176
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Why Employees Do Non-Work-Related Computing in the Workplace

, &
Pages 150-163 | Received 16 Jun 2009, Accepted 13 Oct 2009, Published online: 11 Dec 2015

References

  • Ajzen, I “The theory of planned behavior,” Organizational Behaviour and Human Decision Processes (50:2), 1991, pp. 179–211.
  • Ajzen, I. and Fishbein, M., “Understanding attitudes and predicting Social behaviour”, Englewood Cliffs, NJ: Prentice-Hall, 1980.
  • Al-Jabri, I. and Abdul-Gader, A., “Software copyright infringements: an exploratory study of the effects of individual and peer beliefs” Omega (25: 3), 1997, pp. 335–344.
  • Anandarajan, M., “Internet abuse in the workplace,” Communications of the ACM (45), 2002, pp. 53–54.
  • Anandarajan, M. and, Simmers, C., “Managing web usage in the workplace: A social, ethical and legal perspective” Hershey, PA: Idea Publishing, 2002.
  • Armstrong, L., Phillips, J. G., and Saling, L. L. “Potential determinants of higher internet usage,” International Journal of Human-Computer Studies (53:4), 2000, pp. 537–550.
  • Backhouse, J. and Dhillon, G., “Managing computer crime: a research outlook,” Computes & Security, (14:7), 1995, pp. 645–51.
  • Beach, L. R. and Mitchell, T.R., “A contingency model for the selection of decision strategies,” Academy of management Review (3:3), 1978, pp.439–449.
  • Beccaria, C., “On crime and punishments”, Robbs Merril, Indianapolis, IN, 1963.
  • Belanger, F. and Slyke, C.V., “Abuse or learning?”, Communications of the ACM (45:1), 2002, pp. 64–65.
  • Bock, G.W. and Ho, S.L., “Non-work related computing (NWRC)”, Communications of the ACM (52:4), 2009, pp.1–5.
  • Brandon C. W, David P. F and Lawrence W. S., Costs and benefits of preventing crime, Boulder, Colo.: Westview Press., 2001.
  • Chin, W.W., “The Partial Least Squares Approach to Structural Equation Modeling in Modern Methods for Business Research.” G.A. Marcoulides(ed.), Mahwah, HJ: Lawrence Erlbaum Associates, 1998, pp.295–336.
  • Chen, J.V., Chen, C.C. and Yang, H-H., “An Empirical evaluation of key factors contributing to internet abuse in the workplace,” Industrial Management & Data Systems, 108(1), 2008, pp.87–106.
  • Cook, T., and Campbell, D., Quasi-experimentation: Design and analysis issues for field settings, Houghton Mifflin, Boston, 1979.
  • Davis, F.D., “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly (13:3), 1989, pp. 319–340.
  • Dessler, G., Management Fundamentals: Modern Principles and Practices, Prentice-Hall, 3rd edition, 1982.
  • Fishbein, M. and Ajzen, I., Beliefs, attitude, intention and behavior: an introduction to theory and research, Addison- Wesley Publishing Company, Philippines, 1980.
  • Foltz, C.B., Cronan, T.P and Jones, T.W., “Have you met your organization's computer usage policy?,” Industrial Management & Data Systems, 105(2), 2005, pp.137–146.
  • Foltz, C.B., Schwager, P.H. and Anderson, J.E., “Why users (fail to) read computer usage policies,” Industrial Management & Data Systems, 108(6), 2008, pp.701–712.
  • Fornell, C. and Larcker, V. F., “Evaluating structural equation models with unobservable variables and measurement error”, Journal of Marketing Research (18), 1981, pp. 39–50.
  • Galletta, D. and Polak, P., “An empirical investigation of antecedents of internet abuse in the workplace,” AIS SIG-HCI Workshop, Seattle, December 2003.
  • Goodhue, D.L. and Straub, D.W., “Security concerns of systems users: a study of perception of the adequacy of security measures,” Information and Management (20: 1), 1991, pp. 13–27.
  • Guthrie, R. and Gray P., “Junk computing: is it bad for an organization?” Information Systems Management (13:1), 1996, pp. 23–28.
  • Harrington, S.J., “The effect of code of ethics and personal denial of responsibility on computer abuse judgments and intentions,” MIS Quarterly (20:3), 1996, pp. 257–278.
  • Johnson, E.J. and Payne, J.W., “Effort and accuracy in choice,” Management Science (31:4), 1985, pp. 395–414.
  • Karahanna, E. and Straub D.W., “The psychological origins of perceived usefulness and ease-of-use,” Information and Management (35:4), 1999, pp. 237–250.
  • Landis, D., Triandis H.C. and Adamopoulos J., “Habit and behavioral intentions as predictors of social behavior”, The Journal of Social Psychology (106), 1978, pp. 227–237.
  • Lee, J. and Lee, Y., “A holistic model of computer abuse within organization,” Information Management and Computer Security (10:2), 2002, pp. 57–63.
  • Lee, S.M., Lee S. G., and Yoo, S., “An integrative model of computer abuse based on social control and general deterrence theories,” Information and Management (41), 2004, pp707–718.
  • Lee, O.K.D., Lim, K.H. and Wong, W.M., “Why employees do non-work-related computing: an exploratory investigation through multiple theoretical perspectives.” In the proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05) (Track 7 - Volume 07), 2005, pp. 185.
  • Lee, S.M., Yoon, S.N and Kim, J, “The role of pluralistic ignorance in internet abuse,” Journal of Computer Information Systems (48:3), 2008, pp.38–43.
  • Lim, V.K.G., “The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice,” Journal of Organizational Behavior (23:5), 2002, pp. 675–694.
  • Lim, V.K.G, Teo, T.S.H. and Loo, G.L., “How do I loaf here? let me count the ways”, Communications of the ACM, 45(1), 2002, pp. 66–70.
  • Limayem, M. and Hirt S.G., “Force of habit and information system usage: theory and initial validation,” Journal of the Association of Information Systems (4:1) 2003, pp. 65–97.
  • Loch, K. D. and Conger, S., “Evaluating ethical decision making and computer use,” Communications of the ACM (39:7), 1996, pp. 74–83.
  • Oravec, J.A., “Constructive approaches to internet recreation in the workplace,” Communications of the ACM (45:1), 2002, pp. 60–63.
  • Orbell, S., Hodgkins, S. and Sheeran, P., “Implementation intentions and the theory of planned behavior,” Personality and Social Psychology Bulletin (23:9), 1997, pp. 953–962.
  • Ouellette, J. A., and Wood, W., “Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior,” Psychological Bulletin (124), 1998. pp. 54–74.
  • Siau, K., Nah, F.F.H. & Teng, L. (2002), “Acceptable Internet Use Policy,” Communications of the ACM, Vol. 45, No.1, pp. 75–79.
  • Simmers, C.A., “Aligning internet usage with business priorities,” Communications of the ACM (45:1), 2002, pp. 71–74.
  • Simpson, P. M., Banerjee, D. and Simpson, C. L., Jr., “Softlifting: a model of motivating factors” Journal of Business Ethics (13), 1994, pp. 431–438.
  • Sharma, S.K. and Gupta, J.N.D., “Improving worker's productivity and reducing Internet abuse”, Journal of Computer Information Systems (44:2), 2004, pp.74–78.
  • Skinner, W.F. and Fream, A.M., “A social learning theory analysis of computer abuse among college students,” Journal of research in crime and delinquency (34:4), 1997, pp.495–518.
  • Steers, R.M., Porter, L.M, Bigley, G.A., Motivation and Leadership at Work, McGrew-Hill International Editions, 1996.
  • Straub, D.W., Nance W.D., “Discovering and disciplining computer abuse in organizations: a field study,” MIS Quarterly (14:1), 1990, pp. 45–62.
  • Straub, D.W. and Welke R. J., “Coping with systems risk: security planning models for management decision making,” MIS Quarterly (22:4), 1998, pp. 441–469.
  • Teo, T.S.H., Lim V.K.G., and Lai R.Y.C. (1999), “Intrinsic and extrinsic motivation in internet usage”, Omega (27:1), 1999, pp. 25–37.
  • Triandis, H.C., Values, attitudes, and interpersonal behavior, in Nebraska Symposium on Motivation, 1979.
  • Urbaczewski, A., and Jessup L.M., “Does electronic monitoring of employee internet usage work?” Communications of the ACM (45:1), 2002, pp. 80–83.
  • Verplanken, B., Aarts, H., and van Knippenberg, A., “Habit, information acquisition, and the process of making travel mode choices,” European Journal of Social Psychology (27), 1997, pp. 539–560.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.