A Critical Study of Factors Promoting Cyberloafing in Organizations

With recent advancements in employee surveillance systems monitoring employee activities, there is still a huge gap in the prevention of cyberloafing activities within an organization. Cyberloafing not only discloses the effectiveness of organizational usage policy but the practices that employees follow. This paper aims to identify the factors that support cyberloafing through a proper review. As a part of the review process, we will draw observations as to how cyberloafing depends on those said factors.

[1]  Pablo Zoghbi-Manrique-de-Lara,et al.  Inequity, conflict, and compliance dilemma as causes of cyberloafing , 2009 .

[2]  G. Blau,et al.  Testing a measure of cyberloafing. , 2006, Journal of allied health.

[3]  Pablo Zoghbi Manrique de Lara,et al.  Reconsidering the boundaries of the cyberloafing activity: the case of a university , 2012, Behav. Inf. Technol..

[4]  Troy J. Strader,et al.  Non‐Work‐Related Computing and Job Characteristics: Literature Review and Future Research Directions , 2014 .

[5]  Hosseini Mirza Hassan,et al.  An Experimental Study of Influential Elements on Cyberloafing from General Deterrence Theory Perspective Case Study: Tehran Subway Organization , 2015 .

[6]  Vivien K. G. Lim,et al.  Cyberloafing at the workplace: gain or drain on work? , 2012, Behav. Inf. Technol..

[7]  Meng U. Taing,et al.  Explaining cyberloafing: The role of the theory of planned behavior , 2014, Comput. Hum. Behav..

[8]  M. Triana,et al.  When Do Employees Cyberloaf? An Interactionist Perspective Examining Personality, Justice, and Empowerment , 2016 .

[9]  Benjamin B. M. Shao,et al.  To monitor or not to monitor: Effectiveness of a cyberloafing countermeasure , 2015, Inf. Manag..

[10]  Ståle Pallesen,et al.  Predictors of Use of Social Network Sites at Work - A Specific Type of Cyberloafing , 2014, J. Comput. Mediat. Commun..

[11]  G. Favretto,et al.  Organizational Aspects of Cyberloafing , 2009 .

[12]  Richard V. McCarthy,et al.  To restrict or not to restrict personal internet usage on the job , 2011 .

[13]  P. Larsson,et al.  Personal internet usage at work : A source of recovery , 2011 .

[14]  Lisa Seymour,et al.  Web access for IT staff: a developing world perspective on web abuse , 2007, Electron. Libr..

[15]  Gholamreza Jandaghi,et al.  Cyberloafing Management in Organizations , 2015 .

[16]  Rocci Luppicini,et al.  The Use and Abuse of Digital Democracy: Case Study of Mybarackobama.com , 2012, Int. J. Technoethics.

[17]  Fatih Karcıoğlu,et al.  The Relationship between Cyber Loafing and Organizational Citizenship Behavior: A Survey Study in Erzurum/Turkey , 2015 .

[18]  C. Piotrowski Cyberloafing: A Content Analysis of the Emerging Literature , 2012 .

[19]  James Richards,et al.  The many approaches to organisational misbehaviour: A review, map and research agenda , 2008 .

[20]  J. Michael Pearson,et al.  The effects of sanctions and stigmas on cyberloafing , 2013, Comput. Hum. Behav..

[21]  Vivien K. G. Lim,et al.  Self-Regulation, Individual Characteristics and Cyberloafing , 2010, PACIS.