Skip to main content
Top
Published in: Journal of Business Ethics 1/2022

06-10-2020 | Original Paper

A Configurational Analysis of the Causes of Consumer Indirect Misbehaviors in Access-Based Consumption

Authors: Xiao-Ling Jin, Zhongyun Zhou, Yiwei Tian

Published in: Journal of Business Ethics | Issue 1/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Consumer indirect misbehavior in access-based consumption is a significant challenge for enterprises. The literature is in short of a deep understanding of the antecedent conditions of consumer indirect misbehavior in this context and limited by inconsistent findings, calling for developing a holistic and integrative theoretical framework. This study integrates three commonly used theoretical perspectives in the consumer misbehavior literature (i.e., deterrence, rational decision-making, and ethical decision-making) to present holistic archetypes of consumer indirect misbehavior formation. In accordance with this theoretical objective, we adopted an emerging approach for configurational analysis, i.e., fuzzy-set qualitative comparative analysis (fsQCA), to analyze the complex combinations of six influencing factors. We collected data using a scenario-based field survey of 264 experienced consumers of a popular bike-sharing service in China. The scenarios were developed based on relevant literature and a Delphi study. The fsQCA results reveal multiple configurations for high and low levels of consumer misbehavior intention. Specifically, perceived benefits and moral definition play important roles, while the effect of sanctions is highly dependent on other factors. These results lead us to derive three theoretical propositions for antecedent conditions leading to consumers’ indirect misbehavior intentions in access-based consumption. This study enriches our understanding of the causes of misbehavior and provides novel insights for management practitioners to take appropriate countermeasures.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
We appreciate an anonymous reviewer for raising this point.
 
2
We appreciate the anonymous reviewers for making this point.
 
3
We owe our thanks to an anonymous reviewer for making this point.
 
Literature
go back to reference Akbari, M., Abdolvand, M. A., & Ghaffari, F. (2016). Developing a model in antecedents of consumer misbehavior on chain stores. Revista Brasileira de Marketing, 15(2), 146–163. Akbari, M., Abdolvand, M. A., & Ghaffari, F. (2016). Developing a model in antecedents of consumer misbehavior on chain stores. Revista Brasileira de Marketing, 15(2), 146–163.
go back to reference Akers, R. L. (1990). Rational choice, deterrence, and social learning theory in criminology: The path not taken. The Journal of Criminal Law and Criminology, 81(3), 653–676. Akers, R. L. (1990). Rational choice, deterrence, and social learning theory in criminology: The path not taken. The Journal of Criminal Law and Criminology, 81(3), 653–676.
go back to reference Arli, D., & Tjiptono, F. (2016). Consumer digital piracy behaviour among youths: Insights from Indonesia. Asia Pacific Journal of Marketing and Logistics, 28(5), 898–922. Arli, D., & Tjiptono, F. (2016). Consumer digital piracy behaviour among youths: Insights from Indonesia. Asia Pacific Journal of Marketing and Logistics, 28(5), 898–922.
go back to reference Bachman, R., Paternoster, R., & Ward, S. (1992). The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault. Law & Society Review, 26(2), 343–372. Bachman, R., Paternoster, R., & Ward, S. (1992). The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault. Law & Society Review, 26(2), 343–372.
go back to reference Banerjee, D., Cronan, T. P., & Jones, T. W. (1998). Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22(1), 31–60. Banerjee, D., Cronan, T. P., & Jones, T. W. (1998). Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22(1), 31–60.
go back to reference Bardhi, F., & Eckhardt, G. M. (2012). Access-based consumption: The case of car sharing. Journal of Consumer Research, 39(4), 881–898. Bardhi, F., & Eckhardt, G. M. (2012). Access-based consumption: The case of car sharing. Journal of Consumer Research, 39(4), 881–898.
go back to reference Bitner, M. J., Booms, B. H., & Mohr, L. A. (1994). Critical service encounters: The employee's viewpoint. Journal of Marketing, 58(4), 95–106. Bitner, M. J., Booms, B. H., & Mohr, L. A. (1994). Critical service encounters: The employee's viewpoint. Journal of Marketing, 58(4), 95–106.
go back to reference Bossler, A. M. (2019). Perceived formal and informal sanctions on the willingness to commit cyber attacks against domestic and foreign targets. Journal of Crime and Justice, 42(5), 599–615. Bossler, A. M. (2019). Perceived formal and informal sanctions on the willingness to commit cyber attacks against domestic and foreign targets. Journal of Crime and Justice, 42(5), 599–615.
go back to reference Brillian, M. T., Sucahyo, Y. G., Ruldeviyani, Y., Gandhi, A., & IEEE (2018). Revealing the misuse of motorcycle ride-sharing applications using extended deterrence theory approach. In 2018 International Conference on Advanced Computer Science and Information Systems (pp. 131–135, International Conference on Advanced Computer Science and Information Systems). Brillian, M. T., Sucahyo, Y. G., Ruldeviyani, Y., Gandhi, A., & IEEE (2018). Revealing the misuse of motorcycle ride-sharing applications using extended deterrence theory approach. In 2018 International Conference on Advanced Computer Science and Information Systems (pp. 131–135, International Conference on Advanced Computer Science and Information Systems).
go back to reference Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548. Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548.
go back to reference Celestine, N. A., Leighton, C., & Perryer, C. (2018). A multifocal and integrative view of the influencers of ethical attitudes using qualitative configurational analysis. Journal of Business Ethics, 162(1), 103–122. Celestine, N. A., Leighton, C., & Perryer, C. (2018). A multifocal and integrative view of the influencers of ethical attitudes using qualitative configurational analysis. Journal of Business Ethics, 162(1), 103–122.
go back to reference Chan, R. Y. K., Ma, K. H. Y., & Wong, Y. H. (2013). The software piracy decision-making process of Chinese computer users. The Information Society, 29(4), 203–218. Chan, R. Y. K., Ma, K. H. Y., & Wong, Y. H. (2013). The software piracy decision-making process of Chinese computer users. The Information Society, 29(4), 203–218.
go back to reference Chang, M.-L., & Cheng, C.-F. (2014). How balance theory explains high-tech professionals' solutions of enhancing job satisfaction. Journal of Business Research, 67(9), 2008–2018. Chang, M.-L., & Cheng, C.-F. (2014). How balance theory explains high-tech professionals' solutions of enhancing job satisfaction. Journal of Business Research, 67(9), 2008–2018.
go back to reference Chen, J., Teng, L., & Liao, Y. (2018b). Counterfeit luxuries: does moral reasoning strategy influence consumers’ pursuit of counterfeits? Journal of Business Ethics, 151(1), 249–264. Chen, J., Teng, L., & Liao, Y. (2018b). Counterfeit luxuries: does moral reasoning strategy influence consumers’ pursuit of counterfeits? Journal of Business Ethics, 151(1), 249–264.
go back to reference Chen, M., Wang, D., Sun, Y., Waygood, E. O. D., & Yang, W. (2018a). A comparison of users’ characteristics between station-based bikesharing system and free-floating bikesharing system: Case study in Hangzhou, China. Transportation, 47(2), 689–704. Chen, M., Wang, D., Sun, Y., Waygood, E. O. D., & Yang, W. (2018a). A comparison of users’ characteristics between station-based bikesharing system and free-floating bikesharing system: Case study in Hangzhou, China. Transportation, 47(2), 689–704.
go back to reference Chen, M.-F., Pan, C.-T., & Pan, M.-C. (2009). The joint moderating impact of moral intensity and moral judgment on consumer’s use intention of pirated software. Journal of Business Ethics, 90(3), 361–373. Chen, M.-F., Pan, C.-T., & Pan, M.-C. (2009). The joint moderating impact of moral intensity and moral judgment on consumer’s use intention of pirated software. Journal of Business Ethics, 90(3), 361–373.
go back to reference Chen, X., Wu, D., Chen, L., & Teng, J. K. L. (2018c). Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables. Information & Management, 55(8), 1049–1060. Chen, X., Wu, D., Chen, L., & Teng, J. K. L. (2018c). Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables. Information & Management, 55(8), 1049–1060.
go back to reference Chen, Y. (2009). Possession and access: Consumer desires and value perceptions regarding contemporary art collection and exhibit visits. Journal of Consumer Research, 35(6), 925–940. Chen, Y. (2009). Possession and access: Consumer desires and value perceptions regarding contemporary art collection and exhibit visits. Journal of Consumer Research, 35(6), 925–940.
go back to reference Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447–459. Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447–459.
go back to reference Chiang, E. P., & Assane, D. (2009). Estimating the willingness to pay for digital music. Contemporary Economic Policy, 27(4), 512–522. Chiang, E. P., & Assane, D. (2009). Estimating the willingness to pay for digital music. Contemporary Economic Policy, 27(4), 512–522.
go back to reference Choi, M., & Song, J. (2018). Social control through deterrence on the compliance with information security policy. Soft Computing, 22(20), 6765–6772. Choi, M., & Song, J. (2018). Social control through deterrence on the compliance with information security policy. Soft Computing, 22(20), 6765–6772.
go back to reference Cihan, A., & Tittle, C. R. (2019). Self-control, sanction threats, temptation, and crime: Examining contingencies of self-control in a cross-national context. Crime & Delinquency, 65(4), 555–580. Cihan, A., & Tittle, C. R. (2019). Self-control, sanction threats, temptation, and crime: Examining contingencies of self-control in a cross-national context. Crime & Delinquency, 65(4), 555–580.
go back to reference Craft, J. L. (2013). A review of the empirical ethical decision-making literature: 2004–2011. Journal of Business Ethics, 117(2), 221–259. Craft, J. L. (2013). A review of the empirical ethical decision-making literature: 2004–2011. Journal of Business Ethics, 117(2), 221–259.
go back to reference Currie, G., & Delbosc, A. (2017). An empirical model for the psychology of deliberate and unintentional fare evasion. Transport Policy, 54, 21–29. Currie, G., & Delbosc, A. (2017). An empirical model for the psychology of deliberate and unintentional fare evasion. Transport Policy, 54, 21–29.
go back to reference D'Arcy, J., & Devaraj, S. (2012). Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43(6), 1091–1124. D'Arcy, J., & Devaraj, S. (2012). Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43(6), 1091–1124.
go back to reference D'Arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20(6), 643–658. D'Arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20(6), 643–658.
go back to reference D'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98. D'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98.
go back to reference Daunt, K. L., & Harris, L. C. (2011). Customers acting badly: Evidence from the hospitality industry. Journal of Business Research, 64(10), 1034–1042. Daunt, K. L., & Harris, L. C. (2011). Customers acting badly: Evidence from the hospitality industry. Journal of Business Research, 64(10), 1034–1042.
go back to reference Daunt, K. L., & Harris, L. C. (2012). Motives of dysfunctional customer behavior: An empirical study. Journal of Services Marketing, 26(4), 293–308. Daunt, K. L., & Harris, L. C. (2012). Motives of dysfunctional customer behavior: An empirical study. Journal of Services Marketing, 26(4), 293–308.
go back to reference Dootson, P., Johnston, K. A., Beatson, A., & Lings, I. (2016). Where do consumers draw the line? Factors informing perceptions and justifications of deviant consumer behaviour. Journal of Marketing Management, 32(7–8), 750–776. Dootson, P., Johnston, K. A., Beatson, A., & Lings, I. (2016). Where do consumers draw the line? Factors informing perceptions and justifications of deviant consumer behaviour. Journal of Marketing Management, 32(7–8), 750–776.
go back to reference Dul, J. (2016). Identifying single necessary conditions with NCA and fsQCA. Journal of Business Research, 69(4), 1516–1523. Dul, J. (2016). Identifying single necessary conditions with NCA and fsQCA. Journal of Business Research, 69(4), 1516–1523.
go back to reference Edbring, E. G., Lehner, M., & Mont, O. (2016). Exploring consumer attitudes to alternative models of consumption: Motivations and barriers. Journal of Cleaner Production, 123, 5–15. Edbring, E. G., Lehner, M., & Mont, O. (2016). Exploring consumer attitudes to alternative models of consumption: Motivations and barriers. Journal of Cleaner Production, 123, 5–15.
go back to reference Eliason, S. L., & Dodder, R. A. (1999). Techniques of neutralization used by deer poachers in the western united states: A research note. Deviant Behavior: An Interdisciplinary Journal, 20, 233–252. Eliason, S. L., & Dodder, R. A. (1999). Techniques of neutralization used by deer poachers in the western united states: A research note. Deviant Behavior: An Interdisciplinary Journal, 20, 233–252.
go back to reference Fisher, R. J. (1993). Social desirability bias and the validity of indirect questioning. Journal of Consumer Research, 20(2), 303–315. Fisher, R. J. (1993). Social desirability bias and the validity of indirect questioning. Journal of Consumer Research, 20(2), 303–315.
go back to reference Fisk, R., Grove, S., Harris, L. C., Keeffe, D. A., Reynolds, K. L. D., Russell-Bennett, R., et al. (2010). Customers behaving badly: A state of the art review, research agenda and implications for practitioners. Journal of Services Marketing, 24(6), 417–429. Fisk, R., Grove, S., Harris, L. C., Keeffe, D. A., Reynolds, K. L. D., Russell-Bennett, R., et al. (2010). Customers behaving badly: A state of the art review, research agenda and implications for practitioners. Journal of Services Marketing, 24(6), 417–429.
go back to reference Fiss, P. C. (2007). A set-theoretic approach to organizational configurations. Academy of Management Review, 32(4), 1180–1198. Fiss, P. C. (2007). A set-theoretic approach to organizational configurations. Academy of Management Review, 32(4), 1180–1198.
go back to reference Fiss, P. C. (2011). Building better causal theories: A fuzzy set approach to typologies in organization research. Academy of Management Journal, 54(2), 393–420. Fiss, P. C. (2011). Building better causal theories: A fuzzy set approach to typologies in organization research. Academy of Management Journal, 54(2), 393–420.
go back to reference Fullerton, R. A., & Punj, G. (2004). Repercussions of promoting an ideology of consumption: consumer misbehavior. Journal of Business Research, 57(11), 1239–1249. Fullerton, R. A., & Punj, G. (2004). Repercussions of promoting an ideology of consumption: consumer misbehavior. Journal of Business Research, 57(11), 1239–1249.
go back to reference Fussey, P. (2009). An economy of choice? Terrorist decision-making and criminological rational choice theories reconsidered. Security Journal, 24(1), 85–99. Fussey, P. (2009). An economy of choice? Terrorist decision-making and criminological rational choice theories reconsidered. Security Journal, 24(1), 85–99.
go back to reference Gibbs, J. P. (1968). Crime, punishment, and deterrence. The Southwestern Social Science Quarterly, 48(4), 515–530. Gibbs, J. P. (1968). Crime, punishment, and deterrence. The Southwestern Social Science Quarterly, 48(4), 515–530.
go back to reference Goode, S., & Kartas, A. (2012). Exploring software piracy as a factor of video game console adoption. Behaviour & Information Technology, 31(6), 547–563. Goode, S., & Kartas, A. (2012). Exploring software piracy as a factor of video game console adoption. Behaviour & Information Technology, 31(6), 547–563.
go back to reference Grasmick, H. G., & Bursik, R. J. (1990). Conscience, significant others, and rational choice: Extending the deterrence model. Law & Society Review, 24(3), 837–862. Grasmick, H. G., & Bursik, R. J. (1990). Conscience, significant others, and rational choice: Extending the deterrence model. Law & Society Review, 24(3), 837–862.
go back to reference Greckhamer, T. (2016). CEO compensation in relation to worker compensation across countries: The configurational impact of country-level institutions. Strategic Management Journal, 37(4), 793–815. Greckhamer, T. (2016). CEO compensation in relation to worker compensation across countries: The configurational impact of country-level institutions. Strategic Management Journal, 37(4), 793–815.
go back to reference Greckhamer, T., Misangyi, V. F., & Fiss, P. C. (2013). Chapter 3 the two QCAs: From a small-N to a large-N set theoretic approach. In Configurational theory and methods in organizational research (pp. 49–75, Research in the Sociology of Organizations). Greckhamer, T., Misangyi, V. F., & Fiss, P. C. (2013). Chapter 3 the two QCAs: From a small-N to a large-N set theoretic approach. In Configurational theory and methods in organizational research (pp. 49–75, Research in the Sociology of Organizations).
go back to reference Gu, T., Kim, I., & Currie, G. (2019). To be or not to be dockless: Empirical analysis of dockless bikeshare development in China. Transportation Research Part A: Policy and Practice, 119, 122–147. Gu, T., Kim, I., & Currie, G. (2019). To be or not to be dockless: Empirical analysis of dockless bikeshare development in China. Transportation Research Part A: Policy and Practice, 119, 122–147.
go back to reference Guo, Y., Zhou, J., Wu, Y., & Li, Z. (2017). Identifying the factors affecting bike-sharing usage and degree of satisfaction in Ningbo, China. PLoS ONE, 12(9), e0185100. Guo, Y., Zhou, J., Wu, Y., & Li, Z. (2017). Identifying the factors affecting bike-sharing usage and degree of satisfaction in Ningbo, China. PLoS ONE, 12(9), e0185100.
go back to reference Harris, L. C., & Daunt, K. (2013). Managing customer misbehavior challenges and strategies. Journal of Services Marketing, 27(4), 281–293. Harris, L. C., & Daunt, K. (2013). Managing customer misbehavior challenges and strategies. Journal of Services Marketing, 27(4), 281–293.
go back to reference Harris, L. C., & Reynolds, K. L. (2003). The consequences of dysfunctional customer behavior. Journal of Service Research, 6(2), 144–161. Harris, L. C., & Reynolds, K. L. (2003). The consequences of dysfunctional customer behavior. Journal of Service Research, 6(2), 144–161.
go back to reference Hartl, B., Hofmann, E., & Kirchler, E. (2016). Do we need rules for “what's mine is yours”? Governance in collaborative consumption communities. Journal of Business Research, 69(8), 2756–2763. Hartl, B., Hofmann, E., & Kirchler, E. (2016). Do we need rules for “what's mine is yours”? Governance in collaborative consumption communities. Journal of Business Research, 69(8), 2756–2763.
go back to reference Hati, S. R. H., Fitriasih, R., & Safira, A. (2019). E-textbook piracy behavior. Journal of Information, Communication and Ethics in Society, 18(1), 105–123. Hati, S. R. H., Fitriasih, R., & Safira, A. (2019). E-textbook piracy behavior. Journal of Information, Communication and Ethics in Society, 18(1), 105–123.
go back to reference Hirsh, J. B., Lu, J. G., & Galinsky, A. D. (2018). Moral utility theory: Understanding the motivation to behave (un)ethically. Research in Organizational Behavior, 38, 43–59. Hirsh, J. B., Lu, J. G., & Galinsky, A. D. (2018). Moral utility theory: Understanding the motivation to behave (un)ethically. Research in Organizational Behavior, 38, 43–59.
go back to reference Hunt, S. D., & Vitell, S. (1986). A general theory of marketing ethics. Journal of MacroMarketing, 6, 5–16. Hunt, S. D., & Vitell, S. (1986). A general theory of marketing ethics. Journal of MacroMarketing, 6, 5–16.
go back to reference iResearch (2017). Research report on shared-bike services in China, in Chinese. iResearch (2017). Research report on shared-bike services in China, in Chinese.
go back to reference Jia, L., Liu, X., & Liu, Y. (2018). Impact of different stakeholders of bike-sharing industry on users’ intention of civilized use of bike-sharing. Sustainability, 10(5), 1437–1463. Jia, L., Liu, X., & Liu, Y. (2018). Impact of different stakeholders of bike-sharing industry on users’ intention of civilized use of bike-sharing. Sustainability, 10(5), 1437–1463.
go back to reference Johnston, A. C., Warkentin, M., & Siponen, M. (2015). An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113–134. Johnston, A. C., Warkentin, M., & Siponen, M. (2015). An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 113–134.
go back to reference Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. Academy of Management Review, 16(2), 366–395. Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. Academy of Management Review, 16(2), 366–395.
go back to reference Klepper, S., & Nagin, D. (1989). The deterrent effect of perceived certainty and severity of punishment revisited. Criminology, 27(4), 721–746. Klepper, S., & Nagin, D. (1989). The deterrent effect of perceived certainty and severity of punishment revisited. Criminology, 27(4), 721–746.
go back to reference Koklic, M. K., Vida, I., Bajde, D., & Culiberg, B. (2013). The study of perceived adverse effects of digital piracy and involvement: Insights from adult computer users. Behaviour & Information Technology, 33(3), 225–236. Koklic, M. K., Vida, I., Bajde, D., & Culiberg, B. (2013). The study of perceived adverse effects of digital piracy and involvement: Insights from adult computer users. Behaviour & Information Technology, 33(3), 225–236.
go back to reference Korgaonkar, P. K., Gironda, J. T., Petrescu, M., Krishen, A. S., & Mangleburg, T. F. (2020). Preventing shoplifting: Exploring online comments to propose a model. Psychology & Marketing, 37(1), 141–153. Korgaonkar, P. K., Gironda, J. T., Petrescu, M., Krishen, A. S., & Mangleburg, T. F. (2020). Preventing shoplifting: Exploring online comments to propose a model. Psychology & Marketing, 37(1), 141–153.
go back to reference Kroneberg, C., Heintze, I., & Mehlkop, G. (2010). The interplay of moral norms and instrumental incentives in crime causation. Criminology, 48(1), 259–294. Kroneberg, C., Heintze, I., & Mehlkop, G. (2010). The interplay of moral norms and instrumental incentives in crime causation. Criminology, 48(1), 259–294.
go back to reference Lan, J., Ma, Y., Zhu, D., Mangalagiu, D., & Thornton, T. (2017). Enabling value co-creation in the sharing economy: The case of mobike. Sustainability, 9(9), 1504–1524. Lan, J., Ma, Y., Zhu, D., Mangalagiu, D., & Thornton, T. (2017). Enabling value co-creation in the sharing economy: The case of mobike. Sustainability, 9(9), 1504–1524.
go back to reference Lawson, S. J., Gleim, M. R., Perren, R., & Hwang, J. (2016). Freedom from ownership: An exploration of access-based consumption. Journal of Business Research, 69, 2615–2623. Lawson, S. J., Gleim, M. R., Perren, R., & Hwang, J. (2016). Freedom from ownership: An exploration of access-based consumption. Journal of Business Research, 69, 2615–2623.
go back to reference Lee, J.-N., Park, Y., Straub, D. W., & Koo, Y. (2019). Holistic archetypes of it outsourcing strategy: A contingency fit and configurational approach. MIS Quarterly, 43(4), 1201–1225. Lee, J.-N., Park, Y., Straub, D. W., & Koo, Y. (2019). Holistic archetypes of it outsourcing strategy: A contingency fit and configurational approach. MIS Quarterly, 43(4), 1201–1225.
go back to reference Leischnig, A., & Kasper-Brauer, K. (2015). Employee adaptive behavior in service enactments. Journal of Business Research, 68(2), 273–280. Leischnig, A., & Kasper-Brauer, K. (2015). Employee adaptive behavior in service enactments. Journal of Business Research, 68(2), 273–280.
go back to reference Leischnig, A., & Woodside, A. G. (2019). Who approves fraudulence? Configurational causes of consumers’ unethical judgments. Journal of Business Ethics, 158(3), 713–726. Leischnig, A., & Woodside, A. G. (2019). Who approves fraudulence? Configurational causes of consumers’ unethical judgments. Journal of Business Ethics, 158(3), 713–726.
go back to reference Li, H., Luo, X., Zhang, J., & Sarathy, R. (2018). Self-control, organizational context, and rational choice in Internet abuses at work. Information & Management, 55(3), 358–367. Li, H., Luo, X., Zhang, J., & Sarathy, R. (2018). Self-control, organizational context, and rational choice in Internet abuses at work. Information & Management, 55(3), 358–367.
go back to reference Li, H., Zhang, J., & Sarathy, R. (2010). Understanding compliance with internet use policy from the perspective of rational choice theory. Decision Support Systems, 48(4), 635–645. Li, H., Zhang, J., & Sarathy, R. (2010). Understanding compliance with internet use policy from the perspective of rational choice theory. Decision Support Systems, 48(4), 635–645.
go back to reference Liao, C., Lin, H.-N., & Liu, Y.-P. (2010). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91(2), 237–252. Liao, C., Lin, H.-N., & Liu, Y.-P. (2010). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91(2), 237–252.
go back to reference Liu, Y., Mezei, J., Kostakos, V., & Li, H. (2015). Applying configurational analysis to IS behavioural research: A methodological alternative for modelling combinatorial complexities. Information Systems Journal, 27(1), 59–89. Liu, Y., Mezei, J., Kostakos, V., & Li, H. (2015). Applying configurational analysis to IS behavioural research: A methodological alternative for modelling combinatorial complexities. Information Systems Journal, 27(1), 59–89.
go back to reference Lou, L., & Koh, J. (2018). Deterrence and reciprocity approaches for enhancing user participation in the sharing economy. PACIS 2018 Proceedings, 334. Lou, L., & Koh, J. (2018). Deterrence and reciprocity approaches for enhancing user participation in the sharing economy. PACIS 2018 Proceedings, 334.
go back to reference Lovelock, C., & Gummesson, E. (2004). Whither services marketing? In search of a new paradigm and fresh perspectives. Journal of Service Research, 7(1), 20–41. Lovelock, C., & Gummesson, E. (2004). Whither services marketing? In search of a new paradigm and fresh perspectives. Journal of Service Research, 7(1), 20–41.
go back to reference Ma, Y., Lan, J., Thornton, T., Mangalagiu, D., & Zhu, D. (2018). Challenges of collaborative governance in the sharing economy: The case of free-floating bike sharing in Shanghai. Journal of Cleaner Production, 197, 356–365. Ma, Y., Lan, J., Thornton, T., Mangalagiu, D., & Zhu, D. (2018). Challenges of collaborative governance in the sharing economy: The case of free-floating bike sharing in Shanghai. Journal of Cleaner Production, 197, 356–365.
go back to reference Misangyi, V. F., Greckhamer, T., Furnari, S., Fiss, P. C., Crilly, D., & Aguilera, R. (2017). Embracing causal complexity: The emergence of a neo-configurational perspective. Journal of Management, 43(1), 255–282. Misangyi, V. F., Greckhamer, T., Furnari, S., Fiss, P. C., Crilly, D., & Aguilera, R. (2017). Embracing causal complexity: The emergence of a neo-configurational perspective. Journal of Management, 43(1), 255–282.
go back to reference Mitchell, V. W., Balabanis, G., Schlegelmilch, B. B., & Cornwell, T. B. (2009). Measuring unethical consumer behavior across four countries. Journal of Business Ethics, 88(2), 395–412. Mitchell, V. W., Balabanis, G., Schlegelmilch, B. B., & Cornwell, T. B. (2009). Measuring unethical consumer behavior across four countries. Journal of Business Ethics, 88(2), 395–412.
go back to reference Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285–311. Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285–311.
go back to reference Mulder, L. B., Verboon, P., & De Cremer, D. (2009). Sanctions and moral judgments: The moderating effect of sanction severity and trust in authorities. European Journal of Social Psychology, 39(2), 255–269. Mulder, L. B., Verboon, P., & De Cremer, D. (2009). Sanctions and moral judgments: The moderating effect of sanction severity and trust in authorities. European Journal of Social Psychology, 39(2), 255–269.
go back to reference Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18(2), 126–139. Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18(2), 126–139.
go back to reference Nagin, D. S., & Paternoster, R. (1993). Enduring individual differences and rational choice theories of crime. Law & Society Review, 27(3), 467–496. Nagin, D. S., & Paternoster, R. (1993). Enduring individual differences and rational choice theories of crime. Law & Society Review, 27(3), 467–496.
go back to reference Ogilvie, J., & Stewart, A. (2010). The integration of rational choice and self-efficacy theories: A situational analysis of student misconduct. Australian & New Zealand Journal of Criminology, 43(1), 130–155. Ogilvie, J., & Stewart, A. (2010). The integration of rational choice and self-efficacy theories: A situational analysis of student misconduct. Australian & New Zealand Journal of Criminology, 43(1), 130–155.
go back to reference Ordanini, A., Parasuraman, A., & Rubera, G. (2014). When the recipe is more important than the ingredients: A qualitative comparative analysis (QCA) of service innovation configurations. Journal of Service Research, 17(2), 134–149. Ordanini, A., Parasuraman, A., & Rubera, G. (2014). When the recipe is more important than the ingredients: A qualitative comparative analysis (QCA) of service innovation configurations. Journal of Service Research, 17(2), 134–149.
go back to reference Park, Y., Sawy, O. A. E., & Fiss, P. C. (2017). The role of business intelligence and communication technologies in organizational agility: A configurational approach. Journal of the Association for Information Systems, 18(9), 648–686. Park, Y., Sawy, O. A. E., & Fiss, P. C. (2017). The role of business intelligence and communication technologies in organizational agility: A configurational approach. Journal of the Association for Information Systems, 18(9), 648–686.
go back to reference Paternoster, R. (2010). How much do we really know about criminal deterrence? The Journal of Criminal Law & Criminology, 100(3), 765–824. Paternoster, R. (2010). How much do we really know about criminal deterrence? The Journal of Criminal Law & Criminology, 100(3), 765–824.
go back to reference Paternoster, R., & Simpson, S. (1996). Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law & Society Review, 30(3), 549–584. Paternoster, R., & Simpson, S. (1996). Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law & Society Review, 30(3), 549–584.
go back to reference Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177. Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177.
go back to reference Pearson, F. S., & Weiner, N. A. (1985). Toward an intergration of criminological theories. Journal of Criminal Law and Criminology, 76(1), 116–150. Pearson, F. S., & Weiner, N. A. (1985). Toward an intergration of criminological theories. Journal of Criminal Law and Criminology, 76(1), 116–150.
go back to reference Phau, I., Lim, A., Liang, J., & Lwin, M. (2014). Engaging in digital piracy of movies: A theory of planned behaviour approach. Internet Res, 24(2), 246–266. Phau, I., Lim, A., Liang, J., & Lwin, M. (2014). Engaging in digital piracy of movies: A theory of planned behaviour approach. Internet Res, 24(2), 246–266.
go back to reference Phau, I., & Ng, J. (2010). Predictors of usage intentions of pirated software. Journal of Business Ethics, 94(1), 23–37. Phau, I., & Ng, J. (2010). Predictors of usage intentions of pirated software. Journal of Business Ethics, 94(1), 23–37.
go back to reference Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903. Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.
go back to reference Poppelaars, F., Bakker, C., & van Engelen, J. (2018). Does access trump ownership? Exploring consumer acceptance of access-based consumption in the case of smartphones. Sustainability, 10(7), 2133. Poppelaars, F., Bakker, C., & van Engelen, J. (2018). Does access trump ownership? Exploring consumer acceptance of access-based consumption in the case of smartphones. Sustainability, 10(7), 2133.
go back to reference Prado, A. M., & Woodside, A. G. (2014). Deepening understanding of certification adoption and non-adoption of international-supplier ethical standards. Journal of Business Ethics, 132(1), 105–125. Prado, A. M., & Woodside, A. G. (2014). Deepening understanding of certification adoption and non-adoption of international-supplier ethical standards. Journal of Business Ethics, 132(1), 105–125.
go back to reference Ragin, C. C. (2006). Set relations in social research: Evaluating their consistency and coverage. Political Analysis, 14(3), 291–310. Ragin, C. C. (2006). Set relations in social research: Evaluating their consistency and coverage. Political Analysis, 14(3), 291–310.
go back to reference Ragin, C. C. (2008). Redesigning social inquiry: Fuzzy sets and beyond. Chicago, IL: University of Chicago Press. Ragin, C. C. (2008). Redesigning social inquiry: Fuzzy sets and beyond. Chicago, IL: University of Chicago Press.
go back to reference Rajab, M., & Eydgahi, A. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security, 80, 211–223. Rajab, M., & Eydgahi, A. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security, 80, 211–223.
go back to reference Reynolds, K. L., & Harris, L. C. (2006). Deviant customer behavior: An exploration of frontline employee tactics. Journal of Marketing Theory and Practice, 14(2), 95–111. Reynolds, K. L., & Harris, L. C. (2006). Deviant customer behavior: An exploration of frontline employee tactics. Journal of Marketing Theory and Practice, 14(2), 95–111.
go back to reference Rifkin, J. (2000). The age of access: The new culture of hypercapitalism where all of life is a paid-for experience. New York: Penguin. Rifkin, J. (2000). The age of access: The new culture of hypercapitalism where all of life is a paid-for experience. New York: Penguin.
go back to reference Roos, D., & Hahn, R. (2017). Understanding collaborative consumption: An extension of the theory of planned behavior with value-based personal norms. Journal of Business Ethics, 158(3), 679–697. Roos, D., & Hahn, R. (2017). Understanding collaborative consumption: An extension of the theory of planned behavior with value-based personal norms. Journal of Business Ethics, 158(3), 679–697.
go back to reference Safa, N. S., Maple, C., Furnell, S., Azad, M. A., Perera, C., Dabbagh, M., et al. (2019). Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems, 97, 587–597. Safa, N. S., Maple, C., Furnell, S., Azad, M. A., Perera, C., Dabbagh, M., et al. (2019). Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems, 97, 587–597.
go back to reference Safa, N. S., Maple, C., Watson, T., & Von Solms, R. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of Information Security and Applications, 40, 247–257. Safa, N. S., Maple, C., Watson, T., & Von Solms, R. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of Information Security and Applications, 40, 247–257.
go back to reference Schaefers, T. (2013). Exploring carsharing usage motives: A hierarchical means-end chain analysis. Transportation Research Part A: Policy and Practice, 47, 69–77. Schaefers, T. (2013). Exploring carsharing usage motives: A hierarchical means-end chain analysis. Transportation Research Part A: Policy and Practice, 47, 69–77.
go back to reference Schaefers, T., Lawson, S. J., & Kukar-Kinney, M. (2016a). How the burdens of ownership promote consumer usage of access-based services. Mark Lett, 27(3), 569–577. Schaefers, T., Lawson, S. J., & Kukar-Kinney, M. (2016a). How the burdens of ownership promote consumer usage of access-based services. Mark Lett, 27(3), 569–577.
go back to reference Schaefers, T., Wittkowski, K., Reynolds, S. B. N., & Ferraro, R. (2016). Contagious effects of customer misbehavior in access-based services. Journal of Service Research, 19(1), 3–21. Schaefers, T., Wittkowski, K., Reynolds, S. B. N., & Ferraro, R. (2016). Contagious effects of customer misbehavior in access-based services. Journal of Service Research, 19(1), 3–21.
go back to reference Schneider, C. Q., & Wagemann, C. (2012). Set-theoretic methods for the social sciences. Cambridge: Cambridge University Press. Schneider, C. Q., & Wagemann, C. (2012). Set-theoretic methods for the social sciences. Cambridge: Cambridge University Press.
go back to reference Schwartz, M. S. (2015). Ethical decision-making theory: An integrated approach. Journal of Business Ethics, 139(4), 755–776. Schwartz, M. S. (2015). Ethical decision-making theory: An integrated approach. Journal of Business Ethics, 139(4), 755–776.
go back to reference Silic, M., Barlow, J. B., & Back, A. (2017). A new perspective on neutralization and deterrence: Predicting shadow IT usage. Information & Management, 54(8), 1023–1037. Silic, M., Barlow, J. B., & Back, A. (2017). A new perspective on neutralization and deterrence: Predicting shadow IT usage. Information & Management, 54(8), 1023–1037.
go back to reference Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487–502. Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487–502.
go back to reference Siponen, M., Vance, A., & Willison, R. New insights for an old problem: Explaining software piracy through neutralization theory. In Proceedings of the 43rd Hawaii International Conference on System Sciences, 2010. Siponen, M., Vance, A., & Willison, R. New insights for an old problem: Explaining software piracy through neutralization theory. In Proceedings of the 43rd Hawaii International Conference on System Sciences, 2010.
go back to reference Skarmeas, D., Leonidou, C. N., & Saridakis, C. (2013). Examining the role of CSR skepticism using fuzzy-set qualitative comparative analysis. Journal of Business Research, 67(9), 1796–1805. Skarmeas, D., Leonidou, C. N., & Saridakis, C. (2013). Examining the role of CSR skepticism using fuzzy-set qualitative comparative analysis. Journal of Business Research, 67(9), 1796–1805.
go back to reference Sparks, P., & Shepherd, R. (2002). The role of moral judgments within expectancy-value-based attitude-behavior models. Ethics & Behavior, 12(4), 299–321. Sparks, P., & Shepherd, R. (2002). The role of moral judgments within expectancy-value-based attitude-behavior models. Ethics & Behavior, 12(4), 299–321.
go back to reference Steenhaut, S., & Kenhove, P. V. (2006). The mediating role of anticipated guilt in consumers’ ethical decision-making. Journal of Business Ethics, 69(3), 269–288. Steenhaut, S., & Kenhove, P. V. (2006). The mediating role of anticipated guilt in consumers’ ethical decision-making. Journal of Business Ethics, 69(3), 269–288.
go back to reference Stevens, B. (2008). Corporate ethical codes: Effective instruments for influencing behavior. Journal of Business Ethics, 78(4), 601–609. Stevens, B. (2008). Corporate ethical codes: Effective instruments for influencing behavior. Journal of Business Ethics, 78(4), 601–609.
go back to reference Straub, D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255–276. Straub, D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255–276.
go back to reference Sun, Y. (2018). Sharing and riding: How the dockless bike sharing scheme in China shapes the city. Urban Science, 2(3), 68–87. Sun, Y. (2018). Sharing and riding: How the dockless bike sharing scheme in China shapes the city. Urban Science, 2(3), 68–87.
go back to reference Tho, N. D., & Trang, N. T. M. (2015). Can knowledge be transferred from business schools to business organizations through in-service training students? SEM and fsQCA findings. Journal of Business Research, 68(6), 1332–1340. Tho, N. D., & Trang, N. T. M. (2015). Can knowledge be transferred from business schools to business organizations through in-service training students? SEM and fsQCA findings. Journal of Business Research, 68(6), 1332–1340.
go back to reference Ting, M.-S., Goh, Y.-N., & Isa, S. M. (2016). Determining consumer purchase intentions toward counterfeit luxury goods in Malaysia. Asia Pacific Management Review, 21(4), 219–230. Ting, M.-S., Goh, Y.-N., & Isa, S. M. (2016). Determining consumer purchase intentions toward counterfeit luxury goods in Malaysia. Asia Pacific Management Review, 21(4), 219–230.
go back to reference Tsaur, S.-H., Cheng, T.-M., & Hong, C.-Y. (2019). Exploring tour member misbehavior in group package tours. Tourism Management, 71, 34–43. Tsaur, S.-H., Cheng, T.-M., & Hong, C.-Y. (2019). Exploring tour member misbehavior in group package tours. Tourism Management, 71, 34–43.
go back to reference Urry, J. (2005). The complexity turn. Theory, Culture & Society, 22(5), 1–14. Urry, J. (2005). The complexity turn. Theory, Culture & Society, 22(5), 1–14.
go back to reference Vance, A., Fellow, S. J. B., Siponen, M. T., & Straub, D. W. (2019). Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Information & Management, 57(4), 103212. Vance, A., Fellow, S. J. B., Siponen, M. T., & Straub, D. W. (2019). Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Information & Management, 57(4), 103212.
go back to reference Vance, A., & Siponen, M. T. (2012). IS security policy violations: A rational choice perspective. Journal of Organizational and End User Computing, 24(1), 21–41. Vance, A., & Siponen, M. T. (2012). IS security policy violations: A rational choice perspective. Journal of Organizational and End User Computing, 24(1), 21–41.
go back to reference Veríssimo, J. M. C. (2016). Enablers and restrictors of mobile banking app use: A fuzzy set qualitative comparative analysis (fsQCA). Journal of Business Research, 69(11), 5456–5460. Veríssimo, J. M. C. (2016). Enablers and restrictors of mobile banking app use: A fuzzy set qualitative comparative analysis (fsQCA). Journal of Business Research, 69(11), 5456–5460.
go back to reference Wirtz, J., & Kum, D. (2004). Consumer cheating on service guarantees. Journal of the Academy of Marketing Science, 32(2), 159–175. Wirtz, J., & Kum, D. (2004). Consumer cheating on service guarantees. Journal of the Academy of Marketing Science, 32(2), 159–175.
go back to reference Yao, Y., Liu, L., Guo, Z., Liu, Z., & Zhou, H. (2018). Experimental study on shared bike use behavior under bounded rational theory and credit supervision mechanism. Sustainability, 11(1), 127–150. Yao, Y., Liu, L., Guo, Z., Liu, Z., & Zhou, H. (2018). Experimental study on shared bike use behavior under bounded rational theory and credit supervision mechanism. Sustainability, 11(1), 127–150.
go back to reference Yoon, C. (2011). Digital piracy intention: A comparison of theoretical models. Behaviour & Information Technology, 31(6), 565–576. Yoon, C. (2011). Digital piracy intention: A comparison of theoretical models. Behaviour & Information Technology, 31(6), 565–576.
Metadata
Title
A Configurational Analysis of the Causes of Consumer Indirect Misbehaviors in Access-Based Consumption
Authors
Xiao-Ling Jin
Zhongyun Zhou
Yiwei Tian
Publication date
06-10-2020
Publisher
Springer Netherlands
Published in
Journal of Business Ethics / Issue 1/2022
Print ISSN: 0167-4544
Electronic ISSN: 1573-0697
DOI
https://doi.org/10.1007/s10551-020-04637-8

Other articles of this Issue 1/2022

Journal of Business Ethics 1/2022 Go to the issue