A review of the empirical ethical decision-making literature: 1996–2003

MJ O'Fallon, KD Butterfield - Citation classics from the Journal of Business …, 2012 - Springer
This review summarizes and critiques the empirical ethical decision-making literature from
1996 to 2003. One hundred and seventy-four articles were published in top business …

Content analysis of secondary data: A study of courage in managerial decision making

H Harris - Journal of business ethics, 2001 - Springer
Empirical studies in business ethics often rely on self-reported data, but this reliance is open
to criticism. Responses to questionnaires and interviews may be influenced by the subject's …

Best practice recommendations for designing and implementing experimental vignette methodology studies

H Aguinis, KJ Bradley - Organizational research methods, 2014 - journals.sagepub.com
We describe experimental vignette methodology (EVM) as a way to address the dilemma of
conducting experimental research that results in high levels of confidence regarding internal …

Antecedents of trust and adoption intention toward artificially intelligent recommendation systems in travel planning: a heuristic–systematic model

S Shi, Y Gong, D Gursoy - Journal of Travel Research, 2021 - journals.sagepub.com
Drawing on the dual process theory, this study investigates the impacts of systematic and
heuristic cues on travelers' cognitive trust, emotional trust, and adoption intention toward …

Bad apples, bad cases, and bad barrels: meta-analytic evidence about sources of unethical decisions at work.

JJ Kish-Gephart, DA Harrison… - Journal of applied …, 2010 - psycnet.apa.org
As corporate scandals proliferate, practitioners and researchers alike need a cumulative,
quantitative understanding of the antecedents associated with unethical decisions in …

Neutralization: New insights into the problem of employee information systems security policy violations

M Siponen, A Vance - MIS quarterly, 2010 - JSTOR
Employees' failure to comply with information systems security policies is a major concern
for information technology security managers. In efforts to understand this problem, IS …

On making experimental design choices: Discussions on the use and challenges of demand effects, incentives, deception, samples, and vignettes

S Eckerd, S DuHadway, E Bendoly… - Journal of …, 2021 - Wiley Online Library
In late 2018, the Journal of Operations Management published an invited methods article by
Lonati et al.(2018) to provide guidance to authors on how to design behavioral experiments …

Toward a unified conception of business ethics: Integrative social contracts theory

T Donaldson, TW Dunfee - Academy of management review, 1994 - journals.aom.org
Toward A Unified Conception Of Business Ethics: Integrative Social Contracts Theory |
Academy of Management Review Academy of Management Search AMR Anywhere Quick …

Moral disengagement in ethical decision making: a study of antecedents and outcomes.

JR Detert, LK Treviño, VL Sweitzer - Journal of applied psychology, 2008 - psycnet.apa.org
This article advances understanding of the antecedents and outcomes of moral
disengagement by testing hypotheses with 3 waves of survey data from 307 business and …

Organizations' information security policy compliance: Stick or carrot approach?

Y Chen, K Ramamurthy, KW Wen - Journal of Management …, 2012 - Taylor & Francis
Companies' information security efforts are often threatened by employee negligence and
insider breach. To deal with these insider issues, this study draws on the compliance theory …