In search of a measure to investigate cyberloafing in educational settings

Cyberloafing is among the problematic tech-trends in contemporary work-based and educational settings. The current study administered an existing three-factor scale to three samples. The factor structure was not confirmed among high school teachers (n: 33), high school students (n: 479) and undergraduates (n: 86). A new and more comprehensive scale to address contemporary cyberloafing behaviors during lectures was developed through literature review, expert panels and observations. Data from undergraduate students (n: 471) were used for construct validation with an exploratory factor analysis (EFA), which revealed a five-factor structure and explained 70.44% of the total variance. Factors were sharing, shopping, real-time updating, accessing online content and gaming/gambling. The scale was administered to another undergraduate student sample (n: 215) and a social networker student group (n: 515). The structure was validated in these new samples through confirmatory factor analyses (CFA). The scale and current findings are expected to facilitate further cyberloafing research in educational settings. Factor structure of a previous scale was not validated in educational contexts.Contemporary social networking behaviors were reflected through a new scale.The scale revealed five factors and explained 70.44% of the total variance.The new structure was confirmed across undergraduates and social networkers.Explained variance ranged from 52.31% through 67.05% in different samples.

[1]  Mladen Bubonjić,et al.  Odrastanje u digitalnom dobu - Wim Veen, Ben Vrakking: Homo zappiens: Growing up in a digital age, Network continuum education, London, 2006 , 2013 .

[2]  Thomas A. O'Neill,et al.  Cyberslacking, engagement, and personality in distributed work environments , 2014, Comput. Hum. Behav..

[3]  Benjamin B. M. Shao,et al.  To monitor or not to monitor: Effectiveness of a cyberloafing countermeasure , 2015, Inf. Manag..

[4]  Reynol Junco,et al.  The effect of Twitter on college student engagement and grades , 2011, J. Comput. Assist. Learn..

[5]  J. Payne,et al.  Online Data Collection in Developing Nations , 2012 .

[6]  P. Bentler,et al.  Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .

[7]  Claire A. Simmers A Multidimensional Scaling Approach to Personal Web Usage in the Workplace , 2003 .

[8]  Robert F. DeVellis,et al.  Scale Development: Theory and Applications. , 1992 .

[9]  Wendi J. Everton,et al.  Personal Use of Work Computers: Distraction versus Destruction , 2006, Cyberpsychology Behav. Soc. Netw..

[10]  Mikko T. Siponen,et al.  Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work , 2013, Inf. Manag..

[11]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[12]  Himanshu Sharma,et al.  A multi-analytical approach to predict the Facebook usage in higher education , 2016, Comput. Hum. Behav..

[13]  Damien Page,et al.  Teachers’ personal web use at work , 2015, Behav. Inf. Technol..

[14]  Terrance Weatherbee Counterproductive use of technology at work: Information & communications technologies and cyberdeviancy , 2010 .

[15]  Ke Zhang,et al.  Tweeting for learning: A critical analysis of research on microblogging in education published in 2008-2011 , 2012, Br. J. Educ. Technol..

[16]  Alireza Sheikh,et al.  The antecedents of cyberloafing: A case study in an Iranian copper industry , 2015, Comput. Hum. Behav..

[17]  Katelyn Y. A. McKenna,et al.  Employee job attitudes and organizational characteristics as predictors of cyberloafing , 2011, Comput. Hum. Behav..

[18]  W. Block Cyberslacking, Business Ethics and Managerial Economics , 2011 .

[19]  Darren George,et al.  SPSS for Windows Step by Step: A Simple Guide and Reference , 1998 .

[20]  Meng U. Taing,et al.  Explaining cyberloafing: The role of the theory of planned behavior , 2014, Comput. Hum. Behav..

[21]  Rex B. Kline,et al.  Principles and Practice of Structural Equation Modeling , 1998 .

[22]  Elisheva F. Gross,et al.  Extending the school grounds?--Bullying experiences in cyberspace. , 2008, The Journal of school health.

[23]  Prabu David,et al.  Behavioral performance and visual attention in communication multitasking: A comparison between instant messaging and online voice chat , 2012, Comput. Hum. Behav..

[24]  Shelia R. Cotten,et al.  No A 4 U: The relationship between multitasking and academic performance , 2012, Comput. Educ..

[25]  M. Prensky Digital Natives, Digital Immigrants , 2001 .

[26]  Vivien K. G. Lim,et al.  Cyberloafing at the workplace: gain or drain on work? , 2012, Behav. Inf. Technol..

[27]  Janice C. Sipior,et al.  A Strategic Response to the Broad Spectrum of Internet Abuse , 2002 .

[28]  Christopher M. Barnes,et al.  Lost sleep and cyberloafing: Evidence from the laboratory and a daylight saving time quasi-experiment. , 2012, The Journal of applied psychology.

[29]  Sacip Toker,et al.  An investigation of the impact of demographics on cyberloafing from an educational setting angle , 2015, Comput. Hum. Behav..

[30]  Tugra Karademir,et al.  Cyberloafing as a barrier to the successful integration of information and communication technologies into teaching and learning environments , 2015, Comput. Hum. Behav..

[31]  P. Kirschner,et al.  Do Learners Really Know Best? Urban Legends in Education , 2013 .

[32]  J. Michael Pearson,et al.  The effects of sanctions and stigmas on cyberloafing , 2013, Comput. Hum. Behav..

[33]  S. Restubog,et al.  Yielding to (cyber)-temptation: Exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace , 2011 .

[34]  M. Prensky Do They Really Think Differently , 2001 .

[35]  Selami Aydin,et al.  A review of research on Facebook as an educational environment , 2012 .

[36]  Michael R. Mullen,et al.  Structural equation modelling: guidelines for determining model fit , 2008 .

[37]  James N. Danziger,et al.  On Cyberslacking: Workplace Status and Personal Internet Use at Work , 2008, Cyberpsychology Behav. Soc. Netw..

[38]  James G. Ross,et al.  Comparison of paper-and-pencil versus Web administration of the Youth Risk Behavior Survey (YRBS): Participation, data quality, and perceived privacy and anonymity , 2010, Comput. Hum. Behav..

[39]  Anita L. Blanchard,et al.  Correlates of different forms of cyberloafing: The role of norms and external locus of control , 2008, Comput. Hum. Behav..

[40]  Susan M. Ravizza,et al.  Non-academic internet use in the classroom is negatively related to classroom learning regardless of intellectual ability , 2014, Comput. Educ..

[41]  A. T. Panter,et al.  Theory testing in personality and social psychology with structural equation models: A primer in 20 questions. , 1990 .

[42]  Jackie McBride,et al.  "Cyberslacking" in the Classroom: The Reactions of Classroom Teachers. , 2013 .

[43]  Richard A. Kass,et al.  The Latent Structure of the Need Satisfying Properties of Leisure Activities , 1979 .

[44]  R. Cattell The Scree Test For The Number Of Factors. , 1966, Multivariate behavioral research.

[45]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[46]  Pablo Zoghbi-Manrique-de-Lara,et al.  Reconsidering the boundaries of the cyberloafing activity: the case of a university , 2012 .

[47]  H. Kaiser The varimax criterion for analytic rotation in factor analysis , 1958 .

[48]  Ståle Pallesen,et al.  Predictors of Use of Social Network Sites at Work - A Specific Type of Cyberloafing , 2014, J. Comput. Mediat. Commun..

[49]  Larry D. Rosen,et al.  An Empirical Examination of the Educational Impact of Text Message-Induced Task Switching in the Classroom: Educational Implications and Strategies to Enhance Learning , 2011 .

[50]  Aakash Taneja,et al.  Cyber-slacking in the classroom: Potential for digital distraction in the new age , 2015, Comput. Educ..

[51]  B. Tabachnick,et al.  Using Multivariate Statistics , 1983 .

[52]  M. Prensky Digital Natives, Digital Immigrants Part 1 , 2001 .

[53]  Richard G. Lomax,et al.  A Beginner's Guide to Structural Equation Modeling , 2022 .

[54]  Howard B. Lee,et al.  A first course in factor analysis , 1973 .

[55]  James C. Hayton,et al.  Factor Retention Decisions in Exploratory Factor Analysis: a Tutorial on Parallel Analysis , 2004 .

[56]  Thomas A. O'Neill,et al.  Prediction of cyberslacking when employees are working away from the office , 2014, Comput. Hum. Behav..

[57]  Faria Sana,et al.  Laptop multitasking hinders classroom learning for both users and nearby peers , 2013, Comput. Educ..

[58]  W. R. Dillon,et al.  A simulation study to investigate the use of cutoff values for assessing model fit in covariance structure models , 2005 .

[59]  Robert LaRose,et al.  Personal Internet use at work: Understanding cyberslacking , 2011, Comput. Hum. Behav..

[60]  Tiffany A. Whittaker,et al.  Scale Development Research , 2006 .

[61]  R. Henson,et al.  Use of Exploratory Factor Analysis in Published Research , 2006 .

[62]  R. Baumeister,et al.  Ego Depletion: A Resource Model of Volition, Self-Regulation, and Controlled Processing , 2000 .