Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work

Non-work-related personal use of the Internet within organizations has received increased attention from scholars. We increase previous understanding of this phenomenon by proposing a novel model based on the theory of interpersonal behavior (TIB). The TIB includes previous researched constructs (i.e., attitudes, social influence, and intentions) as well as emotional factors, habits, and different sources of social influence. Our results (N=238) suggest that the model well predicts the use of the Internet at work for non-work purposes. Our results shed new light on the influence of habit, affect, role, and self-concept in the use of the Internet.

[1]  W. F. Skinner,et al.  A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .

[2]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[3]  L. G. Pee,et al.  Behavioral Factors Affecting Internet Abuse in the Workplace – An Empirical Investigation , 2004 .

[4]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[5]  G. Godin,et al.  A comparison of the Fishbein and Ajzen and the Triandis attitudinal models for the prediction of exercise intention and behavior , 1988, Journal of Behavioral Medicine.

[6]  Detmar W. Straub,et al.  Diffusing the Internet in the Arab world: the role of social norms and technological culturation , 2003, IEEE Trans. Engineering Management.

[7]  Claire A. Simmers Aligning internet usage with business priorities , 2002, CACM.

[8]  Blair H. Sheppard,et al.  THEORY OF REASONED ACTION , 2014 .

[9]  Leonard M. Jessup,et al.  Does electronic monitoring of employee internet usage work? , 2002, CACM.

[10]  Sang M. Lee,et al.  An integrative model of computer abuse based on social control and general deterrence theories , 2004, Inf. Manag..

[11]  Paul Benjamin Lowry,et al.  The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups , 2009, J. Manag. Inf. Syst..

[12]  Mikko T. Siponen,et al.  Overcoming the insider: reducing employee computer crime through Situational Crime Prevention , 2009, CACM.

[13]  Jo Ann Oravec Constructive approaches to internet recreation in the workplace , 2002, CACM.

[14]  H. Marsh,et al.  Application of confirmatory factor analysis to the study of self-concept: First- and higher order factor models and their invariance across groups. , 1985 .

[15]  B. Verplanken,et al.  Reflections on past behavior: A self-report index of habit strength , 2003 .

[16]  P. Schmidt,et al.  Incentives, Morality, Or Habit? Predicting Students’ Car Use for University Routes With the Models of Ajzen, Schwartz, and Triandis , 2003 .

[17]  J. Turner Social categorization and the self-concept: A social cognitive theory of group behavior. , 2010 .

[18]  Robert J. Vandenberg,et al.  12 Structural Equation Modeling in Management Research: A Guide for Improved Analysis , 2009 .

[19]  Robert I. Sutton,et al.  Employee Positive Emotion and Favorable Outcomes at the Workplace , 1994 .

[20]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[21]  Lisa L. Miller The Perils of Federalism: Race, Poverty, and the Politics of Crime Control , 2008 .

[22]  I. Ajzen,et al.  Attitude-behavior relations: A theoretical analysis and review of empirical research. , 1977 .

[23]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .

[24]  Vincent S. Lai,et al.  Prediction of Internet and World Wide Web usage at work: a test of an extended Triandis model , 2000, Decis. Support Syst..

[25]  Peter Schmidt,et al.  , Schwartz , and Triandis Incentives , Morality , Or Habit ? , 2003 .

[26]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[27]  A. Caetano,et al.  Exploring the effects of intragroup conflict and past performance feedback on team effectiveness , 2005 .

[28]  C. N. Cofer,et al.  Motivation: Theory and research. , 1964 .

[29]  Keven G. Ruby,et al.  The Insider Threat to Information Systems , 2022 .

[30]  J. Gibbs Crime, punishment, and deterrence , 1975 .

[31]  Salvatore T. March,et al.  Information Systems Research , 2004, IFIP International Federation for Information Processing.

[32]  B. Verplanken,et al.  Habit, attitude, and planned behaviour : is habit an empty construct or an interesting case of goal-directed automaticity? , 1999 .

[33]  Detmar W. Straub,et al.  Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..

[34]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[35]  Robert L. Akers,et al.  A Differential Association-Reinforcement Theory of Criminal Behavior , 1966 .

[36]  Moez Limayem,et al.  The Role of Habit in Information Systems Continuance: Examining the Evolving Relationship Between Intention and Usage , 2005, ICIS.

[37]  L. G. Pee,et al.  Explaining non-work-related computing in the workplace: A comparison of alternative models , 2008, Inf. Manag..

[38]  Anita L. Blanchard,et al.  The Interaction of Work Stressors and Organizational Sanctions on Cyberloafing , 2008 .

[39]  Pablo Zoghbi Manrique De Lara Relationship between Organizational Justice and Cyberloafing in the Workplace: Has "Anomia" a Say in the Matter? , 2007, Cyberpsychology Behav. Soc. Netw..

[40]  H. Winklhofer,et al.  Index Construction with Formative Indicators: An Alternative to Scale Development , 2001 .

[41]  Izak Benbasat,et al.  Quo vadis TAM? , 2007, J. Assoc. Inf. Syst..

[42]  Sandra L. Robinson,et al.  Feedback seeking in groups: A theoretical perspective. , 1993 .

[43]  Anita L. Blanchard,et al.  Correlates of different forms of cyberloafing: The role of norms and external locus of control , 2008, Comput. Hum. Behav..

[44]  Duane T. Wegener,et al.  Attitude change: Multiple roles for persuasion variables. , 1998 .

[45]  R. Rosenfeld Belief , 2012, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.

[46]  Anat Hovav,et al.  Deterring internal information systems misuse , 2007, CACM.

[47]  Murugan Anandarajan,et al.  Perceptions of Personal Web Usage in the Workplace: AQ-Methodology Approach , 2006, Cyberpsychology Behav. Soc. Netw..

[48]  Эшфорт Блейк,et al.  Social identity theory and the organization , 2012 .

[49]  Lisa Seymour,et al.  Web access for IT staff: a developing world perspective on web abuse , 2007, Electron. Libr..

[50]  P. Hartel Overcoming the insider: reducing employee computer crime through situational crime prevention: Willison R., Siponen M. Communications of the ACM 52(9): 133-137, 2009 , 2009 .

[51]  B. Malle,et al.  How People Explain Behavior: A New Theoretical Framework , 1999, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[52]  Y. Braunstein,et al.  Information management , 1996 .

[53]  Raymond R. Panko,et al.  Monitoring for pornography and sexual harassment , 2002, CACM.

[54]  Keng Siau,et al.  Acceptable internet use policy , 2002, CACM.

[55]  J. A. Smiley,et al.  Incentives , 2019, Handbook of Research Methods and Applications in Experimental Economics.

[56]  Marie-Pierre Gagnon,et al.  An adaptation of the theory of interpersonal behaviour to the study of telemedicine adoption by physicians , 2003, Int. J. Medical Informatics.

[57]  B. Verplanken,et al.  Predicting behavior from actions in the past : repeated decision making or a matter of habit? , 1998 .

[58]  D. Galletta,et al.  An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .

[59]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[60]  I. Ajzen,et al.  Choice of Travel Mode in the Theory of Planned Behavior: The Roles of Past Behavior, Habit, and Reasoned Action , 2003 .

[61]  Rolph E. Anderson,et al.  Multivariate Data Analysis (7th ed. , 2009 .

[62]  Varun Grover,et al.  The Role of System Trust in Business-to-Consumer Transactions , 2003, J. Manag. Inf. Syst..

[63]  J. Christopher Westland,et al.  Lower bounds on sample size in structural equation modeling , 2010, Electron. Commer. Res. Appl..

[64]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[65]  I. Ajzen,et al.  A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action , 1992 .

[66]  Paul A. Pavlou,et al.  Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..

[67]  Thompson S. H. Teo,et al.  How do I loaf here? let me count the ways , 2002, CACM.

[68]  H. Aarts,et al.  Physical exercise habit: on the conceptualization and formation of habitual health behaviours. , 1997, Health education research.

[69]  Waiman Cheung,et al.  Determinants of the intention to use Internet/WWW at work: a confirmatory study , 2001, Inf. Manag..

[70]  Richard D. Johnson,et al.  The Evolving Nature of the Computer Self-Efficacy Construct: An Empirical Investigation of Measurement Construction, Validity, Reliability and Stability Over Time , 2007, J. Assoc. Inf. Syst..

[71]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[72]  Ian Kelly,et al.  Crime , 1874, Hall's journal of health.

[73]  W. Ouchi,et al.  Organizational Control: Two Functions. , 1975 .

[74]  L. Lanza-Kaduce,et al.  Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.

[75]  Murugan Anandarajan,et al.  Profiling Web Usage in the Workplace: A Behavior-Based Artificial Intelligence Approach , 2002, J. Manag. Inf. Syst..

[76]  B. Verplanken,et al.  Habit, information acquisition, and the process of making travel mode choices , 1997 .

[77]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[78]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.

[79]  Jeffrey M. Stanton,et al.  Company profile of the frequent internet user , 2002, CACM.

[80]  Luigi Leone,et al.  A comparison of three models of attitude-behavior relationships in the studying behavior domain , 1999 .