Document Type : Original Article

Authors

1 Assiastant Professor of Organizational Behavior, kharazmi University

2 Assiastant Professor of Human Resource Management, Kharazmi University

3 MS. in Human Resource Management. Kharazmi University

Abstract

 
1- INTRODUCTION
The invention of the Internet and the use of this phenomenon in organizations greatly helped business affairs. In addition to the role it can play, it may create major problems for organizations. For example, the Internet can provide an opportunity for employees to engage in non-work-related activities. Although non-work-related tasks were possible for employees before the invention of the Internet (such as reading newspapers, reading books, and talking on the phone), the Internet has increased this possibility by providing new conditions at the workplace. In other words, cyberloafing, a product of the age of communication technology, is an anti-productive deviant behavior against organizational norms that ultimately costs the organization.
 
2- THEORETICAL FRAMEWORK
Aimed at clarifying the reasons for it, previous studies have been mainly focused on Internet browsing behaviors. Therefore, the current research emphasizes important points such as how cyberloafing occurs, how it spreads, and the consequences of this phenomenon for employees and organizations. This is an important topic for research because of the recent increase in per capita internet usage in the country. Accordingly, the main purpose of the current research is to identify the antecedents and consequences of employees' cyberloafing in the Academic Jihad Organization of Tehran.
3- METHODOLOGY
The current research is an applied study in terms of purpose, and in regards to the method, was a mixed study. In the qualitative phase, a 7-step meta-synthesis method was used to identify the antecedents and consequences of cyberloafing. Qualitative data were gathered from domestic and international databases, which were sampled using the criteria-based purposeful sampling method. Within-subject agreement strategy of two coders was used to determine the reliability of the qualitative data. In the quantitative phase, a multi-stage Fuzzy Delphi technique was used to screen and confirm the findings of the meta-synthesis. In this phase, the statistical population was comprised of the experts of the Tehran Academic Jihad Organization.
4- RESULTS & DISCUSSION
Thirteen basic and 44 primary themes were identified and categorized into three components for antecedents of cyberloafing. Cyberloafing consequences were placed in four categories from 11 basic and 31 primary themes. Then, the fuzzy Delphi method was used to obtain the opinions of experts and specialists to confirm the identified components. The factors of confronting the organization, finding friends, and having few interactions with colleagues were confirmed as antecedents, while the factor of improving work relations was removed due to low importance. The second round of fuzzy Delphi reaffirmed the components of the first round. The antecedents of cyberloafing have been classified into three categories of structural, behavioral, and environmental factors. The negative consequences of cyberloafing were divided into two categories of organizational and personal damage. However, at the same time, the results showed that internet browsing could sometimes bring positive outcomes for organizations. If cyberloafing happens temporarily during long and exhausting working hours can recover the employees' strength and energy.
5- CONCLUSIONS & SUGGESTIONS
The results of the current research indicated that the expansion of social networks, the ease of employees' access to the Internet, and the lack of adequate monitoring and accurate evaluation of employees can increase cyberloafing. However, surfing the Internet during working hours can be a way to escape from the employees' mental conflicts caused by the economic pressures governing society. Moreover, the mismatch of working conditions with the physical and mental characteristics of employees, which is the result of the lack of meritocracy in recruiting employees, can cause a lack of motivation in performing assigned tasks. Another important factor is employees' extremism in cyberloafing, which may be the result of the lack of appropriate socialization or an undesirable organizational culture. On the other hand, the employees' desire to increase information and self-awareness can be considered a positive motive for surfing the Internet during working hours that increases their abilities and creativity. In summary, the research results helping organizations' managers in dealing with employees' cyberloafing are as follows. First, the structural, behavioral, and environmental aspects of cyberloafing can increase managers' awareness of this phenomenon. Second, the cyberloafing consequences are not necessarily harmful to the organization but may lead to personal growth, development, and recovery. Third, managers should examine and analyze the factors affecting this phenomenon in the environment of their own organization based on their employees' emotions and feelings.

Keywords

References
Abate, C. (2005). Working Hard or Hardly Working: A Study of individuals engaging in personal business on the job, Human Relations, 58(8), 1009-1032.
Aghaz, A., & Sheikh, A. (2015). Cyberloafing and job burnout: an investigation in the knowledgeintensive sector. Computers in Human Behavior, 62, 51-60. (in Persian)
Airila, A.; Hakanen, J.; Schaufeli, W. B.; Luukkonen, R.; Punakallio, A., & Lusa, S. (2014). Are job and personal resources associated with work ability 10 years later? The mediating role of work engagement. An International Journal of Work, Health & Organisations, 28(1), 87-105.
Alexander K., & Koch Julia Nafziger. (2016). Gift exchange, control, and cyberloafing: a real-effort experiment. Journal of Economic Behavior & Organization, 131, 409-426.
Anandarajan, M., & Simmers, C. A. (2005). Developing human capital through personal web use in the workplace: mapping employee perceptions. Communications of the Association for Information Systems, 15(41), 776–791.
Andel, S. A.; Kessler, S. R.; Pindek, S.; Kleinman, G., & Spector, P. E. (2019). Is cyberloafing more complex than we originally thought? cyberloafing as a coping response to workplace aggression exposure. Computers in Human Behavior, 101, 124-130.
Askew, K.; Buckner, J. E.; Taing, M.U.; Ilie, A.; Bauer, J. A., & Coovert, M. D. (2014). Explaining cyberloafing: The role of the theory of planned behavior. Computers in Human Behavior, 36, 510-519.
Askew, K. L. (2012). The relationship between cyberloafing and task performance and an examination of the theory of planned behavior as a model of cyberloafing. Graduate theses and dissertations, University of South Florida.
Askew, K. L.; Ilie, A.; Bauer, J. A.; Simonet, D. V.; Buckner, J. E., & Robertson, T. A. (2018). Disentangling how coworkers and supervisors influence employee cyberloafing: what normative information are employees attending to?  Journal of Leadership & Organizational Studies, 26 (4), 1–19.
Bamberger, P., & Mashloom, E. (2014). Human resource strategy (plan & performance& effects). (Translaters: Ali Parsaeyan & Seyed Mohammad Arabi), Tehran, University of Tehran press (UTP). (in persian)
Barlow, J.; Bean, L. G., & Hott, D. D. (2003). Employee “spy” software: Should you use it? Journal of Corporate Accounting & Finance, 14, 7-12.
Baturay M. H., & Toker, S. (2015). An investigation of the impact of demographics on cyberloafing from an educational setting angle. Computers in Human Behavior, 50, 358–366.
Blanchard, A. L., & Christine A. H. (2008). Correlates of different forms of cyberloafing: the role of norms and external locus of control. Computers in Human Behavior, 24, 1067–1084.
Blanger, F., & Slyke, V. (2002). Abuse or learning? Communications of the ACM 45 (1), 64–65.
Brickner, M. A., & Harkins, S. (2014). Social loafing a field investigation. Journal of management, 30(2), 285-304.
Cheng, B.; Zhou, X.; Guo, G.; Yang, K. (2020). Perceived overqualification and cyberloafing: a moderated-mediation model based on equity theory. Journal of Business Ethics, 164(5), 567-577.
Chen J. V.; Ross, W. H.,  & Yang, H. (2011). Personality and motivational factors predicting internet abuse at work. Journal of Psychosocial Research on Cyberspace, 5(1), https://cyberpsychology.eu/article/view/4240.  
Çınar, O., & Karcıoğlu, F. (2015). The relationship between cyber loafing and organizational citizenship behavior: A survey study in Erzurum/Turkey. 11th International strategic management conference, doi: 10.1016/j.sbspro.2015.10.114. 
Durak, H. Y., & Saritepeci, M. (2019). Occupational burnout and cyberloafing among teachers: Analysis of personality traits, individual and occupational status variables as predictors. The Social Science Journal, 56, 69–87.
Eddy, E. R.; D'Abate, C. P., & Thurston P. W. (2010). Explaining engagement in personal activities on company time. Personnel Review, 39 (5), 639 – 654.
Foster, M. (2001). Be alert to the signs of employee Internet addiction. National Public Accountant, 46, 39–40.
Glassman, J.; Prosch, M., & Shao, B. (2014). To monitor or not to monitor effectiveness of a cyberloafing countermeasure. Information & Management, 52 (2), 170-182.
Hartijasti, Y., & Fathonah, N. (2015). Motivation of cyberloafers in the workplace across generations in Indonesia. International Journal of Cyber Society and Education, 8(1), 49-58.
Heidari, E. (2018). Investigating the effect of cyberloafing on the sense of happiness and academic engagement of medical students. Iranian Journal of Health Education and Health Promotion, 6(3), 203-212. (in Persian)
Henle, A. C.; Kohut, G., & Booth, R. (2009). Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory. Computers in Human Behavior, 25(4), 902–910.
Hensel, P. G., & Kacprzak, A. (2020). Curbing cyberloafing: studying general and specific deterrence effects with field evidence. European Journal of Information Systems, 219-235.
Jamaluddin, H.; Ahmad, Z.; Alias, M., & Simun, M. (2015). Personal Internet use: The use of personal mobile devices at the workplace. Global conference on business & social science. Procedia - Social and behavioral sciences 172, 495 – 502.
Jandaghi, G.; Alvani, S. M.; Zarei Matin, H., & Fakheri Kozekanan, S. (2015). Cyberloafing management in organizations. Iranian Journal of Management Studies (IJMS), 8(3). (in Persian)
Karademir, T., & Gokcearslan, S. (2019). Examination of cyberloafing studies in education: a content analysis. World Journal on Educational Technology, 11(1), 94-103.
Karau, S. J., & Williams, K. D. (2014). The effects of group cohesiveness on social loafing and social compensation. Journal of Personality and Social Psychology, 1(2), 156–168.
Kaufmann, L., & Schneider, Y. (2014). Intangibles A synthesis of current research. Journal of Intellectual Capital, 5(3), 366-388.
Khansa, L.; Kuem, J.; Siponen, M., & Kim, S. S. (2017). To cyberloaf or not to cyberloaf: the impact of the announcement of formal organizational controls. Journal of Management Information Systems, 34(1), 141-176.
Khansa, L.; Barkhi, R.; Ray, S., & Davis, Z. (2017). Cyberloafing in the workplace: mitigation tactics and their impact on individuals’ behavior. Information Technology and Management, 19(4), 197-215.
Kim, K.; Karmen, M., & Young Chong, K. (2015). When do employees cyberloaf? an interactionist perspective examining personality justice and empowerment. Journal Human Resource Management, 55(6), 1041-1058.
Kim, S. (2018). Managing millennials’ personal use of technology at work. Business Horizons. Managing millennials’ personal use of technology at work. Business Horizons 61(2), 261—270.
Koay, K. Y. (2018). Workplace ostracism and cyberloafing: a moderated-mediation model. Internet Research, 28(4), 1122-1141.
Koay, K. Y.; Chin-Hooi Soh, P., & Wai Chew, K. (2017). Antecedents and cosequences of cyberloafing: evidence from the Malaysian ICT industry. Peer Reviwed Journal on the Internet, 22(3), https://doi.org/10.5210/fm.v22i3.7302.
König, C. J., & Guardia, M. E. (2014). Exploring the positive side of personal internet use at work: does it help in managing the border between work and nonwork? Computers in Human Behavior, 30, 355–360.
Kühnel, D.; Marquardt, C.;   Nau, K.; Krug, H. F.; Paul, F., & Steinbach, C. (2017). Environmental benefits and concerns on safety: communicating latest results on nanotechnology safety research-the project DaNa2.0. Environmental Science and Pollution Research, 24(12), 11120–11125.
Liberman, B.; Seidman, G.; McKenna, Y. A. K., & Buffardi, L. E. (2011). Employee job attitudes and organizational characteristics as predictors of cyberloafing. Computers in Human Behavior 27(6), 2192–2199.
Lim, V. K. G., & Chen, D. J. Q. (2012). Cyberloafing at the workplace: Gain or drain on work? Behaviour & Information Technology, 31(4), 343–353.
Lim, V. K. G. (2002). The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675–694.
Lim, V.K.G & Chen, D.J.Q. (2009). Cyberloafing at the workplace: gain or drain on work? Behaviour & Information Technology, 31, 343-353.
Lim, V. K. G., & Teo, T. S. H. (2005). Prevalence, perceived
seriousness, justification and regulation of cyberloafing
in Singapore. Information & Management 42(8), 1081-1093.
Malachowski, D. (2005). Waste time at work costing companies billions. Salary.com.
Mercado, B.; Giordano, C., & Dilchert S. )2017(. A meta-analytic investigation of cyberloafing. Career Development International, 22(5), 546-564.
Mesgariani, M.; Shafiee, S.; Ahmadi, E., & Zare, F. (2013). Studying the relationship between internet addiction and emotional intelligence, sensation seeking and meta cognition among those who referred to cafes. International research journal of applied and basic sciences, 4(4), 889-893. (in Persian)
McCarthy, R.; Canaan Messarra, L., & Karkoulian, S. (2011). To restrict or not to restrict personal internet usage on the job. Education, Business and Society: Contemporary Middle Eastern Issues, 4(4), 253-266.
Mills, J. E.; Hu, B.; Beldona, S., & Clay, J. (2001). Cyberslacking! a wired-workplace liability issue. Cornell Hotel and Restaurant
Administration Quarterly, 42
(5), 34–47.
 Neill, C. J.; P. A.; Laplante., J. F., & DeFranco (2011). Managing software organizations and people. Published December 13, by Auerbach publications, 327 Pages, 72 B/W Illustrations, Second Edition.
Quinones, S., & Griffiths, M. D. (2019). Reducing compulsive Internet use and anxiety symptoms via two brief interventions: a comparison between mindfulness and gradual muscle relaxation. Journal of Behavioral Addictions, 8(3), 530-536.
Ozler, D. E. (2012). Cyberlofing phenomenon in organization: determinants and impacts. International Journal of Business and Government Studies. 4(2).
Pindek, S.; Krajcevska, A., & Spector, P. E. (2018). Cyberloafing as a coping mechanism: Dealing with workplace boredom. Computers in Human Behavior, 86, 147-152.
Prasad, S.; Lim, V. K., & Chen, D. J (2010). Self-regulation, individual characteristics and cyberloafing. in AIS electronic library
(AISeL) (eds.), PACIS 2010 Proceedings, 1641–1648, Taipei, Taiwan.
Restubog, S. L. D.; Patrick Garcia, R. J. M.; Toledano, L. S.; Amarnani, R. K.; Tolentino, L. R.; & Tang, R. L. (2011). Yielding to (cyber)-temptation: exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace. Journal of Research in Personality, 45, 247–251.
Ross, J. (2018). Cyberloafing’ in Health Care: a real risk to patient safety. Journal of PeriAnesthesia Nursing, 33(4), 560-562.
Runing, H. S. (2012). Role of Internet Experience in moderating influence of work stressor on cyberloafing. Social and Behavioral Sciences, 57, 320 – 324.
RuningSawitri, H. S. (2012). Role of Internet experience in moderating influence of work stressor on cyberloafing. Social and Behavioral Sciences, 57, 320 – 324.
Sandelowski M.; Barroso J., & Voils C. (2007). Using qualitative metasummary to synthesize qualitative and quantitative descriptive findings. Res Nurs Health, 30(1), 99-111.  
Selwyn, N. (2008). A safe haven for misbehaving? an investigation of on-line misbehavior among university students. Social Science Computer Review. 26, 446-465.
Sheikh, A.; Aghaz, A., & Mohammadi, M. (2019). Cyberloafing and personality traits: an investigation among knowledge-workers across the Iranian knowledge-intensive sectors. Behaviour & Information Technology, 38, 1213-1224. (in Persian)
Sheikh, A.; Sharifi Atashgah, M., & Adibzadegan, M. (2015). The antecedents of cyberloafing: A case study in an Iranian copper industry. Computers in Human Behavior, 51, 172–179. (in Persian)
Stanton, J. M. (2002). Company Profile of the Frequent Internet User. Communications of the ACM 45 (1), 55–59.
Tanrıverdi, O., & Karaca, F. (2018). Investigating the relationships between adolescents’ levels of cognitive absorption and cyberloafing activities according to demographic characteristics. The Turkish Journal of Addiction, 5(2), 285-315.
Taylor, A. (2007). Gambling at work costs employers £300M a year. Financial times, 1-12.
Ten Brummelhuis, L. L., & Bakker, A. B. (2012). A resource perspective on the work–home interface: The work–home resources model. American Psychologist, 67(7), 545–556. https://doi.org/10.1037/a0027974.
Trepte, S., & Reinecke, L. (2013). The reciprocal effects of social network site use and the disposition for self-disclosure: A longitudinal study. Computers in Human Behavior, 29(3), 1102-1112.
Trougakos, J. P.; Hideg, I.; Cheng, B. H., & Beal, D. J. (2014). Lunch breaks unpacked: the role of autonomy as a moderator of recovery during lunch. Academy of Management Journal, 57(2), 405-421.
Ugrin, J. C., & Pearson, M. (2013). The effects of sanctions and stigmas on cyberloafing. Computers in Human Behavior, 29, 812–820.
Ugrin, J. C.; Pearson, J. M., & Nickle, S. M. (2018). An Examination of the relationship between culture and cyberloafing using the hofstede model. Journal of Internet Commerce, 17, 46-63.
Urbaczewski, A., & Jessup, L. M. (2002). Does electronic monitoring of employee Internet usage work? Communications of the ACM, 45(1), 80-83.
Van Doorn, O. N. (2008). Cyberloafing: A multi-dimensional construct placed in a theoretical framework. BSc industrial engineering and management science, master of science in innovation management, department industrial engineering and innovation sciences eindhoven university of technology, the netherlands.
Vardi, Y., & Weitz, E. (2004). Misbehavior in Organizations: Theory, Research and Management, LEA, Mahwah, NJ.
        Vitak J.; Crouse, J., & LaRose, R. (2011). Personal internet use at work: Understanding cyberslacking. Computers in Behavior, 27(5), 1751-1759.
        Wagner, J. A. (2013). Studies of individualism /collectivism: Effects on cooperation in groups. Journal of Personality and Social Psychology.30-39.
Walsh, D., & Downe, S. (2005). Meta-synthesis method for qualitative research: a literature review. Journal of Advanced Nursing, 50(2), 204–211.
Weatherbee, T. G. (2010). Counterproductive use of technology at work: Information & communications technologies and cyberdeviancy. Human Resource Management Review, 20, 35–44.
        Whitty, M., & Carr, A. (2006). New rules in the workplace: Applying object-relations theory to explain problem Internet and email behaviour in the workplace. Computers in Human Behavior, 22, 235–50.
Wu, J.; Mei, W.; Liu, L., & Ugrin, J. C. (2020). The bright and dark sides of social cyberloafing: Effects on employee mental health in China. Journal of Business Research, 112, 56-64.
Yasar, S., & Yurdugul, H. (2013). The investigation of relation between cyberloafing activities and cyberloafing behaviors in higher education. Procedia. Social and Behavioral Sciences, 83, 600 – 604.
Yavuz, A.; Onur D., & Dursun, O. (2017). Cyberloafing and social desirability bias among students and employees. Computers in Human Behavior, 72, 87-95.
Zoghbi Manrique De Lara, P. (2007). Redefining OCB as cybercivism: do work attitudes also explain organizational citizenship internet behaviors. Journal of the Iberoamerican Academy of Management, 5(1). 43 – 52.
CAPTCHA Image