Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Copyright Contents List of Illustrations Preface Acknowledgements List of Abbreviations 1 Introduction
The apple metaphor Integrity as a trait Work groups and counter-productive work behaviors The organization of jobs The process Organizational intervention Dealing with unacceptable employee behavior Conclusion
2 Counter-Productive Work Behaviors: The Nature and Size of the Problem
Introduction Theft Fraud Bribery and corruption Deceit Information leakage (citizenship espionage) Whistle-blowing Espionage Sabotage Cyber-crime Resignations Conclusion
3 Counter-Productive Work Behaviors: Why Do They Do It?
Introduction Human motivation Herzberg’s theory Equity theory Justice at work The motivational context Theories related to specific CWBs Conclusion
4 Bad Eggs and Bad Apples
Introduction The wrong focus Vengeful litigation The criminal personality Personality, intelligence and crime Eysenck’s Theory of the Criminal Personality The anti-social personality, the psychopath or moral imbecile Criminal personality disorder Case study Narcissistic bosses The bullying boss The toxic boss Conclusion
5 Measuring Dark- and Bright-Side Attitudes, Beliefs and Behaviors
Introduction The organization of work Measuring CWBs by questionnaire Organizational commitment and attachment Organizational citizenship Ethical climates and cultures Disengagement at work Conclusion
6 Deception, Dissimulation, Impression Management, Lying and the Truth
Introduction Popular books and simple advice Why do people lie Catching liars: Why they fail The clues to deceit Faking on questionnaires Getting at the truth Cognitive interviewing in the workplace Conclusion
7 Integrity Testing
Introduction “Honesty” screening Integrity testing at work Self-report tests of integrity Do integrity tests work? Objections to integrity testing Public policy Measuring integrity The lie detector (polygraph) Conclusion
8 Protecting Your Assets
Introduction “Enough security” Detection Recruiting the right people Induction Computers Physical security Security officers at all exits Electronic methods: closed circuit TV Policing the police Exit policy Anticipating trouble Handling the press Conclusion
9 Developing Loyalty and Commitment
Introduction Risk assessment Towards a strategy Exit policy Conclusion
10 Counter- Productive Work Behaviors: Case Studies
ALDRICH AMES: Betrayer of his employer – the CIA, and his country – the United States of America NICK LEESON: Broke the rules and caused the collapse of The UK’s oldest bank – Barings JEFFREY WIGAND: Revealed the illegal activities of his employers, Brown & Williamson, the US Tobacco giant, in the press and courts JEROME KERVIEL: Made a series of unauthorized trades totaling as much as €50 billion DANIEL JAMES: Convicted of communicating information calculated to be useful to an enemy
Bibliography Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion