2,721
Views
26
CrossRef citations to date
0
Altmetric
Empirical Research

Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use

, , &
Pages 600-621 | Received 07 Sep 2015, Accepted 12 Mar 2018, Published online: 19 Apr 2018

References

  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes , 50 (2), 179–211.10.1016/0749-5978(91)90020-T
  • Ajzen, I. , & Fishbein, M. (1980). Understanding attitudes and predicting social behavior . Englewood Cliffs, NJ: Prentice Hall.
  • Al-Debei, M. M. , Al-Lozi, E. , & Papazafeiropoulou, A. (2013). Why people keep coming back to Facebook: Explaining and predicting continuance participation from an extended theory of planned behaviour perspective. Decision Support Systems , 55 (1), 43–54.10.1016/j.dss.2012.12.032
  • Alloway, T. , & Alloway, R. (2012). The impact of engagement with social networking sites (SNSs) on cognitive skills. Computers in Human Behavior , 28 (5), 1748–1754.10.1016/j.chb.2012.04.015
  • American Press Institute . (2015). How Millennials use and control social media . Retrieved June 25, 2015, from http://www.americanpressinstitute.org/publications/reports/survey-research/millennials-social-media/
  • Andersen, S. , & Chen, S. (2002). The relational self: An interpersonal social-cognitive theory. Psychological Review , 109 (4), 619–645.10.1037/0033-295X.109.4.619
  • Annisette, L , & Lafreniere, K. (2016, February 26). Social media, texting, and personality: A test of the shallowing hypothesis. Personality and Individual Differences . doi: 10.1016/j.paid.2016.02.043
  • Anton, C. , & Lawrence, C. (2014). Home is where the heart is: The effect of place of residence on place attachment and community participation. Journal of Environmental Psychology , 31 (40), 451–461.10.1016/j.jenvp.2014.10.007
  • Armitage, C. , & Conner, M. (2001). Efficacy of the theory of planned behaviour: A meta-analytic review. British Journal of Social Psychology , 40 (4), 471–499.10.1348/014466601164939
  • Ayyagari, R. , Grover, V. , & Purvis, R. (2011). Technostress: Technological antecedents and implications. MIS Quarterly , 35 (4), 831–858.10.2307/41409963
  • Babbie, E. (2010). The practice of social research (12th ed.). Belmont, CA: Wadsworth Cengage Learning.
  • Bargh, J. (1994). The four horsemen of automaticity: Awareness, efficiency, intention, and control in social cognition. In R. S. Wyer & T. K. Srull (Ed.), Handbook of social cognition (pp. 1–40). Hillsdale, NJ: Erlbaum.
  • Bargh, J. , & Chartrand, T. (1999). The unbearable automaticity of being. American Psychologist , 54 (7), 462–479.10.1037/0003-066X.54.7.462
  • Belk, R. (1988). Possessions and the extended self. Journal of Consumer Research , 15 (2), 139–168.10.1086/jcr.1988.15.issue-2
  • Berzonsky, M. (2011). A social-cognitive perspective on identity construction. In S. Schwartz , K. Luyckx , & V. Vignoles (Ed.), Handbook of identity theory and research: Vol. 1 - Structures and processes (pp. 55–76). New York, NY : Springer.10.1007/978-1-4419-7988-9
  • Berzonsky, M. , & Luyckx, K. (2008). Identity styles, self-reflective cognition, and identity processes: A study of adaptive and maladaptive dimensions of self-analysis. Identity: An International Journal of Theory and Research , 8 (3), 205–219.10.1080/15283480802181818
  • Błachnio, A. , Przepiórka, A. , & Rudnicka, P. (2013). Psychological determinants of using Facebook: A research review. International Journal of Human-Computer Interaction , 29 (11), 775–787.10.1080/10447318.2013.780868
  • Boswell, W. , & Olson-Buchanan, J. (2007). The use of communication technologies after hours: The role of work attitudes and work-life conflict. Journal of Management , 33 (4), 592–610.10.1177/0149206307302552
  • Breakwell, G. (2015). Coping with threatened identities . New York, NY : Psychology Press.
  • Burkitt, I. (2011). Identity construction in sociohistorical context. In S. Schwartz , K. Luyckx , & V. Vignoles (Eds.), Handbook of Identity Theory and Research (pp. 267–283). New York, NY : Springer.10.1007/978-1-4419-7988-9
  • Burton-Jones, A. , & Straub, D. (2006). Reconceptualizing system usage: An approach and empirical test. Information Systems Research , 17 (3), 228–246.10.1287/isre.1060.0096
  • Cameron, A. , & Webster, J. (2005). Unintended consequences of emerging communication technologies: Instant messaging in the workplace. Computers in Human Behavior , 21 (1), 85–103.10.1016/j.chb.2003.12.001
  • Caplan, S. (2010). Theory and measurement of generalized problematic Internet use: A two-step approach. Computers in Human Behavior , 26 (5), 1089–1097.10.1016/j.chb.2010.03.012
  • Carr, N. (2010). The shallows: What the Internet is doing to our brains . London: WW Norton & Company.
  • Carter, M. (2013). IT identity: Developing valid measures through CFA-based MTMM analysis. In Proceedings of the 34th International Conference on Information Systems (pp. 1–18). Milan.
  • Carter, M. , & Grover, V. (2015). Me, my self, and I(T): Conceptualizing information technology identity and its implications. MIS Quarterly , 39 (4), 931–957.10.25300/MISQ
  • Charng, H. , Piliavin, J. , & Callero, P. (1988). Role identity and reasoned action in the prediction of repeated behaviour. Social Psychology Quarterly , 51 (4), 303–317.10.2307/2786758
  • Chen, A. (2007). Technology overdose: Exploring obsessive work-related email use. Proceedings of the 10th Annual Conference of the Southern Association for Information Systems (pp 160–165). Atlantic Beach, FL.
  • Cheung, C. M. , & Lee, M. K. (2010). A theoretical model of intentional social action in online social networks. Decision Support Systems , 49 (1), 24–30.10.1016/j.dss.2009.12.006
  • Christensen, P. N. , Rothgerber, H. , Wood, W. , & Matz, D. C. (2004). Social norms and identity relevance: A motivational approach to normative behavior. Personality and Social Psychology Bulletin , 30 (10), 1295–1309.10.1177/0146167204264480
  • Cialdini, R. , Reno, R. , & Kallgren, C. (1990). A focus theory of normative conduct: Recycling the concept of norms to reduce littering in public places. Journal of Personality and Social Psychology , 58 (6), 1015–1026.10.1037/0022-3514.58.6.1015
  • Conner, M. , & Armitage, C. (1998). Extending the theory of planned behavior: A review and avenues for further research. Journal of Applied Social Psychology , 28 (15), 1429–1464.10.1111/jasp.1998.28.issue-15
  • Conner, M. , & Mcmillan, M. (1999). Interaction effects in the theory of planned behaviour: Studying cannabis use. British Journal of Social Psychology , 38 (2), 195–222.10.1348/014466699164121
  • De Cuypere, G. , Knudson, G. , & Bockting, W. (2011). Second response of the world professional association for transgender health to the proposed revision of the diagnosis of gender dysphoria for DSM 5. International Journal of Transgenderism , 13 (2), 51–53.10.1080/15532739.2011.624047
  • Donavan, J. (2015). 3 on your side: Many millennials would quit if not allowed to do personal tasks at work . Retrieved June 14, 2016, from http://philadelphia.cbslocal.com/2015/07/08/3-on-your-side-many-millennials-would-quit-if-not-allowed-to-do-personal-tasks-at-work/
  • Duckworth, A. , & Gross, J. (2014). Self-control and grit: Related but separable determinants of success. Current Directions in Psychological Science , 23 (5), 319–325.10.1177/0963721414541462
  • Elek, E. , Miller-Day, M. , & Hecht, M. (2006). Influences of personal, injunctive, and descriptive norms on early adolescent substance abuse. Journal of Drug Issues , 36 (1), 147–172.10.1177/002204260603600107
  • Epstein, S. (1980). The self-concept: A review and the proposal of an integrated theory of personality. In E. Straub (Ed.), Handbook of Personality Theory and Research (pp. 81–132). Englewood Cliffs, NJ: Prentice Hall.
  • Facebook Newsroom . (2015). Company info . Retrieved June 25, 2015, from http://newsroom.fb.com/company-info/
  • Fekadu, Z. , & Kraft, P. (2001). Self-identity in planned behavior perspective: Past behavior and its moderating effects on self-identity-intentions relations. Social Behavior and Personality , 29 (7), 671–685.10.2224/sbp.2001.29.7.671
  • Fishbein, M. , & Ajzen, I. (1975). Belief, attitude, intention, and behavior . Reading, MA: Addison-Wesley.
  • Garcia, D. , & Sikström, S. (2014). The dark side of Facebook: Semantic representations of status updates predict the Dark Triad of personality. Personality and Individual Differences , 67 , 92–96.10.1016/j.paid.2013.10.001
  • Gawronski, B. , & Creighton, L. (2013). Dual-process theories. In D. Carlston (Ed.), The Oxford Handbook of Social Cognition (pp. 282–321). New York, NY : Oxford University Press.
  • Gefen, D. , Rigdon, E. , & Straub, D. (2011). An update and extension to SEM guidelines for administrative and social science research. MIS Quarterly , 35 (2), iii–xiv.10.2307/23044042
  • Giang, V. (2015). Transgender is yesterday’s news: How companies are grappling with the ‘no gender’ society . Retrieved July 4, 2015, from http://fortune.com/2015/06/29/gender-fluid-binary-companies/
  • Gollwitzer, P. , & Sheeran, P. (2006). Implementation intentions and goal achievement: A meta-analysis of effects and processes. Advances in Experimental Social Psychology , 38 , 69–119.10.1016/S0065-2601(06)38002-1
  • Goonetilleke, R. , & Luximon, Y. (2010). The relationship between monochronicity, polychronicity and individual characteristics. Behaviour & Information Technology , 29 (2), 187–198.10.1080/01449290903222697
  • Gross, D. (2014). 5 ways Facebook changed us, for better and worse . Retrieved July 6, 2017, from http://www.cnn.com/2014/01/31/tech/social-media/facebook-changes/index.html
  • Guay, F. , Marsh, H. , McInerney, D. , & Craven, R. (2015). Preface. In F. Guay , H. Marsh , D. McInerney , & R. Craven (Eds.), Self-concept, motivation, and identity: Underpinning success with research and practice (pp. vii–viii). Charlotte, NC : Information Age Publishing.
  • Gouveia, A. (2014). 2014 wasting time at work survey: Workers are wasting more time than ever in 2014 . Retrieved June 17, 2016, from http://www.salary.com/2014-wasting-time-at-work/
  • Gunn, R. , & Finn, P. (2015). Applying a dual process model of self-regulation: The association between executive working memory capacity, negative urgency, and negative mood induction on pre-potent response inhibition. Personality and Individual Differences , 75 , 210–215.10.1016/j.paid.2014.11.033
  • Higgins, E. (1987). Self-discrepancy: A theory relating self and affect. Psychological Review , 94 (3), 319–340.10.1037/0033-295X.94.3.319
  • Higgins, E. , Bond, R. , Klein, R. , & Strauman, T. (1986). Self-discrepancies and emotional vulnerability: How magnitude, accessibility, and type of discrepancy influence affect. Journal of Personality and Social Psychology , 51 (1), 5–15.10.1037/0022-3514.51.1.5
  • Hofmann, W. , Friese, M. , & Strack, F. (2009). Impulse and self-control from a dual-systems perspective. Perspectives on Psychological Science , 4 (2), 162–176.10.1111/j.1745-6924.2009.01116.x
  • Igbaria, M. , Parasuraman, S. , & Baroudi, J. (1996). A motivational model of microcomputer usage. Journal of Management Information Systems , 13 (1), 127–143.10.1080/07421222.1996.11518115
  • Jiang, H. (2016). Employee personal Internet usage in the workplace. Jyväskylä Studies in Computing , 257 , 1–118.
  • Kahneman, D. (2003). A perspective on judgment and choice: Mapping bounded rationality. American Psychologist , 58 (9), 697–720.10.1037/0003-066X.58.9.697
  • Kandell, J. (1998). Internet addiction on campus: The vulnerability of college students. CyberPsychology & Behavior , 1 (1), 11–17.10.1089/cpb.1998.1.11
  • Kim, S. , & Malhotra, N. (2005). A longitudinal model of continued IS use: An integrative view of four mechanisms underlying postadoption phenomena. Management Science , 51 (5), 741–755.10.1287/mnsc.1040.0326
  • Kim, S. , Malhotra, N. , & Narasimhan, S. (2005). Research note – Two competing perspectives on automatic use: A theoretical and empirical comparison. Information Systems Research , 16 (4), 418–432.10.1287/isre.1050.0070
  • Kline, R. (2011). Principles and practice of structural equation modeling (3rd ed.). New York, NY : The Guilford Press.
  • Koch, H. , Gonzalez, E. , & Leidner, D. (2012). Bridging the work/social divide: The emotional response to organizational social networking sites. European Journal of Information Systems , 21 (6), 699–717.10.1057/ejis.2012.18
  • Krasnova, H. , Widjaja, T. , Buxmann, P. , Wenninger, H. , & Benbasat, I. (2015). Why Following friends can hurt you: An exploratory investigation of the effects of envy on social networking sites among college-age users. Information Systems Research , 26 (3), 585–605.10.1287/isre.2015.0588
  • Kruglanski, A. , & Orehek, E. (2007). Partitioning the domain of social inference: Dual mode and systems models and their alternatives. Annual Review of Psychology , 58 , 291–316.10.1146/annurev.psych.58.110405.085629
  • Kurland, N. (1995). Ethical intentions and the theories of reasoned action and planned behavior. Journal of Applied Social Psychology , 25 (4), 297–313.10.1111/jasp.1995.25.issue-4
  • LaRose, R. (2010). The problem of media habits. Communication Theory , 20 (2), 194–222.10.1111/comt.2010.20.issue-2
  • LaRose, R. , Connolly, R. , Lee, H. , Li, K. , & Hales, K. (2014). Connection overload? A cross cultural study of the consequences of social media connection. Information Systems Management , 31 (1), 59–73.10.1080/10580530.2014.854097
  • Larose, R. , Kim, J. , & Peng, W. (2010). Social networking: Addictive, compulsive, problematic, or just another media habit? In Z. Papacharissi (Ed.), A networked self: Identity, community, and culture on social network sites (pp. 59–81). Taylor and Francis, New York: Routledge.
  • LaRose, R. , Lin, C. , & Eastin, M. (2003). Unregulated internet usage: Addiction, habit, or deficient self-regulation? Media Psychology , 5 (3), 225–253.10.1207/S1532785XMEP0503_01
  • Leary, M. , & Tangney, J. (2012). The self as an organizing construct in the behavioral and social sciences. In M. Leary & J. Tangney (Ed.), Handbook of Self and Identity (2nd ed.). (pp. 1–20). New York, NY : The Guilford Press.
  • Lee, H. (1999). Time and information technology: Monochronicity, polychronicity and temporal symmetry. European Journal of Information Systems , 8 (1), 16–26.10.1057/palgrave.ejis.3000318
  • Leidner, D. , Koch, H. , & Gonzalez, E. (2010). Assimilating generation Y IT new hires into USAA’s workforce: The role of an enterprise 2.0 system. MIS Quarterly Executive , 9 (4), 229–242.
  • Liang, H. , Xue, Y. , Ke, W. , & Wei, K. K. (2010). Understanding the influence of team climate on IT use. Journal of the Association for Information Systems , 11 (8), 414–432.10.17705/1jais
  • Lieberman, M. , Gaunt, R. , Gilbert, D. , & Trope, Y. (2002). Reflection and reflexion: A social cognitive neuroscience approach to attributional inference. Advances in Experimental Social Psychology , 34 , 199–249.10.1016/S0065-2601(02)80006-5
  • Limayem, M. , & Hirt, S. (2003). Force of habit and information systems usage: Theory and initial validation. Journal of the Association for Information Systems , 4 (1), 65–97.10.17705/1jais
  • Limayem, M. , Hirt, S. , & Cheung, C. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly , 31 (4), 705–737.10.2307/25148817
  • Macan, T. (1994). Time management: Test of a process model. Journal of Applied Psychology , 79 (3), 381–391.10.1037/0021-9010.79.3.381
  • Macan, T. , Shahani, C. , Dipboye, R. , & Phillips, A. (1990). College students’ time management: Correlations with academic performance and stress. Journal of Educational Psychology , 82 (4), 760–768.10.1037/0022-0663.82.4.760
  • MacKenzie, S. B. , Podsakoff, P. M. , & Podsakoff, N. P. (2011). Construct measurement and validation procedures in mis and behavioral research: Integrating new and existing techniques. MIS Quarterly , 35 (2), 293–334.10.2307/23044045
  • Maier, C. , Laumer, S. , Eckhardt, A. , & Weitzel, T. (2014). Giving too much social support: Social overload on social networking sites. European Journal of Information Systems , 24 (5), 447–464.
  • Maier, C. , Laumer, S. , Weinert, C. , & Weitzel, T. (2015). The effects of technostress and switching stress on discontinued use of social networking services: A study of Facebook use. Information Systems Journal , 25 (3), 275–308.10.1111/isj.12068
  • Marsh, H. , Hau, K.-T. , & Wen, Z. (2004). In search of golden rules: Comment on hypothesis-testing approaches to setting cutoff values for fit indexes and dangers in overgeneralizing Hu and Bentler's (1999) findings. Structural Equation Modeling: A Multidisciplinary Journal , 11 (3), 320–341.10.1207/s15328007sem1103_2
  • McNamee, D. (2015). Technology addiction – how should it be treated? Retrieved June 29, 2017, from http://www.medicalnewstoday.com/articles/278530.php
  • Meier, A. , Reinecke, L. , & Meltzer, C. E. (2016). “Facebocrastination”? Predictors of using Facebook for procrastination and its effects on students’ well-being. Computers in Human Behavior , 64 , 65–76.10.1016/j.chb.2016.06.011
  • Moss, C. (2014). Facebook went down and people started calling the cops . Retrieved January 9, 2015, from http://www.businessinsider.com/call-cops-when-facebook-is-down-2014-8
  • Muraven, M. , & Baumeister, R. (2000). Self-regulation and depletion of limited resources: Does self-control resemble a muscle? Psychological Bulletin , 126 (2), 247–259.10.1037/0033-2909.126.2.247
  • O’Leary, D. , Uusberg, A. , & Gross, J (2017). Identity and self-control: Linking identity-value and process models of self-control. Psychological Inquiry , 28 (2–3), 132–138.10.1080/1047840X.2017.1337404
  • Oyserman, D. , & James, L. (2011). Possible identities. In S. Schwartz , K. Luyckx , & V. Vignoles (Eds.), In Handbook of identity theory and research: Vol. 1 - Structures and processes (pp. 117–145). New York, NY : Springer.10.1007/978-1-4419-7988-9
  • Parker, D. , Manstead, A. , & Stradling, S. (1995). Extending the theory of planned behaviour: The role of personal norm. British Journal of Social Psychology , 34 (2), 127–138.10.1111/bjso.1995.34.issue-2
  • Parry, W. (2013). Gender dysphoria: DSM-5 reflects shift in perspective on gender identity . Retrieved June 30, 2017, from http://www.huffingtonpost.com/2013/06/04/gender-dysphoria-dsm-5_n_3385287.html
  • Petriglieri, J. (2011). Under threat: Responses to and the consequences of threats to individuals’ identities. Academy of Management Review , 36 (4), 641–662.
  • Petter, S. , Straub, D. , & Rai, A. (2007). Specifying formative constructs in information systems research. MIS Quarterly , 31 (4), 623–656.10.2307/25148814
  • Polites, G. , & Karahanna, E. (2012). Shackled to the status quo: The inhibiting effects of incumbent system habit, switching costs, and inertia on new system acceptance. MIS Quarterly , 36 (1), 21–42.
  • Polites, G. , & Karahanna, E. (2013). The embeddedness of information systems habits in organizational and individual level routines: Development and disruption. MIS Quarterly , 37 (1), 221–246.10.25300/MISQ
  • Polites, G. , Roberts, N. , & Thatcher, J. (2012). Conceptualizing models using multidimensional constructs: A review and guidelines for their use. European Journal of Information Systems , 21 (1), 22–48.10.1057/ejis.2011.10
  • Poppick, S. (2016). These are the top workplace productivity killers: The way people waste time at work might surprise you . Retrieved June 17, 2016, from http://www.cnbc.com/2016/06/09/top-distractions-at-work-and-how-to-increase-productivity.html
  • Quan-Haase, A. , & Young, A. (2010). Uses and gratifications of social media: A comparison of Facebook and instant messaging. Bulletin of Science, Technology & Society , 30 (5), 350–361.10.1177/0270467610380009
  • Reinecke, L. , & Hofmann, W. (2016). Slacking off or winding down? An experience sampling study on the drivers and consequences of media use for recovery versus procrastination. Human Communication Research , 42 (3), 441–461.10.1111/hcre.2016.42.issue-3
  • Rosen, L. , Carrier, L. , & Cheever, N. (2013). Facebook and texting made me do it: Media-induced task-switching while studying. Computers in Human Behavior , 29 (3), 948–958.10.1016/j.chb.2012.12.001
  • Rosen, L. , Whaling, K. , Rab, S. , Carrier, L. , & Cheever, N. (2013). Is Facebook creating “iDisorders”? The link between clinical symptoms of psychiatric disorders and technology use, attitudes and anxiety. Computers in Human Behavior , 29 (3), 1243–1254.10.1016/j.chb.2012.11.012
  • Sheldon, K. , & Elliot, A. (1999). Goal striving, need satisfaction, and longitudinal well-being: The self-concordance model. Journal of Personality and Social Psychology , 76 (3), 482–497.10.1037/0022-3514.76.3.482
  • Small, G. , & Vorgan, G. (2008). iBrain: Surviving the technological alteration of the modern mind . New York, NY : Harper Collins.
  • Soror, A. , Hammer, B. , Steelman, Z. , Davis, F. , & Limayem, M. (2015). Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective. Information Systems Journal , 25 (4), 403–427.10.1111/isj.v25.4
  • Sparks, P. , & Guthrie, C. (1998). Self-identity and the theory of planned behavior: A useful addition or an unhelpful artifice? Journal of Applied Social Psychology , 28 , 1393–1410.10.1111/jasp.1998.28.issue-15
  • Stanko, T. , & Beckman, C. (2015). Watching you watching me: Boundary control and capturing attention in the context of ubiquitous technology use. Academy of Management Journal , 58 (3), 712–738.10.5465/amj.2012.0911
  • Statistic Brain . (2015). Facebook Statistics . Retrieved April 6, 2015, from http://www.statisticbrain.com/facebook-statistics/
  • Steel, P. (2007). The nature of procrastination: A meta-analytic and theoretical review of quintessential self-regulatory failure. Psychological Bulletin , 133 (1), 65–94.10.1037/0033-2909.133.1.65
  • Steelman, Z. , Soror, A. , Limayem, M. , & Worrell, D. (2012) Obsessive compulsive tendencies as predictors of dangerous mobile phone usage. In Proceedings of the 18th Americas Conference on Information Systems (pp. 1–14). Seattle, WA.
  • Strack, F. , & Deutsch, R. (2015). The duality of everyday life: Dual-process and dual system models in social psychology. In M. Mikulincer , P. Shaver , E. Borgida , & J. Bargh (Ed.), APA Handbook of Personality and Social Psychology: Vol. 1, Attitudes and Social Cognition (pp. 891–927). Washington, DC: American Psychological Association.
  • Taylor, S. , & Todd, P. (1995). Understanding information technology usage: A test of competing models. Information Systems Research , 6 (2), 144–176.10.1287/isre.6.2.144
  • Tice, D. , Bratslavsky, E. , & Baumeister, R. (2001). Emotional distress regulation takes precedence over impulse control: If you feel bad, do it!. Journal of Personality and Social Psychology , 80 (1), 53–67.10.1037/0022-3514.80.1.53
  • Turel, O. (2014). Quitting the use of a habituated hedonic information system: A theoretical model and empirical examination of Facebook users. European Journal of Information Systems , 24 (4), 431–446.
  • Turel, O. (2015). An empirical examination of the “vicious cycle” of Facebook addiction. Journal of Computer Information Systems , 55 (3), 83–91.10.1080/08874417.2015.11645775
  • Turel, O. , & Serenko, A. (2012). The benefits and dangers of enjoyment with social networking websites. European Journal of Information Systems , 21 (5), 512–528.10.1057/ejis.2012.1
  • Turel, O. , Serenko, A. , & Giles, P. (2011). Integrating technology addiction and use: An empirical investigation of online auction users. MIS Quarterly , 35 (4), 1043–1061.10.2307/41409972
  • Urgin, J. , & Pearson, J. (2013). The effects of sanctions and stigmas on cyberloafing. Computers in Human Behavior , 29 (3), 812–820.
  • van Knippenberg, D. , Dahlander, L. , Haas, M. , & George, G. (2015). Information, attention, and decision making. Academy of Management Journal , 58 (3), 649–657.10.5465/amj.2015.4003
  • Venkatesh, V. , Morris, M. , Davis, G. , & Davis, F. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly , 27 (3), 425–478.10.2307/30036540
  • Verplanken, B. , & Aarts, H. (1999). Habit, attitude, and planned behaviour: Is habit an empty construct or an interesting case of automaticity? European Review of Social Psychology , 10 , 101–134.10.1080/14792779943000035
  • Verplanken, B. , & Orbell, S. (2003). Reflections on past behavior: A self-report index of habit strength. Journal of Applied Social Psychology , 33 (6), 1313–1330.10.1111/jasp.2003.33.issue-6
  • Vignoles, V. , Schwartz, S. , & Luyckx, K. (2011). Introduction: Toward an integrative view of identity. In S. Schwartz , K. Luyckx , & V. Vignoles (Eds.), Handbook of identity theory and research: Vol. 1 - Structures and processes (pp. 1–27). New York, NY : Springer.
  • Vitak, J. , Crouse, J. , & LaRose, R. (2011). Personal Internet use at work: Understanding cyberslacking. Computers in Human Behavior , 27 , 1751–1759.10.1016/j.chb.2011.03.002
  • Vodanovich, S. , Sundaram, D. , & Myers, M. (2010). Digital natives and ubiquitous information systems. Information Systems Research , 21 (4), 711–723.10.1287/isre.1100.0324
  • Warner, R. (2013). Who wastes more time at work: Millennials, Gen X’ers or Boomers? Retrieved June 14, 2016, from http://www.huffingtonpost.com/russ-warner/who-wastes-more-time-at-w_b_2618279.html
  • Webb, T. , Sheeran, P. , & Luszczynska, A. (2009). Planning to break unwanted habits: Habit strength moderates implementation intention effects on behaviour change. British Journal of Social Psychology , 48 (3), 507–523.10.1348/014466608X370591
  • Whitley, E. , Gal, U. , & Kjaergaard, A. (2014). Who do you think you are? A review of the complex interplay between information systems, identification and identity. European Journal of Information Systems , 23 (1), 17–35.10.1057/ejis.2013.34
  • Williams, L. , Hartman, N. , & Cavazotte, F. (2010). Method variance and marker variables: A review and comprehensive CFA marker technique. Organizational Research Methods , 13 (3), 477–514.10.1177/1094428110366036
  • Wood, W. , & Neal, D. (2007). A new look at habits and the habit-goal interface. Psychological Review , 114 (4), 843–863.10.1037/0033-295X.114.4.843
  • Wood, W. , Tam, L. , & Witt, M. (2005). Changing circumstances, disrupting habits. Journal of Personality and Social Psychology , 88 (6), 918–933.10.1037/0022-3514.88.6.918
  • Wood, E. , Zivcakova, L. , Gentile, P. , Archer, K. , De Pasquale, D. , & Nosko, A. (2012). Examining the impact of off-task multi-tasking with technology on real-time classroom learning. Computers & Education , 58 (1), 365–374.10.1016/j.compedu.2011.08.029
  • Xu, Z. , Turel, O. , & Yuan, Y. (2012). Online game addiction among adolescents: Motivation and prevention factors. European Journal of Information Systems , 21 (3), 321–340.10.1057/ejis.2011.56

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.