Dissertations, Theses, and Capstone Projects

Date of Degree

6-2017

Document Type

Dissertation

Degree Name

Ph.D.

Program

Business

Advisor

Stephan Dilchert

Committee Members

Deniz Ones

Kristen Shockley

Elena Vidal

Karl Lang

Subject Categories

Human Resources Management | Organizational Behavior and Theory

Keywords

counterproductive work behaviors, CWB, employee deviance, cyberdeviance, cyberloafing, cyber incivility

Abstract

Although counterproductive work behaviors (CWB) have received intense attention by both researchers and practitioners over the past few decades, this body of literature has yet to address the many novel avenues for employee counterproductivity resulting from modern technologies. For example, with the current ubiquity of electronic devices and Internet access, employees can conveniently engage in personal tasks while they should be working or even damage organizational data with unprecedented ease. Beyond reputational concerns and productivity losses, firms’ reliance on electronic storage of critical information also produces novel security risks. Measures of CWB and, therefore, investigations into the construct do not yet include these contemporary behaviors, despite their notable impact on organizations. This dissertation expands the current construct conceptualization of CWB by investigating a new content domain of behaviors, cyber counterproductive work behaviors (cyber-CWB). Cyber-CWB are counterproductive behaviors that involve utilizing information communication technology. Categories of cyber-CWB include adult Internet use, cybercrime, cybergriping, cyberharassment, cyberloafing, cybersabotage, cybersullying, cybertheft, deception and data falsification, hacking, intellectual property violations, and negligent IT practices. Across three studies, I conceptualize cyber-CWB, develop and validate an effective measure to assess it, examine its nomological network, and explore the potential of multiple interventions (selection, organizational policy, and electronic monitoring) to reduce various cyber-CWB. By demonstrating the utility of these various interventions, the present findings guide organizations attempting to reduce the occurrence of these harmful and costly behaviors.

Share

COinS