Abstract
Cyber-loafing—using the internet for non-work purposes during work time—can lower employee productivity and expose organizations to security risks. Organizations need to control this type of behavior. We studied two control methods: internet use policies and electronic monitoring. We empirically investigated the effectiveness of these two methods and how their effectiveness is influenced by the employees’ individual differences. Based on the data collected from 209 Chinese public servants, we found that both methods can significantly lower employees’ cyber-loafing intentions. Additionally, an internet use policy is more effective for employees with a high level of self-esteem than for those with a low level of self-esteem, whereas electronic monitoring is more effective for employees with a high level of job satisfaction than for those with a low level of job satisfaction. This study advances the theoretical understanding of methods for the control of cyber-loafing and has practical implications for the mitigation of its negative effects.
Similar content being viewed by others
References
Lim VKG (2002) The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. J Organ Behav 23:675–694
Lim VKG, Teo TSH, Loo GL (2002) How do I loaf here? Let me count the ways. Commun ACM 45(1):66–70
Garrett RK, Danziger JN (2008) On cyberslacking: workplace status and personal Internet use at work. CyberPsychol Behav 11(3):287–292
Garrett RK, Danziger JN (2008) Disaffection or expected outcomes: understanding personal Internet use during work. J Comput Mediat Commun 13(4):937–958
Salary.com. The 2008 Wasting Time at Work Survey Reveals a Record Number of People Waste Time at Work 2009 [cited 2009 September 16]; Available from: http://www.salary.com/Articles/ArticleDetail.asp?part=par1083
8e6 Technologies, 2008 Personal Internet Use Survey: United States and United Kingdom. 2008
Sinha A (2008) Websense survey—email and IM top the productivity loss, Porn Usage goes up, in Indian IT Industry. 2008
Chinese office workers world’s worst in cyberslacking (2005) Auguest 18, 2005 [cited; Available from: http://english.people.com.cn/200508/18/eng20050818_203246.html
Web@Work Survey 2006 (2006) [cited 2011 September 16]; Available from: http://www.securitymanagement.com/archive/library/websense_technofile0906.pdf
Oswalt B, Elliott-Howard F, Austin SF (2003) Cyberslacking—Legal and ethical issues facing IT managers, in Annual conference of the international association for computer information systems. Las Vegas, NV
Foltz CB, Cronan TP, Jones TW (2005) Have you met your organization’s comptuer usage policy? Ind Manag Data Syst 105(2):137–146
Henle CA, Blanchard AL (2008) The interaction of work stressors and organizational sanctions on cyberloafing. J Manag Issues 20(3):383–400
Henle CA, Kohut G, Booth R (2009) Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: an empirical test of justice theory. Comput Hum Behav 25:902–910
Liao Q, Luo X, Gurung A, Li L (2008) Workplace management and employee misuse: does punishment matter? J Comput Inform Syst 50(2):49–59
Anandarajan M, Paravastu N, Caiib BC, Simmers CA (2006) Perceptions of personal Web usage in the workplace: a Q-methodology approach. Cyber Psychol Behav 9(3):325–335
Weatherbee TG (2009) Counterproductive use of technology at work: information & communications technologies and cyberdeviancy. Hum Resour Manag Rev 20:35–44
Spector PE, Penney L, Bruursema K, Goh A, Kessler S (2005) The dimensionality of counterproductivity: are all counterproductive behaviours created equal? J Vocat Behav 68:446–460
Bock G-W, Ho SL (2009) Non-work related computing (NWRC). Commun ACM 52(4):124–128
Lim VKG, Chen DJQ (2009) Cyberloafing at the workplace: gain or drain on work? Behav Inf Technol, 11
Vitak J, Crouse J, LaRose R (2011) Personal internet use at work: understanding cyberslacking. Comput Hum Behav 27:5, 1751
Everton WJ, Mastrangelo PM, Jolton JA (2005) Personality correlates of employees’ personal use of work computers. CyberPsychol Behav 8(2):143–153
Chen JV, Chen CC, Yang H (2008) An empirical evaluation of key factors contributing to internet abuse in the workplace. Ind Manag Data Syst 108(1):87–106
Hollinger RC (1991) Neutralizing in the workplace: an empirical analysis of property theft and production deviance. Deviant Behav 12:169–202
Minor WW (1981) Techniques of neutralization: a reconceptualization and empirical examination. J Res Crime Delinq 18:295–318
Lim VKG, Teo TSH (2005) Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore. An exploratory study. Inf Manag 42:1081–1093
Pee LG, Woon IMY, Kankanhalli A (2008) Explaining non-work-related computing in the workplace: a comparison of alternative models. Inf Manag 45:120–130
Lee J, Yonghuwa L (2002) A holistic model of computer abuse within organizations. Inf Manag ComputSecur 10(2):57–63
de Lara PZM, Tacoronte DV, Ding JMT (2006) Do current anti-cyberloafing disciplinary practices have a replica in research findings?: a study of the effects of coercive strategies on workplace Internet misuse. Internet Res 16(4):450–467
American Management Association (2007) Electronic monitoring and surveillance Survey. AMA/ePolicy Institute Research
Dohertya NF, Anastasakisa L, Fulfordb H (2011) Reinforcing the security of corporate information resources: a critical review of the role of the acceptable use policy. Int J Inf Manag 31(3):201–209
Baumgardner A (1990) To know oneself is to like oneself: self-certainty and self-affect. J Pers Soc Psychol 58(6):1062–1072
Spector PE (1997) Job satisfaction: application, assessment, cause, and consequences. Sage Publications, Inc., London
Siau K, Nah FF-H, Teng L (2002) Acceptable internet use policy. Commun ACM 45(1):75–79
Urbaczewski A, Jessup LM (2002) Does electronic monitoring of employee internet usage work? Commun ACM 45(1):80–83
Stanton J, Weiss E (2000) Electronic monitoring in their own words: an exploratory study of employees’ experiences with new types of surveillance. Comput Hum Behav 16(4):423–440
Alder GS, Noel TW, Ambrose ML (2006) Clarifying the effects of Internet monitoring on job attitudes: the mediating role of employee trust. Inf Manag 43(7):894–903
Coopersmith S (1967) The antecedents of self-esteem. Freeman
Harter S (1990) Self and identity development. The developing adolescent, At the threshold, pp 352–387
Dettinger S, Hart G (2007) The relationship between self-esteem and indirect aggression in the workplace. J Psychiatr Psychol 1(1)
Brockner J (1988) Self-esteem at work. Lexington, Lexington, MA
Korman AK (1967) Self-esteem as a moderator of the relationship between self-perceived abilities and vocational choice. J Appl Psychol 51:65–67
Korman AK (1970) Toward an hypothesis of work behavior. J Appl Psychol 54:31–41
Leary MR, Tambor ES, Terdal SQ, Downs DL (1995) Self-esteem as an interpersonal monitor: the sociometer hypothesis. J Pers Soc Psychol 68(3):518–530
Carver CS, Scheier MF (1981) Attention and self-regulation: a control theory approach to human behavior. Springer, New York
Locke E (1976) The nature and causes of job satisfaction. Handb ind organ psychol 1:1297–1343
Spector PE (1985) Measurement of human service staff satisfaction: development of the job satisfaction survey. Am J Commun Psychol 13(6):693–713
Bowling NA (2007) Is the job satisfaction-job performance relationship spurious? A meta-analytic examination. J Vocat Behav 71(2):167–185
Dalal RS (2005) A meta-analysis of the relationship between organizational citizenship behavior and counterproductive work behavior. J Appl Psychol 90:1241–1255
Judge TA, Scott BA, Ilies R (2006) Hostility, job attitudes, and workplace deviance: test of a multi-level model. J Appl Psychol 91:126–138
Judge TA, Thoresen CJ, Bono JE, Patton GK (2001) The job satisfaction—Job performance relationship: a qualitative and quantitative review. Psychol Bull 127:376–407
Mount M, Ilies R, Johnson E (2006) Relationship of personality traits and counterproductive work behaviors: the mediating effects of job satisfaction. Pers Psychol 59:591–622
LePine JA, Erez A, Johnson DE (2002) The nature and dimensionality of organizational citizenship behavior: a critical review and meta-analysis. J Appl Psychol 87(1):52
Organ DW, Ryan K (1995) A meta-analytic review of attitudinal and dispositional predictors of organizational citizenship behavior. Pers Psychol 48(4):775–802
Gould S (1979) An equity-exchange model of organizational involvement. Acad Manag Rev 25:53–62
Gouldner AW (1960) The norm of reciprocity: a preliminary statement. Am Sociol Rev 25:161–178
Li H, Zhang J, Sarathy R (2010) Understanding compliance with internet use policy from the perspective of rational choice theory. Decis Support Syst 48:635–645
Alder GS, Schminkee M, Noel TW, Kuenzi M (2008) Employee reactions to Internet monitoring: the moderating role of ethical orientation. J Bus Ethics 80:481–498
China, The Internet in China, in The Internet in China. 2010, Information Office of the State Council of the People’s Republic of China: Beijing
www.henan.gov.cn (2006) Henan publishes ten disciplines; Public servants’ chatting online during work time is prohibited. [cited 2012 January 8th, 2012]; Available from: http://www.henan.gov.cn/hdjl/system/2006/12/25/010016206.shtml
www.chinanews.com (2011) Ningbo city monitors public servants’ online activities during work time. Browsing non-work related websites is prohibited. [cited 2012 January 08, 2012]; Available from: http://www.chinanews.com/sh/2011/01-13/2787143.shtml
Chang M, Cheung W (2001) Determinants of the intention to use Internet/WWW at work: a confirmatory study. Inf Manag 39(1):1–14
Rosenberg M (1962) Self-esteem and concern with public affairs. Public Opin Q 26(2):201–211
Nunnally J, Bernstein I (1994) Psychometric theory, McGraw-Hill New York. p 736
Hair JF, Tatham RL, Anderson RE, Black W (1998) Multivariate data analysis, Prentice Hall
Aiken LS, West SG (1991) Multiple regression: testing and interpreting interactions
Cronbach LJ (1987) Statistical tests for moderator variables: flaws in analyses recently proposed. Psychol Bull 102(3):414–417
Armstrong L, Phillips JG, Saling LL (2000) Potential determinants of heavier internet usage. Int J Hum Comput Stud 53(4):537–550
Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Quarterly, 425–478
Venkatesh V, Brown SA, Maruping LM, Bala H (2008) Predicting different conceptualizations of system use: the competing roles of behavioral intention, facilitating conditions, and behavioral expectation. MIS Quarterly 32(3):483–502
Acknowledgments
This research is supported by the National Natural Science Foundation of China (Grant No. 71002089 and Grant No. 71171157).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, J., Tian, J. & Shen, Z. The effects and moderators of cyber-loafing controls: an empirical study of Chinese public servants. Inf Technol Manag 14, 269–282 (2013). https://doi.org/10.1007/s10799-013-0164-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10799-013-0164-y