Given the serious concern of the rising levels of Unethical Information Technology Use (UITU), this research aims at exploring the extent to which legal intervention can deal with UITU. To explore the topic, we borrowed the lenses of the Rational Choice Theory (RCT) from the criminology discipline since this provides a useful framework to analyze deviant behaviors such as UITU. Taking into account the exploratory aspect of our research, we adopted a qualitative case study design rooted in an interpretive stance. We studied the effect of the legal intervention on the use of the technology of Online Reverse Auctions (ORAs) notably by interviewing multiple informants such as IT users, IT initiators, legal experts and institutional actors. Our ...
The concept of appropriation is of paramount importance for the lasting use of an Information Techno...
Unethical information technology (IT) use, related to activities such as hacking, software piracy, p...
Dark patterns have become increasingly pervasive in online choice architectures, encompassing practi...
© 2016 Elsevier B.V. While the IS literature offers rich insights into the kinds, causes and consequ...
The widespread adoption of the Computers and Information Technology in every field has opened up imm...
B2B online reverse auctions technology (ORAs) emerged as a popular tool for large buying firms in th...
The aim of this dissertation is to theoretically develop and empirically test a model predicting une...
This paper investigates the phenomenon of unethical use of information technology (IT) by developing...
nternet users are constantly subjected to incessant demands for attention in a noisy digital world. ...
The widespread adoption of the Computers and Information Technology in every field has opened up imm...
The use of peer to peer (P2P) technology to download copyrighted digital material has grown substant...
Cybercriminals engage in illicit actions and purposefully exploit weaknesses in computer systems, ne...
Various interorganizational systems (IOS) such as Electronic Data Interchange (EDI) and Supply Chain...
Digital rights management technology, or DRM, provides self-enforcing technical exclusion from pre-d...
Unethical information technology (IT) use, related to activities such as hacking, software piracy, p...
The concept of appropriation is of paramount importance for the lasting use of an Information Techno...
Unethical information technology (IT) use, related to activities such as hacking, software piracy, p...
Dark patterns have become increasingly pervasive in online choice architectures, encompassing practi...
© 2016 Elsevier B.V. While the IS literature offers rich insights into the kinds, causes and consequ...
The widespread adoption of the Computers and Information Technology in every field has opened up imm...
B2B online reverse auctions technology (ORAs) emerged as a popular tool for large buying firms in th...
The aim of this dissertation is to theoretically develop and empirically test a model predicting une...
This paper investigates the phenomenon of unethical use of information technology (IT) by developing...
nternet users are constantly subjected to incessant demands for attention in a noisy digital world. ...
The widespread adoption of the Computers and Information Technology in every field has opened up imm...
The use of peer to peer (P2P) technology to download copyrighted digital material has grown substant...
Cybercriminals engage in illicit actions and purposefully exploit weaknesses in computer systems, ne...
Various interorganizational systems (IOS) such as Electronic Data Interchange (EDI) and Supply Chain...
Digital rights management technology, or DRM, provides self-enforcing technical exclusion from pre-d...
Unethical information technology (IT) use, related to activities such as hacking, software piracy, p...
The concept of appropriation is of paramount importance for the lasting use of an Information Techno...
Unethical information technology (IT) use, related to activities such as hacking, software piracy, p...
Dark patterns have become increasingly pervasive in online choice architectures, encompassing practi...