, pp.16-20 http://dx.doi.org/10.14257/astl.2013.34.05 The organization and individual characteristics of having an effect on the internet abuse action: The moderating variable research of the perceived value Dae-HyunJung 1, Lee-Sang Jung 2 {San 30, Jangjeon-dong, Geumjeonggu, Busan ; 179, Sinseonno, Namgu, Busan8} lsjung@tu.ac.kr Abstract. In the information age, it is common to use the computer for company s business. Even though there are lots of investment to prevent the misuse of internet, the frequency and amount is increasing. This research that this puts the foundation on the general deterrence theory and social control theory compared the individual characteristic including ethical standards, self control, and etc. among many factors having an effect on the personal ethical decision-making besides the general principles of ethics and stipulated regulation like the severity of punishment together. Whether the perceived value did the moderating variable role to the computer abuse action or not grasped. Although this determines that abuse of Internet is unable to be actually right, it is one fact that it regards and because of being available it moves to the action that the person doesn't have the impediment in when necessary in the business. Therefore, it is necessary that the company devises the internet application in the appropriate range the stratagem, that is the partial the affirmation feeling which and it can allow officially. Keywords: internet misuse, SCT, GDT, perceived value, cyberloafing 1 Introduction As to the information oriented society, because of being the very important tool, the computer is certain but the computer abuse is caused by social problems including the computer crime, virus creation. In addition, in as effort by organization, the inappropriate plan for reaction should be sought for with the exact comprehension of situation along with the establishment of the desirable general principles of ethics reducing this ethical problem. As to the information-oriented age, in case the members use the opportunity of the internet connection as the use unrelated with the business since the company transaction is essential to utilize the computer, the possibility of abusing the computer naturally is enhanced. This study that this puts the foundation on the general deterrence theory and social control theory compares the individual characteristic including ethical standards, self control. among many factors having an effect on the personal ethical decision-making besides the general 1 Ph. D. Course, School of Business Administration, Pusan National University 2 Dept. of Business Administration, Tongmyong University, Corresponding Author ISSN: 2287-1233 ASTL Copyright 2013 SERSC
principles of ethics and stipulated regulation like the severity of punishment together. Whether the perceived value does the moderating variable role to the computer misuse action or not try to grasp. The general deterrence theory presents that it can reduce the computer abuse to the operation of the anti-virus system. I stipulated of the organized side, pointed out in the general deterrence theory and social control theory and, it has to recognize not basically preventing from the members abusing and using the computer as the use of the business in addition to as the punishment after. Rather, because of being the essential feature which the human carries, the capability which controls its own action and which it adjusts is induced to the side which can control the specific action by oneself in order to achieve its own important object. It should be more concerned about the company culture and atmospheric composition repressing the urge for the temptation ceremonially. Cyberloafing is the term which is used in illustrating the action of the staff who performs the legal work in the work and attempts the internet connection with the individual use and includes the music download, chatting room join, blog, instant messaging, online-game, on-line shopping, and etc[1]. 2 Literature Review It is necessary that the GDT(General Deterrence Theory) presents but that it can reduce the computer misuse by operating the anti-virus system, GDT depends mainly on the technical face but the factors like the person or process faces up not to consider. Straub did the research on the main policies reducing the computer abuse[2]. And it covered that it hesitates about the abuse actions since the employees recognized organization punishment. Because of preventing what the SCT(social control theory) accepts and because the deviation action is natural the social control commits the crime, when since the people adapt the people, the social control is weak or SCT is broken, the deviation is generated[3]. The that excellently many connection relation made in the interpersonal relationship, comprised the social solidarity relationship as friends, family relations, and other society is due to control the individual thing is the core of the social control theory that human doesn't commit the aviation or crime in spite of this deviation synchronism[4]. The value defined when the specific activity was the persistent belief about how many desirable to the person. Therefore, if the continued belief that it will be profitable to the extent of the persistent belief about the tangibleㆍintangible profit which it considers that it can obtain through the internet use in the personal values through the abuse of Internet of the corporate I am accompanied, the use will be firm become more[5]. 3 Research Model and Empirical Results The research model that this research proposes presented the research model like <Figure 1> in order to predict the Internet abuse action based upon the relationship with the action which it considers in the social control theory and general deterrence Copyright 2013 SERSC 17
theory. By using SPSS 17.0 in the statistical analysis, it analyze. Since exceeding the cronbach's alpha value 0.7 in which the Cronbach alpha value of all measurements Fig. 1. Research Model Is the recommendation criteria over 0.902, the reliability analysis secured the reliability. The factorial experiment used the principal factor analysis. The factor extraction categorized the question items as the similar factor based on 1 or greater eigen value and the factor occasion for factor loading extracted the factor based on 0.5 or greater. The factor rotation the result the lowest price of using the hemp cloth varimax way of the concentration convergent validity was secured over 0.723. The multiple regression analysis was performed by the causal sequence presence between independent variables and dependent variables and statistical analysis method that shows that this relationship had any kind of personality in order to verify the hypothesis set up. In the case of this research, as shown in <Table 1>, the tolerance limits value of the independent variables in the regression model is more bigger than 0.10. And it is understandable that the collinearity of VIF value doesn't become a problem since being smaller than 10. And the hypothesis verification result is like <Figure 1>. In the regression analysis, the moderate effect significance test of the perceived value used F proof method verifying the effect collective on the total category, that is the method verifying the control variable. In R square value 0.347 except the value which the analyzed result is recognized, more than 4.70 in which the interaction coefficient of regression significance of the independent variable the freedom of the molecule exceeds 120 of the standard 3.92 like the general principles of code * value (0.407), ethical standards * value (0.391), and control * value (0.416) in 95% reliability level descriptive abilities will be displayed and there will be the moderate effect. Table 1. The Result of Multiple Regression Independence Coef St Coef Statistics T sig. T B S.E. β Tol. VIF (constant) 8.117 1.228 6.612.000 Code of Ethics -.256.199 -.144-1.288.202.776 1.288 Severity of Punishment -.361.137 -.294-2.642.010.787 1.271 18 Copyright 2013 SERSC
Ethical standards.222.156.154 1.418.161.830 1.205 Self Control -.647.147 -.515-4.601.000.778 1.286 4 Conclusion and Implications The results of this study can provide a fundamental and empirical basis for building a theory of internet misuse. First, it was exposed to have the effect that the severity of punishment notes to the Internet abuse action among the severity of punishment looks into with the systematic property code of business ethics and punishment. This is considered to weaken the will that the general principles of ethics is clearly stipulated but the characteristic of the Korean company which it is unable to reflect materially to the management policy has to stick by oneself with the employee. Eventually, it is determined that effort of the etc. which brings into relief the severity of punishment, that is the method of the discipline, and which it reflects to the rating of on-the-job performance has the effect. Second, the ethical standards, that is the individual characteristic, did not note statistically. But the self control had the significance. This can prove to be one instrumentation in which the personal high morality can reduce the abuse. It may be connected according to the personal mental factor of anxiety and characteristic to the abuse of Internet although the stipulation of the punishment and severity is emphasized. The tendency to be connected to the punishment which Korean company culture on characteristic is substantial is small thing is pointed the most out as the major factor that distance seems to be a bit in the computer abuse frequency of the company precautionary measure and substantial person. Third, by using the perceived value as the moderating variable, the new theorization about the Internet abuse action was established. In case the usability which the value carries was high, the result that it strengthens the relationship between Internet misuse action was drawn. Those people might have a strong tendency to judge that it is totally fine to use the company s computer as long as it does not harm others and using during non-business hours, instead of thinking that it is inappropriate to use the company s computer not for business intention. Therefore, it is necessary that the company devises the internet application in the appropriate range, that is the partial the affirmation feeling which and it can allow officially. References 1. Lim, V. K. G.: Understanding adherence to breast self-examination in older women. Journal of Organizational Behavior, Vol. 23, 675 694 (2002) 2. Straub, D.: Effective IS Security: An Empirical Study. Information Systems Research, Vol. 1, No. 3, 255-276 (1990) Copyright 2013 SERSC 19
3. Hill, G. D. and Atkinson, M. P.: Gender, Familial control and Delinquency. Criminology, Vol, 26, No. 1, 127-149 (1988) 4. Gottfredson, M. R. and Hirschi, T.: A General Theory of Crime. Stanford, CA: Stanford University Press (1990) 5. Ehrlich, I.: Crime, Punishment, and the Market for Offenses. Journal of Economics Perspectives, Vol. 10, No. 1, 43-67 (1996) 20 Copyright 2013 SERSC