395
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Trust, and high control: an exploratory study of Counterproductive Work Behaviour in a high security organization

ORCID Icon &
Received 02 Feb 2023, Accepted 02 Apr 2024, Published online: 25 Apr 2024

References

  • Ashforth, B. E., Caza, B. B., & Meister, A. (2023). My place: How workers become identified with their workplaces and why it matters. Academy of Management Review, amr.2020.0442. https://doi.org/10.5465/amr.2020.0442
  • Ballinger, G. A., & Rockmann, K. W. (2010). Chutes versus ladders: Anchoring events and a punctuated-equilibrium perspective on social exchange relationships. Academy of Management Review, 35(3), 373–391. https://doi.org/10.5465/amr.35.3.zok373
  • Berkelaar, B. L. (2014). Cybervetting, online information, and personnel selection: New transparency expectations and the emergence of a digital social contract. Management Communication Quarterly, 28(4), 479–506. https://doi.org/10.1177/0893318914541966
  • Bijlsma-Frankema, K., Sitkin, S. B., & Weibel, A. (2015). Distrust in the balance: The emergence and development of intergroup distrust in a court of law. Organization Science, 26(4), 1018–1039. https://doi.org/10.1287/orsc.2015.0977
  • Bollmann, G., & Krings, F. (2016). Workgroup climates and employees’ counterproductive work behaviours: A social-cognitive perspective. Journal of Management Studies, 53(2), 184–209. https://doi.org/10.1111/joms.12167
  • Bordia, P., Restubog, S. L. D., & Tang, R. L. (2008). When employees strike back: Investigating mediating mechanisms between psychological contract breach and workplace deviance. Journal of Applied Psychology, 93(5), 1104–1117. https://doi.org/10.1037/0021-9010.93.5.1104
  • Bowen, D. E., & Ostroff, C. (2004). Understanding HRM–firm performance linkages: The role of the “strength” of the HRM system. Academy of Management Review, 29(2), 203–221. https://doi.org/10.5465/amr.2004.12736076
  • Braun, V., & Clarke, V. (2021). One size fits all? What counts as quality practice in (reflexive) thematic analysis? Qualitative Research in Psychology, 18(3), 328–352. https://doi.org/10.1080/14780887.2020.1769238
  • Brown, A. D., & Coupland, C. (2015). Identity threats, identity work and elite professionals. Organization Studies, 36(10), 1315–1336. https://doi.org/10.1177/0170840615593594
  • Carpenter, N. C., Whitman, D. S., & Amrhein, R. (2021). Unit-level counterproductive work behavior (CWB): A conceptual review and quantitative summary. Journal of Management, 47(6), 1498–1527. https://doi.org/10.1177/0149206320978812
  • Colquitt, J. A., LePine, J. A., Piccolo, R. F., Zapata, C. P., & Rich, B. L. (2012). Explaining the justice–performance relationship: Trust as exchange deepener or trust as uncertainty reducer? Journal of Applied Psychology, 97(1), 1–15. https://doi.org/10.1037/a0025208
  • Cregan, C., Kulik, C. T., Johnston, S., & Bartram, T. (2021). The influence of calculative (“hard”) and collaborative (“soft”) HRM on the layoff-performance relationship in high performance workplaces. Human Resource Management Journal, 31(1), 202–224. https://doi.org/10.1111/1748-8583.12291
  • Dahling, J. J., & Gutworth, M. B. (2017). Loyal rebels? A test of the normative conflict model of constructive deviance. Journal of Organizational Behavior, 38(8), 1167–1182. https://doi.org/10.1002/job.2194
  • Duffy, M. K., Ganster, D. C., Shaw, J. D., Johnson, J. L., & Pagon, M. (2006). The social context of undermining behavior at work. Organizational Behavior and Human Decision Processes, 101(1), 105–126. https://doi.org/10.1016/j.obhdp.2006.04.005
  • Edmondson, A. (1999). A safe harbor: Social psychological conditions enabling boundary spanning in work teams. In R. Wageman (Ed.), Research on managing groups and teams: Groups in context (Vol. 2, pp. 179–199). Elsevier Science/JAI Press.
  • Fida, R., Paciello, M., Tramontano, C., Fontaine, R. G., Barbaranelli, C., & Farnese, M. L. (2015). An integrative approach to understanding counterproductive work behavior: The roles of stressors, negative emotions, and moral disengagement. Journal of Business Ethics, 130(1), 131–144. https://doi.org/10.1007/s10551-014-2209-5
  • Flanagan, J. C. (1954). The Critical Incident Technique. Psychological Bulletin, 51(4), 327–358. https://doi.org/10.1037/h0061470
  • Fox, S., & Spector, P. E. (2006). The many roles of control in a stressor-emotion theory of counterproductive work behavior. In P. L. Perrewé & D. C. Ganster (Eds.), Employee Health, Coping and Methodologies (Vol. 5, pp. 171–201). Emerald Group Publishing Limited. https://doi.org/10.1016/S1479-3555(05)05005-5
  • Fox, S., Spector, P. E., & Miles, D. (2001). Counterproductive work behavior (CWB) in response to job stressors and organizational justice: Some mediator and moderator tests for autonomy and emotions. Journal of Vocational Behavior, 59(3), 291–309. https://doi.org/10.1006/jvbe.2001.1803
  • Ghosh, K. (2023). Employee-perceived ‘motivation-enhancing HRM practices’ and career ambition: Social subjective norms explain workplace deviant behavior. Human Resource Management Journal, 33(4), 1074–1096. https://doi.org/10.1111/1748-8583.12503
  • Götz, M., Bollmann, G., & O’Boyle, E. H. (2019). Contextual undertow of workplace deviance by and within units: A systematic review. Small Group Research, 50(1), 39–80. https://doi.org/10.1177/1046496418790044
  • Gould-Williams, J. (2003). The importance of HR practices and workplace trust in achieving superior performance: A study of public-sector organizations. The International Journal of Human Resource Management, 14(1), 28–54. https://doi.org/10.1080/09585190210158501
  • Grawemeyer, B., & Johnson, H. (2011). Using and managing multiple passwords: A week to a view. Interacting with Computers, 23(3), 256–267. https://doi.org/10.1016/j.intcom.2011.03.007
  • Greenberg, J. (1990). Organizational justice: Yesterday, today, and tomorrow. Journal of Management, 16(2), 399–432. https://doi.org/10.1177/014920639001600208
  • Guest, D. E. (1987). Human resource management and industrial relations [1]. Journal of Management Studies, 24(5), 503–521. https://doi.org/10.1111/j.1467-6486.1987.tb00460.x
  • Guest, D. E. (2017). Human resource management and employee well-being: Towards a new analytic framework. Human Resource Management Journal, 27(1), 22–38. https://doi.org/10.1111/1748-8583.12139
  • Hope, L., Mullis, R., & Gabbert, F. (2013). Who? what? when? Using a timeline technique to facilitate recall of a complex event. Journal of Applied Research in Memory and Cognition, 2(1), 20–24. https://doi.org/10.1016/j.jarmac.2013.01.002
  • Janczewski, L. J., & Portougal, V. (2000). “Need-to-know” principle and fuzzy security clearances modelling. Information Management & Computer Security, 8(5), 210–217. https://doi.org/10.1108/09685220010356247
  • Jensen, J. M., Opland, R. A., & Ryan, A. M. (2010). Psychological contracts and counterproductive work behaviors: Employee responses to transactional and relational breach. Journal of Business and Psychology, 25(4), 555–568. https://doi.org/10.1007/s10869-009-9148-7
  • Kisling, L. A., & Das, J. M. (2023). Prevention strategies. In StatPearls [internet]. StatPearls Publishing.
  • Kraak, J. M., Hansen, S. D., Griep, Y., Bhattacharya, S., Bojovic, N., Diehl, M.-R., Evans, K., Fenneman, J., Ishaque Memon, I., Fortin, M., Lau, A., Lee, H., Lee, J., Lub, X., Meyer, I., Ohana, M., Peters, P., Rousseau, D. M., Schalk, R., & Tekleab, A. (2024). In pursuit of impact: How psychological contract research can make the work-world a better place. Group & Organization Management, 10596011241233019. https://doi.org/10.1177/10596011241233019
  • Lazányi, K., & Danaj, A. (2022). Can trust be a factor of organisational safety and security? In T. A. Kovács, Z. Nyikes, & I. Fürstner (Eds.), Security-related advanced technologies in critical infrastructure protection (pp. 379–390). Springer Netherlands.
  • Liao, E. Y., Wang, A. Y., & Zhang, C. Q. (2021). Who influences employees’ dark side: A multi-foci meta-analysis of counterproductive workplace behaviors. Organizational Psychology Review, 11(2), 97–143. https://doi.org/10.1177/2041386620962554
  • Lomas, D. W. B. (2021). #forgetjamesbond: Diversity, inclusion and the UK’s intelligence agencies. Intelligence and National Security, 36(7), 995–1017. https://doi.org/10.1080/02684527.2021.1938370
  • Long, C. P., & Sitkin, S. B. (2018). Control–trust dynamics in organizations: Identifying shared perspectives and charting conceptual fault lines. Academy of Management Annals, 12(2), 725–751. https://doi.org/10.5465/annals.2016.0055
  • Lumineau, F., Schilke, O., & Wang, W. (2023). Organizational trust in the age of the fourth industrial revolution: Shifts in the form, production, and targets of trust. Journal of Management Inquiry, 32(1), 21–34. https://doi.org/10.1177/10564926221127852
  • Martin, P. (2023). Insider risk and personnel security: An introduction. Taylor & Francis.
  • Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734. https://doi.org/10.2307/258792
  • Morgeson, F. P., & Hofmann, D. A. (1999). The structure and function of collective constructs: Implications for multilevel research and theory development. Academy of Management Review, 24(2), 249–265. https://doi.org/10.5465/amr.1999.1893935
  • O’Boyle, E. H., Jr., Forsyth, D. R., Banks, G. C., & McDaniel, M. A. (2012). A meta-analysis of the dark triad and work behavior: A social exchange perspective. Journal of Applied Psychology, 97(3), 557–579. https://doi.org/10.1037/a0025679
  • Ozyilmaz, A., Erdogan, B., & Karaeminogullari, A. (2018). Trust in organization as a moderator of the relationship between self-efficacy and workplace outcomes: A social cognitive theory-based examination. Journal of Occupational and Organizational Psychology, 91(1), 181–204. https://doi.org/10.1111/joop.12189
  • Rice, C., & Searle, R. H. (2022). The enabling role of internal organizational communication in insider threat activity – evidence from a high security organization. Management Communication Quarterly, 36(3), 467–495. https://doi.org/10.1177/08933189211062250
  • Rice, C., Stanton, E., & Taylor, M. (2021). A communication toolkit to build trust: Lessons from Northern Ireland’s civil society peacebuilders. Voluntas, 32, 1154–1164. https://doi.org/10.1007/s11266-021-00376-0
  • Riese, J. (2019). What is ‘access’ in the context of qualitative research?. Qualitative Research, 19(6), 669–684.
  • Robinson, S. L. (1996). Trust and breach of the psychological contract. Administrative Science Quarterly, 41(4), 574–599. https://doi.org/10.2307/2393868
  • Robinson, S. L., & Bennett, R. J. (1995). A typology of deviant workplace behaviors: A multidimensional scaling study. Academy of Management Journal, 38(2), 555–572. https://doi.org/10.2307/256693
  • Salancik, G. R., & Pfeffer, J. (1978). A social information processing approach to job attitudes and task design. Administrative science quarterly, 23(2), 224–253. https://doi.org/10.2307/2392563
  • Searle, R. H., & Rice, C. (2018). Assessing and mitigating the impact of organisational change on counterproductive work behaviour: An operational (dis) trust based framework. CREST. https://crestresearch.ac.uk/resources/reports/cwb-full-report/
  • Siebert, S., & Czarniawska, B. (2020). Distrust: Not only in secret service organizations. Journal of Management Inquiry, 29(3), 286–298. https://doi.org/10.1177/1056492618798939
  • Skinner, D., Dietz, G., & Weibel, A. (2014). The dark side of trust: When trust becomes a ‘poisoned chalice’. Organization, 21(2), 206–224. https://doi.org/10.1177/1350508412473866
  • Snell, S. A. (1992). Control theory in strategic human resource management: The mediating effect of administrative information. Academy of Management Journal, 35(2), 292–327. https://doi.org/10.2307/256375
  • Spector, P. E., Fox, S., Penney, L. M., Bruursema, K., Goh, A., & Kessler, S. (2006). The dimensionality of counterproductivity: Are all counterproductive behaviors created equal? Journal of Vocational Behavior, 68(3), 446–460. https://doi.org/10.1016/j.jvb.2005.10.005
  • Strauss, A., & Corbin, J. (1998). Basics of qualitative research: Techniques and procedures for developing grounded theory (2nd ed.). Sage.
  • Tracy, S. J. (2018). A phronetic iterative approach to data analysis in qualitative research. Journal of Qualitative Research, 19(2), 61–76.
  • Truss, C., Gratton, L., Hope‐Hailey, V., McGovern, P., & Stiles, P. (1997). Soft and hard models of human resource management: A reappraisal. Journal of Management Studies, 34(1), 53–73. https://doi.org/10.1111/1467-6486.00042
  • van der Werff, L., & Buckley, F. (2017). Getting to know you: A longitudinal examination of trust cues and trust development during socialization. Journal of Management, 43(3), 742–770. https://doi.org/10.1177/0149206314543475
  • Vedel, J. B., & Geraldi, J. (2022). How managers respond to paradoxical control‐trust dynamics in interorganizational relationships over time: A constitutive approach. Journal of Management Studies, 60(8), 2060–2090. https://doi.org/10.1111/joms.12846
  • Vogl, S., Schmidt, E.-M., & Zartler, U. (2019). Triangulating perspectives: Ontology and epistemology in the analysis of qualitative multiple perspective interviews. International Journal of Social Research Methodology, 22(6), 611–624. https://doi.org/10.1080/13645579.2019.1630901
  • Weibel, A., Den Hartog, D. N., Gillespie, N., Searle, R., Six, F., & Skinner, D. (2016). How do controls impact employee trust in the employer? Human Resource Management, 55(3), 437–462. https://doi.org/10.1002/hrm.21733
  • Weiner, B. (1985). An attributional theory of achievement motivation and emotion. Psychological Review, 92(4), 548–573. https://doi.org/10.1037/0033-295X.92.4.548
  • Wo, D. X. H., Schminke, M., & Ambrose, M. L. (2019). Trickle-down, trickle-out, trickle-up, trickle-in, and trickle-around effects: An integrative perspective on indirect social influence phenomena. Journal of Management, 45(6), 2263–2292.