نوع مقاله : مقاله پژوهشی

نویسندگان

1 استادیار دانشگاه خوارزمی

2 کارشناس ارشد مدیریت منابع انسانی دانشگاه خوارزمی

چکیده

پژوهش حاضر با هدف شناسایی پیشایندها و پسایندهای پرسه­زنی اینترنتی در سازمان جهاد دانشگاهی تهران صورت گرفت. این تحقیق از نظر هدف کاربردی و از لحاظ رویکرد از نوع تحقیقات آمیخته است. در بخش کیفی نیز از روش فراترکیب استفاده گردید. به این منظور مطالعات انجام‌ شده در زمینة پیشایندها و پسایندهای پرسه­زنی اینترنتی در بانک‌های اطلاعاتی معتبر طی سال‌های 2002 تا 2021 جمع‌آوری و بررسی شد که از میان آن‌ها 68 منبع برای تجزیه‌وتحلیل نهایی استفاده شدند. در بخش کمی به‌منظور غربال و تأیید یافته‌های بخش کیفی از روش دلفی فازی بهره برده شد. جامعة آماری در بخش کمّی شامل کارشناسان خبره و متخصص سازمان جهاد دانشگاهی تهران بودند که 20 نفر از آن‌ها با روش نمونه‌گیری هدفمند انتخاب شدند. بر اساس یافته‌های تحقیق پیشایندهای پرسه­زنی اینترنتی در سه مقولة اصلی عوامل ساختاری، رفتاری و محیطی و پسایندها در دو مقولة پسایندهای مثبت و پسایندهای منفی شناسایی شدند. نتایج حاصل از این تحقیق می‌تواند جهت بهبود مدیریت پرسه­زنی اینترنتی کارکنان در محیط سازمان و جلوگیری از نتایج منفی و مخرب آن مؤثر باشد.
 

کلیدواژه‌ها

References
Abate, C. (2005). Working Hard or Hardly Working: A Study of individuals engaging in personal business on the job, Human Relations, 58(8), 1009-1032.
Aghaz, A., & Sheikh, A. (2015). Cyberloafing and job burnout: an investigation in the knowledgeintensive sector. Computers in Human Behavior, 62, 51-60. (in Persian)
Airila, A.; Hakanen, J.; Schaufeli, W. B.; Luukkonen, R.; Punakallio, A., & Lusa, S. (2014). Are job and personal resources associated with work ability 10 years later? The mediating role of work engagement. An International Journal of Work, Health & Organisations, 28(1), 87-105.
Alexander K., & Koch Julia Nafziger. (2016). Gift exchange, control, and cyberloafing: a real-effort experiment. Journal of Economic Behavior & Organization, 131, 409-426.
Anandarajan, M., & Simmers, C. A. (2005). Developing human capital through personal web use in the workplace: mapping employee perceptions. Communications of the Association for Information Systems, 15(41), 776–791.
Andel, S. A.; Kessler, S. R.; Pindek, S.; Kleinman, G., & Spector, P. E. (2019). Is cyberloafing more complex than we originally thought? cyberloafing as a coping response to workplace aggression exposure. Computers in Human Behavior, 101, 124-130.
Askew, K.; Buckner, J. E.; Taing, M.U.; Ilie, A.; Bauer, J. A., & Coovert, M. D. (2014). Explaining cyberloafing: The role of the theory of planned behavior. Computers in Human Behavior, 36, 510-519.
Askew, K. L. (2012). The relationship between cyberloafing and task performance and an examination of the theory of planned behavior as a model of cyberloafing. Graduate theses and dissertations, University of South Florida.
Askew, K. L.; Ilie, A.; Bauer, J. A.; Simonet, D. V.; Buckner, J. E., & Robertson, T. A. (2018). Disentangling how coworkers and supervisors influence employee cyberloafing: what normative information are employees attending to?  Journal of Leadership & Organizational Studies, 26 (4), 1–19.
Bamberger, P., & Mashloom, E. (2014). Human resource strategy (plan & performance& effects). (Translaters: Ali Parsaeyan & Seyed Mohammad Arabi), Tehran, University of Tehran press (UTP). (in persian)
Barlow, J.; Bean, L. G., & Hott, D. D. (2003). Employee “spy” software: Should you use it? Journal of Corporate Accounting & Finance, 14, 7-12.
Baturay M. H., & Toker, S. (2015). An investigation of the impact of demographics on cyberloafing from an educational setting angle. Computers in Human Behavior, 50, 358–366.
Blanchard, A. L., & Christine A. H. (2008). Correlates of different forms of cyberloafing: the role of norms and external locus of control. Computers in Human Behavior, 24, 1067–1084.
Blanger, F., & Slyke, V. (2002). Abuse or learning? Communications of the ACM 45 (1), 64–65.
Brickner, M. A., & Harkins, S. (2014). Social loafing a field investigation. Journal of management, 30(2), 285-304.
Cheng, B.; Zhou, X.; Guo, G.; Yang, K. (2020). Perceived overqualification and cyberloafing: a moderated-mediation model based on equity theory. Journal of Business Ethics, 164(5), 567-577.
Chen J. V.; Ross, W. H.,  & Yang, H. (2011). Personality and motivational factors predicting internet abuse at work. Journal of Psychosocial Research on Cyberspace, 5(1), https://cyberpsychology.eu/article/view/4240.  
Çınar, O., & Karcıoğlu, F. (2015). The relationship between cyber loafing and organizational citizenship behavior: A survey study in Erzurum/Turkey. 11th International strategic management conference, doi: 10.1016/j.sbspro.2015.10.114. 
Durak, H. Y., & Saritepeci, M. (2019). Occupational burnout and cyberloafing among teachers: Analysis of personality traits, individual and occupational status variables as predictors. The Social Science Journal, 56, 69–87.
Eddy, E. R.; D'Abate, C. P., & Thurston P. W. (2010). Explaining engagement in personal activities on company time. Personnel Review, 39 (5), 639 – 654.
Foster, M. (2001). Be alert to the signs of employee Internet addiction. National Public Accountant, 46, 39–40.
Glassman, J.; Prosch, M., & Shao, B. (2014). To monitor or not to monitor effectiveness of a cyberloafing countermeasure. Information & Management, 52 (2), 170-182.
Hartijasti, Y., & Fathonah, N. (2015). Motivation of cyberloafers in the workplace across generations in Indonesia. International Journal of Cyber Society and Education, 8(1), 49-58.
Heidari, E. (2018). Investigating the effect of cyberloafing on the sense of happiness and academic engagement of medical students. Iranian Journal of Health Education and Health Promotion, 6(3), 203-212. (in Persian)
Henle, A. C.; Kohut, G., & Booth, R. (2009). Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory. Computers in Human Behavior, 25(4), 902–910.
Hensel, P. G., & Kacprzak, A. (2020). Curbing cyberloafing: studying general and specific deterrence effects with field evidence. European Journal of Information Systems, 219-235.
Jamaluddin, H.; Ahmad, Z.; Alias, M., & Simun, M. (2015). Personal Internet use: The use of personal mobile devices at the workplace. Global conference on business & social science. Procedia - Social and behavioral sciences 172, 495 – 502.
Jandaghi, G.; Alvani, S. M.; Zarei Matin, H., & Fakheri Kozekanan, S. (2015). Cyberloafing management in organizations. Iranian Journal of Management Studies (IJMS), 8(3). (in Persian)
Karademir, T., & Gokcearslan, S. (2019). Examination of cyberloafing studies in education: a content analysis. World Journal on Educational Technology, 11(1), 94-103.
Karau, S. J., & Williams, K. D. (2014). The effects of group cohesiveness on social loafing and social compensation. Journal of Personality and Social Psychology, 1(2), 156–168.
Kaufmann, L., & Schneider, Y. (2014). Intangibles A synthesis of current research. Journal of Intellectual Capital, 5(3), 366-388.
Khansa, L.; Kuem, J.; Siponen, M., & Kim, S. S. (2017). To cyberloaf or not to cyberloaf: the impact of the announcement of formal organizational controls. Journal of Management Information Systems, 34(1), 141-176.
Khansa, L.; Barkhi, R.; Ray, S., & Davis, Z. (2017). Cyberloafing in the workplace: mitigation tactics and their impact on individuals’ behavior. Information Technology and Management, 19(4), 197-215.
Kim, K.; Karmen, M., & Young Chong, K. (2015). When do employees cyberloaf? an interactionist perspective examining personality justice and empowerment. Journal Human Resource Management, 55(6), 1041-1058.
Kim, S. (2018). Managing millennials’ personal use of technology at work. Business Horizons. Managing millennials’ personal use of technology at work. Business Horizons 61(2), 261—270.
Koay, K. Y. (2018). Workplace ostracism and cyberloafing: a moderated-mediation model. Internet Research, 28(4), 1122-1141.
Koay, K. Y.; Chin-Hooi Soh, P., & Wai Chew, K. (2017). Antecedents and cosequences of cyberloafing: evidence from the Malaysian ICT industry. Peer Reviwed Journal on the Internet, 22(3), https://doi.org/10.5210/fm.v22i3.7302.
König, C. J., & Guardia, M. E. (2014). Exploring the positive side of personal internet use at work: does it help in managing the border between work and nonwork? Computers in Human Behavior, 30, 355–360.
Kühnel, D.; Marquardt, C.;   Nau, K.; Krug, H. F.; Paul, F., & Steinbach, C. (2017). Environmental benefits and concerns on safety: communicating latest results on nanotechnology safety research-the project DaNa2.0. Environmental Science and Pollution Research, 24(12), 11120–11125.
Liberman, B.; Seidman, G.; McKenna, Y. A. K., & Buffardi, L. E. (2011). Employee job attitudes and organizational characteristics as predictors of cyberloafing. Computers in Human Behavior 27(6), 2192–2199.
Lim, V. K. G., & Chen, D. J. Q. (2012). Cyberloafing at the workplace: Gain or drain on work? Behaviour & Information Technology, 31(4), 343–353.
Lim, V. K. G. (2002). The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675–694.
Lim, V.K.G & Chen, D.J.Q. (2009). Cyberloafing at the workplace: gain or drain on work? Behaviour & Information Technology, 31, 343-353.
Lim, V. K. G., & Teo, T. S. H. (2005). Prevalence, perceived
seriousness, justification and regulation of cyberloafing
in Singapore. Information & Management 42(8), 1081-1093.
Malachowski, D. (2005). Waste time at work costing companies billions. Salary.com.
Mercado, B.; Giordano, C., & Dilchert S. )2017(. A meta-analytic investigation of cyberloafing. Career Development International, 22(5), 546-564.
Mesgariani, M.; Shafiee, S.; Ahmadi, E., & Zare, F. (2013). Studying the relationship between internet addiction and emotional intelligence, sensation seeking and meta cognition among those who referred to cafes. International research journal of applied and basic sciences, 4(4), 889-893. (in Persian)
McCarthy, R.; Canaan Messarra, L., & Karkoulian, S. (2011). To restrict or not to restrict personal internet usage on the job. Education, Business and Society: Contemporary Middle Eastern Issues, 4(4), 253-266.
Mills, J. E.; Hu, B.; Beldona, S., & Clay, J. (2001). Cyberslacking! a wired-workplace liability issue. Cornell Hotel and Restaurant
Administration Quarterly, 42
(5), 34–47.
 Neill, C. J.; P. A.; Laplante., J. F., & DeFranco (2011). Managing software organizations and people. Published December 13, by Auerbach publications, 327 Pages, 72 B/W Illustrations, Second Edition.
Quinones, S., & Griffiths, M. D. (2019). Reducing compulsive Internet use and anxiety symptoms via two brief interventions: a comparison between mindfulness and gradual muscle relaxation. Journal of Behavioral Addictions, 8(3), 530-536.
Ozler, D. E. (2012). Cyberlofing phenomenon in organization: determinants and impacts. International Journal of Business and Government Studies. 4(2).
Pindek, S.; Krajcevska, A., & Spector, P. E. (2018). Cyberloafing as a coping mechanism: Dealing with workplace boredom. Computers in Human Behavior, 86, 147-152.
Prasad, S.; Lim, V. K., & Chen, D. J (2010). Self-regulation, individual characteristics and cyberloafing. in AIS electronic library
(AISeL) (eds.), PACIS 2010 Proceedings, 1641–1648, Taipei, Taiwan.
Restubog, S. L. D.; Patrick Garcia, R. J. M.; Toledano, L. S.; Amarnani, R. K.; Tolentino, L. R.; & Tang, R. L. (2011). Yielding to (cyber)-temptation: exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace. Journal of Research in Personality, 45, 247–251.
Ross, J. (2018). Cyberloafing’ in Health Care: a real risk to patient safety. Journal of PeriAnesthesia Nursing, 33(4), 560-562.
Runing, H. S. (2012). Role of Internet Experience in moderating influence of work stressor on cyberloafing. Social and Behavioral Sciences, 57, 320 – 324.
RuningSawitri, H. S. (2012). Role of Internet experience in moderating influence of work stressor on cyberloafing. Social and Behavioral Sciences, 57, 320 – 324.
Sandelowski M.; Barroso J., & Voils C. (2007). Using qualitative metasummary to synthesize qualitative and quantitative descriptive findings. Res Nurs Health, 30(1), 99-111.  
Selwyn, N. (2008). A safe haven for misbehaving? an investigation of on-line misbehavior among university students. Social Science Computer Review. 26, 446-465.
Sheikh, A.; Aghaz, A., & Mohammadi, M. (2019). Cyberloafing and personality traits: an investigation among knowledge-workers across the Iranian knowledge-intensive sectors. Behaviour & Information Technology, 38, 1213-1224. (in Persian)
Sheikh, A.; Sharifi Atashgah, M., & Adibzadegan, M. (2015). The antecedents of cyberloafing: A case study in an Iranian copper industry. Computers in Human Behavior, 51, 172–179. (in Persian)
Stanton, J. M. (2002). Company Profile of the Frequent Internet User. Communications of the ACM 45 (1), 55–59.
Tanrıverdi, O., & Karaca, F. (2018). Investigating the relationships between adolescents’ levels of cognitive absorption and cyberloafing activities according to demographic characteristics. The Turkish Journal of Addiction, 5(2), 285-315.
Taylor, A. (2007). Gambling at work costs employers £300M a year. Financial times, 1-12.
Ten Brummelhuis, L. L., & Bakker, A. B. (2012). A resource perspective on the work–home interface: The work–home resources model. American Psychologist, 67(7), 545–556. https://doi.org/10.1037/a0027974.
Trepte, S., & Reinecke, L. (2013). The reciprocal effects of social network site use and the disposition for self-disclosure: A longitudinal study. Computers in Human Behavior, 29(3), 1102-1112.
Trougakos, J. P.; Hideg, I.; Cheng, B. H., & Beal, D. J. (2014). Lunch breaks unpacked: the role of autonomy as a moderator of recovery during lunch. Academy of Management Journal, 57(2), 405-421.
Ugrin, J. C., & Pearson, M. (2013). The effects of sanctions and stigmas on cyberloafing. Computers in Human Behavior, 29, 812–820.
Ugrin, J. C.; Pearson, J. M., & Nickle, S. M. (2018). An Examination of the relationship between culture and cyberloafing using the hofstede model. Journal of Internet Commerce, 17, 46-63.
Urbaczewski, A., & Jessup, L. M. (2002). Does electronic monitoring of employee Internet usage work? Communications of the ACM, 45(1), 80-83.
Van Doorn, O. N. (2008). Cyberloafing: A multi-dimensional construct placed in a theoretical framework. BSc industrial engineering and management science, master of science in innovation management, department industrial engineering and innovation sciences eindhoven university of technology, the netherlands.
Vardi, Y., & Weitz, E. (2004). Misbehavior in Organizations: Theory, Research and Management, LEA, Mahwah, NJ.
        Vitak J.; Crouse, J., & LaRose, R. (2011). Personal internet use at work: Understanding cyberslacking. Computers in Behavior, 27(5), 1751-1759.
        Wagner, J. A. (2013). Studies of individualism /collectivism: Effects on cooperation in groups. Journal of Personality and Social Psychology.30-39.
Walsh, D., & Downe, S. (2005). Meta-synthesis method for qualitative research: a literature review. Journal of Advanced Nursing, 50(2), 204–211.
Weatherbee, T. G. (2010). Counterproductive use of technology at work: Information & communications technologies and cyberdeviancy. Human Resource Management Review, 20, 35–44.
        Whitty, M., & Carr, A. (2006). New rules in the workplace: Applying object-relations theory to explain problem Internet and email behaviour in the workplace. Computers in Human Behavior, 22, 235–50.
Wu, J.; Mei, W.; Liu, L., & Ugrin, J. C. (2020). The bright and dark sides of social cyberloafing: Effects on employee mental health in China. Journal of Business Research, 112, 56-64.
Yasar, S., & Yurdugul, H. (2013). The investigation of relation between cyberloafing activities and cyberloafing behaviors in higher education. Procedia. Social and Behavioral Sciences, 83, 600 – 604.
Yavuz, A.; Onur D., & Dursun, O. (2017). Cyberloafing and social desirability bias among students and employees. Computers in Human Behavior, 72, 87-95.
Zoghbi Manrique De Lara, P. (2007). Redefining OCB as cybercivism: do work attitudes also explain organizational citizenship internet behaviors. Journal of the Iberoamerican Academy of Management, 5(1). 43 – 52.
CAPTCHA Image