Bringing cyber loafers back on the right track

Purpose – Despite the use in companies of policy and control mechanisms to tackle cyberloafing, these practices are still popular among employees. The purpose of this paper is to suggest that control systems alone are unable to deter cyberloafing because they are eventually perceived as a sort of “ineffectual dog that may bark a lot, but ultimately does not bite.” Instead, control systems are only expected to deter cyberloafing if employees view them as leading to punitive consequences.Design/methodology/approach – First, given the easy visibility of cyberloafing activities, the paper proposes a design for control systems that not only includes perceptions of organizational control (monitoring), but also perceptions of the supervisor's physical proximity (proximity). Data are collected from university administration and services personnel, whose main working tool is the computer. They all have internet access and individual e‐mail, a stable physical location at work, and a supervisor. Multiple hierarchica...

[1]  J. George Extrinsic and Intrinsic Origins of Perceived Social Loafing in Organizations , 1992 .

[2]  W. E. Scott,et al.  EFFECTS OF CONTINGENT AND NONCONTINGENT REWARD ON THE RELATIONSHIP BETWEEN SATISFACTION AND TASK PERFORMANCE , 1971 .

[3]  Hiroshi Ono,et al.  The Efects of Physical Deviance upon Face-to-Face Interaction , 1966 .

[4]  Niels Ole Pors Misbehaviour in the public library: Internet use, filters and difficult people , 2001 .

[5]  Gareth R. Jones Task Visibility, Free Riding, and Shirking: Explaining the Effect of Structure and Technology on Employee Behavior , 1984 .

[6]  James Gaskin Internet Acceptable Usage Policies , 2003 .

[7]  Qinyu Liao,et al.  Workplace Management and Employee Misuse: Does Punishment Matter? , 2009, J. Comput. Inf. Syst..

[8]  Srikanth Beldona,et al.  Cyberslacking!: A Liability Issue for Wired Workplaces , 2001 .

[9]  Peter R. Monge,et al.  Measuring Proximity in Human Organization , 1980 .

[10]  D. Galletta,et al.  An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .

[11]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[12]  J. Sinacore Multiple regression: Testing and interpreting interactions , 1993 .

[13]  K. Zellars,et al.  Abusive supervision and subordinates' organizational citizenship behavior. , 2002, The Journal of applied psychology.

[14]  Robert Charles Tucker,et al.  The Politics of Leadership , 1984, The Logic of Professionalism.

[15]  R. Liden,et al.  Understanding Social Loafing: The Role of Justice Perceptions and Exchange Relationships , 2003 .

[16]  A. Friedman Responsible Autonomy Versus Direct Control Over the Labour Process , 1977 .

[17]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[18]  Detmar W. Straub,et al.  Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..

[19]  Christine A. Henle,et al.  Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory , 2009, Comput. Hum. Behav..

[20]  Dirk D. Steiner,et al.  Factors affecting supervisors' use of disciplinary actions following poor performance , 1994 .

[21]  H. Kelman Compliance, identification, and internalization three processes of attitude change , 1958 .

[22]  Gary P. Latham,et al.  Effects of goal setting and supervision on worker behavior in an industrial situation. , 1973 .

[23]  Jintae Lee,et al.  A holistic model of computer abuse within organizations , 2002, Inf. Manag. Comput. Secur..

[24]  Herbert C. Kelman,et al.  Crimes of Obedience , 1990 .

[25]  Jeffrey M. Stanton,et al.  Traditional and Electronic Monitoring from an Organizational Justice Perspective , 2000 .

[26]  Richard A. Davis,et al.  Lost in Cyberspace: The Web @ Work , 2002, Cyberpsychology Behav. Soc. Netw..

[27]  Dinesh A. Mirchandani,et al.  Reducing Internet Abuse in the Workplace , 2003 .

[28]  Janice C. Sipior,et al.  A Strategic Response to the Broad Spectrum of Internet Abuse , 2002 .

[29]  I. Lundberg,et al.  Work control, work demands, and work social support in relation to alcoholism among young men. , 1998, Alcoholism, clinical and experimental research.

[30]  Kimberly Young,et al.  Internet Abuse in the Workplace: New Trends in Risk Management , 2004, Cyberpsychology Behav. Soc. Netw..

[31]  Peter R. Monge,et al.  The Dynamics of Organizational Proximity , 1985 .

[32]  B. Bass Bass & Stogdill's handbook of leadership: Theory, research, and managerial applications, 3rd ed. , 1990 .

[33]  Dennis Longley,et al.  Information security management and modelling , 1999, Inf. Manag. Comput. Secur..

[34]  Hock-Hai Teo,et al.  An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..

[35]  Hsiu-Fen Lin,et al.  Examination of cognitive absorption influencing the intention to use a virtual community , 2009, Behav. Inf. Technol..

[36]  Nathan Bennett,et al.  Employee Reactions to Electronic Control Systems , 1994 .

[37]  Dinesh A. Mirchandani A Deterrence Theory Perspective on Personal Web Usage , 2004 .

[38]  G. Stoney Alder,et al.  Employee Reactions to Internet Monitoring: The Moderating Role of Ethical Orientation , 2008 .

[39]  Christopher J. Meyer,et al.  How does organizational justice affect performance, withdrawal, and counterproductive behavior? , 2005 .

[40]  R. Bennett,et al.  Social Status and Aggressiveness as Moderators of the Relationship Between Interactional Justice and Workplace Deviance , 2004 .

[41]  Monica J. Favia,et al.  Reactions to unjust dismissal and third-party dispute resolution: A justice framework , 1992 .

[42]  R. Cialdini Influence: Science and Practice , 1984 .

[43]  Paul E. Spector Perceived Control by Employees: A Meta-Analysis of Studies Concerning Autonomy and Participation at Work , 1986 .

[44]  Vivien K. G. Lim,et al.  Cyberloafing at the workplace: gain or drain on work? , 2012, Behav. Inf. Technol..

[45]  Robert L. Hamblin,et al.  STRUCTURAL FACTORS AND INDIVIDUAL NEEDS IN GROUP BEHAVIOR , 1959 .

[46]  Tom R. Tyler,et al.  Can Businesses Effectively Regulate Employee Conduct? The Antecedents of Rule Following in Work Settings , 2005 .

[47]  Morgan W. McCall,et al.  Stogdill's Handbook of Leadership , 1982 .

[48]  Jennifer A. Chatman,et al.  Organizational commitment and psychological attachment: The effects of compliance, identification, and internalization on prosocial behavior. , 1986 .

[49]  Audra D. Hovorka‐Mead,et al.  WATCHING THE DETECTIVES: SEASONAL STUDENT EMPLOYEE REACTIONS TO ELECTRONIC MONITORING WITH AND WITHOUT ADVANCE NOTIFICATION , 2002 .

[50]  Anita L. Blanchard,et al.  Correlates of different forms of cyberloafing: The role of norms and external locus of control , 2008, Comput. Hum. Behav..

[51]  Jane M. Howell Two faces of charisma: Socialized and personalized leadership in organizations. , 1988 .

[52]  H. P. Sims,et al.  Just and Unjust Punishment: Influences on Subordinate Performance and Citizenship , 1994 .

[53]  Bruce J. Avolio,et al.  Individual attributes and leadership style: predicting the use of punishment and its effects , 1998 .

[54]  Clarence Schrag,et al.  Leadership Among Prison Inmates , 1954 .

[55]  Pablo Zoghbi Manrique de Lara,et al.  Fear in organizations: Does intimidation by formal punishment mediate the relationship between interactional justice and workplace internet deviance? , 2006 .

[56]  James E. Gaskin,et al.  Internet Acceptable Usage Policies: Writing and Implementation , 1998, Inf. Syst. Manag..

[57]  Margaret M. Blair,et al.  Trust, Trustworthiness, and the Behavioral Foundations of Corporate Law , 2001 .

[58]  D. Messick,et al.  Sanctioning Systems, Decision Frames, and Cooperation , 1999 .

[59]  Sang M. Lee,et al.  An integrative model of computer abuse based on social control and general deterrence theories , 2004, Inf. Manag..

[60]  S. Milgram Obedience to Authority: An Experimental View , 1975 .

[61]  Likoebe M. Maruping,et al.  Managing team interpersonal processes through technology: a task-technology fit perspective. , 2004, The Journal of applied psychology.

[62]  Jacob Cohen,et al.  Applied multiple regression/correlation analysis for the behavioral sciences , 1979 .

[63]  Katelyn Y. A. McKenna,et al.  Employee job attitudes and organizational characteristics as predictors of cyberloafing , 2011, Comput. Hum. Behav..

[64]  Pablo Zoghbi Manrique de Lara,et al.  Internet Research , 2022 .