When does social desirability become a problem? Detection and reduction of social desirability bias in information systems research
Tài liệu tham khảo
McIntire, 2000
Arnold, 1985, The role of social-desirability response bias in turnover research, Acad. Manag. J., 28, 955, 10.2307/256249
Hart, 2015, The balanced inventory of desirable responding short form, Sage Open, 5, 1, 10.1177/2158244015621113
Paulhus, 1991, Measurement and control of response bias, 17
Gergely, 2016, Social desirability bias in software piracy research: evidence from pilot studies, 1
Kwan, 2010, Applying the randomized response technique to elicit truthful responses to sensitive questions in IS research: the case of software piracy behavior, Inf. Syst. Res., 21, 941, 10.1287/isre.1090.0271
Steenkamp, 2010, Socially desirable response tendencies in survey research, J. Mark. Res., 47, 199, 10.1509/jmkr.47.2.199
Chan, 2011, Does ethical ideology affect software piracy attitude and behaviour? An empirical investigation of computer users in China, Eur. J. Inf. Syst., 20, 659, 10.1057/ejis.2011.31
Chan, 2019, Cyberbullying on social networking sites: the crime opportunity and affordance perspectives, J. Manag. Inf. Syst., 36, 574, 10.1080/07421222.2019.1599500
Gergely, 2014, Social desirability bias in software piracy research, 1
Kwak, 2019, Measuring and controlling social desirability bias: applications in information systems research, J. Assoc. Inf. Syst., 20, 317
Sojer, 2014, Understanding the drivers of unethical programming behavior: the inappropriate reuse of internet-accessible code, J. Manag. Inf. Syst., 31, 287, 10.1080/07421222.2014.995563
Soror, 2015, Good habits gone bad: explaining negative consequences associated with the use of mobile phones from a dual-systems perspective, Inf. Syst. J., 25, 403, 10.1111/isj.12065
Turel, 2012, The benefits and dangers of enjoyment with social networking websites, Eur. J. Inf. Syst., 21, 512, 10.1057/ejis.2012.1
Turel, 2011, Integrating technology addiction and use: an empirical investigation of online auction users, 35, 1043
Vance, 2015, Increasing accountability through the user interface design artifacts: a new approach to addressing the problem of access-policy violations, MIS Q., 39, 345, 10.25300/MISQ/2015/39.2.04
Venkatesh, 2019, Children's internet addiction, family-to-work conflict, and job outcomes: a study of parent-child dyads, MIS Q., 43, 903, 10.25300/MISQ/2019/12338
Wang, 2011, Individual virtual competence and its influence on work outcomes, J. Manag. Inf. Syst., 27, 299, 10.2753/MIS0742-1222270410
Fisher, 1993, Social desirability bias and the validity of indirect questioning, J. Consum. Res., 20, 303, 10.1086/209351
De Jong, 2010, Reducing social desirability bias through item randomized response: an application to measure underreported desires, J. Mark. Res., 47, 14, 10.1509/jmkr.47.1.14
Bagozzi, 2011, Measurement and meaning in information systems and organizational research: methodological and philosophical foundations, 35, 261
Lazuras, 2010, Predictors of doping intentions in elite-level athletes: a social cognition approach, J. Sport Exerc. Psychol., 32, 694, 10.1123/jsep.32.5.694
Linehan, 1983, Social desirability: its relevance to the measurement of hopelessness and suicidal behavior, J. Consult. Clin. Psychol., 57, 141, 10.1037/0022-006X.51.1.141
Paulhus, 1981, Control of social desirability in personality inventories: principal-factor deletion, J. Res. Pers., 15, 383, 10.1016/0092-6566(81)90035-0
Paunonen, 2012, Socially desirable responding and its elusive effects on the validity of personality assessments, J. Pers. Soc. Psychol., 103, 158, 10.1037/a0028165
Fernandez, 2017, Anger parameters in parolees undergoing psychoeducation: temporal stability, social desirability bias, and comparison with non-offenders, Crim. Behav. Ment. Health, 28, 174, 10.1002/cbm.2057
Fernandez, 2019, Social desirability bias against admitting anger: bias in the test-taker or bias in the test?, J. Pers. Assess., 101, 644, 10.1080/00223891.2018.1464017
Bock, 2010, Why employees do non-work-related computing in the workplace, J. Comput. Inf. Syst., 50, 150
Khansa, 2017, To cyberloaf or not to cyberloaf: the impact of the announcement of formal organizational controls, J. Manag. Inf. Syst., 34, 141, 10.1080/07421222.2017.1297173
Lim, 2002, The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice, J. Organ. Behav., 23, 675, 10.1002/job.161
Lim, 2005, Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: an exploratory study, Inf. Manag., 42, 1081, 10.1016/j.im.2004.12.002
Connelly, 2016, A meta-analytic multitrait multirater separation of substance and style in social desirability scales, J. Pers., 84, 319, 10.1111/jopy.12161
McCrae, 1983, Social desirability scales: more substance than style, J. Consult. Clin. Psychol., 51, 882, 10.1037/0022-006X.51.6.882
Perinelli, 2016, Use of social desirability scales in clinical psychology: a systematic review, J. Clin. Psychol., 72, 534, 10.1002/jclp.22284
Paulhus, 2002, Socially desirable responding: the evolution of a construct, 67
Edwards, 1957
Wiggins, 1959, Interrelationships among MMPI measures of dissimulation under standard and social desirability instruction, J. Consult. Psychol., 23, 419, 10.1037/h0047823
Crowne, 1960, A new scale of social desirability independent of psychopathology, J. Consult. Psychol., 24, 349, 10.1037/h0047358
Paulhus, 1984, Two-component models of socially desirable responding, J. Pers. Soc. Psychol., 46, 598, 10.1037/0022-3514.46.3.598
Paulhus, 1988
Paulhus, 1998, Egoistic and moralistic biases in self-perception: the interplay of self-deceptive styles with basic traits and motives, J. Pers., 66, 1025, 10.1111/1467-6494.00041
Reynolds, 1982, Development of reliable and valid short forms of the Marlowe-Crowne social desirability scale, J. Clin. Psychol., 38, 119, 10.1002/1097-4679(198201)38:1<119::AID-JCLP2270380118>3.0.CO;2-I
Ballard, 1988, Social desirability response bias and the Marlowe-Crowne social desirability scale, Psychol. Rep., 63, 227, 10.2466/pr0.1988.63.1.227
Lambert, 2016, The Marlowe–Crowne social desirability scale outperforms the BIDR impression management scale for identifying fakers, J. Res. Pers., 61, 80, 10.1016/j.jrp.2016.02.004
Robertson, 1974, Projective techniques in research, J. Advert. Res., 14, 27
Posey, 2011, When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse, J. Inf. Syst. Secur., 7, 24
Snow, 2007, The effects of optimistic and pessimistic biasing on software project status reporting, Inf. Manag., 44, 130, 10.1016/j.im.2006.10.009
Jann, 2012, Asking sensitive questions using the crosswise model: an experimental survey measuring plagiarism, Public Opin. Q., 76, 32, 10.1093/poq/nfr036
Lensvelt-Mulders, 2005, How to improve the efficiency of randomised response designs, Qual. Quant., 39, 253, 10.1007/s11135-004-0432-3
Serenko, 2019, A dual-attitude model of system use: the effect of explicit and implicit attitudes, Inf. Manag., 56, 657, 10.1016/j.im.2018.10.009
Serenko, 2020, Measuring implicit attitude in information systems research with the implicit association test, Commun. Assoc. Inf. Syst., 47, 397
Paulhus, 1981, Spheres of control: an interactionist approach to locus of control assessment
Johnson, J. Global digital population as of January 2021, (2021). https://www.statista.com/statistics/617136/digital-population-worldwide/ (accessed April 18, 2021).
Chesley, 2010, Technology use and employee assessments of work effectiveness, workload, and pace of life, Information, Commun. Soc., 13, 485
MacCormick, 2012, Engaged or just connected? Smartphones and employee engagement, Organ. Dyn., 41, 194, 10.1016/j.orgdyn.2012.03.007
Jamaluddin, 2015, Personal internet use: the use of personal mobile devices at the workplace, Procedia Soc. Behav. Sci., 172, 495, 10.1016/j.sbspro.2015.01.391
Vitak, 2011, Personal internet use at work: understanding cyberslacking, Comput. Hum. Behav., 27, 1751, 10.1016/j.chb.2011.03.002
Lee, 2019, Announcement of formal control as a phase-shifting perception and its moderating role in the context of mobile loafing
Blanchard, 2008, Correlates of different forms of cyberloafing: the role of norms and external locus of control, Comput. Human Behav., 24, 1067, 10.1016/j.chb.2007.03.008
Ascher, 2015
Serenko, 2020, Directing technology addiction research in information systems: part I. Understanding behavioral addictions, Data Base Adv. Inf. Syst., 51, 81, 10.1145/3410977.3410982
Griffiths, 2018, Classifying behavioural addictions: the DSM, and over-pathologising everyday life, Psychol. Rev., 23, 18
Siponen, 2010, Neutralization: New insights into the problem of employee information systems security policy violations, 34, 487
Silic, 2017, A new perspective on neutralization and deterrence: predicting shadow IT usage, Inf. Manag., 54, 1023, 10.1016/j.im.2017.02.007
Sykes, 1957, Techniques of neutralization: a theory of delinquency, Am. Sociol. Rev., 22, 664, 10.2307/2089195
Davis, 1989, Perceived usefulness, perceived ease of use, and user acceptance of information technology, MIS Q., 13, 319, 10.2307/249008
Bhattacherjee, 2004, Understanding changes in belief and attitude toward information technology usage: a theoretical model and longitudinal test, MIS Q., 28, 229, 10.2307/25148634
Kim, 2009, The integrative framework of technology use: An extension and test, MIS Q., 33, 513, 10.2307/20650307
Kim, 2005, A longitudinal model of continued IS use: an integrative view of four mechanisms underlying postadoption phenomena, Manage. Sci., 51, 741, 10.1287/mnsc.1040.0326
Huh, 2008, Perception of and addiction to online games as a function of personality traits, J. Media Psychol., 13, 1
Mynatt, 1977, Confirmation bias in a simulated research environment: an experimental study of scientific inference, Q. J. Exp. Psychol., 29, 85, 10.1080/00335557743000053
Wason, 1960, On the failure to eliminate hypotheses in a conceptual task, Q. J. Exp. Psychol., 12, 129, 10.1080/17470216008416717
Akers, 1977
Barlow, 2018, Do not even think about it! The effects of antineutralization, informational, and normative communication on information security compliance, J. Assoc. Inf. Syst., 19, 689
Siponen, 2012, New insights into the problem of software piracy: the effects of neutralization, shame, and moral beliefs, Inf. Manag., 49, 334, 10.1016/j.im.2012.06.004
Byun, 2009, Internet addiction: metasynthesis of 1996–2006 quantitative research, CyberPsychol. Behav., 12, 203, 10.1089/cpb.2008.0102
Charlton, 2002, A factor-analytic investigation of computer “addiction” and engagement, Br. Psychol. Soc., 93, 329
Griffiths, 1999, Internet addiction: fact or fiction?, Psychologist, 12, 246
Davis, 2001, A cognitive-behavioral model of pathological internet use, Comput. Hum. Behav., 17, 187, 10.1016/S0747-5632(00)00041-8
Davis, 2002, Validation of a new scale for measuring problematic internet use: implications for pre-employment screening, Cyberpsychol. Behav., 5, 331, 10.1089/109493102760275581
Charlton, 2007, Distinguishing addiction and high engagement in the context of online game playing, Comput. Hum. Behav., 23, 1531, 10.1016/j.chb.2005.07.002
Kuem, 2017, What leads to prosocial behaviors on social networking services: a tripartite model, J. Manag. Inf. Syst., 34, 40, 10.1080/07421222.2017.1296744
Paulhus, D.L, Manual for the Paulhus deception scales: BIDR version 7, Toronto, Canada: Multi-Health Systems, (1998).
Mason, 2012, Conducting behavior research on Amazon's Mechanical Turk, Behav. Res. Method, 44, 1, 10.3758/s13428-011-0124-6
Hair, 2009
Nunnally, 1994
Gefen, 2005, A practical guide to factorial validity using PLS-Graph: tutorial and annotated example, Commun. Assoc. Inf. Syst., 16, 91
Bollen, 1989
Leite, 2010, Detecting social desirability bias using factor mixture models, Multivar. Behav. Res., 45, 271, 10.1080/00273171003680245
Lo, 2001, Testing the number of components in a normal mixture, Biometrika, 88, 767, 10.1093/biomet/88.3.767
Chen, 1991, Negative affectivity as the underlying cause of correlations between stressors and strains, J. Appl. Psychol., 76, 398, 10.1037/0021-9010.76.3.398
Müller, 2019, True virtue, self-presentation, or both?: a behavioral test of impression management and overclaiming, Psychol. Assess., 31, 181, 10.1037/pas0000657
Uziel, 2010, Look at me, I'm happy and creative: the effect of impression management on behavior in social presence, Pers. Soc. Psychol. Bull., 36, 1591, 10.1177/0146167210386239
Sharma, 2020, I want it my way: using consumerism and neutralization theory to understand students’ cyberslacking behavior, Int. J. Inf. Manage., 53, 10.1016/j.ijinfomgt.2020.102131
Tourangeau, 1996, Asking sensitive questions: the impact of data collection mode, question format, and question context, Public Opin. Q., 60, 275, 10.1086/297751
Gittelman, 2015, Accounting for social-desirability bias in survey sampling: a model for predicting and calibrating the direction and magnitude of social-desirability bias, J. Advert. Res., 55, 242, 10.2501/JAR-2015-006
Gefen, 2000, Structural equation modeling and regression: guidelines for research practice, Commun. Assoc. Inf. Syst., 4, 1
Hu, 1999, Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives, Struct. Equ. Model., 6, 1, 10.1080/10705519909540118
Tucker, 1973, A reliability coefficient for maximum likelihood factor analysis, Psychometrika, 38, 1, 10.1007/BF02291170