When does social desirability become a problem? Detection and reduction of social desirability bias in information systems research

Information & Management - Tập 58 - Trang 103500 - 2021
Dong-Heon (Austin) Kwak1, Xiao Ma2, Sumin Kim3
1Management & Information Systems, College of Business Administration, Kent State University, Kent, OH 44240, United States
2Decision & Information Sciences, C. T. Bauer College of Business, University of Houston, Houston, TX 77004, United States
3Management & Information Systems, Mississippi State University, Mississippi State, MS 39762, United States

Tài liệu tham khảo

McIntire, 2000 Arnold, 1985, The role of social-desirability response bias in turnover research, Acad. Manag. J., 28, 955, 10.2307/256249 Hart, 2015, The balanced inventory of desirable responding short form, Sage Open, 5, 1, 10.1177/2158244015621113 Paulhus, 1991, Measurement and control of response bias, 17 Gergely, 2016, Social desirability bias in software piracy research: evidence from pilot studies, 1 Kwan, 2010, Applying the randomized response technique to elicit truthful responses to sensitive questions in IS research: the case of software piracy behavior, Inf. Syst. Res., 21, 941, 10.1287/isre.1090.0271 Steenkamp, 2010, Socially desirable response tendencies in survey research, J. Mark. Res., 47, 199, 10.1509/jmkr.47.2.199 Chan, 2011, Does ethical ideology affect software piracy attitude and behaviour? An empirical investigation of computer users in China, Eur. J. Inf. Syst., 20, 659, 10.1057/ejis.2011.31 Chan, 2019, Cyberbullying on social networking sites: the crime opportunity and affordance perspectives, J. Manag. Inf. Syst., 36, 574, 10.1080/07421222.2019.1599500 Gergely, 2014, Social desirability bias in software piracy research, 1 Kwak, 2019, Measuring and controlling social desirability bias: applications in information systems research, J. Assoc. Inf. Syst., 20, 317 Sojer, 2014, Understanding the drivers of unethical programming behavior: the inappropriate reuse of internet-accessible code, J. Manag. Inf. Syst., 31, 287, 10.1080/07421222.2014.995563 Soror, 2015, Good habits gone bad: explaining negative consequences associated with the use of mobile phones from a dual-systems perspective, Inf. Syst. J., 25, 403, 10.1111/isj.12065 Turel, 2012, The benefits and dangers of enjoyment with social networking websites, Eur. J. Inf. Syst., 21, 512, 10.1057/ejis.2012.1 Turel, 2011, Integrating technology addiction and use: an empirical investigation of online auction users, 35, 1043 Vance, 2015, Increasing accountability through the user interface design artifacts: a new approach to addressing the problem of access-policy violations, MIS Q., 39, 345, 10.25300/MISQ/2015/39.2.04 Venkatesh, 2019, Children's internet addiction, family-to-work conflict, and job outcomes: a study of parent-child dyads, MIS Q., 43, 903, 10.25300/MISQ/2019/12338 Wang, 2011, Individual virtual competence and its influence on work outcomes, J. Manag. Inf. Syst., 27, 299, 10.2753/MIS0742-1222270410 Fisher, 1993, Social desirability bias and the validity of indirect questioning, J. Consum. Res., 20, 303, 10.1086/209351 De Jong, 2010, Reducing social desirability bias through item randomized response: an application to measure underreported desires, J. Mark. Res., 47, 14, 10.1509/jmkr.47.1.14 Bagozzi, 2011, Measurement and meaning in information systems and organizational research: methodological and philosophical foundations, 35, 261 Lazuras, 2010, Predictors of doping intentions in elite-level athletes: a social cognition approach, J. Sport Exerc. Psychol., 32, 694, 10.1123/jsep.32.5.694 Linehan, 1983, Social desirability: its relevance to the measurement of hopelessness and suicidal behavior, J. Consult. Clin. Psychol., 57, 141, 10.1037/0022-006X.51.1.141 Paulhus, 1981, Control of social desirability in personality inventories: principal-factor deletion, J. Res. Pers., 15, 383, 10.1016/0092-6566(81)90035-0 Paunonen, 2012, Socially desirable responding and its elusive effects on the validity of personality assessments, J. Pers. Soc. Psychol., 103, 158, 10.1037/a0028165 Fernandez, 2017, Anger parameters in parolees undergoing psychoeducation: temporal stability, social desirability bias, and comparison with non-offenders, Crim. Behav. Ment. Health, 28, 174, 10.1002/cbm.2057 Fernandez, 2019, Social desirability bias against admitting anger: bias in the test-taker or bias in the test?, J. Pers. Assess., 101, 644, 10.1080/00223891.2018.1464017 Bock, 2010, Why employees do non-work-related computing in the workplace, J. Comput. Inf. Syst., 50, 150 Khansa, 2017, To cyberloaf or not to cyberloaf: the impact of the announcement of formal organizational controls, J. Manag. Inf. Syst., 34, 141, 10.1080/07421222.2017.1297173 Lim, 2002, The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice, J. Organ. Behav., 23, 675, 10.1002/job.161 Lim, 2005, Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: an exploratory study, Inf. Manag., 42, 1081, 10.1016/j.im.2004.12.002 Connelly, 2016, A meta-analytic multitrait multirater separation of substance and style in social desirability scales, J. Pers., 84, 319, 10.1111/jopy.12161 McCrae, 1983, Social desirability scales: more substance than style, J. Consult. Clin. Psychol., 51, 882, 10.1037/0022-006X.51.6.882 Perinelli, 2016, Use of social desirability scales in clinical psychology: a systematic review, J. Clin. Psychol., 72, 534, 10.1002/jclp.22284 Paulhus, 2002, Socially desirable responding: the evolution of a construct, 67 Edwards, 1957 Wiggins, 1959, Interrelationships among MMPI measures of dissimulation under standard and social desirability instruction, J. Consult. Psychol., 23, 419, 10.1037/h0047823 Crowne, 1960, A new scale of social desirability independent of psychopathology, J. Consult. Psychol., 24, 349, 10.1037/h0047358 Paulhus, 1984, Two-component models of socially desirable responding, J. Pers. Soc. Psychol., 46, 598, 10.1037/0022-3514.46.3.598 Paulhus, 1988 Paulhus, 1998, Egoistic and moralistic biases in self-perception: the interplay of self-deceptive styles with basic traits and motives, J. Pers., 66, 1025, 10.1111/1467-6494.00041 Reynolds, 1982, Development of reliable and valid short forms of the Marlowe-Crowne social desirability scale, J. Clin. Psychol., 38, 119, 10.1002/1097-4679(198201)38:1<119::AID-JCLP2270380118>3.0.CO;2-I Ballard, 1988, Social desirability response bias and the Marlowe-Crowne social desirability scale, Psychol. Rep., 63, 227, 10.2466/pr0.1988.63.1.227 Lambert, 2016, The Marlowe–Crowne social desirability scale outperforms the BIDR impression management scale for identifying fakers, J. Res. Pers., 61, 80, 10.1016/j.jrp.2016.02.004 Robertson, 1974, Projective techniques in research, J. Advert. Res., 14, 27 Posey, 2011, When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse, J. Inf. Syst. Secur., 7, 24 Snow, 2007, The effects of optimistic and pessimistic biasing on software project status reporting, Inf. Manag., 44, 130, 10.1016/j.im.2006.10.009 Jann, 2012, Asking sensitive questions using the crosswise model: an experimental survey measuring plagiarism, Public Opin. Q., 76, 32, 10.1093/poq/nfr036 Lensvelt-Mulders, 2005, How to improve the efficiency of randomised response designs, Qual. Quant., 39, 253, 10.1007/s11135-004-0432-3 Serenko, 2019, A dual-attitude model of system use: the effect of explicit and implicit attitudes, Inf. Manag., 56, 657, 10.1016/j.im.2018.10.009 Serenko, 2020, Measuring implicit attitude in information systems research with the implicit association test, Commun. Assoc. Inf. Syst., 47, 397 Paulhus, 1981, Spheres of control: an interactionist approach to locus of control assessment Johnson, J. Global digital population as of January 2021, (2021). https://www.statista.com/statistics/617136/digital-population-worldwide/ (accessed April 18, 2021). Chesley, 2010, Technology use and employee assessments of work effectiveness, workload, and pace of life, Information, Commun. Soc., 13, 485 MacCormick, 2012, Engaged or just connected? Smartphones and employee engagement, Organ. Dyn., 41, 194, 10.1016/j.orgdyn.2012.03.007 Jamaluddin, 2015, Personal internet use: the use of personal mobile devices at the workplace, Procedia Soc. Behav. Sci., 172, 495, 10.1016/j.sbspro.2015.01.391 Vitak, 2011, Personal internet use at work: understanding cyberslacking, Comput. Hum. Behav., 27, 1751, 10.1016/j.chb.2011.03.002 Lee, 2019, Announcement of formal control as a phase-shifting perception and its moderating role in the context of mobile loafing Blanchard, 2008, Correlates of different forms of cyberloafing: the role of norms and external locus of control, Comput. Human Behav., 24, 1067, 10.1016/j.chb.2007.03.008 Ascher, 2015 Serenko, 2020, Directing technology addiction research in information systems: part I. Understanding behavioral addictions, Data Base Adv. Inf. Syst., 51, 81, 10.1145/3410977.3410982 Griffiths, 2018, Classifying behavioural addictions: the DSM, and over-pathologising everyday life, Psychol. Rev., 23, 18 Siponen, 2010, Neutralization: New insights into the problem of employee information systems security policy violations, 34, 487 Silic, 2017, A new perspective on neutralization and deterrence: predicting shadow IT usage, Inf. Manag., 54, 1023, 10.1016/j.im.2017.02.007 Sykes, 1957, Techniques of neutralization: a theory of delinquency, Am. Sociol. Rev., 22, 664, 10.2307/2089195 Davis, 1989, Perceived usefulness, perceived ease of use, and user acceptance of information technology, MIS Q., 13, 319, 10.2307/249008 Bhattacherjee, 2004, Understanding changes in belief and attitude toward information technology usage: a theoretical model and longitudinal test, MIS Q., 28, 229, 10.2307/25148634 Kim, 2009, The integrative framework of technology use: An extension and test, MIS Q., 33, 513, 10.2307/20650307 Kim, 2005, A longitudinal model of continued IS use: an integrative view of four mechanisms underlying postadoption phenomena, Manage. Sci., 51, 741, 10.1287/mnsc.1040.0326 Huh, 2008, Perception of and addiction to online games as a function of personality traits, J. Media Psychol., 13, 1 Mynatt, 1977, Confirmation bias in a simulated research environment: an experimental study of scientific inference, Q. J. Exp. Psychol., 29, 85, 10.1080/00335557743000053 Wason, 1960, On the failure to eliminate hypotheses in a conceptual task, Q. J. Exp. Psychol., 12, 129, 10.1080/17470216008416717 Akers, 1977 Barlow, 2018, Do not even think about it! The effects of antineutralization, informational, and normative communication on information security compliance, J. Assoc. Inf. Syst., 19, 689 Siponen, 2012, New insights into the problem of software piracy: the effects of neutralization, shame, and moral beliefs, Inf. Manag., 49, 334, 10.1016/j.im.2012.06.004 Byun, 2009, Internet addiction: metasynthesis of 1996–2006 quantitative research, CyberPsychol. Behav., 12, 203, 10.1089/cpb.2008.0102 Charlton, 2002, A factor-analytic investigation of computer “addiction” and engagement, Br. Psychol. Soc., 93, 329 Griffiths, 1999, Internet addiction: fact or fiction?, Psychologist, 12, 246 Davis, 2001, A cognitive-behavioral model of pathological internet use, Comput. Hum. Behav., 17, 187, 10.1016/S0747-5632(00)00041-8 Davis, 2002, Validation of a new scale for measuring problematic internet use: implications for pre-employment screening, Cyberpsychol. Behav., 5, 331, 10.1089/109493102760275581 Charlton, 2007, Distinguishing addiction and high engagement in the context of online game playing, Comput. Hum. Behav., 23, 1531, 10.1016/j.chb.2005.07.002 Kuem, 2017, What leads to prosocial behaviors on social networking services: a tripartite model, J. Manag. Inf. Syst., 34, 40, 10.1080/07421222.2017.1296744 Paulhus, D.L, Manual for the Paulhus deception scales: BIDR version 7, Toronto, Canada: Multi-Health Systems, (1998). Mason, 2012, Conducting behavior research on Amazon's Mechanical Turk, Behav. Res. Method, 44, 1, 10.3758/s13428-011-0124-6 Hair, 2009 Nunnally, 1994 Gefen, 2005, A practical guide to factorial validity using PLS-Graph: tutorial and annotated example, Commun. Assoc. Inf. Syst., 16, 91 Bollen, 1989 Leite, 2010, Detecting social desirability bias using factor mixture models, Multivar. Behav. Res., 45, 271, 10.1080/00273171003680245 Lo, 2001, Testing the number of components in a normal mixture, Biometrika, 88, 767, 10.1093/biomet/88.3.767 Chen, 1991, Negative affectivity as the underlying cause of correlations between stressors and strains, J. Appl. Psychol., 76, 398, 10.1037/0021-9010.76.3.398 Müller, 2019, True virtue, self-presentation, or both?: a behavioral test of impression management and overclaiming, Psychol. Assess., 31, 181, 10.1037/pas0000657 Uziel, 2010, Look at me, I'm happy and creative: the effect of impression management on behavior in social presence, Pers. Soc. Psychol. Bull., 36, 1591, 10.1177/0146167210386239 Sharma, 2020, I want it my way: using consumerism and neutralization theory to understand students’ cyberslacking behavior, Int. J. Inf. Manage., 53, 10.1016/j.ijinfomgt.2020.102131 Tourangeau, 1996, Asking sensitive questions: the impact of data collection mode, question format, and question context, Public Opin. Q., 60, 275, 10.1086/297751 Gittelman, 2015, Accounting for social-desirability bias in survey sampling: a model for predicting and calibrating the direction and magnitude of social-desirability bias, J. Advert. Res., 55, 242, 10.2501/JAR-2015-006 Gefen, 2000, Structural equation modeling and regression: guidelines for research practice, Commun. Assoc. Inf. Syst., 4, 1 Hu, 1999, Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives, Struct. Equ. Model., 6, 1, 10.1080/10705519909540118 Tucker, 1973, A reliability coefficient for maximum likelihood factor analysis, Psychometrika, 38, 1, 10.1007/BF02291170