The "Darth" Side of Technology Use: An Inductively Derived Typology of Cyberdeviance
dc.contributor.author | Venkatraman, Srinivasan | en |
dc.contributor.author | Cheung, Christy MK K. | en |
dc.contributor.author | Lee, Zach WY Y. | en |
dc.contributor.author | Davis, Fred D. | en |
dc.contributor.author | Venkatesh, Viswanath | en |
dc.date.accessioned | 2022-05-27T12:16:40Z | en |
dc.date.available | 2022-05-27T12:16:40Z | en |
dc.date.issued | 2018-01-01 | en |
dc.date.updated | 2022-05-09T02:44:28Z | en |
dc.description.abstract | Cyberdeviance, intentional use of information technology (IT) in the workplace that is contrary to the explicit and implicit norms of the organization and that threatens the well-being of the organization and/or its members, is an important research stream that has gained attention in academia and industry. Prior studies have treated different forms of cyberdeviance as different phenomena, resulting in a lack of a collective underlying conceptualization of cyberdeviance. This work inductively and empirically derives a typology of cyberdeviance with 439 respondents across three phases. Our results suggest that cyberdeviance varies along 3 dimensions: cyberdeviant behaviors that are minor versus serious; cyberdeviant behaviors that target individuals versus organizations; and cyberdeviant behaviors that require low versus high technical skill. We thus provide a comprehensive framework that fosters a logical linkage of various research programs related to cyberdeviance to guide future research investigation. The typology will help managers to distinguish different cyberdeviant behaviors and implement suitable interventions depending on the behavior. | en |
dc.description.version | Accepted version | en |
dc.format.extent | Pages 1060-1091 | en |
dc.format.extent | 32 page(s) | en |
dc.format.mimetype | application/pdf | en |
dc.identifier.doi | https://doi.org/10.1080/07421222.2018.1523531 | en |
dc.identifier.eissn | 1557-928X | en |
dc.identifier.issn | 0742-1222 | en |
dc.identifier.issue | 4 | en |
dc.identifier.orcid | Venkatesh, Viswanath [0000-0001-8473-376X] | en |
dc.identifier.uri | http://hdl.handle.net/10919/110358 | en |
dc.identifier.volume | 35 | en |
dc.language.iso | en | en |
dc.publisher | Routledge | en |
dc.relation.uri | http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000453555300004&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=930d57c9ac61a043676db62af60056c1 | en |
dc.rights | In Copyright | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
dc.subject | cyberdeviance | en |
dc.subject | ANTECEDENTS | en |
dc.subject | BEHAVIOR | en |
dc.subject | computer abuse | en |
dc.subject | cyberaggression | en |
dc.subject | cyberloafing | en |
dc.subject | cyberslacking | en |
dc.subject | inductive approach | en |
dc.subject | INFORMATION-SYSTEMS | en |
dc.subject | INTERNET | en |
dc.subject | IS security threats | en |
dc.subject | IS use | en |
dc.subject | multidimensional scaling | en |
dc.subject | SOFTWARE PIRACY | en |
dc.subject | systematics | en |
dc.subject | TAXONOMY | en |
dc.subject | typology | en |
dc.subject | unauthorized IT use | en |
dc.subject | UNIFIED THEORY | en |
dc.subject | WORK | en |
dc.subject | workplace deviance | en |
dc.title | The "Darth" Side of Technology Use: An Inductively Derived Typology of Cyberdeviance | en |
dc.title.serial | Journal of Management Information Systems | en |
dc.type | Article - Refereed | en |
dc.type.dcmitype | Text | en |
dc.type.other | Article | en |
dcterms.dateAccepted | 2018-01-01 | en |
pubs.organisational-group | /Virginia Tech | en |
pubs.organisational-group | /Virginia Tech/Pamplin College of Business | en |
pubs.organisational-group | /Virginia Tech/Pamplin College of Business/Business Information Technology | en |
pubs.organisational-group | /Virginia Tech/All T&R Faculty | en |
pubs.organisational-group | /Virginia Tech/Pamplin College of Business/PCOB T&R Faculty | en |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Venkatraman_etal_2018_JMIS.pdf
- Size:
- 2.24 MB
- Format:
- Adobe Portable Document Format
- Description:
- Accepted version