Determinants of Internet Media Abuse in the workplace using Theory of Planned Behavior
DOI:
https://doi.org/10.56225/ijfeb.v1i1.6Keywords:
internet abuse, media, communication, workplace, theory of planned behaviorAbstract
The usage of internet media is becoming important, and many people worldwide use the internet media as a communication tool. Internet is a medium of information, and communication technologies are highly used to provide a variety of unlimited resources and activities by individual users and organizations. This study is written to determine the effect of internet media abuse in the organization using the Theory of Planned Behavior. The design of this study is a quantitative approach through a survey questionnaire to 127 employees in the Majlis Daerah Marang, Terengganu, Malaysia. The result indicated that internet addiction and perceived need policy significantly correlated with a hobby. Besides that, job satisfaction and productivity have a significant negative effect on hobbies. Also, internet addiction and subjective norms have a significant positive relationship with information. The internet addiction and perceived need policy have a significant positive relationship with transactions. Then, this study also found that job satisfaction has a significant negative effect on transactions among employees in the Majlis Daerah Marang, Terengganu. In conclusion, this study has successfully identified the determinants of internet media abuse in the workplace using the Theory of Planned Behavior (TPB). This study contributes to internet media abuse and recommendation for organization administration to combat internet media abuse among the employees.
References
Abril, P. S., Levin, A., & Del Riego, A. (2012). Blurred boundaries: Social media privacy and the twenty-first-century employee. Am. Bus. LJ, 49, 63.
Ajzen, I. (2002). Constructing a TPB questionnaire: Conceptual and methodological considerations. Retrieved May 5, 2021, from http://chuang.epage.au.edu.tw/ezfiles/168/1168/attach/20/pta_41176_7688352_ 57138.pdf
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, NJ.
Azjen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.
BBC News. (2005). Korean dies after games session. Retrieved May 25, 2021, from http://news.bbc.co.uk/2/hi/technology/4137782.stm
Case, C. J., & Young, K. S. (2002). Employee Internet management: Current business practices and outcomes. CyberPsychology & Behavior, 5(4), 355–361.
Chen, J. V, Chen, C. C., & Yang, H. (2008). An empirical evaluation of key factors contributing to internet abuse in the workplace. Industrial Management & Data Systems, 108(1), 87–106.
Davis, F. D. (1986). A technology acceptance model for empirically testing new end-user information systems. Cambridge, MA.
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982–1003.
Di Marzo, G. M. (2012). Why Can’t We Be Friends-The Banning of Teacher-Student Communication Via Social Media and the Freedom of Speech. Am. UL Rev., 62, 123.
Griffiths, M. (2003). Internet abuse in the workplace: Issues and concerns for employers and employment counselors. Journal of Employment Counseling, 40(2), 87–96.
Guthrie, R., & Gray, P. (1996). Junk computing: is it bad for an organization? Information Systems Management, 13(1), 23–28.
International Council for Open and Distance Education. (2015). Internet World Stats Latest Estimations On Internet Users. Retrieved May 5, 2021, from https://www.icde.org/knowledge-hub/internet-world-stats-last-estimations-on-internet-users#:~:text=Internet World Stats latest estimations indicate 3%2C345%2C832%2C772 verified Internet users,have access to the Internet.
International Telecommunication Union. (2015). ICT Facts & Figures. Switzerland.
Ivarsson, L., & Larsson, P. (2011). Personal internet usage at work: A source of recovery. Journal of Workplace Rights, 16(1).
Janssen, H. J., Bruinsma, G. J. N., & Weerman, F. M. (2021). Can inner and outer containment counteract pulls and pushes toward delinquency? A test of Walter Reckless’s containment theory. European Journal of Criminology, 1477370820988815.
Johnston, R., & Jones, P. (2004). Service productivity: Towards understanding the relationship between operational and customer productivity. International Journal of Productivity and Performance Management.
Kirschner, P. A., & Karpinski, A. C. (2010). Facebook® and academic performance. Computers in Human Behavior, 26(6), 1237–1245.
Krejcie, R. V, & Morgan, D. W. (1970). Determining sample size for research activities. Educational and Psychological Measurement, 30(3), 607–610.
Lee, J., & Lee, Y. (2002). A holistic model of computer abuse within organizations. Information Management & Computer Security, 10(2), 57–63.
Lee, O.-K., Lim, K. H., & Wong, W. M. (2005). Why employees do non-work-related computing: an exploratory investigation through multiple theoretical perspectives. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences (pp. 185c-185c). IEEE.
Legris, P., Ingham, J., & Collerette, P. (2003). Why do people use information technology? A critical review of the technology acceptance model. Information & Management, 40(3), 191–204.
Lim, V. K. G., & Chen, D. J. Q. (2012). Cyberloafing at the workplace: gain or drain on work? Behaviour & Information Technology, 31(4), 343–353.
Malaysian National News Agency. (2016). Analisis Berita: Media Sosial Boleh Jadi Medium Cerai. Retrieved May 25, 2021, from http://www.bernama.com/bernama/v8/bm/ge/newsperspectives.php?id=1206948
Milgram, S. (1965). Some conditions of obedience and disobedience to authority. Human Relations, 18(1), 57–76.
Mohammed, A. (2006). Google refuses demand for search information. Retrieved May 25, 2021, from http://www.washingtonpost.com/wp-dyn/content/article/2006/01/19/AR2006011903331.html
Monette, M. (2012). Hooked on the Internet. Canadian Medical Association. Journal, 184(6), E284.
Muhammad, A. (2016). IGP: Fokus 2016, banteras jenayah media sosial. Retrieved May 25, 2021, from https://www.malaysiakini.com/news/326401
Park, S. Y. (2009). An analysis of the technology acceptance model in understanding university students’ behavioral intention to use e-learning. Journal of Educational Technology & Society, 12(3), 150–162.
Pitichat, T. (2013). Smartphones in the workplace: Changing organizational behavior, transforming the future. LUX: A Journal of Transdisciplinary Writing and Research from Claremont Graduate University, 3(1), 13.
Polak, M. (2003). Developmental instability: causes and consequences. Oxford University Press on Demand.
Prato, G. de, Feijoo Gonzalez, C. A., & Simon, J. P. (2014). Innovations in the video game industry: Changing global markets. Communications & Strategies, (94), 17–38.
Sekaran, U., & Bougie, R. (2016). Research methods for business: A skill building approach. John Wiley & Sons.
Sentosa, I., & Mat, N. K. N. (2012). Examining a theory of planned behavior (TPB) and technology acceptance model (TAM) in internetpurchasing using structural equation modeling. Researchers World, 3(2 Part 2), 62.
Stanton, J. M. (2002). Company profile of the frequent Internet user. Communications of the ACM, 45(1), 55–59.
Stewart, F. (2000). Internet acceptable use policies: Navigating the management, legal, and technical issues. Inf. Secur. J. A Glob. Perspect., 9(3), 1–7.
Tan, M. (2006). Officers surf Net while public waits. Retrieved May 25, 2021, from https://www.thestar.com.my/news/nation/2006/01/25/officers-surf-net-while-public-waits/
Tornatzky, L. G., Fleischer, M., & Chakrabarti, A. K. (1990). Processes of technological innovation. Lexington books.
United Nations Department of Economic and Social Affairs. (2015). List of Asian countries by Population (2015). Retrieved March 5, 2021, from https://worldpopulationreview.com/continents/asia-population
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186–204.
Venkatesh, V., Thong, J. Y. L., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Quarterly, 157–178.
Viswanath, V. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.
Vitak, J., Crouse, J., & LaRose, R. (2011). Personal Internet use at work: Understanding cyberslacking. Computers in Human Behavior, 27(5), 1751–1759.
Weber, J., & Green, S. (1991). Principled moral reasoning: Is it a viable approach to promote ethical integrity? Journal of Business Ethics, 10(5), 325–333.
Woon, I. M. Y., & Pee, L. G. (2004). Behavioral factors affecting Internet abuse in the workplace-an empirical investigation. SIGHCI 2004 Proceedings, 5.
Young, K. (2010). Policies and procedures to manage employee Internet abuse. Computers in Human Behavior, 26(6), 1467–1471.
Young, K., Pistner, M., O’mara, J., & Buchanan, J. (1999). Cyber disorders: The mental health concern for the new millennium. Cyberpsychology & Behavior, 2(5), 475–479.
Young, K S. (2004). Internet addiction: The consequences of a new clinical phenomena. Psychology and the New Media, 48(4), 402–415.
Young, Kimberly S. (1996). Psychology of computer use: XL. Addictive use of the Internet: a case that breaks the stereotype. Psychological Reports, 79(3), 899–902.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 SRN Intellectual Resources
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright @2022. This is an open-access article distributed under the terms of the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/) which permits unrestricted to copy and redistribute the material in any medium or format, remix, transform, and build upon the material for any purpose, even commercially.
This work is licensed under a Creative Commons Attribution 4.0 International License.