69
Views
9
CrossRef citations to date
0
Altmetric
Original Articles

The Effect of Moral Intensity on it Employees' Bad News Reporting

, &

References

  • Parnas, D.L., van Schouwen, A.J., and Kwan, S.P. “Evaluation of safety critical software,” Communications of the ACM 33(6). 1990, 636–648.
  • Goedecke, D. The role of the software practitioner in the development of public safety software-intensive systems, Australian Computer Society, Inc., 2007, 13–19.
  • Leveson, N. Safeware - System Safety and Computers: A Guide to Preventing Accidents and Losses Caused By Technology, Addison Wesley, Boston, MA, 1995.
  • Kopec, D., and Tamang, S. “Failures in complex systems: Case studies, causes, and possible remedies,” ACM SIGCSE Bulletin 39(2), 2007, 180–184.
  • Robey, D., and Keil, M. “Blowing the whistle on troubled software projects.” Communications of the ACM 44(4), 2001, 87–93.
  • Keil, M., Tiwana, A., Sainsbury, R., and Sneha, S. “Toward a theory of whistleblowing intentions: A benefit-to-cost differential perspective,” Decision Sciences 41(4), 2010, 787–812.
  • Park, C., and Keil, M. “Organizational silence and whistleblowing on IT projects: An integrated model,” Decision Sciences 40(4), 2009, 901–918.
  • Park, C., Keil, M., and Kim, J.W. “The effect of IT failure impact and personal morality on IT project reporting behavior,” IEEE Transactions on Engineering Management 56(1), 2009, 45–60.
  • Smith, H.J., and Keil, M. “The reluctance to report bad news on troubled software projects: A theoretical model,” Information Systems Journal 13(1), 2003, 69–95.
  • Singer, M., Mitchell, S., and Turner, J. “Consideration of moral intensity in ethicality judgments: Its relationship with whistle-blowing and need-for-cognition,” Journal of Business Ethics 17(5), 1998, 527–541.
  • Henik, E. “Ethical decision-making in the domain of whistleblowing: How issue characteristics affect judgments and intentions,” Working Paper Series, Center for Responsible Business, UC Berkeley, 2005.
  • Rosen, S., and Tesser, A. “On reluctance to communicate undesirable information: The MUM effect.” Sociometry 33(3), 1970, 253–263.
  • Tesser, A., Rosen, S., and Tesser, M. “On the reluctance to communicate undesirable messages (the MUM effect): A field study,” Psychological Reports 29(2), 1971, 651–654.
  • Keil, M., Im, G.P., and Mähring, M. “Reporting bad news on software projects: The effects of culturally constituted views of face-saving,” Information Systems Journal 17:(1), 2007, 59–87.
  • Keil, M., Smith, H.J., Pawlowski, S., and Jin, L. “‘Why didn't somebody tell me?: Climate, information asymmetry, and bad news about troubled projects,” ACM SIGMIS Database 35(2). 2004, 65–84.
  • Park, C., Im, G., and Keil, M. “Overcoming the mum effect in IT project reporting: Impacts of fault responsibility and time urgency,” Journal of the Association for Information Systems 9(7), 2008, Article 17, Available at: http://aisel.aisnet.org/jais/vo19/iss7/17
  • Smith, H.J., Keil, M., and Depledge, G. “Keeping mum as the project goes under: Toward an explanatory model,” Journal of Management Information Systems 18(2), 2001, 189–227.
  • Miceli, M.P., and Near, J.P. Blowing the whistle: The organizational and legal implications for companies and employees, Lexington Books, New York, NY, 1992.
  • Morrison, E.W., and Milliken, F.J. “Organizational silence: A barrier to change and development in a pluralistic world,” Academy of Management Review 25(4), 2000, 706–725.
  • Zhao, B., and Olivera, F. “Error reporting in organizations,” Academy of Management Review 31(4), 2006. 1012–1030.
  • Keil, M., and Park, C.W. “Bad news reporting on troubled IT projects: Reassessing the mediating role of responsibility in the basic whistleblowing model,” Journal of Systems and Software 83(11), 2010, 2305–2316.
  • Keil, M., and Robey, D. “Blowing the whistle on troubled software projects,” Communications of the ACM 44(4), 2001, 87–93.
  • Tan, B.C.Y., Smith, H.J., Keil, M., and Montealegre, R. “Reporting bad news about software projects: Impact of organizational climate and information asymmetry in an individualistic and a collectivistic culture,” IEEE Transactions on Engineering Management 50(1). 2003, 64–77.
  • Chia, A., and Mee, L.S. “The Effects of issue characteristics on the recognition of moral issues,” Journal of Business Ethics 27(3). 2000, 255–269.
  • Jones, T.M. “Ethical decision making by individuals in organizations: An issue-contingent model,” Academy of Management Review 38(4), 1991. 366–395.
  • Barnett, T. “Dimensions of moral intensity and ethical decision making: An empirical study,” Journal of Applied Social Psychology 31:(5), 2001, 1038–1057.
  • Singer, M. “The role of moral intensity and fairness perception in judgments of ethicality: A comparison of managerial professionals and the general public,” Journal of Business Ethics 15(4), 1996. 469–474.
  • Weber, J. “Influences upon managerial moral decision making: Nature of the harm and magnitude of consequences,” Human Relations 49(1), 1996, 1–22.
  • Morris, S.A., and McDonald, R.A. ?The role of moral intensity in moral judgments: An empirical investigation,” Journal of Business Ethics 14(9), 1995, 715–726.
  • Billings, R.S., Milburn, T.W., and Schaalman, M.L. “A model of crisis perception: A theoretical and empirical analysis,” Administrative Science Quarterly 25(2), 1980, 300–316.
  • Keil, M., Tiwana, A., Sainsbury, R., and Sneha, S. “Toward a Theory of Whistleblowing Intentions: A Benefit-to-cost Differential Perspective”, Decision Sciences 41(4). 2010, 787–812.
  • Tiwana, A., Keil, M., and Fichman, R.G. “Information systems project continuation in escalation situations: A real options model,” Decision Sciences 37(3), 2006, 357–391.
  • Louviere, J.J. “Conjoint analysis modeling of stated preferences: A review of theory, methods, recent developments and external validity,” Journal of transport economics and policy 22(1), 1988, 93–119.
  • Kuhfeld, W.F., Tobias, R.D., and Garratt, M. “Efficient experimental design with marketing research applications,” Journal of Marketing Research 31(4), 1994, 545–557.
  • Green, P.E., Helsen, K., and Shandler, B. “Conjoint internal validity under alternative profile presentations,” Journal of Consumer Research 15(3), 1988, 392–397.
  • Louviere, J.J. Analyzing decision making: Metric conjoint analysis, Sage Publications, Incorporated Thousand Oaks, CA, 1988.
  • Priem, R.L. “An application of metric conjoint analysis for the evaluation of top managers' individual strategic decision making processes: A research note,” Strategic Management Journal 13(S1), 2007, 143–151.
  • Molin, E., Oppewal, H., and Timmermans, H. “A comparison of full profile and hierarchical information integration conjoint methods to modeling group preferences,” Marketing Letters 11(2), 2000, 165–175.
  • MacKinnon, D., Lockwood, C., Hoffman, J., West, S., and Sheets, V. “A comparison of methods to test mediation and other intervening variable effects,” Psychological Methods 7(1), 2002, 83–104.
  • Baron, R.M., and Kenny, D.A. “The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations,” Journal of personality and social psychology 51 (6), 1986, 1173.
  • Goldberg, L.R. “A broad-bandwidth, public domain, personality inventory measuring the lower-level facets of several five-factor models,” In. I. Mervielde, I. Deary, F. De Fruyt, and Ostendorf, F., (eds.), Personality psychology in Europe, Tilburg Univ. Press, Tilburg, The Netherlands, 1999, pp. 7–28.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.