The "Darth" Side of Technology Use: An Inductively Derived Typology of Cyberdeviance

dc.contributor.authorVenkatraman, Srinivasanen
dc.contributor.authorCheung, Christy MK K.en
dc.contributor.authorLee, Zach WY Y.en
dc.contributor.authorDavis, Fred D.en
dc.contributor.authorVenkatesh, Viswanathen
dc.date.accessioned2022-05-27T12:16:40Zen
dc.date.available2022-05-27T12:16:40Zen
dc.date.issued2018-01-01en
dc.date.updated2022-05-09T02:44:28Zen
dc.description.abstractCyberdeviance, intentional use of information technology (IT) in the workplace that is contrary to the explicit and implicit norms of the organization and that threatens the well-being of the organization and/or its members, is an important research stream that has gained attention in academia and industry. Prior studies have treated different forms of cyberdeviance as different phenomena, resulting in a lack of a collective underlying conceptualization of cyberdeviance. This work inductively and empirically derives a typology of cyberdeviance with 439 respondents across three phases. Our results suggest that cyberdeviance varies along 3 dimensions: cyberdeviant behaviors that are minor versus serious; cyberdeviant behaviors that target individuals versus organizations; and cyberdeviant behaviors that require low versus high technical skill. We thus provide a comprehensive framework that fosters a logical linkage of various research programs related to cyberdeviance to guide future research investigation. The typology will help managers to distinguish different cyberdeviant behaviors and implement suitable interventions depending on the behavior.en
dc.description.versionAccepted versionen
dc.format.extentPages 1060-1091en
dc.format.extent32 page(s)en
dc.format.mimetypeapplication/pdfen
dc.identifier.doihttps://doi.org/10.1080/07421222.2018.1523531en
dc.identifier.eissn1557-928Xen
dc.identifier.issn0742-1222en
dc.identifier.issue4en
dc.identifier.orcidVenkatesh, Viswanath [0000-0001-8473-376X]en
dc.identifier.urihttp://hdl.handle.net/10919/110358en
dc.identifier.volume35en
dc.language.isoenen
dc.publisherRoutledgeen
dc.relation.urihttp://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000453555300004&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=930d57c9ac61a043676db62af60056c1en
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectcyberdevianceen
dc.subjectANTECEDENTSen
dc.subjectBEHAVIORen
dc.subjectcomputer abuseen
dc.subjectcyberaggressionen
dc.subjectcyberloafingen
dc.subjectcyberslackingen
dc.subjectinductive approachen
dc.subjectINFORMATION-SYSTEMSen
dc.subjectINTERNETen
dc.subjectIS security threatsen
dc.subjectIS useen
dc.subjectmultidimensional scalingen
dc.subjectSOFTWARE PIRACYen
dc.subjectsystematicsen
dc.subjectTAXONOMYen
dc.subjecttypologyen
dc.subjectunauthorized IT useen
dc.subjectUNIFIED THEORYen
dc.subjectWORKen
dc.subjectworkplace devianceen
dc.titleThe "Darth" Side of Technology Use: An Inductively Derived Typology of Cyberdevianceen
dc.title.serialJournal of Management Information Systemsen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten
dc.type.otherArticleen
dcterms.dateAccepted2018-01-01en
pubs.organisational-group/Virginia Techen
pubs.organisational-group/Virginia Tech/Pamplin College of Businessen
pubs.organisational-group/Virginia Tech/Pamplin College of Business/Business Information Technologyen
pubs.organisational-group/Virginia Tech/All T&R Facultyen
pubs.organisational-group/Virginia Tech/Pamplin College of Business/PCOB T&R Facultyen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Venkatraman_etal_2018_JMIS.pdf
Size:
2.24 MB
Format:
Adobe Portable Document Format
Description:
Accepted version