進階搜尋


 
系統識別號 U0026-0812200911533450
論文名稱(中文) 工作場合員工網路濫用行為之影響因素
論文名稱(英文) Factors influencing employee Internet abuse in the workplace
校院名稱 成功大學
系所名稱(中) 交通管理學系碩博士班
系所名稱(英) Department of Transportation & Communication Management Science
學年度 94
學期 2
出版年 95
研究生(中文) 楊筱涵
研究生(英文) Hsiao-Han Yang
電子信箱 r5693129@mail.ncku.edu.tw
學號 r5693129
學位類別 碩士
語文別 中文
論文頁數 105頁
口試委員 口試委員-陳建宏
指導教授-廖俊雄
指導教授-陳正忠
口試委員-呂錦山
中文關鍵字 網路濫用  網路使用政策  網路成癮  電子監看系統  結構方程模式(SEM)  人格特質 
英文關鍵字 Internet abuse  E-monitoring  Personality  Structural equation modeling (SEM)  Internet addiction  Internet usage policy 
學科別分類
中文摘要 摘要
工作場合員工網路濫用行為之影響因素
隨著網路的興起,不論是企業或是個人對於網路的依賴日益遽增。假使員工因個人因素長時間大量使用企業所提供在於工作上的網路資訊系統,而導致企業生產力的損失,甚至會為企業帶來負面的影響。

本研究主要目的在於瞭解目前企業員工在工作場合網路濫用情況,透過文獻探討歸納影響網路濫用之相關因素。本研究以結構方程模式分析工作場合員工網路濫用之影響關係,並且以南部科學園區內員工作為實證對象。實證結果顯示,「外控傾向」以及「低自尊」的人格特質者對於「網路成癮」有正向影響關係,「網路成癮」者對於「網路濫用」有正向的關係,而「使用與滿足」對「網路成癮」則無顯著的關係,「網路使用政策」以及「電子監看系統」對於「網路濫用」亦無顯著的關係。就實證分析結果提供業界參考。

英文摘要 ABSTRACT
Factors Influencing Employee Internet Abuse
in the Workplace

The Internet plays an important role, which supports and sustains organizational business practices. As more and more individuals and organizations have Internet access, Internet is indispensable in nowadays business. There are many employees spend too much time on the Internet doing non-work-related activities during work hours, which can be unproductive, led to legal liabilities, and unnecessary losses for organization.
This research aims to discuss the implication of Internet abuse and examine the relationship between Internet abuse and other factors influencing Internet abuse. A structural equation model (SEM) was proposed and tested in this study. Results indicated that external locus of control and low self esteem has positive effects on Internet addiction while Internet addiction has positive effects on Internet abuse. However, some hypotheses proposed in this study are not supported: the relationship between uses and gratifications of Internet and Internet abuse, Internet usage policy and Internet abuse, and electonic monitoring and Internet abuse. This work contributes to the industy in employee management, and contributes to academic in an understanding of the demensions of Internet abuse construst.

論文目次 目錄
目錄 iv
表目錄 v
圖目錄 vi
第一章 緒論 1
第一節 研究背景與動機 1
第二節 研究目的 4
第三節 研究流程 4
第二章 文獻回顧 7
第一節 網路濫用相關文獻探討 7
第二節 網路成癮 12
第三節 人格特質 16
第四節 網路的使用與滿足 19
第五節 網路使用政策 22
第六節 電子監看系統 27
第三章 研究方法 30
第一節 研究架構與假設 30
第二節 研究構面之操作型定義 33
第三節 研究設計 40
第四節 統計分析方法與應用 45
第四章 工作場合員工網路濫用影響因素分析 49
第一節 基本敘述統計分析 49
第二節 各構面之信度分析 57
第三節 驗證性因素分析 63
第四節 結構方程模式分析 67
第五章 結論與建議 76
第一節 結論 76
第二節 建議 79
第三節 後續研究 80
參考文獻 81
中文文獻 81
英文文獻 82
附錄一 正式問卷 91
附錄二、問項對照表 97
附錄三、相關矩陣 100

參考文獻 參考文獻
中文文獻
邱皓政(2003)。結構方程模式-LISREL 的理論、技術與應用。臺北市:雙葉。
林山田、林東茂(1990)。犯罪學。臺北市:三民。
吳萬益(2005)。企業研究方法(2版)。臺北市:華泰。
南部科學園區(2005)。http://www.stsipa.gov.tw/web/。
陳順宇(2004)。多變量分析(3版)。臺北市:華泰。
陳正昌、程炳林(2002)。SPSS、SAS、BMDP 統計軟體在多變量統計上的應用。臺北市:五南。
張紹勳、張紹評、林秀娟著(2000)。SPSS For Windows,統計分析,初等統計與
高等統計上、下冊。臺北市:松崗。
張劭勳(2004)。研究方法(修訂版)。臺北市:滄海。
黃芳銘(2003)。結構方程模式-理論與應用。臺北市:五南。
黃俊英(2000)。多變量分析。臺北市:華泰。
經濟部(2005)。http://www.moea.gov.tw/。
資策會(2005)。http://www.find.org.tw/find/home.aspx。

英文文獻
Adkins, A. Z. (2002). Employee Use of the Internet. Available: http://www.lawcommerce.com/t3/art adkins einternetuse.asp
Alder, J. (1998). When e-mail bites back, Newsweek, 132 (1), 45-46.
Agres, C., Edberg, D., & Igbaria, M. (1998). Transformation to virtual societies: forces and issues. The Information Society, 14(2), 71-82.
American Psychological Association(2000). Internet can be addicting as alcohol, drug and
gambling says new research. APA Public Communications. Available:
http://www.apa.org/releases/internet.html.
Armstrong, L., Phillips, J. G., & Saling, L. L. (2000). Potential determinants of heavier Internet usage. International Journal of Human-Computer Studies, 53, 537-550.
Arndt, S., Feltes, J., & Hanak, J. (1983). Secretarial attitudes towards word processors as a function of familiarity and locus of control. Behavior and Information Technology, 2, 17-22.
American Management Association (2000). Workplace monitoring and surveillance. Available: http://www.amanet.org/research/archive_2001_1999.htm
American Management Association (2000). Workplace monitoring and surveillance: Policies and Practices. Available: http://www.amanet.org/research/pdfs/monitor_survey.pdf
Anandarjan, M. (2002). Internet abuse in the workplace. Communications of The ACM, 45 (1), 53-54.
Bagozzi, R.P. , & Yi, Y. (1988). On the evaluation of structural equation models. Academic of Marketing Science, 16, 76-94.
Bearden, W.O., S. Sharma, and J. E. Teel (1982).”Sample size effects on chi square and other statistics used in evaluating causal models”, Journal of Marketing Research, 19,425-430.
Bellm, M (1998). Cutting down on Internet abuse at work. Control Engineering, 45(12), 62.
Blumler, J. G. (1979). The role of theory in uses and gratifications studies. Communication Research, 6, 9-36.
Boisot, M. H. (1999). Knowledge Asserts. Oxford University Press, NY.
Bolin, A., & Heatherly, L. (2001). Predictors of employee deviance: the relationship between bad attitudes and bad behavior. Journal of Business and Psychology, 17 (3), 405-418.
Bosma, H., & Jackson, S. (1990). Coping and self-concept in adolescence. Berlin, Heidelberg: Springer-Verlag.
Brenner, V. (1997). Psychology of computer use: XLVII. Parameters of Internet use, abuse and addition: the first 90 days of the Internet usage survey. Psychological Reports, 80(3), 879-882.
Brockner, J., & Kramer, R. K. (1988). Self-esteem at work. Lexington, Mass.:Lexington Books.
Caplan, S. (2002). Problematic Internet use and psychosocial well-being: Development of a theory-based cognitive-behavioral measurement instrument. Computers in Human Behavior, 18, 552-575.
Carliner, S. (1999). An Overview of on-line learning. . Available: http://www.lakewoodeonferences.com/wp/first.htm.
Chak, K., & Leung, L. (2004). Shyness and locus of control as predictors of Internet addiction and Internet use. Cyberpsychology &Behavior, 7(5), 559-570.
Charney, T. R., & Greengerg, B. S. (2002). Uses and gratifications of the Internet. In: Lin, C., Atkin, D.(eds.), Communication, technology and society: new media adoption and uses. Cresskill, NJ:Hampton Press.
Cronan, T.P., & Jones, T.W. (2005). Have you met your organization’s computer usage policy? Industrial Management & Data Systems, 105(2), 137-146.
Cooper, A., Delmonico, D. L., & Burg, R. (2000). Cybersex users, abusers, and compulsives: new findings and implications. Sexual Addition & Compulsive, 7, 5-29.
Coopersmith, S. (1967). The antecedents of self –esteem. San Francisco: W. H. Freeman.
Coovert, M. D., & Goldstein, M. (1980). Locus of control as a predictor of users’ attitude toward computers. Psychological Reports, 47, 1167–1173.
Chou, C., & Hsiao, M. C. (2000). Internet addiction, usage, gratification, and pleasure experience: the Taiwan college students’ case. Computers & Education, 35, 65-80.
David, R. A. (2001). A cognitive-behavioral model of pathological Internet use. Computers in Human Behavior, 17, 187-195.
Davis, R. A., Flett, G. L., & Besser, A. (2002). Validation of a new scale for measuring problematic Internet use: implications for pre-employment screening. Cyberpsychology &Behavior, 5 (4), 331-345.
DeTienne, K. B. (1993). Big brother or friendly coach? The Futurist, 27, 33-37.
Eagly, A. H. and Shelly C. (1993). The psychology of attitudes. Orlando, FL: Harcourt Brace Jovanovich.
Fitzpatrick, W. M., & Burke, D. R. (2003). Competitive intelligence, corporate security and the virtual organization. Advances in competitiveness, 11, (1), 20-45.
Foltz, C. B., Cronan, T. P., & Jones T. W. (2005). Have you met your organization’s computer usage policy? Industrial Management & Data Systems, 11, (2), 137-146.
Gacknbeth, J., & Ellerman, E. (1998). Introduction to psychological aspects on Internet use, In Gackenbach, J. (Eds.), Psychology and the internet: intrapersonal, interpersonal, and transpersonal implications. San Diego CA: Academic press, Inc.
Goldberg, I. (1996). Internet addiction disorder. Available: http://www.physics.wisc.edu/~shalizi/internet addiction criteria.html.
Greenberg, J. L., Lewis, S. E., & Dodd, D. K. (1999). Brief report: overlapping applications and self-esteem among college men and women. Addictive Behaviors, 24(4), 565-571.
Greenfield, D. N. (1999). Virtual addiction : help for netheads, cyberfreaks, and those who love them. Oakland CA: New Harbinger Publications, Inc.
Greenfield, D. N., & Davis, R. A. (2002). Lost in cyberspace: the wed @ work. Cyberpsychology &Behavior, 5, 347-353.
Griffiths, M. (2000). Does Internet and computer ”addiction” exist? Some case study evidence. Cyberpsychology and Behavior, 3(2). 211-218.
Griffiths, M. (2003). Internet abuse in the workplace: issues and concerns for employers and employment counselors. Journal of Employment Counseling, 40, 87-96.
Guthrie, R., & Gray, P. (1996). Junk computing: is it bad for an organization? Information Systems Management, Winter 1996.
Joinson, A. (1998). Causes and implications of disinherited behavior on the Internet. In Gackenbach, J. (Ed.) Psychology and the internet: intrapersonal, interpersonal, and transpersonal implications. San Diego CA: Academic press, Inc.
Joreskog, K. G., & Sorbom, D. (1989). Lisrel 7: A Guide to the Program and Applications, SPSS Inc., Chicago.
Katz, E., Blumler, J. G., & Gurevitch, M. (1974). Utilization of mass communication by the individual, the Uses of Mass Communications: Current Perspectives on Gratifications Research, Blumler, J. G. and Katz, E., eds., Beverly Hills: Sage, 19-32.
Kim, M. S., Hunter, J. E., Miyahara, A., Horvath, A., Bresnahan, M. & Yoon, H.J. (1996). Individual- vs. culture-level dimensions of individualism and collectivism: effects on preferred conversational styles. Communication Monographs, 63, 28-49.
Kraut, R., Patterson, M., Lundmark, V., et al. (1998). Internet Paradox: A social
technology that reduces social involvement and psychological well-being?,American Psychologist, 53, 1017-1031.
Kolb, K. J., & Aiello, J. R. (1996). The effects of electronic performance monitoring on stress: Locus of Control as a moderator variable. Computers in Human Behavior, 12, 407-423.
Kudlow, L. (2000). Greenspan, through the looking glass. New York Times, 21.
Leary, M. R., & Kowalsky, R. M. (1990). Impression management: a literature review and two-component model. Psychological Bulletin, 107, 34-47.
Leon, D. T., & Rotunda, R. J. (2000). Contrasting case studies: is it pathological or adaptive? Journal of College Student Psychotherapy, 14(4), 9-18.
Levy, M. R., & Windahl, S. (1985). The concept of Audience Activity. In K. E. Rosengren et al. (Eds). Media Gratifications Research: Current Perspectives,109-122.
Lichtash, A. E. (2004). Inappropriate use of e-mail and the Internet in the workplace: the arbitration picture. Dispute Resolution Journal, 26-36.
Lim, V. K. G.., Teo, T. S. H., & Loo, G. L. (2002). How do I loaf here? Let me count the ways. Communications of The ACM, 45 (1), 66-70.
Lin, S. S. J., & Tsai, C.C. (2002). Sensation seeking and internet dependence of Taiwanese high school. adolescents.Computers in Human Behavior,18, 422-436.
Mahatanankoon, P. (2002). Explaining production deviant use of the Internet technology in the workplace: an integrated model. (Doctoral dissertation, The Claremont Graduate University). Dissertation Abstracts International, 63, 03.
Mahatanankoon, P., Anandarajan, M., & Igbaria, M. (2004). Development of a measure of personal web usage in the workplace. Cyberpsychology &Behavior, 7 (1), 93-104.
Martin H. M., & Henry, H. P. (1999). The national labor relations act in cyberspace: union organizing in electronic workplace. Kansas L. Rev. 1, 49(40).
Merlino, L. (2000). Employers laid back over internet abuse. Upside, 12(5), 46.
Miller, T. E. (1996). Segmenting the Internet. American Demographics, 18, 48-52.
Morahan-Martin, J., & Schumacher, P. (2000). Incidence and correlates of pathological Internet use among college students. Computers in Human Behavior, 16(1), 13-29.
Morahan-Martin, J., & Schumacher, P. (2002). Loneliness and social uses of the Internet. Computers in Human Behavior, 19, 659-671.
Morahan-Martin, J. (2005). Internet abuse. Social Science Computer Review, 23 (1), 39-48.
Noack, D. (1998). Tracking government employee net abuse. Editor and Publisher, 131(6), 36-38.
Noack, D. (2000). Most firms spy on workers. APBNews Online. Accessed July 20, 2004. Available: http://www.wired.com/files/articles/apbpress.pdf
Oakes, C. (1999). We know what you did last Summer. Wired News. Accessed July 20, 2004. Available: http://www.wired.com/news/politics/0,1283,21847,00.html
Oetzel, J. G. (1998). Explaining individual communication processes in homogeneous and heterogeneous groups through individualism-collectivism and self-construal. Human Communication Research, 25, 202-224.
Ojedokun, A. A. (2005). The evolving sophistication of Internet abuses in Africa. The International Information & Library Review, 37, 11-37.
Orzack, M. H., Christensen, M. H., Babngton, L. M., Patsoaughter, C. A. (2001). Computer addiction: When monitor becomes control center. Journal of Psychosocial Nursing & Mental Health Services, 39(3), 40-47.
Overly, M. R. (1999). E-policy: how to develop computer, e-policy, and Internet guidelines to protect your company and its assets, New York: Amacom.
Palmer, A. T. (2001). Workers, surf at your own risk. Business Week, 14.
Panina, D. Y. (2002). Effects of group cohesiveness and procedural fairness context on the performance and stress of electronically monitored individuals. Dissertation Abstracts International: Section B: The Sciences & Engineering, 63, (6-B), 3069.9.
Parasuraman, R. (1997). Humans and automation: use, misuse, disuse, abuse. Human Factor, 39(2), 230-253.
Park, H. S., & Levine, T. (1999). The theory of reasoned action and self-construal: Evidence from three cultures. Communication Monographs, 66, 199-218.
Phillips, T. (1999). The enemy within. Director, 54, 8.
Pope, A. W., McHale, S. M., & Craighead, W. E. (1988). Self –esteem enhancement with children and adolescents. New York:Pergamom Press.
Potosky, D., & Bobko, P. (2001). A model for predicting computer experience form attitudes toward computers. Journal of Business and Psychology, 15 (3), 391-404.
Pratarelli, M. E., Browne, B. L., & Johnson, K. (1999). The bits and bytes of computer/Internet addiction: a factor analytic approach, Behavior Research Methods. Instruements and Computers, 31(2), 305-314.
Rayburn, J. D., (1996). Uses and Gratifications. An Intergrated Approach to Communcation Theory and Research. Michael B. Salwen and Don W. Stacks, eds., Mahwah,NJ: Lawrence Erlbaum Associates, 145-163.
Reckless, W. C. (1976). Crime and criminology, The Dryden Press, Illinois.
Robbins, S. P. (2001). Organizational Behavior, 9th ed., N.J.: Prentice Hall.
Rosengren, K. E. (1974). Uses and gratification: A paradigm outlined. In J. G. Blumler & E. Katz(Eds). The Uses of Mass Communications: Current
Rotter, J. B. (1966). Generalized expectancies for internal versus external control of reinforcement. Psychological Monographs, 81, 1-27.
Ruggiero, T. E. (2000). Uses and gratifications theory in the 21st century. Mass Communication and Society, 3(1), 3-37.
Schoolcraft, L. R. (1999). E-mail, Internet abuse can create hostility in workplace. Business Journal: Serving Jacksonville & Northeast Florida, 14, 31.
Sharma, S. K., & Gupta, J. N. D. (2004). Improving workers’ productivity and reducing Internet abuse. The Journal of Computer Information System, 44(2), 74-78.
Shaffer, H. J., Hall, M. N., & Vander bilt, J. (2000). Computer addiction: a critical consideration. American Journal of Orthopsychiatry, 70(2), 162-168.
Shapira, N. A., Goldsmith, T. D., Keck, P. E. J., Khosla, U. M., & Mcelroy, S. L. (2000). Psychiatric features of individuals with problematic Internet use. Journal of Affective Disorders, 57(1-3), 267-272.
Siau, K., Fui-Hoon, Nah, F., & Teng, L. (2002). Acceptable Internet use policy, Communications of the ACM, 45(1), 75-79.
Song, I., Larose, R., Matthew, S. E., & Lin, C. A. (2004). Internet gratifications and Internet addiction: on the uses and abuses of new media. Cyberpsychology & Behavuor, 7(4), 384-394.
Soule, L. C., Shell, L. W., & Kleen, B. A. (2003). Exploring Internet addiction: Demographic characteristics and stereotypes of heavy Internet users. The Journal of Computer Information Systems,44, 64-73.
Standler, R. B. (2002). Issues in computer acceptable use policy. Available:http://www.rbs2.com/policy.htm
Stanton, J. M. (2002). Company profile of the frequent Internet user. Communications of the ACM, 45(1), 55-59.
Stewart, F. (2000). Internet acceptable use policies: navigating the management, legal, and technical issues. Information Systems Security, 9(3), 46-53.
Straub, D.W. (1990). Effective is security: an empirical study. Information Systems Research, 1(3), 255-276.
Sullivan, K. B. (1996). Web monitoring and filtering programs promote productivity. PC-Week, 13(50), 21-22.
Tidd, R. R. (2002). Privacy practices and policies: Protection and confidence in a Networked environment. Taxes, 80(4), 5-6.
Treuer, T., Fabian, Z., & Furedi, J. (2001). Internet addiction associated with features of impulse control disorder: is it a real psychiatric disorder? Journal of Affective Disorders, 66, 283.
Trevino, L. K., & Webster, J. (1992). Flow in computer-mediated communication: electronic mail and voice mail evaluation and impacts. Communications Research, 15(5), 539-573.
Vault.com (2000). Results of Vault.com survey of Internet use in the workplace. Available: http://www.vault.com/surveys/internetuse/internetuse.jsp
Verespej, M. A. (2000). Internet surfing. Industry Week, 249(3), 58-64.
Wang, W. (2001). Internet dependency and psychosocial maturity among college student, International journal of Human-Computer Studies, 55, 919-938.
Websense, & Saratoga Institute (2000). Survey on Internet misuse in the workplace. March:1-6.
Williams, F., Rice, R. E., & Rogers, E. M. (1988). Research methods and the new Media. New York: Free Press.
Woodrow, J. (1990). Locus of control and student teacher computer attitudes. Computers in Education, 14, 421–432.
Young, K. S. (1998a). Caught in the net: how to recognize the signs of Internet addiction-and a winning strategy for recovery, John Wiley & Sons.
Young, K. S. (1998b). Caught on-line. Credit Union Management.42-44.
Young, K. S., & Rogers, R. C. (1998). The relationship between depression and Internet addiction. Cyberpsychology and Behavior, 1(1), 25-28.
Young, K. S., & Case, C. M. (2001). Employee Internet management: an epidemic in end of a research framework for Internet risk management. Journal of Business and Information Technology, 1 (1), 30-36.
Young, K. S., & Case, C. M. (2002). Employee Internet management: current business practices and outcomes. Cyberpsychology &Behavior, 5(4), 355-361.
Young, K. S., & Case, C. M. (2004). Internet abuse in the workplace: new trends in risk management. Cyberpsychology &Behavior, 7(1), 105-111.
論文全文使用權限
  • 同意授權校內瀏覽/列印電子全文服務,於2009-07-04起公開。
  • 同意授權校外瀏覽/列印電子全文服務,於2009-07-04起公開。


  • 如您有疑問,請聯絡圖書館
    聯絡電話:(06)2757575#65773
    聯絡E-mail:etds@email.ncku.edu.tw