[HTML][HTML] Increasing organic food consumption: An integrating model of drivers and barriers

R Hansmann, I Baur, CR Binder - Journal of Cleaner Production, 2020 - Elsevier
A survey of 620 Swiss households was conducted to investigate the determinants of
purchases of organic fruits and vegetables and identify subjectively perceived requirements …

A model of neutralization techniques

M Kaptein, M Van Helvoort - Deviant behavior, 2019 - Taylor & Francis
Neutralizations are important explanations for the rise and persistence of deviant behavior.
We can find many different and overlapping techniques of neutralizations in the literature …

Beyond deterrence: An expanded view of employee computer abuse

R Willison, M Warkentin - MIS quarterly, 2013 - JSTOR
Recent academic investigations of computer security policy violations have largely focused
on non-malicious noncompliance due to poor training, low employee motivation, weak …

What have we learned from five decades of neutralization research?

S Maruna, H Copes - Crime and justice, 2005 - journals.uchicago.edu
Neutralization theory, though a popular framework for understanding deviant behavior,
remains badly underdeveloped. Few attempts have been made to connect it to narrative and …

[图书][B] Essential criminology

MM Lanier, S Henry, A Desire'JM - 2018 - taylorfrancis.com
In the fourth edition of Essential Criminology, authors Mark M. Lanier, Stuart Henry, and
Desire. M. Anastasia build upon this best-selling critical review of criminology, which has …

Why people don't take their concerns about fair trade to the supermarket: The role of neutralisation

A Chatzidakis, S Hibbert, AP Smith - Journal of business ethics, 2007 - Springer
This article explores how neutralisation can explain people's lack of commitment to buying
Fair Trade (FT) products, even when they identify FT as an ethical concern. It examines the …

Don't make excuses! Discouraging neutralization to reduce IT policy violation

JB Barlow, M Warkentin, D Ormond, AR Dennis - Computers & security, 2013 - Elsevier
Past research on information technology (IT) security training and awareness has focused
on informing employees about security policies and formal sanctions for violating those …

Moral disengagement in self‐reported and peer‐nominated school bullying

ML Obermann - Aggressive behavior, 2011 - Wiley Online Library
This study examined the relation between moral disengagement and different self‐reported
and peer‐nominated positions in school bullying. The aims of this study were to (1) …

[图书][B] Juvenile delinquency: A sociological approach

WE Thompson, JE Bynum - 2016 - books.google.com
This sophomore/junior level core text is intended for the juvenile delinquency course taught
in criminal justice, criminology, and sociology departments at both four year and two year …

Strategies for climate change and impression management: A case study among Canada's large industrial emitters

D Talbot, O Boiral - Journal of Business Ethics, 2015 - Springer
This paper explores the justifications and impression management strategies that industrial
companies use to rationalize their impacts on climate change. These strategies influence the …