The Blurring Boundaries Of Work-Related And Personal Media Use: A Grounded Theory Study On The Employee's Perspective

The ongoing consumerization of information technology (IT) demands to rethink the traditional paradigms of media use at the workplace. Past research has focused on the use of company IT resources for personal purposes (e.g., ‘cyberloafing’) and primarily emphasized the adverse effects. This study takes a wider perspective and includes the use of personal IT resources for company purposes as well as other mixed forms of personal and work-related media use. We conducted interviews with 14 employees in 5 different firms and used a grounded theory approach to explore the blurring of boundaries between work and private life discussed in the wider social science literature. Our study demonstrates different attitudes of employees towards work-life blurring and suggests that social and mobile IT has a catalyst role in this process. We contribute to the past literature by providing a conceptual model for the context, the conditions and the consequences of this phenomenon. Practical implications are discussed.

[1]  Dinesh A. Mirchandani,et al.  Reducing Internet Abuse in the Workplace , 2003 .

[2]  A. Strauss Basics Of Qualitative Research , 1992 .

[3]  Blake Ives,et al.  IT Consumerization: When Gadgets Turn Into Enterprise IT Tools , 2012, MIS Q. Executive.

[4]  Blake E. Ashforth,et al.  All in a Day'S Work: Boundaries and Micro Role Transitions , 2000 .

[5]  Anselm L. Strauss,et al.  Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .

[6]  Magid Igbaria,et al.  Development of a Measure of Personal Web Usage in the Workplace , 2004, Cyberpsychology Behav. Soc. Netw..

[7]  Joseph C. Ugrin,et al.  Exploring Internet Abuse in the Workplace: How Can We Maximize Deterrence Efforts? , 2008 .

[8]  Andreas Antonius Béla Györy,et al.  Bewusster Einsatz von Schatten-IT: Sicherheit & Innovationsförderung , 2011 .

[9]  Kimberly Young,et al.  Internet Abuse in the Workplace: New Trends in Risk Management , 2004, Cyberpsychology Behav. Soc. Netw..

[10]  Zoonky Lee,et al.  Pluralistic Ignorance in the Personal Use of the Internet and System Monitoring , 2005, AMCIS.

[11]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[12]  Noelle Chesley Blurring Boundaries? Linking Technology Use, Spillover, Individual Distress, and Family Satisfaction , 2005 .

[13]  France Bélanger,et al.  Abuse or learning? , 2002, CACM.

[14]  Gee-Woo Bock,et al.  Why Employees Do Non-Work-Related Computing: An Investigation of Factors Affecting NWRC in a Workplace , 2006, PACIS.

[15]  Gee-Woo Bock,et al.  Non-work related computing (NWRC) , 2009, CACM.

[16]  Cathy Urquhart,et al.  Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems , 2009, Inf. Syst. J..

[17]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[18]  Yajiong Xue,et al.  Punishment, Justice, and Compliance in Mandatory IT Settings , 2011, Inf. Syst. Res..

[19]  Pamela Jordan Basics of qualitative research: Grounded theory procedures and techniques , 1994 .

[20]  Gary Klein,et al.  Using Deterrence to Mitigate Employee Internet Abuse , 2012, 2012 45th Hawaii International Conference on System Sciences.

[21]  Anita L. Blanchard,et al.  The Interaction of Work Stressors and Organizational Sanctions on Cyberloafing , 2008 .

[22]  Huimin Zhao,et al.  A text mining approach to Internet abuse detection , 2008, Inf. Syst. E Bus. Manag..

[23]  Qing Hu,et al.  Does deterrence work in reducing information security policy abuse by employees? , 2011, Commun. ACM.

[24]  Jintae Lee,et al.  A holistic model of computer abuse within organizations , 2002, Inf. Manag. Comput. Secur..

[25]  Walter Brenner,et al.  European Conference on Information Systems ( ECIS ) 5-15-2012 EXPLORING THE SHADOWS : IT GOVERNANCE APPROACHES TO USER-DRIVEN INNOVATION , 2012 .

[26]  Catherine E. Connelly,et al.  Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model , 2011, J. Manag. Inf. Syst..

[27]  A. Stinchcombe Information and Organizations , 2019 .

[28]  A. Strauss,et al.  The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .

[29]  D. Galletta,et al.  An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .

[30]  Michael D. Myers,et al.  The qualitative interview in IS research: Examining the craft , 2007, Inf. Organ..

[31]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[32]  Vivien K. G. Lim,et al.  Cyberloafing, Neutralization, And Organizational Citizenship Behavior , 2011, PACIS.

[33]  Hock-Hai Teo,et al.  An Experimental Study of the Factors Influencing Non-Work Related Use of IT Resources at Workplace , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[34]  James N. Danziger,et al.  On Cyberslacking: Workplace Status and Personal Internet Use at Work , 2008, Cyberpsychology Behav. Soc. Netw..

[35]  Oliver Günther,et al.  The Impact of Software as a Service on IS Authority - A Contingency Perspective , 2011, ICIS.

[36]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[37]  M. Griffiths Internet abuse in the workplace: Issues and concerns for employers and employment counselors , 2003 .

[38]  Nancy B. Kurland,et al.  A review of telework research: findings, new directions, and lessons for the study of modern work , 2002 .

[39]  Paul Schalow Private Kommunikationsressourcen und -interessen im betrieblichen Umfeld , 2012 .

[40]  I. Ajzen The theory of planned behavior , 1991 .