Access the full text.
Sign up today, get DeepDyve free for 14 days.
R. Dingledine, N. Mathewson, P. Syverson (2004)
Tor: the second-generation onion routerProceedings of the 13th USENIX Security Symposium
M. Miceli, J. Near, T. Dworkin (2009)
A Word to the Wise: How Managers and Policy-Makers can Encourage Employees to Report WrongdoingJournal of Business Ethics, 86
J. Near, M. Miceli (1995)
Effective-Whistle BlowingAcademy of Management Review, 20
Peter Coe (2018)
Anonymity and pseudonymity: Free speech’s problem children, 22
M. Keil, A. Tiwana, R. Sainsbury, S. Sneha (2010)
Toward a Theory of Whistleblowing Intentions: A Benefit-to-Cost Differential PerspectiveDecis. Sci., 41
Cynthia Guthrie, C. Norman, Jacob Rose (2012)
Chief Audit Executives' Evaluations of Whistle-Blowing AllegationsBehavioral Research in Accounting, 24
Wim Vandekerckhove, David Lewis (2011)
The Content of Whistleblowing Procedures: A Critical Review of Recent Official GuidelinesJournal of Business Ethics, 108
The Journal of Finance, LXV
Jijie Wang, M. Keil, Li Wang (2015)
The Effect of Moral Intensity on it Employees' Bad News ReportingJournal of Computer Information Systems, 55
J. Donath (1998)
Identity and deception in the virtual community
I. Dyck, Adair Morse, Luigi Zingales (2007)
Who Blows the Whistle on Corporate Fraud?
F. Elliston (1982)
Anonymity and whistleblowingJournal of Business Ethics, 1
A. Appelman, Shyam Sundar (2016)
Measuring Message CredibilityJournalism & Mass Communication Quarterly, 93
P. Lowry, Gregory Moody, D. Galletta, Anthony Vance (2013)
The Drivers in the Use of Online Whistle-Blowing Reporting SystemsJournal of Management Information Systems, 30
Clay Posey, T. Roberts, P. Lowry, R. Bennett, J. Courtney (2013)
Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated BehaviorsMIS Q., 37
E. Shaw, Keven Ruby, J. Post
The Insider Threat to Information Systems
Stephen Stubben, Kyle Welch (2020)
Evidence on the Use and Efficacy of Internal Whistleblowing SystemsLSN: Law & Finance: Empirical (Topic)
J. Near, M. Miceli (1986)
Retaliation against whistle blowers: Predictors and effects.Journal of Applied Psychology, 71
Tzu-Yuan Chao, Yun Chou (2017)
To reveal or not to reveal
J. Near, T. Jensen (1983)
The Whistleblowing ProcessWork and Occupations, 10
Security Awareness Bulletin, 2
M. Miceli, J. Near (2005)
Standing Up or Standing By: What Predicts Blowing the Whistle on Organizational Wrongdoing?, 24
Philip Jos, M. Tompkins, S. Hays (1989)
In Praise of Difficult People: A Portrait of the Committed WhistleblowerPublic Administration Review, 49
D. Schultz, Kh.S Harutyunyan (2015)
Combating corruption: The development of whistleblowing laws in the United States, Europe, and ArmeniaInternational Comparative Jurisprudence, 1
S. Kaplan, Joseph Schultz (2007)
Intentions to Report Questionable Acts: An Examination of the Influence of Anonymous Reporting Channel, Internal Audit Quality, and SettingJournal of Business Ethics, 71
Susan Ayers, S. Kaplan (2005)
Wrongdoing by Consultants: An Examination of Employees’ Reporting IntentionsJournal of Business Ethics, 57
H. Smith, M. Keil (2003)
The reluctance to report bad news on troubled software projects: a theoretical modelInformation Systems Journal, 13
E. Pittroff (2016)
Whistle-blowing regulation in different corporate governance systems: an analysis of the regulation approaches from the view of path dependence theoryJournal of Management & Governance, 20
Hua Xin, A. Techatassanasoontorn, F. Tan (2015)
Antecedents of Consumer Trust in Mobile Payment AdoptionJournal of Computer Information Systems, 55
Miriam Metzger (2007)
Making sense of credibility on the Web: Models for evaluating online information and recommendations for future researchJ. Assoc. Inf. Sci. Technol., 58
Stephen Rains, C. Scott (2007)
To Identify or Not to Identify: A Theoretical Model of Receiver Responses to Anonymous CommunicationCommunication Theory, 17
Joyce Rothschild, Terance Miethe (1999)
Whistle-Blower Disclosures and Management RetaliationWork and Occupations, 26
Ivanka Pjesivac, R. Rui (2014)
Anonymous sources hurt credibility of news stories across cultures: A comparative experiment in America and ChinaInternational Communication Gazette, 76
(2020)
Mamma mia, here you blow again! My my, how can we protect you? – the development of a threat model for whistleblower anonymity
Rob Sherwood, Bobby Bhattacharjee, A. Srinivasan (2002)
P/sup 5/ : a protocol for scalable anonymous communicationProceedings 2002 IEEE Symposium on Security and Privacy
Y. Kalman, S. Rafaeli (2011)
Online Pauses and Silence: Chronemic Expectancy Violations in Written Computer-Mediated CommunicationCommunication Research, 38
Carl Worth (2002)
Proceedings of the Freenix Track: 2003 Usenix Annual Technical Conference Xstroke: Full-screen Gesture Recognition for X
Communication Theory, 8
S. Kaplan, K. Pany, Janet Samuels, Jian Zhang (2012)
An examination of anonymous and non-anonymous fraud reporting channelsAdvances in Accounting, 28
Christie Fuller, D. Biros, D. Delen (2011)
An investigation of data and text mining methods for real world deception detectionExpert Syst. Appl., 38
J. Near, M. Miceli (1985)
Organizational dissidence: The case of whistle-blowingJournal of Business Ethics, 4
Chongwook Park, M. Keil (2009)
Organizational Silence and Whistle-Blowing on IT Projects: An Integrated ModelDecis. Sci., 40
J. Near, M. Miceli (1996)
Whistle-Blowing: Myth and RealityJournal of Management, 22
Gladys Lee, E. Pittroff, M. Turner (2018)
Is a Uniform Approach to Whistle-Blowing Regulation Effective? Evidence from the United States and GermanyJournal of Business Ethics, 163
Wim Vandekerckhove, Arron Phillips (2019)
Whistleblowing as a Protracted Process: A Study of UK Whistleblower JourneysJournal of Business Ethics
Journal of Accounting Research, 58
J. Near, Michael Rehg, J. Scotter, M. Miceli (2004)
Does Type of Wrongdoing Affect the Whistle-Blowing Process?Business Ethics Quarterly, 14
W. Shafer (2002)
Effects of Materiality, Risk, and Ethical Perceptions on Fraudulent Reporting by Financial ExecutivesJournal of Business Ethics, 38
A. Hevner, S. March, Jinsoo Park, S. Ram (2004)
Design Science in Information Systems ResearchMIS Q., 28
M. Miceli, J. Near (1985)
Characteristics of organizational climate and perceived wrongdoing associated with whistle-blowing decisions.Personnel Psychology, 38
H. Levene (1961)
Robust tests for equality of variances
D. Barnlund (2017)
A Transactional Model of Communication
R. Daft, R. Lengel (1986)
Organizational information requirements, media richness and structural designManagement Science, 32
M. Keil, D. Robey (1999)
Turning Around Troubled Software Projects: An Exploratory Study of the Deescalation of Commitment to Failing Courses of ActionJ. Manag. Inf. Syst., 15
Tanya J.D., Jacob D.B.A., Ethan Kirner (2019)
Blowing the Whistle in the Digital Age: Are You Really Anonymous? The Perils and Pitfalls of Anonymity in Whistleblowing LawDepaul Business and Commercial Law Journal, 17
E. Pittroff (2014)
Whistle-Blowing Systems and Legitimacy Theory: A Study of the Motivation to Implement Whistle-Blowing Systems in German OrganizationsJournal of Business Ethics, 124
Chongwook Park, Ghiyoung Im, M. Keil (2008)
Overcoming the Mum Effect in IT Project Reporting: Impacts of Fault Responsibility and Time UrgencyJ. Assoc. Inf. Syst., 9
S. March, Gerald Smith (1995)
Design and natural science research on information technologyDecis. Support Syst., 15
A. Pfitzmann, Marit Köhntopp (2000)
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
The purpose of this study was to investigate the impact of two-way, computer-mediated communication on investigator perceptions of whistleblower credibility.Design/methodology/approachInvestigators were recruited to participate in an online experiment that tasked subjects with evaluating simulated two-way, computer-mediated communication between an investigator and whistleblower. Several rival explanations were also examined to account for potential confounds.FindingsWhile anonymous whistleblowers were perceived to be less credible than identified whistleblowers when reporting via one-way communication, perceived whistleblower credibility was not statistically different when using two-way communication. Further, investigators allocated statistically similar amounts to investigate anonymous and identified reports.Research limitations/implicationsBased upon the results of this study, several new research directions can be explored with respect to maintaining anonymity, assessing credibility and designing reporting systems.Practical implicationsThe results support the use of anonymous, two-way communication in whistleblowing reporting systems. Anonymous whistleblowers would benefit from the ability to maintain an active dialogue with investigators without jeopardizing their safety or the investigation.Social implicationsThis study provides empirical support for strengthening whistleblowing reporting channels through the adoption of anonymous, two-way, computer-mediated communication. Doing so can better preserve the anonymity of those willing to report wrongdoing and better protect them from potential retaliation.Originality/valueThis study is among the first to empirically test the longstanding theory that anonymous reports are perceived by investigators as less credible than those from identified individuals. This study is also among the first to consider and incorporate anonymous, two-way communication in whistleblowing reporting.
Information Technology and People – Emerald Publishing
Published: May 24, 2021
Keywords: Whistleblowing; Anonymity; Credibility; Computer-mediated communication
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.