DOTI Pre-ICIS Workshop 2018

The 3rd workshop on the Digitization of the Individual was held in San Francisco, USA, in conjunction with ICIS 2018 and was scheduled for December 12 2018, 1:00 PM – 5:30 PM. To promote further impactful research on individuals, strong emphasis during the workshop was given to paper development discussions, among others, facilitated by discussants providing direct feedback. This year’s workshop includes an expert panel on “the dark side” of the Digitization of the Individual. Special thanks for the panelists, Monideepa Tarafdar (Lancaster University), John D’Arcy (University of Delaware) and Hamed Qahri-Saremi (DePaul University, Chicago).

More Information:

Research Publication: The “Darth” Side of Technology at Work

Many of us begin our day at work by logging onto our computer, either to get straight to work, play online games, browse our social media feeds or watch alien videos on YouTube. But as information technology redefines our lives, the potential for IT misuse is increasing. Deviant IT use behaviors in the workplace has received increasing industry attention because it has resulted in not only productivity loss, but also public embarrassment, legal bills, compensation claims and clean-up costs for many companies. Further, personal use of workplace systems can seriously drain organizational computer networks and bandwidth usage, and undermine the security of the organization’s network. To help organizations better understand the characteristics of cyberdeviant behaviors, a new research article1 from a multidisciplinary group of international scholars developed a typology of cyberdeviance in the workplace. They propose that cyberdeviant behaviors can be divided between minor or serious in nature, whether they affect individuals or organizations, and whether they require low or high IT skills to execute. By using different combinations of the three dimensions, they come up with eight categories of cyberdeviant behaviors, including cyberslacking, unauthorized access and use of IT, computer abuse and cyberaggression. This newly developed typology will help managers distinguish between different cyberdeviant behaviors and implement suitable intervention strategies. So next time when you come to the office, remember to think twice before posting on social media or surfing the web. Big brother might be watching!


1Venkatraman, S., Cheung, C.M.K., Lee, Z.W.Y., Davis, F.D., & Venkatesh, V. (2018), The “Darth” Side of Technology Use: An Inductively Derived Typology of Cyberdeviance, Journal of Management Information Systems, 35(4), 1060-1091

Related Link:

The 24th Cross-Strait Conference of Information Management Development and Strategy (CSIM 2018) in Hong Kong

My honor to serve as the Co-Chair of the 24th Cross-Strait Conference on Information Management Development and Strategy (CSIM). CSIM is a collaborative platform that brings together scholars and researchers in the field of information management from mainland China, Hong Kong, Taiwan, and Macau, to promote academic exchanges and share research achievements. Universities from the four regions take turns to host this annual event since 1994. This 24th conference will feature research papers and keynote speakers that explore the opportunities and challenges of digital innovations.

Date: 24-26 August 2018
Venue: The University of Hong Kong