The “Darth” Side of Technology Use: An Inductively Derived Typology of Cyberdeviance

Srinivasan Venkatraman, Christy M K CHEUNG*, Zach W.Y. Lee, Fred D. Davis, Viswanath Venkatesh

*Corresponding author for this work

Research output: Contribution to journalJournal articlepeer-review

48 Citations (Scopus)


Cyberdeviance, intentional use of information technology (IT) in the workplace that is contrary to the explicit and implicit norms of the organization and that threatens the well-being of the organization and/or its members, is an important research stream that has gained attention in academia and industry. Prior studies have treated different forms of cyberdeviance as different phenomena, resulting in a lack of a collective underlying conceptualization of cyberdeviance. This work inductively and empirically derives a typology of cyberdeviance with 439 respondents across three phases. Our results suggest that cyberdeviance varies along 3 dimensions: cyberdeviant behaviors that are minor versus serious; cyberdeviant behaviors that target individuals versus organizations; and cyberdeviant behaviors that require low versus high technical skill. We thus provide a comprehensive framework that fosters a logical linkage of various research programs related to cyberdeviance to guide future research investigation. The typology will help managers to distinguish different cyberdeviant behaviors and implement suitable interventions depending on the behavior.

Original languageEnglish
Pages (from-to)1060-1091
Number of pages32
JournalJournal of Management Information Systems
Issue number4
Publication statusPublished - 2 Oct 2018

Scopus Subject Areas

  • Management Information Systems
  • Computer Science Applications
  • Management Science and Operations Research
  • Information Systems and Management

User-Defined Keywords

  • and phrases: cyberdeviance
  • computer abuse
  • cyberaggression
  • cyberloafing
  • cyberslacking
  • inductive approach
  • IS security threats
  • IS use
  • multidimensional scaling
  • systematics
  • typology
  • unauthorized IT use
  • workplace deviance


Dive into the research topics of 'The “Darth” Side of Technology Use: An Inductively Derived Typology of Cyberdeviance'. Together they form a unique fingerprint.

Cite this