SlideShare a Scribd company logo
Determinants of Internet Media Abuse In WorkplaceDeterminants of Internet Media Abuse In Workplace
Fairul Hisyam bin Mat
GSK 2159
Supervisor:
Dr. Noor Fadhiha Mokhtar
AP Dr. Shafiek Mokhlis
• IntroductionIntroduction
• Problem StatementProblem Statement
• Research ObjectiveResearch Objective
• Research QuestionResearch Question
• HypothesisHypothesis
• Research ContributionResearch Contribution
• Theoretical FrameworkTheoretical Framework
• Literature ReviewLiterature Review
• Research DesignResearch Design
• Findings & DiscussionFindings & Discussion
• Recommendations & ConclusionRecommendations & Conclusion
• ReferencesReferences
Determinants of Internet Media Abuse InDeterminants of Internet Media Abuse In
WorkplaceWorkplace
The internet user worldwide is estimated at 2,925 billion from 7,243 billion people
world population (www.internetworldstats.com)
The miscellaneous information true of false, idea, ideology, propaganda and
pornography distributed through internet. complaints and arguments on negative
element that damage the internet users, regardless of age, position, religions, nations
and communities. The negative content such as pornography, gambling and illegal
business has contributed to the internet abuse by the users).
According to Wikipedia “Internet abuse refers to improper use of the internet and may
include computer crime (use of computers in criminal activity), cyber bullying (use of
the computer to bully and intimidate), spam electronic (sending unwanted advertising)
and malware (software designed to harm a user’s computer, including computer
virus)”
 Johor State Secretary, YB. Datin Paduka Norsiah Harun exposed internet abuse among civil
servants in Johor. 20% of civil servants in the states had found guilty for coursing system slow
due to misused of the internet facilities at offices by download songs, pictures, computer games
and surfing porn sites based on their private identification log-on (Tan, 2006).
 Public Service director-general Tan Sri Mohamad Zabidi Zainal (Sarban S 2013). The culture of using
social media to criticize has become such a problem among younger civil service. Public Services
Department has been forced to issue a circular to remind them to desist or face the consequences
 Terengganu State Secretary, Dato' Osman Muda (Ali, S. 2015, March 24). A handful of civil servants
in the state, tarnish agenda and program planned by the government through social media. The
directly department head does not care about it though clearly could tarnish the image of the
department, government and Terengganu
 According to Psychologist and Dean of Faculty of Education Universiti Malaya Prof. Dr. Mariani Mohd
Nor said the trend of using electronic gadget and social media can be found a cause for divorce.
The applications such as WhatsApp can be a platform for young married couple expresses their
anger in the face of domestic conflict (Abdullah, 2016).
5
 An increasingly number of reports is released to aware the management of the
negative impact of internet addiction and internet abuse on the normal operation of
an organization. Some organizations are even proactively formulating internet use
policy and adopting electronic monitoring. ( Chen, Chen & Yang 2008)
Over the past decade, employee Internet misuse and abuse has become a growing
concern that has impacted several predominant corporations (S.Young & J.Case
2003)
RESEARCH OBJECTIVES & QUESTIONRESEARCH OBJECTIVES & QUESTION
Research Objective Research Question
1. To identify the determinants of internet
media abuse in the organization
What are the determinants of media abuse in
organization?
2. To examine the relationship between
attitude toward behavior contribute internet
media abuse
Does attitudinal factors contribute Internet media
abuse?
3. To examine the relationship between
perceived behavioral controls contribute
Internet media abuse
Does perceived behavioral controls contribute
Internet media abuse?
4. To examine the relationship between
subjective norm contribute Internet media
abuse
Does subjective norm contribute internet media
abuse?
5.To suggest recommendation to organization
about combating the internet media abuse
among the staff.
What are recommendations to organization
about combating internet media abuse among staff?
H1: There is a significant relationship between attitudes towards Internet abuse by
organization employees.
H1a: There is a significant relationship between job satisfaction towards internet
abuse by organization employees
H1b: There is a significant relationship between internet addiction towards internet
abuse by organization employees
H2: There is significant relationship between perceived behavioral controls towards
Internet abuse by organization employees.
H2a: There is significant relationship between workplace policy towards internet
abuse by organization employees.
H2b: There is significant relationship between productivity towards internet abuse by
organization employees.
H3: There are significant relationship subjective norm towards Internet abuse by
organization employees.
H3a: There are significant relationship peers cultures towards Internet abuse by
organization employees.
H3b: There are significant relationship supervisor cultures towards Internet abuse by
HYPOTHESISHYPOTHESIS
• The result of this study would add to the knowledge that the internet abuses in
organization are online friendship, non-related activities, online information abuse
and cyber sexual.
• The study contributes to organization by information that the attitudinal factors
affect the extent of Internet media abuse.
• The study contributes to organization by information that the perceived factors
affect the extent of Internet media abuse.
• The study contributes to organization by information that the subjective norm affect
the extent of Internet media abuse.
• The present study aims is to suggest organization combating internet media abuse
by increase observation to the staff.
RESEARCH CONTRIBUTIONRESEARCH CONTRIBUTION
THEORETICAL FRAMEWORKTHEORETICAL FRAMEWORK
Figure: Theoretical Framework
Independent Variables Dependent Variable
• Developed by Icek Ajzen
• Extension of his Theory of Reasoned Action (TRA), since TRA states that actual
behaviour is highly related to behavioural intention, but the results of some studies
show that, because of circumstantial limitations, behavioural intention does not
always lead to actual behaviour.
• TPB adds the notion of Perceived behavioural control which refers to a person’s
perceptions of their ability to perform a given behaviour.
1985
Theory of Planned Behaviour (TPB)
Model and Theory
Variable Indicators Citation
Independent
Attitudes Towards Behaviour
Job satisfaction
Internet addiction
Job satisfaction,
Heavy usage of internet,
Internet addiction,
Physical illness,
Isolation from society,
Inability predict time spend,
Neglecting family and friends,
Change in sleep pattern,
Health problem.
Stonton’s (2002)
Chen,Chen & Yang (2008)
Kershaw ( 2005)
Independent
Perceived Behaviour Control
Workplace policy
Productivity
Internet use policies,
Employee training,
Monitoring internet use,
Rehabilitation for abuse.
Productivity measurement
Young (2010)
Vitak & LaRose (2011)
Independent
Subjective Norm
Peers cultures
Supervisor cultures
Pressure to engage or not to engage in a
behavior,
Weighed by motivation to comply with the
referent,
Co-workers and senior influence,
Internal and external containment.
Ajzen (2006)
Lee & Lee (2002)
Rekless (1940)
Dependent Internet Media Abuse
Unauthorized & non related work,
internet activity abuse,
online friendship/relationship abuse,
online information abuse criminal internet,
miscellaneous internet abuse,
Non-working related emails .
Lee,Lim & Wong (2005)
Griffth (2003),
LITERATURE REVIEWLITERATURE REVIEW
RESEARCH DESIGNRESEARCH DESIGN
a. Research Design - Descriptive
b. Quantitative – Hypothesis testing
c. Type of investigation - causal study to
investigate related element for
independent variables and Internet
Media Abuse
Research Instruments:
1.Questionnaire - Administered through
hand delivery
2.Secondary Data – Marang District
Council, Emerald Inside etc, web pages
(news online)
a. Data Collection/Source – Marang
District Council
b. Time horizon – This study is cross-
sectional. Data are gathered just one
over are period of days in order to
answer a research question
Sampling :
•Population –Marang District Council
employee
•Type – Probability Sampling Technique-
(the simple random sampling)
•Samples will be selected based on Krejcie
and Morgan’s (1970) sampling table
•Population- 194 people
•Sample – 127 people
•a total of 130 questionnaires were
distributed to target respondents;127
respondents returned the questionnaires.
Data Analysis:
1.Correlation analysis
2.Regression analysis
Research Limitations:
1.Co-operation from organizations
2.Confidentiality of data collected
Sample Characteristics  Frequency Percent %
Gender
Male 62 48.8
Female 65 51.2
Age
<23 years 11 8.7
23-30 years 36 28.3
31-35 years 23 18.1
36-40 years 27 21.3
41-45 years 8 6.3
46-50 years 12 9.4
51-55 years 10 7.9
Category
Management & Professional 28 22.0
Support 99 78.0
Service Period    
1-5 years 31 24.4
6-10 years 36 28.3
10-15 years 22 17.3
16-20 years 11 8.7
21-25 years 10 7.9
26-30 years 8 6.3
More than 31 years 9 7.1
Internet Usage Behavior
during Office Hour
Purpose  Frequency Percent
Education 15 11.8
Social media 50 39.4
Financial 22 17.3
News 33 26.0
Entertainment 7 5.5
Time
8-11.59 am 25 19.7
12-1 pm 16 12.6
1-2 pm 45 35.4
3-4 pm 17 13.4
4-5 pm 11 8.7
> 5 pm 13 10.2
Factor Analysis : Attitudes
Towards Behavior
Item
Factor Loading
(1)
Internet Addiction
(2)
Job Satisfaction
My office work suffer because of the amount of time spend online .764
I choose to surf internet rather than spend time with officemates .732
I snap, yell or act annoyed if someone bothers me while using the
internet
.732
I slept late due to surfing internet. .721
I am neglecting offices chores to spend more time on-line .715
My job productivity and job performance suffer because of the
internet
.665
I am feeling stay on-line longer than intended .622
I am feeling depressed, moody or nervous when off-line but it goes
away once back on-line
.621
I try to cut down the amount of time spent online and fail. .597
All in all, I am satsified with co-workers. .766
All in all, I am satisfied with the promotional opportunities .759
All in all, I am satisfied with subordinates .751
All in all, I am satisfied with my pay .684
All in all, I am satisfied with work of my job .657
Eigenvalue 5.034 2.236
% explained variances 31.12 20.81
Factor Analysis : Perceived Behavioral Control
Item
Factor Loading
(1)
Productivity
(2)
Workplace
(3)
Perceived need
I found myself in a trance and not be able to focus on the daily work .847
I found myself not working carefully as it should be
.804
I found myself not working on working time .802
I'm having trouble working quality lower than expected
.777
The use of the Internet during working hours for personal use is abuse .758
If my work place prohibit using the Internet for personal use , I will not do. .682
Use office internet for private use is unethical regardless of time .567
Use of the Internet for personal use at work is monitored by the employer .554
Working policy of ICT in the workplace is a guide when surfing the internet .510
I think employers should continue to use the internet in order to get information
regarding employee affair
.752
I think employers should encourage the use of the Internet to create a positive culture
in the workplace
.745
High-speed Internet in this office is a prerequisite for doing my daily tasks .666
Use office internet for personal use is acceptable if it does not interfere with daily
tasks
.514
Eigenvalue 3.068 2.152 1.519
% explained variances
20.29 15.82 15.72
Factor Analysis : Subjective Norm
Item
Factor Loading
(Subjective Norm)
My supervisor influenced me to surf the Internet .872
I always surf the internet with my supervisor .829
I always surf the internet with colleagues .768
My colleague influence to surf the Internet .756
I always communicate with my supervisor via the internet
( using Facebook , Instagram , Twitter, Skype , E - mail or whatapp )
.685
Eigenvalue 3.079
% explained variances 61.57
Factor Analysis : Internet Abuse
Item
Factor Loading
(1)
Hobby
(2)
Infomation
(3)
Transaction
I like to participate in an online auction. .778
I love downloading and / or watching video, audio , images, text for
personal purposes . .763
I often participate in newsgroups ( newsgroup ) which is not related to
work .753
I like to download the software for personal use .692
I often participate in online game .687
I like to join the chat .630
I often surf the internet without purpose .585
I read the news online including sports , weather , etc. .779
I surf the internet to find information, products and services related to
personal matters .609
I surf the internet to get information related to entertainment .604
I surf the internet to get information related to personal hobbies .577
I often use personal web mail, such as Yahoo , Hotmail or Gmail .577
I run an online business activities .824
I prefer to do online shopping. .746
I often perform investment activities and online banking .710
Eigenvalue 6.386 1.524 1.211
% explained variances 28.31 16.64 15.86
Descriptive Statistics, Correlation
& Reliability Analysis
 
α 1
IA
2
JS
3
Pr
4
Po
5
PN
6
SN
7
H
8
I
9
T
1 Internet addiction .868 1                
2 Job satisfaction .786 -.328**
1              
3 Productivity .826 -.509**
.203*
1            
4 Policy .624 -.176*
.275**
.114 1          
5 Perceived need .630 -.158 .216*
.159 .280**
1        
6 Subjective norms .838 .328**
-.289**
-.329**
-.184*
.239**
1      
7 Hobby .871 .460**
-.424**
-.527**
-.080 .040 .414**
1    
8 Information .781 .286**
-.241**
-.279**
-.091 .196*
.393**
.607**
1  
9 Transaction .644 .332**
-.228*
-.244**
-.018 .138 .265**
.516**
.544**
1
Mean 2.347 3.513 3.658 3.298 3.317 2.506 2.408 2.932 2.441
Standard Deviation .734 .632 .755 .575 .640 .811 .850 .792 .972
** p < .01 (2-tailed), * p < .05 (2-tailed)
Multiple Regression Result
Predictor
Hobby Information Transaction
Beta t Beta t Beta t
Internet addiction
.181 2.212* .176 2.043* .334 3.873***
Job satisfaction
-.327 -4.487***     -.179 -2.045*
Productivity
-.401 -5.080***        
Perceived need
.202 2.895**     .236 2.829**
Policy
           
Subjective norm
    3.906 .336***    
F
24.07*** 13.822*** 9.875***
Adjusted R2
.423 .169 .176
***p < .001, **p < .01, * p < .05
DISCUSSIONDISCUSSION
Variable Indicator Result Author
Attitudes Towards
Behavior
Job satisfaction Significant
Woon (2004);
Polak (2003); 
Stonton’s (2002)
Internet addiction Significant Chen (2008)
Perceived Behavior
Control
Workplace policy Not Significant Young (2010)
Productivity Significant
Vitak & La Rose 
(2011)
Subjective Norm
Peers cultures
Significant
Woon & Pee 
(2004)
 
Supervisor cultures
Significant
Result of Hypothesis Testing
Independent Variable Result
   
Attitudes Towards Behavior  
Job satisfaction Accepted
Internet addiction Accepted
Perceived behavioral controls  
Workplace policy Rejected
Productivity Accepted
Subjective norm  
Peers cultures Accepted
Supervisor cultures Accepted
RECOMMENDATIONS & CONCLUSIONRECOMMENDATIONS & CONCLUSION
 The study shows a small local council in Terengganu affected with internet abuse phenomenon.
The study shows majority employees use internet during working hours and affecting productivity.
 (TERs)Training Enhancement Reward shoot
 This study help to the organization :
 Top management :
 Information about Internet media abuse activities, the contributing factors and suitable
countermeasures.
 Employees :
 to develop consciousness and conceivably to change mannerism about Internet
media abuse.
 Suggestion for future research :
 to examine more organizations with wider respondents’ base and look into the development
of code of conduct for internet abuse suitable for government agency( local authority , state
and federal agency.)
 other types of internet media abuse such those of crime offence: wagering, hacking,
espionage and others. Other interesting initiative is to examine the destructive effects
caused by internet media abuse to an organization.
 to examine perceived need factor whether it contributes to internet media abuse and
workplace policy as the moderator/ mediator for internet media abuse.
 use other model such as Technology Acceptance Model (TAM), Technology-Organization-
Environment (TOE) or Unified Theory of Acceptance and Use of Technology (UTAUT).
• A theoretical and practical contribution to the knowledge, clear
understanding to the factors contributes to internet media abuse at
workplace.
• The results also provide valuable inputs to the organization’s excellence.
RECOMMENDATIONS & CONCLUSIONRECOMMENDATIONS & CONCLUSION
REFERENCESREFERENCES
REFERENCESREFERENCES
REFERENCESREFERENCES
GANTT CHARTGANTT CHART
Determinants of Internet Media Abuse InDeterminants of Internet Media Abuse In
WorkplaceWorkplace

More Related Content

What's hot

Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
IJERA Editor
 
Lbcio2013 surveyexecutivesummary final
Lbcio2013 surveyexecutivesummary finalLbcio2013 surveyexecutivesummary final
Lbcio2013 surveyexecutivesummary final
Jim Nottingham
 
11 Respondent Driven Sampling
11 Respondent Driven Sampling11 Respondent Driven Sampling
11 Respondent Driven Sampling
Duke Network Analysis Center
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Megan Bednar
 
The use of social media in the recruitment process
The use of social media in the recruitment processThe use of social media in the recruitment process
The use of social media in the recruitment processBhagyashree Zope
 
Cbt for internet addiction
Cbt for internet addictionCbt for internet addiction
Cbt for internet addictionCharlotte Parks
 
Navigating the New Health Care Delivery System
Navigating the New Health Care Delivery SystemNavigating the New Health Care Delivery System
Navigating the New Health Care Delivery System
Pew Research Center's Internet & American Life Project
 
01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security Issues01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security Issues
Duke Network Analysis Center
 
Mining Smartphone Data to Classify Life-Facets of Social Relationships at CSC...
Mining Smartphone Data to Classify Life-Facets of Social Relationships at CSC...Mining Smartphone Data to Classify Life-Facets of Social Relationships at CSC...
Mining Smartphone Data to Classify Life-Facets of Social Relationships at CSC...
Jason Hong
 
HIV Prevention and Social Media
HIV Prevention and Social MediaHIV Prevention and Social Media
HIV Prevention and Social MediaNathan Brown
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study Approach
IJECEIAES
 
Social media in the public sector south korea twitter
Social media in the public sector south korea twitterSocial media in the public sector south korea twitter
Social media in the public sector south korea twitter
Danube University Krems, Centre for E-Governance
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullyingJisc RSC East Midlands
 
CAPE Caribbean Studies Unit 2 - Sample SBA
CAPE Caribbean Studies Unit 2 - Sample SBACAPE Caribbean Studies Unit 2 - Sample SBA
CAPE Caribbean Studies Unit 2 - Sample SBA
Raheme Matthie
 
Impacts of social networking site (sns) on growing up adolescent girls a stud...
Impacts of social networking site (sns) on growing up adolescent girls a stud...Impacts of social networking site (sns) on growing up adolescent girls a stud...
Impacts of social networking site (sns) on growing up adolescent girls a stud...
NAAR Journal
 
Analysis of social networking websites and its effect on academic students
Analysis of social networking websites and its effect on academic studentsAnalysis of social networking websites and its effect on academic students
Analysis of social networking websites and its effect on academic students
Jahangeer Qadiree
 
The impact of SOCIAL CAPITAL and SELF-DISCLOSURE on PROCRASTINATION and SOCIA...
The impact of SOCIAL CAPITAL and SELF-DISCLOSURE on PROCRASTINATION and SOCIA...The impact of SOCIAL CAPITAL and SELF-DISCLOSURE on PROCRASTINATION and SOCIA...
The impact of SOCIAL CAPITAL and SELF-DISCLOSURE on PROCRASTINATION and SOCIA...Wenbin Zhao
 
Symptoms and Behavior Disorder for Internet Addiction: A Netnography Research
Symptoms and Behavior Disorder for Internet Addiction: A Netnography ResearchSymptoms and Behavior Disorder for Internet Addiction: A Netnography Research
Symptoms and Behavior Disorder for Internet Addiction: A Netnography Research
International Journal of Business Marketing and Management (IJBMM)
 
Ethical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in MyanmarEthical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in Myanmar
ijtsrd
 

What's hot (20)

Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
 
Lbcio2013 surveyexecutivesummary final
Lbcio2013 surveyexecutivesummary finalLbcio2013 surveyexecutivesummary final
Lbcio2013 surveyexecutivesummary final
 
11 Respondent Driven Sampling
11 Respondent Driven Sampling11 Respondent Driven Sampling
11 Respondent Driven Sampling
 
Capstone Project Final 7-19-13
Capstone Project Final 7-19-13Capstone Project Final 7-19-13
Capstone Project Final 7-19-13
 
The use of social media in the recruitment process
The use of social media in the recruitment processThe use of social media in the recruitment process
The use of social media in the recruitment process
 
Cbt for internet addiction
Cbt for internet addictionCbt for internet addiction
Cbt for internet addiction
 
Navigating the New Health Care Delivery System
Navigating the New Health Care Delivery SystemNavigating the New Health Care Delivery System
Navigating the New Health Care Delivery System
 
Comparisons of Internet usage characteristics by youth self-reported depressi...
Comparisons of Internet usage characteristics by youth self-reported depressi...Comparisons of Internet usage characteristics by youth self-reported depressi...
Comparisons of Internet usage characteristics by youth self-reported depressi...
 
01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security Issues01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security Issues
 
Mining Smartphone Data to Classify Life-Facets of Social Relationships at CSC...
Mining Smartphone Data to Classify Life-Facets of Social Relationships at CSC...Mining Smartphone Data to Classify Life-Facets of Social Relationships at CSC...
Mining Smartphone Data to Classify Life-Facets of Social Relationships at CSC...
 
HIV Prevention and Social Media
HIV Prevention and Social MediaHIV Prevention and Social Media
HIV Prevention and Social Media
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study Approach
 
Social media in the public sector south korea twitter
Social media in the public sector south korea twitterSocial media in the public sector south korea twitter
Social media in the public sector south korea twitter
 
Identifying and dealing with online bullying
Identifying and dealing with online bullyingIdentifying and dealing with online bullying
Identifying and dealing with online bullying
 
CAPE Caribbean Studies Unit 2 - Sample SBA
CAPE Caribbean Studies Unit 2 - Sample SBACAPE Caribbean Studies Unit 2 - Sample SBA
CAPE Caribbean Studies Unit 2 - Sample SBA
 
Impacts of social networking site (sns) on growing up adolescent girls a stud...
Impacts of social networking site (sns) on growing up adolescent girls a stud...Impacts of social networking site (sns) on growing up adolescent girls a stud...
Impacts of social networking site (sns) on growing up adolescent girls a stud...
 
Analysis of social networking websites and its effect on academic students
Analysis of social networking websites and its effect on academic studentsAnalysis of social networking websites and its effect on academic students
Analysis of social networking websites and its effect on academic students
 
The impact of SOCIAL CAPITAL and SELF-DISCLOSURE on PROCRASTINATION and SOCIA...
The impact of SOCIAL CAPITAL and SELF-DISCLOSURE on PROCRASTINATION and SOCIA...The impact of SOCIAL CAPITAL and SELF-DISCLOSURE on PROCRASTINATION and SOCIA...
The impact of SOCIAL CAPITAL and SELF-DISCLOSURE on PROCRASTINATION and SOCIA...
 
Symptoms and Behavior Disorder for Internet Addiction: A Netnography Research
Symptoms and Behavior Disorder for Internet Addiction: A Netnography ResearchSymptoms and Behavior Disorder for Internet Addiction: A Netnography Research
Symptoms and Behavior Disorder for Internet Addiction: A Netnography Research
 
Ethical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in MyanmarEthical Implications of Student Plagiarism in Myanmar
Ethical Implications of Student Plagiarism in Myanmar
 

Viewers also liked

The Misuse of Company Time
The Misuse of Company Time The Misuse of Company Time
The Misuse of Company Time
Jaclynn Ballman
 
REDDITO PONTE - Cos'è e come si partecipa
REDDITO PONTE - Cos'è e come si partecipaREDDITO PONTE - Cos'è e come si partecipa
REDDITO PONTE - Cos'è e come si partecipaidvlucania
 
Representação máfia dos combustíveis
Representação   máfia dos combustíveisRepresentação   máfia dos combustíveis
Representação máfia dos combustíveis
Roberto Rabat Chame
 
hotel supplier directory Sri Lanka
hotel supplier directory Sri Lankahotel supplier directory Sri Lanka
hotel supplier directory Sri Lanka
Pubudu Dassanayake
 
Contra foto não há argumento 07 03 2016
Contra foto não há argumento 07 03 2016Contra foto não há argumento 07 03 2016
Contra foto não há argumento 07 03 2016
Roberto Rabat Chame
 
Agravo liminar fosfoetanolamina
Agravo liminar fosfoetanolaminaAgravo liminar fosfoetanolamina
Agravo liminar fosfoetanolamina
fabiomotta747
 
Book merchandising and communication for shop opening 2015 updated may
Book merchandising and communication for shop opening 2015 updated mayBook merchandising and communication for shop opening 2015 updated may
Book merchandising and communication for shop opening 2015 updated may
Yen Cao
 

Viewers also liked (10)

The Misuse of Company Time
The Misuse of Company Time The Misuse of Company Time
The Misuse of Company Time
 
REDDITO PONTE - Cos'è e come si partecipa
REDDITO PONTE - Cos'è e come si partecipaREDDITO PONTE - Cos'è e come si partecipa
REDDITO PONTE - Cos'è e come si partecipa
 
Representação máfia dos combustíveis
Representação   máfia dos combustíveisRepresentação   máfia dos combustíveis
Representação máfia dos combustíveis
 
4C62-1.PDF
4C62-1.PDF4C62-1.PDF
4C62-1.PDF
 
0F93-1.PDF
0F93-1.PDF0F93-1.PDF
0F93-1.PDF
 
hotel supplier directory Sri Lanka
hotel supplier directory Sri Lankahotel supplier directory Sri Lanka
hotel supplier directory Sri Lanka
 
Contra foto não há argumento 07 03 2016
Contra foto não há argumento 07 03 2016Contra foto não há argumento 07 03 2016
Contra foto não há argumento 07 03 2016
 
NeusB
NeusBNeusB
NeusB
 
Agravo liminar fosfoetanolamina
Agravo liminar fosfoetanolaminaAgravo liminar fosfoetanolamina
Agravo liminar fosfoetanolamina
 
Book merchandising and communication for shop opening 2015 updated may
Book merchandising and communication for shop opening 2015 updated mayBook merchandising and communication for shop opening 2015 updated may
Book merchandising and communication for shop opening 2015 updated may
 

Similar to Determinants of Internet Media Abuse In Workplace.

Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
Galit Shmueli
 
Can excessive use of social media lead to mental illness
Can excessive use of social media lead to mental illnessCan excessive use of social media lead to mental illness
Can excessive use of social media lead to mental illness
Harsh Vardhan
 
Social Media Ethics and Online Behavior.pptx
Social Media Ethics and Online Behavior.pptxSocial Media Ethics and Online Behavior.pptx
Social Media Ethics and Online Behavior.pptx
stkact636
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
ifi8106tlu
 
Impact_of_internet_use_on_young_students
Impact_of_internet_use_on_young_studentsImpact_of_internet_use_on_young_students
Impact_of_internet_use_on_young_studentsmiftah uddin
 
Business research report on Internet and children
Business research report on Internet and childrenBusiness research report on Internet and children
Business research report on Internet and children
Apon Comilla
 
Social media addiction-Primary Research
Social media addiction-Primary ResearchSocial media addiction-Primary Research
Social media addiction-Primary Research
Dr. Haitham Ibrahim
 
The Influence of Social Media Usage and Personality Traits on Personal Relati...
The Influence of Social Media Usage and Personality Traits on Personal Relati...The Influence of Social Media Usage and Personality Traits on Personal Relati...
The Influence of Social Media Usage and Personality Traits on Personal Relati...
YogeshIJTSRD
 
IRJET- Social Network Mental Disoreders Detection
IRJET- Social Network Mental Disoreders DetectionIRJET- Social Network Mental Disoreders Detection
IRJET- Social Network Mental Disoreders Detection
IRJET Journal
 
Research proposal on impect of social media of university students.docx
Research proposal on impect of social media of university students.docxResearch proposal on impect of social media of university students.docx
Research proposal on impect of social media of university students.docx
MDNAYANMia2
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
Abhishek Sharma
 
Technology Addiction, internet addiction, online, social networking
Technology Addiction, internet addiction, online, social networkingTechnology Addiction, internet addiction, online, social networking
Technology Addiction, internet addiction, online, social networking
Samin Sameed
 
Trick or Treat? Social Media Use by Employees
Trick or Treat? Social Media Use by EmployeesTrick or Treat? Social Media Use by Employees
Trick or Treat? Social Media Use by Employees
Gordon Schmidt
 
Assessing the Knowledge on Internet Addiction and Cybersecurity: A Literature...
Assessing the Knowledge on Internet Addiction and Cybersecurity: A Literature...Assessing the Knowledge on Internet Addiction and Cybersecurity: A Literature...
Assessing the Knowledge on Internet Addiction and Cybersecurity: A Literature...
AJHSSR Journal
 
The use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-processThe use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-process
Preeti Bhaskar
 
Behav chng and_disease_mgt
Behav chng and_disease_mgtBehav chng and_disease_mgt
Behav chng and_disease_mgtXT7btp
 
Strategic impact of Social Media in tourism- Research paper
Strategic impact of Social Media in tourism- Research paperStrategic impact of Social Media in tourism- Research paper
Strategic impact of Social Media in tourism- Research paper
Ambuj Saxena
 
Social media in social work spaces
Social media in social work spacesSocial media in social work spaces
Social media in social work spaces
University of Salford
 

Similar to Determinants of Internet Media Abuse In Workplace. (20)

Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...
 
Can excessive use of social media lead to mental illness
Can excessive use of social media lead to mental illnessCan excessive use of social media lead to mental illness
Can excessive use of social media lead to mental illness
 
Social Media Ethics and Online Behavior.pptx
Social Media Ethics and Online Behavior.pptxSocial Media Ethics and Online Behavior.pptx
Social Media Ethics and Online Behavior.pptx
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
 
Impact_of_internet_use_on_young_students
Impact_of_internet_use_on_young_studentsImpact_of_internet_use_on_young_students
Impact_of_internet_use_on_young_students
 
Business research report on Internet and children
Business research report on Internet and childrenBusiness research report on Internet and children
Business research report on Internet and children
 
Social media addiction-Primary Research
Social media addiction-Primary ResearchSocial media addiction-Primary Research
Social media addiction-Primary Research
 
The Influence of Social Media Usage and Personality Traits on Personal Relati...
The Influence of Social Media Usage and Personality Traits on Personal Relati...The Influence of Social Media Usage and Personality Traits on Personal Relati...
The Influence of Social Media Usage and Personality Traits on Personal Relati...
 
IRJET- Social Network Mental Disoreders Detection
IRJET- Social Network Mental Disoreders DetectionIRJET- Social Network Mental Disoreders Detection
IRJET- Social Network Mental Disoreders Detection
 
rupak
rupakrupak
rupak
 
Research proposal on impect of social media of university students.docx
Research proposal on impect of social media of university students.docxResearch proposal on impect of social media of university students.docx
Research proposal on impect of social media of university students.docx
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Technology Addiction, internet addiction, online, social networking
Technology Addiction, internet addiction, online, social networkingTechnology Addiction, internet addiction, online, social networking
Technology Addiction, internet addiction, online, social networking
 
Trick or Treat? Social Media Use by Employees
Trick or Treat? Social Media Use by EmployeesTrick or Treat? Social Media Use by Employees
Trick or Treat? Social Media Use by Employees
 
Assessing the Knowledge on Internet Addiction and Cybersecurity: A Literature...
Assessing the Knowledge on Internet Addiction and Cybersecurity: A Literature...Assessing the Knowledge on Internet Addiction and Cybersecurity: A Literature...
Assessing the Knowledge on Internet Addiction and Cybersecurity: A Literature...
 
4
44
4
 
The use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-processThe use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-process
 
Behav chng and_disease_mgt
Behav chng and_disease_mgtBehav chng and_disease_mgt
Behav chng and_disease_mgt
 
Strategic impact of Social Media in tourism- Research paper
Strategic impact of Social Media in tourism- Research paperStrategic impact of Social Media in tourism- Research paper
Strategic impact of Social Media in tourism- Research paper
 
Social media in social work spaces
Social media in social work spacesSocial media in social work spaces
Social media in social work spaces
 

Recently uploaded

假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 

Recently uploaded (20)

假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 

Determinants of Internet Media Abuse In Workplace.

  • 1. Determinants of Internet Media Abuse In WorkplaceDeterminants of Internet Media Abuse In Workplace Fairul Hisyam bin Mat GSK 2159 Supervisor: Dr. Noor Fadhiha Mokhtar AP Dr. Shafiek Mokhlis
  • 2. • IntroductionIntroduction • Problem StatementProblem Statement • Research ObjectiveResearch Objective • Research QuestionResearch Question • HypothesisHypothesis • Research ContributionResearch Contribution • Theoretical FrameworkTheoretical Framework • Literature ReviewLiterature Review • Research DesignResearch Design • Findings & DiscussionFindings & Discussion • Recommendations & ConclusionRecommendations & Conclusion • ReferencesReferences Determinants of Internet Media Abuse InDeterminants of Internet Media Abuse In WorkplaceWorkplace
  • 3. The internet user worldwide is estimated at 2,925 billion from 7,243 billion people world population (www.internetworldstats.com) The miscellaneous information true of false, idea, ideology, propaganda and pornography distributed through internet. complaints and arguments on negative element that damage the internet users, regardless of age, position, religions, nations and communities. The negative content such as pornography, gambling and illegal business has contributed to the internet abuse by the users). According to Wikipedia “Internet abuse refers to improper use of the internet and may include computer crime (use of computers in criminal activity), cyber bullying (use of the computer to bully and intimidate), spam electronic (sending unwanted advertising) and malware (software designed to harm a user’s computer, including computer virus)”
  • 4.  Johor State Secretary, YB. Datin Paduka Norsiah Harun exposed internet abuse among civil servants in Johor. 20% of civil servants in the states had found guilty for coursing system slow due to misused of the internet facilities at offices by download songs, pictures, computer games and surfing porn sites based on their private identification log-on (Tan, 2006).  Public Service director-general Tan Sri Mohamad Zabidi Zainal (Sarban S 2013). The culture of using social media to criticize has become such a problem among younger civil service. Public Services Department has been forced to issue a circular to remind them to desist or face the consequences  Terengganu State Secretary, Dato' Osman Muda (Ali, S. 2015, March 24). A handful of civil servants in the state, tarnish agenda and program planned by the government through social media. The directly department head does not care about it though clearly could tarnish the image of the department, government and Terengganu  According to Psychologist and Dean of Faculty of Education Universiti Malaya Prof. Dr. Mariani Mohd Nor said the trend of using electronic gadget and social media can be found a cause for divorce. The applications such as WhatsApp can be a platform for young married couple expresses their anger in the face of domestic conflict (Abdullah, 2016).
  • 5. 5  An increasingly number of reports is released to aware the management of the negative impact of internet addiction and internet abuse on the normal operation of an organization. Some organizations are even proactively formulating internet use policy and adopting electronic monitoring. ( Chen, Chen & Yang 2008) Over the past decade, employee Internet misuse and abuse has become a growing concern that has impacted several predominant corporations (S.Young & J.Case 2003)
  • 6. RESEARCH OBJECTIVES & QUESTIONRESEARCH OBJECTIVES & QUESTION Research Objective Research Question 1. To identify the determinants of internet media abuse in the organization What are the determinants of media abuse in organization? 2. To examine the relationship between attitude toward behavior contribute internet media abuse Does attitudinal factors contribute Internet media abuse? 3. To examine the relationship between perceived behavioral controls contribute Internet media abuse Does perceived behavioral controls contribute Internet media abuse? 4. To examine the relationship between subjective norm contribute Internet media abuse Does subjective norm contribute internet media abuse? 5.To suggest recommendation to organization about combating the internet media abuse among the staff. What are recommendations to organization about combating internet media abuse among staff?
  • 7. H1: There is a significant relationship between attitudes towards Internet abuse by organization employees. H1a: There is a significant relationship between job satisfaction towards internet abuse by organization employees H1b: There is a significant relationship between internet addiction towards internet abuse by organization employees H2: There is significant relationship between perceived behavioral controls towards Internet abuse by organization employees. H2a: There is significant relationship between workplace policy towards internet abuse by organization employees. H2b: There is significant relationship between productivity towards internet abuse by organization employees. H3: There are significant relationship subjective norm towards Internet abuse by organization employees. H3a: There are significant relationship peers cultures towards Internet abuse by organization employees. H3b: There are significant relationship supervisor cultures towards Internet abuse by HYPOTHESISHYPOTHESIS
  • 8. • The result of this study would add to the knowledge that the internet abuses in organization are online friendship, non-related activities, online information abuse and cyber sexual. • The study contributes to organization by information that the attitudinal factors affect the extent of Internet media abuse. • The study contributes to organization by information that the perceived factors affect the extent of Internet media abuse. • The study contributes to organization by information that the subjective norm affect the extent of Internet media abuse. • The present study aims is to suggest organization combating internet media abuse by increase observation to the staff. RESEARCH CONTRIBUTIONRESEARCH CONTRIBUTION
  • 9. THEORETICAL FRAMEWORKTHEORETICAL FRAMEWORK Figure: Theoretical Framework Independent Variables Dependent Variable
  • 10. • Developed by Icek Ajzen • Extension of his Theory of Reasoned Action (TRA), since TRA states that actual behaviour is highly related to behavioural intention, but the results of some studies show that, because of circumstantial limitations, behavioural intention does not always lead to actual behaviour. • TPB adds the notion of Perceived behavioural control which refers to a person’s perceptions of their ability to perform a given behaviour. 1985 Theory of Planned Behaviour (TPB) Model and Theory
  • 11. Variable Indicators Citation Independent Attitudes Towards Behaviour Job satisfaction Internet addiction Job satisfaction, Heavy usage of internet, Internet addiction, Physical illness, Isolation from society, Inability predict time spend, Neglecting family and friends, Change in sleep pattern, Health problem. Stonton’s (2002) Chen,Chen & Yang (2008) Kershaw ( 2005) Independent Perceived Behaviour Control Workplace policy Productivity Internet use policies, Employee training, Monitoring internet use, Rehabilitation for abuse. Productivity measurement Young (2010) Vitak & LaRose (2011) Independent Subjective Norm Peers cultures Supervisor cultures Pressure to engage or not to engage in a behavior, Weighed by motivation to comply with the referent, Co-workers and senior influence, Internal and external containment. Ajzen (2006) Lee & Lee (2002) Rekless (1940) Dependent Internet Media Abuse Unauthorized & non related work, internet activity abuse, online friendship/relationship abuse, online information abuse criminal internet, miscellaneous internet abuse, Non-working related emails . Lee,Lim & Wong (2005) Griffth (2003), LITERATURE REVIEWLITERATURE REVIEW
  • 12. RESEARCH DESIGNRESEARCH DESIGN a. Research Design - Descriptive b. Quantitative – Hypothesis testing c. Type of investigation - causal study to investigate related element for independent variables and Internet Media Abuse Research Instruments: 1.Questionnaire - Administered through hand delivery 2.Secondary Data – Marang District Council, Emerald Inside etc, web pages (news online) a. Data Collection/Source – Marang District Council b. Time horizon – This study is cross- sectional. Data are gathered just one over are period of days in order to answer a research question Sampling : •Population –Marang District Council employee •Type – Probability Sampling Technique- (the simple random sampling) •Samples will be selected based on Krejcie and Morgan’s (1970) sampling table •Population- 194 people •Sample – 127 people •a total of 130 questionnaires were distributed to target respondents;127 respondents returned the questionnaires. Data Analysis: 1.Correlation analysis 2.Regression analysis Research Limitations: 1.Co-operation from organizations 2.Confidentiality of data collected
  • 13. Sample Characteristics  Frequency Percent % Gender Male 62 48.8 Female 65 51.2 Age <23 years 11 8.7 23-30 years 36 28.3 31-35 years 23 18.1 36-40 years 27 21.3 41-45 years 8 6.3 46-50 years 12 9.4 51-55 years 10 7.9 Category Management & Professional 28 22.0 Support 99 78.0 Service Period     1-5 years 31 24.4 6-10 years 36 28.3 10-15 years 22 17.3 16-20 years 11 8.7 21-25 years 10 7.9 26-30 years 8 6.3 More than 31 years 9 7.1
  • 14. Internet Usage Behavior during Office Hour Purpose  Frequency Percent Education 15 11.8 Social media 50 39.4 Financial 22 17.3 News 33 26.0 Entertainment 7 5.5 Time 8-11.59 am 25 19.7 12-1 pm 16 12.6 1-2 pm 45 35.4 3-4 pm 17 13.4 4-5 pm 11 8.7 > 5 pm 13 10.2
  • 15. Factor Analysis : Attitudes Towards Behavior Item Factor Loading (1) Internet Addiction (2) Job Satisfaction My office work suffer because of the amount of time spend online .764 I choose to surf internet rather than spend time with officemates .732 I snap, yell or act annoyed if someone bothers me while using the internet .732 I slept late due to surfing internet. .721 I am neglecting offices chores to spend more time on-line .715 My job productivity and job performance suffer because of the internet .665 I am feeling stay on-line longer than intended .622 I am feeling depressed, moody or nervous when off-line but it goes away once back on-line .621 I try to cut down the amount of time spent online and fail. .597 All in all, I am satsified with co-workers. .766 All in all, I am satisfied with the promotional opportunities .759 All in all, I am satisfied with subordinates .751 All in all, I am satisfied with my pay .684 All in all, I am satisfied with work of my job .657 Eigenvalue 5.034 2.236 % explained variances 31.12 20.81
  • 16. Factor Analysis : Perceived Behavioral Control Item Factor Loading (1) Productivity (2) Workplace (3) Perceived need I found myself in a trance and not be able to focus on the daily work .847 I found myself not working carefully as it should be .804 I found myself not working on working time .802 I'm having trouble working quality lower than expected .777 The use of the Internet during working hours for personal use is abuse .758 If my work place prohibit using the Internet for personal use , I will not do. .682 Use office internet for private use is unethical regardless of time .567 Use of the Internet for personal use at work is monitored by the employer .554 Working policy of ICT in the workplace is a guide when surfing the internet .510 I think employers should continue to use the internet in order to get information regarding employee affair .752 I think employers should encourage the use of the Internet to create a positive culture in the workplace .745 High-speed Internet in this office is a prerequisite for doing my daily tasks .666 Use office internet for personal use is acceptable if it does not interfere with daily tasks .514 Eigenvalue 3.068 2.152 1.519 % explained variances 20.29 15.82 15.72
  • 17. Factor Analysis : Subjective Norm Item Factor Loading (Subjective Norm) My supervisor influenced me to surf the Internet .872 I always surf the internet with my supervisor .829 I always surf the internet with colleagues .768 My colleague influence to surf the Internet .756 I always communicate with my supervisor via the internet ( using Facebook , Instagram , Twitter, Skype , E - mail or whatapp ) .685 Eigenvalue 3.079 % explained variances 61.57
  • 18. Factor Analysis : Internet Abuse Item Factor Loading (1) Hobby (2) Infomation (3) Transaction I like to participate in an online auction. .778 I love downloading and / or watching video, audio , images, text for personal purposes . .763 I often participate in newsgroups ( newsgroup ) which is not related to work .753 I like to download the software for personal use .692 I often participate in online game .687 I like to join the chat .630 I often surf the internet without purpose .585 I read the news online including sports , weather , etc. .779 I surf the internet to find information, products and services related to personal matters .609 I surf the internet to get information related to entertainment .604 I surf the internet to get information related to personal hobbies .577 I often use personal web mail, such as Yahoo , Hotmail or Gmail .577 I run an online business activities .824 I prefer to do online shopping. .746 I often perform investment activities and online banking .710 Eigenvalue 6.386 1.524 1.211 % explained variances 28.31 16.64 15.86
  • 19. Descriptive Statistics, Correlation & Reliability Analysis   α 1 IA 2 JS 3 Pr 4 Po 5 PN 6 SN 7 H 8 I 9 T 1 Internet addiction .868 1                 2 Job satisfaction .786 -.328** 1               3 Productivity .826 -.509** .203* 1             4 Policy .624 -.176* .275** .114 1           5 Perceived need .630 -.158 .216* .159 .280** 1         6 Subjective norms .838 .328** -.289** -.329** -.184* .239** 1       7 Hobby .871 .460** -.424** -.527** -.080 .040 .414** 1     8 Information .781 .286** -.241** -.279** -.091 .196* .393** .607** 1   9 Transaction .644 .332** -.228* -.244** -.018 .138 .265** .516** .544** 1 Mean 2.347 3.513 3.658 3.298 3.317 2.506 2.408 2.932 2.441 Standard Deviation .734 .632 .755 .575 .640 .811 .850 .792 .972 ** p < .01 (2-tailed), * p < .05 (2-tailed)
  • 20. Multiple Regression Result Predictor Hobby Information Transaction Beta t Beta t Beta t Internet addiction .181 2.212* .176 2.043* .334 3.873*** Job satisfaction -.327 -4.487***     -.179 -2.045* Productivity -.401 -5.080***         Perceived need .202 2.895**     .236 2.829** Policy             Subjective norm     3.906 .336***     F 24.07*** 13.822*** 9.875*** Adjusted R2 .423 .169 .176 ***p < .001, **p < .01, * p < .05
  • 21. DISCUSSIONDISCUSSION Variable Indicator Result Author Attitudes Towards Behavior Job satisfaction Significant Woon (2004); Polak (2003);  Stonton’s (2002) Internet addiction Significant Chen (2008) Perceived Behavior Control Workplace policy Not Significant Young (2010) Productivity Significant Vitak & La Rose  (2011) Subjective Norm Peers cultures Significant Woon & Pee  (2004)   Supervisor cultures Significant
  • 22. Result of Hypothesis Testing Independent Variable Result     Attitudes Towards Behavior   Job satisfaction Accepted Internet addiction Accepted Perceived behavioral controls   Workplace policy Rejected Productivity Accepted Subjective norm   Peers cultures Accepted Supervisor cultures Accepted
  • 23. RECOMMENDATIONS & CONCLUSIONRECOMMENDATIONS & CONCLUSION  The study shows a small local council in Terengganu affected with internet abuse phenomenon. The study shows majority employees use internet during working hours and affecting productivity.  (TERs)Training Enhancement Reward shoot  This study help to the organization :  Top management :  Information about Internet media abuse activities, the contributing factors and suitable countermeasures.  Employees :  to develop consciousness and conceivably to change mannerism about Internet media abuse.  Suggestion for future research :  to examine more organizations with wider respondents’ base and look into the development of code of conduct for internet abuse suitable for government agency( local authority , state and federal agency.)  other types of internet media abuse such those of crime offence: wagering, hacking, espionage and others. Other interesting initiative is to examine the destructive effects caused by internet media abuse to an organization.  to examine perceived need factor whether it contributes to internet media abuse and workplace policy as the moderator/ mediator for internet media abuse.  use other model such as Technology Acceptance Model (TAM), Technology-Organization- Environment (TOE) or Unified Theory of Acceptance and Use of Technology (UTAUT).
  • 24. • A theoretical and practical contribution to the knowledge, clear understanding to the factors contributes to internet media abuse at workplace. • The results also provide valuable inputs to the organization’s excellence. RECOMMENDATIONS & CONCLUSIONRECOMMENDATIONS & CONCLUSION
  • 29. Determinants of Internet Media Abuse InDeterminants of Internet Media Abuse In WorkplaceWorkplace