The Contemporary Plagiarist: The Roles of Technology and Moral Development
暂无分享,去创建一个
[1] James R. Rest. Development in Judging Moral Issues , 1979 .
[2] M. F. Luce,et al. Constructive Consumer Choice Processes , 1998 .
[3] J. Lefkowitz,et al. Individual and Organizational Antecedents of Misconduct in Organizations , 2009 .
[4] Chris J. Park,et al. In Other (People's) Words: Plagiarism by university students--literature and lessons , 2003 .
[5] P. Spicker,et al. Type A Behavior, Competitive Achievement-Striving, and Cheating among College Students , 1990, Psychological reports.
[6] Huseyin Cavusoglu,et al. Economics of IT Security Management , 2004, Economics of Information Security.
[7] David Miles Huber. Multimedia and the Web , 2007 .
[8] D. Fosbinder,et al. Cheating and plagiarism. , 1991, Nurse educator.
[9] I. Ajzen,et al. Predicting dishonest actions using the theory of planned behavior , 1991 .
[10] Charles D. Barrett. Understanding Attitudes and Predicting Social Behavior , 1980 .
[11] Tero Vartiainen,et al. What levels of moral reasoning and values explain adherence to information security rules? An empirical study , 2009, Eur. J. Inf. Syst..
[12] Abbas Tashakkori,et al. Mixed Methodology: Combining Qualitative and Quantitative Approaches , 1998 .
[13] Rubén Comas-Forgas,et al. Academic Plagiarism: Explanatory Factors from Students’ Perspective , 2010 .
[14] Rafik Z. Elias. The Impact of Anti-Intellectualism Attitudes and Academic Self-Efficacy on Business Students’ Perceptions of Cheating , 2009 .
[15] Randi L. Sims,et al. The severity of academic dishonesty: A comparison of faculty and student views , 1995 .
[16] William H. Yates. Academic integrity in the Internet age , 2007 .
[17] Iwan G. J. H. Wopereis,et al. Differences between novice and experienced users in searching information on the World Wide Web , 2000, J. Am. Soc. Inf. Sci..
[18] Richard Rubin. Moral distancing and the use of information technologies: the seven temptations , 1994, ECA '94.
[19] L. Kohlberg,et al. The Philosophy Of Moral Development , 1982 .
[20] Bart Victor,et al. The Organizational Bases of Ethical Work Climates , 1988 .
[21] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[22] G. Glass,et al. Statistical methods in education and psychology, 3rd ed. , 1996 .
[23] Dan Ariely,et al. Dishonesty in Everyday Life and Its Policy Implications , 2006 .
[24] Kenneth D. Butterfield,et al. Honor Codes and Other Contextual Influences on Academic Integrity: A Replication and Extension to Modified Honor Code Settings , 2002 .
[25] B. Whitley,et al. Academic Dishonesty: An Educator's Guide , 2001 .
[26] M. Hardy. Regression with dummy variables , 1993 .
[27] R. Sunley. Linda K. Trevino and Katherine A. Nelson: Managing business ethics: Straight talk about how to do it right. New Jersey: John Wiley & Sons , 2011 .
[28] Michael R. Gottfredson,et al. A general theory of crime. , 1992 .
[29] James R. Rest,et al. A Neo-Kohlbergian Approach: The DIT and Schema Theory , 1999 .
[30] J. Shepard,et al. Toward an understanding of ethical climate: Its relationship to ethical behavior and supervisory influence , 1994 .
[31] T. K. Srull,et al. Effects of personality and situational variation in locus of control on cheating: determinants of the "congruence effect". , 1978, Journal of personality.
[32] L. Kohlberg. Essays On Moral Development , 1981 .
[33] S. Thoma. Trends and Issues in Moral Judgment Research Using the Defining Issues Test. , 1994 .
[34] Dusten R. Hollist,et al. Causes of Delinquency , 1950, Juvenile Justice.
[35] R. Friedrich. In Defense of Multiplicative Terms In Multiple Regression Equations , 1982 .
[36] L. Kohlberg,et al. 1. Stages of moral development as a basis for moral education , 1971 .
[37] J. Ryan,et al. Moral Reasoning as a Determinant of Organizational Citizenship Behaviors: A Study in the Public Accounting Profession , 2001 .
[38] I. M. Jawahar,et al. Predicting Academic Misconduct Intentions and Behavior Using the Theory of Planned Behavior and Personality , 2010 .
[39] Jennifer L. Kisamore,et al. Academic Integrity: The Relationship between Individual and Situational Factors on Misconduct Contemplations , 2007 .
[40] George E. Stevens,et al. Ethical Inclinations of Tomorrow's Managers Revisited: How and Why Students Cheat. , 1987 .
[41] Seth Finn,et al. Origins of Academic Dishonesty , 2006 .
[42] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[43] Nancy M. Levenburg,et al. Cheating During the College Years: How do Business School Students Compare? , 2007 .
[44] Harm J. A. Biemans,et al. Differences between novice and experienced users in searching information on the World Wide Web , 2000 .
[45] Lisa Renard,et al. Cut and Paste 101: Plagiarism and the Net , 2000 .
[46] James Weber,et al. Influences upon Managerial Moral Decision Making: Nature of the Harm and Magnitude of Consequences , 1996 .
[47] Lee Sproull,et al. Reducing social context cues: electronic mail in organizational communication , 1986 .
[48] G. Glass,et al. Statistical methods in education and psychology , 1970 .
[49] Matthew S. Eastin,et al. Psychology of Communication Technology Use in the Workplace , 2007, Cyberpsychology Behav. Soc. Netw..
[50] James R. Davis,et al. Perceptions of Dishonesty among Two-year College Students: Academic versus Business Situations , 2004 .
[51] I. Ajzen,et al. The Prediction of Behavioral Intentions in a Choice Situation. , 1969 .
[52] Sally Cole,et al. Issues in Academic Integrity. , 1996 .
[53] Samuel Mann,et al. Similarity and originality in code: plagiarism and normal variation in student assignments , 2006 .
[54] James R. Rest. Moral Development: Advances in Research and Theory , 1986 .
[55] N. Garg,et al. Information Ethics: Privacy and Intellectual Property , 2006, IEEE Transactions on Professional Communication.
[56] David A Harrison,et al. Bad apples, bad cases, and bad barrels: meta-analytic evidence about sources of unethical decisions at work. , 2010, The Journal of applied psychology.
[57] Tay Vaughan,et al. Multimedia: Making It Work , 1993 .
[58] Tony R. Smith. Low Self-Control, Staged Opportunity, and Subsequent Fraudulent Behavior , 2004 .
[59] Ulla K. Bunz,et al. The Computer-Email-Web (CEW) Fluency Scale--Development and Validation , 2001 .
[60] Linda Klebe Trevino,et al. Cheating in Academic Institutions: A Decade of Research , 2001 .
[61] Lynne M. Funtik. Plagiarism: Detection and Prevention , 2002 .
[62] N. Willard. Moral Development in the Information Age. , 1998 .
[63] Nathan W. Pino,et al. College Students and Academic Dishonesty , 2003 .
[64] Neil F. Doherty,et al. Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis , 2005, Inf. Resour. Manag. J..
[65] Aileen B. Sedman,et al. A longitudinal study , 1987 .
[66] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[67] Karen D. Loch,et al. Evaluating ethical decision making and computer use , 1996, CACM.
[68] Marvin Karlins,et al. An empirical investigation of actual cheating in a large sample of undergraduates , 1988 .
[69] T. Jones. Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .
[70] James Weber. Managers' Moral Reasoning: Assessing Their Responses to Three Moral Dilemmas , 1990 .
[71] Aaron U. Bolin. Self-Control, Perceived Opportunity, and Attitudes as Predictors of Academic Dishonesty , 2004, The Journal of psychology.
[72] A. Lathrop,et al. Student Cheating and Plagiarism in the Internet Era: A Wake-Up Call , 2000 .
[73] L. Treviño. Ethical Decision Making in Organizations: A Person-Situation Interactionist Model , 1986 .
[74] P. Primeaux,et al. Managing Business Ethics and Opportunity Costs , 1997 .
[75] Charles B. Shrader,et al. Cheating and Moral Judgment in the College Classroom: A Natural Experiment , 2004 .
[76] David R. Firth,et al. Communications of the Association for Information Systems , 2011 .
[77] Richard A. Bernardi,et al. Examining the Decision Process of Students' Cheating Behavior: An Empirical Study , 2004 .
[78] Vilmos F. Misangyi,et al. Ending Corruption: The Interplay Among Institutional Logics, Resources, and Institutional Entrepreneurs , 2008 .
[79] Sandra Turner,et al. An Empirical Investigation of Digital Cheating and Plagiarism Among Middle School Students , 2007 .
[80] R. L. Dawkins. Attributes and Statuses of College Students Associated with Classroom Cheating on a Small-Sized Campus. , 2004 .
[81] Randi L. Sims,et al. The Relationship Between Academic Dishonesty and Unethical Business Practices , 1993 .
[82] D. Crown,et al. Learning from the Literature on Collegiate Cheating: A Review of Empirical Research , 1998 .
[83] J. Houston. Learning and Cheating as a Function of Study Phase Distraction. , 1976 .
[84] Ellen Krupar,et al. Mouse Click Plagiarism: The Role of Technology in Plagiarism and the Librarian's Role in Combating It , 2001, Libr. Trends.
[85] L. Kohlberg,et al. Theoretical foundations and research validation , 1987 .
[86] G. Diekhoff,et al. College cheating: Ten years later , 1996 .
[87] B. Whitley,et al. FACTORS ASSOCIATED WITH CHEATING AMONG COLLEGE STUDENTS: A Review , 1998 .
[88] W. Steve Albrecht,et al. Fraud: Bringing Light to the Dark Side of Business , 1994 .
[89] Sutirtha Chatterjee. Unethical behavior using information technology , 2008 .
[90] Rasil Warnakulasooriya,et al. Patterns, correlates, and reduction of homework copying , 2010 .
[91] Huseyin Cavusoglu,et al. Economics of ITSecurity Management: Four Improvements to Current Security Practices , 2004, Commun. Assoc. Inf. Syst..
[92] Julie M. Hupp,et al. Honesty and Heroes: A Positive Psychology View of Heroism and Academic Honesty , 2008, The Journal of psychology.
[93] Richard H. Franke,et al. Fraud: Bringing Light to the Dark Side of Business , 1995 .
[94] Batya Friedman,et al. Social Judgments and Technological Innovation: Adolescents' Understanding of Property, Privacy, and Electronic Information. , 1997 .
[95] Cathy Owens Swift,et al. An Examination of the Relationship Between Academic Dishonesty and Workplace Dishonesty: A Multicampus Investigation , 2001 .
[96] David W. Pentico,et al. Why do Employees Steal? , 2003 .
[97] Anne Colby,et al. The measurement of moral judgment, Vol. 1: Theoretical foundations and research validation; Vol. 2: Standard issue scoring manual. , 1987 .
[98] Antonis C. Stylianou,et al. Individual Differences in the Acceptability of Unethical Information Technology Practices: The Case of Machiavellianism and Ethical Ideology , 2004 .
[99] Zoltán Ádám Mann,et al. Three public enemies: cut, copy, and paste , 2006, Computer.
[100] I. Ajzen. The theory of planned behavior , 1991 .
[101] Harsh K. Luthar,et al. Exposure to Ethics Education and the Perception of Linkage between Organizational Ethical Behavior and Business Outcomes , 2005 .
[102] Renate R. Mai-Dalton. The experiences of one faculty member in a business ethics seminar: What can we take back to the classroom? , 1987 .
[103] M. Williams,et al. STRATEGIES FOR REDUCING ACADEMIC DISHONESTY , 2003 .
[104] William O. Bearden,et al. Ethical Values and Long-term Orientation , 2007 .
[105] Charles A. Drake. Why Students Cheat , 1941 .
[106] Kenneth J. Chapman,et al. Academic dishonesty in a global educational market: a comparison of Hong Kong and American university business students , 2004 .
[107] Maren Wöltje,et al. Cut, Copy and Paste. , 2001 .
[108] R. Iyer,et al. Academic Dishonesty: Are Business Students Different From Other College Students? , 2006 .
[109] Murugan Anandarajan. INTERNET ABUSE IN THE WORKPLACE , 2002 .
[110] Ranald Macdonald,et al. Plagiarism—a complex issue requiring a holistic institutional approach , 2006 .