Towards a Cross-Cultural Model of Online Whistle-Blowing Systems Use
Proceedings of the 12th Pacific Asia Conference on Information Systems (PACIS 2012), Ho Chi Minh City, Vietnam, July 11-15
10 Pages Posted: 30 Jun 2013 Last revised: 5 Sep 2016
Date Written: July 1, 2012
Abstract
Whistle-blowing has long been an important organizational phenomenon that improves organizations in the long-run. Online whistle-blowing systems are becoming increasingly prevalent channels for reporting organizational abuses. Given that the Sarbanes-Oxley Act and similar financial laws throughout the world require multi-national firms to establish whistle-blowing procedures and systems, whistle-blowing research is even more important (Ernst & Young 2009). Existing whistleblowing theory does not explicitly predict risk, trust, cross-cultural considerations, nor use of anonymous, online whistle-blowing systems. Yet, all of these are key considering in the whistleblowing act and whistle-blowing in general. Furthermore, unless these systems are further understood, they may not be used, or they may not be used properly. This is a particular problem for multi-national financial firms that increasingly need to comply with whistle-blowing regulations.
This research-in-process paper details our plans to create and extend baseline whistle-blowing theory, by uniquely considering anonymity, risk, trust, and cross-cultural considerations in using whistle-blowing systems. The model will be rigorously testing using working professionals in the USA, Middle East, and China. We propose our design and measures for testing the model.
Keywords: whistle blowing, whistle blowing systems, culture, Middle East, China, USA, anonymity, trust, risk, cross-cultural comparisons
Suggested Citation: Suggested Citation
Do you have a job opening that you would like to promote on SSRN?
Recommended Papers
-
By Clay Posey, Paul Benjamin Lowry, ...
-
By Paul Benjamin Lowry, Anthony Vance, ...
-
By Paul Benjamin Lowry, Dongsong Zhang, ...
-
By Paul Benjamin Lowry, Gregory D Moody, ...
-
Location-Sharing Technologies: Privacy Risks and Controls
By Janice Tsai, Patrick Gage Kelley, ...
-
By Paul Benjamin Lowry, David Wilson, ...
-
By Paul Benjamin Lowry, Jeffrey L. Jenkins, ...
-
By Mark J. Keith, Jeffry Babb, ...
-
By Paul Benjamin Lowry, Noelle Teh, ...
-
Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior
By Mark J. Keith, Samuel Thompson, ...