Browse > Article
http://dx.doi.org/10.5762/KAIS.2016.17.6.300

The Effect of Motivation on Cyber Plagiarism in Using Social Media: The Focus of Subjective Norm's moderating Effect  

Kang, Sora (Division of Business Administration, Hoseo University)
Han, Su Jin (Division of Business Administration, Hoseo University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.17, no.6, 2016 , pp. 300-307 More about this Journal
Abstract
The development of computer-based information technology has led to the quantitative and qualitative growth of social media which have two sides; a positive one such as the generation and sharing of information and a negative one which includes cyber plagiarism and cyber bullying. This study seeks to understand which factors can lead to cyber plagiarism, which is the most prevalent form of unethical cyber behavior. We expected that the intrinsic and extrinsic motivations for using social media would have different effects on unethical cyber intention and that this relation between motivation and cyber unethical behavior would be moderated by the subjective norm. In order to obtain a better understanding of the relationships among the individual motivation, unethical cyber intention, and cyber plagiarism, information was obtained from 564 social media users. The respondents provided details of their experiences and attitudes regarding social media usage behavior and unethical cyber behavior. The results confirmed that extrinsic motivation significantly increases unethical intention and further leads to high levels of cyber plagiarism. The subjective norm plays a moderating role in the relationships between extrinsic motivation and unethical cyber intention. Based on the results, the theoretical and practical implications of the research findings are discussed, and recommendations for future research are provided.
Keywords
Social Media; Subjective Norm; Cyber Plagiarism; Intrinsic Motive; Extrinsic Motive;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Kauffman, Y., Young, M. F., "Digital plagiarism: An experimental study of the effect of instructional goals and copy-and-paste affordance," Computers & Education, 83, 44-56, 2015. DOI: http://dx.doi.org/10.1016/j.compedu.2014.12.016   DOI
2 Jordan, A.E., "College student cheating: The role of motivation, perceived norms, attitudes, and knowledge of institutional policy," Ethics & Behavior, 11(3), 233-247, 2001. DOI: http://dx.doi.org/10.1207/S15327019EB1103_3   DOI
3 Schraw, G., Olafson, L., Kuch, F., Lehman, T., Lehman, B.S., McCrudden, M.T., Interests and academic cheating. In E. Anderman, & T. Murdock (Eds.), The psychology of academic cheating (pp. 59e85). Amsterdam: Academic Press, 2007. DOI: http://dx.doi.org/10.1016/B978-012372541-7/50005-X
4 Salancik, G.R., Pfeffer, J., "An examination of need-satisfaction models of job attitudes," Administrative science quarterly, 427-456, 1977.
5 Go, S.Y., "Effects of Performance - Contingent Rewards Competition and Feedback on Intrinsic Motivation," Business Research 31(2), 509-528, 2002.
6 Fishbein, M. Ajzen, I., Belief, attitudes, intention, and behavior. An introduction to theory and research. Massachussets: Addison-Wesley, 1975.
7 Yoo, Y., Lee, K.K., "The Effects of Flow and Social Influences on Use Intention in Online Community" Korea Business Review 2(1), 1-24, 2009.
8 Amin, H., Ramayah, T., "SMS banking: Explaining the effects of attitude, social norms and perceived security and privacy," The Electronic Journal of Information Systems in Developing Countries, 41, 2010
9 Dickinger, A., Kleijnen, M. "Coupons going wireless: Determinants of consumer intentions to redeem mobile coupons," Journal of Interactive Marketing, 22(3), 23-39, 2008. DOI: http://dx.doi.org/10.1002/dir.20115   DOI
10 Nysveen, H., Pedersen, P.E., Thorbjornsen, H., "Intentions to use mobile services: Antecedents and cross-service comparisons," Journal of the academy of marketing science, 33(3), 330-346, 2005. DOI: http://dx.doi.org/10.1177/0092070305276149   DOI
11 Pookulangara, S., Koesler, K., "Cultural influence on consumers' usage of social networks and its' impact on online purchase intentions," Journal of Retailing and Consumer Services, 18(4), 348-354, 2011. DOI: http://dx.doi.org/10.1016/j.jretconser.2011.03.003   DOI
12 Choi, G., Chung, H., "Applying the technology acceptance model to social networking sites (SNS): Impact of subjective norm and social capital on the acceptance of SNS," International Journal of Human- Computer Interaction, 29(10), 619-628, 2013. DOI: http://dx.doi.org/10.1080/10447318.2012.756333   DOI
13 Salahshour, M., Dahlan, H.M., Iahad, N.A., Nilashi, M., Ibrahim, O., "Using a Multi-Criteria Decision Making Approach for Assessing the Factors Affecting Social Network Sites Intention to Use," Journal of Soft Computing and Decision Support Systems, 2(3), 20-28, 2015.
14 Chung, S.K., "Legal Recommendations for the Increased Regulation of Plagiarism" Study of science and technology law 16(1), 137-188. 2010.
15 Ananou, S.T., "Academic honesty in the digital age," (Doctoral dissertation, Indiana University of Pennsylvania). Retrieved on 18 June 2014 from http://pqdtopen.proquest.com/doc/1524251772.html?FMT=AI
16 Lickona, T. Educating for Character : How Our Schools Can Teach Respectand Resoponsibility. New York: Bantam Books, 1991.
17 Cheat, T.T., Ali, W.Z.W., Ismail, H., Persepsi Palajar Universiti Terhadap Faktor yang Mempngaruhi Plagiat melalui Penggunaan Teknologi Maklumat dan Komunikasi (TMK). Sains Humanika, 57(1), 2011.
18 Tracy, A.S., Kopp, S.W., Hardsty, D.M. "The relationship between general ethical judgment and copying behavior at work," Journal of Business Ethics, 55(1), 61-70, 2004. DOI: http://dx.doi.org/10.1007/s10551-004-1779-z   DOI
19 Amabile, T.M., Hill, K.G., Hennessey, B.A., Tighe, E.M., "The Work Preference Inventory: assessing intrinsic and extrinsic motivational orientations," Journal of personality and social psychology, 66(5), 950-961, 1994. DOI: http://dx.doi.org/10.1037/0022-3514.66.5.950   DOI
20 Venkatesh, V., Davis, F.D., "A theoretical extension of the technology acceptance model: Four longitudinal field studies", Management Science 46(2), 186-204, 2000. DOI: http://dx.doi.org/10.1287/mnsc.46.2.186.11926   DOI
21 Cheon, H.M., Yoon, J.S., "Web2.0 and UCC: Evolutionary tendency and strategic implications", The Korean Society Of Computer And Information, 2007 Summer Conference Proceeding, 15(1), 91-98, 2007.
22 Ping, R.A. "Estimating endogenous interactions." [on-line paper] http://www.wright.edu/-robert.ping/categorical.doc, 2008.
23 D.-H. Jung, C.-H. Jung, "The Effects of Perceived Social Influence and Self-Determination Affecting User's Satisfaction and Continuance Intention in Mobile Social Network Game(SNG)," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol. 6, No. 2, pp. 45-52, Feb. 2016. DOI: http://dx.doi.org/10.14257/AJMAHS.2016.21   DOI
24 S.H. Song, S.H. Hwang, Y.H. Lee, H.-K. Lee, K.-S. Han, J.-B. Kim, "The Stock Trading Model Using Social Big Data Analysis," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol. 6, No. 3, pp. 91-100, Mar. 2016. DOI: http://dx.doi.org/10.14257/AJMAHS.2016.03.32   DOI
25 Jackson, L.A., Zhao, Y., Qiu, W., Kolenic, A., Fitzgerald, H.E., Harold, R., &von Eye, A. "Morality in Cyberspace: A Comparison of Chinese and US Youth's Beliefs about Acceptable Online Behavior," In Hawaii International Conference on System Sciences, Proceedings of the 41st Annual (pp. 290-290). IEEE. January, 2008. DOI: http://dx.doi.org/10.1109/hicss.2008.324   DOI
26 Kim, K.H., Kim, Y.U., "Computer-Aided Education : Factors That Influence Digital Contents Piracy" The Journal of Korean association of computer education 16(1), 63-71. 2013.
27 Oh, E., "Exploring the Information Ethics and Plagiarism of University Students" The Journal of Thinking Development, 9(3), 163-184. 2013.
28 Jung, I.S., "Ethical judgements and behaviors: Applying a multidimensional ethics scale to measuring ICT ethics of college students," Computers and Education, 53. 940-949, 2009. DOI: http://dx.doi.org/10.1016/j.compedu.2009.05.011   DOI
29 Taherdoost, H., Sahibuddin, S., Namayandeh, M., Jalaliyoon, N., "Propose an educational plan for computer ethics and information security. Procedia-Social and Behavioral Sciences," 28, 815-819, 2011. DOI: http://dx.doi.org/10.1016/j.sbspro.2011.11.149   DOI
30 Lee, N. "Study on effect of information ethics education on the information ethics consciousness of university students" Sungkyunkwan University, College of Humanities Master's thesis. 2013.
31 Kim, M.G., Park, J.H. "Factors Influencing the level of Internet Ethics and Its Relationship with Internet Violence among Adults, journal of consumer policy studies, 33, 65-91, 2008
32 Moon, Y. "The Effect of Users' Individual characteristics and Social Influence on Cyberethics and Usage in Web 2.0," Management and Information System Reveiw, 33(2), 101-118, 2014.   DOI
33 H.K. Gee, H.K. Choi, "The Effect of Perceived Usefulness and Perceived Easy of Use on the Use of Social Networking Service (SNS) among Korean Adult Consumer," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol. 5, No. 3, pp. 11-18, June 2015. DOI: http://dx.doi.org/10.14257/AJMAHS.2015.06.06   DOI
34 I.-S. Choi, "A Longitudinal Study on Motivation Semester of K University : Focused on College of Business," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.4 No. 2, pp. 247-256, Dec. 2014. DOI: http://dx.doi.org/10.14257/AJMAHS.2014.12.24   DOI
35 J. Park, H.-J. Chang, H.-K. Lee, "The Study on Sport Motivation, Flow, and Sport Continuance of Leisure Sport Participants," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol. 4 No. 2, pp. 321-330, Dec 2014. DOI: http://dx.doi.org/10.14257/AJMAHS.2014.12.19   DOI
36 Yamamoto, J., Ananou, S. "Humanity in the Digital Age: Cognitive, Social, Emotional, and Ethical Implications," Contemporary Educational Technology, 6(1). 1-18, 2015.
37 Taherdoost, H., Sahibuddin, S., Namayandeh, M., Jalaliyoon, N., "Propose an educational plan for computer ethics and information security," Procedia- Social and Behavioral Sciences, 28, 815-819, 2011. DOI: http://dx.doi.org/10.1016/j.sbspro.2011.11.149   DOI
38 Deci, E.L., Ryan, R.M., Intrinsic motivation. John Wiley & Sons, Inc., 1975. DOI: http://dx.doi.org/10.1007/978-1-4613-4446-9
39 Lin, K.Y., Lu, H.P., "Why people use social networking sites: An empirical study integrating network externalizes and motivation theory," Computers in Human Behavior, 27(3), 1152-1161, 2011. DOI: http://dx.doi.org/10.1016/j.chb.2010.12.009   DOI
40 Amabile, T.M., Hill, K.G., Hennessey, B.A., Tighe, E.M. The Work Preference Inventory: assessing intrinsic and extrinsic motivational orientations. Journal of personality and social psychology, 66(5), 950-961, 1994. DOI: http://dx.doi.org/10.1037/0022-3514.66.5.950   DOI
41 Kim, Y.J., Kim, S.K., "Intrinsic and Extrinsic Motivations in UCC Usage and Creation - Focused on Korea and U.S.A.," The Journal of the Korea Contents Association 9(1), 223-237, 2009. DOI: http://dx.doi.org/10.5392/JKCA.2009.9.1.223   DOI
42 Zhang, S.X., Olfman, L., Ractham, P., "Designing ePortfolio 2.0: Integrating and Coordinating Web 2.0 Services with ePortfolio Systems for Enhancing Users' Learning," Journal of Information Systems Education, 18(2), 203-214, 2007.