Internet access in the workplace has become ubiquitous in many organizations. Often, employees need this access to perform their duties. However, many studies report a large percentage of employees use their work Internet access for non-work-related activities. These activities can result in reduced efficiency, increased vulnerability to cyber attack, and legal liability. Previous models of technology adoption and usage can give us some insight into this phenomenon, but they lack the ability to explain the moral decision making aspect that is involved when technology is used in a manner other than allowed by organizational policies. In this dissertation, we create and test a predictive model of the moral decision making process concerning t...
While computer technology is generally intended to increase employee productivity and effectiveness ...
The use of the Internet has grown substantially, especially since the late 1990s. Businesses are rel...
Internet usage has become a norm in most organizations where organizations have started monitoring e...
Internet access in the workplace has become ubiquitous in many organizations. Often, employees need ...
Internet access in the workplace has become ubiquitous in many organizations. Often, employees need ...
Employees use computer resources at work for personal activities and the implementation of counterme...
Information technology security policies are designed explicitly to protect IT systems. However, ove...
The present research is aimed at understanding employees’ perception towards computer use ethic at t...
With the ubiquitous deployment of Internet, workplace Internet misuse has raised increasing concern ...
Purpose – This study seeks to synthesize theories from communication, psychology and criminologyto e...
The abuse of the Internet is real problem for organizations, with real productivity ramifications an...
The focus of the current research is to identify factors which can be used in constructing a theoret...
This paper addresses the ethical issue of incumbent workers surfing the internet for personal reason...
When faced with an ambiguous ethical situation related to information technology (IT), the individua...
Objective: Computer was designed to help in human daily activities especially in replacing typewrite...
While computer technology is generally intended to increase employee productivity and effectiveness ...
The use of the Internet has grown substantially, especially since the late 1990s. Businesses are rel...
Internet usage has become a norm in most organizations where organizations have started monitoring e...
Internet access in the workplace has become ubiquitous in many organizations. Often, employees need ...
Internet access in the workplace has become ubiquitous in many organizations. Often, employees need ...
Employees use computer resources at work for personal activities and the implementation of counterme...
Information technology security policies are designed explicitly to protect IT systems. However, ove...
The present research is aimed at understanding employees’ perception towards computer use ethic at t...
With the ubiquitous deployment of Internet, workplace Internet misuse has raised increasing concern ...
Purpose – This study seeks to synthesize theories from communication, psychology and criminologyto e...
The abuse of the Internet is real problem for organizations, with real productivity ramifications an...
The focus of the current research is to identify factors which can be used in constructing a theoret...
This paper addresses the ethical issue of incumbent workers surfing the internet for personal reason...
When faced with an ambiguous ethical situation related to information technology (IT), the individua...
Objective: Computer was designed to help in human daily activities especially in replacing typewrite...
While computer technology is generally intended to increase employee productivity and effectiveness ...
The use of the Internet has grown substantially, especially since the late 1990s. Businesses are rel...
Internet usage has become a norm in most organizations where organizations have started monitoring e...