Abstract
Consumer indirect misbehavior in access-based consumption is a significant challenge for enterprises. The literature is in short of a deep understanding of the antecedent conditions of consumer indirect misbehavior in this context and limited by inconsistent findings, calling for developing a holistic and integrative theoretical framework. This study integrates three commonly used theoretical perspectives in the consumer misbehavior literature (i.e., deterrence, rational decision-making, and ethical decision-making) to present holistic archetypes of consumer indirect misbehavior formation. In accordance with this theoretical objective, we adopted an emerging approach for configurational analysis, i.e., fuzzy-set qualitative comparative analysis (fsQCA), to analyze the complex combinations of six influencing factors. We collected data using a scenario-based field survey of 264 experienced consumers of a popular bike-sharing service in China. The scenarios were developed based on relevant literature and a Delphi study. The fsQCA results reveal multiple configurations for high and low levels of consumer misbehavior intention. Specifically, perceived benefits and moral definition play important roles, while the effect of sanctions is highly dependent on other factors. These results lead us to derive three theoretical propositions for antecedent conditions leading to consumers’ indirect misbehavior intentions in access-based consumption. This study enriches our understanding of the causes of misbehavior and provides novel insights for management practitioners to take appropriate countermeasures.
Similar content being viewed by others
Notes
We appreciate an anonymous reviewer for raising this point.
We appreciate the anonymous reviewers for making this point.
We owe our thanks to an anonymous reviewer for making this point.
References
Akbari, M., Abdolvand, M. A., & Ghaffari, F. (2016). Developing a model in antecedents of consumer misbehavior on chain stores. Revista Brasileira de Marketing, 15(2), 146–163.
Akers, R. L. (1990). Rational choice, deterrence, and social learning theory in criminology: The path not taken. The Journal of Criminal Law and Criminology, 81(3), 653–676.
Arli, D., & Tjiptono, F. (2016). Consumer digital piracy behaviour among youths: Insights from Indonesia. Asia Pacific Journal of Marketing and Logistics, 28(5), 898–922.
Bachman, R., Paternoster, R., & Ward, S. (1992). The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault. Law & Society Review, 26(2), 343–372.
Banerjee, D., Cronan, T. P., & Jones, T. W. (1998). Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22(1), 31–60.
Bardhi, F., & Eckhardt, G. M. (2012). Access-based consumption: The case of car sharing. Journal of Consumer Research, 39(4), 881–898.
Bitner, M. J., Booms, B. H., & Mohr, L. A. (1994). Critical service encounters: The employee's viewpoint. Journal of Marketing, 58(4), 95–106.
Bossler, A. M. (2019). Perceived formal and informal sanctions on the willingness to commit cyber attacks against domestic and foreign targets. Journal of Crime and Justice, 42(5), 599–615.
Brillian, M. T., Sucahyo, Y. G., Ruldeviyani, Y., Gandhi, A., & IEEE (2018). Revealing the misuse of motorcycle ride-sharing applications using extended deterrence theory approach. In 2018 International Conference on Advanced Computer Science and Information Systems (pp. 131–135, International Conference on Advanced Computer Science and Information Systems).
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548.
Celestine, N. A., Leighton, C., & Perryer, C. (2018). A multifocal and integrative view of the influencers of ethical attitudes using qualitative configurational analysis. Journal of Business Ethics, 162(1), 103–122.
Chan, R. Y. K., Ma, K. H. Y., & Wong, Y. H. (2013). The software piracy decision-making process of Chinese computer users. The Information Society, 29(4), 203–218.
Chang, M.-L., & Cheng, C.-F. (2014). How balance theory explains high-tech professionals' solutions of enhancing job satisfaction. Journal of Business Research, 67(9), 2008–2018.
Chen, J., Teng, L., & Liao, Y. (2018b). Counterfeit luxuries: does moral reasoning strategy influence consumers’ pursuit of counterfeits? Journal of Business Ethics, 151(1), 249–264.
Chen, M., Wang, D., Sun, Y., Waygood, E. O. D., & Yang, W. (2018a). A comparison of users’ characteristics between station-based bikesharing system and free-floating bikesharing system: Case study in Hangzhou, China. Transportation, 47(2), 689–704.
Chen, M.-F., Pan, C.-T., & Pan, M.-C. (2009). The joint moderating impact of moral intensity and moral judgment on consumer’s use intention of pirated software. Journal of Business Ethics, 90(3), 361–373.
Chen, X., Wu, D., Chen, L., & Teng, J. K. L. (2018c). Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables. Information & Management, 55(8), 1049–1060.
Chen, Y. (2009). Possession and access: Consumer desires and value perceptions regarding contemporary art collection and exhibit visits. Journal of Consumer Research, 35(6), 925–940.
Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447–459.
Chiang, E. P., & Assane, D. (2009). Estimating the willingness to pay for digital music. Contemporary Economic Policy, 27(4), 512–522.
Choi, M., & Song, J. (2018). Social control through deterrence on the compliance with information security policy. Soft Computing, 22(20), 6765–6772.
Cihan, A., & Tittle, C. R. (2019). Self-control, sanction threats, temptation, and crime: Examining contingencies of self-control in a cross-national context. Crime & Delinquency, 65(4), 555–580.
Craft, J. L. (2013). A review of the empirical ethical decision-making literature: 2004–2011. Journal of Business Ethics, 117(2), 221–259.
Currie, G., & Delbosc, A. (2017). An empirical model for the psychology of deliberate and unintentional fare evasion. Transport Policy, 54, 21–29.
D'Arcy, J., & Devaraj, S. (2012). Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43(6), 1091–1124.
D'Arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20(6), 643–658.
D'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98.
Daunt, K. L., & Harris, L. C. (2011). Customers acting badly: Evidence from the hospitality industry. Journal of Business Research, 64(10), 1034–1042.
Daunt, K. L., & Harris, L. C. (2012). Motives of dysfunctional customer behavior: An empirical study. Journal of Services Marketing, 26(4), 293–308.
Dootson, P., Johnston, K. A., Beatson, A., & Lings, I. (2016). Where do consumers draw the line? Factors informing perceptions and justifications of deviant consumer behaviour. Journal of Marketing Management, 32(7–8), 750–776.
Dul, J. (2016). Identifying single necessary conditions with NCA and fsQCA. Journal of Business Research, 69(4), 1516–1523.
Edbring, E. G., Lehner, M., & Mont, O. (2016). Exploring consumer attitudes to alternative models of consumption: Motivations and barriers. Journal of Cleaner Production, 123, 5–15.
Eliason, S. L., & Dodder, R. A. (1999). Techniques of neutralization used by deer poachers in the western united states: A research note. Deviant Behavior: An Interdisciplinary Journal, 20, 233–252.
Fisher, R. J. (1993). Social desirability bias and the validity of indirect questioning. Journal of Consumer Research, 20(2), 303–315.
Fisk, R., Grove, S., Harris, L. C., Keeffe, D. A., Reynolds, K. L. D., Russell-Bennett, R., et al. (2010). Customers behaving badly: A state of the art review, research agenda and implications for practitioners. Journal of Services Marketing, 24(6), 417–429.
Fiss, P. C. (2007). A set-theoretic approach to organizational configurations. Academy of Management Review, 32(4), 1180–1198.
Fiss, P. C. (2011). Building better causal theories: A fuzzy set approach to typologies in organization research. Academy of Management Journal, 54(2), 393–420.
Fullerton, R. A., & Punj, G. (2004). Repercussions of promoting an ideology of consumption: consumer misbehavior. Journal of Business Research, 57(11), 1239–1249.
Furnari, S., Crilly, D., Misangyi, V. F., Greckhamer, T., Fiss, P. C., & Aguilera, R. (2020). Capturing causal complexity: Heuristics for configurational theorizing. Academy of Management Review. https://doi.org/10.5465/amr.2019.0298.
Fussey, P. (2009). An economy of choice? Terrorist decision-making and criminological rational choice theories reconsidered. Security Journal, 24(1), 85–99.
Gibbs, J. P. (1968). Crime, punishment, and deterrence. The Southwestern Social Science Quarterly, 48(4), 515–530.
Goode, S., & Kartas, A. (2012). Exploring software piracy as a factor of video game console adoption. Behaviour & Information Technology, 31(6), 547–563.
Grasmick, H. G., & Bursik, R. J. (1990). Conscience, significant others, and rational choice: Extending the deterrence model. Law & Society Review, 24(3), 837–862.
Greckhamer, T. (2016). CEO compensation in relation to worker compensation across countries: The configurational impact of country-level institutions. Strategic Management Journal, 37(4), 793–815.
Greckhamer, T., Misangyi, V. F., & Fiss, P. C. (2013). Chapter 3 the two QCAs: From a small-N to a large-N set theoretic approach. In Configurational theory and methods in organizational research (pp. 49–75, Research in the Sociology of Organizations).
Gu, T., Kim, I., & Currie, G. (2019). To be or not to be dockless: Empirical analysis of dockless bikeshare development in China. Transportation Research Part A: Policy and Practice, 119, 122–147.
Guo, Y., Zhou, J., Wu, Y., & Li, Z. (2017). Identifying the factors affecting bike-sharing usage and degree of satisfaction in Ningbo, China. PLoS ONE, 12(9), e0185100.
Harris, L. C., & Daunt, K. (2013). Managing customer misbehavior challenges and strategies. Journal of Services Marketing, 27(4), 281–293.
Harris, L. C., & Reynolds, K. L. (2003). The consequences of dysfunctional customer behavior. Journal of Service Research, 6(2), 144–161.
Hartl, B., Hofmann, E., & Kirchler, E. (2016). Do we need rules for “what's mine is yours”? Governance in collaborative consumption communities. Journal of Business Research, 69(8), 2756–2763.
Hati, S. R. H., Fitriasih, R., & Safira, A. (2019). E-textbook piracy behavior. Journal of Information, Communication and Ethics in Society, 18(1), 105–123.
Hirsh, J. B., Lu, J. G., & Galinsky, A. D. (2018). Moral utility theory: Understanding the motivation to behave (un)ethically. Research in Organizational Behavior, 38, 43–59.
Hunt, S. D., & Vitell, S. (1986). A general theory of marketing ethics. Journal of MacroMarketing, 6, 5–16.
iResearch (2017). Research report on shared-bike services in China, in Chinese.
Jia, L., Liu, X., & Liu, Y. (2018). Impact of different stakeholders of bike-sharing industry on users’ intention of civilized use of bike-sharing. Sustainability, 10(5), 1437–1463.
Johnston, A. C., Warkentin, M., & Siponen, M. (2015). An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113–134.
Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. Academy of Management Review, 16(2), 366–395.
Klepper, S., & Nagin, D. (1989). The deterrent effect of perceived certainty and severity of punishment revisited. Criminology, 27(4), 721–746.
Koklic, M. K., Vida, I., Bajde, D., & Culiberg, B. (2013). The study of perceived adverse effects of digital piracy and involvement: Insights from adult computer users. Behaviour & Information Technology, 33(3), 225–236.
Korgaonkar, P. K., Gironda, J. T., Petrescu, M., Krishen, A. S., & Mangleburg, T. F. (2020). Preventing shoplifting: Exploring online comments to propose a model. Psychology & Marketing, 37(1), 141–153.
Kroneberg, C., Heintze, I., & Mehlkop, G. (2010). The interplay of moral norms and instrumental incentives in crime causation. Criminology, 48(1), 259–294.
Lan, J., Ma, Y., Zhu, D., Mangalagiu, D., & Thornton, T. (2017). Enabling value co-creation in the sharing economy: The case of mobike. Sustainability, 9(9), 1504–1524.
Lawson, S. J., Gleim, M. R., Perren, R., & Hwang, J. (2016). Freedom from ownership: An exploration of access-based consumption. Journal of Business Research, 69, 2615–2623.
Lee, J.-N., Park, Y., Straub, D. W., & Koo, Y. (2019). Holistic archetypes of it outsourcing strategy: A contingency fit and configurational approach. MIS Quarterly, 43(4), 1201–1225.
Leischnig, A., & Kasper-Brauer, K. (2015). Employee adaptive behavior in service enactments. Journal of Business Research, 68(2), 273–280.
Leischnig, A., & Woodside, A. G. (2019). Who approves fraudulence? Configurational causes of consumers’ unethical judgments. Journal of Business Ethics, 158(3), 713–726.
Li, H., Luo, X., Zhang, J., & Sarathy, R. (2018). Self-control, organizational context, and rational choice in Internet abuses at work. Information & Management, 55(3), 358–367.
Li, H., Zhang, J., & Sarathy, R. (2010). Understanding compliance with internet use policy from the perspective of rational choice theory. Decision Support Systems, 48(4), 635–645.
Liao, C., Lin, H.-N., & Liu, Y.-P. (2010). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91(2), 237–252.
Liu, Y., Mezei, J., Kostakos, V., & Li, H. (2015). Applying configurational analysis to IS behavioural research: A methodological alternative for modelling combinatorial complexities. Information Systems Journal, 27(1), 59–89.
Lou, L., & Koh, J. (2018). Deterrence and reciprocity approaches for enhancing user participation in the sharing economy. PACIS 2018 Proceedings, 334.
Lovelock, C., & Gummesson, E. (2004). Whither services marketing? In search of a new paradigm and fresh perspectives. Journal of Service Research, 7(1), 20–41.
Ma, S., Gu, H., Hampson, D. P., & Wang, Y. (2019). Enhancing customer civility in the peer-to-peer economy: Empirical evidence from the hospitality sector. Journal of Business Ethics. https://doi.org/10.1007/s10551-019-04128-5.
Ma, Y., Lan, J., Thornton, T., Mangalagiu, D., & Zhu, D. (2018). Challenges of collaborative governance in the sharing economy: The case of free-floating bike sharing in Shanghai. Journal of Cleaner Production, 197, 356–365.
Misangyi, V. F., Greckhamer, T., Furnari, S., Fiss, P. C., Crilly, D., & Aguilera, R. (2017). Embracing causal complexity: The emergence of a neo-configurational perspective. Journal of Management, 43(1), 255–282.
Mitchell, V. W., Balabanis, G., Schlegelmilch, B. B., & Cornwell, T. B. (2009). Measuring unethical consumer behavior across four countries. Journal of Business Ethics, 88(2), 395–412.
Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285–311.
Mulder, L. B., Verboon, P., & De Cremer, D. (2009). Sanctions and moral judgments: The moderating effect of sanction severity and trust in authorities. European Journal of Social Psychology, 39(2), 255–269.
Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18(2), 126–139.
Nagin, D. S., & Paternoster, R. (1993). Enduring individual differences and rational choice theories of crime. Law & Society Review, 27(3), 467–496.
Ogilvie, J., & Stewart, A. (2010). The integration of rational choice and self-efficacy theories: A situational analysis of student misconduct. Australian & New Zealand Journal of Criminology, 43(1), 130–155.
Ordanini, A., Parasuraman, A., & Rubera, G. (2014). When the recipe is more important than the ingredients: A qualitative comparative analysis (QCA) of service innovation configurations. Journal of Service Research, 17(2), 134–149.
Park, Y., Sawy, O. A. E., & Fiss, P. C. (2017). The role of business intelligence and communication technologies in organizational agility: A configurational approach. Journal of the Association for Information Systems, 18(9), 648–686.
Paternoster, R. (2010). How much do we really know about criminal deterrence? The Journal of Criminal Law & Criminology, 100(3), 765–824.
Paternoster, R., & Simpson, S. (1996). Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law & Society Review, 30(3), 549–584.
Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177.
Pearson, F. S., & Weiner, N. A. (1985). Toward an intergration of criminological theories. Journal of Criminal Law and Criminology, 76(1), 116–150.
Phau, I., Lim, A., Liang, J., & Lwin, M. (2014). Engaging in digital piracy of movies: A theory of planned behaviour approach. Internet Res, 24(2), 246–266.
Phau, I., & Ng, J. (2010). Predictors of usage intentions of pirated software. Journal of Business Ethics, 94(1), 23–37.
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.
Poppelaars, F., Bakker, C., & van Engelen, J. (2018). Does access trump ownership? Exploring consumer acceptance of access-based consumption in the case of smartphones. Sustainability, 10(7), 2133.
Prado, A. M., & Woodside, A. G. (2014). Deepening understanding of certification adoption and non-adoption of international-supplier ethical standards. Journal of Business Ethics, 132(1), 105–125.
Ragin, C. C. (2006). Set relations in social research: Evaluating their consistency and coverage. Political Analysis, 14(3), 291–310.
Ragin, C. C. (2008). Redesigning social inquiry: Fuzzy sets and beyond. Chicago, IL: University of Chicago Press.
Rajab, M., & Eydgahi, A. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security, 80, 211–223.
Reynolds, K. L., & Harris, L. C. (2006). Deviant customer behavior: An exploration of frontline employee tactics. Journal of Marketing Theory and Practice, 14(2), 95–111.
Rifkin, J. (2000). The age of access: The new culture of hypercapitalism where all of life is a paid-for experience. New York: Penguin.
Roos, D., & Hahn, R. (2017). Understanding collaborative consumption: An extension of the theory of planned behavior with value-based personal norms. Journal of Business Ethics, 158(3), 679–697.
Safa, N. S., Maple, C., Furnell, S., Azad, M. A., Perera, C., Dabbagh, M., et al. (2019). Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems, 97, 587–597.
Safa, N. S., Maple, C., Watson, T., & Von Solms, R. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of Information Security and Applications, 40, 247–257.
Schaefers, T. (2013). Exploring carsharing usage motives: A hierarchical means-end chain analysis. Transportation Research Part A: Policy and Practice, 47, 69–77.
Schaefers, T., Lawson, S. J., & Kukar-Kinney, M. (2016a). How the burdens of ownership promote consumer usage of access-based services. Mark Lett, 27(3), 569–577.
Schaefers, T., Wittkowski, K., Reynolds, S. B. N., & Ferraro, R. (2016). Contagious effects of customer misbehavior in access-based services. Journal of Service Research, 19(1), 3–21.
Schneider, C. Q., & Wagemann, C. (2012). Set-theoretic methods for the social sciences. Cambridge: Cambridge University Press.
Schwartz, M. S. (2015). Ethical decision-making theory: An integrated approach. Journal of Business Ethics, 139(4), 755–776.
Silic, M., Barlow, J. B., & Back, A. (2017). A new perspective on neutralization and deterrence: Predicting shadow IT usage. Information & Management, 54(8), 1023–1037.
Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487–502.
Siponen, M., Vance, A., & Willison, R. New insights for an old problem: Explaining software piracy through neutralization theory. In Proceedings of the 43rd Hawaii International Conference on System Sciences, 2010.
Skarmeas, D., Leonidou, C. N., & Saridakis, C. (2013). Examining the role of CSR skepticism using fuzzy-set qualitative comparative analysis. Journal of Business Research, 67(9), 1796–1805.
Sparks, P., & Shepherd, R. (2002). The role of moral judgments within expectancy-value-based attitude-behavior models. Ethics & Behavior, 12(4), 299–321.
Steenhaut, S., & Kenhove, P. V. (2006). The mediating role of anticipated guilt in consumers’ ethical decision-making. Journal of Business Ethics, 69(3), 269–288.
Stevens, B. (2008). Corporate ethical codes: Effective instruments for influencing behavior. Journal of Business Ethics, 78(4), 601–609.
Straub, D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255–276.
Sun, Y. (2018). Sharing and riding: How the dockless bike sharing scheme in China shapes the city. Urban Science, 2(3), 68–87.
Tho, N. D., & Trang, N. T. M. (2015). Can knowledge be transferred from business schools to business organizations through in-service training students? SEM and fsQCA findings. Journal of Business Research, 68(6), 1332–1340.
Ting, M.-S., Goh, Y.-N., & Isa, S. M. (2016). Determining consumer purchase intentions toward counterfeit luxury goods in Malaysia. Asia Pacific Management Review, 21(4), 219–230.
Tsaur, S.-H., Cheng, T.-M., & Hong, C.-Y. (2019). Exploring tour member misbehavior in group package tours. Tourism Management, 71, 34–43.
Urry, J. (2005). The complexity turn. Theory, Culture & Society, 22(5), 1–14.
Vance, A., Fellow, S. J. B., Siponen, M. T., & Straub, D. W. (2019). Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Information & Management, 57(4), 103212.
Vance, A., & Siponen, M. T. (2012). IS security policy violations: A rational choice perspective. Journal of Organizational and End User Computing, 24(1), 21–41.
Veríssimo, J. M. C. (2016). Enablers and restrictors of mobile banking app use: A fuzzy set qualitative comparative analysis (fsQCA). Journal of Business Research, 69(11), 5456–5460.
Wirtz, J., & Kum, D. (2004). Consumer cheating on service guarantees. Journal of the Academy of Marketing Science, 32(2), 159–175.
Yao, Y., Liu, L., Guo, Z., Liu, Z., & Zhou, H. (2018). Experimental study on shared bike use behavior under bounded rational theory and credit supervision mechanism. Sustainability, 11(1), 127–150.
Yoon, C. (2011). Digital piracy intention: A comparison of theoretical models. Behaviour & Information Technology, 31(6), 565–576.
Funding
This work was supported by the National Natural Science Foundation of China [grant numbers 71871162, 71872112], the Humanities and Social Science Fund of Ministry of Education of China [grant number 17YJC630237], and the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning [grant number TP2018016].
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix 1: Prior Studies on Antecedents of Misbehavior-Related Construct in Other Contexts than Access-Based Consumption
Study | Dependent variable | Antecedents | Key findings | Underlying theories |
---|---|---|---|---|
Grasmick and Bursik (1990) | Illegal behavior | Shame, embarrassment, legal sanctions | The threats of shame and legal sanctions significantly impact the intention to commit the three offenses; the effect of embarrassment is not significant | Deterrence theory |
Bachman et al. (1992) | Sexual offending | Formal sanctions, informal sanctions, moral beliefs | The deterrent effect of formal sanction threats is contingent on respondents’ moral evaluation of the incident. The impact of informal sanctions is insignificant | Deterrence theory, rational choice theory |
Nagin and Paternoster (1993) | Decisions to commit offenses | Lack of self-control, criminal opportunity, situational factors, perceived costs, perceived benefits | The attractiveness of the crime target, ease of committing the crime, and perceptions of the costs and benefits of committing the crime have a significant impact on offending decisions | Rational choice theory, theories of enduring individual differences |
Paternoster and Simpson (1996) | Corporate crime | Perceived costs, perceived benefits, perceptions of shame, assessment of the opprobrium of the act, contextual characteristics of the organization | Sanction threats formal and informal), moral evaluations, and organizational factors have a significant impact on the intention of corporate crime | Rational choice theory |
Peace et al. (2003) | Piracy intention | Attitude, subjective norms, perceived behavioral control, punishment severity, software cost, punishment certainty | Punishment severity, punishment certainty, and software cost have direct effects on the attitude toward software piracy; punishment certainty has a significant impact on perceived behavioral control | Theory of planned behavior, expected utility theory, deterrence theory |
Wirtz and Kum (2004) | Cheating Behavior | Potential material gain, repeat purchase intention, level of satisfaction, ease of invoking the guarantee, level of morality, shame, self-monitoring, machiavellianism | Potential material gain does not affect consumer cheating, but repeat purchase intention reduces that tendency. High levels of satisfaction, morality, and self-monitoring reduce cheating | Literature |
D'Arcy et al. (2009) | IS Misuse Intention | Perceived certainty of sanctions, perceived severity of sanctions, user awareness | Perceived severity of sanctions is more effective in reducing IS misuse than the certainty of sanctions. The impact of sanction perceptions depends on one’s moral level | General deterrence theory |
Chen et al. (2009) | Use Intention of Pirated Software | Attitude toward pirated software, subjective norms, perceived behavioral control, moral intensity, and moral judgment | Attitude, subjective norms, and perceived behavioral control have positive impacts on the use intention of pirated software. Moral intensity and moral judgment have a joint moderating effect | Theory of planned behavior, moral intensity, and moral judgment |
Myyry et al. (2009) | Compliance with the Information Security Policy | Preconventional moral reasoning, conventional moral reasoning, postconventional moral reasoning, openness to change, conservation | Preconventional moral reasoning is positively related to both hypothetical and actual compliance; conventional moral reasoning correlates negatively with compliance | Theory of cognitive moral development, theory of motivational types of values |
Siponen et al. (2010) | Software Piracy Intentions | Condemning the condemners, denial of injury, metaphor of the ledger, appeal to higher loyalties, defense of necessity, denial of responsibility, denial of the victim, formal sanctions, shame, moral beliefs | Appeal to higher loyalties, condemnation of the condemners, shame, and moral beliefs have a significant impact on software piracy intentions | Neutralization theory, deterrence theory |
Bulgurcu et al. (2010) | Compliance with the IS Policy | Benefit of compliance, cost of compliance, cost of noncompliance, attitude, normative beliefs, self-efficacy | Benefits and costs of compliance have an important impact on attitude. Attitude, normative beliefs, and self-efficacy significantly influence the intention to comply with the IS policy | Rational choice theory, theory of planned behavior |
Ogilvie and Stewart (2010) | Intention to engage in plagiarism | Prior behavior, academic self-efficacy, perceived sanctions, perceived benefits, perceived shame | Academic self-efficacy and perceived benefits significantly affect intentions to engage in plagiarism, while perceived Sanctions is insignificant. Academic self-efficacy can moderate the effects of perceived sanctions on intentions to engage in plagiarism | Rational choice theories, perceptual deterrence theory, self-efficacy theory |
Kroneberg et al. (2010) | Intention to engage in shoplifting and tax fraud | moral norms, Neutralization, instrumental incentives | Only for respondents who do not feel bound by moral norms, instrumental incentives have significant impacts on the intention to engage in shoplifting and tax fraud. Where norms have been strongly internalized, and in the absence of neutralizations, instrumental incentives are irrelevant | Rational choice theories, the situational action theory |
Li et al. (2010) | Intention to comply with internet use policy | Perceived risks detection probability, sanction severity, subjective norms, security risks), perceived benefits, personal norms | Compliance intention is the result of competing influences of perceived benefits, formal sanctions, and security risks. The effect of sanction severity is found to be moderated by personal norms | Rational choice theories |
Liao et al. (2010) | Intention to use pirated software | Perceived risks, attitude, subjective norm, perceived behavioral control | Perceived risks, attitude, and perceived behavioral control have significant impacts on software piracy intentions; the effect of subjective norm is insignificant | Theory of planned behavior |
Phau and Ng (2010) | Attitude and intention to use pirated software | Value consciousness, integrity, personal gratification, normative and informative susceptibility, ethical beliefs, amount of computer usage, social cost of software piracy | Value consciousness and amount of computer usage are positively related to attitude towards pirated software; integrity has a negative correlation. Ethical beliefs and social costs of software piracy positively impact on intention to use pirated software | Theory of planned behavior |
Yoon (2011) | Intention and attitude to digital piracy | Moral obligation, justice, perceived benefit, perceived risk, subjective norm, habit, perceived behavioral control | Moral obligation, justice, attitude, subjective norms, and perceived behavioral control influence digital piracy intentions. Perceived benefit, perceived risk, and habit influence digital piracy attitude | Theory of planned behavior, ethics theory |
Vance and Siponen (2012) | Intention to Violate IS Security Policy | Formal sanctions, informal sanctions, moral beliefs, perceived benefits | Informal sanctions, moral beliefs, and perceived benefits have significant impacts on IS security policy violations; the effect of formal sanctions is insignificant | Rational choice theory |
Goode and Kartas (2012) | Attitude and intention to pirate | Attitude (relative advantage, additional functionality, enjoyment, compatibility, image, software piracy, complexity), subjective norm (family, friends), perceived behavioral control (cost, fear of obsolescence, critical mass, perceived deterrence) | Relative advantage, additional functionality, enjoyment, compatibility, image, software piracy, and complexity have significant impacts on attitude to pirate. Attitude, subjective norm, and perceived behavioral control have significant impacts on intention to pirate | Rational choice theory, theory of planned behavior, deterrence theory |
D'Arcy and Devaraj (2012) | Misuse of information technology resources intention | Formal sanctions (certainty, severity), informal sanctions (social desirability, pressure, moral beliefs), employment context (virtual status, employment level) | A predisposition toward the need for social approval, moral beliefs, and the threat of formal sanctions regarding the behavior are key determinants of technology misuse | Deterrence theory |
Cheng et al. (2013) | IS security policy violation intention | Perceived certainty, perceived severity, social bonds (attachment, commitment, involvement, belief), social pressure (subjective norm, co-worker behavior) | Social bonding, social pressures, and perceived severity of sanctions have significant impacts on IS security policy violations, while perceived certainty of those sanctions is insignificant | Social control theory, deterrence theory |
Chan et al. (2013) | Intention to software piracy | Perceived moral intensity, moral recognition, moral judgment, attitude, subjective norm, perceived behavioral control | Perceived moral intensity, moral recognition, moral judgment, attitude, and subjective norm significantly impact software piracy intention; perceived behavioral control is insignificant | Theory of planned behavior, moral intensity, and moral judgment |
Koklic et al. (2013) | Intention to pirate | Moral intensity, attitude, perceived risk, involvement | Moral intensity and perceived risk have significant impacts on pirate intentions. Involvement is a moderator between attitudes and pirate intentions | Ethical decision-making theories, attitude–behavior theory |
Phau et al. (2014) | Intention to digital piracy | Affect, attitude, moral judgment, self-efficacy, facilitating conditions, habitual conduct, social factors | Social habit, self-efficacy, affect, and attitude have a positive effect on digital piracy intentions, while moral judgment has a negative effect on digital piracy intentions | Theory of planned behavior |
Johnston et al. (2015) | IS Security Policy | Sanctioning rhetoric, fear appeal, formal sanction certainty and severity, informal sanction certainty and severity, sanction celerity | Sanctioning rhetoric enhances the effectiveness of a fear appeal, leading to stronger compliance intention. Informal sanction severity/certainty significantly impacts compliance intention; sanction celerity and formal sanction severity/certainty show insignificant effects | Johnston et al. (2015) |
Dootson et al. (2016) | Consumer’s deviance threshold | Law & policy, perceived risk, norms, intent, perceived outcomes, victim, moral identity, perceived fairness | Law & policy, perceived risk, norms, intent, perceived outcomes, victim, moral identity, and perceived fairness have important impacts on consumers’ deviance threshold | Neutralization theory, deterrence theory |
Arli and Tjiptono (2016) | Attitude and intention to pirate digital products | Moral obligation, perceived benefits, fear of legal Consequences, perceived likelihood of punishment, subjective norms, perceived behavioral control | Consumers’ attitude towards digital piracy strongly influence their intention to pirate digital products; fear of legal consequences and perceived likelihood of punishment are not significant predictors of consumers’ attitude towards digital piracy | Theory of Planned Behavior, Deterrence Theory, Ethics Theory |
Ting et al. (2016) | Counterfeit luxury goods purchase intentions | Information susceptibility, normative susceptibility, value consciousness, perceived risk, integrity, status consumption, materialism | Perceived risk, value consciousness, status consumption, and information and normative susceptibility significantly impact counterfeit luxury goods purchase intentions; the effects of integrity and materialism are insignificant | Theory of reasoned action |
Silic et al. (2017) | Intentions to violate/use shadow IT | Denial of responsibility, appeal to higher loyalties, defense of necessity, denial of injury, metaphor of the ledger, shame, formal sanctions, informal sanctions | Metaphor of the ledger neutralization technique predicts shadow IT intention and actual shadow IT usage. Neutralizations and deterrence effects influence shame | Neutralization theory, deterrence theory |
Currie and Delbosc (2017) | Deliberate and unintentional fare evasion | Honesty attitudes, norms, perceived control, permissive attitudes to evasion, ticketing competence | Honesty attributes, perceived ease of evasion, and permissive attitudes to evasion affect deliberate evasion; honest, ticketing competence, and permissive attitudes affect unintentional evasion | Theory of planned behavior, deterrence theory |
IS security policy compliance intention | Perceived self-efficacy to compliance, perceived sanction severity, perceived descriptive norm, perceived response cost | Sanction severity significantly impacts IS security policy compliance intention mediated by perceived self-efficacy and descriptive norm). No variable moderates the effect of sanction severity on IS security policy compliance intention | General deterrence theory, rational choice theory, protection motivation theory | |
Brillian et al. (2018) | The misuse of motorcycle ride-sharing applications | Security countermeasures, formal sanction, informal sanction, moral beliefs | Moral beliefs have a significant negative impact on misuse intentions, while the effect of perceived sanction certainty is insignificant. Security countermeasures have a significant positive impact on perceived sanctions and moral beliefs | Deterrence theory |
Choi and Song (2018) | IS security policy compliance intention | Commitment, belief, attachment, deterrence | Commitment to organization and belief are positively associated with perceived formal punishment, while attachment is not. Deterrence is positively associated with compliance intention | Social control theory, deterrence theory |
Li et al. (2018) | Violation of internet use policy intention | Procedural justice, perceived deterrence, perceived benefits, low self-control | Perceived deterrence and perceived benefits significantly impact violation of internet use policy intention the latter is a more salient predictor than the former). Self-control and procedural justice moderate the cost–benefit calculus | Rational choice theory |
Counterfeit luxury goods purchase intentions | Moral recognition, moral rationalization, moral judgment, moral decoupling, perceived benefit | Perceived benefit and moral judgment affect counterfeit luxury goods purchase intentions significantly; moral rationalization, moral decoupling, and moral recognition are insignificant | Ethical decision-making theories | |
Safa et al. (2019) | Employees’ information security misbehavior | Deterrence factors, situational crime prevention factors, perceived behavioral control, negative attitude towards misbehavior, subjective norms | Deterrence factors, increased effort, risk, reduced reward, subjective norms, perceived behavioral control, and attitude significantly prevent information security misbehavior; removing excuses and reducing provocations are insignificant | General deterrence theory, situational crime prevention theory, theory of planned behavior |
Bossler (2019) | Intention to commit cyber attacks | Formal sanctions, perceived certainty, perceived severity, perceived informal sanctions, computer skills, and online behavior | Perceived informal sanctions have significant effects on intention to commit cyber attacks, while the effect of formal sanctions is insignificant | Deterrence theory |
Hati et al. (2019) | Intention to pirate | Moral obligation, perceived benefit, fear of legal Consequences, perceived likelihood of punishment, attitude towards piracy, subjective norms, self-efficacy, facilitating condition | Moral obligation has a similar influence on the piracy intention of both the no-piracy and piracy groups. Fear of legal consequences and perceived likelihood of punishment have no significant impact on intention to pirate of the two groups | Ethics theory, deterrence theory, theory of planned behavior |
Rajab and Eydgahi (2019) | Intentions of compliance with information security policies | Attitudes, awareness, vulnerability, perceived behavioral control, severity of sanctions, certainty of detection celerity of sanctions, severity of risks, self-efficacy, response efficacy, response cost, top management support, peer pressure | Perceived vulnerability, response efficacy, and response cost have a strong positive impact on intentions of compliance with information security policies; severe sanctions, close management supervision, peers’ pressure, and attitudes towards information security have a weak impact | Theory of planned behavior, protection motivation theory, general deterrence theory and organizational theory |
Korgaonkar et al. (2020) | Intention to shoplifting | Guardianship capability, shoplifting attitude, motivated offender, perceived behavioral control, subjective norms, suitable targets | Suitable targets, offender motivation, and the absence of capable guardians affect potential offenders’ attitudes, subjective norms, and confidence in their ability to shoplift, which, in turn, all influence the intention to shoplift | The theory of planned behavior and routine activity theory |
Appendix 2
Scenario 1 (inconvenient parking): Mobike system has a usage rule that users are not allowed to park bikes in residential communities. Chen is an ordinary working person. After work, Chen usually takes the subway first and then rides a Mobike back home. Chen usually stops the Mobike downstairs when getting home.
Scenario 2 (random parking): Mobike system has a usage rule that bikes should be parked in the specified locations. Chen is an ordinary working person. Chen rides a Mobike to the bus stop when s/he goes to work every morning. Chen often parks the Mobike on the roadside and rushes to the bus when the bus comes.
See Tables
7 and
8.
Rights and permissions
About this article
Cite this article
Jin, XL., Zhou, Z. & Tian, Y. A Configurational Analysis of the Causes of Consumer Indirect Misbehaviors in Access-Based Consumption. J Bus Ethics 175, 135–166 (2022). https://doi.org/10.1007/s10551-020-04637-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-020-04637-8