Understanding the potential impact of information technology on the susceptibility of organizations to fraudulent employee behavior

Abstract Although the infusion of progressively advanced information technology (IT) into business organizations can improve the capturing, processing, and reporting of critical decision-making information across the enterprise, such technology can also create an environment that is more vulnerable to fraud. In this article, we develop a framework based on the theory of planned behavior [Org. Behav. Human Decis. Process. 50 (2)(1991) 179] that addresses the potential impact of IT on the susceptibility of an organization to employee fraud. We believe that this framework can serve as a useful tool for management, internal auditors, and external auditors when assessing fraud risk.

[1]  I. Ajzen Nature and operation of attitudes. , 2001, Annual review of psychology.

[2]  John Van Beveren,et al.  A CONCEPTUAL MODEL OF HACKER DEVELOPMENT AND MOTIVATIONS , 2001 .

[3]  M. Okun,et al.  Application of planned behavior theory to predicting volunteer enrollment by college students in a campus-based program , 2002 .

[4]  I. Ajzen,et al.  Prediction of leisure participation from behavioral, normative, and control beliefs: An application of the theory of planned behavior , 1991 .

[5]  T. Jordan,et al.  A Sociology of Hackers , 1998 .

[6]  Adrian Furnham,et al.  Predicting the Use of Complementary Medicine: A Test of the Theories of Reasoned Action and Planned Behavior1 , 2001 .

[7]  Donna M. Randall,et al.  Why students take elective business ethics courses: Applying the theory of planned behavior , 1994 .

[8]  D. Randall,et al.  Ethical decision making in the medical profession: An application of the theory of planned behavior , 1991 .

[9]  Nancy B. Kurland Ethical Intentions and the Theories of Reasoned Action and Planned Behavior1 , 1995 .

[10]  Janet L. Colbert,et al.  Strategies for dealing with fraud , 2000 .

[11]  E. Turban Information Technology for Management : Transforming Business in the Digital Economy , 2001 .

[12]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[13]  I. Ajzen,et al.  A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action , 1992 .

[14]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[15]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[16]  Melanie Giles,et al.  The theory of planned behavior: A conceptual framework to view the career development of women , 2000 .

[17]  M. Fishbein A theory of reasoned action: some applications and implications. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[18]  Tom W. Bell,et al.  Book Review: Online Law, The SPA's Legal Guide to Doing Business on the Internet , 1996 .

[19]  M. Conner,et al.  The Theory of Planned Behavior and Ecstasy Use: Roles for Habit and Perceived Control Over Taking Versus Obtaining Substances , 2001 .

[20]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.

[21]  Jesse F. Dillard,et al.  Ethical Development of Advanced Technology: A Postmodern Stakeholder Perspective , 1999 .

[22]  Henri Barki,et al.  Explaining the Role of User Participation in Information System Use , 1994 .

[23]  George P. Huber,et al.  A theory of the effects of advanced information technologies on organizational design, intelligence , 1990 .

[24]  T. Jones Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .

[25]  J. Boldero,et al.  The Prediction of Household Recycling of Newspapers: The Role of Attitudes, Intentions, and Situational Factors1 , 1995 .

[26]  Lindsay L. Baird The Detection of Crimes and Errors and Omissions , 2001 .

[27]  Gerardine DeSanctis,et al.  Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory , 1994 .

[28]  A. Bandura Self-efficacy mechanism in human agency , 2024, Psihologìâ ì suspìlʹstvo.

[29]  Meng Hsiang Hsu,et al.  An investigation of volitional control in information ethics , 2003, ICIS.

[30]  Colleen J. Heffernan Social foundations of thought and action: A social cognitive theory ,Bandura AlbertEnglewood Cliffs, New Jersey:Prentice Hall,1986, xiii +617 pp. Hardback. US$39.50. , 1988 .

[31]  I. Ajzen,et al.  Prediction of goal directed behaviour: Attitudes, intentions and perceived behavioural control , 1986 .

[32]  M. Chang Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior , 1998 .

[33]  James D. Thompson Organizations in Action , 1967 .

[34]  A. Bandura Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .

[35]  I. Ajzen The theory of planned behavior , 1991 .

[36]  Mark S. Silver,et al.  Systems that support decision makers: description and analysis , 1991 .

[37]  I. Ajzen Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. , 2002 .

[38]  Terri L. Rittenburg,et al.  Global Ethics: An Integrative Framework For MNEs , 1997 .

[39]  B. L. Driver,et al.  Application of the Theory of Planned Behavior to Leisure Choice. , 1992 .

[40]  Yoav Vardi,et al.  Using the Theory of Reasoned Action to Predict Organizational Misbehavior , 2002, Psychological reports.

[41]  R. Wood Task complexity: Definition of the construct , 1986 .

[42]  A. V. D. Ven,et al.  Determinants of Coordination Modes within Organizations , 1976 .

[43]  David Trafimow,et al.  The Importance of Risk in Determining the Extent to Which Attitudes Affect Intentions to Wear Seat Belts , 1994 .

[44]  A. Hargadon Organizations in Action:Social Science Bases of Administrative Theory (Book) , 2003 .