514
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Workplace Management and Employee Misuse: Does Punishment Matter?

, , &
Pages 49-59 | Received 12 Dec 2008, Accepted 15 Jul 2009, Published online: 11 Dec 2015

References

  • Agarwal, R. and Prasad, J. “The Role of Innovation Characteristics and Perceived Voluntariness in the Acceptance of Information Technologies,” Decision Sciences 28(3), 1997, 557–582.
  • Ajzen, I. and Fishbein M. Understanding Attitudes and Predicting Social Behavior, Prentice Hall, Eaglewood Cliff, NJ, 1980.
  • Ajzen, I. “From Intentions to Actions: a Theory of Planned Behavior,” In J. Kuhl & J. Beckmann (eds.), Action control: From Cognition to Behavior, Springer, Heidelberg, Germany, 1985, 1139.
  • Ajzen, I. and Madden, T. J. “Prediction of Goal Directed Behavior: Attitudes, Intentions, and Perceived Behavioral Control,” Journal of Experimental Social Psychology (22), 1986, 453–474.
  • Ajzen, I. “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Process (50), 1991, 179–211.
  • Alder, G. S., Ambrose, M. L., and Noel, T. W. “The Effect of Formal Advance Notice and Justification on Internet Monitoring Fairness: Much About Nothing?” Journal of Leadership and Organizational Studies 13(1), 2006, 93–108.
  • Alder, G. S., Schminke, M., Noel, T., and Kuenzi, M. “Employee Reactions to Internet Monitoring: The Moderating Role of Ethical Orientation,” Journal of Business Ethics 80(3), 2008, 481–498.
  • Alge, B. J. “Effects of Computer Surveillance on Perceptions of Privacy and Procedural Justice,” Journal of Applied Psychology 86(4), 2001, 797–804.
  • American Management Association “2005 Electronic Monitoring and Surveillance Survey: Many Companies Monitoring, Recording, Videotaping- Firing-Employees,” 2005 AMA Survey, Summary of Key findings. Retrieved January 27, 2006 from http://www.amanet.org/press/amanews/ems05.htm
  • Bagozzi, R. P. and Yi, Y. “On the Evaluation of Structural Equation Models,” Academy of Marketing Science 16(1), 1988, 74–94.
  • Beck, L. and Ajzen, I. “Predicting Dishonest Actions Using the Theory of Planned Behavior,” Journal of Research in Personality 25(33), 1990, 285–301.
  • Blau, G., Yang, Y., and Ward-Cook, K. “Testing a Measure of Cyberloafing,” Journal of Allied Health (35), 2004, 9–17.
  • Boncella, R. J. “Internet Privacy at Home and at Work,” Communications of the AIS [Internet] 7(14), 2001, Available from: http://cais.isworld.org/articles/default.asp?vol=7&art=14,.
  • Case, C. J. and Young, K. S. “Employee Internet Management: Current Business Practices And Outcomes,” CyberPsychology & Behavior 5(4), 2002, 355–361.
  • Chalykoff, J. and Kochan, T. “Computer-Aided Monitoring: Its Influence On Employee Job Satisfaction And Turnover,” Personnel Psychology (42), 1989, 807–834.
  • Chau, P. Y. K. and Hu, P. J. “Investigating Healthcare Professionals' Decisions To Accept Telemedicine Technology: An Empirical Test of Competing Theories,” Information & Management 39(4), 2002, 297–311.
  • Chen, J. V., Chen, C. C., and Yang, H.-H. “An Empirical Evaluation of Key Factors Contributing to Internet Abuse In The Workplace,” Industrial Management & Data Systems 108(1), 2007, 87–106.
  • Cheng, H., Sims, R., and Teegen, H. “To Purchase or Pirate Software: An Empirical Study,” Journal of Management Information Systems 13(4), 1997, 49–60.
  • Chiasson, M. W. and Lovato, C.Y. “Factors Influencing the Formation of a User's Perception and Use of a DSS Software Innovation,” Database for Advances in Information Systems 32(3), 2007, 16–35.
  • Chin, W. W. “The Partial Least Squares Approach to Structural Equation Modeling,” In G. A. Marcoulides (Ed.) Modern Methods for Business Research, Lawrence Erlbaum, Mahway, New Jersey, 1998, 295–336.
  • Cohen, C. and Cohen, M. “On-Duty and Off-Duty: Employee Right to Privacy and Employer's Right to Control the Private Sector,” Employee Responsibilities & Rights Journal 19(4), 2007, 235–246.
  • Cronan, T. P., Leonard, L. N. K., and Kreie, J. “An Empirical Validation of Perceived Importance and Behavior Intention in IT Ethics,” Journal of Business Ethics 56(3), 2005, 231–238.
  • Davis, R. A. “Internet Abuse in the Workplace,” available from: <http://www.internetadditciton.ca/cyberslacking.htm>, [Accessed June 24, 2003].
  • De Manrique Lara, P. Z. “Fear in Organizations: Does Intimidation by Formal Punishment Mediate the Relationship between Interactional Justice and Workplace Internet Deviance?” Journal of Managerial Psychology (21), 2006, 580–592.
  • Dzamba, A. “AMA Reveals Monitoring of Employees' Online Activity Rises Sharply,” IOMA's Report on Managing HR Information Systems 7(4 5), 2001, Available from: <www.worldatwork.org/pub/E158673055X_smp.pdf>.
  • Ehrlich, I. “Crime, Punishment, and the Market for Offenses,” Journal of Economics Perspectives 10(1), 1996, 43–67.
  • Firoz, N. M., Taghi, R., and Souckova, J. “Emails in the Workplace: the Electronic Equivalent of ‘DNA’ Evidence,” Journal of American Academy of Business (8), 2005, 71–78.
  • Fishbein, M. and Ajzen, I. Belief, Attitude, Intention and Behavior: an Introduction to Theory and Research, Addison Wesley, Reading, MA, 1975.
  • Fornell, C. and Larcker, D. F. “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error,” Journal of Marketing Research 18(1), 1981, 39–50.
  • French, J. R. P. and Raven, B. The Bases of Social Power, in Studies in Social Power, D. Cartwright (Ed.), Institute for Social Research, Ann Arbor, MI, 1959, 150–167.
  • Galletta, D. F. and P. Polak, “An Empirical Investigation of Antecedents of Internet Abuse in the Workplace,” Proceedings of the 2nd Annual Workshop on HCI Research in MIS, Seattle, WA, Dec. 12-13, 2003.
  • George, J. F. “Computer-Based Monitoring: Common Perceptions and Empirical Results,” MIS Quarterly 20(4), 1996, 459–480.
  • Guthrie, R. and Gray, P. “Junk Computing: Is It Bad for an Organization,” Information Systems Management 13(11), 1996, 23–28.
  • Haines, R., Street, M. D., and Haines, D. “The Influence of Perceived Importance of an Ethical Issue on Moral Judgment, Moral Obligation, and Moral Intent,” Journal of Business Ethics (81), 2008, 387–399.
  • Harrington, S. J. “The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions,” MIS Quarterly 20(3), 1996, 257–278.
  • Harrison, D. A., Mykytyn, P. P., and Riemenschneider, C. K. “Executive Decision about Adoption of Information Technology in Small Business: Theory and Empirical Test,” Information Systems Research 8(2), 1997, 171–195.
  • Hartwick, J. and Barki, H. “Explaining the Role of User Participation in Information System Use,” Management Science 40(4), 1994, 404–465.
  • Haythornthwaite, C. and Wellman, B. “Work, friendship, and Media Use for Information Exchange in A Networked Organization,” Journal of American Society for Information Science 49(12), 1998, 1101–1114.
  • Haythornthwaite, C., Wellman, B., and Garton, L. “Work and Community via Computer-Mediated Communication” in J. Gackenbach (Ed.) Psychology and the Internet: Intra-personal, Interpersonal, and Transpersonal Implications, Academic Press Inc., San Diego, CA, 1998.
  • Henle, C. A. and Blanchard, A. L. “The Interaction of Work Stressors and Organizational Sanctions on Cyberloafing,” Journal of Managerial Issues XX(3), 2008. 383–400.
  • Hoffer, J. A., and Straub, D. W. “The 9 to 5 Underground: Are You Policing Computer Crimes?” Sloan Management Review 30(4), 1989, 34–44.
  • Hunt, S. D. and S. J. Vitell “A General Theory of Marketing Ethics,” Journal of Macromarketing 8(Spring), 1986, 5–16.
  • Hunt, S. D. and Vitell, S. J. “The General Theory of Marketing Ethics: A Retrospective and Revision” in Smith and Quelch (Eds.), Ethics in Marketing, Irwin, Homewood, IL, 1993.
  • Jones, T. M. “Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model,” Academy of Management Review 16(2), 1991, 366–395.
  • Kamins, A. “Cyber-loafing: Does Employee Time Online Add Up to Net Losses?” New York Daily News, July 16, 1995.
  • Karahanna, E., Straub, D. W., and Chervany, N. L. “Information Technology Adoption across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs,” MIS Quarterly 23(2), 1999, 183–213.
  • Kim, S. “Economics of Employee Internet Management,” The Bottom Line: Managing Library Finances (19), 2006, 124–138.
  • Klein, K. E. “Setting a Realistic Web-Use Policy,” Business Week Online, July 28, 2007, 18–18.
  • Lara, P. Z. M. D., Tacoronte, D. V., and Ding, J.-M. T. “Do Current Anti-Cyberloafing Disciplinary Practices Have a Replica in Research Findings? A Study of the Effects of Coercive Strategies on Workplace Internet Misuse,” Internet Research 16(4), 2006, 450–467.
  • Lara, P. Z. M. D. “Relationship between Organizational Justice and Cyberloafing in the Workplace: Has “Anomia” a Say in the Matter?” CyberPsychology & Behavior 10(3), 2007, 8.
  • Lee, Z., Lee, Y., and Kim, Y. “Personal Web Page Usage in Organizations,” in M. Anandarajan and C. Simmers (eds.), Personal Web Usage in the Workplace: A guide to Effective Human Resources Management, Information Sciences Publishing, Hershey, PA, 2004, 28–46.
  • Levin-Epstein, M. “HR Plays Growing Role in Monitoring Employee Internet Use,” Staff Leader 16(4), 2002, 34.
  • Lewin, L. Field Theory in Social Science; Selected Theory Papers, Harper & RW, New York, NY 1951.
  • Lim, V. “The IT Way of Loafing on the Job: Cyberloafing, Neutralizing, and Organizational Justice,” Journal of Organizational Behavior (23), 2002, 675–694.
  • Mathieson, K. “Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior,” Information Systems Research 2(3), 1991, 173–191.
  • Morris, M.G. and Venkatesh, V. “Age Difference in Technology Adoption Decisions: Implications for a Changing Workforce,” Personnel Psychology 53(2), 2000, 375–403.
  • Nagin, D. “General Deterrence: A Review of the Empirical Evidence, in Deterrence and in Capacitation: Estimating the Effects of Criminal Sanctions on Crime Rates,” A. Blumstein, J. Cohen, and D. Nagin (eds.) National Academy of Sciences, Washington, D.C., 1978, 95–139.
  • Peace, A. G., Galletta, D. F., and Thong, J. Y. L. “Software Piracy in the Workplace: a Model and Empirical Test,” Journal of Management Information Systems 20(1), 2003, 153–177.
  • Pomazal, R. J. and Jaccard, J. J. “An Informational Approach to Altruistic Behavior,” Journal of Personality and Social Psychology (33), 1976, 317–326.
  • Robin, D. P., Reidenbach, R. E. and Forrest, P. J. “The Perceived Importance of an Ethical Issue as an Influence on the Ethical Decision-Making of Ad Managers,” Journal of Business Research 35(1), 1996, 17–28.
  • Sandler, S. F. “Balancing Security & Privacy in the Internet Age,” HR Focus 79(8), 2002, 13–15.
  • Schifter, D. B. and Ajzen, I. “Intention, Perceived Control and Weight Loss: an Application of the Theory of Planned Behavior,” Journal of Personality and Social Psychology 49(3), 1985, 843–851.
  • Schwarz, S. H. and Tessler, R. C. “A Test of a Model for Reducing Measured Attitude-Behavior Inconsistencies,” Journal of Personality and Social Psychology 24(2), 1972, 225–236.
  • Singhapakdi, A. “Perceived Importance of Ethics and Ethical Decisions in Marketing,” Journal of Business Research (45), 1999, 89–99.
  • Stanton, J. M. “Reactions to Employee Performance Monitoring: Framework, Review, and Research Directions,” Human Performance 13(1), 2000, 85–113.
  • Straub, D. W. and Nance, W. D. “Uncovering and Disciplining Computer Abuse: Organizational Responses and Options,” Information Age 10(3), 1988, 151–156.
  • Straub, D. W. “Organizational Structuring of the Computer Security Function,” Computers & Security 7(2), 1988, 185–192.
  • Straub, D. W. “Effective IS Security: An Empirical Study,” Information Systems Research 1(3), 1990, 255–276.
  • Straub, D. W. and Nance, W. D. “Discovering and Disciplining Computer Abuse in Organizations: A Field Study,” MIS Quarterly 14(1), 1990, 45–60.
  • Straub, D. W., and Welke, R. J. “Coping with Systems Risk: Security Planning Models for Management Decision Making,” MIS Quarterly 22(4), 1998, 441–469.
  • Tabak, F. and Smith, W. P. “Privacy and Electronic Monitoring in the Workplace: A Model of Managerial Cognition and Relational Trust Development,” Employee Responsibilities and Rights Journal (17), 2005, 173–189.
  • Taylor, S. and Todd, P. A. “Assessing IT Usage: the Role of Prior Experience,” MIS Quarterly 19(4), 1995, 561–570.
  • Thompson, R. L., Higgins, C. A. and Howell, J. M. “Influence of Experience on Personal Computer Utilization: Testing a Conceptual Model,” Journal of Management Information Systems 11(1), 1994, 167–178.
  • Tittle, C.R. Sanctions and Social Deviance: the Question of Deterrence, Praeger, New York, NY, 1980.
  • Triandis, H. C. “Values, Attitudes and Interpersonal Behavior,” in H.E. Howe (Ed.), Nebraska Symposium on Motivation, University of Nebraska Press, Lincoln, NE, 1980, 195–259.
  • Urbaczewski, A. and Jessup, L. M. “Does Electronic Monitoring of Employee Internet Usage Work?” Communications of the ACM 45(1), 2002, 80–83.
  • Venkatesh, V. and Davis, F.D. “A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies,” Management Science 46(2), 2000, 186–204.
  • Vitell, S. J. and Hidalgo, E. R. “The Impact of Corporate Ethical Values and Enforcement of Ethical Codes on the Perceived Importance of Ethics in Business: A Comparison of U.S. and Spanish Managers,” Journal of Business Ethics (64), 2006, 31–43.
  • Ward, D. B. “Surfing on Company Time? You Could Lose Your Privacy … and Maybe Your Job,” PC World 15(11), 1997, 245–253.
  • Warshaw, P. R. “A New Model for Predicting Behavioral Intentions: an Alternative to Fishbein” Journal of Marketing Research 17(2), 1980, 153–172.
  • Zimmerman, E. “HR Must Know When Employee Monitoring Crosses the Line,” Workforce (2), 2002, 38–45.
  • Zweig, D., Websteb, J. “Personality as a Moderator of Monitoring Acceptance,” Computers in Human Behavior 19(4), 2003, 479–493.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.