Why Employees Do Non-Work-Related Computing: An Investigation of Factors Affecting NWRC in a Workplace

Non-work-related computing (NWRC) refers to any voluntary act of employees using their companies’ Internet access during office hours for non-work purposes. This study attempts to investigate the causes of NWRC. The model was developed based on rational decision-making and tested through a survey of 167 employees in China and Singapore. Results reveal that NWRC intention is a significant predictor of NWRC behaviour, and NWRC attitude and subjective norms are significant predictors of behavioural intention as in many prior studies. Besides, the perceived benefits and costs affect NWRC attitude. However, it turns out that habit may overrule other rational decisional factors when habit is included in the model. Finally, the comparison between two groups with different levels of control mechanisms shows the moderating effect.

[1]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[2]  James G. Phillips,et al.  Potential determinants of heavier internet usage , 2000, Int. J. Hum. Comput. Stud..

[3]  Jeffrey M. Stanton,et al.  Reactions to Employee Performance Monitoring: Framework, Review, and Research Directions , 2000 .

[4]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[5]  Leonard M. Jessup,et al.  Does electronic monitoring of employee internet usage work? , 2002, CACM.

[6]  Jeffrey M. Stanton,et al.  Company profile of the frequent internet user , 2002, CACM.

[7]  Detmar W. Straub,et al.  Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..

[8]  Detmar W. Straub,et al.  Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..

[9]  Gary Dessler Management fundamentals: Modern principles & practices , 1982 .

[10]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[11]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[12]  P. Sheeran,et al.  Implementation Intentions and the Theory of Planned Behavior , 1997, Personality & social psychology bulletin.

[13]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[14]  Keng Siau,et al.  Acceptable internet use policy , 2002, CACM.

[15]  J. Nunnally Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .

[16]  H C Triandis,et al.  Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[17]  France Bélanger,et al.  Abuse or learning? , 2002, CACM.

[18]  Oscar M. Palos From the editor , 1970, DATB.

[19]  Ibrahim M. Al-Jabri,et al.  Software copyright infringements: an exploratory study of the effects of individual and peer beliefs , 1997 .

[20]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[21]  J. Hair Multivariate data analysis , 1972 .

[22]  Stephen Hinde,et al.  Recent security surveys , 1998, Comput. Secur..

[23]  M. Conner,et al.  Extending the Theory of Planned Behavior: A Review and Avenues for Further Research , 1998 .

[24]  Thompson S. H. Teo,et al.  Intrinsic and extrinsic motivation in Internet usage , 1999 .

[25]  James Backhouse,et al.  Managing computer crime: a research outlook , 1995, Comput. Secur..

[26]  Claire A. Simmers Aligning internet usage with business priorities , 2002, CACM.

[27]  D. Galletta,et al.  An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .

[28]  W. F. Skinner,et al.  A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .

[29]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[30]  David Mason Managing Web Usage in the Workplace: A Social, Ethical and Legal Perspective , 2003 .

[31]  I. Ajzen The theory of planned behavior , 1991 .

[32]  Moez Limayem,et al.  Force of Habit and Information Systems Usage: Theory and Initial Validation , 2003, J. Assoc. Inf. Syst..

[33]  Janice C. Sipior,et al.  The dark side of employee email , 1999, CACM.

[34]  Jo Ann Oravec Constructive approaches to internet recreation in the workplace , 2002, CACM.

[35]  Nathan Bennett,et al.  The Role of Justice Judgments in Explaining the Relationship between Job Satisfaction and Organizational Commitment , 1996 .

[36]  Jatinder N. D. Gupta,et al.  Improving Workers' Productivity and Reducing Internet Abuse , 2004, J. Comput. Inf. Syst..

[37]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[38]  Paul Gray,et al.  Junk Computing - Is it Bad for an Organization? , 1996, Inf. Syst. Manag..

[39]  Kai H. Lim,et al.  Why Employees Do Non-Work-Related Computing: An Exploratory Investigation through Multiple Theoretical Perspectives , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[40]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .

[41]  Donn B. Parker,et al.  Fighting computer crime - a new framework for protecting information , 1998 .

[42]  A. Adam Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .

[43]  B. Verplanken,et al.  Habit, information acquisition, and the process of making travel mode choices , 1997 .

[44]  H W Jordan,et al.  On crime and punishment. , 1990, Journal of the National Medical Association.

[45]  L. Cronbach Coefficient alpha and the internal structure of tests , 1951 .

[46]  Jintae Lee,et al.  A holistic model of computer abuse within organizations , 2002, Inf. Manag. Comput. Secur..

[47]  Thompson S. H. Teo,et al.  How do I loaf here? let me count the ways , 2002, CACM.

[48]  William H. Friedman Is the Answer to Internet Addiction Internet Interdiction , 2000 .

[49]  Murugan Anandarajan INTERNET ABUSE IN THE WORKPLACE , 2002 .

[50]  Wendy Wood,et al.  Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. , 1998 .