메뉴 건너뛰기




Volumn 2, Issue 2, 2011, Pages 30-44

The impact of context on employee perceptions of acceptable non-work related computing

Author keywords

Behavioral Factors; Computer Self Efficacy; End User Computing; Ethics; Organizational Procedures; Technoethics; User Characteristics; User Perceptions; Utilitarianism

Indexed keywords


EID: 84864535757     PISSN: 19473451     EISSN: 1947346X     Source Type: Journal    
DOI: 10.4018/jte.2011040103     Document Type: Article
Times cited : (6)

References (21)
  • 1
    • 34548682604 scopus 로고    scopus 로고
    • The impact of individual ethics on reactions to potentially invasive HR practices
    • doi:10.1007/s10551-006-9247-6
    • Alder, G. S., Schminke, M., & Noel, T. W. (2007). The impact of individual ethics on reactions to potentially invasive HR practices. Journal of Business Ethics, 75, 201-214. doi:10.1007/s10551-006-9247-6
    • (2007) Journal of Business Ethics , vol.75 , pp. 201-214
    • Alder, G.S.1    Schminke, M.2    Noel, T.W.3
  • 2
    • 39749132971 scopus 로고    scopus 로고
    • Correlates of different forms of cyberloafing: The role of norms and external locus of control
    • doi:10.1016/j.chb.2007.03.008
    • Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing: The role of norms and external locus of control. Computers in Human Behavior, 24, 1067-1084. doi:10.1016/j.chb.2007.03.008
    • (2008) Computers in Human Behavior , vol.24 , pp. 1067-1084
    • Blanchard, A.L.1    Henle, C.A.2
  • 3
    • 65949110358 scopus 로고    scopus 로고
    • Non-work related computing (NWRC)
    • doi:10.1145/1498765.1498799
    • Bock, G.-W., & Ho, S. L. (2009). Non-work related computing (NWRC). Communications of the ACM, 52 (4), 124-128. doi:10.1145/1498765.1498799
    • (2009) Communications of the ACM , vol.52 , Issue.4 , pp. 124-128
    • Bock, G.-W.1    Ho, S.L.2
  • 4
    • 84864559876 scopus 로고    scopus 로고
    • The role of task characteristics and organizational culture in non-work-related computing: A fit perspective
    • doi:10.1145/1795377.1795385
    • Bock, G.-W., Shin, Y., Liu, P., & Sun, H. (2010). The role of task characteristics and organizational culture in non-work-related computing: A fit perspective. ACM SIGMIS Database, 41 (2), 132-151. doi:10.1145/1795377.1795385
    • (2010) ACM SIGMIS Database , vol.41 , Issue.2 , pp. 132-151
    • Bock, G.-W.1    Shin, Y.2    Liu, P.3    Sun, H.4
  • 5
    • 0000072219 scopus 로고
    • A Janus-headed model of ethical theory: Looking two ways at business/society issues
    • Brady, E. N. (1985). A Janus-headed model of ethical theory: Looking two ways at business/society issues. Academy of Management Review, 10, 568-576.
    • (1985) Academy of Management Review , vol.10 , pp. 568-576
    • Brady, E.N.1
  • 6
    • 33750922314 scopus 로고    scopus 로고
    • Ethics in information technology and software use
    • doi:10.1023/B:BUSI.0000032658.12032.4e
    • Calluzzo, V. J., & Cante, C. J. (2004). Ethics in information technology and software use. Journal of Business Ethics, 51 (3), 301-312. doi:10.1023/B:BUSI.0000032658.12032.4e
    • (2004) Journal of Business Ethics , vol.51 , Issue.3 , pp. 301-312
    • Calluzzo, V.J.1    Cante, C.J.2
  • 7
  • 8
    • 51149115515 scopus 로고    scopus 로고
    • Disaffection or expected outcome: Understanding personal Internet use during work
    • doi:10.1111/j.1083-6101.2008.00425.x
    • Garrett, R. K., & Danziger, J. N. (2008). Disaffection or expected outcome: Understanding personal Internet use during work. Journal of Computer-Mediated Communication, 13, 937-958. doi:10.1111/j.1083-6101.2008. 00425.x
    • (2008) Journal of Computer-Mediated Communication , vol.13 , pp. 937-958
    • Garrett, R.K.1    Danziger, J.N.2
  • 9
    • 54549106841 scopus 로고    scopus 로고
    • The interaction of work stressors and organizational sanctions on cyberloafing
    • Henle, C. A., & Blanchard, A. L. (2008). The interaction of work stressors and organizational sanctions on cyberloafing. Journal of Managerial Issues, 20 (3), 383-400.
    • (2008) Journal of Managerial Issues , vol.20 , Issue.3 , pp. 383-400
    • Henle, C.A.1    Blanchard, A.L.2
  • 11
    • 0041031878 scopus 로고    scopus 로고
    • Has technology introduced new ethical problems?
    • doi:10.1023/A:1006154023743
    • Marshall, K. P. (1999). Has technology introduced new ethical problems? Journal of Business Ethics, 19 (1), 81-90. doi:10.1023/A:1006154023743
    • (1999) Journal of Business Ethics , vol.19 , Issue.1 , pp. 81-90
    • Marshall, K.P.1
  • 12
    • 33847745096 scopus 로고    scopus 로고
    • Personal use of work computers: Distraction versus destruction
    • doi:10.1089/cpb.2006.9.730
    • Mastrangelo, P. M., Everton, W., & Jolton, J. A. (2006). Personal use of work computers: Distraction versus destruction. Cyberpsychology & Behavior, 9 (6), 730-741. doi:10.1089/cpb.2006.9.730
    • (2006) Cyberpsychology & Behavior , vol.9 , Issue.6 , pp. 730-741
    • Mastrangelo, P.M.1    Everton, W.2    Jolton, J.A.3
  • 13
    • 33646908478 scopus 로고    scopus 로고
    • Why we need better ethics for emerging technologies
    • doi:10.1007/s10676-006-0008-0
    • Moor, J. H. (2005). Why we need better ethics for emerging technologies. Ethics and Information Technology, 7 (3), 111-119. doi:10.1007/s10676-006-0008-0
    • (2005) Ethics and Information Technology , vol.7 , Issue.3 , pp. 111-119
    • Moor, J.H.1
  • 15
    • 40249114674 scopus 로고    scopus 로고
    • Explaining non-work-related computing in the workplace: A comparison of alternative models
    • doi:10.1016/j.im.2008.01.004
    • Pee, L. G., Woon, I. M. Y., & Kankanhalli, A. (2008). Explaining non-work-related computing in the workplace: A comparison of alternative models. Information & Management, 45 (2), 120-130. doi:10.1016/j.im.2008.01.004
    • (2008) Information & Management , vol.45 , Issue.2 , pp. 120-130
    • Pee, L.G.1    Woon, I.M.Y.2    Kankanhalli, A.3
  • 16
    • 84986155773 scopus 로고    scopus 로고
    • Computer ethics: The in fluence of guidelines and universal moral beliefs
    • doi:10.1108/09593840210453124
    • Peterson, D. K. (2002). Computer ethics: The in fluence of guidelines and universal moral beliefs. Information Technology & People, 15 (4), 346-361. doi:10.1108/09593840210453124
    • (2002) Information Technology & People , vol.15 , Issue.4 , pp. 346-361
    • Peterson, D.K.1
  • 17
  • 18
    • 67349247866 scopus 로고    scopus 로고
    • The ethics of information transparency
    • doi:10.1007/s10676-009-9187-9
    • Turilli, M., & Floridi, L. (2010). The ethics of information transparency. Ethics and Information Technology, 11 (2), 105-112. doi:10.1007/s10676-009-9187-9
    • (2010) Ethics and Information Technology , vol.11 , Issue.2 , pp. 105-112
    • Turilli, M.1    Floridi, L.2
  • 19
    • 34548858176 scopus 로고    scopus 로고
    • Profiling cyber-slackers in the workplace: Demo graphic, cultural, and workplace factors
    • doi:10.1300/J179v06n03-04
    • Ugrin, J. C., Pearson, J. M., & Odom, M. D. (2007). Profiling cyber-slackers in the workplace: Demo graphic, cultural, and workplace factors. Journal of Internet Commerce, 6 (3), 75-89. doi:10.1300/J179v06n03-04
    • (2007) Journal of Internet Commerce , vol.6 , Issue.3 , pp. 75-89
    • Ugrin, J.C.1    Pearson, J.M.2    Odom, M.D.3
  • 20
    • 12144254071 scopus 로고    scopus 로고
    • Individual differences in the acceptability of unethical information technology practices: The case of Machiavellianism and ethical ideology
    • doi:10.1007/s10551-004-1772-6
    • Winter, S. J., Stylianou, A. C., & Giacalone, R. A. (2004). Individual differences in the acceptability of unethical information technology practices: The case of Machiavellianism and ethical ideology. Journal of Business Ethics, 54 (3), 275-296. doi:10.1007/s10551-004-1772-6
    • (2004) Journal of Business Ethics , vol.54 , Issue.3 , pp. 275-296
    • Winter, S.J.1    Stylianou, A.C.2    Giacalone, R.A.3
  • 21
    • 84864535688 scopus 로고    scopus 로고
    • Killer surf issues: Crafting an organizational model to combat employee Internet abuse
    • Young, K. (2010). Killer surf issues: Crafting an organizational model to combat employee Internet abuse. Information & Management, 34-38.
    • (2010) Information & Management , pp. 34-38
    • Young, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.