DOI QR코드

DOI QR Code

A study on the Relationship between Cyberloafing Characteristic and Cognitive Dissonance

  • Chang, Hwal-Sik (Dept. of Business Administration, Pusan National University) ;
  • Jung, Dae-Hyun (Dept. of Business Administration, Pusan National University)
  • Received : 2015.08.11
  • Accepted : 2015.09.07
  • Published : 2015.09.30

Abstract

Cyberloafing is a term used to describe the actions of employees who use their Internet access at work for personal use while pretending to do legitimate work. This research that this puts the foundation on the general deterrence theory, social control theory, and Triandis model compares the individual characteristic including the group norm, self-control, perceived value among many factors having an effect on the personal ethical decision-making besides the general principles of ethics and stipulated regulation like the severity of sanction together. It was exposed to have the effect that the severity of punishment, self control, and perceived value notes to the internet abuse action. Therefore, the education and rules of punishment which is consistent along with the theoretical thesis supporting the groping of the preparation plan that is active in the various ethic problems has to be built. It is necessary that the company devises the internet application in the appropriate range, that is the partial the affirmation feeling which and it can allow officially. According to the cognitive dissonance, since this will have to allow with the positive direction can move to the misuse action with the intention differently, it can draw a conclusion.

Keywords

References

  1. Ramayah, T., Chin, L. G. and Ahmad, N. H., Internet piracy among business students: An application of triandis model, International Journal of Business and Management Science, 2008, Vol. 1, No. 1, pp. 85-95.
  2. Lim, V. K. G., Understanding adherence to breast self-examination in older women, Journal of Organizational Behavior, 2002, Vol. 23, pp. 675-694. https://doi.org/10.1002/job.161
  3. Conlin, M., Workers, surf at your own risk, Business Week, 2000, pp. 105-106.
  4. Blanchard, A. L. and Henle, C. A., Correlates of different forms of cyberloafing: The role of norms and external locus of control, Computers in Human Behavior, 2008, vol. 24, No. 3, pp. 1067-1084. https://doi.org/10.1016/j.chb.2007.03.008
  5. Ehrlich, I., Crime, punishment, and the market for offenses, Journal of Economics Perspectives, 1996, vol. 10, No. 1, pp. 43-67. https://doi.org/10.1257/jep.10.1.43
  6. Fishbein, M. and Ajzen, I., Belief, attitude, intention, and behavior: an introduction to theory and research, Reading, M.A. Addison-Wesley. 1975.
  7. Ajzen, I. and Beck, L. Predicting dishonest actions using the theory of planned behavior, Journal of Research in Personality, 1991, vol. 25, No. 3, pp. 258-301.
  8. Lee, S. M. and Yoo, S., An integrative model of computer abuse based on social control and general deterrence theories, Information and Management, 2004, vol. 41, No. 6, pp. 707-718. https://doi.org/10.1016/j.im.2003.08.008
  9. Ehrlich, I., Crime, punishment, and the market for offenses, Journal of Economics Perspectives, 1996, Vol. 10, No. 1, pp. 43-67. https://doi.org/10.1257/jep.10.1.43
  10. Straub, D., Effective IS security: an empirical study, Information Systems Research, 1990, vol. 1, VNo. 3, pp. 255-276. https://doi.org/10.1287/isre.1.3.255
  11. Henle, C. A. and Blanchard, A. L., The interaction of work stressors and organizational sanctions on cyberloafing, Journal of Managerial Issues, 2008, vol. 20, No. 3, pp. 383-400.
  12. Liao, Q., X. Luo, A. Gurung, and Li, L., Workplace management and employee misuse: does punishment matter?, Journal of Computer Information Systems, 2009, vol. 50, No. 2, pp. 49-59.
  13. Hill, G. D. and Atkinson, M. P., Gender, familial control and delinquency, Criminology, 1988, vol. 26, No. 1, pp. 127-149. https://doi.org/10.1111/j.1745-9125.1988.tb00835.x
  14. Triandis, H. C., Values, attitudes, and interpersonal behaviour, in Howe, H. and M. Page,(1979), Nebraska symposium on motivation: Beliefs, attitudes and values, Lincoln, University of Nebraska Press, 1980, pp. 195-259.
  15. Thompson, R. L., Higgins, C. H. and Howell, J. M. Towards a conceptual model of utilization, MIS Quarterly, 1991, vol. 15, No. 1, pp. 125-143. https://doi.org/10.2307/249443
  16. Stevens, B., The ethics of the US business executive, Journal of Business Ethics, 2004, vol. 54, pp. 163-171. https://doi.org/10.1007/s10551-004-9464-9
  17. Steiner, I. D., Group process and productivity, New York: Academic Press. 1972.
  18. Longley, J. and Pruitt, D. C., Groupthink: A critique of Janis' theory, in Wheeler, L.(Eds.), Review of Personality and Social Psychology, 1990, pp. 74-93.
  19. Gottfredson, M. R, and Hirschi, T., A general theory of crime. Stanford, C.A.: Stanford University Press. 1990.
  20. Arneklev, B. J., Grasmick, H. G. Tittle, C. R. and Bursik, R. J., Low self-control and imprudent behavior, Journal of Quantitative Criminology, 1993, vol. 9, pp. 225-247. https://doi.org/10.1007/BF01064461
  21. Howard, J. A. and Woodside, A. G., Personal value affecting consumer psychology, in Pitts, R. E. and A. G. Woodside(Eds.), Lexington, D. C., Heath and Company. 1984.
  22. Rokeach, M., The nature of human values, New York: Free Press. 1973.
  23. Govindarajan, V. and Fisher, J., Strategy, control systems, and resource sharing: effects on business-unit performance, Academy of Management Journal, pp. 259-285.
  24. Workman, M. and Gathegi, J., Punishment and ethics deterrents: A study of insider security contravention, Journal of the American Society for Information Science and Technology, 2006, vol. 58, No. 2, pp. 212-222. https://doi.org/10.1002/asi.20474
  25. Thaler, R. H., Mental accounting and consumer choice, Marketing Service, 1985, vol. 4, No. 3, pp. 199-214.