IDEAS home Printed from https://ideas.repec.org/a/kap/jbuset/v131y2015i1p209-225.html
   My bibliography  Save this article

Explaining the Misuse of Information Systems Resources in the Workplace: A Dual-Process Approach

Author

Listed:
  • Amanda Chu
  • Patrick Chau
  • Mike So

Abstract

The aim of this study is to gain an understanding of why employees misuse information systems resources (commit IS resource misuse) in the workplace. Rather than consider “intention,” as existing behavioral research commonly does, this study investigates actual behavior and employs IS resource misuse as the dependent variable. Data from a web-based survey are analyzed using the partial least squares approach. In light of the dual-process approach and the theory of planned behavior, the findings suggest that IS resource misuse may be both an intentional type of behavior and an unreasoned action. Perceived behavioral control influences employees’ IS resource misuse actions via their desires or intentions, whereas attitude toward such misuse affects these actions via employees’ desires alone. Subjective norm is found not to affect employees’ IS resource misuse via either desires or intentions. In terms of its theoretical contribution, this study considers unethical behavior in information systems by incorporating a dual-process model and the theory of planned behavior. With regard to its managerial significance, the study’s results will help managers to better understand why employees commit IS resource misuse within organizations. Copyright Springer Science+Business Media Dordrecht 2015

Suggested Citation

  • Amanda Chu & Patrick Chau & Mike So, 2015. "Explaining the Misuse of Information Systems Resources in the Workplace: A Dual-Process Approach," Journal of Business Ethics, Springer, vol. 131(1), pages 209-225, September.
  • Handle: RePEc:kap:jbuset:v:131:y:2015:i:1:p:209-225
    DOI: 10.1007/s10551-014-2250-4
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s10551-014-2250-4
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s10551-014-2250-4?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Chechen Liao & Hong-Nan Lin & Yu-Ping Liu, 2010. "Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior," Journal of Business Ethics, Springer, vol. 91(2), pages 237-252, January.
    2. Timothy Cronan & Sulaiman Al-Rafee, 2008. "Factors that Influence the Intention to Pirate Software and Media," Journal of Business Ethics, Springer, vol. 78(4), pages 527-545, April.
    3. Oliver, Richard L & Berger, Philip K, 1979. "A Path Analysis of Preventive Health Care Decision Models," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 6(2), pages 113-122, Se.
    4. Mei-Fang Chen & Ching-Ti Pan & Ming-Chuan Pan, 2009. "The Joint Moderating Impact of Moral Intensity and Moral Judgment on Consumer’s Use Intention of Pirated Software," Journal of Business Ethics, Springer, vol. 90(3), pages 361-373, December.
    5. Dubinsky, Alan J. & Loken, Barbara, 1989. "Analyzing ethical decision making in marketing," Journal of Business Research, Elsevier, vol. 19(2), pages 83-107, September.
    6. Ajzen, Icek, 1991. "The theory of planned behavior," Organizational Behavior and Human Decision Processes, Elsevier, vol. 50(2), pages 179-211, December.
    7. Cox, Dena & Cox, Anthony D & Moschis, George P, 1990. "When Consumer Behavior Goes Bad: An Investigation of Adolescent Shoplifting," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 17(2), pages 149-159, September.
    8. Detmar W. Straub, 1990. "Effective IS Security: An Empirical Study," Information Systems Research, INFORMS, vol. 1(3), pages 255-276, September.
    9. Sheppard, Blair H & Hartwick, Jon & Warshaw, Paul R, 1988. "The Theory of Reasoned Action: A Meta-analysis of Past Research with Recommendations for Modifications and Future Research," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 15(3), pages 325-343, December.
    10. Cheolho Yoon, 2011. "Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model," Journal of Business Ethics, Springer, vol. 100(3), pages 405-417, May.
    11. Naresh K. Malhotra & Sung S. Kim & Ashutosh Patil, 2006. "Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research," Management Science, INFORMS, vol. 52(12), pages 1865-1883, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Amanda M. Y. Chu & Connie K. W. Liu & Mike K. P. So & Benson S. Y. Lam, 2021. "Factors for Sustainable Online Learning in Higher Education during the COVID-19 Pandemic," Sustainability, MDPI, vol. 13(9), pages 1-16, April.
    2. Andy C. Y. Chong & Amanda M. Y. Chu & Mike K. P. So & Ray S. W. Chung, 2019. "Asking Sensitive Questions Using the Randomized Response Approach in Public Health Research: An Empirical Study on the Factors of Illegal Waste Disposal," IJERPH, MDPI, vol. 16(6), pages 1-15, March.
    3. Amanda M. Y. Chu, 2021. "Illegal Waste Dumping under a Municipal Solid Waste Charging Scheme: Application of the Neutralization Theory," Sustainability, MDPI, vol. 13(16), pages 1-10, August.
    4. Amanda M. Y. Chu & Mike K. P. So & Ray S. W. Chung, 2018. "Applying the Randomized Response Technique in Business Ethics Research: The Misuse of Information Systems Resources in the Workplace," Journal of Business Ethics, Springer, vol. 151(1), pages 195-212, August.
    5. Rao Faizan Ali & P.D.D. Dominic & Kashif Ali, 2020. "Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees," Sustainability, MDPI, vol. 12(20), pages 1-27, October.
    6. Egor Evdokimov & Dean Hanlon & Edwin KiaYang Lim, 2022. "Do Generalist CEOs Magnify Boardroom Backscratching?," Journal of Business Ethics, Springer, vol. 181(1), pages 221-247, November.
    7. Amanda M. Y. Chu & Mike K. P. So, 2020. "Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective," Sustainability, MDPI, vol. 12(8), pages 1-25, April.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Casidy, Riza & Phau, Ian & Lwin, Michael, 2016. "The role of religious leaders on digital piracy attitude and intention," Journal of Retailing and Consumer Services, Elsevier, vol. 32(C), pages 244-252.
    2. Barbara Culiberg & Domen Bajde, 2014. "Do You Need a Receipt? Exploring Consumer Participation in Consumption Tax Evasion as an Ethical Dilemma," Journal of Business Ethics, Springer, vol. 124(2), pages 271-282, October.
    3. Kos Koklic, Mateja & Kukar-Kinney, Monika & Vida, Irena, 2022. "Consumers’ de-ownership as a predictor of dark-side digital acquisition behavior: Moderating role of moral intensity and collectivism," Journal of Business Research, Elsevier, vol. 138(C), pages 108-116.
    4. Mateja Kos Koklic & Monika Kukar-Kinney & Irena Vida, 2016. "Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation," Journal of Business Ethics, Springer, vol. 134(1), pages 15-27, March.
    5. Koay, Kian Yeik & Tjiptono, Fandy & Sandhu, Manjit Singh, 2020. "Digital piracy among consumers in a developing economy: A comparison of multiple theory-based models," Journal of Retailing and Consumer Services, Elsevier, vol. 55(C).
    6. Mauricio S. Featherman & Nick Hajli, 2016. "Self-Service Technologies and e-Services Risks in Social Commerce Era," Journal of Business Ethics, Springer, vol. 139(2), pages 251-269, December.
    7. Juan Carlos Londono Roldan, 2015. "Intending to shop in single versus multi-channels: A Theory of Planned Behaviour-based explanation," Working Papers 11, Faculty of Economics and Management, Pontificia Universidad Javeriana Cali.
    8. Timothy Paul Cronan & Jeffrey K. Mullins & David E. Douglas, 2018. "Further Understanding Factors that Explain Freshman Business Students’ Academic Integrity Intention and Behavior: Plagiarism and Sharing Homework," Journal of Business Ethics, Springer, vol. 147(1), pages 197-220, January.
    9. Jonathan Dörr & Thomas Wagner & Alexander Benlian & Thomas Hess, 2013. "Music as a Service as an Alternative to Music Piracy?," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 5(6), pages 383-396, December.
    10. Suzy Jagger & Haytham Siala & Diane Sloan, 2016. "It's All in the Game: A 3D Learning Model for Business Ethics," Journal of Business Ethics, Springer, vol. 137(2), pages 383-403, August.
    11. Ciprian-Marcel Pop & Andreea–Ioana Romonti-Maniu & Monica-Maria Zaharie, 2017. "Opportunistic Consumer Behaviour in the Context of Digital Piracy," MIC 2017: Managing the Global Economy; Proceedings of the Joint International Conference, Monastier di Treviso, Italy, 24–27 May 2017,, University of Primorska Press.
    12. Hongyi Sun & Pei‐Lee Teh & Jonathan D. Linton, 2018. "Impact of environmental knowledge and product quality on student attitude toward products with recycled/remanufactured content: Implications for environmental education and green manufacturing," Business Strategy and the Environment, Wiley Blackwell, vol. 27(7), pages 935-945, November.
    13. Sheng-Hsiung Chang & Ching-Hsien Chou, 2018. "Consumer Intention toward Bringing Your Own Shopping Bags in Taiwan: An Application of Ethics Perspective and Theory of Planned Behavior," Sustainability, MDPI, vol. 10(6), pages 1-14, May.
    14. Xiao-Ling Jin & Zhongyun Zhou & Yiwei Tian, 2022. "A Configurational Analysis of the Causes of Consumer Indirect Misbehaviors in Access-Based Consumption," Journal of Business Ethics, Springer, vol. 175(1), pages 135-166, January.
    15. Catherine Viot & Caroline Bayart & Agnes Lancini, 2017. "The Consumer Intention to Adopt Smart Connected-Products: Does the Category Matter?," Post-Print hal-01991186, HAL.
    16. Paul Juinn Bing Tan, 2013. "Applying the UTAUT to Understand Factors Affecting the Use of English E-Learning Websites in Taiwan," SAGE Open, , vol. 3(4), pages 21582440135, October.
    17. Mäntymäki, Matti & Salo, Jari, 2013. "Purchasing behavior in social virtual worlds: An examination of Habbo Hotel," International Journal of Information Management, Elsevier, vol. 33(2), pages 282-290.
    18. Hsu, Dan K. & Burmeister-Lamp, Katrin & Simmons, Sharon A. & Foo, Maw-Der & Hong, Michelle C. & Pipes, Jesse D., 2019. "“I know I can, but I don't fit”: Perceived fit, self-efficacy, and entrepreneurial intention," Journal of Business Venturing, Elsevier, vol. 34(2), pages 311-326.
    19. Lin Jia & Xiuwei Song & Dianne Hall, 2022. "Influence of Habits on Mobile Payment Acceptance: An Ecosystem Perspective," Information Systems Frontiers, Springer, vol. 24(1), pages 247-266, February.
    20. Venkatesh, Viswanath & Maruping, Likoebe M. & Brown, Susan A., 2006. "Role of time in self-prediction of behavior," Organizational Behavior and Human Decision Processes, Elsevier, vol. 100(2), pages 160-176, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:jbuset:v:131:y:2015:i:1:p:209-225. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.