JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A study on the Relationship between Cyberloafing Characteristic and Cognitive Dissonance
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A study on the Relationship between Cyberloafing Characteristic and Cognitive Dissonance
Chang, Hwal-Sik; Jung, Dae-Hyun;
  PDF(new window)
 Abstract
Cyberloafing is a term used to describe the actions of employees who use their Internet access at work for personal use while pretending to do legitimate work. This research that this puts the foundation on the general deterrence theory, social control theory, and Triandis model compares the individual characteristic including the group norm, self-control, perceived value among many factors having an effect on the personal ethical decision-making besides the general principles of ethics and stipulated regulation like the severity of sanction together. It was exposed to have the effect that the severity of punishment, self control, and perceived value notes to the internet abuse action. Therefore, the education and rules of punishment which is consistent along with the theoretical thesis supporting the groping of the preparation plan that is active in the various ethic problems has to be built. It is necessary that the company devises the internet application in the appropriate range, that is the partial the affirmation feeling which and it can allow officially. According to the cognitive dissonance, since this will have to allow with the positive direction can move to the misuse action with the intention differently, it can draw a conclusion.
 Keywords
Cyberloafing;GDT;Triandis Model;Perceived Value;Theory of Cognitive Dissonance;
 Language
Korean
 Cited by
 References
1.
Ramayah, T., Chin, L. G. and Ahmad, N. H., Internet piracy among business students: An application of triandis model, International Journal of Business and Management Science, 2008, Vol. 1, No. 1, pp. 85-95.

2.
Lim, V. K. G., Understanding adherence to breast self-examination in older women, Journal of Organizational Behavior, 2002, Vol. 23, pp. 675-694. crossref(new window)

3.
Conlin, M., Workers, surf at your own risk, Business Week, 2000, pp. 105-106.

4.
Blanchard, A. L. and Henle, C. A., Correlates of different forms of cyberloafing: The role of norms and external locus of control, Computers in Human Behavior, 2008, vol. 24, No. 3, pp. 1067-1084. crossref(new window)

5.
Ehrlich, I., Crime, punishment, and the market for offenses, Journal of Economics Perspectives, 1996, vol. 10, No. 1, pp. 43-67. crossref(new window)

6.
Fishbein, M. and Ajzen, I., Belief, attitude, intention, and behavior: an introduction to theory and research, Reading, M.A. Addison-Wesley. 1975.

7.
Ajzen, I. and Beck, L. Predicting dishonest actions using the theory of planned behavior, Journal of Research in Personality, 1991, vol. 25, No. 3, pp. 258-301.

8.
Lee, S. M. and Yoo, S., An integrative model of computer abuse based on social control and general deterrence theories, Information and Management, 2004, vol. 41, No. 6, pp. 707-718. crossref(new window)

9.
Ehrlich, I., Crime, punishment, and the market for offenses, Journal of Economics Perspectives, 1996, Vol. 10, No. 1, pp. 43-67. crossref(new window)

10.
Straub, D., Effective IS security: an empirical study, Information Systems Research, 1990, vol. 1, VNo. 3, pp. 255-276. crossref(new window)

11.
Henle, C. A. and Blanchard, A. L., The interaction of work stressors and organizational sanctions on cyberloafing, Journal of Managerial Issues, 2008, vol. 20, No. 3, pp. 383-400.

12.
Liao, Q., X. Luo, A. Gurung, and Li, L., Workplace management and employee misuse: does punishment matter?, Journal of Computer Information Systems, 2009, vol. 50, No. 2, pp. 49-59.

13.
Hill, G. D. and Atkinson, M. P., Gender, familial control and delinquency, Criminology, 1988, vol. 26, No. 1, pp. 127-149. crossref(new window)

14.
Triandis, H. C., Values, attitudes, and interpersonal behaviour, in Howe, H. and M. Page,(1979), Nebraska symposium on motivation: Beliefs, attitudes and values, Lincoln, University of Nebraska Press, 1980, pp. 195-259.

15.
Thompson, R. L., Higgins, C. H. and Howell, J. M. Towards a conceptual model of utilization, MIS Quarterly, 1991, vol. 15, No. 1, pp. 125-143. crossref(new window)

16.
Stevens, B., The ethics of the US business executive, Journal of Business Ethics, 2004, vol. 54, pp. 163-171. crossref(new window)

17.
Steiner, I. D., Group process and productivity, New York: Academic Press. 1972.

18.
Longley, J. and Pruitt, D. C., Groupthink: A critique of Janis' theory, in Wheeler, L.(Eds.), Review of Personality and Social Psychology, 1990, pp. 74-93.

19.
Gottfredson, M. R, and Hirschi, T., A general theory of crime. Stanford, C.A.: Stanford University Press. 1990.

20.
Arneklev, B. J., Grasmick, H. G. Tittle, C. R. and Bursik, R. J., Low self-control and imprudent behavior, Journal of Quantitative Criminology, 1993, vol. 9, pp. 225-247. crossref(new window)

21.
Howard, J. A. and Woodside, A. G., Personal value affecting consumer psychology, in Pitts, R. E. and A. G. Woodside(Eds.), Lexington, D. C., Heath and Company. 1984.

22.
Rokeach, M., The nature of human values, New York: Free Press. 1973.

23.
Govindarajan, V. and Fisher, J., Strategy, control systems, and resource sharing: effects on business-unit performance, Academy of Management Journal, pp. 259-285.

24.
Workman, M. and Gathegi, J., Punishment and ethics deterrents: A study of insider security contravention, Journal of the American Society for Information Science and Technology, 2006, vol. 58, No. 2, pp. 212-222.

25.
Thaler, R. H., Mental accounting and consumer choice, Marketing Service, 1985, vol. 4, No. 3, pp. 199-214.