Using Computer Resources for Personal Activities at Work: Employee Perceptions of Acceptable Behavior

By Strader, Troy J.; Simpson, Lou Ann et al. | Journal of International Technology and Information Management, May 2009 | Go to article overview

Using Computer Resources for Personal Activities at Work: Employee Perceptions of Acceptable Behavior


Strader, Troy J., Simpson, Lou Ann, Clayton, Suzanne R., Journal of International Technology and Information Management


INTRODUCTION

Today's organizations utilize a broad range of computer related resources including personal computers, I/O devices, digital storage space, network bandwidth, and software to provide their employees with tools for communications and increased productivity. The distributed, ubiquitous, nature of information technology at work and at home has given individuals greater access to, and control over, these resources. But the same characteristics have also increased the potential for misuse (personal use of organizational computer resources at work, PUCRW). Forms of this misuse behavior are often referred to as either cyberslacking or cyberloafing. It is estimated that Internet misuse costs US firms tens of billions of dollars a year in lost productivity (Leger, 2008). A 2006 survey found that the average worker admits to squandering 1.86 hours per eight hour work day and the top time waster is surfing the Internet for personal reasons (Malachowski & Simonini, 2006). Including other forms of computer resource misuse would increase this monetary and time cost. In the 1980s an employee could waste time playing games on their office PC, but beginning in the 1990s Internet access compounded the problem by enabling employees to do non-work related online activities such as sending e-mail, reading news, shopping, banking, or social networking. Each of these activities potentially leads to time wasting, loss of productivity, security problems, and employer liability (Oswalt, 2003; Woolnaugh, 2008).

These problems are increasing and it is becoming more critical for organizations to understand the relevant issues, from all perspectives, to develop viable computer resource use policies for their employees. Given that many employees use the Internet and other computer resources to do their job, it is not an option to eliminate connections to the Internet from everyone's office computer. Over time the view of PUCRW behavior has begun to change from being entirely negative to one where managers and researchers have recognized that there may be benefits to permitting this behavior in certain circumstances to improve overall productivity or employee job satisfaction (Bock & Ho, 2009; Sydney Morning Herald, 2009). Ultimately, the primary issue is to understand the factors that affect this employee behavior and also their perceptions of what activities are acceptable and which are not.

In this study we address these issues from the perspective of individual employee's perceptions and ethical orientation. We focus primarily on answering the following four questions: (1) What ethical orientation do individual employees employ when determining the extent to which PUCRW is acceptable? (2) If individuals are utilitarians, which factors do they consider when determining the consequences of their actions or their co-workers actions? (3) Does being a supervisor alter an employee's perceptions of the acceptability of PUCRW? (4) And finally, do demographic factors add to our understanding of an employee's perceptions? The answers to these questions will provide input for organizations when they develop an acceptable computer resource use policy taking into account the perceptions of their employees. These are particularly important questions to answer because existing countermeasures such as appropriate use policies or filter/monitoring systems that are intended to reduce misuse do not appear to work (Lee, Lee, & King, 2007).

The paper is organized as follows. The theoretical background for this study is presented in the next section including discussion of the utilitarian ethical orientation and related study hypotheses. This is followed by a discussion of the research methodology and findings. And the final section outlines the overall conclusions along with research and managerial implications.

THEORETICAL BACKGROUND AND STUDY HYPOTHESES

Early studies of cyberslacking and cyberloafing assumed that employee behavior was entirely negative and needed to be eliminated through some means. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Using Computer Resources for Personal Activities at Work: Employee Perceptions of Acceptable Behavior
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.