Dae-HyunJung 1, Lee-Sang Jung 2. {San 30, Jangjeon-dong, Geumjeonggu, Busan ; 179, Sinseonno, Namgu, Busan8} lsjung@tu.ac.kr



Similar documents
The Application Method of CRM as Big Data: Focused on the Car Maintenance Industry

Comparative Study of Health Promoting Lifestyle Profiles and Subjective Happiness in Nursing and Non- Nursing Students

Nam-gu, Incheon, Korea 2 Division of Industrial Engineering and Management, Sungkyul University,

An Empirical Study on the Effects of Software Characteristics on Corporate Performance

A Study on Satisfaction of Movie Viewers Watching Movies on Smartphones

A study of Clinical Nurses knowledge about Critical Practice Guideline for Diabetes Mellitus 1

A Casual Structure Analysis of Smart phone Addiction: Use Motives of Smart phone Users and Psychological Characteristics

Clinical Practice Stress, Emotional Labor, and Emotional Intelligence among Nursing Students

Studying an Edutainment Applying Information Security Damage Cases for Adolescents

A Study on Color Art Therapy based Serious Games

A Study on the Psychological Exhaustion and Job Stress of Childcare Center Teachers (Centered Around the City of Ulsan)

Customer Orientation and Organizational Performance: Mediating Role of CRM

Online Marketing Strategy for Agricultural Supply Chain and Regional Economic Growth based on E-commerce Perspective

EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS

Is Test of Performance Strategies (TOPS) a Precise Tool for Iranian Adult Athletes?

Extracting Consumption Value from Big Data and its Application *

An Empirical Analysis on the Performance Factors of Software Firm

The Performance of Customer Relationship Management System:

Journal of Asian Scientific Research

A Study on Problem Solving Ability of Nursing Students

Factors of Short Term Investment Decision Making

The Effect of Perceived Value on Customer Loyalty in a Low-Priced Cosmetic Brand of South Korea: The Moderating Effect of Gender

Effects of Blended Learning on Nursing Students Learning Outcomes

MAGNT Research Report (ISSN ) Vol.2 (Special Issue) PP:

The Relationship of E-CRM, Customer Satisfaction and Customer Loyalty. The Moderating Role of Anxiety

An analysis on the effects of multicultural education class in the secondary teacher's college

An Empirical Study on the Performance of Software Company with Software Type

EFFECT OF ENVIRONMENTAL CONCERN & SOCIAL NORMS ON ENVIRONMENTAL FRIENDLY BEHAVIORAL INTENTIONS

Chapter VIII Customers Perception Regarding Health Insurance

Effect of Empowerment on Employees Performance

Design of a Web-Services Based Spam Filtering

Identification of Critical Success Factors for Successful TQM Implementation in Textile Industries, Pakistan

CONSIDERING CRITICAL FACTORS OF SUCCESS AT IMPLEMENTING CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM AND RANKING THEM

The Television Shopping Service Model Based on HD Interactive TV Platform

The Data Analysis of Primary and Secondary School Teachers Educational Technology Training Result in Baotou City of Inner Mongolia Autonomous Region

The Effect of Perceived Benefits and Obstacles on the Continuous Internet Adoption Intention in Fashion Companies +

A Comparative Analysis on the Outcomes of Synchronous and Asynchronous Online International Educational Exchange

The Influence of Trust and Commitment on Customer Relationship Management Performance in Mobile Phone Services

Research of Female Consumer Behavior in Cosmetics Market Case Study of Female Consumers in Hsinchu Area Taiwan

User Behavior Research of Information Security Technology Based on TAM

Exchange of Data for Big Data in Hybrid Cloud Environment

Model of Learning Organizational Development of Primary School Network under the Office of Basic Education Commission

A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data

CRITICAL FACTORS AFFECTING THE UTILIZATION OF CLOUD COMPUTING Alberto Daniel Salinas Montemayor 1, Jesús Fabián Lopez 2, Jesús Cruz Álvarez 3

An Empirical Study on the Influence of Perceived Credibility of Online Consumer Reviews

in nigerian companies.

Validation of the Core Self-Evaluations Scale research instrument in the conditions of Slovak Republic

Development of CEP System based on Big Data Analysis Techniques and Its Application

Education for Job Performance and Attitude of Receptionists in General Hospital Front Desk

EFFECTS OF ADVANCED MANUFACTURING TECHNOLOGY ADOPTION AND MARKET COMPETITION ON MANAGEMENT ACCOUNTING SYSTEM OF MANUFACTURING FIRMS IN MALAYSIA

Does organizational culture cheer organizational profitability? A case study on a Bangalore based Software Company

Study on the Nursing Practice Programs of the Nurses in Small to Medium Sized Hospitals

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)

DOES ONLINE TRADING AFFECT INVESTORS TRADING INTENTION? Ya-Hui Wang, National Chin-Yi University of Technology

Validity and Reliability of the Malay Version of Duke University Religion Index (DUREL-M) Among A Group of Nursing Student

Factor Analysis. Principal components factor analysis. Use of extracted factors in multivariate dependency models

UNDERSTANDING SUPPLY CHAIN MANAGEMENT AND ITS APPLICABILITY IN THE PHILIPPINES. Ma. Gloria V. Talavera*

A STUDY ON ONBOARDING PROCESS IN SIFY TECHNOLOGIES, CHENNAI

PERCEIVED ROLE OF BUSINESS SCHOOL IN DEVELOPING LEADERSHIP IN STUDENTS

A Study among Chinese Tourists in their 20s and 30s for Determining their Choice of Medical Tourism Destinations

A Design of Access Control Framework for User Identification Based on Personal Cloud

The effect of reading education program using multicultural books on elementary student s multicultural awareness

THE IMPACT OF KNOWLEDGE MANAGEMENT TECHNOLOGIES (KMTs) ON ORGANIZATIONAL LEARNING: CASE STUDY IN YAZD ELECTRICAL DISTRIBUTION COMPANY (YEDC)

INVESTIGATION OF EFFECTIVE FACTORS IN USING MOBILE ADVERTISING IN ANDIMESHK. Abstract

SCIENCE ROAD JOURNAL

The Influence of Stressful Life Events of College Students on Subjective Well-Being: The Mediation Effect of the Operational Effectiveness

SNS Information Credibility, Medical Tourism Website Credibility and Destination Image

J. Appl. Environ. Biol. Sci., 5(5) , , TextRoad Publication

DETERMINANTS OF INSTRUCTORS TO APPLY IT IN TEACHING

JOB SATISFACTION DURING RECESSION PERIOD: A STUDY ON PUBLIC & PRIVATE INSURANCE IN PUNJAB

THE IMPACT OF CORPORATE SOCIAL RESPONSIBILITY ON CONSUMER SATISFACTION (A CASE STUDY: CAR INDUSTRY IN SHIRAZ)

Critical Success Factors of the E-Recruitment System

Examining the Relationship between Emotional Intelligence and Brokerage Firms Performance in Tehran Stock Exchange

THE IMPACT OF USING ACCOUNTING INFORMATION SYSTEMS ON THE QUALITY OF FINANCIAL STATEMENTS SUBMITTED TO THE INCOME AND SALES TAX DEPARTMENT IN JORDAN

The Relationship between Total Quality Management (TQM) and Strategic Management

Developing Learning Activities using Mixed Reality Contents at Elementary Smart School

Relationship Quality as Predictor of B2B Customer Loyalty. Shaimaa S. B. Ahmed Doma

Lin Cui, Yan Chen and Yang Li Art institute, Hebei Normal University of Science and Technology, Qinhuangdao, , China

Malaysian Tourism and Hospitality Graduates Competencies: Exploring the Human Resource Managers Perceptions

EFFECTS OF JOB RELATED FACTORS AS MOTIVATORS ON PERFORMANCE AND SATISFACTION OF EMPLOYEES IN INFORMATION TECHNOLOGY FIRMS

Evaluating the Effectiveness of MBA Internship Programme An Experiential Approach

TAM Analysis of College Students Online Banking Brand Selection Factors

5.2 Customers Types for Grocery Shopping Scenario

Extraction of Risk Factors Through VOC Data Analysis for Travel Agencies

Relationship between Qualities of Work Life of Employees Crescent Province to Improve Customer Relationship Management

EXAMINING HEALTHCARE PROFESSIONALS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS USING UTAUT

AN ASSESSMENT OF SERVICE QUALTIY IN INTERNATIONAL AIRLINES

ANALYSIS OF USER ACCEPTANCE OF A NETWORK MONITORING SYSTEM WITH A FOCUS ON ICT TEACHERS

Analysis of the Relationship between Strategic Management and Human Resources Management in Informatics Services Company of Tehran Province

Analysis of Regression Based on Sampling Weights in Complex Sample Survey: Data from the Korea Youth Risk Behavior Web- Based Survey

SigmaRADIUS Leadership Effectiveness Report

The Relationship between Positive Thinking and Individual Characteristics: Development of the Soccer Positive Thinking Scale

Study of Web-based Learning and Auxiliary Training with Vocational. College Students in Applied Technology Acceptance Model

ACCELL GROUP N.V. CODE OF CONDUCT FOR SUPPLIERS

Additional sources Compilation of sources:

DEVELOPMENT OF CROSS-CULTURAL COMMUNICATION SKILLS OF ENGINEERING STUDENTS

School Library Standards. for California Public Schools, Grades Nine through Twelve

APPLIED COOPERATIVE LEARNING APPROACH EMPLOYED ON INDUSTRIAL ENGINEERING LABORATORY COURSES ABSTRACT

The Impact of Affective Human Resources Management Practices on the Financial Performance of the Saudi Banks

RELATION BETWEEN TYPUS MELANCHOLICUS AND MEDICAL ACCIDENT IN JAPANESE NURSES

Transcription:

, pp.16-20 http://dx.doi.org/10.14257/astl.2013.34.05 The organization and individual characteristics of having an effect on the internet abuse action: The moderating variable research of the perceived value Dae-HyunJung 1, Lee-Sang Jung 2 {San 30, Jangjeon-dong, Geumjeonggu, Busan ; 179, Sinseonno, Namgu, Busan8} lsjung@tu.ac.kr Abstract. In the information age, it is common to use the computer for company s business. Even though there are lots of investment to prevent the misuse of internet, the frequency and amount is increasing. This research that this puts the foundation on the general deterrence theory and social control theory compared the individual characteristic including ethical standards, self control, and etc. among many factors having an effect on the personal ethical decision-making besides the general principles of ethics and stipulated regulation like the severity of punishment together. Whether the perceived value did the moderating variable role to the computer abuse action or not grasped. Although this determines that abuse of Internet is unable to be actually right, it is one fact that it regards and because of being available it moves to the action that the person doesn't have the impediment in when necessary in the business. Therefore, it is necessary that the company devises the internet application in the appropriate range the stratagem, that is the partial the affirmation feeling which and it can allow officially. Keywords: internet misuse, SCT, GDT, perceived value, cyberloafing 1 Introduction As to the information oriented society, because of being the very important tool, the computer is certain but the computer abuse is caused by social problems including the computer crime, virus creation. In addition, in as effort by organization, the inappropriate plan for reaction should be sought for with the exact comprehension of situation along with the establishment of the desirable general principles of ethics reducing this ethical problem. As to the information-oriented age, in case the members use the opportunity of the internet connection as the use unrelated with the business since the company transaction is essential to utilize the computer, the possibility of abusing the computer naturally is enhanced. This study that this puts the foundation on the general deterrence theory and social control theory compares the individual characteristic including ethical standards, self control. among many factors having an effect on the personal ethical decision-making besides the general 1 Ph. D. Course, School of Business Administration, Pusan National University 2 Dept. of Business Administration, Tongmyong University, Corresponding Author ISSN: 2287-1233 ASTL Copyright 2013 SERSC

principles of ethics and stipulated regulation like the severity of punishment together. Whether the perceived value does the moderating variable role to the computer misuse action or not try to grasp. The general deterrence theory presents that it can reduce the computer abuse to the operation of the anti-virus system. I stipulated of the organized side, pointed out in the general deterrence theory and social control theory and, it has to recognize not basically preventing from the members abusing and using the computer as the use of the business in addition to as the punishment after. Rather, because of being the essential feature which the human carries, the capability which controls its own action and which it adjusts is induced to the side which can control the specific action by oneself in order to achieve its own important object. It should be more concerned about the company culture and atmospheric composition repressing the urge for the temptation ceremonially. Cyberloafing is the term which is used in illustrating the action of the staff who performs the legal work in the work and attempts the internet connection with the individual use and includes the music download, chatting room join, blog, instant messaging, online-game, on-line shopping, and etc[1]. 2 Literature Review It is necessary that the GDT(General Deterrence Theory) presents but that it can reduce the computer misuse by operating the anti-virus system, GDT depends mainly on the technical face but the factors like the person or process faces up not to consider. Straub did the research on the main policies reducing the computer abuse[2]. And it covered that it hesitates about the abuse actions since the employees recognized organization punishment. Because of preventing what the SCT(social control theory) accepts and because the deviation action is natural the social control commits the crime, when since the people adapt the people, the social control is weak or SCT is broken, the deviation is generated[3]. The that excellently many connection relation made in the interpersonal relationship, comprised the social solidarity relationship as friends, family relations, and other society is due to control the individual thing is the core of the social control theory that human doesn't commit the aviation or crime in spite of this deviation synchronism[4]. The value defined when the specific activity was the persistent belief about how many desirable to the person. Therefore, if the continued belief that it will be profitable to the extent of the persistent belief about the tangibleㆍintangible profit which it considers that it can obtain through the internet use in the personal values through the abuse of Internet of the corporate I am accompanied, the use will be firm become more[5]. 3 Research Model and Empirical Results The research model that this research proposes presented the research model like <Figure 1> in order to predict the Internet abuse action based upon the relationship with the action which it considers in the social control theory and general deterrence Copyright 2013 SERSC 17

theory. By using SPSS 17.0 in the statistical analysis, it analyze. Since exceeding the cronbach's alpha value 0.7 in which the Cronbach alpha value of all measurements Fig. 1. Research Model Is the recommendation criteria over 0.902, the reliability analysis secured the reliability. The factorial experiment used the principal factor analysis. The factor extraction categorized the question items as the similar factor based on 1 or greater eigen value and the factor occasion for factor loading extracted the factor based on 0.5 or greater. The factor rotation the result the lowest price of using the hemp cloth varimax way of the concentration convergent validity was secured over 0.723. The multiple regression analysis was performed by the causal sequence presence between independent variables and dependent variables and statistical analysis method that shows that this relationship had any kind of personality in order to verify the hypothesis set up. In the case of this research, as shown in <Table 1>, the tolerance limits value of the independent variables in the regression model is more bigger than 0.10. And it is understandable that the collinearity of VIF value doesn't become a problem since being smaller than 10. And the hypothesis verification result is like <Figure 1>. In the regression analysis, the moderate effect significance test of the perceived value used F proof method verifying the effect collective on the total category, that is the method verifying the control variable. In R square value 0.347 except the value which the analyzed result is recognized, more than 4.70 in which the interaction coefficient of regression significance of the independent variable the freedom of the molecule exceeds 120 of the standard 3.92 like the general principles of code * value (0.407), ethical standards * value (0.391), and control * value (0.416) in 95% reliability level descriptive abilities will be displayed and there will be the moderate effect. Table 1. The Result of Multiple Regression Independence Coef St Coef Statistics T sig. T B S.E. β Tol. VIF (constant) 8.117 1.228 6.612.000 Code of Ethics -.256.199 -.144-1.288.202.776 1.288 Severity of Punishment -.361.137 -.294-2.642.010.787 1.271 18 Copyright 2013 SERSC

Ethical standards.222.156.154 1.418.161.830 1.205 Self Control -.647.147 -.515-4.601.000.778 1.286 4 Conclusion and Implications The results of this study can provide a fundamental and empirical basis for building a theory of internet misuse. First, it was exposed to have the effect that the severity of punishment notes to the Internet abuse action among the severity of punishment looks into with the systematic property code of business ethics and punishment. This is considered to weaken the will that the general principles of ethics is clearly stipulated but the characteristic of the Korean company which it is unable to reflect materially to the management policy has to stick by oneself with the employee. Eventually, it is determined that effort of the etc. which brings into relief the severity of punishment, that is the method of the discipline, and which it reflects to the rating of on-the-job performance has the effect. Second, the ethical standards, that is the individual characteristic, did not note statistically. But the self control had the significance. This can prove to be one instrumentation in which the personal high morality can reduce the abuse. It may be connected according to the personal mental factor of anxiety and characteristic to the abuse of Internet although the stipulation of the punishment and severity is emphasized. The tendency to be connected to the punishment which Korean company culture on characteristic is substantial is small thing is pointed the most out as the major factor that distance seems to be a bit in the computer abuse frequency of the company precautionary measure and substantial person. Third, by using the perceived value as the moderating variable, the new theorization about the Internet abuse action was established. In case the usability which the value carries was high, the result that it strengthens the relationship between Internet misuse action was drawn. Those people might have a strong tendency to judge that it is totally fine to use the company s computer as long as it does not harm others and using during non-business hours, instead of thinking that it is inappropriate to use the company s computer not for business intention. Therefore, it is necessary that the company devises the internet application in the appropriate range, that is the partial the affirmation feeling which and it can allow officially. References 1. Lim, V. K. G.: Understanding adherence to breast self-examination in older women. Journal of Organizational Behavior, Vol. 23, 675 694 (2002) 2. Straub, D.: Effective IS Security: An Empirical Study. Information Systems Research, Vol. 1, No. 3, 255-276 (1990) Copyright 2013 SERSC 19

3. Hill, G. D. and Atkinson, M. P.: Gender, Familial control and Delinquency. Criminology, Vol, 26, No. 1, 127-149 (1988) 4. Gottfredson, M. R. and Hirschi, T.: A General Theory of Crime. Stanford, CA: Stanford University Press (1990) 5. Ehrlich, I.: Crime, Punishment, and the Market for Offenses. Journal of Economics Perspectives, Vol. 10, No. 1, 43-67 (1996) 20 Copyright 2013 SERSC