The effects and moderators of cyber-loafing controls: an empirical study of Chinese public servants

Cyber-loafing—using the internet for non-work purposes during work time—can lower employee productivity and expose organizations to security risks. Organizations need to control this type of behavior. We studied two control methods: internet use policies and electronic monitoring. We empirically investigated the effectiveness of these two methods and how their effectiveness is influenced by the employees’ individual differences. Based on the data collected from 209 Chinese public servants, we found that both methods can significantly lower employees’ cyber-loafing intentions. Additionally, an internet use policy is more effective for employees with a high level of self-esteem than for those with a low level of self-esteem, whereas electronic monitoring is more effective for employees with a high level of job satisfaction than for those with a low level of job satisfaction. This study advances the theoretical understanding of methods for the control of cyber-loafing and has practical implications for the mitigation of its negative effects.

[1]  Keng Siau,et al.  Acceptable internet use policy , 2002, CACM.

[2]  Nathaniel Branden,et al.  Self-Esteem At Work , 1998 .

[3]  G. Stoney Alder,et al.  Clarifying the effects of Internet monitoring on job attitudes: The mediating role of employee trust , 2006, Inf. Manag..

[4]  S. Gould An Equity - Exchange Model Of Organizational Involvement , 1979 .

[5]  J. Nunnally Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .

[6]  Paul E. Spector Measurement of human service staff satisfaction: Development of the Job Satisfaction Survey , 1985, American journal of community psychology.

[7]  Gee-Woo Bock,et al.  Non-work related computing (NWRC) , 2009, CACM.

[8]  G. Stoney Alder,et al.  Employee Reactions to Internet Monitoring: The Moderating Role of Ethical Orientation , 2008 .

[9]  Leonard M. Jessup,et al.  Does electronic monitoring of employee internet usage work? , 2002, CACM.

[10]  Abraham K. Korman,et al.  Toward an hypothesis of work behavior. , 1970 .

[11]  Charlie C. Chen,et al.  An empirical evaluation of key factors contributing to internet abuse in the workplace , 2008, Ind. Manag. Data Syst..

[12]  A. Korman Self-esteem as a moderator of the relationship between self-perceived abilities and vocational choice. , 1967, The Journal of applied psychology.

[13]  James G. Phillips,et al.  Potential determinants of heavier internet usage , 2000, Int. J. Hum. Comput. Stud..

[14]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[15]  Terrance Weatherbee Counterproductive use of technology at work: Information & communications technologies and cyberdeviancy , 2010 .

[16]  Rathindra Sarathy,et al.  Understanding compliance with internet use policy from the perspective of rational choice theory , 2010, Decis. Support Syst..

[17]  Robert LaRose,et al.  Personal Internet use at work: Understanding cyberslacking , 2011, Comput. Hum. Behav..

[18]  Thompson S. H. Teo,et al.  How do I loaf here? let me count the ways , 2002, CACM.

[19]  Waiman Cheung,et al.  Determinants of the intention to use Internet/WWW at work: a confirmatory study , 2001, Inf. Manag..

[20]  T. Judge,et al.  The job satisfaction-job performance relationship: a qualitative and quantitative review. , 2001, Psychological bulletin.

[21]  Paul E. Spector Job satisfaction: application, assessment, cause, and consequences , 1997 .

[22]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[23]  Nathan A. Bowling,et al.  Is the job satisfaction–job performance relationship spurious? A meta-analytic examination ☆ , 2007 .

[24]  L. G. Pee,et al.  Explaining non-work-related computing in the workplace: A comparison of alternative models , 2008, Inf. Manag..

[25]  Susan Harter,et al.  Self and identity development. , 1990 .

[26]  A. Baumgardner,et al.  To know oneself is to like oneself: self-certainty and self-affect. , 1990, Journal of personality and social psychology.

[27]  Christine A. Henle,et al.  Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory , 2009, Comput. Hum. Behav..

[28]  W. W. Minor,et al.  Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .

[29]  S. West,et al.  Multiple Regression: Testing and Interpreting Interactions. , 1994 .

[30]  A. Erez,et al.  The nature and dimensionality of organizational citizenship behavior: a critical review and meta-analysis. , 2002, The Journal of applied psychology.

[31]  Timothy Paul Cronan,et al.  Have you met your organization's computer usage policy? , 2005, Ind. Manag. Data Syst..

[32]  M. Mount,et al.  RELATIONSHIP OF PERSONALITY TRAITS AND COUNTERPRODUCTIVE WORK BEHAVIORS: THE MEDIATING EFFECTS OF JOB SATISFACTION , 2006 .

[33]  Vivien K. G. Lim,et al.  Cyberloafing at the workplace: gain or drain on work? , 2012, Behav. Inf. Technol..

[34]  Wendi J. Everton,et al.  Personality Correlates of Employees' Personal Use of Work Computers , 2005, Cyberpsychology Behav. Soc. Netw..

[35]  J. Hair Multivariate data analysis , 1972 .

[36]  Thompson S. H. Teo,et al.  Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study , 2005, Inf. Manag..

[37]  Paul E. Spector,et al.  The dimensionality of counterproductivity: Are all counterproductive behaviors created equal? , 2006 .

[38]  E. A. Locke The nature and causes of job satisfaction , 1976 .

[39]  S. Coopersmith,et al.  The antecedents of self-esteem. , 1969 .

[40]  Morris Rosenberg,et al.  SELF-ESTEEM AND CONCERN WITH PUBLIC AFFAIRS , 1962 .

[41]  Remus Ilies,et al.  Hostility, job attitudes, and workplace deviance: test of a multilevel model. , 2006, The Journal of applied psychology.

[42]  Qinyu Liao,et al.  Workplace Management and Employee Misuse: Does Punishment Matter? , 2009, J. Comput. Inf. Syst..

[43]  James N. Danziger,et al.  Disaffection or expected outcomes: Understanding personal Internet use during work , 2008, J. Comput. Mediat. Commun..

[44]  L. Cronbach Statistical tests for moderator variables: flaws in analyses recently proposed , 1987 .

[45]  R. Hollinger,et al.  neutralizing in the workplace: an empirical analysis of property theft and production deviance , 1991, Work Place Sabotage.

[46]  Viswanath Venkatesh,et al.  Predicting Different Conceptualizations of System Use: The Competing Roles of Behavioral Intention, Facilitating Conditions, and Behavioral Expectation , 2008, MIS Q..

[47]  James N. Danziger,et al.  On Cyberslacking: Workplace Status and Personal Internet Use at Work , 2008, Cyberpsychology Behav. Soc. Netw..

[48]  R. Dalal A meta-analysis of the relationship between organizational citizenship behavior and counterproductive work behavior. , 2005, The Journal of applied psychology.

[49]  A. Gouldner THE NORM OF RECIPROCITY: A PRELIMINARY STATEMENT * , 1960 .

[50]  C. Carver,et al.  Attention and Self-Regulation: A Control-Theory Approach to Human Behavior , 1981 .

[51]  Anita L. Blanchard,et al.  The Interaction of Work Stressors and Organizational Sanctions on Cyberloafing , 2008 .

[52]  M. Leary,et al.  Self-esteem as an interpersonal monitor: The sociometer hypothesis. , 1995 .

[53]  D. Organ,et al.  A META-ANALYTIC REVIEW OF ATTITUDINAL AND DISPOSITIONAL PREDICTORS OF ORGANIZATIONAL CITIZENSHIP BEHAVIOR , 1995 .

[54]  Neil F. Doherty,et al.  Reinforcing the security of corporate information resources: A critical review of the role of the acceptable use policy , 2011, Int. J. Inf. Manag..

[55]  Pablo Zoghbi Manrique de Lara,et al.  Internet Research , 2022 .

[56]  Murugan Anandarajan,et al.  Perceptions of Personal Web Usage in the Workplace: AQ-Methodology Approach , 2006, Cyberpsychology Behav. Soc. Netw..

[57]  Elizabeth M. Weiss,et al.  Electronic monitoring in their own words: an exploratory study of employees' experiences with new types of surveillance , 2000 .

[58]  Jintae Lee,et al.  A holistic model of computer abuse within organizations , 2002, Inf. Manag. Comput. Secur..