2018
DOI: 10.1080/07421222.2018.1523531
|View full text |Cite
|
Sign up to set email alerts
|

The “Darth” Side of Technology Use: An Inductively Derived Typology of Cyberdeviance

Abstract: The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes provided that:• a full bibliographic reference is made to the original source • a link is made to the metadata record in DRO • the full-text is not changed in any way The full-text must not be sold in any format or medium without the formal permission of the copyright holders.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
45
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(46 citation statements)
references
References 80 publications
1
45
0
Order By: Relevance
“…Although the digitization of the individual focuses on individuals' private use of digital technologies, part of an individual's life is still within companies, and as such, they do not only use corporate IT and fulfil corporate tasks. An increasing number of individuals bring their own IT to companies, partly to conduct corporate tasks, but also outside their corporate duties; for instance, to check private mails or surf the Internet (Venkatraman et al 2018). Individuals bringing their own IT to companies is both a challenge and an opportunity (Garba et al 2015;Weeger et al 2016).…”
Section: Digitized Individual As Employeeinteracting With Employersmentioning
confidence: 99%
See 1 more Smart Citation
“…Although the digitization of the individual focuses on individuals' private use of digital technologies, part of an individual's life is still within companies, and as such, they do not only use corporate IT and fulfil corporate tasks. An increasing number of individuals bring their own IT to companies, partly to conduct corporate tasks, but also outside their corporate duties; for instance, to check private mails or surf the Internet (Venkatraman et al 2018). Individuals bringing their own IT to companies is both a challenge and an opportunity (Garba et al 2015;Weeger et al 2016).…”
Section: Digitized Individual As Employeeinteracting With Employersmentioning
confidence: 99%
“…Such broad effects behoove researchers to not only consider the positive aspects of these technologies, but also the substantial dangers that have emerged in this context. These dangers and challenges do not stop at the individual who is directly impacted by the technologies but can extend to firms who are faced with solving two key issues: firstly, integrating individuals' IT devices in a corporate IT landscape (Venkatraman et al 2018); secondly, integrating such technologies into their products and establishing digital interaction channels to consumers (Hess et al 2016).…”
Section: Introductionmentioning
confidence: 99%
“…Various types of cyber attacks include, but are not limited to, control system attacks, phishing attacks (including the personalized spear phishing attacks), ransomware, spyware, Trojan horses, unauthorized access, viruses, and worms (Srinivas, Das, & Kumar, 2019). Cyberdeviance "[T]he intentional use of information technology (IT) in the workplace that is contrary to the explicit and implicit norms of the organization and that threatens the well-being of the organization and/or its members" (Venkatraman et al, 2018(Venkatraman et al, , p. 1061). Cyber-physical systems "[S]ystems which offer integrations of computation, networking, and physical processes" (Khaitan & McCalley, 2014, p. 350); for instance, the Internet of Things.…”
Section: Cyber Attackmentioning
confidence: 99%
“…The former two dimensions validate Bennett's (1995, 1997) original workplace deviance taxonomy that has been used extensively in organizational science research. Venkatraman et al's (2018) third dimension (low vs. high technical expertise), however, is not captured in Robinson and Bennett's (1995) original taxonomy or in other organizational science taxonomies of counterproductive or deviant work behavior. Yet, in the cybersecurity literature on insider threat, Willison and Warkentin (2013) suggest-in a similar vein to Venkatraman et al (2018)-that "[malicious] insiders are employees who have:…”
Section: Individual Differences Predictorsmentioning
confidence: 99%
“…In response to the call for more research on the dark side of technology use in the academic community (Salo et al, 2018, Turel et al, 2019, Venkatraman et al, 2018, we hope that this research will contribute to the development of the information systems (IS) literature. The newly developed and validated measurement instrument of online disinhibition can be added to the repository of rigorous research instruments.…”
Section: Introductionmentioning
confidence: 99%