Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Robertson, Diana C.
1993.
Empiricism in business ethics: Suggested research directions.
Journal of Business Ethics,
Vol. 12,
Issue. 8,
p.
585.
Metzger, Michael
Dalton, Dan R.
and
Hill, John W.
1993.
The Organization of Ethics and the Ethics of Organizations: The Case for Expanded Organizational Ethics Audits.
Business Ethics Quarterly,
Vol. 3,
Issue. 1,
p.
27.
Weber, James
1993.
Exploring the Relationship Between Personal Values and Moral Reasoning.
Human Relations,
Vol. 46,
Issue. 4,
p.
435.
Donaldson, Thomas
and
Dunfee, Thomas W.
1994.
Toward A Unified Conception Of Business Ethics: Integrative Social Contracts Theory.
Academy of Management Review,
Vol. 19,
Issue. 2,
p.
252.
DALTON, DAN R.
WIMBUSH, JAMES C.
and
DAILY, CATHERINE M.
1994.
USING THE UNMATCHED COUNT TECHNIQUE (UCT) TO ESTIMATE BASE RATES FOR SENSITIVE BEHAVIOR.
Personnel Psychology,
Vol. 47,
Issue. 4,
p.
817.
Burton, Brian K.
and
Near, Janet P.
1995.
Estimating the incidence of wrongdoing and whistle-blowing: Results of a study using randomized response technique.
Journal of Business Ethics,
Vol. 14,
Issue. 1,
p.
17.
Dalton, Dan R.
Wimbush, James C.
and
Daily, Catherine M.
1996.
Candor, Privacy, and “Legal Immunity” In Business Ethics Research: An Empirical Assessment of the Randomized Response Technique (RRT).
Business Ethics Quarterly,
Vol. 6,
Issue. 1,
p.
87.
Schoderbek, P. P.
and
Deshpande, Satish P.
1996.
Impression management, overclaiming, and perceived unethical conduct: The role of male and female managers.
Journal of Business Ethics,
Vol. 15,
Issue. 4,
p.
409.
Dalton, Dan R.
Daily, Catherine M.
and
Wimbush, James C.
1997.
Collecting "Sensitive" Data in Business Ethics Research: A Case for the Unmatched Count Technique (UCT).
Journal of Business Ethics,
Vol. 16,
Issue. 10,
p.
1049.
Dozier, Janelle Brinker
Husted, Bryan W.
and
Mcmahon, J. Timothy
1998.
Need for Approval in Low-Context and High-Context Cultures: A Communications Approach to Cross-Cultural Ethics.
Teaching Business Ethics,
Vol. 2,
Issue. 2,
p.
111.
Mael, Fred A.
1998.
Privacy and Personnel Selection: Reciprocal Rights and Responsibilities.
Employee Responsibilities and Rights Journal,
Vol. 11,
Issue. 3,
p.
187.
Cowton, Christopher J.
1998.
The Use of Secondary Data in Business Ethics Research.
Journal of Business Ethics,
Vol. 17,
Issue. 4,
p.
423.
Vidaver-Cohen, Deborah
1998.
Moral Climate in Business Firms: A Conceptual Framework for Analysis and Change.
Journal of Business Ethics,
Vol. 17,
Issue. 11,
p.
1211.
Harris, Howard
2001.
Content Analysis of Secondary Data: A Study of Courage in Managerial Decision Making.
Journal of Business Ethics,
Vol. 34,
Issue. 3-4,
p.
191.
Robertson, Diana C.
and
Rymon, Talia
2001.
Purchasing Agents’ Deceptive Behavior: A Randomized Response Technique Study.
Business Ethics Quarterly,
Vol. 11,
Issue. 3,
p.
455.
Oliphant, Becky J.
and
Oliphant, Gary C.
2001.
Using a behavior‐based method to identify and reduce employee theft.
International Journal of Retail & Distribution Management,
Vol. 29,
Issue. 10,
p.
442.
Guthrie, John
and
Bailey, Ainsworth A.
2006.
Retail employee theft: a theory of planned behavior perspective.
International Journal of Retail & Distribution Management,
Vol. 34,
Issue. 11,
p.
802.
Brown, Michael E.
and
Treviño, Linda K.
2006.
Socialized charismatic leadership, values congruence, and deviance in work groups..
Journal of Applied Psychology,
Vol. 91,
Issue. 4,
p.
954.
Gunz, Hugh
and
Gunz, Sally
2007.
Hired professional to hired gun: An identity theory approach to understanding the ethical behaviour of professionals in non-professional organizations.
Human Relations,
Vol. 60,
Issue. 6,
p.
851.
2008.
Bedeutung der Wirtschaftsethik für die marktorientierte Unternehmensführung.
p.
171.