Search results

1 – 10 of 89
Article
Publication date: 26 February 2020

Sauvik Kumar Batabyal and Kanika Tandon Bhal

Possession and usage of data-enabled smartphones have added further complexity to the issue of cyberloafing behavior and it certainly evokes newer ethical concerns. This study…

1070

Abstract

Purpose

Possession and usage of data-enabled smartphones have added further complexity to the issue of cyberloafing behavior and it certainly evokes newer ethical concerns. This study aims to explore how working individuals perceive the ethicality of their cyberloafing behaviors at the workplace and the cognitive logics they apply to justify their cyberloafing behavior.

Design/methodology/approach

Incorporating constructivist grounded theory methodology, 19 working managers from various organizations were interviewed face-to-face and responses were audio-recorded with prior consent. The recordings were transcribed verbatim, simultaneously analyzed and coded to let the themes emerge out of the data.

Findings

The research showed that working managers use varied combinations of office computers, personal laptops, smartphones, wireless internet provided at the office and personal mobile-internet to loaf around at workplaces. Moreover, it unearthed that employees use nine different neutralization techniques and six different ethical logics (with normative undertones) in a network fashion while considering the ethicality of cyberloafing behavior.

Practical implications

Recognizing the complexities is imperative to moderate any deviant behavior in an organization. The layers of ethicality and neutralization tactics will equip the working managers and companies to place the required internet and smartphone usage policies in the future.

Originality/value

This research has taken into account all forms of cyberloafing behaviors. The perceived ethicality of cyberloafing behavior at the workplace was not fully explored in a holistic manner before, specifically in the Indian context.

Details

Journal of Information, Communication and Ethics in Society, vol. 18 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 6 July 2021

Dong-Heon Kwak, Saerom Lee, Xiao Ma, Jaeung Lee, Khansa Lara and Alan Brandyberry

Mobile loafing, or non-work-related mobile computing, is deviant workplace behavior that can reduce productivity and increase cybersecurity risks. To thwart mobile loafing…

Abstract

Purpose

Mobile loafing, or non-work-related mobile computing, is deviant workplace behavior that can reduce productivity and increase cybersecurity risks. To thwart mobile loafing, organizations often adopt formal controls that encompass rules and policies. These formal controls can serve as a phase-shifting event. Phase shifting is a process where individuals reevaluate and revise their perceptions of the regulation of deviant behaviors. Despite the importance of understanding this process, little research has examined the announcement of formal controls as an impetus for phase shifting. The primary objectives of this study were to induce a phase-shifting perception in an organizational setting and explore its determinants and moderating role in the context of mobile loafing.

Design/methodology/approach

The authors proposed and tested a model using two-wave data collected from 231 Amazon Mechanical Turk workers. To test the research hypotheses, they used covariance-based structural equation modeling and logistic regression.

Findings

The authors found that peer's mobile loafing and neutralization positively influence mobile-loafing intention before and after the announcement of formal controls. This research also shows that the higher an employee's neutralization, the likelier they perceive the announcement of formal controls as phase shifting. Also, the authors found that the moderating effect of phase-shifting perceptions functions in such a way that the relationship between T1 and T2 mobile-loafing intention is weaker when employees perceive the announcement of formal controls as a phase-shifting event.

Practical implications

The authors’ results provide managers with useful insights into effectively using formal controls to mitigate employees' deviant behavior. To effectively use formal controls, managers should articulate formal controls that can trigger employees to revise their perceptions of counterproductive workplace behavior policies.

Originality/value

This study is one of the first in information systems research to empirically examine the announcement of formal controls as a phase-shifting event and explore its antecedents and moderating role in the context of deviant workplace behavior in general and mobile loafing in particular.

Details

Internet Research, vol. 31 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 29 December 2022

Sauvik Kumar Batabyal and Kanika Tandon Bhal

Previous studies on cyberloafing have so far not focused on the interlinkages among push factors, pull factors, consequences of actions and value orientations of the employees in…

Abstract

Purpose

Previous studies on cyberloafing have so far not focused on the interlinkages among push factors, pull factors, consequences of actions and value orientations of the employees in a comprehensive manner. The purpose of this study is to close that gap by integrating push-pull theory with means-end chain framework.

Design/methodology/approach

Using a soft-laddering technique, semi-structured interviews were conducted with 21 Indian employees from various organizations with prior written consent. After performing the content analysis and preparation of ladders, an implication matrix and a hierarchical value map were constructed using the LadderUX tool.

Findings

“Upholding conversational conformity,” “achieving efficiency through noise cancellation,” “addressing occasional requirements,” “social networking as a coping mechanism,” “staying informed and sharing opinions,” “attempting job or profile alteration” and “fulfilling transactional obligations” turned out to be the seven prominent means-end chain patterns, with their respective push-pull factors, consequences and value orientations. This study also suggested the multifaceted character of cyberloafing in a continuum, from “serious-destructive” to “minor-positive” to “facilitative-productive.”

Research limitations/implications

This study has been conducted by focusing on cyberloafing at physical workplaces and not in the context of distributed work environments.

Practical implications

The findings of this study will enable organizations to frame an appropriate set of guidelines to control this behavior.

Originality/value

To the best of the authors’ knowledge, this study is the first to integrate the push-pull theory and means-end chain framework to explore the nuances of cyberloafing among employees.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 23 July 2021

Anushree Tandon, Puneet Kaur, Namita Ruparel, Jamid Ul Islam and Amandeep Dhir

Scholars are increasingly focusing on the adverse effects of digitization on human lives in personal and professional contexts. Cyberloafing is one such effect and…

4852

Abstract

Purpose

Scholars are increasingly focusing on the adverse effects of digitization on human lives in personal and professional contexts. Cyberloafing is one such effect and digitization-related workplace behavior that has garnered attention in both academic and mainstream media. However, the existing literature is fragmented and needs to be consolidated to generate a comprehensive and contemporary overview of cyberloafing research and map its current intellectual boundaries. The purpose of this paper is to shed some light on systematic literature review (SLR) in cyberloafing and cyberslacking in the workplace.

Design/methodology/approach

A SLR is conducted to assimilate the existing research. A total of 87 studies selected through a robust protocol are analyzed through content analysis.

Findings

A total of four thematic research areas and inherent gaps are identified, including conceptualization, operationalization, antecedents and stakeholders and consequences. Results are used to assimilate thematic gaps and potential research questions (RQs) to be addressed by future scholars. To advance cyberloafing research, the authors propose a theoretically grounded comprehensive framework based on the SLR findings.

Originality/value

Our study's novelty rests in its state-of-the-art synthesis of cyberloafing research, which encompasses a broader scope than prior SLRs. Furthermore, developing a theoretically grounded comprehensive framework for advancing future research is a unique contribution of this study.

Details

Internet Research, vol. 32 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 19 April 2023

Parisa Heidari Aqagoli, Ali Safari and Arash Shahin

The purpose of this paper is to determine the attractiveness or unattractiveness of cyberloafing in the workplace using Q methodology and the Kano model.

Abstract

Purpose

The purpose of this paper is to determine the attractiveness or unattractiveness of cyberloafing in the workplace using Q methodology and the Kano model.

Design/methodology/approach

The perception of employees towards cyberloafing was investigated based on Q methodology, and then they were prioritized using Kano model. Ten IT companies were selected for the case study. In this study, a mixed method was used. First, 30 participants were interviewed. Next, after extracting the comments, Q-matrix was presented to 30 participants and they completed the matrix cells. Finally, Kano questionnaire was designed using the items obtained from Q methodology and distributed among 30 participants.

Findings

Q methodology led to nine perceptions, and the priorities of Kano model were proponents of increasing employees' dependence on the internet, economic thinkers, the indifferent, dissatisfied, proponents of receiving information, self-control proponents, the profit-minded, mind destroyer and satisfaction-oriented. Cyberloafing is considered unattractiveness with adverse effects. The combination of Q methodology and Kano model can improve the analysis of the results.

Originality/value

This study is one of the few studies in which Q methodology is improved by Kano model. In the past, Q methodology alone examined people’s perception, but by combining these two methods, it is determined which perception is more satisfying and which one is more important, and then a general result can be reached.

Details

International Journal of Organizational Analysis, vol. 32 no. 2
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 10 March 2022

Jawad Khan, Imran Saeed, Muhammad Fayaz, Muhammad Zada and Dawood Jan

This study aims to assess the nexus between perceived overqualification (POQ), anger, knowledge hiding, cyberloafing and harmonious passion (HP).

1663

Abstract

Purpose

This study aims to assess the nexus between perceived overqualification (POQ), anger, knowledge hiding, cyberloafing and harmonious passion (HP).

Design/methodology/approach

The authors obtained 264 responses from two public traded firms in Pakistan using a supervisor-subordinated nested design and a multi-time data collecting strategy using convenience sampling.

Findings

The study results indicate that POQ positively affects knowledge hiding and cyberloafing. The authors also found anger as a potential mediator in the direct association between POQ and cyberloafing. In addition, the findings suggest that the association between POQ, knowledge hiding and cyberloafing will be weak when individuals exhibit HP towards their job roles. The results of this research, when considered as a whole, provided support for all of the hypothesised direct and indirect linkages, which has important ramifications for both theory and practise.

Research limitations/implications

This study has both theoretical and practical implications. Grounded on equity theory and relative deprivation theory, this paper asserts that HP should be used to decrease POQ affect. According to the authors, pro-environment employee actions may help build a pro-environment workplace culture as well as a pro-environment sense of responsibility, both of which can help to achieve significant pro-environment results.

Originality/value

This study builds on and fills in the gaps left by earlier research to better aid organisational researchers, practitioners and stakeholders in understanding how POQ, rage, information concealing, cyberloafing and harmonic passion interact with one another.

Details

Journal of Knowledge Management, vol. 27 no. 2
Type: Research Article
ISSN: 1367-3270

Keywords

Article
Publication date: 6 February 2017

Zill-e- Huma, Saddam Hussain, Ramayah Thurasamy and Muhammad Imran Malik

Cyberloafing is the personal use of internet while at work. The purpose of this paper is to identify the factors affecting cyberloafing between public and private sector…

2569

Abstract

Purpose

Cyberloafing is the personal use of internet while at work. The purpose of this paper is to identify the factors affecting cyberloafing between public and private sector organizations.

Design/methodology/approach

This study uses the multiple motivational factors with the help of a theoretical paradigm, renowned as theory of interpersonal behavior (TIB). Data were collected through questionnaire to investigate the different behavioral factors between the public and private sector organizations. PLS path modeling and PLS-MGA are used to access the results on SMARTPLS 2.0 software.

Findings

Results show that the three factors of habit, intention, and social influences taken from the TIB model are important and have a higher path coefficient in a public sector organization setting. The factors of affect, facilitating condition and perceived consequences from TIB are greater in a private sector organization and have a higher path coefficient. By contrast, in multiple group analysis, results show that some factors are more predictive of cyberloafing behavior in a public sector organization, whereas other factors are more predictive for a private sector organization.

Practical implications

The findings of the current research are beneficial for both organizations and contribute toward policy-making decisions. These results help the managers of public and private sector organizations to decide how to control cyberloafing behavior by focusing on the important factors that lead to it.

Originality/value

This study shows strong and significant differences between the two types of organizations in terms of path coefficient. This implies that cyberloafing factors have different impacts on different organizations. The study fills an important gap in comparing public and private sector organizations with respect to cyberloafing behavior and clarifying which factors are more effective in predicting cyberloafing behavior according to type of organization. The paper is of great value for both kinds of organizations that face cyberloafing behavior issues.

Details

Internet Research, vol. 27 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 4 January 2013

Anthony C. Klotz and M. Ronald Buckley

The purpose of this paper is to chronicle the study of deviant behavior aimed at the organization, or CWB‐O, from the dawn of the Industrial Revolution to the present day.

4993

Abstract

Purpose

The purpose of this paper is to chronicle the study of deviant behavior aimed at the organization, or CWB‐O, from the dawn of the Industrial Revolution to the present day.

Design/methodology/approach

Counterproductive work behaviors that have been documented and studied since the Industrial Revolution were systematically reviewed and discussed.

Findings

Over the past few centuries, employees have engaged in behaviors that harm their organizations; as organizations have become more complex, however, employees have found many more ways to engage in CWB‐O. Further, recent advances in technology have made employee CWB‐O much more ambiguous.

Research limitations/implications

The study of CWB‐Os will remain a rich area for researchers as the boundaries between work and personal life continue to blur, as employees develop new forms of CWB‐O, and as employers increase their use of technology to detect employee deviance.

Practical implications

As the penetration of technology into job roles grows and the use of personal mobile devices becomes institutionalized, managers now must decide how much company time they will tolerate their employees spending on personal issues while at work. Put another way, managers must cope with the reality that a certain amount of what was once considered deviant behavior in the workplace may now be a minimum expectation of employees.

Originality/value

This paper builds a historical foundation of the present conceptualization of CWB‐O, thereby providing scholars with a greater understanding of what past events drove the emergence of the types of CWB‐O that are prevalent today and why some counterproductive behaviors may have become less prevalent.

Details

Journal of Management History, vol. 19 no. 1
Type: Research Article
ISSN: 1751-1348

Keywords

Article
Publication date: 16 April 2020

Jinnan Wu, Wenjuan Mei, Joseph Ugrin, Lin Liu and Fang Wang

The purpose of this study is to investigate whether Chinese college students' social cyberloafing out of class has a curvilinear effect on academic performance and whether…

1227

Abstract

Purpose

The purpose of this study is to investigate whether Chinese college students' social cyberloafing out of class has a curvilinear effect on academic performance and whether students' levels of psychological detachment and relaxation mediate the effect.

Design/methodology/approach

A field survey was used to collect 502 self-reported responses from student Internet users at a large university located in central China.

Findings

The results show an inverted U-shaped relationship between social cyberloafing out of class and academic performance. Two types of effort recovery experience gained from social cyberloafing, psychological detachment and relaxation, mediate that effect. Students' social cyberloafing out of class is positively associated with psychological detachment and relaxation, which in turn, have opposite effects on academic performance.

Practical implications

This study offers novel insights into the effects of social cyberloafing on college students' academic achievement. The findings illustrate how social cyberloafing can serve as a recovery experience and improve academic performance, but it can hinder performance if the cyberloafing is excessive.

Originality/value

This study extends the cyberloafing literature by focusing on Chinese college students' cyberloafing out of class. The study finds that a moderate amount of social cyberloafing out of class can result in psychological detachment, relaxation and improved performance when returning to academic work. However, both too much or too little social cyberloafing can result in difficulty returning to academic work and reduced academic performance. The findings are novel to the cyberloafing literature.

Details

Information Technology & People, vol. 34 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 17 September 2020

Ahmadreza Karimi Mazidi, Fariborz Rahimnia, Saeed Mortazavi and Mohammad Lagzian

This study aims to investigate the possible negativity of job embeddedness in developing countries. Operationally, the study aimed to configure the relationship between job…

1188

Abstract

Purpose

This study aims to investigate the possible negativity of job embeddedness in developing countries. Operationally, the study aimed to configure the relationship between job embeddedness and cyberloafing with respect to both contextual (job satisfaction) and individual (internet addiction) factors.

Design/methodology/approach

Incorporating the conservation of resources theory and reactance theory into the theory of job embeddedness, the present study adopted a resource-based approach to job embeddedness to examine its main and moderated effects on cyberloafing in a three-way interaction model. With the focus on public organizations, 500 administrative employees from an Iranian university were surveyed using self-reporting measures, and the collected data were analyzed using partial least squares–structural equation modeling and hierarchical moderated multiple regression.

Findings

As predicted, job embeddedness was positively associated with cyberloafing; however, in contrast with predictions, job satisfaction had no inverse impact on the job embeddedness–cyberloafing relationship, and its role was limited to neutralizing the increasing effect of internet addiction.

Practical implications

Consideration should be given to how job embeddedness interacts with contextual and individual moderators to affect cyberloafing. In particular, this study implicated some practical procedures to provide employees with on- and off-the-job resources and avoid fighting over the organization's resources. Additionally, this study provides insights into embeddedness-satisfaction interplay to provide employees with propitious work conditions in line with organizational productivity.

Originality/value

There is little research on the association between job embeddedness and counterproductive work behaviors, and the findings are inconsistent. A review of the literature revealed no study addressing cyberloafing implications of job embeddedness. This study expands the literature by theoretically and empirically correlating job embeddedness and cyberloafing in a non-western developing country. Accordingly, the significance of this study is its capability in mitigating cyberloafing behaviors by promoting the adverse job embeddedness.

Details

Personnel Review, vol. 50 no. 7/8
Type: Research Article
ISSN: 0048-3486

Keywords

1 – 10 of 89