Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory

被引:77
作者
Cheng, Lijiao [1 ]
Li, Wenli [1 ]
Zhai, Qingguo [2 ]
Smyth, Russell [3 ]
机构
[1] Dalian Univ Technol, Fac Management & Econ, Dalian 116023, Liaoning, Peoples R China
[2] Federat Univ Australia, Fac Business, Ballarat, Vic, Australia
[3] Monash Univ, Dept Econ, Clayton, Vic, Australia
基金
中国国家自然科学基金;
关键词
Deterrence theory; Neutralization theory; Personal use of the Internet; WORKPLACE; ABUSE; SANCTIONS; IMPACT; NORMS;
D O I
10.1016/j.chb.2014.05.043
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
This paper examines the influence of neutralization techniques, perceived sanction severity, perceived detection certainty and perceived benefits of using the Internet for personal purposes on intention to use the Internet at work for personal use. To do so, we draw on a conceptual framework integrating neutralization theory and general deterrence theory. The study finds that both neutralization techniques and perceived benefits have a positive effect on personal use of the Internet. Perceived detection certainty is found to have a negative effect on personal use of the Internet, while the effect of perceived sanctions severity on personal use of the Internet is not significant. The effect of neutralization and perceived benefits are much stronger than perceived detection certainty. The findings suggest that people may think more about neutralization and perceived benefits than they do about costs, when deciding whether to use the Internet at work for personal purposes. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:220 / 228
页数:9
相关论文
共 67 条
[11]  
[Anonymous], 2011, PAC AS C INF SYST PA
[12]   CRIME AND PUNISHMENT - ECONOMIC APPROACH [J].
BECKER, GS .
JOURNAL OF POLITICAL ECONOMY, 1968, 76 (02) :169-217
[13]   Correlates of different forms of cyberloafing: The role of norms and external locus of control [J].
Blanchard, Anita L. ;
Henle, Christine A. .
COMPUTERS IN HUMAN BEHAVIOR, 2008, 24 (03) :1067-1084
[14]   SOME EXPERIMENTAL-EVIDENCE ON DIFFERENCES BETWEEN STUDENT AND PRISONER REACTIONS TO MONETARY PENALTIES AND RISK [J].
BLOCK, MK ;
GERETY, VE .
JOURNAL OF LEGAL STUDIES, 1995, 24 (01) :123-138
[15]   ECONOMIC-ANALYSIS OF CRIMES PUNISHABLE BY IMPRISONMENT [J].
BLOCK, MK ;
LIND, RC .
JOURNAL OF LEGAL STUDIES, 1975, 4 (02) :479-492
[16]   Non-work related computing (NWRC) [J].
Bock, Gee-Woo ;
Ho, Swee Ling .
COMMUNICATIONS OF THE ACM, 2009, 52 (04) :124-128
[17]  
Buzzell Timothy., 2005, Western Criminology Review, V6, P30
[18]   Employee Internet management: Current business practices and outcomes [J].
Case, CJ ;
Young, KS .
CYBERPSYCHOLOGY & BEHAVIOR, 2002, 5 (04) :355-361
[19]  
Chen JG, 2011, CHIN ECON YEARB, V5, P1
[20]   Commercial Internet filters: Perils and opportunities [J].
Chou, Chen-Huei ;
Sinha, Atish P. ;
Zhao, Huimin .
DECISION SUPPORT SYSTEMS, 2010, 48 (04) :521-530