1,284
Views
25
CrossRef citations to date
0
Altmetric
Original Articles

Understanding the Drivers of Unethical Programming Behavior: The Inappropriate Reuse of Internet-Accessible Code

References

  • Ajzen, I. The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 2 (1991), 179–211.
  • Ajzen, I. Constructing a theory of planned behavior questionnaire: Conceptual and methodological considerations, 2002 ( available at http://people.umass.edu/aizen/pdf/tpb.measurement.pdf).
  • Amabile, T.M. The social psychology of creativity: A componential conceptualization. Journal of Personality and Social Psychology, 45, 2 (1983), 357.
  • Anderson, J.C., and Gerbing, D.W. Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103, 3 (1998), 411–423.
  • Anderson, R.E.; Johnson, D.G.; Gotterbarn, D.; and Perrolle, J. Using the new ACM code of ethics in decision making. Communications of the ACM, 36, 2 (1993), 98–107.
  • Armstrong, J.S., and Overton, T.S. Estimating nonresponse bias in mail surveys. Journal of Marketing Research, 14, 3 (1977), 396–402.
  • Austin, R.D. The effects of time pressure on quality in software development. Information Systems Research, 12, 2 (2001), 195–207.
  • Banerjee, D.; Cronan, T.P.; and Jones, T.W. Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22, 1 (1998), 31–60.
  • Beck, L., and Ajzen, I. Predicting dishonest actions using the theory of planned behavior. Journal of Research in Personality, 25, 3 (1991), 285–301.
  • Berenbach, B., and Broy, M. Professional and ethical dilemmas in software engineering. Computer, 42, 1 (2009), 74–80.
  • Boudreau, M.-C.; Gefen, D.; and Straub, D.W. Validation in information systems research: A state-of-the-art assessment. MIS Quarterly, 25, 1 (2001), 1–16.
  • Brooks, F.P. The Mythical Man-Month: Essays on Software Engineering. Reading, MA: Addison-Wesley, 1975.
  • Buchan, H.F. Ethical decision making in the public accounting profession: An extension of Ajzen’s theory of planned behavior. Journal of Business Ethics, 61, 2 (2005), 165–181.
  • Bulgurcu, B.; Cavusoglu, H.; and Benbasat, I. Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34, 3 (2010), 523–548.
  • Chen, Y.; Ramamurthy, K.; and Wen, K.-W. Organizations’ information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, 29, 3 (2012), 157–188.
  • Chin, W.W. The partial least squares approach to structural equation modeling. In G.A. Marcoulides (ed.), Modern Methods for Business Research. Mahwah, NJ: Lawrence Erlbaum, 1998, pp. 295–358.
  • Chin, W.W.; Thatcher, J.B.; Wright, R.T.; and Steel, D. Controlling for common method variance in PLS analysis: The measured latent marker variable approach. In H. Abdi, W.W. Chin, V. Esposito Vinzi, G. Russolillo, and L. Trinchera (eds.), New Perspectives in Partial Least Squares and Related Methods. New York: Springer, 2013, pp. 231–239.
  • Couper, M.P. Web surveys: A review of issues and approaches. Public Opinion Quarterly, 64, 4 (2000), 464–494.
  • Coyle, J.R.; Gould, S.J.; Gupta, P.; and Gupta, R. “To buy or to priate”: The matrix of music consumers’ acquisition-mode decision-making. Journal of Business Research, 62, 10 (2009), 1031–1037.
  • Cronan, T.P., and Al-Rafee, S. Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78, 4 (2008), 527–545.
  • Ehrlich, I. Participation in illegitimate activities: A theoretical and empirical investigation. Journal of Political Economy, 81, 3 (1973), 521–565.
  • Ershov, A.P. Aesthetics and the human factor in programming. Communications of the ACM, 15, 7 (1972), 501–505.
  • Fishburn, P. Utility Theory for Decision Making. New York: John Wiley & Sons, 1970.
  • Flannery, B.L., and May, D.R. Environmental ethical decision making in the U.S. metal-finishing industry. Academy of Management Journal, 43, 4 (2000), 642–662.
  • Frakes, W.B., and Kang, K. Software reuse research: Status and future. IEEE Transactions of Software Engineering, 31, 7 (2005), 529—536
  • Fredrickson, J.W. An exploratory approach to measuring the perceptions of strategic decision process constructs. Strategic Management Journal, 7, 5 (1986), 473–483.
  • Gino, F., and Ariely, D. The dark side of creativity: Original thinkers can be more dishonest. Journal of Personality and Social Psychology, 102, 3 (2012), 445–459.
  • Gino, F.; Ayal, S.; and Ariely, D. Contagion and differentiation in unethical behavior: The effect of one bad apple on the barrel. Psychological Science, 20, 3 (2009), 393–398.
  • Gotterbarn, D., and Miller, K.W. Unmasking your software’s ethical risks. IEEE Software, 27, 1 (2010), 12–13.
  • Haefliger, S.; von Krogh, G.; and Spaeth, S. Code reuse in open source software. Management Science, 54, 1 (2008), 180–193.
  • Harrington, S.J. The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions. MIS Quarterly, 20, 3 (1996), 257–278.
  • Henkel, J. Champions of revealing—The role of open source developers in commercial firms. Industrial and Corporate Change, 18, 3 (2009), 435–471.
  • Henseler, J.; Ringle, C.M.; and Sinkovics, R. The use of partial least squares modeling in international marketing. Advances in International Marketing, 20 (2009), 277–320.
  • Hunt, S.D., and Vitell, S. A general theory of marketing ethics. Journal of Macromarketing, 6, 1 (1986), 5–16.
  • Jones, M.R., and Karsten, H. Giddens’s structuration theory and information systems research. MIS Quarterly, 32, 1 (2008), 127–157.
  • Jöreskog, K.G., and Wold, H. The ML and PLS Technique for Modelling with Latent Variables: Historical and Comparative Aspects. Amsterdam: North-Holland, 1982.
  • Kaptein, M., and Schwartz, M. The effectiveness of business codes: A critical examination of existing studies and the development of an integrated research model. Journal of Business Ethics, 77, 2 (2008), 111–127.
  • Kim, Y.E., and Stohr, E.A. Software reuse: Survey and research directions. Journal of Management Information Systems, 14, 4 (1998), 113–147.
  • Knuth, D.E. Computer programming as an art. Communications of the ACM, 17, 12 (1974), 667–673.
  • Kohlberg, L. The Philosophy of Moral Development. San Francisco: Harper & Row, 1981.
  • Kohlberg, L. The Psychology of Moral Development. San Francisco: Harper & Row, 1984.
  • Krueger, C.W. Software reuse. ACM Computer Surveys, 24, 2 (1992), 131–183.
  • Kurland, N. Ethical intentions and the theories of reasoned action and planned behavior. Journal of Applied Social Psychology, 25, 4 (1995), 297–313.
  • Levi, S.D., and Woodard, A. Open source software: How to use it and control it in the corporate environment. Computer & Internet Lawyer, 21, 8 (2004), 8–13.
  • Lim, W.C. Effects of reuse on quality, productivity, and economics. IEEE Software, 11, 5 (1994), 23–28.
  • Limayem, M., and Hirt, S.G. Force of habit and information systems usage: Theory and initial validation. Journal of the AIS, 4 (2003), 65–97.
  • Markus, M.L. Towards a theory of knowledge reuse: Types of knowledge reuse situations and factors in reuse success. Journal of Management Information Systems, 18, 1 (2001), 57–93.
  • Martin, K., and Cullen, J. Continuities and extensions of ethical climate theory: A meta-analytic review. Journal of Business Ethics, 69, 2 (2006), 175–194.
  • Mason, R.O. Four ethical issues of the information age. MIS Quarterly, 10, 1 (1986), 5–12.
  • Mayring, P. Qualitative content analysis. In U. Flick, E; von Kardoff, E., and I. Steinke (eds.), A Companion to Qualitative Research. London: Sage, 2004, pp. 266–269.
  • Mazar, N., Amir, O., and Ariely, D. The dishonesty of honest people: A theory of self-concept maintenance. Journal of Marketing Research, 45, 6 (2008), 633–644.
  • McGhee, D.D. Free and open source software licenses: Benefits, risks, and steps toward ensuring compliance. Intellectual Property & Technology Law Journal, 19, 11 (2007), 5–9.
  • Mingers, J., and Walsham, G. Toward ethical information systems: The contribution of discourse ethics. MIS Quarterly, 34, 4 (2010), 833–854.
  • Moores, T.T., and Chang, J.C.J. Ethical decision making in software piracy: Initial development and test of a four-component model. MIS Quarterly, 30, 1 (2006), 167–180.
  • Orlikowski, W.J., and Barley, S.R. Technology and institutions: What can research on information technology and research on organizations learn from each other? MIS Quarterly, 25, 2 (2001), 145–165.
  • Peace, A.G.; Galletta, D.F.; and Thong, J.Y.L. Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20, 1 (2003), 153–177.
  • Pierce, M.A., and Henry, J.W. Judgements about computer ethics: Do individual, co-worker, and company judgements differ? Do company codes make a difference. Journal of Business Ethics, 28, 4 (2000), 307–322.
  • Podsakoff, P.M.; MacKenzie, S.B.; Lee, J.-Y.; and Podsakoff, N.P. Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 5 (2003), 879–903.
  • Ringle, C.M.; Sarstedt, M.; and Mooi, E.A. Response-based segmentation using FIMIX-PLS: Theoretical foundations and an application to American customer satisfaction index data. In R. Stahlbock, S.F. Crone, and S. Lessmann (eds.), Annals of Information Systems, vol. 8. Special issue. Berlin: Springer, 2010, pp. 19–49.
  • Ringle, C.M.; Wende, S.; and Will, S. SmartPLS 2.0 (M3). Hamburg: SmartPLS, 2005 ( available online www.smartpls.de).
  • Rosen, L. Open Source Licensing: Software Freedom and Intellectual Property Law. Englewood Cliffs, NJ: Prentice-Hall, 2004.
  • Ruffin, C., and Ebert, C. Using open source software in product development: A primer. IEEE Software, 21, 1 (2004), 82–86.
  • Schoemaker, P.J.H. The expected utility model: Its variants, purposes, evidence and limitations. Journal of Economic Literature, 20, 2 (1982), 529–563.
  • Schweitzer, M., and Hsee, C. Stretching the truth: Elastic justification and motivated communication of uncertain information. Journal of Risk and Uncertainty, 25, 2 (2002), 185–201.
  • Shalley, C.E.; Zhou, J.; and Oldham, G.R. The effects of personal and contextual characteristics on creativity: Where should we go from here? Journal of Management, 30, 6 (2004), 933–958.
  • Sojer, M., and Henkel, J. Code reuse in open source software development: Quantitative evidence, drivers, and impediments. Journal of the AIS, 11, 12 (2010).
  • Sojer, M., and Henkel, J. License risks from ad-hoc reuse of code from the Internet: An empirical investigation. Communications of the ACM, 54, 12 (2011), 74–81.
  • Strahan, R., and Gerbasi, K.C. Short, homogeneous versions of the Marlow-Crowne Social Desirability Scale. Journal of Clinical Psychology, 28, 2 (1972), 191–193.
  • Straub, D.W. Effective IS security: An Empirical Study. Information Systems Research, 1, 3 (1990), 255–276.
  • Straub, D.W., and Collins, R.W. Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy. MIS Quarterly, 14, 2 (1990), 143–156.
  • Tetlock, P.E. Accountability: The neglected social context of judgement and choice. In L.L. Cummings and B.M. Staw (eds.), Research in Organizational Behavior. Greenwich, CT: JAI Press, 1985, pp. 297–332.
  • Thong, J.Y.L., and Yap, C.-S. Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15, 1 (1998), 213–237.
  • Thornton, D.; Gunningham, N.A.; and Kagan, R.A. General deterrence and corporate environmental behavior. Law & Policy, 27, 2 (2005), 262–288.
  • Tittle, C.R. Sanctions and Social Deviance: The Question of Deterrence. New York: Praeger, 1980.
  • Trevino, L. Ethical decision making in organizations: A person-situation interactionist model. Academy of Management Review, 11, 3 (1986), 601–617.
  • Vance, A.; Lowry, P.B.; and Eggett, D. Using accountability to reduce access policy violations in information systems. Journal of Management Information Systems, 29, 4 (2013), 263–290.
  • VanSandt, C.V.; Shepard, J.M.; and Zappe, S.M. An examination of the relationship between ethical work climate and moral awareness. Journal of Business Ethics, 68, 4 (2006), 409–432.
  • Venkatesh, V.; Morris, M.G.; Davis, G.B.; and Davis, F.D. User acceptance of information technology: Toward a unified view. MIS Quarterly, 27, 3 (2003), 425–478.
  • Victor, B., and Cullen, J.B. A theory and measure of ethical climate in organizations. In W.C. Frederick and L.E. Preston (eds.), Research in Corporate Social Performance and Policy, Greenwich, CT: JAI Press, 1987, pp. 51–71.
  • Victor, B., and Cullen, J.B. The organizational bases of ethical work climates. Administrative Science Quarterly, 33, 1 (1988), 101–125.
  • Wyld, D.C., and Jones, C.A. The importance of context: The ethical work climate construct and models of ethical decision making—An agenda for research. Journal of Business Ethics, 16, 4 (1997), 465–472.
  • Yoon, C. Digital piracy intention: A comparison of theoretical models. Behaviour & Information Technology, 31, 6 (2012), 565–576.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.