Abstract
Compulsive smartphone use has received increasing attention due to its ubiquitous and disturbing outcomes. However, integrative research that investigates the process and possible antecedents of compulsive behavior in the use of smartphones remains limited. Based on an extensive review of literature on compulsive behavior, we define compulsive smartphone use in general and explain its specific differences from other compulsive behaviors. We propose a research model that uses the reinforcement sensitivity approach to provide a better understanding and explanation for compulsive smartphone use. Both craving and compensation lenses are systematically integrated into this theoretical foundation to identify the underlying mechanism of compulsive smartphone use. We further identify possible situational factors that influence reinforcement sensitivity from social, experiential, and technological perspectives. We believe such an integration of both craving and compensation mechanisms is of crucial importance for scientific and practical research.
| Original language | English |
|---|---|
| Title of host publication | International Conference on Information Systems (ICIS 2014) |
| Subtitle of host publication | Building a Better World Through Information Systems |
| Publisher | Association for Information Systems |
| Pages | 1850-1861 |
| Volume | 3 |
| ISBN (Print) | 9781634396943 |
| Publication status | Published - Dec 2014 |
| Event | 35th International Conference on Information Systems (ICIS 2014): Building a Better World Through Information Systems - Auckland, New Zealand Duration: 14 Dec 2014 → 17 Dec 2014 http://archives.aisconferences.org/icis2014/ http://icis2014.aisnet.org/ |
Conference
| Conference | 35th International Conference on Information Systems (ICIS 2014) |
|---|---|
| Abbreviated title | ICIS2014 |
| Place | New Zealand |
| City | Auckland |
| Period | 14/12/14 → 17/12/14 |
| Internet address |
Research Keywords
- Compulsive behavior
- Feedback mechanism
- Negative social influence
- Perceived risk
- Problematic IT use
- Reinforcement sensitivity
- Smartphone