Skip to main content

Advertisement

Log in

A Configurational Analysis of the Causes of Consumer Indirect Misbehaviors in Access-Based Consumption

  • Original Paper
  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

Consumer indirect misbehavior in access-based consumption is a significant challenge for enterprises. The literature is in short of a deep understanding of the antecedent conditions of consumer indirect misbehavior in this context and limited by inconsistent findings, calling for developing a holistic and integrative theoretical framework. This study integrates three commonly used theoretical perspectives in the consumer misbehavior literature (i.e., deterrence, rational decision-making, and ethical decision-making) to present holistic archetypes of consumer indirect misbehavior formation. In accordance with this theoretical objective, we adopted an emerging approach for configurational analysis, i.e., fuzzy-set qualitative comparative analysis (fsQCA), to analyze the complex combinations of six influencing factors. We collected data using a scenario-based field survey of 264 experienced consumers of a popular bike-sharing service in China. The scenarios were developed based on relevant literature and a Delphi study. The fsQCA results reveal multiple configurations for high and low levels of consumer misbehavior intention. Specifically, perceived benefits and moral definition play important roles, while the effect of sanctions is highly dependent on other factors. These results lead us to derive three theoretical propositions for antecedent conditions leading to consumers’ indirect misbehavior intentions in access-based consumption. This study enriches our understanding of the causes of misbehavior and provides novel insights for management practitioners to take appropriate countermeasures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Notes

  1. We appreciate an anonymous reviewer for raising this point.

  2. We appreciate the anonymous reviewers for making this point.

  3. We owe our thanks to an anonymous reviewer for making this point.

References

  • Akbari, M., Abdolvand, M. A., & Ghaffari, F. (2016). Developing a model in antecedents of consumer misbehavior on chain stores. Revista Brasileira de Marketing, 15(2), 146–163.

    Google Scholar 

  • Akers, R. L. (1990). Rational choice, deterrence, and social learning theory in criminology: The path not taken. The Journal of Criminal Law and Criminology, 81(3), 653–676.

    Google Scholar 

  • Arli, D., & Tjiptono, F. (2016). Consumer digital piracy behaviour among youths: Insights from Indonesia. Asia Pacific Journal of Marketing and Logistics, 28(5), 898–922.

    Google Scholar 

  • Bachman, R., Paternoster, R., & Ward, S. (1992). The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault. Law & Society Review, 26(2), 343–372.

    Google Scholar 

  • Banerjee, D., Cronan, T. P., & Jones, T. W. (1998). Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22(1), 31–60.

    Google Scholar 

  • Bardhi, F., & Eckhardt, G. M. (2012). Access-based consumption: The case of car sharing. Journal of Consumer Research, 39(4), 881–898.

    Google Scholar 

  • Bitner, M. J., Booms, B. H., & Mohr, L. A. (1994). Critical service encounters: The employee's viewpoint. Journal of Marketing, 58(4), 95–106.

    Google Scholar 

  • Bossler, A. M. (2019). Perceived formal and informal sanctions on the willingness to commit cyber attacks against domestic and foreign targets. Journal of Crime and Justice, 42(5), 599–615.

    Google Scholar 

  • Brillian, M. T., Sucahyo, Y. G., Ruldeviyani, Y., Gandhi, A., & IEEE (2018). Revealing the misuse of motorcycle ride-sharing applications using extended deterrence theory approach. In 2018 International Conference on Advanced Computer Science and Information Systems (pp. 131–135, International Conference on Advanced Computer Science and Information Systems).

  • Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548.

    Google Scholar 

  • Celestine, N. A., Leighton, C., & Perryer, C. (2018). A multifocal and integrative view of the influencers of ethical attitudes using qualitative configurational analysis. Journal of Business Ethics, 162(1), 103–122.

    Google Scholar 

  • Chan, R. Y. K., Ma, K. H. Y., & Wong, Y. H. (2013). The software piracy decision-making process of Chinese computer users. The Information Society, 29(4), 203–218.

    Google Scholar 

  • Chang, M.-L., & Cheng, C.-F. (2014). How balance theory explains high-tech professionals' solutions of enhancing job satisfaction. Journal of Business Research, 67(9), 2008–2018.

    Google Scholar 

  • Chen, J., Teng, L., & Liao, Y. (2018b). Counterfeit luxuries: does moral reasoning strategy influence consumers’ pursuit of counterfeits? Journal of Business Ethics, 151(1), 249–264.

    Google Scholar 

  • Chen, M., Wang, D., Sun, Y., Waygood, E. O. D., & Yang, W. (2018a). A comparison of users’ characteristics between station-based bikesharing system and free-floating bikesharing system: Case study in Hangzhou, China. Transportation, 47(2), 689–704.

    Google Scholar 

  • Chen, M.-F., Pan, C.-T., & Pan, M.-C. (2009). The joint moderating impact of moral intensity and moral judgment on consumer’s use intention of pirated software. Journal of Business Ethics, 90(3), 361–373.

    Google Scholar 

  • Chen, X., Wu, D., Chen, L., & Teng, J. K. L. (2018c). Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables. Information & Management, 55(8), 1049–1060.

    Google Scholar 

  • Chen, Y. (2009). Possession and access: Consumer desires and value perceptions regarding contemporary art collection and exhibit visits. Journal of Consumer Research, 35(6), 925–940.

    Google Scholar 

  • Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447–459.

    Google Scholar 

  • Chiang, E. P., & Assane, D. (2009). Estimating the willingness to pay for digital music. Contemporary Economic Policy, 27(4), 512–522.

    Google Scholar 

  • Choi, M., & Song, J. (2018). Social control through deterrence on the compliance with information security policy. Soft Computing, 22(20), 6765–6772.

    Google Scholar 

  • Cihan, A., & Tittle, C. R. (2019). Self-control, sanction threats, temptation, and crime: Examining contingencies of self-control in a cross-national context. Crime & Delinquency, 65(4), 555–580.

    Google Scholar 

  • Craft, J. L. (2013). A review of the empirical ethical decision-making literature: 2004–2011. Journal of Business Ethics, 117(2), 221–259.

    Google Scholar 

  • Currie, G., & Delbosc, A. (2017). An empirical model for the psychology of deliberate and unintentional fare evasion. Transport Policy, 54, 21–29.

    Google Scholar 

  • D'Arcy, J., & Devaraj, S. (2012). Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43(6), 1091–1124.

    Google Scholar 

  • D'Arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20(6), 643–658.

    Google Scholar 

  • D'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98.

    Google Scholar 

  • Daunt, K. L., & Harris, L. C. (2011). Customers acting badly: Evidence from the hospitality industry. Journal of Business Research, 64(10), 1034–1042.

    Google Scholar 

  • Daunt, K. L., & Harris, L. C. (2012). Motives of dysfunctional customer behavior: An empirical study. Journal of Services Marketing, 26(4), 293–308.

    Google Scholar 

  • Dootson, P., Johnston, K. A., Beatson, A., & Lings, I. (2016). Where do consumers draw the line? Factors informing perceptions and justifications of deviant consumer behaviour. Journal of Marketing Management, 32(7–8), 750–776.

    Google Scholar 

  • Dul, J. (2016). Identifying single necessary conditions with NCA and fsQCA. Journal of Business Research, 69(4), 1516–1523.

    Google Scholar 

  • Edbring, E. G., Lehner, M., & Mont, O. (2016). Exploring consumer attitudes to alternative models of consumption: Motivations and barriers. Journal of Cleaner Production, 123, 5–15.

    Google Scholar 

  • Eliason, S. L., & Dodder, R. A. (1999). Techniques of neutralization used by deer poachers in the western united states: A research note. Deviant Behavior: An Interdisciplinary Journal, 20, 233–252.

    Google Scholar 

  • Fisher, R. J. (1993). Social desirability bias and the validity of indirect questioning. Journal of Consumer Research, 20(2), 303–315.

    Google Scholar 

  • Fisk, R., Grove, S., Harris, L. C., Keeffe, D. A., Reynolds, K. L. D., Russell-Bennett, R., et al. (2010). Customers behaving badly: A state of the art review, research agenda and implications for practitioners. Journal of Services Marketing, 24(6), 417–429.

    Google Scholar 

  • Fiss, P. C. (2007). A set-theoretic approach to organizational configurations. Academy of Management Review, 32(4), 1180–1198.

    Google Scholar 

  • Fiss, P. C. (2011). Building better causal theories: A fuzzy set approach to typologies in organization research. Academy of Management Journal, 54(2), 393–420.

    Google Scholar 

  • Fullerton, R. A., & Punj, G. (2004). Repercussions of promoting an ideology of consumption: consumer misbehavior. Journal of Business Research, 57(11), 1239–1249.

    Google Scholar 

  • Furnari, S., Crilly, D., Misangyi, V. F., Greckhamer, T., Fiss, P. C., & Aguilera, R. (2020). Capturing causal complexity: Heuristics for configurational theorizing. Academy of Management Review. https://doi.org/10.5465/amr.2019.0298.

    Article  Google Scholar 

  • Fussey, P. (2009). An economy of choice? Terrorist decision-making and criminological rational choice theories reconsidered. Security Journal, 24(1), 85–99.

    Google Scholar 

  • Gibbs, J. P. (1968). Crime, punishment, and deterrence. The Southwestern Social Science Quarterly, 48(4), 515–530.

    Google Scholar 

  • Goode, S., & Kartas, A. (2012). Exploring software piracy as a factor of video game console adoption. Behaviour & Information Technology, 31(6), 547–563.

    Google Scholar 

  • Grasmick, H. G., & Bursik, R. J. (1990). Conscience, significant others, and rational choice: Extending the deterrence model. Law & Society Review, 24(3), 837–862.

    Google Scholar 

  • Greckhamer, T. (2016). CEO compensation in relation to worker compensation across countries: The configurational impact of country-level institutions. Strategic Management Journal, 37(4), 793–815.

    Google Scholar 

  • Greckhamer, T., Misangyi, V. F., & Fiss, P. C. (2013). Chapter 3 the two QCAs: From a small-N to a large-N set theoretic approach. In Configurational theory and methods in organizational research (pp. 49–75, Research in the Sociology of Organizations).

  • Gu, T., Kim, I., & Currie, G. (2019). To be or not to be dockless: Empirical analysis of dockless bikeshare development in China. Transportation Research Part A: Policy and Practice, 119, 122–147.

    Google Scholar 

  • Guo, Y., Zhou, J., Wu, Y., & Li, Z. (2017). Identifying the factors affecting bike-sharing usage and degree of satisfaction in Ningbo, China. PLoS ONE, 12(9), e0185100.

    Google Scholar 

  • Harris, L. C., & Daunt, K. (2013). Managing customer misbehavior challenges and strategies. Journal of Services Marketing, 27(4), 281–293.

    Google Scholar 

  • Harris, L. C., & Reynolds, K. L. (2003). The consequences of dysfunctional customer behavior. Journal of Service Research, 6(2), 144–161.

    Google Scholar 

  • Hartl, B., Hofmann, E., & Kirchler, E. (2016). Do we need rules for “what's mine is yours”? Governance in collaborative consumption communities. Journal of Business Research, 69(8), 2756–2763.

    Google Scholar 

  • Hati, S. R. H., Fitriasih, R., & Safira, A. (2019). E-textbook piracy behavior. Journal of Information, Communication and Ethics in Society, 18(1), 105–123.

    Google Scholar 

  • Hirsh, J. B., Lu, J. G., & Galinsky, A. D. (2018). Moral utility theory: Understanding the motivation to behave (un)ethically. Research in Organizational Behavior, 38, 43–59.

    Google Scholar 

  • Hunt, S. D., & Vitell, S. (1986). A general theory of marketing ethics. Journal of MacroMarketing, 6, 5–16.

    Google Scholar 

  • iResearch (2017). Research report on shared-bike services in China, in Chinese.

  • Jia, L., Liu, X., & Liu, Y. (2018). Impact of different stakeholders of bike-sharing industry on users’ intention of civilized use of bike-sharing. Sustainability, 10(5), 1437–1463.

    Google Scholar 

  • Johnston, A. C., Warkentin, M., & Siponen, M. (2015). An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113–134.

    Google Scholar 

  • Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. Academy of Management Review, 16(2), 366–395.

    Google Scholar 

  • Klepper, S., & Nagin, D. (1989). The deterrent effect of perceived certainty and severity of punishment revisited. Criminology, 27(4), 721–746.

    Google Scholar 

  • Koklic, M. K., Vida, I., Bajde, D., & Culiberg, B. (2013). The study of perceived adverse effects of digital piracy and involvement: Insights from adult computer users. Behaviour & Information Technology, 33(3), 225–236.

    Google Scholar 

  • Korgaonkar, P. K., Gironda, J. T., Petrescu, M., Krishen, A. S., & Mangleburg, T. F. (2020). Preventing shoplifting: Exploring online comments to propose a model. Psychology & Marketing, 37(1), 141–153.

    Google Scholar 

  • Kroneberg, C., Heintze, I., & Mehlkop, G. (2010). The interplay of moral norms and instrumental incentives in crime causation. Criminology, 48(1), 259–294.

    Google Scholar 

  • Lan, J., Ma, Y., Zhu, D., Mangalagiu, D., & Thornton, T. (2017). Enabling value co-creation in the sharing economy: The case of mobike. Sustainability, 9(9), 1504–1524.

    Google Scholar 

  • Lawson, S. J., Gleim, M. R., Perren, R., & Hwang, J. (2016). Freedom from ownership: An exploration of access-based consumption. Journal of Business Research, 69, 2615–2623.

    Google Scholar 

  • Lee, J.-N., Park, Y., Straub, D. W., & Koo, Y. (2019). Holistic archetypes of it outsourcing strategy: A contingency fit and configurational approach. MIS Quarterly, 43(4), 1201–1225.

    Google Scholar 

  • Leischnig, A., & Kasper-Brauer, K. (2015). Employee adaptive behavior in service enactments. Journal of Business Research, 68(2), 273–280.

    Google Scholar 

  • Leischnig, A., & Woodside, A. G. (2019). Who approves fraudulence? Configurational causes of consumers’ unethical judgments. Journal of Business Ethics, 158(3), 713–726.

    Google Scholar 

  • Li, H., Luo, X., Zhang, J., & Sarathy, R. (2018). Self-control, organizational context, and rational choice in Internet abuses at work. Information & Management, 55(3), 358–367.

    Google Scholar 

  • Li, H., Zhang, J., & Sarathy, R. (2010). Understanding compliance with internet use policy from the perspective of rational choice theory. Decision Support Systems, 48(4), 635–645.

    Google Scholar 

  • Liao, C., Lin, H.-N., & Liu, Y.-P. (2010). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91(2), 237–252.

    Google Scholar 

  • Liu, Y., Mezei, J., Kostakos, V., & Li, H. (2015). Applying configurational analysis to IS behavioural research: A methodological alternative for modelling combinatorial complexities. Information Systems Journal, 27(1), 59–89.

    Google Scholar 

  • Lou, L., & Koh, J. (2018). Deterrence and reciprocity approaches for enhancing user participation in the sharing economy. PACIS 2018 Proceedings, 334.

  • Lovelock, C., & Gummesson, E. (2004). Whither services marketing? In search of a new paradigm and fresh perspectives. Journal of Service Research, 7(1), 20–41.

    Google Scholar 

  • Ma, S., Gu, H., Hampson, D. P., & Wang, Y. (2019). Enhancing customer civility in the peer-to-peer economy: Empirical evidence from the hospitality sector. Journal of Business Ethics. https://doi.org/10.1007/s10551-019-04128-5.

    Article  Google Scholar 

  • Ma, Y., Lan, J., Thornton, T., Mangalagiu, D., & Zhu, D. (2018). Challenges of collaborative governance in the sharing economy: The case of free-floating bike sharing in Shanghai. Journal of Cleaner Production, 197, 356–365.

    Google Scholar 

  • Misangyi, V. F., Greckhamer, T., Furnari, S., Fiss, P. C., Crilly, D., & Aguilera, R. (2017). Embracing causal complexity: The emergence of a neo-configurational perspective. Journal of Management, 43(1), 255–282.

    Google Scholar 

  • Mitchell, V. W., Balabanis, G., Schlegelmilch, B. B., & Cornwell, T. B. (2009). Measuring unethical consumer behavior across four countries. Journal of Business Ethics, 88(2), 395–412.

    Google Scholar 

  • Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285–311.

    Google Scholar 

  • Mulder, L. B., Verboon, P., & De Cremer, D. (2009). Sanctions and moral judgments: The moderating effect of sanction severity and trust in authorities. European Journal of Social Psychology, 39(2), 255–269.

    Google Scholar 

  • Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18(2), 126–139.

    Google Scholar 

  • Nagin, D. S., & Paternoster, R. (1993). Enduring individual differences and rational choice theories of crime. Law & Society Review, 27(3), 467–496.

    Google Scholar 

  • Ogilvie, J., & Stewart, A. (2010). The integration of rational choice and self-efficacy theories: A situational analysis of student misconduct. Australian & New Zealand Journal of Criminology, 43(1), 130–155.

    Google Scholar 

  • Ordanini, A., Parasuraman, A., & Rubera, G. (2014). When the recipe is more important than the ingredients: A qualitative comparative analysis (QCA) of service innovation configurations. Journal of Service Research, 17(2), 134–149.

    Google Scholar 

  • Park, Y., Sawy, O. A. E., & Fiss, P. C. (2017). The role of business intelligence and communication technologies in organizational agility: A configurational approach. Journal of the Association for Information Systems, 18(9), 648–686.

    Google Scholar 

  • Paternoster, R. (2010). How much do we really know about criminal deterrence? The Journal of Criminal Law & Criminology, 100(3), 765–824.

    Google Scholar 

  • Paternoster, R., & Simpson, S. (1996). Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law & Society Review, 30(3), 549–584.

    Google Scholar 

  • Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177.

    Google Scholar 

  • Pearson, F. S., & Weiner, N. A. (1985). Toward an intergration of criminological theories. Journal of Criminal Law and Criminology, 76(1), 116–150.

    Google Scholar 

  • Phau, I., Lim, A., Liang, J., & Lwin, M. (2014). Engaging in digital piracy of movies: A theory of planned behaviour approach. Internet Res, 24(2), 246–266.

    Google Scholar 

  • Phau, I., & Ng, J. (2010). Predictors of usage intentions of pirated software. Journal of Business Ethics, 94(1), 23–37.

    Google Scholar 

  • Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.

    Google Scholar 

  • Poppelaars, F., Bakker, C., & van Engelen, J. (2018). Does access trump ownership? Exploring consumer acceptance of access-based consumption in the case of smartphones. Sustainability, 10(7), 2133.

    Google Scholar 

  • Prado, A. M., & Woodside, A. G. (2014). Deepening understanding of certification adoption and non-adoption of international-supplier ethical standards. Journal of Business Ethics, 132(1), 105–125.

    Google Scholar 

  • Ragin, C. C. (2006). Set relations in social research: Evaluating their consistency and coverage. Political Analysis, 14(3), 291–310.

    Google Scholar 

  • Ragin, C. C. (2008). Redesigning social inquiry: Fuzzy sets and beyond. Chicago, IL: University of Chicago Press.

    Google Scholar 

  • Rajab, M., & Eydgahi, A. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security, 80, 211–223.

    Google Scholar 

  • Reynolds, K. L., & Harris, L. C. (2006). Deviant customer behavior: An exploration of frontline employee tactics. Journal of Marketing Theory and Practice, 14(2), 95–111.

    Google Scholar 

  • Rifkin, J. (2000). The age of access: The new culture of hypercapitalism where all of life is a paid-for experience. New York: Penguin.

    Google Scholar 

  • Roos, D., & Hahn, R. (2017). Understanding collaborative consumption: An extension of the theory of planned behavior with value-based personal norms. Journal of Business Ethics, 158(3), 679–697.

    Google Scholar 

  • Safa, N. S., Maple, C., Furnell, S., Azad, M. A., Perera, C., Dabbagh, M., et al. (2019). Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems, 97, 587–597.

    Google Scholar 

  • Safa, N. S., Maple, C., Watson, T., & Von Solms, R. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of Information Security and Applications, 40, 247–257.

    Google Scholar 

  • Schaefers, T. (2013). Exploring carsharing usage motives: A hierarchical means-end chain analysis. Transportation Research Part A: Policy and Practice, 47, 69–77.

    Google Scholar 

  • Schaefers, T., Lawson, S. J., & Kukar-Kinney, M. (2016a). How the burdens of ownership promote consumer usage of access-based services. Mark Lett, 27(3), 569–577.

    Google Scholar 

  • Schaefers, T., Wittkowski, K., Reynolds, S. B. N., & Ferraro, R. (2016). Contagious effects of customer misbehavior in access-based services. Journal of Service Research, 19(1), 3–21.

    Google Scholar 

  • Schneider, C. Q., & Wagemann, C. (2012). Set-theoretic methods for the social sciences. Cambridge: Cambridge University Press.

    Google Scholar 

  • Schwartz, M. S. (2015). Ethical decision-making theory: An integrated approach. Journal of Business Ethics, 139(4), 755–776.

    Google Scholar 

  • Silic, M., Barlow, J. B., & Back, A. (2017). A new perspective on neutralization and deterrence: Predicting shadow IT usage. Information & Management, 54(8), 1023–1037.

    Google Scholar 

  • Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487–502.

    Google Scholar 

  • Siponen, M., Vance, A., & Willison, R. New insights for an old problem: Explaining software piracy through neutralization theory. In Proceedings of the 43rd Hawaii International Conference on System Sciences, 2010.

  • Skarmeas, D., Leonidou, C. N., & Saridakis, C. (2013). Examining the role of CSR skepticism using fuzzy-set qualitative comparative analysis. Journal of Business Research, 67(9), 1796–1805.

    Google Scholar 

  • Sparks, P., & Shepherd, R. (2002). The role of moral judgments within expectancy-value-based attitude-behavior models. Ethics & Behavior, 12(4), 299–321.

    Google Scholar 

  • Steenhaut, S., & Kenhove, P. V. (2006). The mediating role of anticipated guilt in consumers’ ethical decision-making. Journal of Business Ethics, 69(3), 269–288.

    Google Scholar 

  • Stevens, B. (2008). Corporate ethical codes: Effective instruments for influencing behavior. Journal of Business Ethics, 78(4), 601–609.

    Google Scholar 

  • Straub, D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255–276.

    Google Scholar 

  • Sun, Y. (2018). Sharing and riding: How the dockless bike sharing scheme in China shapes the city. Urban Science, 2(3), 68–87.

    Google Scholar 

  • Tho, N. D., & Trang, N. T. M. (2015). Can knowledge be transferred from business schools to business organizations through in-service training students? SEM and fsQCA findings. Journal of Business Research, 68(6), 1332–1340.

    Google Scholar 

  • Ting, M.-S., Goh, Y.-N., & Isa, S. M. (2016). Determining consumer purchase intentions toward counterfeit luxury goods in Malaysia. Asia Pacific Management Review, 21(4), 219–230.

    Google Scholar 

  • Tsaur, S.-H., Cheng, T.-M., & Hong, C.-Y. (2019). Exploring tour member misbehavior in group package tours. Tourism Management, 71, 34–43.

    Google Scholar 

  • Urry, J. (2005). The complexity turn. Theory, Culture & Society, 22(5), 1–14.

    Google Scholar 

  • Vance, A., Fellow, S. J. B., Siponen, M. T., & Straub, D. W. (2019). Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Information & Management, 57(4), 103212.

    Google Scholar 

  • Vance, A., & Siponen, M. T. (2012). IS security policy violations: A rational choice perspective. Journal of Organizational and End User Computing, 24(1), 21–41.

    Google Scholar 

  • Veríssimo, J. M. C. (2016). Enablers and restrictors of mobile banking app use: A fuzzy set qualitative comparative analysis (fsQCA). Journal of Business Research, 69(11), 5456–5460.

    Google Scholar 

  • Wirtz, J., & Kum, D. (2004). Consumer cheating on service guarantees. Journal of the Academy of Marketing Science, 32(2), 159–175.

    Google Scholar 

  • Yao, Y., Liu, L., Guo, Z., Liu, Z., & Zhou, H. (2018). Experimental study on shared bike use behavior under bounded rational theory and credit supervision mechanism. Sustainability, 11(1), 127–150.

    Google Scholar 

  • Yoon, C. (2011). Digital piracy intention: A comparison of theoretical models. Behaviour & Information Technology, 31(6), 565–576.

    Google Scholar 

Download references

Funding

This work was supported by the National Natural Science Foundation of China [grant numbers 71871162, 71872112], the Humanities and Social Science Fund of Ministry of Education of China [grant number 17YJC630237], and the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning [grant number TP2018016].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhongyun Zhou.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix 1: Prior Studies on Antecedents of Misbehavior-Related Construct in Other Contexts than Access-Based Consumption

Study

Dependent variable

Antecedents

Key findings

Underlying theories

Grasmick and Bursik (1990)

Illegal behavior

Shame, embarrassment, legal sanctions

The threats of shame and legal sanctions significantly impact the intention to commit the three offenses; the effect of embarrassment is not significant

Deterrence theory

Bachman et al. (1992)

Sexual offending

Formal sanctions, informal sanctions, moral beliefs

The deterrent effect of formal sanction threats is contingent on respondents’ moral evaluation of the incident. The impact of informal sanctions is insignificant

Deterrence theory, rational choice theory

Nagin and Paternoster (1993)

Decisions to commit offenses

Lack of self-control, criminal opportunity, situational factors, perceived costs, perceived benefits

The attractiveness of the crime target, ease of committing the crime, and perceptions of the costs and benefits of committing the crime have a significant impact on offending decisions

Rational choice theory, theories of enduring individual differences

Paternoster and Simpson (1996)

Corporate crime

Perceived costs, perceived benefits, perceptions of shame, assessment of the opprobrium of the act, contextual characteristics of the organization

Sanction threats formal and informal), moral evaluations, and organizational factors have a significant impact on the intention of corporate crime

Rational choice theory

Peace et al. (2003)

Piracy intention

Attitude, subjective norms, perceived behavioral control, punishment severity, software cost, punishment certainty

Punishment severity, punishment certainty, and software cost have direct effects on the attitude toward software piracy; punishment certainty has a significant impact on perceived behavioral control

Theory of planned behavior, expected utility theory, deterrence theory

Wirtz and Kum (2004)

Cheating Behavior

Potential material gain, repeat purchase intention, level of satisfaction, ease of invoking the guarantee, level of morality, shame, self-monitoring, machiavellianism

Potential material gain does not affect consumer cheating, but repeat purchase intention reduces that tendency. High levels of satisfaction, morality, and self-monitoring reduce cheating

Literature

D'Arcy et al. (2009)

IS Misuse Intention

Perceived certainty of sanctions, perceived severity of sanctions, user awareness

Perceived severity of sanctions is more effective in reducing IS misuse than the certainty of sanctions. The impact of sanction perceptions depends on one’s moral level

General deterrence theory

Chen et al. (2009)

Use Intention of Pirated Software

Attitude toward pirated software, subjective norms, perceived behavioral control, moral intensity, and moral judgment

Attitude, subjective norms, and perceived behavioral control have positive impacts on the use intention of pirated software. Moral intensity and moral judgment have a joint moderating effect

Theory of planned behavior, moral intensity, and moral judgment

Myyry et al. (2009)

Compliance with the Information Security Policy

Preconventional moral reasoning, conventional moral reasoning, postconventional moral reasoning, openness to change, conservation

Preconventional moral reasoning is positively related to both hypothetical and actual compliance; conventional moral reasoning correlates negatively with compliance

Theory of cognitive moral development, theory of motivational types of values

Siponen et al. (2010)

Software Piracy Intentions

Condemning the condemners, denial of injury, metaphor of the ledger, appeal to higher loyalties, defense of necessity, denial of responsibility, denial of the victim, formal sanctions, shame, moral beliefs

Appeal to higher loyalties, condemnation of the condemners, shame, and moral beliefs have a significant impact on software piracy intentions

Neutralization theory, deterrence theory

Bulgurcu et al. (2010)

Compliance with the IS Policy

Benefit of compliance, cost of compliance, cost of noncompliance, attitude, normative beliefs, self-efficacy

Benefits and costs of compliance have an important impact on attitude. Attitude, normative beliefs, and self-efficacy significantly influence the intention to comply with the IS policy

Rational choice theory, theory of planned behavior

Ogilvie and Stewart (2010)

Intention to engage in plagiarism

Prior behavior, academic self-efficacy, perceived sanctions, perceived benefits, perceived shame

Academic self-efficacy and perceived benefits significantly affect intentions to engage in plagiarism, while perceived Sanctions is insignificant. Academic self-efficacy can moderate the effects of perceived sanctions on intentions to engage in plagiarism

Rational choice theories, perceptual deterrence theory, self-efficacy theory

Kroneberg et al. (2010)

Intention to engage in shoplifting and tax fraud

moral norms, Neutralization, instrumental incentives

Only for respondents who do not feel bound by moral norms, instrumental incentives have significant impacts on the intention to engage in shoplifting and tax fraud. Where norms have been strongly internalized, and in the absence of neutralizations, instrumental incentives are irrelevant

Rational choice theories, the situational action theory

Li et al. (2010)

Intention to comply with internet use policy

Perceived risks detection probability, sanction severity, subjective norms, security risks), perceived benefits, personal norms

Compliance intention is the result of competing influences of perceived benefits, formal sanctions, and security risks. The effect of sanction severity is found to be moderated by personal norms

Rational choice theories

Liao et al. (2010)

Intention to use pirated software

Perceived risks, attitude, subjective norm, perceived behavioral control

Perceived risks, attitude, and perceived behavioral control have significant impacts on software piracy intentions; the effect of subjective norm is insignificant

Theory of planned behavior

Phau and Ng (2010)

Attitude and intention to use pirated software

Value consciousness, integrity, personal gratification, normative and informative susceptibility, ethical beliefs, amount of computer usage, social cost of software piracy

Value consciousness and amount of computer usage are positively related to attitude towards pirated software; integrity has a negative correlation. Ethical beliefs and social costs of software piracy positively impact on intention to use pirated software

Theory of planned behavior

Yoon (2011)

Intention and attitude to digital piracy

Moral obligation, justice, perceived benefit, perceived risk, subjective norm, habit, perceived behavioral control

Moral obligation, justice, attitude, subjective norms, and perceived behavioral control influence digital piracy intentions. Perceived benefit, perceived risk, and habit influence digital piracy attitude

Theory of planned behavior, ethics theory

Vance and Siponen (2012)

Intention to Violate IS Security Policy

Formal sanctions, informal sanctions, moral beliefs, perceived benefits

Informal sanctions, moral beliefs, and perceived benefits have significant impacts on IS security policy violations; the effect of formal sanctions is insignificant

Rational choice theory

Goode and Kartas (2012)

Attitude and intention to pirate

Attitude (relative advantage, additional functionality, enjoyment, compatibility, image, software piracy, complexity), subjective norm (family, friends), perceived behavioral control (cost, fear of obsolescence, critical mass, perceived deterrence)

Relative advantage, additional functionality, enjoyment, compatibility, image, software piracy, and complexity have significant impacts on attitude to pirate. Attitude, subjective norm, and perceived behavioral control have significant impacts on intention to pirate

Rational choice theory, theory of planned behavior, deterrence theory

D'Arcy and Devaraj (2012)

Misuse of information technology resources intention

Formal sanctions (certainty, severity), informal sanctions (social desirability, pressure, moral beliefs), employment context (virtual status, employment level)

A predisposition toward the need for social approval, moral beliefs, and the threat of formal sanctions regarding the behavior are key determinants of technology misuse

Deterrence theory

Cheng et al. (2013)

IS security policy violation intention

Perceived certainty, perceived severity, social bonds (attachment, commitment, involvement, belief), social pressure (subjective norm, co-worker behavior)

Social bonding, social pressures, and perceived severity of sanctions have significant impacts on IS security policy violations, while perceived certainty of those sanctions is insignificant

Social control theory, deterrence theory

Chan et al. (2013)

Intention to software piracy

Perceived moral intensity, moral recognition, moral judgment, attitude, subjective norm, perceived behavioral control

Perceived moral intensity, moral recognition, moral judgment, attitude, and subjective norm significantly impact software piracy intention; perceived behavioral control is insignificant

Theory of planned behavior, moral intensity, and moral judgment

Koklic et al. (2013)

Intention to pirate

Moral intensity, attitude, perceived risk, involvement

Moral intensity and perceived risk have significant impacts on pirate intentions. Involvement is a moderator between attitudes and pirate intentions

Ethical decision-making theories, attitude–behavior theory

Phau et al. (2014)

Intention to digital piracy

Affect, attitude, moral judgment, self-efficacy, facilitating conditions, habitual conduct, social factors

Social habit, self-efficacy, affect, and attitude have a positive effect on digital piracy intentions, while moral judgment has a negative effect on digital piracy intentions

Theory of planned behavior

Johnston et al. (2015)

IS Security Policy

Sanctioning rhetoric, fear appeal, formal sanction certainty and severity, informal sanction certainty and severity, sanction celerity

Sanctioning rhetoric enhances the effectiveness of a fear appeal, leading to stronger compliance intention. Informal sanction severity/certainty significantly impacts compliance intention; sanction celerity and formal sanction severity/certainty show insignificant effects

Johnston et al. (2015)

Dootson et al. (2016)

Consumer’s deviance threshold

Law & policy, perceived risk, norms, intent, perceived outcomes, victim, moral identity, perceived fairness

Law & policy, perceived risk, norms, intent, perceived outcomes, victim, moral identity, and perceived fairness have important impacts on consumers’ deviance threshold

Neutralization theory, deterrence theory

Arli and Tjiptono (2016)

Attitude and intention to pirate digital products

Moral obligation, perceived benefits, fear of legal

Consequences, perceived likelihood of punishment, subjective norms, perceived behavioral control

Consumers’ attitude towards digital piracy strongly influence their intention to pirate digital products; fear of legal consequences and perceived likelihood of punishment are not significant predictors of consumers’ attitude towards digital piracy

Theory of Planned Behavior, Deterrence Theory, Ethics Theory

Ting et al. (2016)

Counterfeit luxury goods purchase intentions

Information susceptibility, normative susceptibility, value consciousness, perceived risk, integrity, status consumption, materialism

Perceived risk, value consciousness, status consumption, and information and normative susceptibility significantly impact counterfeit luxury goods purchase intentions; the effects of integrity and materialism are insignificant

Theory of reasoned action

Silic et al. (2017)

Intentions to violate/use shadow IT

Denial of responsibility, appeal to higher loyalties, defense of necessity, denial of injury, metaphor of the ledger, shame, formal sanctions, informal sanctions

Metaphor of the ledger neutralization technique predicts shadow IT intention and actual shadow IT usage. Neutralizations and deterrence effects influence shame

Neutralization theory, deterrence theory

Currie and Delbosc (2017)

Deliberate and unintentional fare evasion

Honesty attitudes, norms, perceived control, permissive attitudes to evasion, ticketing competence

Honesty attributes, perceived ease of evasion, and permissive attitudes to evasion affect deliberate evasion; honest, ticketing competence, and permissive attitudes affect unintentional evasion

Theory of planned behavior, deterrence theory

Chen et al. (2018a, b, c)

IS security policy compliance intention

Perceived self-efficacy to compliance, perceived sanction severity, perceived descriptive norm, perceived response cost

Sanction severity significantly impacts IS security policy compliance intention mediated by perceived self-efficacy and descriptive norm). No variable moderates the effect of sanction severity on IS security policy compliance intention

General deterrence theory, rational choice theory, protection motivation theory

Brillian et al. (2018)

The misuse of motorcycle ride-sharing applications

Security countermeasures, formal sanction, informal sanction, moral beliefs

Moral beliefs have a significant negative impact on misuse intentions, while the effect of perceived sanction certainty is insignificant. Security countermeasures have a significant positive impact on perceived sanctions and moral beliefs

Deterrence theory

Choi and Song (2018)

IS security policy compliance intention

Commitment, belief, attachment, deterrence

Commitment to organization and belief are positively associated with perceived formal punishment, while attachment is not. Deterrence is positively associated with compliance intention

Social control theory, deterrence theory

Li et al. (2018)

Violation of internet use policy intention

Procedural justice, perceived deterrence, perceived benefits, low self-control

Perceived deterrence and perceived benefits significantly impact violation of internet use policy intention the latter is a more salient predictor than the former). Self-control and procedural justice moderate the cost–benefit calculus

Rational choice theory

Chen et al. (2018a, b, c)

Counterfeit luxury goods purchase intentions

Moral recognition, moral rationalization, moral judgment, moral decoupling, perceived benefit

Perceived benefit and moral judgment affect counterfeit luxury goods purchase intentions significantly; moral rationalization, moral decoupling, and moral recognition are insignificant

Ethical decision-making theories

Safa et al. (2019)

Employees’ information security misbehavior

Deterrence factors, situational crime prevention factors, perceived behavioral control, negative attitude towards misbehavior, subjective norms

Deterrence factors, increased effort, risk, reduced reward, subjective norms, perceived behavioral control, and attitude significantly prevent information security misbehavior; removing excuses and reducing provocations are insignificant

General deterrence theory, situational crime prevention theory, theory of planned behavior

Bossler (2019)

Intention to commit cyber attacks

Formal sanctions, perceived certainty, perceived severity, perceived informal sanctions, computer skills, and online behavior

Perceived informal sanctions have significant effects on intention to commit cyber attacks, while the effect of formal sanctions is insignificant

Deterrence theory

Hati et al. (2019)

Intention to pirate

Moral obligation, perceived benefit, fear of legal

Consequences, perceived likelihood of punishment, attitude towards piracy, subjective norms, self-efficacy, facilitating condition

Moral obligation has a similar influence on the piracy intention of both the no-piracy and piracy groups. Fear of legal consequences and perceived likelihood of punishment have no significant impact on intention to pirate of the two groups

Ethics theory, deterrence theory, theory of planned behavior

Rajab and Eydgahi (2019)

Intentions of compliance with information security policies

Attitudes, awareness, vulnerability, perceived behavioral control, severity of sanctions, certainty of detection celerity of sanctions, severity of risks, self-efficacy, response efficacy, response cost, top management support, peer pressure

Perceived vulnerability, response efficacy, and response cost have a strong positive impact on intentions of compliance with information security policies; severe sanctions, close management supervision, peers’ pressure, and attitudes towards information security have a weak impact

Theory of planned behavior, protection motivation theory, general deterrence theory and organizational theory

Korgaonkar et al. (2020)

Intention to shoplifting

Guardianship capability, shoplifting attitude, motivated offender, perceived behavioral control, subjective norms, suitable targets

Suitable targets, offender motivation, and the absence of capable guardians affect potential offenders’ attitudes, subjective norms, and confidence in their ability to shoplift, which, in turn, all influence the intention to shoplift

The theory of planned behavior and routine activity theory

Appendix 2

Scenario 1 (inconvenient parking): Mobike system has a usage rule that users are not allowed to park bikes in residential communities. Chen is an ordinary working person. After work, Chen usually takes the subway first and then rides a Mobike back home. Chen usually stops the Mobike downstairs when getting home.

Scenario 2 (random parking): Mobike system has a usage rule that bikes should be parked in the specified locations. Chen is an ordinary working person. Chen rides a Mobike to the bus stop when s/he goes to work every morning. Chen often parks the Mobike on the roadside and rushes to the bus when the bus comes.

See Tables

Table 7 Measurement items

7 and

Table 8 Item loadings and cross-loadings

8.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jin, XL., Zhou, Z. & Tian, Y. A Configurational Analysis of the Causes of Consumer Indirect Misbehaviors in Access-Based Consumption. J Bus Ethics 175, 135–166 (2022). https://doi.org/10.1007/s10551-020-04637-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-020-04637-8

Keywords

Navigation