An important aspect of managing human capital in the 21st century workplace is managing the interface between humans and information technology, particularly the World Wide Web. The Web has changed not only how and where business is conducted, but also how and where work is done. Personal web usage has created many desirable organizational outcomes such as, reducing the cost of communication, restructuring how work is performed. However, it has also generated undesirable outcomes, for instance, loss of intellectual property, sexual harassment lawsuits, productivity losses due to surfing usage, security threats, and network bandwidth overload by visiting web sites for travel, leisure, and sports, and news. The mechanisms controlling the interface of individual and institution in this flexible, open, autonomous work environment created by the Web are emergent phenomena, and the lines between legitimate usage and usage are just beginning to be understood. Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management examines topics which embrace a wide array of Personal Web Usage issues such as antecedents of Web usage, frameworks/models of Web usage, Web technologies for monitoring usage, Web usage within other cultures and countries, Measurement issues of Web usage, and the impact of Web usage among others.
Author(s): Simmers C., Anandarajan M.
Year: 2004
Language: English
Pages: 273
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management......Page 2
Dedications......Page 5
Table of Contents......Page 6
Preface......Page 9
Acknowledgments......Page 14
Section I Exploring the Paradox of Personal Web Usage......Page 15
ABSTRACT......Page 16
INTRODUCTION......Page 17
RESEARCH METHODS AND RESULTS......Page 18
DISCUSSION......Page 33
FUTURE RESEARCH......Page 38
REFERENCES......Page 39
ABSTRACT......Page 43
INTRODUCTION......Page 44
COMPUTER-RELATED UNETHICAL BEHAVIOR......Page 45
RESEARCH MODEL AND HYPOTHESES......Page 46
RESEARCH METHOD......Page 50
RESULTS......Page 51
FINDINGS......Page 52
DISCUSSIONS......Page 54
IMPLICATIONS......Page 56
CONCLUSION......Page 57
REFERENCES......Page 58
ABSTRACT......Page 61
INTRODUCTION......Page 62
SOME BACKGROUND ON THE ISSUES......Page 63
WHAT IS “CONSTRUCTIVE RECREATION”?......Page 64
FOSTERING SOCIAL CAPITAL THROUGHONLINE RECREATION......Page 67
IMPLICATIONS FOR HR PROFESSIONALS: EFFORTS TO CREATE A LEVEL PLAYING FIELD
......Page 68
CONCLUSION: MANAGING CONTRADICTION AND PARADOX IN A CHANGING WORKPLACE
......Page 71
REFERENCES......Page 72
ABSTRACT......Page 76
INTRODUCTION......Page 77
METHODS AND RESULTS......Page 78
DISCUSSION......Page 86
REFERENCES......Page 89
APPENDIX......Page 92
Section II Managing Personal Web Usage from a Human Resource Perspective......Page 94
ABSTRACT......Page 95
WHY IS TRUST IMPORTANT?......Page 96
PERSONAL WEB USAGE AND TRUST......Page 97
THE NATURE OF TRUST......Page 98
BUILDING TRUST IN ORGANIZATIONS......Page 103
EXAMPLES OF PERSONAL WEB USAGE......Page 106
INDIVIDUAL TRUST BUILDING WITHIN ORGANIZATIONS......Page 107
THE IMPORTANCE OF ESTABLISHING AND MAINTAINING A CULTURE OF TRUST WITHIN ORGANIZATIONS......Page 109
RECOMMENDATIONS FOR BUILDING TRUST......Page 111
RECOMMENDATIONS FOR MANAGERS TO REINFORCE TRUST IN THE WORKPLACE......Page 116
SUMMARY......Page 119
REFERENCES......Page 120
ABSTRACT......Page 126
INTRODUCTION......Page 127
BACKGROUND......Page 128
THEORY......Page 129
METHODOLOGY......Page 131
RESULTS......Page 134
DISCUSSION AND IMPLICATIONS......Page 136
REFERENCES......Page 138
ABSTRACT......Page 140
INTRODUCTION......Page 141
THE TYPES OF INTRUSIONS......Page 142
THE PROBLEM WITH INTRUSIONS......Page 143
SOURCES OF INTRUSIONS......Page 145
WEB INTRUSION PROTECTION STRATEGIES......Page 147
EXAMPLES OF CURRENTLY AVAILABLE PROTECTION TECHNOLOGIES......Page 149
EXAMPLES OF INTRUSION PROTECTION PRACTICES FOR EMPLOYEES......Page 151
SUMMARY AND CONCLUSIONS......Page 153
REFERENCES......Page 154
ABSTRACT......Page 156
GOALS FOR MONITORING......Page 157
ACTIVITIES TO MONITOR......Page 160
DIFFERENT MONITORING STRATEGIES......Page 162
ELECTRONIC MONITORING TECHNIQUES......Page 163
SOFTWARE PRODUCTS FOR CONTROLLING INTERNET USAGE......Page 165
RECOMMENDED FIT BETWEEN GOALS AND MONITORING SOLUTIONS......Page 170
RECOMMENDED FIT BETWEEN PRODUCTS, GOALS, AND CORPORATE CULTURE......Page 171
REFERENCES......Page 172
ABSTRACT......Page 173
INTRODUCTION......Page 174
THEORY......Page 176
METHODS......Page 179
RESULTS......Page 184
DISCUSSION......Page 188
REFERENCES......Page 191
APPENDIX A......Page 197
ABSTRACT......Page 201
SOURCES OF LAW......Page 202
CONSEQUENCES OF BREACH OF LAW......Page 218
INTERNATIONAL COMPARISON......Page 223
CONCLUSION......Page 224
ENDNOTES......Page 225
Section III Toward the Well-Being of the Employee
......Page 231
ABSTRACT......Page 232
INTRODUCTION......Page 233
THE THEORIES OF FREUD AND SULLIVAN......Page 234
THE MISSION IMPOSSIBLE......Page 237
SCHOOLING THE UNCONSCIOUS MIND: FROM PSYCHOANALYSIS TO COGNITION......Page 239
CONCLUSION......Page 242
REFERENCES......Page 243
ABSTRACT......Page 245
INTERNET ADDICTION: A BRIEF OVERVIEW......Page 246
TYPES OF WORKPLACE INTERNET ABUSE......Page 249
WHY DOES INTERNET ABUSE OCCUR?......Page 250
INTERNET ABUSE: SPECIFIC ACTIVITIES THAT EMPLOYERS SHOULD BE AWARE OF......Page 252
GUIDELINES FOR MANAGERS AND HUMAN RESOURCES DEPARTMENTS......Page 256
REFERENCES......Page 258
ABSTRACT......Page 261
INTRODUCTION......Page 262
WHAT IS THE IMPACT OF PERSONAL INTERNET USAGE?......Page 263
RESEARCH MODEL AND HYPOTHESES......Page 264
MEASUREMENT MODEL......Page 267
RESULTS......Page 269
RECOMMENDATIONS FOR MANAGEMENT......Page 270
LIMITATIONS......Page 273
ENDNOTES......Page 274
REFERENCES......Page 275
APPENDIX......Page 277
About the Authors......Page 279
Index......Page 285