The Role of Pluralistic Ignorance in Internet Abuse

Previous research suggests that computer security countermeasures are effective in preventing computer abuse in organizations. However, the computer abuse problem still persists despite such measures. This study examines the sociological perspective of Internet abuse that explains a causal link between abusive behavior and an actor's psychological state, drawn on theory of pluralistic ignorance (TPI). Pluralistic ignorance is a form of erroneous social interference that is both an immediate cause and a consequence of literal inconsistency between private attitudes and public behavior. Under pluralistic ignorance, mistakenly perceived social norms overwhelm personal attitudes and subsequently lead to overt behavior contrary to an actor's attitude. This new approach contributes to the theoretical body of knowledge on Internet abuse by providing a new angle to view the problem. In addition, it suggests to practitioners that social aspects should be considered, along with technical countermeasures, to reduce the pervasive Internet abuse problem.

[1]  Ray Bert,et al.  Book Review: \IThe World Is Flat: A Brief History of the Twenty-First Century\N by Thomas L. Friedman. New York: Farrar, Straus and Giroux, 2005 , 2006 .

[2]  Dale T. Miller,et al.  When social comparison goes awry: The case of pluralistic ignorance. , 1991 .

[3]  William G. Vanderbok The World is Flat: A Brief History of the Twenty-First Century , 2005 .

[4]  Jo Ann Oravec Constructive approaches to internet recreation in the workplace , 2002, CACM.

[5]  Deborah A. Prentice,et al.  Pluralistic Ignorance and the Perpetuation of Social Norms by Unwitting Actors , 1996 .

[6]  Leonard M. Jessup,et al.  Does electronic monitoring of employee internet usage work? , 2002, CACM.

[7]  Sang M. Lee,et al.  An integrative model of computer abuse based on social control and general deterrence theories , 2004, Inf. Manag..

[8]  Detmar W. Straub,et al.  Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..

[9]  Kimberly Young,et al.  Employee Internet Management: Current Business Practices and Outcomes , 2002, Cyberpsychology Behav. Soc. Netw..

[10]  Chien Chou,et al.  A Review of the Research on Internet Addiction , 2005 .

[11]  Keng Siau,et al.  Acceptable internet use policy , 2002, CACM.

[12]  Claire A. Simmers Aligning internet usage with business priorities , 2002, CACM.

[13]  Janice C. Sipior,et al.  A Strategic Response to the Broad Spectrum of Internet Abuse , 2002 .

[14]  Thomas Hilton,et al.  Information Systems Ethics in the Triad , 2006, J. Comput. Inf. Syst..

[15]  I. Ajzen The theory of planned behavior , 1991 .

[16]  France Bélanger,et al.  Abuse or learning? , 2002, CACM.

[17]  Jeffrey M. Stanton,et al.  Company profile of the frequent internet user , 2002, CACM.

[18]  T. Jones Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .

[19]  Thompson S. H. Teo,et al.  How do I loaf here? let me count the ways , 2002, CACM.

[20]  D. Galletta,et al.  An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .

[21]  Dale T. Miller,et al.  Pluralistic ignorance: When similarity is interpreted as dissimilarity. , 1987 .

[22]  L. G. Pee,et al.  Behavioral Factors Affecting Internet Abuse in the Workplace – An Empirical Investigation , 2004 .

[23]  Elena Karahanna,et al.  Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage , 2000, MIS Q..

[24]  Patrick R. Gartin,et al.  Specifying Specific Deterrence: The Influence of Arrest on Future Criminal Activity , 1989 .

[25]  John R. Kros,et al.  Assessing & Quantifying the Loss of Network Intrusion , 2005, J. Comput. Inf. Syst..

[26]  David R. Brake LOST IN CYBERSPACE , 1997 .

[27]  Janet Morahan-Martin,et al.  Internet Abuse , 2005 .

[28]  D. J. Terry,et al.  Social contextual influences on attitude-behaviour correspondence, attitude change, and persusion. , 2000 .

[29]  Jonathon R. B. Halbesleben,et al.  The Role of Pluralistic Ignorance in Perceptions of Unethical Behavior: An Investigation of Attorneys' and Students' Perceptions of Ethical Behavior , 2004 .

[30]  Raymond R. Panko,et al.  Monitoring for pornography and sexual harassment , 2002, CACM.

[31]  Deborah A. Prentice,et al.  Pluralistic ignorance and inconsistency between private attitudes and public behaviors. , 2000 .

[32]  Jintae Lee,et al.  A holistic model of computer abuse within organizations , 2002, Inf. Manag. Comput. Secur..

[33]  M. Hogg,et al.  Improving Attitude-Behavior Correspondence Through Exposure to Normative Support From a Salient Ingroup , 2002 .

[34]  Helen Kelley,et al.  Morality and Computers: Attitudes and Differences in Moral Judgments , 1999, Inf. Syst. Res..

[35]  Jatinder N. D. Gupta,et al.  Improving Workers' Productivity and Reducing Internet Abuse , 2004, J. Comput. Inf. Syst..

[36]  Robert B. Mitchell,et al.  Policies Controlling Use of Computer-Based Resources in Small Businesses , 2002, J. Comput. Inf. Syst..

[37]  Richard A. Davis,et al.  Lost in Cyberspace: The Web @ Work , 2002, Cyberpsychology Behav. Soc. Netw..

[38]  Murugan Anandarajan INTERNET ABUSE IN THE WORKPLACE , 2002 .

[39]  Rupert Brown,et al.  Group Processes: Dynamics Within and Between Groups , 1988 .

[40]  Deborah A. Prentice,et al.  Pluralistic ignorance and alcohol use on campus: some consequences of misperceiving the social norm. , 1993, Journal of personality and social psychology.