Announcement of formal controls as phase-shifting perceptions: their determinants and moderating role in the context of mobile loafing

PurposeMobile loafing, or non-work-related mobile computing, is deviant workplace behavior that can reduce productivity and increase cybersecurity risks. To thwart mobile loafing, organizations often adopt formal controls that encompass rules and policies. These formal controls can serve as a phase-shifting event. Phase shifting is a process where individuals reevaluate and revise their perceptions of the regulation of deviant behaviors. Despite the importance of understanding this process, little research has examined the announcement of formal controls as an impetus for phase shifting. The primary objectives of this study were to induce a phase-shifting perception in an organizational setting and explore its determinants and moderating role in the context of mobile loafing.Design/methodology/approachThe authors proposed and tested a model using two-wave data collected from 231 Amazon Mechanical Turk workers. To test the research hypotheses, they used covariance-based structural equation modeling and logistic regression.FindingsThe authors found that peer's mobile loafing and neutralization positively influence mobile-loafing intention before and after the announcement of formal controls. This research also shows that the higher an employee's neutralization, the likelier they perceive the announcement of formal controls as phase shifting. Also, the authors found that the moderating effect of phase-shifting perceptions functions in such a way that the relationship between T1 and T2 mobile-loafing intention is weaker when employees perceive the announcement of formal controls as a phase-shifting event.Practical implicationsThe authors’ results provide managers with useful insights into effectively using formal controls to mitigate employees' deviant behavior. To effectively use formal controls, managers should articulate formal controls that can trigger employees to revise their perceptions of counterproductive workplace behavior policies.Originality/valueThis study is one of the first in information systems research to empirically examine the announcement of formal controls as a phase-shifting event and explore its antecedents and moderating role in the context of deviant workplace behavior in general and mobile loafing in particular.

[1]  L. Lanza-Kaduce,et al.  Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.

[2]  S. Chaiken Heuristic versus systematic information processing and the use of source versus message cues in persuasion. , 1980 .

[3]  P. Devine Stereotypes and prejudice: Their automatic and controlled components. , 1989 .

[4]  R. Hogarth,et al.  Order effects in belief updating: The belief-adjustment model , 1992, Cognitive Psychology.

[5]  E. Morrison,et al.  Longitudinal study of the effects of information seeking on newcomer socialization , 1993 .

[6]  R. Bennett,et al.  A TYPOLOGY OF DEVIANT WORKPLACE BEHAVIORS: A MULTIDIMENSIONAL SCALING STUDY , 1995 .

[7]  S. Sloman The empirical case for two systems of reasoning. , 1996 .

[8]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[9]  Eliot R. Smith,et al.  Dual-Process Models in Social and Cognitive Psychology: Conceptual Integration and Links to Underlying Memory Systems , 2000 .

[10]  Anol Bhattacherjee,et al.  Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..

[11]  M. Lindell,et al.  Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.

[12]  Jeffrey M. Stanton,et al.  Company profile of the frequent internet user , 2002, CACM.

[13]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[14]  Jo Ann Oravec Constructive approaches to internet recreation in the workplace , 2002, CACM.

[15]  D. Kahneman A perspective on judgment and choice: mapping bounded rationality. , 2003, The American psychologist.

[16]  D. Galletta,et al.  An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .

[17]  Anol Bhattacherjee,et al.  Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..

[18]  F. Strack,et al.  Reflective and Impulsive Determinants of Social Behavior , 2004, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[19]  Thompson S. H. Teo,et al.  Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study , 2005, Inf. Manag..

[20]  Naresh K. Malhotra,et al.  A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena , 2005, Manag. Sci..

[21]  Murugan Anandarajan,et al.  Developing Human Capital through Personal Web Use in the Workplace: Mapping Employee Perceptions , 2005, Commun. Assoc. Inf. Syst..

[22]  Pablo Zoghbi Manrique de Lara,et al.  Internet Research , 2022 .

[23]  Naresh K. Malhotra,et al.  Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..

[24]  Anol Bhattacherjee,et al.  Influence Processes for Information Technology Acceptance: An Elaboration Likelihood Model , 2006, MIS Q..

[25]  F. Strack,et al.  Reflective and Impulsive Determinants of Consumer Behavior , 2006 .

[26]  S. Ashford,et al.  Feedback-Seeking in Individual Adaptation: A Resource Perspective , 1986 .

[27]  Moez Limayem,et al.  How Habit Limits the Predictive Power of Intention: The Case of Information Systems Continuance , 2007, MIS Q..

[28]  Zoonky Lee,et al.  Understanding Personal Web Usage in Organizations , 2007, J. Organ. Comput. Electron. Commer..

[29]  David A Harrison,et al.  Do Peers Make the Place? Conceptual Synthesis and Meta-Analysis of Coworker Effects on Perceptions, Attitudes, OCBs, and Performance , 2008, The Journal of applied psychology.

[30]  L. G. Pee,et al.  Explaining non-work-related computing in the workplace: A comparison of alternative models , 2008, Inf. Manag..

[31]  Anita L. Blanchard,et al.  Correlates of different forms of cyberloafing: The role of norms and external locus of control , 2008, Comput. Hum. Behav..

[32]  Jonathan Evans Dual-processing accounts of reasoning, judgment, and social cognition. , 2008, Annual review of psychology.

[33]  R. Wiers,et al.  Impulsive versus reflective influences on health behavior: a theoretical framework and empirical review , 2008 .

[34]  Pablo Zoghbi-Manrique-de-Lara,et al.  Inequity, conflict, and compliance dilemma as causes of cyberloafing , 2009 .

[35]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[36]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[37]  Yanchun Zhang,et al.  Why Employees Do Non-Work-Related Computing in the Workplace , 2010, J. Comput. Inf. Syst..

[38]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[39]  Katelyn Y. A. McKenna,et al.  Employee job attitudes and organizational characteristics as predictors of cyberloafing , 2011, Comput. Hum. Behav..

[40]  Robert LaRose,et al.  Personal Internet use at work: Understanding cyberslacking , 2011, Comput. Hum. Behav..

[41]  Yajiong Xue,et al.  Ensuring Employees' IT Compliance: Carrot or Stick? , 2013, Inf. Syst. Res..

[42]  Kuang-Wei Wen,et al.  Organizations' Information Security Policy Compliance: Stick or Carrot Approach? , 2012, J. Manag. Inf. Syst..

[43]  Mikko T. Siponen,et al.  Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work , 2013, Inf. Manag..

[44]  Paul Benjamin Lowry,et al.  Using Accountability to Reduce Access Policy Violations in Information Systems , 2013, J. Manag. Inf. Syst..

[45]  Dustin Ormond,et al.  Don't make excuses! Discouraging neutralization to reduce IT policy violation , 2013, Comput. Secur..

[46]  Yi Ding,et al.  Am I "Pushed" to Loaf at Work? A Study of Push Notification Triggered Mobile-loafing , 2014, ICIS.

[47]  Tejaswini Herath,et al.  Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..

[48]  Bo Xiao,et al.  Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding , 2015, Inf. Syst. Res..

[49]  Paul Benjamin Lowry,et al.  The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness , 2015, Inf. Syst. Res..

[50]  Zauwiyah Ahmad,et al.  Personal Internet use: The use of personal mobile devices at the workplace , 2015 .

[51]  Dennis F. Galletta,et al.  What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors , 2015, MIS Q..

[52]  Sacip Toker,et al.  An investigation of the impact of demographics on cyberloafing from an educational setting angle , 2015, Comput. Hum. Behav..

[53]  Fred D. Davis,et al.  Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual‐systems perspective , 2015, Inf. Syst. J..

[54]  Paul Benjamin Lowry,et al.  Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations Under Conditions of Strain and Excess , 2015, J. Assoc. Inf. Syst..

[55]  Hamed Qahri Saremi,et al.  Problematic Use of Social Networking Sites: Antecedents and Consequence from a Dual-System Theory Perspective , 2016, J. Manag. Inf. Syst..

[56]  David P. Biros,et al.  An Empirical Validation of Malicious Insider Characteristics , 2016, J. Manag. Inf. Syst..

[57]  Ragnhildur Lilja Asgeirsdottir,et al.  Balanced Inventory of Desirable Responding--Short Form , 2017 .

[58]  Kyung-shick Choi,et al.  Mobile Phone Technology and Online Sexual Harassment among Juveniles in South Korea: Effects of Self-control and Social Learning , 2017 .

[59]  Lara Khansa,et al.  To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls , 2017, J. Manag. Inf. Syst..

[60]  Tessa Melkonian,et al.  To Shift or Not to Shift? Determinants and Consequences of Phase Shifting on Justice Judgments , 2017 .

[61]  Thurasamy Ramayah,et al.  Determinants of cyberloafing: a comparative study of a public and private sector organization , 2017, Internet Res..

[62]  Merrill Warkentin,et al.  Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives , 2018, Inf. Syst. J..

[63]  Jinnan Wu,et al.  Student Cyberloafing In and Out of the Classroom in China and the Relationship with Student Performance , 2018, Cyberpsychology Behav. Soc. Netw..

[64]  Xiao Ma,et al.  Cross-Level Moderation of Team Cohesion in Individuals' Utilitarian and Hedonic Information Processing: Evidence in the Context of Team-Based Gamified Training , 2019, J. Assoc. Inf. Syst..

[65]  Thurasamy Ramayah,et al.  Workplace internet leisure and employees' productivity , 2019, Internet Res..

[66]  Philipp Holtkamp,et al.  Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research , 2019, J. Assoc. Inf. Syst..

[67]  Xiao Ma,et al.  Disrupting Unwanted Habits in Online Gambling Through Information Technology , 2019, J. Manag. Inf. Syst..

[68]  Shwadhin Sharma,et al.  I want it my way: Using consumerism and neutralization theory to understand students' cyberslacking behavior , 2020, Int. J. Inf. Manag..

[69]  Yajun Zhang,et al.  Are overqualified employees bad apples? A dual-pathway model of cyberloafing , 2019, Internet Res..

[70]  Upasna A. Agarwal,et al.  Abusive supervisors and employees who cyberloaf , 2020, Internet Res..

[71]  Joseph C. Ugrin,et al.  The bright and dark sides of social cyberloafing: Effects on employee mental health in China , 2020 .

[72]  A. Tsohou,et al.  Examining the side effects of organizational Internet monitoring on employees , 2020, Internet Res..

[73]  Sauvik Kumar Batabyal,et al.  Traditional cyberloafing, mobile cyberloafing and personal mobile-internet loafing in business organizations: Exploring cognitive ethical logics , 2020, J. Inf. Commun. Ethics Soc..

[74]  P. Hensel,et al.  Job Overload, Organizational Commitment, and Motivation as Antecedents of Cyberloafing: Evidence from Employee Monitoring Software , 2020, European Management Review.

[75]  Kian Yeik Koay,et al.  The effects of abusive supervision, emotional exhaustion and organizational commitment on cyberloafing: a moderated-mediation examination , 2020, Internet Res..

[76]  Przemyslaw G. Hensel,et al.  Curbing cyberloafing: studying general and specific deterrence effects with field evidence , 2020, Eur. J. Inf. Syst..