Stereotype threat occurs when a member of a group can be stereotyped as having certain negative characteristics. Fear of confirming the stereotype then increases apprehension, resulting in the person exhibiting lowered performance. This study examines the extent to which stereotype threats might account for performance differences between male and female students in IT-related majors when working on analytical tasks. The theory supports the contention that males may outperform females on certain tasks but attributes the reason to psycho-social factors and not to innate ability. As expected, the results of this study indicated that females who were told their performances would be lower than their male counterparts scored higher in their wor...
Interpersonal fraud is a complex social action constituted by a series of dependent events and an ac...
Eighty percent of respondents to a National Association of Corporate Directors (NACD) survey of publ...
This paper investigates the psychological traits of individuals’ attraction to engaging in hacking b...
Background: Employee computer fraud is a costly and significant problem for firms. Using the fraud t...
This research provides a "rich insight'' into the management of Information Systems (IS) security wi...
Businesses in the United States are being ravaged internally for a total of up to $400 billion yearl...
The perception of stereotype threat among computer science students was examined at two universities...
Currently, very limited research is available to help researchers and firms understand the behavior ...
This thesis will explore the impact of computer crime on accounting information systems. Specificall...
Fraud examination has played an important role in the business environment. We examine the Fraud Dia...
The problem of global fraud continues to be pandemic with the cost to organizations exceeding $3.9 t...
In the thesis “Analysis of Capabilities Attributed to the Fraud Diamond” research was conducted on f...
Workplace deviant behavior typologies typically include absenteeism, theft, incivility and violence....
Jane E. Baird, Ph.D., is a professor of accounting, Department of Accounting and Business Law, Minne...
Thesis (M.A., Psychology (Industrial/Organizational Psychology))--California State University, Sacra...
Interpersonal fraud is a complex social action constituted by a series of dependent events and an ac...
Eighty percent of respondents to a National Association of Corporate Directors (NACD) survey of publ...
This paper investigates the psychological traits of individuals’ attraction to engaging in hacking b...
Background: Employee computer fraud is a costly and significant problem for firms. Using the fraud t...
This research provides a "rich insight'' into the management of Information Systems (IS) security wi...
Businesses in the United States are being ravaged internally for a total of up to $400 billion yearl...
The perception of stereotype threat among computer science students was examined at two universities...
Currently, very limited research is available to help researchers and firms understand the behavior ...
This thesis will explore the impact of computer crime on accounting information systems. Specificall...
Fraud examination has played an important role in the business environment. We examine the Fraud Dia...
The problem of global fraud continues to be pandemic with the cost to organizations exceeding $3.9 t...
In the thesis “Analysis of Capabilities Attributed to the Fraud Diamond” research was conducted on f...
Workplace deviant behavior typologies typically include absenteeism, theft, incivility and violence....
Jane E. Baird, Ph.D., is a professor of accounting, Department of Accounting and Business Law, Minne...
Thesis (M.A., Psychology (Industrial/Organizational Psychology))--California State University, Sacra...
Interpersonal fraud is a complex social action constituted by a series of dependent events and an ac...
Eighty percent of respondents to a National Association of Corporate Directors (NACD) survey of publ...
This paper investigates the psychological traits of individuals’ attraction to engaging in hacking b...