Skip to main content
Log in

The Effects of the Dark Triad on Unethical Behavior

  • Original Paper
  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

This article uses behavioral theories to develop an ethical decision-making model that describes how psychological factors affect the development of unethical intentions to commit fraud. We evaluate the effects of the dark triad of personality traits (i.e., psychopathy, Machiavellianism, and narcissism) on fraud intentions and behaviors. We use a combination of survey results, an experiment, and structural equation modeling to empirically test our model. The theoretical insights demonstrate that psychopathy, Machiavellianism, and narcissism affect different parts of the unethical decision-making process. Narcissism motivates individuals to act unethically for their personal benefit and changes their perceptions of their abilities to successfully commit fraud. Machiavellianism motivates individuals not only to act unethically, but also alters perceptions about the opportunities that exist to deceive others. Psychopathy has a prominent effect on how individuals rationalize their fraudulent behaviors. Accordingly, we find that the dark triad elements act in concert as powerful psychological antecedents to fraud behaviors.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. Removing the measurement items reduced the Cronbach’s alpha values in the shortened scales; however, all items continued to exhibit high statistical reliability. To test the effects of reducing the number of measurement items, we compared the results of factor analyses and preliminary tests of our structural model when using five-item and three-item scales. Trimming the scales to three items for each construct did not change the significance of any paths or substantive interpretations of the model or factor structure. These results provide evidence that the measures are reflective and interchangeable, and support the decision to remove redundant items.

References

  • Ajzen, I. (1988). Attitudes, personality, and behavior. Chicago: Dorsey.

    Google Scholar 

  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.

    Google Scholar 

  • Ajzen, I. (2001). Attitudes. Annual Review of Psychology, 52, 27–58.

    Google Scholar 

  • Albrecht, W. S., Albrecht, C. C., Albrecht, C., & Zimbelman, M. (2012). Fraud examination (4th ed.). Mason, OH: South-Western Cengage Learning.

    Google Scholar 

  • Albrecht, C., Albrecht, C. C., Wareham, J., & Fox, P. (2007). The role of power and negotiation in online deception. Journal of Digital Forensics, Security, and Law, 1(4), 29–48.

    Google Scholar 

  • Albrecht, W. S., Romney, M., Cherrington, D., Payne, I., & Roe, A. (1982). How to detect and prevent business fraud. Englewood Cliffs, NJ: Prentice-Hall.

    Google Scholar 

  • Ames, D. R., & Kammrath, L. K. (2004). Mind-reading and metacognition: Narcissism, not actual competence, predicts self-estimated ability. Journal of Nonverbal Behavior, 28, 187–209.

    Google Scholar 

  • Ames, D. R., Rose, P., & Anderson, C. P. (2006). The NPI-16 as a short measure of narcissism. Journal of Research in Personality, 40(4), 440–450.

    Google Scholar 

  • Arthur, W., Woehr, D. J., & Graziano, W. G. (2001). Personality testing in employment settings: Problems and issues in the application of typical selection practices. Personnel Review, 30(6), 657–676.

    Google Scholar 

  • Association of Certified Fraud Examiners (ACFE). (2014). 2014 report to the nation on occupational fraud and abuse. http://www.acfe.com/rttn.aspx.

  • Babiak, P. (1995). When psychopaths go to work: A case study of an industrial psychopath. Applied Psychology: An International Review, 44, 171–188.

    Google Scholar 

  • Babiak, P., & Hare, R. (2006). Snakes in suits: When psychopaths go to work. New York: Harper Collins.

    Google Scholar 

  • Babiak, P., Neumann, C. S., & Hare, R. D. (2010). Corporate psychopathy: Talking the walk. Behavioral Sciences and the Law, 18, 174–193.

    Google Scholar 

  • Bagozzi, B. P. (1992). The self-regulation of attitudes, intentions, and behavior. Social Psychology Quarterly, 55, 178–204.

    Google Scholar 

  • Bandura, A. (1988). Self-regulation of motivation and action through goal systems. In V. Hamilton, G. H. Bower, & N. H. Frijda (Eds.), Cognitive perspectives on emotion and motivation (pp. 37–61). Dordrecht: Kluwer.

    Google Scholar 

  • Banerjee, D., Cronan, T. P., & Jones, T. W. (1998). Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22, 31–60.

    Google Scholar 

  • Barrick, M. R., & Mount, M. K. (1991). The big five personality dimensions and job performance: A meta-analysis. Personnel Psychology, 44(1), 1–26.

    Google Scholar 

  • Baucus, M. S. (1994). Pressure, opportunity, and predisposition: A multivariate model of corporate illegality. Journal of Management, 20, 699–721.

    Google Scholar 

  • Beach, L. R., & Mitchell, T. R. (1978). A contingency model for the selection of decision strategies. The Academy of Management Review, 3(3), 439–449.

    Google Scholar 

  • Bell, T. B., & Carcello, J. V. (2000). A decision aid for assessing the likelihood of fraudulent financial reporting. Auditing: A Journal of Practice and Theory, 19(1), 169–184.

    Google Scholar 

  • Bentler, P. M. (1992). On the fit models to covariance and methodology to the Bulletin. Psychological Bulletin, 112, 400–404.

    Google Scholar 

  • Bergholz, A., De Beer, J., Glahn, S., Moens, M. F., Paaß, G., & Strobel, S. (2010). New filtering approaches for phishing email. Journal of Computer Security, 18(1), 7–35.

    Google Scholar 

  • Bersoff, D. M. (1999). Why good people sometimes do bad things: Motivated reasoning and unethical behavior. Personality and Social Psychology Bulletin, 25, 28–39.

    Google Scholar 

  • Bogart, K., Geis, F. L., Levy, M., & Zimbardo, P. (1970). No dissonance for Machiavellians. Studies in Machiavellianism, 4, 236–259.

    Google Scholar 

  • Bollen, K. A. (1989). Structural equations with latent variables. New York: Wiley.

    Google Scholar 

  • Brief, A. P., Buttram, R. T., & Dukerick, J. M. (2001). Collective corruption in the corporate world: Toward a process model. In M. E. Turner (Ed.), Groups at work: Theory and research. Applied social research (pp. 471–499). Mahwah, NJ: Lawrence Erlbaum Associates Inc.

    Google Scholar 

  • Bürk, H., & Pfitzmann, A. (1990). Value exchange systems enabling security and unobservability. Computers and Security, 9(8), 715–721.

    Google Scholar 

  • Caruso, E. M., & Gino, F. (2011). Blind ethics: Closing one’s eyes polarizes moral judgment and discourages dishonest behavior. Cognition, 118(2), 280–285.

    Google Scholar 

  • Chatterjee, S., Sarker, S., & Valacich, J. (2015). The behavioral roots of IS security: Exploring key factors of unethical IT use. Journal of Management Information Systems, 31(4), 49–87.

    Google Scholar 

  • Choo, F., & Tan, K. (2007). An “American Dream” theory of corporate fraud. Accounting Forum, 31, 203–215.

    Google Scholar 

  • Christie, R., & Geis, F. L. (1970). Studies in Machiavellianism. New York: Academic Press.

    Google Scholar 

  • Christoffersen, D., & Stamp, C. (1995). Examining the relationship between Machiavellianism and paranoia. Psychological Reports, 76, 67–70.

    Google Scholar 

  • Chugh, D., Bazerman, M., & Banaji, M. (2005). Bounded ethicality as a psychological barrier to recognizing conflicts of interest. In D. Moore, D. Cain, G. Loewenstein, & M. Bazerman (Eds.), Conflict of interest: Challenges and solutions in business, law, medicine, and public policy (pp. 74–95). New York: Cambridge University Press.

    Google Scholar 

  • Cleckley, H. (1976). The mask of sanity (5th ed.). St. Louis, MO: Mosby.

    Google Scholar 

  • Cohen, J. (1988). Statistical power analysis for the behavioral sciences (2nd ed.). Hillsdale, NJ: Erlbaum.

    Google Scholar 

  • Cohen, J., Ding, Y., Lesage, C., & Stolowy, H. (2010). Corporate fraud and managers’ behavior: Evidence from the press. Journal of Business Ethics, 95, 271–315.

    Google Scholar 

  • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, 588–608.

    Google Scholar 

  • Cooper, S., & Peterson, C. (1980). Machiavellianism and spontaneous cheating in competition. Journal of Research in Personality, 14(1), 70–75.

    Google Scholar 

  • Cressey, D. R. (1953). Other people’s money. New York: The Free Press.

    Google Scholar 

  • Dahling, J. J., Whitaker, B. G., & Levy, P. E. (2009). The development and validation of a new Machiavellianism scale. Journal of Management, 35, 219–257.

    Google Scholar 

  • Deluga, R. J. (2001). American presidential Machiavellianism: Implications for charismatic leadership and rated performance. The Leadership Quarterly, 12(3), 339–363.

    Google Scholar 

  • Dilla, W. N., Harrison, A. J., Mennecke, B. E., & Janvrin, D. J. (2013). The assets are virtual but the behavior is real: An analysis of fraud in virtual worlds and its implications for the real world. Journal of Information Systems, 27(2), 131–158.

    Google Scholar 

  • Dorminey, J. W., Fleming, A. S., Kranacher, M., & Riley, R. (2012). The evolution of fraud theory. Issues in Accounting Education, 27(2), 555–579.

    Google Scholar 

  • Duchon, D., & Drake, B. (2009). Organizational narcissism and virtuous behavior. Journal of Business Ethics, 85, 301–308.

    Google Scholar 

  • Dunlop, P. D., & Lee, K. (2004). Workplace deviance, organizational citizenship behavior, and business unit performance: The bad apples do spoil the whole barrel. Journal of Organizational Behavior, 25(1), 67–80.

    Google Scholar 

  • Elliot, A. J., & Thrash, T. M. (2001). Achievement goals and the hierarchical model of achievement motivation. Educational Psychology Review, 13(2), 139–156.

    Google Scholar 

  • Emmons, R. A. (1987). Narcissism: Theory and measurement. Journal of Personality and Social Psychology, 52(1), 11–17.

    Google Scholar 

  • Falbo, T. (1977). Multidimensional scaling of power strategies. Journal of Personality and Social Psychology, 35(8), 537–547.

    Google Scholar 

  • Fehr, B., Samsom, D., & Paulhus, D. L. (1992). The construct of Machiavellianism: Twenty years later. In C. D. Spielberger & J. N. Butcher (Eds.), Advances in personality assessment (Vol. 9, pp. 77–116). Hillsdale, NJ: Lawrence Erlbaum Associates.

    Google Scholar 

  • Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobserved variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18, 382–388.

    Google Scholar 

  • Friedman, T. L. (2006). The world is flat [updated and expanded]: A brief history of the twenty first century. New York: Macmillan.

    Google Scholar 

  • Furner, C. P., & George, J. F. (2012). Cultural determinants of media choice for deception. Computers in Human Behavior, 28(4), 1427–1438.

    Google Scholar 

  • Gabriel, M. T., Critelli, J. W., & Ee, J. S. (1994). Narcissistic illusions in self-evaluations of intelligence and attractiveness. Journal of Personality, 62(1), 143–155.

    Google Scholar 

  • Gino, F., & Bazerman, M. H. (2009). When misconduct goes unnoticed: The acceptability of gradual erosion in others’ unethical behavior. Journal of Experimental Social Psychology, 45(4), 708–719.

    Google Scholar 

  • Gino, F., & Pierce, L. (2009). The abundance effect: Unethical behavior in the presence of wealth. Organizational Behavior and Human Decision Processes, 109(2), 142–155.

    Google Scholar 

  • Gino, F., Schweitzer, M. E., Mead, N. L., & Ariely, D. (2010). Unable to resist temptation: How self-control depletion promotes unethical behavior. Organizational Behavior and Human Decision Processes, 115, 191–203.

    Google Scholar 

  • Glover, S. M. (1997). The influence of time pressure and accountability on auditors’ processing of nondiagnostic information. Journal of Accounting Research, 35, 213–226.

    Google Scholar 

  • Gosling, S. D., John, O. P., Craik, K. H., & Robins, R. W. (1998). Do people know how they behave? Self-reported act frequencies compared with on-line codings by observers. Journal of Personality and Social Psychology, 74(5), 1337.

    Google Scholar 

  • Grazioli, S., & Jarvenpaa, S. L. (2000). Perils of internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 30(4), 395–410.

    Google Scholar 

  • Greenberg, J. (2002). Who stole the money, and when? Individual and situational determinants of employee theft. Organizational Behavior and Human Decision Processes, 89(1), 985–1003.

    Google Scholar 

  • Gustafson, S. B. (1999). Out of their own mouths: A conditional reasoning instrument for identifying aberrant self-promoters. In P. Babiak (Chair), Liars of the dark side: Can personality interfere with personality measurement? Symposium conducted at the thirteenth annual conference of the society for industrial and organizational psychology, Atlanta, GA.

  • Gustafson, S. B. (2000). Out of their own mouths II: Continuing support for the validity of a conditional reasoning instrument for identifying aberrant self-promoters. In S. Gustafson (Chair), Personality in the shadows: A continuum of destructiveness. Symposium conducted at the fourteenth annual conference of the society for industrial and organizational psychology, New Orleans, LA.

  • Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis: A global perspective (7th ed.). Upper Saddle River, NJ: Pearson.

  • Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (6th ed.). Upper Saddle River, NJ: Pearson Education Inc.

    Google Scholar 

  • Hare, R. D. (1991). The hare psychopathy checklist revised. Toronto: Multi-Health Systems.

    Google Scholar 

  • Hare, R. D. (1999). Without conscience: The disturbing world of the psychopaths among us. New York: Guilford Press.

    Google Scholar 

  • Harrell, W. A., & Hartnagel, T. (1976). The impact of Machiavellianism and the trustfulness of the victim on laboratory theft. Sociometry, 39, 157–165.

    Google Scholar 

  • Hegarty, W. H., & Sims, H. P., Jr. (1978). Some determinants of unethical decision behavior: An experiment. Journal of Applied Psychology, 63, 451–547.

    Google Scholar 

  • Hershfield, H. E., Cohen, T. R., & Thompson, L. (2012). Short horizons and tempting situations: Lack of continuity to our future selves leads to unethical decision making and behavior. Organizational Behavior and Human Decision Processes, 117(2), 298–310.

    Google Scholar 

  • Hill, T., Smith, N. D., & Mann, M. F. (1987). Role of efficacy expectations in predicting the decision to use advanced technologies: The case of computers. Journal of Applied Psychology, 72(2), 307–313.

    Google Scholar 

  • Hogan, J., & Holland, B. (2003). Using theory to evaluate personality and job-performance relations: A socioanalytic perspective. Journal of Applied Psychology, 88(1), 100–112.

    Google Scholar 

  • Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indices in covariate structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6, 1–55.

    Google Scholar 

  • IC3. (2015). Internet Crime Complaint Center: 2013 Internet Crime Report. Accessed on August 9, 2016. Available at http://www.ic3.gov/media/annualreport/2015_ic3report.pdf.

  • John, O. P., & Robins, R. W. (1994). Accuracy and bias in self-perception: Individual differences in self-enhancement and the role of narcissism. Journal of Personality and Social Psychology, 66(1), 206–219.

    Google Scholar 

  • Johnson, E. N., Kuhn, J. R., Jr., Apostolou, B. A., & Hassell, J. M. (2012). Auditor perceptions of client narcissism as a fraud attitude risk factor. Auditing: A Journal of Practice and Theory, 32(1), 203–219.

    Google Scholar 

  • Jonason, P. K., & Webster, G. D. (2010). The dirty dozen: A concise measure of the dark triad. Psychological Assessment, 22(2), 420–432.

    Google Scholar 

  • Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue contingent model. Academy of Management Review, 16(2), 366–395.

    Google Scholar 

  • Jones, D. N. (2014). Risk in the face of retribution: Psychopathic individuals persist in financial misbehavior among the Dark Triad. Personality and Individual Differences, 67, 109–113.

    Google Scholar 

  • Jones, D. N., & Paulhus, D. L. (2009). Machiavellianism. New York: Guilford Press.

  • Jones, D. N., & Paulhus, D. L. (2011). The role of impulsivity in the dark triad of personality. Personality and Individual Differences, 51(5), 679–682.

    Google Scholar 

  • Kandias, M., Mylonas, A., Virvilis, N., Theoharidou, M., & Gritzalis, D. (2010). An insider threat prediction model. In S. Katsikas, J. Lopez, & M. Soriano (Eds.), In trust, privacy and security in digital business (Vol. 6264, pp. 26–37). Berlin: Springer.

    Google Scholar 

  • Karpman, B. (1941). On the need of separating psychopathy into two distinct clinical types: The symptomatic and the idiopathic. Journal of Criminal Psychopathology, 3, 112–137.

    Google Scholar 

  • Kern, M. C., & Chugh, D. (2009). Bounded ethicality: The perils of loss framing. Psychological Science, 20(3), 378–384.

    Google Scholar 

  • Kernburg, O. F. (1975). Borderline conditions and pathological narcissism. New York: Aronson.

    Google Scholar 

  • KPMG. (2013). Global profiles of the fraudster: White-collar crime-present and future. Available at: http://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublications/global-profilesof-the-fraudster/Documents/global-profiles-of-the-fraudster-v3.pdf.

  • LeBreton, J. M., Binning, J. F., & Adorno, A. J. (2006). Subclinical psychopaths. Comprehensive Handbook of Personality and Psychopathology, 1, 388–411.

    Google Scholar 

  • Lee, K., & Ashton, M. C. (2005). Psychopathy, Machiavellianism, and narcissism in the five factor model and the HEXACO model of personality structure. Personality and Individual Differences, 38(7), 1571–1582.

    Google Scholar 

  • Lee, K., Ashton, M. C., Wiltshire, J., Bourdage, J. S., Visser, B. A., & Gallucci, A. (2013). Sex, power, and money: Prediction from the dark triad and honesty–humility. European Journal of Personality, 27(2), 169–184.

    Google Scholar 

  • Levenson, M. R. (1992). Rethinking psychopathy. Theory and Psychology, 2, 51–71.

    Google Scholar 

  • Levenson, M. R., Kiehl, K. A., & Fitzpatrick, C. M. (1995). Assessing psychopathic attributes in a non-institutionalized population. Journal of Personality and Social Psychology, 68, 151–158.

    Google Scholar 

  • Lewicki, R. J., Poland, T., Minton, J. W., & Sheppard, B. H. (1997). Dishonesty as deviance. A typology of workplace dishonesty and contributing factors. In R. J. Lewicki, R. J. Bies, & B. H. Sheppard (Eds.), Research on negotiation in organizations (Vol. 6, pp. 53–86). Greenwich, CT: JAI Press.

    Google Scholar 

  • Lindell, M. K., & Whitney, D. J. (2001). Accounting for common method variance in cross sectional research designs. Journal of Applied Psychology, 86(1), 114–121.

    Google Scholar 

  • MacCallum, R. C., Browne, M. W., & Sugawara, H. M. (1996). Power analysis and determination of sample size for covariance structure modeling. Psychological Methods, 1(2), 130–149.

    Google Scholar 

  • MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293–334.

    Google Scholar 

  • Maples, J. L., Lamkin, J., & Miller, J. D. (2014). A test of two brief measures of the dark triad: The dirty dozen and short dark triad. Psychological Assessment, 26(1), 326–331.

    Google Scholar 

  • Marett, K., & George, J. F. (2013). Barriers to deceiving other group members in virtual settings. Group Decision and Negotiation, 22(1), 89–115.

    Google Scholar 

  • Marsh, H. W. (1994). Confirmatory factor analysis models of factorial invariance: A multifaceted approach. Structural Equation Modeling: A Multidisciplinary Journal, 1, 5–34.

    Google Scholar 

  • Mazar, N., Amir, O., & Ariely, D. (2008). The dishonesty of honest people: A theory of self concept maintenance. Journal of Marketing Research, 45, 633–644.

    Google Scholar 

  • McHoskey, J. W. (1999). Machiavellianism, intrinsic versus extrinsic goals, and social interest: A self-determination theory analysis. Motivation and Emotion, 23, 267–283.

    Google Scholar 

  • McHoskey, J. W., Worzel, W., & Szyarto, C. (1998). Machiavellianism and psychopathy. Journal of Personality and Social Psychology, 74(1), 192–210.

    Google Scholar 

  • Millon, T. (1990). The disorders of personality. In L. A. Pervin (Ed.), Handbook of personality: Theory and Research (pp. 339–370). New York: Guilford Press.

    Google Scholar 

  • Morales, J., Gendron, Y., & Guénin-Paracini, H. (2014). The construction of the risky individual and vigilant organization: A genealogy of the fraud triangle. Accounting, Organizations and Society, 39(3), 170–194.

    Google Scholar 

  • Morf, C. C., & Rhodewalt, F. (2001). Unraveling the paradoxes of narcissism: A dynamic self-regulatory processing model. Psychological Inquiry, 12, 177–196.

    Google Scholar 

  • Murphy, P. R., & Dacin, M. T. (2011). Psychological pathways to fraud: Understanding and preventing fraud in organizations. Journal of Business Ethics, 101(4), 601–618.

    Google Scholar 

  • Nathanson, C., Paulhus, D. L., & Williams, K. M. (2006). Personality and misconduct correlates of body modification and other cultural deviance markers. Journal of Research in Personality, 40, 779–802.

    Google Scholar 

  • Nikitkov, A., & Bay, D. (2008). Online auction fraud: Ethical perspective. Journal of Business Ethics, 79(3), 235–244.

    Google Scholar 

  • Nikitkov, A. N., Stone, D. N., & Miller, T. C. (2014). Internal controls, routine activity theory (RAT), and sustained online auction deception: A longitudinal analysis. Journal of Information Systems, 28(1), 311–337.

    Google Scholar 

  • Nunamaker, J. F., Dennis, A. R., Valacich, J. S., Vogel, D., & George, J. F. (1991). Electronic meeting systems. Communications of the ACM, 34(7), 40–61.

    Google Scholar 

  • O’Boyle, E. H., Jr., Forsyth, D. R., Banks, G. C., & McDaniel, M. A. (2012). A meta-analysis of the dark triad and work behavior: A social exchange perspective. Journal of Applied Psychology, 97(3), 557–579.

    Google Scholar 

  • Palfrey, J., & Gasser, U. (2013). Born digital: Understanding the first generation of digital natives. New York: Basic Books.

    Google Scholar 

  • Paulhus, D. L. (1998). Interpersonal and intrapsychic adaptiveness of trait self-enhancement: A mixed blessing? Journal of Personality and Social Psychology, 74(5), 1197–1208.

    Google Scholar 

  • Paulhus, D. L. (2014). Toward a taxonomy of dark personalities. Current Directions in Psychological Science, 23(6), 421–426.

    Google Scholar 

  • Paulhus, D. L., & Williams, K. M. (2002). The dark triad of personality: Narcissism, Machiavellianism, and psychopathy. Journal of Research in Personality, 36(6), 556–563.

    Google Scholar 

  • Podsakoff, P. M., MacKenzie, S. B., & Podsakoff, N. P. (2012). Sources of method bias in social science research and recommendations on how to control it. Annual Review of Psychology, 65, 539–569.

    Google Scholar 

  • Ramamoorti, S. (2008). The psychology and sociology of fraud: Integrating the behavioral sciences component into fraud and forensic accounting curricula. Issues in Accounting Education, 23(4), 521–533.

    Google Scholar 

  • Ramos, M. (2003). Auditors’ responsibility for fraud detection. Journal of Accountancy, 195(1), 28–36.

    Google Scholar 

  • Raskin, R., & Hall, T. (1981). The narcissistic personality inventory: Alternate form reliability and further evidence of construct validity. Journal of Personality Assessment, 45, 159–162.

    Google Scholar 

  • Rest, J. R. (1986). Moral development: Advances in research and theory. New York: Praeger Publishers.

    Google Scholar 

  • Rest, J. R. (1994). Moral development in the professions: Psychology and applied ethics. London: Psychology Press.

    Google Scholar 

  • Rest, J. R., Bebeau, M. J., & Thoma, S. J. (1999). Postconventional moral thinking: A neo-Kohlbergian approach. London: Psychology Press.

    Google Scholar 

  • Reynolds, S. J. (2006). Moral awareness and ethical predispositions: Investigating the role of individual differences in the recognition of moral issues. Journal of Applied Psychology, 91(1), 233–243.

    Google Scholar 

  • Rijesbilt, A., & Commandeur, H. (2013). Narcissus enters the courtroom: CEO narcissism and fraud. Journal of Business Ethics, 117, 413–429.

    Google Scholar 

  • Robins, R. W., & Beer, J. S. (2001). Positive illusions about the self: Short-term benefits and long-term costs. Journal of Personality and Social Psychology, 80, 340–352.

    Google Scholar 

  • Robinson, S. L., & Morrison, E. W. (1995). Psychological contracts and OCB: The effect of unfulfilled obligations on civic virtue behavior. Journal of Organizational Behavior, 16(3), 289–298.

    Google Scholar 

  • Rodgers, W., Söderbom, A., & Guiral, A. (2014). Corporate social responsibility enhanced control systems reducing the likelihood of fraud. Journal of Business Ethics, 131, 871–882.

    Google Scholar 

  • Roman, S. (2007). The ethics of online retailing: A scale development and validation from the consumers’ perspective. Journal of Business Ethics, 72(2), 131–148.

    Google Scholar 

  • Rosenthal, S. A., & Pittinsky, T. L. (2006). Narcissistic leadership. The Leadership Quarterly, 17(6), 617–633.

    Google Scholar 

  • Ross, W. T., Jr., & Robertson, D. C. (2000). Lying: The impact of decision context. Business Ethics Quarterly, 10, 409–440.

    Google Scholar 

  • Rosse, J. G., Stecher, M. D., Miller, J. L., & Levin, R. A. (1998). The impact of response distortion on preemployment personality testing and hiring decisions. Journal of Applied Psychology, 83(4), 634–644.

    Google Scholar 

  • Sarker, S., Sarker, S., Chatterjee, S., & Valacich, J. S. (2010). Media effects on group collaboration: An empirical examination in an ethical decision-making context. Decision Sciences, 41(4), 887–931.

    Google Scholar 

  • Schultz, E. E. (2002). A framework for understanding and predicting insider attacks. Computers and Security, 21(6), 526–531.

    Google Scholar 

  • Schweitzer, M., & Gibson, D. (2008). Fairness, feelings, and ethical decision making: Consequences of violating community standards of fairness. Journal of Business Ethics, 77, 287–301.

    Google Scholar 

  • Schweitzer, M., Ordonez, L., & Douma, B. (2004). The role of goal setting in motivating unethical behavior. Academy of Management Journal, 47, 422–432.

    Google Scholar 

  • Shaw, E. D. (2006). The role of behavioral research and profiling in malicious cyber insider investigations. Digital Investigation, 3(1), 20–31.

    Google Scholar 

  • Shover, N., & Hochstetler, A. (2005). Choosing white-collar crime. Cambridge: Cambridge University Press.

    Google Scholar 

  • Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518.

    Google Scholar 

  • Spain, S. M., Harms, P., & LeBreton, J. M. (2014). The dark side of personality at work. Journal of Organizational Behavior, 35(S1), S41–S60.

    Google Scholar 

  • Stone, D. N. (2015). Post-hunton: Reclaiming our integrity and literature. Journal of Information Systems, 29(2), 211–227.

    Google Scholar 

  • Street, M., & Street, V. L. (2006). The effects of escalating commitment on ethical decision making. Journal of Business Ethics, 64(4), 343–356.

    Google Scholar 

  • Sutherland, E. H. (1983). White collar crime: The uncut version. New Haven, CT: Yale University Press.

    Google Scholar 

  • Tade, O., & Aliyu, I. (2011). Social organization of internet fraud among university undergraduates in Nigeria. International Journal of Cyber Criminology, 5(2), 860–875.

    Google Scholar 

  • Tang, T. L. P., Chen, Y. J., & Sutarso, T. (2008). Bad applies in bad (business) barrels: The love of money, Machiavellianism, risk tolerance, and unethical behavior. Management Decision, 46, 243–263.

    Google Scholar 

  • Tenbrunsel, A. E., & Messick, D. M. (2004). Ethical fading: The role of self-deception in unethical behavior. Social Justice Research, 17, 223–236.

    Google Scholar 

  • Tett, R. P., & Meyer, J. P. (1993). Job satisfaction, organizational commitment, turnover intentions, and turnover: Path analyses based on meta-analytic findings. Personnel Psychology, 46, 259–293.

    Google Scholar 

  • Trevino, L. K. (1986). Ethical decision making in organizations: A person-situation interactionist model. Academy of Management Review, 11, 601–617.

    Google Scholar 

  • Trevino, L. K., & Youngblood, S. A. (1990). Bad apples in bad barrels: A causal analysis of ethical decision-making behavior. Journal of Applied Psychology, 75, 378–385.

    Google Scholar 

  • Warkentin, M., & Willison, R. (2009). Behavioral and policy issues in information systems security: The insider threat. European Journal of Information Systems, 18(2), 101–105.

    Google Scholar 

  • Williams, K. M., & Paulhus, D. L. (2004). Factor structure of the self-report psychopathy scale (SRP-II) in non-forensic samples. Personality and Individual Differences, 33, 1520–1530.

    Google Scholar 

  • Williamson, O. (1985). The economic institutions of capitalism. New York: Free Press.

    Google Scholar 

  • Wolfe, D., & Hermanson, D. (2004). The fraud diamond: Considering the four elements of fraud. The CPA Journal, 74(12), 38–42.

    Google Scholar 

  • Wolfinbarger, M., & Gilly, M. C. (2003). eTailQ: Dimensionalizing, measuring and predicting etail quality. Journal of Retailing, 79(3), 183–198.

    Google Scholar 

  • Yam, K. C., Chen, X. P., & Reynolds, S. J. (2014). Ego depletion and its paradoxical effects on ethical decision making. Organizational Behavior and Human Decision Processes, 124(2), 204–214.

    Google Scholar 

  • Zahra, S. A., Priem, R. L., & Rasheed, A. (2005). The antecedents and consequences of top management fraud. Journal of Management, 31(6), 803–828.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrew Harrison.

Ethics declarations

Conflict of interest

Andrew Harrison, James Summers and Brian Mennecke declares that they have no conflict of interest.

Human and Animal Rights

All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Helsinki Declaration and its later amendments or comparable ethical standards.

Informed Consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Brian Mennecke passed away during the revision of the manuscript and is no longer at Iowa State University. Brian was at Iowa State University during the writing and revision of the manuscript.

Appendix

Appendix

See Tables 4, 5, 6 and 7.

Table 4 Scale development construct reliability and validity
Table 5 Scale development pattern matrix
Table 6 Comparison of factor structures
Table 7 Tests of differential effects using experiment data

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Harrison, A., Summers, J. & Mennecke, B. The Effects of the Dark Triad on Unethical Behavior. J Bus Ethics 153, 53–77 (2018). https://doi.org/10.1007/s10551-016-3368-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-016-3368-3

Keywords

Navigation