[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Anger or fear? Effects of discrete emotions on employee’s computer-related deviant behavior

Published: 01 April 2020 Publication History

Abstract

Security research on the employees’ expressive motives in committing computer-related deviant behavior is limited. In this research, drawing on the appraisal tendency framework (ATF), we examine how employees’ emotions (anger vs. fear) and perceived sanctions influence their computer-related deviant behaviors in the workplace. Our empirical results show that employees who experienced anger were more likely to commit computer-related deviant behavior mediated by perceived informal sanctions. In contrast, employees who experienced fear were less likely to commit computer-related deviant behavior mediated by perceived formal and informal sanctions. The results provide important guidance for organizations to improve the effectiveness of deterrent controls.

References

[1]
M.J. Martinko, M.J. Gundlach, S.C. Douglas, Toward an integrative theory of counterproductive workplace behavior: a causal reasoning perspective, Int. J. Select. Assess 10 (1/2) (2002) 36–50.
[2]
J.H. Neuman, R.A. Baron, Workplace violence and workplace aggression: evidence concerning specific forms, potential causes, and preferred targets, J. Manag. 24 (3) (1998) 391–419.
[3]
D.P. Skarlicki, R. Folger, Retaliation in the workplace: the roles of distributive, procedural, and interactional justice, J. Appl. Psychol. 82 (3) (1997) 434–443.
[4]
J.J. Kim, E.H.E. Park, R.L. Baskerville, A model of emotion and computer abuse, Inf. Manag. 53 (1) (2016) 91–108.
[5]
R. Baskerville, E. Hee Park, J. Kim, An emote opportunity model of computer abuse, Inf. Technol. People. 27 (2) (2014) 155–181.
[6]
J. D’Arcy, S. Devaraj, Employee misuse of information technology resources: testing a contemporary deterrence model, Decis. Sci. 43 (6) (2012) 1091–1124.
[7]
J. D’Arcy, A. Hovav, D. Galletta, User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach, Inf. Syst. Res. 20 (1) (2009) 79–98.
[8]
B. Moon, J.D. McCluskey, C.P. McCluskey, A general theory of crime and computer crime: an empirical test, J. Crim. Justice 38 (4) (2010) 767–772.
[9]
PwC, Turnaround and Transformation in Cybersecurity: Key Fndings from the Global State of Information Security, PwC, 2016.
[10]
R.E. Crossler, A.C. Johnston, P.B. Lowry, Q. Hu, M. Warkentin, R. Baskerville, Future directions for behavioral information security research, Comput. Secur. 32 (1) (2013) 90–101.
[11]
R. Willison, M. Warkentin, Beyond deterrence: an expanded view of employee computer abuse, MIS Q. 37 (1) (2013) 1–20.
[12]
Ponemon Institute, 2016 Cost of Cyber Crime Study & the Risk of Business Innovation, Ponemon Institute, 2016.
[13]
B. Bulgurcu, H. Cavusoglu, I. Benbasat, Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness, MIS Q. 34 (3) (2010) 523–548.
[14]
P.B. Lowry, C. Posey, R.B.J. Bennett, T.L. Roberts, Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust, Inf. Syst. J. 25 (3) (2015) 193–273.
[15]
R.N. Parker, M.D. Smith, Deterrence, poverty, and type of homicide, Am. J. Sociol. 85 (3) (1979) 614–624.
[16]
S. Carmichael, A.R. Piquero, Sanctions, perceived anger, and criminal offending, J. Quant. Criminol. 20 (4) (2004) 371–393.
[17]
H.M. Weiss, R. Cropanzano, Affective events theory: a theoretical discussion of the structure, causes and consequences of affective experiences at work, Res. Organ. Behav. 18 (3) (1996) 1–74.
[18]
K. Lee, N.J. Allen, Organizational citizenship behavior and workplace deviance: the role of affect and cognitions, J. Appl. Psychol. 87 (1) (2002) 131–142.
[19]
I.J. Roseman, M.S. Spindel, P.E. Jose, Appraisals of emotion-eliciting events: testing a theory of discrete emotions, J. Pers. Soc. Psychol. 59 (5) (1990) 899–915.
[20]
G. Colombetti, From affect programs to dynamical discrete emotions, Philos. Psychol. 22 (4) (2009) 407–425.
[21]
T.A. Judge, B.A. Scott, R. Ilies, Hostility, job attitudes, and workplace deviance: test of a multilevel model, J. Appl. Psychol. 91 (1) (2006) 126–138.
[22]
S. Fox, P.E. Spector, A model of work frustration–aggression, J. Organ. Behav. 20 (6) (1999) 915–931.
[23]
A. Beaudry, A. Pinsonneault, The other side of acceptance: studying the direct and indirect effects of emotions on information technology use, MIS Q. 34 (4) (2010) 689–710.
[24]
R.S. Lazarus, Progress on a cognitive-motivational-relational theory of emotion, Am. Psychol. 46 (8) (1991) 819–834.
[25]
P. Shaver, J. Schwartz, D. Kirson, C. O’connor, Emotion knowledge: further exploration of a prototype approach, J. Pers. Soc. Psychol. 52 (6) (1987) 1061–1086.
[26]
P.B. Lowry, G.D. Moody, Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies, Inf. Syst. J. 25 (5) (2015) 433–463.
[27]
A.C. Johnston, M. Warkentin, M.T. Siponen, An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric, MIS Q. 39 (1) (2015) 113–134.
[28]
S.R. Boss, D.F. Galletta, P.B. Lowry, G.D. Moody, P. Polak, What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors, MIS Q. 39 (4) (2015) 837–864.
[29]
T. Kiefer, Feeling bad: antecedents and consequences of negative emotions in ongoing change, J. Organ. Behav. 26 (8) (2005) 875–897.
[30]
S.L. Robinson, R.J. Bennett, A typology of deviant workplace behaviors: a multidimensional scaling study, Acad. Manag. J. 38 (2) (1995) 555–572.
[31]
D.W. Straub, Effective IS security: an empirical study, Inf. Syst. Res. 1 (3) (1990) 255–276.
[32]
S.M. Lee, S.-G. Lee, S. Yoo, An integrative model of computer abuse based on social control and general deterrence theories, Inf. Manag. 41 (6) (2004) 707–718.
[33]
C. Posey, B. Bennett, T. Roberts, P.B. Lowry, When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse, J. Inf. Syst. Secur. 7 (1) (2011) 24–47.
[34]
R. Willison, M. Warkentin, A.C. Johnston, Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives, Inf. Syst. J. 28 (2) (2018) 266–293.
[35]
J.R. Ingram, S. Hinduja, Neutralizing music piracy: an empirical examination, Deviant Behav. 29 (4) (2008) 334–366.
[36]
V.K. Lim, The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice, J. Organ. Behav. 23 (5) (2002) 675–694.
[37]
M. Siponen, A. Vance, Neutralization: new insights into the problem of employee information systems security policy violations, MIS Q. 34 (3) (2010) 487–502.
[38]
M. Siponen, A. Vance, R. Willison, New insights into the problem of software piracy: the effects of neutralization, shame, and moral beliefs, Inf. Manag. 49 (7) (2012) 334–341.
[39]
L. Cheng, W. Li, Q. Zhai, R. Smyth, Understanding personal use of the Internet at work: an integrated model of neutralization techniques and general deterrence theory, Comput. Human Behav. 38 (2014) 220–228.
[40]
H. Li, R. Sarathy, J. Zhang, X. Luo, Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance, Inf. Syst. J. 24 (6) (2014) 479–502.
[41]
Y. Xue, H. Liang, L. Wu, Punishment, justice, and compliance in mandatory IT settings, Inf. Syst. Res. 22 (2) (2011) 400–414.
[42]
J. D’Arcy, A. Hovav, Deterring internal information systems misuse, Commun. ACM 50 (10) (2007) 113–117.
[43]
A. Hovav, J. D’Arcy, Applying an extended model of deterrence across cultures: an investigation of information systems misuse in the US and South Korea, Inf. Manag. 49 (2) (2012) 99–110.
[44]
S.J. Harrington, The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions, MIS Q. 20 (3) (1996) 257–278.
[45]
J. D’Arcy, A. Hovav, Does one size fit all? Examining the differential effects of IS security countermeasures, J. Bus. Ethics 89 (1) (2009) 59–71.
[46]
G. Hackbarth, V. Grover, Y.Y. Mun, Computer playfulness and anxiety: positive and negative mediators of the system experience effect on perceived ease of use, Inf. Manag. 40 (3) (2003) 221–232.
[47]
V. Venkatesh, M.G. Morris, G.B. Davis, F.D. Davis, User acceptance of information technology: toward a unified view, MIS Q. 27 (3) (2003) 425–478.
[48]
Y. Hwang, D.J. Kim, Customer self-service systems: the effects of perceived Web quality with service contents on enjoyment, anxiety, and e-trust, Decis. Support Syst. 43 (3) (2007) 746–760.
[49]
C.L. Anderson, R. Agarwal, Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions, MIS Q. 34 (3) (2010) 613–643.
[50]
T. Herath, H.R. Rao, Protection motivation and deterrence: a framework for security policy compliance in organisations, Eur. J. Inf. Syst. 18 (2) (2009) 106–125.
[51]
Y. Lee, K.R. Larsen, Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software, Eur. J. Inf. Syst. 18 (2) (2009) 177–187.
[52]
M. Siponen, M.A. Mahmood, S. Pahnila, Employees’ adherence to information security policies: an exploratory field study, Inf. Manag. 51 (2) (2014) 217–224.
[53]
D. Yin, S. Bond, H. Zhang, Anxious or angry? Effects of discrete emotions on the perceived helpfulness of online reviews, MIS Q. 38 (2) (2014) 539–560.
[54]
J.P. Dillard, L. Shen, On the nature of reactance and its role in persuasive health communication, Commun. Monogr. 72 (2) (2005) 144–168.
[55]
B.L. Quick, D.K. Kim, Examining reactance and reactance restoration with South Korean adolescents: a test of psychological reactance within a collectivist culture, Commun. Res. 36 (6) (2009) 765–782.
[56]
M. Kouchaki, S.D. Desai, Anxious, threatened, and also unethical: how anxiety makes individuals feel threatened and commit unethical acts, J. Appl. Psychol. 100 (2) (2015) 360–375.
[57]
D.S. Nagin, R. Paternoster, Enduring individual differences and rational choice theories of crime, Law Soc. Rev. 27 (3) (1993) 467–496.
[58]
M. Rogers, N.D. Smoak, J. Liu, Self-reported deviant computer behavior: a big-5, moral choice, and manipulative exploitive behavior analysis, Deviant Behav. 27 (3) (2006) 245–268.
[59]
J.S. Lerner, D. Keltner, Beyond valence: toward a model of emotion-specific influences on judgement and choice, Cogn. Emot. 14 (4) (2000) 473–493.
[60]
B.A. Mellers, A. Schwartz, K. Ho, I. Ritov, Decision affect theory: emotional reactions to the outcomes of risky options, Psychol. Sci. 8 (6) (1997) 423–429.
[61]
C.A. Smith, P.C. Ellsworth, Patterns of cognitive appraisal in emotion, J. Pers. Soc. Psychol. 48 (4) (1985) 813–838.
[62]
J.S. Lerner, D. Keltner, Fear, anger, and risk, J. Pers. Soc. Psychol. 81 (1) (2001) 146–159.
[63]
K.R. Williams, R. Hawkins, Perceptual research on general deterrence: a critical review, Law Soc. Rev. 20 (4) (1986) 545–572.
[64]
J.A. Bouffard, Examining the direct and indirect effects of fear and anger on criminal decision making among known offenders, Int. J. Offender Ther. Comp. Criminol. 59 (13) (2014) 1385–1408.
[65]
A.G. Peace, D.F. Galletta, J.Y. Thong, Software piracy in the workplace: a model and empirical test, J. Manag. Inf. Syst. 20 (1) (2003) 153–177.
[66]
R. Paternoster, S. Simpson, Sanction threats and appeals to morality: testing a rational choice model of corporate crime, Law Soc. Rev. 30 (3) (1996) 549–583.
[67]
A. Piquero, S. Tibbetts, Specifying the direct and indirect effects of low self-control and situational factors in offenders’ decision making: toward a more complete model of rational offending, Justice Q. 13 (3) (1996) 481–510.
[68]
R.C. Hollinger, J.P. Clark, Formal and informal social controls of employee deviance, Sociol. Q. 23 (3) (1982) 333–343.
[69]
R.J. Rydell, D.M. Mackie, A.T. Maitner, H.M. Claypool, M.J. Ryan, E.R. Smith, Arousal, processing, and risk taking: consequences of intergroup anger, Pers. Soc. Psychol. Bull. 34 (8) (2008) 1141–1152.
[70]
G. Loewenstein, J.S. Lerner, The role of affect in decision making, in: R. Davidson, K. Scherer, H. Goldsmith (Eds.), Handbook of Affective Science, Oxford University Press, New York, 2003, pp. 619–642.
[71]
J.B. Rodell, T.A. Judge, Can “good” stressors spark “bad” behaviors? The mediating role of emotions in links of challenge and hindrance stressors with citizenship and counterproductive behaviors, J. Appl. Psychol. 94 (6) (2009) 1438–1451.
[72]
J.M. Paterson, J. Cary, Organizational justice, change anxiety, and acceptance of downsizing: preliminary tests of an AET-based model, Motiv. Emot. 26 (1) (2002) 83–103.
[73]
D.Martin Coleman, Emotion and the ultimate attribution error, Curr. Psychol. 32 (1) (2013) 71–81.
[74]
C. Panagopoulos, Raising hope: hope inducement and voter turnout, Basic Appl. Soc. Psych. 36 (6) (2014) 494–501.
[75]
D.A. Small, J.S. Lerner, Emotional policy: personal sadness and anger shape judgments about a welfare case, Polit. Psychol. 29 (2) (2008) 149–168.
[76]
K.P. Winterich, K.L. Haws, Helpful hopefulness: the effect of future positive emotions on consumption, J. Consum. Res. 38 (3) (2011) 505–524.
[77]
J.S. Armstrong, T.S. Overton, Estimating nonresponse bias in mail surveys, J. Mark. Res. 14 (3) (1977) 396–402.
[78]
D. Watson, L.A. Clark, A. Tellegen, Development and validation of brief measures of positive and negative affect: the PANAS scales, J. Pers. Soc. Psychol. 54 (6) (1988) 1063–1070.
[79]
J.S. Lerner, R.M. Gonzalez, D.A. Small, B. Fischhoff, Effects of fear and anger on perceived risks of terrorism: a national field experiment, Psychol. Sci. 14 (2) (2003) 144–150.
[80]
P.B. Lowry, J. Gaskin, Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: when to choose it and how to use it, IEEE Trans. Prof. Commun. 57 (2) (2014) 123–146.
[81]
W.W. Chin, B.L. Marcolin, P.R. Newsted, A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study, Inf. Syst. Res. 14 (2) (2003) 189–217.
[82]
G.A. Marcoulides, C. Saunders, Editor’s comments: PLS: a silver bullet?, MIS Q. 30 (2) (2006) iii-ix.
[83]
D. Gefen, D. Straub, M.-C. Boudreau, Structural equation modeling and regression: guidelines for research practice, Commun. Assoc. Inf. Syst. 4 (1) (2000) 1–76.
[84]
D. Gefen, D. Straub, A practical guide to factorial validity using PLS-Graph: tutorial and annotated example, Commun. Assoc. Inf. Syst. 16 (1) (2005) 91–109.
[85]
R.P. Bagozzi, Y. Yi, On the evaluation of structural equation models, J. Acad. Mark. Sci. 16 (1) (1988) 74–94.
[86]
A. Schwarz, T. Rizzuto, C. Carraher-Wolverton, J.L. Roldán, R. Barrera-Barrera, Examining the impact and detection of the "Urban Legend" of common method bias, Data. Base. Adv. Inf. Syst. 48 (1) (2017) 93–119.
[87]
P.M. Podsakoff, S.B. MacKenzie, J.-Y. Lee, N.P. Podsakoff, Common method biases in behavioral research: a critical review of the literature and recommended remedies, J. Appl. Psychol. 88 (5) (2003) 879–903.
[88]
J.F. Hair, G.T.M. Hult, C.M. Ringle, M. Sarstedt, A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), 2nd ed., Sage Publications, Thousand Oaks, 2016.
[89]
J.F. Hair, C.M. Ringle, M. Sarstedt, PLS-SEM: indeed a silver bullet, J. Mark. Theory. Pract. 19 (2) (2011) 139–152.
[90]
C. Nitzl, J.L. Roldan, G. Cepeda, Mediation analysis in partial least squares path modeling: helping researchers discuss more sophisticated models, Ind. Manag. Data. Syst. 116 (9) (2016) 1849–1864.
[91]
P.B. Lowry, C. Posey, T.L. Roberts, R.J. Bennett, Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse, J. Bus. Ethics 121 (3) (2014) 385–401.

Cited By

View all
  • (2022)Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated RegretInformation Systems Frontiers10.1007/s10796-022-10278-125:2(897-916)Online publication date: 19-Apr-2022
  • (2021)Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process ModelInformation Systems Research10.1287/isre.2021.101432:3(1043-1065)Online publication date: 1-Sep-2021
  • (2021)Bring Your Own Device (BYOD) as reversed IT adoptionInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2020.10221256:COnline publication date: 1-Feb-2021
  • Show More Cited By

Index Terms

  1. Anger or fear? Effects of discrete emotions on employee’s computer-related deviant behavior
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image Information and Management
            Information and Management  Volume 57, Issue 3
            Apr 2020
            168 pages

            Publisher

            Elsevier Science Publishers B. V.

            Netherlands

            Publication History

            Published: 01 April 2020

            Author Tags

            1. Anger
            2. Fear
            3. Deterrence theory
            4. Computer-related deviant behavior

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 01 Jan 2025

            Other Metrics

            Citations

            Cited By

            View all
            • (2022)Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated RegretInformation Systems Frontiers10.1007/s10796-022-10278-125:2(897-916)Online publication date: 19-Apr-2022
            • (2021)Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process ModelInformation Systems Research10.1287/isre.2021.101432:3(1043-1065)Online publication date: 1-Sep-2021
            • (2021)Bring Your Own Device (BYOD) as reversed IT adoptionInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2020.10221256:COnline publication date: 1-Feb-2021
            • (2020)Information avoidance behavior on social network sitesInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2020.10206752:COnline publication date: 1-Jun-2020

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media