Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title
Copyright
Contents
List of Illustrations
Preface
Acknowledgements
List of Abbreviations
1 Introduction
The apple metaphor
Integrity as a trait
Work groups and counter-productive work behaviors
The organization of jobs
The process
Organizational intervention
Dealing with unacceptable employee behavior
Conclusion
2 Counter-Productive Work Behaviors: The Nature and Size of the Problem
Introduction
Theft
Fraud
Bribery and corruption
Deceit
Information leakage (citizenship espionage)
Whistle-blowing
Espionage
Sabotage
Cyber-crime
Resignations
Conclusion
3 Counter-Productive Work Behaviors: Why Do They Do It?
Introduction
Human motivation
Herzberg’s theory
Equity theory
Justice at work
The motivational context
Theories related to specific CWBs
Conclusion
4 Bad Eggs and Bad Apples
Introduction
The wrong focus
Vengeful litigation
The criminal personality
Personality, intelligence and crime
Eysenck’s Theory of the Criminal Personality
The anti-social personality, the psychopath or moral imbecile
Criminal personality disorder
Case study
Narcissistic bosses
The bullying boss
The toxic boss
Conclusion
5 Measuring Dark- and Bright-Side Attitudes, Beliefs and Behaviors
Introduction
The organization of work
Measuring CWBs by questionnaire
Organizational commitment and attachment
Organizational citizenship
Ethical climates and cultures
Disengagement at work
Conclusion
6 Deception, Dissimulation, Impression Management, Lying and the Truth
Introduction
Popular books and simple advice
Why do people lie
Catching liars: Why they fail
The clues to deceit
Faking on questionnaires
Getting at the truth
Cognitive interviewing in the workplace
Conclusion
7 Integrity Testing
Introduction
“Honesty” screening
Integrity testing at work
Self-report tests of integrity
Do integrity tests work?
Objections to integrity testing
Public policy
Measuring integrity
The lie detector (polygraph)
Conclusion
8 Protecting Your Assets
Introduction
“Enough security”
Detection
Recruiting the right people
Induction
Computers
Physical security
Security officers at all exits
Electronic methods: closed circuit TV
Policing the police
Exit policy
Anticipating trouble
Handling the press
Conclusion
9 Developing Loyalty and Commitment
Introduction
Risk assessment
Towards a strategy
Exit policy
Conclusion
10 Counter- Productive Work Behaviors: Case Studies
ALDRICH AMES: Betrayer of his employer – the CIA, and his country – the United States of America
NICK LEESON: Broke the rules and caused the collapse of The UK’s oldest bank – Barings
JEFFREY WIGAND: Revealed the illegal activities of his employers, Brown & Williamson, the US Tobacco giant, in the press and courts
JEROME KERVIEL: Made a series of unauthorized trades totaling as much as €50 billion
DANIEL JAMES: Convicted of communicating information calculated to be useful to an enemy
Bibliography
Index
← Prev
Back
Next →
← Prev
Back
Next →