Browse > Article
http://dx.doi.org/10.9708/jksci.2015.20.9.073

A study on the Relationship between Cyberloafing Characteristic and Cognitive Dissonance  

Chang, Hwal-Sik (Dept. of Business Administration, Pusan National University)
Jung, Dae-Hyun (Dept. of Business Administration, Pusan National University)
Abstract
Cyberloafing is a term used to describe the actions of employees who use their Internet access at work for personal use while pretending to do legitimate work. This research that this puts the foundation on the general deterrence theory, social control theory, and Triandis model compares the individual characteristic including the group norm, self-control, perceived value among many factors having an effect on the personal ethical decision-making besides the general principles of ethics and stipulated regulation like the severity of sanction together. It was exposed to have the effect that the severity of punishment, self control, and perceived value notes to the internet abuse action. Therefore, the education and rules of punishment which is consistent along with the theoretical thesis supporting the groping of the preparation plan that is active in the various ethic problems has to be built. It is necessary that the company devises the internet application in the appropriate range, that is the partial the affirmation feeling which and it can allow officially. According to the cognitive dissonance, since this will have to allow with the positive direction can move to the misuse action with the intention differently, it can draw a conclusion.
Keywords
Cyberloafing; GDT; Triandis Model; Perceived Value; Theory of Cognitive Dissonance;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ramayah, T., Chin, L. G. and Ahmad, N. H., Internet piracy among business students: An application of triandis model, International Journal of Business and Management Science, 2008, Vol. 1, No. 1, pp. 85-95.
2 Lim, V. K. G., Understanding adherence to breast self-examination in older women, Journal of Organizational Behavior, 2002, Vol. 23, pp. 675-694.   DOI   ScienceOn
3 Conlin, M., Workers, surf at your own risk, Business Week, 2000, pp. 105-106.
4 Blanchard, A. L. and Henle, C. A., Correlates of different forms of cyberloafing: The role of norms and external locus of control, Computers in Human Behavior, 2008, vol. 24, No. 3, pp. 1067-1084.   DOI   ScienceOn
5 Ehrlich, I., Crime, punishment, and the market for offenses, Journal of Economics Perspectives, 1996, vol. 10, No. 1, pp. 43-67.   DOI   ScienceOn
6 Fishbein, M. and Ajzen, I., Belief, attitude, intention, and behavior: an introduction to theory and research, Reading, M.A. Addison-Wesley. 1975.
7 Ajzen, I. and Beck, L. Predicting dishonest actions using the theory of planned behavior, Journal of Research in Personality, 1991, vol. 25, No. 3, pp. 258-301.
8 Lee, S. M. and Yoo, S., An integrative model of computer abuse based on social control and general deterrence theories, Information and Management, 2004, vol. 41, No. 6, pp. 707-718.   DOI   ScienceOn
9 Ehrlich, I., Crime, punishment, and the market for offenses, Journal of Economics Perspectives, 1996, Vol. 10, No. 1, pp. 43-67.   DOI   ScienceOn
10 Straub, D., Effective IS security: an empirical study, Information Systems Research, 1990, vol. 1, VNo. 3, pp. 255-276.   DOI
11 Henle, C. A. and Blanchard, A. L., The interaction of work stressors and organizational sanctions on cyberloafing, Journal of Managerial Issues, 2008, vol. 20, No. 3, pp. 383-400.
12 Liao, Q., X. Luo, A. Gurung, and Li, L., Workplace management and employee misuse: does punishment matter?, Journal of Computer Information Systems, 2009, vol. 50, No. 2, pp. 49-59.
13 Hill, G. D. and Atkinson, M. P., Gender, familial control and delinquency, Criminology, 1988, vol. 26, No. 1, pp. 127-149.   DOI
14 Triandis, H. C., Values, attitudes, and interpersonal behaviour, in Howe, H. and M. Page,(1979), Nebraska symposium on motivation: Beliefs, attitudes and values, Lincoln, University of Nebraska Press, 1980, pp. 195-259.
15 Thompson, R. L., Higgins, C. H. and Howell, J. M. Towards a conceptual model of utilization, MIS Quarterly, 1991, vol. 15, No. 1, pp. 125-143.   DOI   ScienceOn
16 Stevens, B., The ethics of the US business executive, Journal of Business Ethics, 2004, vol. 54, pp. 163-171.   DOI
17 Steiner, I. D., Group process and productivity, New York: Academic Press. 1972.
18 Longley, J. and Pruitt, D. C., Groupthink: A critique of Janis' theory, in Wheeler, L.(Eds.), Review of Personality and Social Psychology, 1990, pp. 74-93.
19 Gottfredson, M. R, and Hirschi, T., A general theory of crime. Stanford, C.A.: Stanford University Press. 1990.
20 Arneklev, B. J., Grasmick, H. G. Tittle, C. R. and Bursik, R. J., Low self-control and imprudent behavior, Journal of Quantitative Criminology, 1993, vol. 9, pp. 225-247.   DOI
21 Workman, M. and Gathegi, J., Punishment and ethics deterrents: A study of insider security contravention, Journal of the American Society for Information Science and Technology, 2006, vol. 58, No. 2, pp. 212-222.   DOI
22 Howard, J. A. and Woodside, A. G., Personal value affecting consumer psychology, in Pitts, R. E. and A. G. Woodside(Eds.), Lexington, D. C., Heath and Company. 1984.
23 Rokeach, M., The nature of human values, New York: Free Press. 1973.
24 Govindarajan, V. and Fisher, J., Strategy, control systems, and resource sharing: effects on business-unit performance, Academy of Management Journal, pp. 259-285.
25 Thaler, R. H., Mental accounting and consumer choice, Marketing Service, 1985, vol. 4, No. 3, pp. 199-214.