Search results

1 – 10 of 71
Article
Publication date: 7 November 2023

Yue Zhou, Peiyi Chen, Qingqing Liu and Tingxi Wang

The purpose of the study is to explore the relationship between leader bottom-line mentality (BLM) and employee social cyberloafing behavior. Based on social exchange theory, the…

Abstract

Purpose

The purpose of the study is to explore the relationship between leader bottom-line mentality (BLM) and employee social cyberloafing behavior. Based on social exchange theory, the authors propose that leader BLM will promote employee social cyberloafing behavior via psychological contract breach, especially when employee needs for relatedness is high.

Design/methodology/approach

To test the hypotheses, the authors conducted a multi-wave, multi-source field study with 185 paired employee–leader dyads at three time points. The hypotheses were tested by Mplus with a bootstrap approach to obtain confidence intervals.

Findings

The results show that leader BLM has a positive impact on employee social cyberloafing behavior, which is mediated by psychological contract breach. In addition, employee needs for relatedness moderates this process. Specifically, when employees pertain high needs for relatedness, the influence of leader BLM will be stronger.

Practical implications

This research paper highlights the detrimental influence of leader BLM and provide directions for preventing employee cyberloafing behavior.

Originality/value

Previous studies have drawn inconsistent conclusions on the effectiveness of leader BLM, such as enhancing task performance and eliciting social undermining. This study further explores the underlying mechanism linking leader BLM to employee social cyberloafing behavior and the boundary conditions. This has subsequently provided practitioners with new perspectives regarding why employees engage in counter-productive social cyberloafing.

Details

Journal of Managerial Psychology, vol. 38 no. 8
Type: Research Article
ISSN: 0268-3946

Keywords

Article
Publication date: 17 November 2023

Junwei Zhang, Kun Xie, Yajun Zhang and Yongqi Wang

The substantial cost of employee cyberloafing to organizations calls for research into exploring the factors that influence such behavior. Drawing upon social cognitive theory…

Abstract

Purpose

The substantial cost of employee cyberloafing to organizations calls for research into exploring the factors that influence such behavior. Drawing upon social cognitive theory, the authors develop a theoretical model that unpacks when and why leader forgiveness induces employee cyberloafing. Specifically, the authors identify moral disengagement as a linking mechanism and employee empathic concern as a key boundary condition in the association between leader forgiveness and employee cyberloafing behaviors.

Design/methodology/approach

The authors conducted multilevel analyses to examine the authors' hypotheses by utilizing a sample of 71 supervisors and 306 direct reports.

Findings

Results showed that leader forgiveness encouraged employee cyberloafing via moral disengagement among employees with low empathic concern, whereas the indirect effect was not present among those with high empathic concern.

Originality/value

The authors contribute to the literature on cyberloafing and leader forgiveness. First, this study extends the cyberloafing research by considering leader forgiveness as an enabler, challenging the dominant notion that positive leader behaviors (e.g. leader mindfulness) constrain employee cyberloafing while negative leader behaviors (e.g. abusive supervision) elicit it. Second, although past studies have predominantly concentrated on the positive outcomes of forgiveness, the current research contributes to the balanced and comprehensive understanding of leader forgiveness by linking leader forgiveness with employee cyberloafing.

Details

Management Decision, vol. 62 no. 1
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 8 June 2023

Kian Yeik Koay and Catherine Hui Yi Lai

The purpose of this study is to better understand the effect of workplace ostracism on cyberloafing by examining the mediating effect of moral disengagement. The role of…

Abstract

Purpose

The purpose of this study is to better understand the effect of workplace ostracism on cyberloafing by examining the mediating effect of moral disengagement. The role of organisational commitment as a moderator of the association between workplace ostracism and cyberloafing is also examined.

Design/methodology/approach

The proposed hypotheses are tested with survey data collected from 243 employees among public listed companies in Malaysia. Data are analysed using partial least squares structural equation modelling.

Findings

The results show that workplace ostracism has a significant positive influence on cyberloafing. Furthermore, it is observed that workplace ostracism serves as a mediating factor in the link between workplace ostracism and cyberloafing. Finally, organisational commitment is revealed to have no significant moderating effect on the relationship between workplace ostracism and cyberloafing.

Originality/value

To the best of the authors’ knowledge, this is the first study to build and test a model based on social cognitive theory that examines the fundamental mechanisms through which workplace ostracism influences cyberloafing.

Details

Management Research Review, vol. 46 no. 12
Type: Research Article
ISSN: 2040-8269

Keywords

Article
Publication date: 19 April 2023

Parisa Heidari Aqagoli, Ali Safari and Arash Shahin

The purpose of this paper is to determine the attractiveness or unattractiveness of cyberloafing in the workplace using Q methodology and the Kano model.

Abstract

Purpose

The purpose of this paper is to determine the attractiveness or unattractiveness of cyberloafing in the workplace using Q methodology and the Kano model.

Design/methodology/approach

The perception of employees towards cyberloafing was investigated based on Q methodology, and then they were prioritized using Kano model. Ten IT companies were selected for the case study. In this study, a mixed method was used. First, 30 participants were interviewed. Next, after extracting the comments, Q-matrix was presented to 30 participants and they completed the matrix cells. Finally, Kano questionnaire was designed using the items obtained from Q methodology and distributed among 30 participants.

Findings

Q methodology led to nine perceptions, and the priorities of Kano model were proponents of increasing employees' dependence on the internet, economic thinkers, the indifferent, dissatisfied, proponents of receiving information, self-control proponents, the profit-minded, mind destroyer and satisfaction-oriented. Cyberloafing is considered unattractiveness with adverse effects. The combination of Q methodology and Kano model can improve the analysis of the results.

Originality/value

This study is one of the few studies in which Q methodology is improved by Kano model. In the past, Q methodology alone examined people’s perception, but by combining these two methods, it is determined which perception is more satisfying and which one is more important, and then a general result can be reached.

Details

International Journal of Organizational Analysis, vol. 32 no. 2
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 7 April 2023

Arindam Bhattacharjee and Anita Sarkar

Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while…

Abstract

Purpose

Cyberloafing is an organization-directed counterproductive work behavior (CWB). One stream of literature deems cyberloafing to be bad for organizations and their employees, while another suggests cyberloafing is a coping response to stressful work events. Our work contributes to the latter stream of literature. The key objective of our study is to examine whether cyberloafing could be a means to cope with a stressful work event-abusive supervision, and if yes, what mediating and boundary conditions are involved. For this investigation, the authors leveraged the Stressor-Emotion-CWB theory which posits that individuals engage in CWB to cope with the negative affect generated by the stressors and that this relationship is moderated at the first stage by personality traits.

Design/methodology/approach

Using a multi-wave survey design, the authors collected data from 357 employees working in an Indian IT firm. Results revealed support for three out of the four hypotheses.

Findings

Based on the Stressor-Emotion-CWB theory, the authors found that work-related negative affect fully mediated the positive relationship between abusive supervision and cyberloafing, and work locus of control (WLOC) moderated the positive relationship between abusive supervision and work-related negative affect. The authors did not find any evidence of a direct relationship between abusive supervision and cyberloafing. Also, the positive indirect relationship between abusive supervision and cyberloafing through work-related negative affect was moderated at the first stage by the WLOC such that the indirect effect was stronger (weaker) at high (low) levels of WLOC.

Originality/value

This work demonstrates that cyberloafing could be a way for employees to cope with their abusive supervisors.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 3 November 2023

Rong Wang, Zijun Li, Chunyu Bu and Wenbo Zhu

The authors investigated how and when work connectivity behavior after-hours (WCBA) spilled over to cyberloafing, considering ego depletion as a mediator and motivations and…

Abstract

Purpose

The authors investigated how and when work connectivity behavior after-hours (WCBA) spilled over to cyberloafing, considering ego depletion as a mediator and motivations and workaholism as moderators. This paper aims to discuss the aforementioned objective.

Design/methodology/approach

In Study 1, 380 employees participated in a scenario experiment with a 2 × 2 between-subjects design. Studies 2 and 3 involved 483 and 406 employees, respectively in two two-wave surveys.

Findings

WCBA was indirectly linked to cyberloafing via ego depletion. However, when WCBA was driven by high autonomous and low controlled motivation, it exerted less influence on ego depletion, thus weakening the mediating effect of ego depletion. Moreover, the association between WCBA and ego depletion was not significant among employees accustomed to excessive work. The indirect effect of ego depletion also operated contingently on the level of excessive work.

Originality/value

The findings shed light on the spillover effects of WCBA, suggesting that WCBA may lead to cyberloafing by depleting resources. However, the influence of WCBA on ego depletion is concealed when employees engage in WCBA autonomously or are habituated to excessive work.

Details

Journal of Managerial Psychology, vol. 38 no. 8
Type: Research Article
ISSN: 0268-3946

Keywords

Article
Publication date: 12 February 2024

Kate-Riin Kont

This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates…

Abstract

Purpose

This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates Estonian library staff awareness of information security and shares recommendations concerning focus areas that should be given more attention in the future.

Design/methodology/approach

The data used in this paper is based on an overview of relevant literature highlighting the theoretical points and giving the reasons why human factor is considered the weakest link in information security and cyber security and studying how to mitigate the related risks in the organisation. To perform the survey, a web questionnaire was designed which included 63 sentences and was developed based on the knowledge-attitude-behaviour (KAB) model supported by Kruger and Kearney and Human Aspects of Information Security Questionnaire (HAIS-Q) designed by Parsons et al.

Findings

The research results show that the information security awareness of library employees is at a good level; however, awareness in two focus areas needs special attention and should be improved. The output of this study is the mapping of seven focus areas of information security policy in libraries based on the HAIS-Q framework and the KAB model.

Originality/value

The cyber awareness of library employees has not been studied in the world using HAIS-Q and KAB model, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.

Details

Library Management, vol. 45 no. 1/2
Type: Research Article
ISSN: 0143-5124

Keywords

Article
Publication date: 5 April 2024

Manoj Krishnan and Satish Krishnan

The study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.

Abstract

Purpose

The study aims to drive conceptual clarity around resistance to information technology projects, integrating multiple facets of the phenomenon from earlier studies.

Design/methodology/approach

The study conducts a meta-synthesis of qualitative studies on resistance to technology projects; it analyzes those studies at a case-specific level, compares and contrasts emergent concepts against each other, and “translates” those to the rest of the studies. The study uses the seven-step meta-ethnography method by Noblit and Hare to reciprocally translate emergent concepts to construct the conceptual model.

Findings

Through meta-synthesis, the study derives a new conceptual model for resistance to information technology projects, exemplifying how the identified antecedents create user resistance and how the phenomenon progresses within organizations.

Research limitations/implications

This study enriches the observations and conclusions of past individual studies while explicating various facets of the mechanisms that generate and progress technology resistance within organizations. It offers fresh insights into the equivocal nature of the phenomenon and the distinctive ways it progresses from individual to group level.

Practical implications

Many ambitious and costly digital transformation efforts do not succeed due to user resistance. Understanding the mechanisms that create user resistance can help organizations manage technology projects better, thereby reducing the technology assimilation gap and protecting returns on related investments.

Originality/value

There have been extensive studies on technology acceptance (enablers) within organizations, while those relating to technology inhibitors are somewhat limited. However, the symmetry of understanding between enablers and inhibitors is vital for organizations to assimilate promising technologies and transform their business models. This model uses a new lens of sensemaking theory to explain how the antecedents trigger perceived threats and resistance behavior; it highlights the nuances around the development of resistance within individuals and its progression to groups. The resultant model offers better generalizability in organizational contexts.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 14 December 2023

Durrey Shahwar and Rajib Lochan Dhar

The current digital work environment promoting a “constant-on” culture is a hotbed for cyber incivility. Thus, there is a pressing need to understand its mechanisms. This study…

Abstract

Purpose

The current digital work environment promoting a “constant-on” culture is a hotbed for cyber incivility. Thus, there is a pressing need to understand its mechanisms. This study aims to shed light on the triggers, sources and impact of rude behaviours in cyberspace. The authors also present the boundary conditions that exacerbate or alleviate the effects of such negative experiences.

Design/methodology/approach

Through a systematic literature review based on predefined search protocols, the authors synthesised the current knowledge on cyber incivility and identified 21 peer-reviewed research articles.

Findings

The findings reveal the different sources of cyber incivility, its personal, relational and organisational antecedents and consequences, and its personal and situational boundary conditions that curb or enhance the negative impact.

Research limitations/implications

The authors unravel the main future research avenues based on the review findings by systemising knowledge on cyber incivility. Managerial efforts in the form of interventions and mitigation are also discussed to help combat this grieving issue in the workplace.

Originality/value

This paper presents the first systematic review of the cyber incivility literature and identifies new avenues for future research. Scholars can expand upon the findings of this study to fill gaps and move the incivility in cyberspace forward. It also offers practical insights on mitigating the advancement of such behaviours in organisations.

Details

International Journal of Conflict Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 19 January 2024

Shubh Majumdarr and Shilpee A. Dasgupta

Job embeddedness is considered crucial for organizational success, as it promotes social capital and helps to reduce turnover. A holistic review of job embeddedness remains…

Abstract

Purpose

Job embeddedness is considered crucial for organizational success, as it promotes social capital and helps to reduce turnover. A holistic review of job embeddedness remains elusive despite gaining researchers' and practitioners' attention. Therefore, this study aims to synthesize the past literature to understand the concepts and emerging themes in the domain. Further, it helps identify future research avenues and proposes a comprehensive conceptual framework.

Design/methodology/approach

The study used bibliographic data of 263 Scopus-indexed publications from inception, i.e. 2001 to 2021, which were subsequently analyzed using diverse bibliometric and content analysis (TCCM) framework and software like Microsoft Excel, Vosviewer and “Biblioshiny” package in R language.

Findings

The study analyzes the domain via performance analysis which sheds light on the increasing publication trends and different significant contributors (authors, publications, countries, journals and universities). Science mapping techniques such as keyword analysis identifies author keyword evolution and trends. The content analysis showcases the dominance of diverse psychological theories applied in the domain. Also, the bibliographic-coupling analysis highlights major clusters and associated research publications. The study provides future research avenues, followed by a conceptual framework highlighting the antecedents, moderators and outcomes of job embeddedness.

Originality/value

This study is the first bibliometric and content analysis exploring job embeddedness and will aid in developing a comprehensive understanding of the research topic.

Details

Employee Relations: The International Journal, vol. 46 no. 2
Type: Research Article
ISSN: 0142-5455

Keywords

1 – 10 of 71