Announcement of Formal control as a phase-Shifting perception and its Moderating Role in the Context of Mobile-Loafing

Organizations attempt to mitigate nonwork-related behaviors of employees to maintain productivity and employee engagement. As a manifestation of nonwork-related mobile computing, mobile loafing is considered subject to control by organizations. According to Akers’ social learning theory, deviant behaviors are usually learned through imitating others or through experience. In addition, new information on deviant behaviors can influence the mechanisms of conducting those behaviors. This study investigates how perceptions of mobile-loafing are moderated by phase-shifting perception after organizations’ announcements of formal control. In particular, we hypothesize that phase-shifting perception has moderating effects on employees’ perceptions of mobile-loafing, such as neutralization and peer loafing, from time 1 to time 2. The results of this study will contribute to information systems (IS) research by suggesting the moderating role of phase-shifting perception in the context of mobileloafing.

[1]  D. Paulhus Measurement and control of response bias. , 1991 .

[2]  Zauwiyah Ahmad,et al.  Personal Internet use: The use of personal mobile devices at the workplace , 2015 .

[3]  H C Triandis,et al.  Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[4]  John P. Robinson,et al.  Measures Of Personality And Social Psychological Attitudes , 1991 .

[5]  Philipp Holtkamp,et al.  Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research , 2019, J. Assoc. Inf. Syst..

[6]  Ronald L. Akers,et al.  Deviant behavior;: A social learning approach , 1973 .

[7]  L. Lanza-Kaduce,et al.  Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.

[8]  Tessa Melkonian,et al.  To Shift or Not to Shift? Determinants and Consequences of Phase Shifting on Justice Judgments , 2017 .

[9]  Yanchun Zhang,et al.  Why Employees Do Non-Work-Related Computing in the Workplace , 2010, J. Comput. Inf. Syst..

[10]  D. Galletta,et al.  An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .

[11]  Barbara M. Byrne,et al.  Structural equation modeling with AMOS , 2010 .

[12]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[13]  E. Lind Fairness heuristic theory: Justice judgments as pivotal cognitions in organizational relations. , 2001 .

[14]  Timothy D. Ritchie,et al.  The Balanced Inventory of Desirable Responding Short Form (BIDR-16) , 2015 .

[15]  David F. Larcker,et al.  Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .

[16]  J. Pfeffer,et al.  A social information processing approach to job attitudes and task design. , 1978, Administrative science quarterly.

[17]  Kuang-Wei Wen,et al.  Organizations' Information Security Policy Compliance: Stick or Carrot Approach? , 2012, J. Manag. Inf. Syst..

[18]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[19]  Lara Khansa,et al.  To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls , 2017, J. Manag. Inf. Syst..

[20]  Thompson S. H. Teo,et al.  Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study , 2005, Inf. Manag..

[21]  Anol Bhattacherjee,et al.  Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..

[22]  L. G. Pee,et al.  Explaining non-work-related computing in the workplace: A comparison of alternative models , 2008, Inf. Manag..

[23]  Ronald L. Akers,et al.  A Longitudinal Test of Social Learning Theory: Adolescent Smoking , 1996 .

[24]  Wendy Wood,et al.  Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. , 1998 .

[25]  Paul Benjamin Lowry,et al.  Using Accountability to Reduce Access Policy Violations in Information Systems , 2013, J. Manag. Inf. Syst..

[26]  Katelyn Y. A. McKenna,et al.  Employee job attitudes and organizational characteristics as predictors of cyberloafing , 2011, Comput. Hum. Behav..

[27]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[28]  I. Rosenstock,et al.  Social Learning Theory and the Health Belief Model , 1988, Health education quarterly.

[29]  Naresh K. Malhotra,et al.  A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena , 2005, Manag. Sci..