Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-wzw2p Total loading time: 0 Render date: 2024-05-14T20:12:02.542Z Has data issue: false hasContentIssue false

24 - The Dark Side of Workplace Technology

Cyber-Related Counterproductive Work Behavior, Workplace Mistreatment, and Violation of Workplace Ethics

from Part III - Implications for Talent Management and Impact on Employees

Published online by Cambridge University Press:  02 April 2020

Brian J. Hoffman
Affiliation:
University of Georgia
Mindy K. Shoss
Affiliation:
University of Central Florida
Lauren A. Wegman
Affiliation:
University of Georgia
Get access

Summary

While technology is beneficial in many ways for organizations, it also allows employees a plethora of new methods to engage in workplace mistreatment and other counterproductive work behavior (CWB). Thus, technology’s role in the changing nature of work includes contributing to deleterious organizational and employee wellbeing outcomes. This chapter focuses on newer cyber-CWB and cyber occupational health psychology (C-OHP) constructs that lead to these negative workplace effects, including cyber incivility, cyberbullying, cyberloafing, and cybersecurity behaviors. The extant literature in this nascent area suggests that many of these behaviors occur on a frequent basis in today’s workplace, and we provide recommendations to lessen the occurrence of C-CWB and C-OHP behaviors. We also discuss potential drawbacks of commonly employed deterrents of these behaviors, such as social media screening and workplace monitoring.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abraham, S., & Chengalur-Smith, I. (2010). An overview of social engineering malware: Trends, tactics, and implications. Technology in Society, 32(3), 183196. https://doi.org/10.1016/j.techsoc.2010.07.001Google Scholar
Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. In Action control (pp. 1139). New York, NY: Springer.CrossRefGoogle Scholar
Alge, B. J., & Hansen, S. D. (2014). Workplace monitoring and surveillance research since “1984”: A review and agenda. In Coovert, M. D. & Thompson, L. F. (Eds.), The psychology of workplace technology (pp. 209237). New York, NY: Routledge/Taylor & Francis Group.Google Scholar
Anandarajan, M., & Simmers, C. A. (2005). Developing human capital through personal web use in the workplace: Mapping employee perceptions. Communications of the Association for Information Systems, 15(1), 776791.Google Scholar
Andersson, L. M., & Pearson, C. M. (1999). Tit for tat? The spiraling effect of incivility in the workplace. The Academy of Management Review, 24(3), 452471. doi: 10.2307/259136Google Scholar
Askew, K., Buckner, J. E., Taing, M. U., Ilie, A., Bauer, J. A., & Coovert, M. D. (2014). Explaining cyberloafing: The role of the theory of planned behavior. Computers in Human Behavior, 36, 510519. doi: 10.1016/j.chb.2014.04.006CrossRefGoogle Scholar
Axelrad, E. T., Sticha, P. J., Brdiczka, O., & Shen, J. (2013). A Bayesian network model for predicting insider threats. Paper presented at the Security and Privacy Workshops (SPW), 2013 IEEE. San Francisco, CA.CrossRefGoogle Scholar
Baruch, Y. (2005). Bullying on the net: Adverse behavior on e-mail and its impact. Information & Management, 42, 361371. doi: 10.1016/j.im.2004.02.001CrossRefGoogle Scholar
Beeler, J. (1983). Insiders seen posing greater threat to DP security than outsiders. ComputerWorld, 17(37), 1112.Google Scholar
Bennett, R. J., & Robinson, S. L. (2000). Development of a measure of workplace deviance. Journal of Applied Psychology, 85(3), 349360. doi: 10.1037//0021-9010.85.3.349Google Scholar
Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing: The role of norms and external locus of control. Computers in Human Behavior, 24(3), 10671084. doi: 10.1016/j.chb.2007.03.008Google Scholar
Challenger, Gray & Christmas (2016). Employers brace for March Madness. Retrieved from www.challengergray.com/press/press-releases/employers-brace-march-madnessGoogle Scholar
Chappell, B. (2017, February 9) Ex-NSA contractor accused of taking classified information is indicted. Retrieved September 7, 2019, from www.npr.org/sections/thetwo-way/2017/02/09/514275544/ex-nsa-contractor-indicted-for-taking-classifed-informationGoogle Scholar
Chinchani, R., Iyer, A., Ngo, H. Q., & Upadhyaya, S. (2005). Towards a theory of insider threat assessment. In 2005 International Conference on Dependable Systems and Networks, Proceedings (pp. 108117). Yokohama, Japan.Google Scholar
Colligan, M. J., & Cohen, A. (2004). The role of training in promoting workplace safety and health. In Barling, J., & Frone, M. R. (Eds.), The psychology of workplace safety (pp. 223248). Washington, DC: American Psychological Association.Google Scholar
Cortina, L. M., Kabat-Farr, D., Magley, V. J., & Nelson, K. (2017). Researching rudeness: The past, present, and future of the science of incivility. Journal of Occupational Health Psychology, 22(3), 299313. doi: 10.1037/ocp0000089Google Scholar
Cortina, L. M., & Magley, V. J. (2003). Raising voice, risking retaliation: Events following interpersonal mistreatment in the workplace. Journal of Occupational Health Psychology, 8(4), 247265. doi: 10.1037/1076-8998.8.4.247Google Scholar
Coyne, I., Farley, S., Axtell, C., Sprigg, C., Best, L., & Kwok, O. (2017). Understanding the relationship between experiencing workplace cyberbullying, employee mental strain and job satisfaction: A dysempowerment approach. International Journal of Human Resource Management, 28(7), 945972. doi: 10.1080/09585192.2015.1116454CrossRefGoogle Scholar
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90101. doi: 10.1016/j.cose.2012.09.010Google Scholar
D’Cruz, P., & Noronha, E. (2013). Navigating the extended reach: Target experiences of cyberbullying at work. Information and Organization, 23(4), 324343. doi: 10.1016/j.infoandorg.2013.09.001Google Scholar
Dalal, R. S., & Girab, A. (2016). Insider threat in cyber security: What the organizational psychology literature on counterproductive work behavior can and cannot (yet) tell us. In Zaccaro, S. J., Dalal, R. S., Tetrick, L. E., & Steinke, J. A. (Eds.), Psychosocial dynamics of cyber security: New York, NY: Routledge, 122140.Google Scholar
Determann, L. (2012). Social media privacy: A dozen myths and facts. Stanford Technology Law Review, 7, 114.Google Scholar
Einarsen, S. (2000). Harassment and bullying at work: A review of the Scandinavian approach. Aggression and Violent Behavior, 5(4), 379401. doi: 10.1016/S1359-1789(98)00043-3Google Scholar
Einarsen, S., Hoel, H., & Notelaers, G. (2009). Measuring exposure to bullying and harassment at work: Validity, factor structure and psychometric properties of the Negative Acts Questionnaire – revised. Work and Stress, 23(1), 2444. doi: 10.1080/02678370902815673Google Scholar
Farley, S., Coyne, I., Axtell, C., & Sprigg, C. (2016). Design, development and validation of a workplace cyberbullying measure, the WCM. Work and Stress, 30(4), 293317. doi: 10.1080/02678373.2016.1255998Google Scholar
Fox, S., & Spector, P. E. (2010). Instrumental counterproductive work behavior and the theory of planned behavior: A “cold cognitive” approach to complement “hot affective” theories of CWB. In Neider, L. L. & Schriesheim, C. A. (Eds.), Research in management. The “dark” side of management (pp. 93114). Charlotte, NC: IAP Information Age Publishing.Google Scholar
Giumetti, G. W., Hatfield, A. L., Scisco, J. L., Schroeder, A. N., Muth, E. R., & Kowalski, R. M. (2013). What a rude e-mail! Examining the differential effects of incivility versus support on mood, energy, engagement, and performance in an online context. Journal of Occupational Health Psychology, 18(3), 297309. doi: 10.1037/a0032851CrossRefGoogle Scholar
Giumetti, G. W., McKibben, E. S., Hatfield, A. L., Schroeder, A. N., & Kowalski, R. M. (2012). Cyber incivility @ work: The new age of interpersonal deviance. Cyberpsychology Behavior and Social Networking, 15(3), 148154. doi: 10.1089/cyber.2011.0336Google Scholar
Glassman, J., Prosch, M., & Shao, B. B. M. (2015). To monitor or not to monitor: Effectiveness of a cyberloafing countermeasure. Information & Management, 52(2), 170182. doi: 10.1016/j.im.2014.08.001Google Scholar
Greitzer, F. L., Kangas, L. J., Noonan, C. F., & Dalton, A. C. (2010). Identifying at-risk employees: A behavioral model for predicting potential insider threats. Arlington, VA: US Department of Energy,CrossRefGoogle Scholar
Gruys, M. L., & Sackett, P. R. (2003). Investigating the dimensionality of counterproductive work behavior. International Journal of Selection and Assessment, 11(1), 3042. doi: 10.1111/1468-2389.00224CrossRefGoogle Scholar
Hershcovis, M. S. (2011). “Incivility, social undermining, bullying ... oh my!”: A call to reconcile constructs within workplace aggression research. Journal of Organizational Behavior, 32(3), 499519. doi: 10.1002/job.689Google Scholar
Hobfoll, S. E. (1989). Conservation of resources: A new attempt at conceptualizing stress. The American Psychologist, 44(3), 513524. http://dx.doi.org/10.1037/0003-066X.44.3.513Google Scholar
Hoel, H., Sheehan, M. J., Cooper, C. L., & Einarsen, S. (2011). Organisational effects of workplace bullying. In Einarsen, S., Hoel, H., Zapf, D., & Cooper, C. L. (Eds.), Bullying and harassment in the workplace: Developments in theory, research, and practice (pp. 129148). Boca Raton, FL: CRC Press.Google Scholar
Jex, S. M., & Britt, T. W. (2014). Organizational psychology: A scientist-practitioner approach (3rd ed.). Hoboken, NJ: Wiley.CrossRefGoogle Scholar
Kaptein, M. (2008). Developing a measure of unethical behavior in the workplace: A stakeholder perspective. Journal of Management, 34(5), 9781008. doi: 10.1177/0149206308318614CrossRefGoogle Scholar
Karasek, R. A. Jr. (1979). Job demands, job decision latitude, and mental strain: Implications for job redesign. Administrative Science Quarterly, 24(2), 285308. doi: 10.2307/2392498Google Scholar
Koerner, B.L. (2016, Oct 23). Inside the cyberattack that shocked the US government. Retrieved September 7, 2019, from www.wired.com/2016/10/inside-cyberattack-shocked-us-government/Google Scholar
Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 10731137. doi: 10.1037/a0035618Google Scholar
Krajcevska, A., Pindek, S., & Spector, P. E. (2017). Cyberloafing as an adaptive response to boredom. Paper presented at the Southern Management Association 2017 Conference, Saint Pete Beach, FL.Google Scholar
Krischer, M. M., Penney, L. M., & Hunter, E. M. (2010). Can counterproductive work behaviors be productive? CWB as emotion-focused coping. Journal of Occupational Health Psychology, 15(2), 154166. doi: 10.1037/a0018349CrossRefGoogle ScholarPubMed
Kruger, J., Epley, N., Parker, J., & Ng, Z.-W. (2005). Egocentrism over e-mail: can we communicate as well as we think? Journal of Personality and Social Psychology, 89(6), 925936. doi: 10.1037/0022-3514.89.6.925Google Scholar
Leymann, H. (1996). The content and development of mobbing at work. European Journal of Work and Organizational Psychology, 5(2), 165184. doi: 10.1080/13594329608414853Google Scholar
Li, Q. (2006). Cyberbullying in schools: A research of gender differences. School Psychology International, 27(2), 157170. doi: 10.1177/0143034306064547CrossRefGoogle Scholar
Liberman, B., Seidman, G., McKenna, K. V. A., & Buffardi, L. E. (2011). Employee job attitudes and organizational characteristics as predictors of cyberloafing. Computers in Human Behavior, 27(6), 21922199. doi: 10.1016/j.chb.2011.06.015Google Scholar
Lim, V. K. G. (2002). The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675694. doi: 10.1002/job.161Google Scholar
Lim, V. K. G., & Chen, D. J. Q. (2012). Cyberloafing at the workplace: Gain or drain on work? Behaviour & Information Technology, 31(4), 343353. doi: 10.1080/01449290903353054Google Scholar
Lim, V. K. G., & Teo, T. S. H. (2005). Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore – An exploratory study. Information & Management, 42(8), 10811093. doi: 10.1016/j.im.2004.12.002CrossRefGoogle Scholar
Lim, V. K. G., & Teo, T. S. H. (2009). Mind your E-manners: Impact of cyber incivility on employees’ work attitude and behavior. Information & Management, 46(8), 419425. doi: 10.1016/j.im.2009.06.006CrossRefGoogle Scholar
Lyons, B. D., Hoffman, B. J., Bommer, W. H., Kennedy, C. L., & Hetrick, A. L. (2016). Off-duty deviance: Organizational policies and evidence for two prevention strategies. Journal of Applied Psychology, 101(4), 463483.Google Scholar
Magklaras, G. B., & Furnell, S. M. (2002). Insider threat prediction tool: Evaluating the probability of IT misuse. Computers & Security, 21(1), 6273.Google Scholar
Mehan, J. E. (2016). Insider threat: A guide to understanding, detecting, and defending against the enemy from within: Ely, UK: IT Governance Publishing.Google Scholar
National Labor Relations Board (2012). The NLRB and social media. Retrieved September 9, 2019, from www.nlrb.gov/rights-we-protect/rights/nlrb-and-social-mediaGoogle Scholar
Neal, A., & Griffith, M. A. (2002). Safety climate and safety behaviour. Australian Journal of Management, 27(Special Issue), 6775.CrossRefGoogle Scholar
Niedl, K. (1996). Mobbing and well-being: Economic and personnel development implications. European Journal of Work and Organizational Psychology, 5(2), 239249. doi: 10.1080/13594329608414857Google Scholar
nobullying.com. (2017). The top six unforgettable cyberbullying cases ever. Retrieved September 7, 2019, from https://nobullying.com/six-unforgettable-cyber-bullying-cases/Google Scholar
Nurse, J. R. C., Buckley, O., Legg, P. A., Goldsmith, M., Creese, S., Wright, G. R. T., & Whitty, M. (2014). Understanding insider threat: A framework for characterising attacks. Paper presented at the Security and Privacy Workshops (SPW), 2014 IEEE. San Jose, CA.Google Scholar
O’Neill, T. A., Hambley, L. A., & Bercovich, A. (2014). Prediction of cyberslacking when employees are working away from the office. Computers in Human Behavior, 34, 291298. doi: 10.1016/j.chb.2014.02.015Google Scholar
Park, Y., Fritz, C., & Jex, S. M. (2015). Daily cyber incivility and distress: The moderating roles of resources at work and home. Journal of Management. doi: 10.1177/0149206315576796Google Scholar
Pfleeger, S. L., Predd, J. B., Hunker, J., & Bulford, C. (2010). Insiders behaving badly: Addressing bad actors and their actions. IEEE Transactions on Information Forensics and Security, 5(1), 169179. doi: 10.1109/TIFS.2009.2039591Google Scholar
Porath, C., & Pearson, C. (2013). The price of incivility. Harvard Business Review, 91(1/2), 114121.Google Scholar
Privitera, C., & Campbell, M. A. (2009). Cyberbullying: The new face of workplace bullying? Cyberpsychology & Behavior, 12(4), 395400. doi: 10.1089/cpb.2009.0025Google Scholar
Purcell, K., & Rainie, L. (2014). Technology’s impact on workers. Retrieved from www.pewinternet.org/2014/12/30/technologys-impact-on-workers/Google Scholar
Restubog, S. L. D., Garcia, P., Toledano, L. S., Amarnani, R. K., Tolentino, L. R., & Tang, R. L. (2011). Yielding to (cyber)-temptation: Exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace. Journal of Research in Personality, 45(2), 247251. doi: 10.1016/j.jrp.2011.01.006Google Scholar
Rizzo, J. R., House, R. J., & Lirtzman, S. I. (1970). Role conflict and ambiguity in complex organizations. Administrative Science Quarterly, 15(2), 150163.Google Scholar
Salm, L. (2017). 70% of employers are snooping candidates’ social media profiles. Retrieved from www.careerbuilder.com/advice/social-media-survey-2017Google Scholar
Sánchez Abril, P., Levin, A., & Del Riego, A. (2012). Blurred boundaries: Social media privacy and the twenty-first-century employee. American Business Law Journal, 49(1), 63124. doi: 10.1111/j.1744-1714.2011.01127.xGoogle Scholar
Schilpzand, P., de Pater, I. E., & Erez, A. (2016). Workplace incivility: A review of the literature and agenda for future research. Journal of Organizational Behavior, 37, S57S88. doi: 10.1002/job.1976Google Scholar
Shaw, E. D. (2006). The role of behavioral research and profiling in malicious cyber insider investigations. Digital Investigation, 3(1), 2031. https://doi.org/10.1016/j.diin.2006.01.006Google Scholar
Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49(4), 376385. doi: 10.1111/j.1469-7610.2007.01846.xGoogle Scholar
Snyman, R., & Loh, J. M. I. (2015). Cyberbullying at work: The mediating role of optimism between cyberbullying and job outcomes. Computers in Human Behavior, 53, 161168. doi: 10.1016/j.chb.2015.06.050Google Scholar
Spector, P. E., & Fox, S. (2005). The stressor–emotion model of counterproductive work behavior. In Fox, S., & Spector, P. E. (Eds.), Counterproductive work behavior: Investigations of actors and targets. (pp. 151174). Washington, DC: American Psychological Association.Google Scholar
Spector, P. E., Fox, S., Penney, L. M., Bruursema, K., Goh, A., & Kessler, S. (2006). The dimensionality of counterproductivity: Are all counterproductive behaviors created equal? Journal of Vocational Behavior, 68(3), 446460. doi: 10.1016/j.jvb.2005.10.005CrossRefGoogle Scholar
Stoughton, J. W., Thompson, L. F., & Meade, A. W. (2015). Examining applicant reactions to the use of social networking websites in pre-employment screening. Journal of Business and Psychology, 30(1), 7388. doi: 10.1007/s10869-013-9333-6Google Scholar
Tepper, B. J. (2000). Consequences of abusive supervision. Academy of Management Journal, 43(2), 178190. doi: 10.2307/1556375Google Scholar
Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277287. doi: 10.1016/j.chb.2009.11.014CrossRefGoogle Scholar
Umphress, E. E., Bingham, J. B., & Mitchell, M. S. (2010). Unethical behavior in the name of the company: The moderating effect of organizational identification and positive reciprocity beliefs on unethical pro-organizational behavior. Journal of Applied Psychology, 95(4), 769780. doi: 10.1037/a0019214Google Scholar
Van den Brande, W., Baillien, E., De Witte, H., Vander Elst, T., & Godderis, L. (2016). The role of work stressors, coping strategies and coping resources in the process of workplace bullying: A systematic review and development of a comprehensive model. Aggression and Violent Behavior, 29, 6171. doi: 10.1016/j.avb.2016.06.004CrossRefGoogle Scholar
Vranjes, I., Baillien, E., Vandebosch, H., Erreygers, S., & De Witte, H. (2017). The dark side of working online: Towards a definition and an Emotion Reaction model of workplace cyberbullying. Computers in Human Behavior, 69, 324334. doi: 10.1016/j.chb.2016.12.055CrossRefGoogle Scholar
Warkentin, M., & Willison, R. (2009). Behavioral and policy issues in information systems security: The insider threat. European Journal of Information Systems, 18(2), 101105. doi: 10.1057/ejis.2009.12Google Scholar
Weiss, H. M., & Cropanzano, R. (1996). Affective events theory: A theoretical discussion of the structure, causes and consequences of affective experiences at work. Research in Organizational Behavior, 18, 174.Google Scholar
Wu, T. C., Chen, C. H., & Li, C. C. (2008). A correlation among safety leadership, safety climate and safety performance. Journal of Loss Prevention in the Process Industries, 21(3), 307318. https://doi.org/10.1016/j.jlp.2007.11.001Google Scholar
Yang, L. Q., Caughlin, D. E., Gazica, M. W., Truxillo, D. M., & Spector, P. E. (2014). Workplace mistreatment climate and potential employee and organizational outcomes: A meta-analytic review from the target’s perspective. Journal of Occupational Health Psychology, 19(3), 315335. doi: 10.1037/a0036905CrossRefGoogle ScholarPubMed
Zacharatos, A., Barling, J., & Iverson, R. D. (2005). High-performance work systems and occupational safety. Journal of Applied Psychology, 90(1), 7793. doi: 10.1037/0021-9010.90.1.77Google Scholar
Zakrzewski, C. (2016). The key to getting workers to stop wasting time online. Retrieved from www.wsj.com/articles/the-key-to-getting-workers-to-stop-wasting-time-online-1457921545Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×