Explaining cyberloafing: The role of the theory of planned behavior

Examined the validity of the Theory of Planned Behavior as a model of cyberloafing.Across two studies, all hypotheses from the main TPB model were supported.The 3 predictors accounted for 32% and 37% of the variance in CL in two studies. The Internet enables employees to be more productive than ever before, but it also allows employees a new way to escape from work-cyberloafing. In our investigation, we test the validity of the Theory of Planned Behavior as a model of cyberloafing. In Study 1, the goal is to provide an initial test of the theory. In Study 2, we cross-validate the results from Study 1 in a sample that approaches representing the general working population. Results unanimously support the main TPB model, the model accounting for 32% and 37% of the variance in cyberloafing in Studies 1 and 2, respectively. The discussion addresses both the theoretical impact and practical implications of our work.

[1]  H. Staats,et al.  Explaining Proenvironmental Intention and Behavior by Personal Norms and the Theory of Planned Behavior1 , 1999 .

[2]  Kieran Mathieson,et al.  Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..

[3]  Leland Wilkinson,et al.  Statistical Methods in Psychology Journals Guidelines and Explanations , 2005 .

[4]  H. Park,et al.  Distinctiveness and Influence of Subjective Norms, Personal Descriptive and Injunctive Norms, and Societal Descriptive and Injunctive Norms on Behavioral Intent: A Case of Two Behaviors Critical to Organ Donation , 2007 .

[5]  Derya Ergun Ozler,et al.  CYBERLOAFING PHENOMENON IN ORGANIZATIONS: DETERMINANTS AND IMPACTS , 2012 .

[6]  Ute Bültmann,et al.  Behavioral Determinants as Predictors of Return to Work After Long-Term Sickness Absence: An Application of the Theory of Planned Behavior , 2009, Journal of Occupational Rehabilitation.

[7]  I. Ajzen The theory of planned behavior , 1991 .

[8]  Christopher M. Barnes,et al.  Lost sleep and cyberloafing: Evidence from the laboratory and a daylight saving time quasi-experiment. , 2012, The Journal of applied psychology.

[9]  Heather H. Jia,et al.  Relationships between the Big Five personality dimensions and cyberloafing behavior , 2008 .

[10]  Christine A. Henle,et al.  Stealing Time at Work: Attitudes, Social Pressure, and Perceived Control as Predictors of Time Theft , 2010 .

[11]  Wendi J. Everton,et al.  Personal Use of Work Computers: Distraction versus Destruction , 2006, Cyberpsychology Behav. Soc. Netw..

[12]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[13]  Wendi J. Everton,et al.  Personality Correlates of Employees' Personal Use of Work Computers , 2005, Cyberpsychology Behav. Soc. Netw..

[14]  Thompson S. H. Teo,et al.  Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study , 2005, Inf. Manag..

[15]  Paul E. Spector,et al.  The dimensionality of counterproductivity: Are all counterproductive behaviors created equal? , 2006 .

[16]  Vivien K. G. Lim,et al.  Self-Regulation, Individual Characteristics and Cyberloafing , 2010, PACIS.

[17]  Patricia Wallace The Internet in the Workplace: How New Technology Is Transforming Work , 2004 .

[18]  Amiram D. Vinokur,et al.  How did it work? An examination of the mechanisms through which an intervention for the unemployed promoted job-search behavior , 1992, American journal of community psychology.

[19]  Anita L. Blanchard,et al.  Correlates of different forms of cyberloafing: The role of norms and external locus of control , 2008, Comput. Hum. Behav..

[20]  Farley Stewart,et al.  Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues , 2000, Inf. Secur. J. A Glob. Perspect..

[21]  I. Ajzen,et al.  Knowledge and the Prediction of Behavior: The Role of Information Accuracy in the Theory of Planned Behavior , 2011 .

[22]  Kimberly Young,et al.  Employee Internet Management: Current Business Practices and Outcomes , 2002, Cyberpsychology Behav. Soc. Netw..

[23]  Katelyn Y. A. McKenna,et al.  Employee job attitudes and organizational characteristics as predictors of cyberloafing , 2011, Comput. Hum. Behav..

[24]  Pablo Zoghbi Manrique de Lara,et al.  Internet Research , 2022 .

[25]  Christine A. Henle,et al.  Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory , 2009, Comput. Hum. Behav..

[26]  I. Ajzen Attitudes, Personality and Behavior , 1988 .

[27]  Tao Zhou,et al.  Exploring Chinese users' acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory , 2009, Comput. Hum. Behav..

[28]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[29]  I. Ajzen,et al.  Choice of Travel Mode in the Theory of Planned Behavior: The Roles of Past Behavior, Habit, and Reasoned Action , 2003 .

[30]  S. Restubog,et al.  Yielding to (cyber)-temptation: Exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace , 2011 .

[31]  Antony Stephen Reid Manstead,et al.  Predicting mothers' intentions to limit frequency of infants' sugar intake: Testing the theory of planned behavior , 1991 .

[32]  Mark Conner,et al.  Different perceptions of control: Applying an extended theory of planned behavior to legal and illegal drug use , 1999 .

[33]  Harold P. Langford,et al.  Perceptions of Internet Abuse, Liability, and Fair Use , 1997 .

[34]  Carl A. Kallgren,et al.  A focus theory of normative conduct: Recycling the concept of norms to reduce littering in public places. , 1990 .

[35]  Katherine M. White,et al.  The Theory of Planned Behavior Applied to Young People's Use of Social Networking Web Sites , 2009, Cyberpsychology Behav. Soc. Netw..

[36]  Robert LaRose,et al.  Personal Internet use at work: Understanding cyberslacking , 2011, Comput. Hum. Behav..

[37]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[38]  I. Ajzen Constructing a TpB Questionnaire: Conceptual and Methodological Considerations , 2002 .

[39]  R. Baumeister,et al.  Ego Depletion: A Resource Model of Volition, Self-Regulation, and Controlled Processing , 2000 .