EBSCOhost Accession number 6487793.
  • Muncy, J. A., & Vitell, S. J. (1992). Consumer ethics: An investigation of the ethical beliefs of the final consumer. Journal of Business Research, 24, 297–311. doi:10.1016/0148-2963(92)90036-B
  • Nagin, D. S., & Pogarsky, G. (2001). Integrating celerity, impulsivity, and extralegal sanction threats into a model of general deterrence: Theory and evidence. Criminology, 39(4), 865–892. doi:10.1111/j.1745-9125.2001.tb00943.x
  • Neale, L., & Fullerton, S. (2010). The international search for ethics norms: Which consumer behaviors do consumers consider un(acceptable)? Journal of Services Marketing, 24(6), 476–486. doi:10.1108/08876041011072591
  • Pan, Y., & Sparks, J. R. (2012). Predictors, consequence, and measurement of ethical judgments: Review and meta-analysis. Journal of Business Research, 65, 84–91. doi:10.1016/j.jbusres.2011.02.002
  • Park, H. S., & Smith, S. W. (2007). Distinctiveness and influence of subjective norms, personal descriptive and injunctive norms, and societal descriptive and injunctive norms on behavioral intent: A case of two behaviors critical to organ donation. Human Communication Research, 33, 194–218. doi:10.1111/j.1468-2958.2007.00296.x
  • Reynolds, K. L., & Harris, L. C. (2009). Dysfunctional customer behavior severity: An empirical examination. Journal of Retailing, 85(3), 321–335. doi:10.1016/j.jretai.2009.05.005
  • Romer, D., & Hornik, R. (1992). HIV education for youth: The importance of social consensus in behaviour change. Aids Care, 4(3), 285–303. doi:10.1080/09540129208253100
  • Shu, L. L., Mazar, N., Gino, F., Ariely, D., & Bazerman, M. H. (2012). Signing at the beginning makes ethics salient and decreases dishonest self-reports in comparison to signing at the end. Proceedings of the National Academy of Sciences, 109(38), 15197–15200. doi:10.1073/pnas.1209746109
  • Sirgy, M. J. (1982). Self-concept in consumer behavior: A critical review. The Journal of Consumer Research, 9(3), 287–300. doi:10.1086/208924
  • Small, D. A., & Loewenstein, G. (2003). Helping a victim or helping the victim: Altruism and identifiability. The Journal of Risk and Uncertainty, 26(1), 5–16. doi:10.1023/A:1022299422219
  • Strutton, D., Vitell, S. J., & Pelton, L. E. (1994). How consumers may justify inappropriate behavior in market settings: An application on the techniques of neutralization. Journal of Business Research, 30, 253–260. doi:10.1016/0148-2963(94)90055-8
  • Sunstein, C. R. (2003). Terrorism and probability neglect. The Journal of Risk and Uncertainty, 26, 121–136. doi:10.1023/A:1024111006336
  • Sutherland, E. H. (1947). Principles of criminology (4th ed.). Philadelphia, PA: Lippincott.
  • Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670. Retrieved from http://www.jstor.org.ezp01.library.qut.edu.au/stable/2089195
  • Tenbrunsel, A. E., & Messick, D. M. (2004). Ethical fading: The role of self-deception in unethical behavior. Social Justice Research, 17(2), 223–236. doi:10.1023/B:SORE.0000027411.35832.53
  • Turner, B. A. (1981). Some practical aspects of qualitative data analysis: One way of organising the cognitive processes associated with the generation of grounded theory. Quality and Quantity, 15, 225–247. Retrieved from ProQuest Accession number 82M5460. doi:10.1007/BF00164639
  • Upchurch, L., Rugg, G., & Kitchenham, B. (2001). Using card sorts to elicit web page quality attributes. IEEE Software, 18, 84–89. doi:10.1109/MS.2001.936222
  • Vitell, S. (2003). Consumer ethics research: Review, synthesis and suggestions for the future. Journal of Business Ethics, 43(1/2), 33–47. doi:10.1023/A:1022907014295
  • Vitell, S. J., & Muncy, J. A. (2005). The Muncy-Vitell consumer ethics scale: A modification and application. Journal of Business Ethics, 62, 267–275. doi:10.1007/s10551-005-7058-9
  • Wilkes, R. E. (1978). Fraudulent behavior by consumers. Journal of Marketing, 42(4), 67–75. doi:10.2307/1250088
  • Worrall, J. L., Els, N., Piquero, A. R., & TenEyck, M. (2014). The moderating effects of informal social control in the sanctions-compliance nexus. American Journal of Criminal Justice, 39, 341–357. doi:10.1007/s12103-013-9211-9
  • Yi, Y., & Gong, T. (2008). The effects of customer justice perception and affect on customer citizenship behavior and customer dysfunctional behavior. Industrial Marketing Management, 37(7), 767–783. doi:10.1016/j.indmarman.2008.01.005
  • Zetter, K. (2014). Target got hacked hard in 2005. Here’s why they let it happen again. Retrieved January 17, 2014, from http://www.wired.com/threatlevel/2014/01/target-hack/
  • Zikmund, W., Ward, S., Lowe, B., Winzar, H., & Babin, B. J. (2011). Marketing research (2nd Asia Pacific ed.). Victoria: Cengage Learning.
  • Zyglidopoulos, S. C., Fleming, P. J., & Rothenberg, S. (2009). Rationalization, overcompensation and the escalation of corruption in organizations. Journal of Business Ethics, 84, 65–73. doi:10.1007/s10551-008-9685-4

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.