An empirical evaluation of key factors contributing to internet abuse in the workplace

Purpose – This study seeks to synthesize theories from communication, psychology and criminologyto examine the factors that influence the two most popular topics in industry – internet abuse andaddiction at the workplace. Design/methodology/approach – The survey results of 351 responseswere analyzed to test the proposed hypotheses and research model using structural equationmodeling. Data were collected in Southern Science Park in Taiwan.Findings – It was found that personality factors such as locus of control and self-esteem significantlyinfluence employees’ internet addictions; and internet addiction significantly impacts employees’internet abuse at the workplace. Practical implications – Employers should pay special attention toemployees’ personalities because they play important roles in internet addiction and internet abuse.Also a good internet policy will be useful especially to a panoptic working environment, which isbecoming popular. Originality/value. his study provides a comprehensive theoretical foundation tobetter understand the two controversial issues in industry. The empirical study validates theimportant theories of locus of control, self-esteem, use and gratification, control, and containment inworkplace surveillance and deviant behavior research

[1]  John Francis Kros,et al.  An assessment of supply chain managers' trust in online auctions , 2010, Ind. Manag. Data Syst..

[2]  S. Sharma,et al.  Key factors that hinder SMEs in succeeding in today's knowledge-based economy , 2005 .

[3]  J. Gackenbach Psychology and the Internet : intrapersonal, interpersonal, and transpersonal implications , 1998 .

[4]  William M. Fitzpatrick,et al.  Competitive intelligence, corporate security and the virtual organization , 2003 .

[5]  Young B. Choi,et al.  A quantification model using P3P in privacy control for telecommunications service management , 2005, Int. J. Serv. Stand..

[6]  Peter M. Bentler,et al.  Practical Issues in Structural Modeling , 1987 .

[7]  Timothy Paul Cronan,et al.  Have you met your organization's computer usage policy? , 2005, Ind. Manag. Data Syst..

[8]  Magid Igbaria,et al.  Development of a Measure of Personal Web Usage in the Workplace , 2004, Cyberpsychology Behav. Soc. Netw..

[9]  Dc Washington Diagnostic and Statistical Manual of Mental Disorders, 4th Ed. , 1994 .

[10]  Jeffrey M. Stanton,et al.  Company profile of the frequent internet user , 2002, CACM.

[11]  Thomas F. Stafford,et al.  Determining Uses and Gratifications for the Internet , 2004, Decis. Sci..

[12]  T. Hirschi Causes of Delinquency. , 1970, British medical journal.

[13]  Janice C. Sipior,et al.  A Strategic Response to the Broad Spectrum of Internet Abuse , 2002 .

[14]  Kimberly Young,et al.  Employee Internet Management: Current Business Practices and Outcomes , 2002, Cyberpsychology Behav. Soc. Netw..

[15]  Richard G. Netemeyer,et al.  Price Perceptions and Consumer Shopping Behavior: A Field Study , 1993 .

[16]  E. Katz,et al.  The Uses of Mass Communications: Current Perspectives on Gratifications Research. Sage Annual Reviews of Communication Research Volume III. , 1975 .

[17]  M. Griffiths Internet abuse in the workplace: Issues and concerns for employers and employment counselors , 2003 .

[18]  Atul Gupta,et al.  Information systems security issues and decisions for small businesses: An empirical examination , 2005, Inf. Manag. Comput. Security.

[19]  Chin-Chung Tsai,et al.  Sensation seeking and internet dependence of Taiwanese high school adolescents , 2000, Comput. Hum. Behav..

[20]  Kimberly Young,et al.  The Relationship Between Depression and Internet Addiction , 1998, Cyberpsychology Behav. Soc. Netw..

[21]  Michael L. Frank,et al.  Gambling and pathological gambling among university students. , 1991, Addictive behaviors.

[22]  James G. Phillips,et al.  Potential determinants of heavier internet usage , 2000, Int. J. Hum. Comput. Stud..

[23]  Janice E. J. Woodrow,et al.  Locus of control and student teacher computer attitudes , 1990 .

[24]  Detmar W. Straub,et al.  Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..

[25]  Stephan Arndt,et al.  Secretarial attitudes towards word processors as a function of familiarity and locus of control , 1983 .

[26]  Paul Gray,et al.  Junk Computing - Is it Bad for an Organization? , 1996, Inf. Syst. Manag..

[27]  M. H. Bala Subrahmanya Small-scale industries in India in the globalisation era: performance and prospects , 2005 .

[28]  Louis Leung,et al.  Shyness and Locus of Control as Predictors of Internet Addiction and Internet Use , 2004, Cyberpsychology Behav. Soc. Netw..

[29]  Robert LaRose,et al.  Internet Gratifications and Internet Addiction: On the Uses and Abuses of New Media , 2004, Cyberpsychology Behav. Soc. Netw..

[30]  Yu Qiu-mei,et al.  Causes and Implications of Disinhibited Behaviors on the Internet , 2007 .

[31]  Magid Igbaria,et al.  The Information Society: An International , 2003 .

[32]  J. R. Aiello,et al.  The effects of electronic performance monitoring on stress: Locus of control as a moderator variable , 1996 .

[33]  Richard A. Davis,et al.  Lost in Cyberspace: The Web @ Work , 2002, Cyberpsychology Behav. Soc. Netw..

[34]  Mark Taylor,et al.  The legal aspects of corporate computer usage policies , 2010, Comput. Law Secur. Rev..

[35]  Blythe Suezann Harrell,et al.  Uses and gratifications of the internet , 2000 .

[36]  D. Greenfeld,et al.  Virtual Addiction: Help for Netheads, Cyberfreaks, and Those Who Love Them , 1999 .

[37]  Jeremy Phillips The Enemy Within , 2003 .

[38]  Kimberly Young,et al.  Internet Abuse in the Workplace: New Trends in Risk Management , 2004, Cyberpsychology Behav. Soc. Netw..

[39]  Cesare Lombroso,et al.  Crime, its causes and remedies , 1911 .

[40]  Betty A. Kleen,et al.  Exploring Internet Addiction: Demographic Characteristics and Stereotypes of Heavy Internet Users , 2003, J. Comput. Inf. Syst..

[41]  Huimin Zhao,et al.  Commercial Internet filters: Perils and opportunities , 2010, Decis. Support Syst..

[42]  M. Griffiths Internet addiction: Does it really exist? , 1998 .

[43]  K. Young Caught in the Net: How to Recognize the Signs of Internet Addiction--and a Winning Strategy for Recovery , 1998 .

[44]  Farley Stewart,et al.  Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues , 2000, Inf. Secur. J. A Glob. Perspect..

[45]  Yaobin Lu,et al.  Internet inequality: The relationship between high school students' Internet use in different locations and their Internet self-efficacy , 2010, Comput. Educ..

[46]  H. Bosma,et al.  Coping and self-concept in adolescence , 1990 .

[47]  M. Coovert,et al.  Locus of Control as a Predictor of Users' Attitude toward Computers , 1980 .

[48]  T. Wong,et al.  Key factors for small and medium enterprises in Taiwan to successfully implement information systems , 2005 .

[49]  John Coleman Coping and self-concept in adolescence , 1991 .

[50]  Morris Rosenberg,et al.  SELF-ESTEEM AND CONCERN WITH PUBLIC AFFAIRS , 1962 .

[51]  E. Rogers,et al.  Research methods and the new media , 1988 .

[52]  Chien Chou,et al.  Internet addiction, usage, gratification, and pleasure experience: the Taiwan college students' case , 2000, Comput. Educ..

[53]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[54]  Magid Igbaria,et al.  Explaining production deviant use of the internet technology in the workplace: an integrated model , 2002 .

[55]  A. Rubin Media uses and effects: A uses-and-gratifications perspective. , 1994 .

[56]  Keng Siau,et al.  Acceptable internet use policy , 2002, CACM.

[57]  Nathaniel Branden,et al.  Self-Esteem At Work , 1998 .

[58]  K. Young Internet addiction: evaluation and treatment , 1999, BMJ.

[59]  J. Rotter Generalized expectancies for internal versus external control of reinforcement. , 1966, Psychological monographs.

[60]  Mark D. Griffiths,et al.  Does Internet and Computer "Addiction" Exist? Some Case Study Evidence , 2000, Cyberpsychology Behav. Soc. Netw..

[61]  William H. Ross,et al.  Adapting different media types to trust development in the supply chain , 2007 .

[62]  Vallabh Sambamurthy,et al.  Shaping UP for E-Commerce: Institutional Enablers of the Organizational Assimliation of Web Technologies , 2002, MIS Q..

[63]  K. Young,et al.  Psychology of Computer Use: XL. Addictive Use of the Internet: A Case That Breaks the Stereotype , 1996, Psychological reports.