Beruflich Dokumente
Kultur Dokumente
Using the theory of interpersonal behavior to explain non-workrelated personal use of the Internet at work
Gregory D. Moody a,*, Mikko Siponen b
a
b
A R T I C L E I N F O
A B S T R A C T
Article history:
Received 7 July 2012
Received in revised form 6 April 2013
Accepted 13 April 2013
Available online 26 April 2013
Non-work-related personal use of the Internet within organizations has received increased attention
from scholars. We increase previous understanding of this phenomenon by proposing a novel model
based on the theory of interpersonal behavior (TIB). The TIB includes previous researched constructs (i.e.,
attitudes, social inuence, and intentions) as well as emotional factors, habits, and different sources of
social inuence. Our results (N = 238) suggest that the model well predicts the use of the Internet at work
for non-work purposes. Our results shed new light on the inuence of habit, affect, role, and self-concept
in the use of the Internet.
2013 Elsevier B.V. All rights reserved.
Keywords:
Personal use of the Internet
Theory of interpersonal behavior
Computer abuse
Computer misuse
1. Introduction
Organizations have increased their use of and reliance upon
computers and networks. With the increased availability of
computers and the Internet at work, however, employees also
have increased opportunities to use these same devices for
personal reasons [6,12,30,35]. We refer to such behavior as
personal use of the Internet. The research ndings on personal
Internet use are twofold. On the one hand, scholars have noted
that when employees use the Internet and related applications
(e.g., messenger and email applications), the employees suffer
from a decrease in work output efciency [21,26,35], with a
decrease in productivity of 20% [19] or 24% [20]. This reduction in
efciency is costly for the organization in terms of reduced
employee output and the costs associated with the potential for
increased spyware, viruses, security leaks, and use of IT resources
(e.g., the use of bandwidth for Skype, video, or Internet radio)
[43,78]. Estimates have placed this loss in the billions of dollars
annually [6]. On the other hand, research shows positive effects
associated with personal Internet use, such as stress relief [7,45].
With the contradictions in the current empirical ndings, it is
important to continue studying this topic to determine which
motivations lead to personal use of the Internet. By understanding
the motivations behind the personal use of organizational
resources, companies will be able to adopt practices and
2. Literature review
This section will briey describe two main literature streams
that are relevant for this study. First, we will review the literature
related to personal use of the Internet. Second, we will explain the
theory of interpersonal behavior. For the purposes of this study,
we dene personal use of the Internet as any use of a computer that
does not involve completing work-related tasks [34]. Such use
may include, for example, web surng, chatting, or online
shopping. This denition is more expansive than those of previous
work in this area, as this denition includes the use other
applications (e.g., messengers, video conferencing, Skype, online
gaming, online communities) rather than focusing only on the use
of an Internet browser for personal use while at work
[26,35,58,61].
2.1. Use of the Internet at work for personal reasons
With the increasing presence of the Internet in the workplace,
researchers initially focused on the extent to which personal use of
the Internet was prevalent in the workplace. This type of research
typically emphasizes that businesses should be aware of employees
323
personal use of the Internet and the detrimental effects it has on the
organization [35,61]. Such studies have found that at least 20% of
employees in an organization engage in such an action and have
posited that it lowers employees performance and productivity
[19,20].
This line of research has led to the provision of advice for
reducing personal use of the Internet. Researchers and practitioners have advised organizations to adopt Internet use policies
[60] that would help employees understand what constitutes
suitable use of the Internet, thus deterring unsuitable use within
the organization. The other common types of advice of this earlier
work on personal use of the Internet prescribe the use of
monitoring tools, reports, and devices to ensure compliance with
said policies [47,61,69]. However, empirical work has found that
the use of monitoring lowers the overall job satisfaction of the
employees being monitored [69].
Building on the initial studies measuring the prevalence of
personal use of the Internet, later studies began proling personal
Internet users in an attempt to provide tools and procedures for
managers to use in identifying users. It was hoped that through
proling, management would be enabled to proactively address,
train, and punish individuals who continued to be personal users of
Table 1
Summary of research on personal use of the Internet.
Author
Year
Theoretical framework
Methodology
Findings
Cheung et al.
2000
TIB
Survey
2001
TIB
Survey
Anandarajan
2002
Simmers
2002
Articial
neural networks
approach
None
Case studies
Oravec
2002
None
Lim et al.
2002
None
Survey and
focus groups
Stanton
2002
None
Survey
2002
Theory X/Y
2003
TPB
Observation
and experiment
Survey
2004
TIB
Survey
2007
TPB
Survey
Pee et al.
2008
TIB
Survey
2008
None
Survey
2008
Coping theory
Survey
324
325
326
327
328
Composite reliability
Affect
Attitude
Behavior
Habit
Intention
Roles
Self-concept
0.962
0.910
0.952
0.959
0.970
0.911
0.895
329
Benefits
0.614***
Facilitating
Conditions
Attitude
(.393)
-0.126*
-0.017
Penalties
0.414***
Affect
Norms
0.356***
-0.023
Intention
(.401)
0.320***
0.301***
Behavior
(.867)
0.281***
0.601***
0.726***
Roles
0.229*
Social
Factors
(.466)
0.568***
Self Concept
Fig. 3. Model results (the R-squared values are in parentheses).
Habit
330
Table 3
Summary of hypotheses testing.
#
1
2
3
4
5
6
7
8
9a
9b
9c
10a
10b
Hypothesis
Benets ! attitude
Penalties ! attitude
Norms ! social factors
Roles ! social factors
Self-concept ! social factors
Attitude ! intention
Affect ! intention
Social factors ! intention
Intention ! behavior
Habit ! behavior
Intention habit ! behavior
Facilitating conditions ! behavior
Facilitating conditions
intention ! behavior
Coef.
.614
.126
.301
.229
.568
.414
.356
.320
.281
.726
.601
.017
.023
Supported?
***
*
***
*
***
***
***
***
***
***
***
ns
ns
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
No
ns not signicant.
***
p < .001.
*
p < .05.
7. Discussion
7.1. Summary
Here, we briey emphasize a number of ndings based on our
empirical study. First, our results indicate that all antecedents of
331
332
333
Appendix A. Instruments
All items are measured on a standard 7-point Likert scale
(strongly disagree to strongly agree), unless otherwise indicated.
1.
2.
3.
4.
5.
6.
My
My
My
My
My
My
familys
friends (outside of work)
co-workers
immediate supervisors
IT departments
top managements
1. I would feel bad if I was not using the Internet at work for nonwork purposes
2. Using the Internet at work for non-work purposes would
conform to my principles
3. It would be unacceptable to not use the Internet at work for nonwork purposes
334
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
I do it frequently.
I do it automatically.
I do it without having to consciously remember.
It makes me feel weird if I do not do it.
I do it without thinking.
It would require effort not to do it.
It belongs to my (daily, weekly, monthly) routine.
I start doing it before I realize Im doing it.
I would nd it hard not to do.
I have no need to think about doing it.
Its typically for me.
I have been doing it for a long time.
335
[68] J.C. Turner, Social categorization and the self-concept: a social cognitive theory of
group, Advances in Group Processes 2, 1985, pp. 77121.
[69] A. Urbaczewski, L.M. Jessup, Does electronic monitoring of employee Internet
usage work? Communications of the ACM 45, 2002, pp. 8083.
[70] P. Valois, R. Desharnais, G. Godin, A comparison of the Fishbein and Ajzen and
Triandis attiudinal model for the prediction of exercise intention and behavior,
Journal of Behavioral Medicine 11, 1988, pp. 459472.
[71] B. Verplanken, H. Aarts, Habit, attitude, and planned behaviour: is habit an empty
construct or an interesting case of goal-directed automaticity? European Review
of Social Psychology 10, 1999, pp. 101134.
[72] B. Verplanken, S. Orbell, Reections on past behavior: a self-report index of habit
strength, Journal of Applied Social Psychology 33, 2003, pp. 13131330.
[73] B. Verplanken, H. Aarts, A. van Knippenberg, Habit, information acquisition, and
the process of making travel mode choices, European Journal of Social Psychology
27, 1997, pp. 539560.
[74] J.C. Westland, Lower bounds on sample size in structural equation modeling,
Electronic Commerce Research and Applications. 9, 2010, pp. 476487.
[75] L.J. Williams, R.J. Vandenberg, J. Edwards, Structural equation modeling in management research: a guide for improved analysis, The Academy of Management
Annals 3, 2009, pp. 543605.
[76] R. Willison, M. Siponen, Overcoming the insider: reducing employee computer
crime through situational crime prevention, Communications of the ACM 52,
2009, pp. 133137.
[77] I.M.Y. Woon, L.G. Pee, Behavioral factors affecting Internet abuse in the workplace
an empirical investigation, Proceedings of HCI Research 2004, pp. 8084.
[78] R. Yasin, Web Slackers, Internet Week, 2000 (March 3).
Gregory D. Moody holds two Doctorates in Information
Systems from the University of Pittsburgh and the
University of Oulu. He is currently an Assistant
Professor and the University of Nevada, Las Vegas. He
has a Masters of Information Systems Management
from the Marriott School, Brigham Young University,
where he was also enrolled in the Information Systems
Ph.D. Preparation Program. He has published or has
articles accepted in MISQ, JMIS, JASIST, JISE, and CAIS. His
interests include IS security and privacy, e-business
(electronic markets, trust) and humancomputer interaction (Web site browsing, entertainment). He is
currently an associate editor for ISJ and THCI, and the
AIS SIGHCI Newsletter Editor.
Mikko Siponen is a Professor in the Department of
Computer Science and Information Systems at the
University of Jyvaskyla. Before that, he was Professor
and the Director of the IS Security Research Centre in
the Department of Information Processing Science at
the University of Oulu, Finland. He was also vice-head
of the Oulu IS department. He holds a Ph.D. in
philosophy from the University of Joensuu, Finland,
and a Ph.D. in Information Systems From the University
of Oulu, Finland. His research interests include IS
security, IS development, computer ethics, and philosophical aspects of IS. In addition to 65 conference
papers published by Dr. Siponen, he has more than 40
published or forthcoming papers in journals such as
MIS Quarterly, Journal of the Association for Information Systems, European Journal
of Information Systems, Information & Organization, Communications of the ACM,
IEEE Computer, IEEE IT Professional and others. He has received over 5 million EUR
of research funding from corporations and numerous funding bodies. In 2011 and in
2012, he ranked as the most productive Information System scholar in Europe by
the Association for Information Systems. He has been a senior editor for ICIS and
ECIS three times, and a guest senior editor and AE for the MISQ. His other editorial
board experiences include positions with EJIS, I&M, CAIS, Journal of IS Security.