Serveur d'exploration sur le patient édenté

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Causes of employee theft and strategies that HR managers can use for prevention

Identifieur interne : 007737 ( Istex/Curation ); précédent : 007736; suivant : 007738

Causes of employee theft and strategies that HR managers can use for prevention

Auteurs : Brian P. Niehoff ; Robert J. Paul

Source :

RBID : ISTEX:F0CE4B0DE8BBD7948474B21479C84193DAA03450

Descripteurs français

English descriptors

Abstract

Business losses due to employee theft are estimated to approach $200 billion annually. Why do employees steal? Experts propose many reasons for employee theft, but provide few prevention strategies for human resource managers. In this article, the authors explore the various causes of employee theft, from employee personality characteristics, to the social environment, to flaws in the organization's control system. From this analysis, guidelines for theft prevention strategies are offered. Since strategies may involve top‐down control or trust‐building experiences for employees and managers, HR managers are encouraged to implement those strategies that fit their organization. © 2000 John Wiley & Sons, Inc.

Url:
DOI: 10.1002/(SICI)1099-050X(200021)39:1<51::AID-HRM5>3.0.CO;2-5

Links toward previous steps (curation, corpus...)


Links to Exploration step

ISTEX:F0CE4B0DE8BBD7948474B21479C84193DAA03450

Curation

No country items

Brian P. Niehoff
<affiliation>
<mods:affiliation>Mark R. Truitt Professor of Entrepreneurial Studies at the Kansas State University College of Business Administration.</mods:affiliation>
<wicri:noCountry code="no comma">Mark R. Truitt Professor of Entrepreneurial Studies at the Kansas State University College of Business Administration.</wicri:noCountry>
</affiliation>
Robert J. Paul
<affiliation>
<mods:affiliation>Kansas State University College of Business Administration</mods:affiliation>
<wicri:noCountry code="no comma">Kansas State University College of Business Administration</wicri:noCountry>
</affiliation>

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Causes of employee theft and strategies that HR managers can use for prevention</title>
<author>
<name sortKey="Niehoff, Brian P" sort="Niehoff, Brian P" uniqKey="Niehoff B" first="Brian P." last="Niehoff">Brian P. Niehoff</name>
<affiliation>
<mods:affiliation>Mark R. Truitt Professor of Entrepreneurial Studies at the Kansas State University College of Business Administration.</mods:affiliation>
<wicri:noCountry code="no comma">Mark R. Truitt Professor of Entrepreneurial Studies at the Kansas State University College of Business Administration.</wicri:noCountry>
</affiliation>
</author>
<author>
<name sortKey="Paul, Robert J" sort="Paul, Robert J" uniqKey="Paul R" first="Robert J." last="Paul">Robert J. Paul</name>
<affiliation>
<mods:affiliation>Kansas State University College of Business Administration</mods:affiliation>
<wicri:noCountry code="no comma">Kansas State University College of Business Administration</wicri:noCountry>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:F0CE4B0DE8BBD7948474B21479C84193DAA03450</idno>
<date when="2000" year="2000">2000</date>
<idno type="doi">10.1002/(SICI)1099-050X(200021)39:1<51::AID-HRM5>3.0.CO;2-5</idno>
<idno type="url">https://api.istex.fr/document/F0CE4B0DE8BBD7948474B21479C84193DAA03450/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">007737</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">007737</idno>
<idno type="wicri:Area/Istex/Curation">007737</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Causes of employee theft and strategies that HR managers can use for prevention</title>
<author>
<name sortKey="Niehoff, Brian P" sort="Niehoff, Brian P" uniqKey="Niehoff B" first="Brian P." last="Niehoff">Brian P. Niehoff</name>
<affiliation>
<mods:affiliation>Mark R. Truitt Professor of Entrepreneurial Studies at the Kansas State University College of Business Administration.</mods:affiliation>
<wicri:noCountry code="no comma">Mark R. Truitt Professor of Entrepreneurial Studies at the Kansas State University College of Business Administration.</wicri:noCountry>
</affiliation>
</author>
<author>
<name sortKey="Paul, Robert J" sort="Paul, Robert J" uniqKey="Paul R" first="Robert J." last="Paul">Robert J. Paul</name>
<affiliation>
<mods:affiliation>Kansas State University College of Business Administration</mods:affiliation>
<wicri:noCountry code="no comma">Kansas State University College of Business Administration</wicri:noCountry>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="j" type="main">Human Resource Management</title>
<title level="j" type="alt">HUMAN RESOURCE MANAGEMENT</title>
<idno type="ISSN">0090-4848</idno>
<idno type="eISSN">1099-050X</idno>
<imprint>
<biblScope unit="vol">39</biblScope>
<biblScope unit="issue">1</biblScope>
<biblScope unit="page" from="51">51</biblScope>
<biblScope unit="page" to="64">64</biblScope>
<biblScope unit="page-count">14</biblScope>
<publisher>John Wiley & Sons, Inc.</publisher>
<pubPlace>New York</pubPlace>
<date type="published" when="2000-03">2000-03</date>
</imprint>
<idno type="ISSN">0090-4848</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0090-4848</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>American industry</term>
<term>Anagement</term>
<term>Antisocial behavior</term>
<term>Background checks</term>
<term>Blue collar worker</term>
<term>Business administration</term>
<term>Cheryl cwiklinski</term>
<term>Clear expectations</term>
<term>Communication integrity</term>
<term>Compensation policies</term>
<term>Contract monitoring</term>
<term>Control systems</term>
<term>Convenience store employees</term>
<term>Critical point</term>
<term>Cummings staw</term>
<term>Danger signs</term>
<term>Deprivation</term>
<term>Desimone harris</term>
<term>Deterrent procedures</term>
<term>Deviance</term>
<term>Deviant behavior</term>
<term>Dishonest candidates</term>
<term>Distributive injustice</term>
<term>Employee</term>
<term>Employee assistance programs</term>
<term>Employee development</term>
<term>Employee pilferage</term>
<term>Employee theft</term>
<term>Employee theft centers</term>
<term>Employer publications</term>
<term>Equity theory</term>
<term>Fair credit</term>
<term>Focus groups</term>
<term>Formal procedures</term>
<term>Fraternal deprivation</term>
<term>Giacalone greenberg</term>
<term>Greenberg</term>
<term>Greenberg scott</term>
<term>Grievance process</term>
<term>Group norms</term>
<term>Guideline</term>
<term>Hogan hogan</term>
<term>Hollinger</term>
<term>Hollinger clark</term>
<term>Honest employees</term>
<term>Honesty tests</term>
<term>Human resource</term>
<term>Human resource management</term>
<term>Human resource managers</term>
<term>Integrity testing</term>
<term>Integrity tests</term>
<term>Interactional justice</term>
<term>Interactive</term>
<term>Interactive strategies</term>
<term>Interactive strategies focus</term>
<term>Internal accounting controls</term>
<term>Internal control structures</term>
<term>Intrinsic rewards</term>
<term>John wiley sons</term>
<term>Kansas state university college</term>
<term>Kpmg peat marwick</term>
<term>Management journal</term>
<term>Many companies</term>
<term>Monitoring employee perceptions</term>
<term>Organizational</term>
<term>Organizational behavior</term>
<term>Organizational leaders</term>
<term>Organizational policies</term>
<term>Orientation programs</term>
<term>Other hand</term>
<term>Perceptual event</term>
<term>Personal level</term>
<term>Personnel selection</term>
<term>Potential embezzlement</term>
<term>Prevention strategies</term>
<term>Primary systems</term>
<term>Procedural injustice</term>
<term>Procedural justice</term>
<term>Procedural strategies</term>
<term>Production deviance</term>
<term>Production process</term>
<term>Property deviance</term>
<term>Prospective employees</term>
<term>Psychological contract</term>
<term>Psychological contracts</term>
<term>Relative deprivation</term>
<term>Relative deprivation theory</term>
<term>Rousseau mclean parks</term>
<term>Sage publications</term>
<term>Security cameras</term>
<term>Security experts</term>
<term>Security systems</term>
<term>Selection process</term>
<term>Skill development</term>
<term>Small firms</term>
<term>Social level</term>
<term>Socialization process</term>
<term>Systemic</term>
<term>Systemic level</term>
<term>Taxonomy</term>
<term>Taylor prien</term>
<term>Theft</term>
<term>Theft behavior</term>
<term>Theft behaviors</term>
<term>Theft prevention</term>
<term>Theft prevention strategies</term>
<term>Tyler bies</term>
<term>Underpayment inequity</term>
<term>Various causes</term>
<term>Wall street journal</term>
<term>Workplace</term>
<term>Workplace deviance</term>
<term>Workplace fairness</term>
</keywords>
<keywords scheme="Teeft" xml:lang="en">
<term>American industry</term>
<term>Anagement</term>
<term>Antisocial behavior</term>
<term>Background checks</term>
<term>Blue collar worker</term>
<term>Business administration</term>
<term>Cheryl cwiklinski</term>
<term>Clear expectations</term>
<term>Communication integrity</term>
<term>Compensation policies</term>
<term>Contract monitoring</term>
<term>Control systems</term>
<term>Convenience store employees</term>
<term>Critical point</term>
<term>Cummings staw</term>
<term>Danger signs</term>
<term>Deprivation</term>
<term>Desimone harris</term>
<term>Deterrent procedures</term>
<term>Deviance</term>
<term>Deviant behavior</term>
<term>Dishonest candidates</term>
<term>Distributive injustice</term>
<term>Employee</term>
<term>Employee assistance programs</term>
<term>Employee development</term>
<term>Employee pilferage</term>
<term>Employee theft</term>
<term>Employee theft centers</term>
<term>Employer publications</term>
<term>Equity theory</term>
<term>Fair credit</term>
<term>Focus groups</term>
<term>Formal procedures</term>
<term>Fraternal deprivation</term>
<term>Giacalone greenberg</term>
<term>Greenberg</term>
<term>Greenberg scott</term>
<term>Grievance process</term>
<term>Group norms</term>
<term>Guideline</term>
<term>Hogan hogan</term>
<term>Hollinger</term>
<term>Hollinger clark</term>
<term>Honest employees</term>
<term>Honesty tests</term>
<term>Human resource</term>
<term>Human resource management</term>
<term>Human resource managers</term>
<term>Integrity testing</term>
<term>Integrity tests</term>
<term>Interactional justice</term>
<term>Interactive</term>
<term>Interactive strategies</term>
<term>Interactive strategies focus</term>
<term>Internal accounting controls</term>
<term>Internal control structures</term>
<term>Intrinsic rewards</term>
<term>John wiley sons</term>
<term>Kansas state university college</term>
<term>Kpmg peat marwick</term>
<term>Management journal</term>
<term>Many companies</term>
<term>Monitoring employee perceptions</term>
<term>Organizational</term>
<term>Organizational behavior</term>
<term>Organizational leaders</term>
<term>Organizational policies</term>
<term>Orientation programs</term>
<term>Other hand</term>
<term>Perceptual event</term>
<term>Personal level</term>
<term>Personnel selection</term>
<term>Potential embezzlement</term>
<term>Prevention strategies</term>
<term>Primary systems</term>
<term>Procedural injustice</term>
<term>Procedural justice</term>
<term>Procedural strategies</term>
<term>Production deviance</term>
<term>Production process</term>
<term>Property deviance</term>
<term>Prospective employees</term>
<term>Psychological contract</term>
<term>Psychological contracts</term>
<term>Relative deprivation</term>
<term>Relative deprivation theory</term>
<term>Rousseau mclean parks</term>
<term>Sage publications</term>
<term>Security cameras</term>
<term>Security experts</term>
<term>Security systems</term>
<term>Selection process</term>
<term>Skill development</term>
<term>Small firms</term>
<term>Social level</term>
<term>Socialization process</term>
<term>Systemic</term>
<term>Systemic level</term>
<term>Taxonomy</term>
<term>Taylor prien</term>
<term>Theft</term>
<term>Theft behavior</term>
<term>Theft behaviors</term>
<term>Theft prevention</term>
<term>Theft prevention strategies</term>
<term>Tyler bies</term>
<term>Underpayment inequity</term>
<term>Various causes</term>
<term>Wall street journal</term>
<term>Workplace</term>
<term>Workplace deviance</term>
<term>Workplace fairness</term>
</keywords>
<keywords scheme="Wicri" type="topic" xml:lang="fr">
<term>économie de l'entreprise</term>
<term>Vol</term>
<term>Lieu de travail</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Business losses due to employee theft are estimated to approach $200 billion annually. Why do employees steal? Experts propose many reasons for employee theft, but provide few prevention strategies for human resource managers. In this article, the authors explore the various causes of employee theft, from employee personality characteristics, to the social environment, to flaws in the organization's control system. From this analysis, guidelines for theft prevention strategies are offered. Since strategies may involve top‐down control or trust‐building experiences for employees and managers, HR managers are encouraged to implement those strategies that fit their organization. © 2000 John Wiley & Sons, Inc.</div>
</front>
</TEI>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Santé/explor/EdenteV2/Data/Istex/Curation
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 007737 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Curation/biblio.hfd -nk 007737 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Santé
   |area=    EdenteV2
   |flux=    Istex
   |étape=   Curation
   |type=    RBID
   |clé=     ISTEX:F0CE4B0DE8BBD7948474B21479C84193DAA03450
   |texte=   Causes of employee theft and strategies that HR managers can use for prevention
}}

Wicri

This area was generated with Dilib version V0.6.32.
Data generation: Thu Nov 30 15:26:48 2017. Site generation: Tue Mar 8 16:36:20 2022