The “Darth” Side of Technology Use: An Inductively Derived Typology of Cyberdeviance

Srinivasan Venkatraman, Christy M.K. Cheung*, Zach W.Y. Lee, Fred D. Davis, Viswanath Venkatesh

*Corresponding author for this work

    Research output: Contribution to journalJournal articlepeer-review

    51 Citations (Scopus)

    Abstract

    Cyberdeviance, intentional use of information technology (IT) in the workplace that is contrary to the explicit and implicit norms of the organization and that threatens the well-being of the organization and/or its members, is an important research stream that has gained attention in academia and industry. Prior studies have treated different forms of cyberdeviance as different phenomena, resulting in a lack of a collective underlying conceptualization of cyberdeviance. This work inductively and empirically derives a typology of cyberdeviance with 439 respondents across three phases. Our results suggest that cyberdeviance varies along 3 dimensions: cyberdeviant behaviors that are minor versus serious; cyberdeviant behaviors that target individuals versus organizations; and cyberdeviant behaviors that require low versus high technical skill. We thus provide a comprehensive framework that fosters a logical linkage of various research programs related to cyberdeviance to guide future research investigation. The typology will help managers to distinguish different cyberdeviant behaviors and implement suitable interventions depending on the behavior.

    Original languageEnglish
    Pages (from-to)1060-1091
    Number of pages32
    JournalJournal of Management Information Systems
    Volume35
    Issue number4
    DOIs
    Publication statusPublished - 2 Oct 2018

    Scopus Subject Areas

    • Management Information Systems
    • Computer Science Applications
    • Management Science and Operations Research
    • Information Systems and Management

    User-Defined Keywords

    • and phrases: cyberdeviance
    • computer abuse
    • cyberaggression
    • cyberloafing
    • cyberslacking
    • inductive approach
    • IS security threats
    • IS use
    • multidimensional scaling
    • systematics
    • typology
    • unauthorized IT use
    • workplace deviance

    Fingerprint

    Dive into the research topics of 'The “Darth” Side of Technology Use: An Inductively Derived Typology of Cyberdeviance'. Together they form a unique fingerprint.

    Cite this