Determinants of cyberloafing: a comparative study of a public and private sector organization

Purpose Cyberloafing is the personal use of internet while at work. The purpose of this paper is to identify the factors affecting cyberloafing between public and private sector organizations. Design/methodology/approach This study uses the multiple motivational factors with the help of a theoretical paradigm, renowned as theory of interpersonal behavior (TIB). Data were collected through questionnaire to investigate the different behavioral factors between the public and private sector organizations. PLS path modeling and PLS-MGA are used to access the results on SMARTPLS 2.0 software. Findings Results show that the three factors of habit, intention, and social influences taken from the TIB model are important and have a higher path coefficient in a public sector organization setting. The factors of affect, facilitating condition and perceived consequences from TIB are greater in a private sector organization and have a higher path coefficient. By contrast, in multiple group analysis, results show that some factors are more predictive of cyberloafing behavior in a public sector organization, whereas other factors are more predictive for a private sector organization. Practical implications The findings of the current research are beneficial for both organizations and contribute toward policy-making decisions. These results help the managers of public and private sector organizations to decide how to control cyberloafing behavior by focusing on the important factors that lead to it. Originality/value This study shows strong and significant differences between the two types of organizations in terms of path coefficient. This implies that cyberloafing factors have different impacts on different organizations. The study fills an important gap in comparing public and private sector organizations with respect to cyberloafing behavior and clarifying which factors are more effective in predicting cyberloafing behavior according to type of organization. The paper is of great value for both kinds of organizations that face cyberloafing behavior issues.

[1]  M. Conner,et al.  Extending the Theory of Planned Behavior: A Review and Avenues for Further Research , 1998 .

[2]  Nor Ghani Mohd Nor,et al.  Information technology and survival of SMEs: an emprical study on Malaysian manufacturing sector , 2015, Inf. Technol. Manag..

[3]  James G. Phillips,et al.  Potential determinants of heavier internet usage , 2000, Int. J. Hum. Comput. Stud..

[4]  Yong Chen,et al.  An emerging technology – wearable wireless sensor networks with applications in human health condition monitoring , 2015 .

[5]  Chloris Qiaolei Jiang Internet addiction among young people in China: Internet connectedness, online gaming and academic performance decrement , 2014, Internet Res..

[6]  David F. Larcker,et al.  Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .

[7]  Murugan Anandarajan,et al.  Profiling Web Usage in the Workplace: A Behavior-Based Artificial Intelligence Approach , 2002, J. Manag. Inf. Syst..

[8]  Sacip Toker,et al.  An investigation of the impact of demographics on cyberloafing from an educational setting angle , 2015, Comput. Hum. Behav..

[9]  Vincent S. Lai,et al.  Prediction of Internet and World Wide Web usage at work: a test of an extended Triandis model , 2000, Decis. Support Syst..

[10]  Straub,et al.  Editor's Comments: An Update and Extension to SEM Guidelines for Administrative and Social Science Research , 2011 .

[11]  Senbo Chen,et al.  A Trust Evaluation Model for E-Learning Systems , 2014 .

[12]  M. Griffiths Internet abuse and internet addiction in the workplace , 2010 .

[13]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[14]  Paul Gray,et al.  Junk Computing - Is it Bad for an Organization? , 1996, Inf. Syst. Manag..

[15]  Jo Ann Oravec Constructive approaches to internet recreation in the workplace , 2002, CACM.

[16]  Mikko T. Siponen,et al.  Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work , 2013, Inf. Manag..

[17]  Kimberly Young,et al.  Internet Abuse in the Workplace: New Trends in Risk Management , 2004, Cyberpsychology Behav. Soc. Netw..

[18]  L. G. Pee,et al.  Explaining non-work-related computing in the workplace: A comparison of alternative models , 2008, Inf. Manag..

[19]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[20]  Anurag Agarwal,et al.  The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.

[21]  Stanley F. Slater,et al.  Issues in conducting marketing strategy research , 1995 .

[22]  T. Ramayah,et al.  Personal web usage and work inefficiency , 2010 .

[23]  Kai H. Lim,et al.  Why Employees Do Non-Work-Related Computing: An Exploratory Investigation through Multiple Theoretical Perspectives , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[24]  Keng Siau,et al.  Acceptable internet use policy , 2002, CACM.

[25]  Tugra Karademir,et al.  Cyberloafing as a barrier to the successful integration of information and communication technologies into teaching and learning environments , 2015, Comput. Hum. Behav..

[26]  Robert LaRose,et al.  Personal Internet use at work: Understanding cyberslacking , 2011, Comput. Hum. Behav..

[27]  Thompson S. H. Teo,et al.  How do I loaf here? let me count the ways , 2002, CACM.

[28]  Jakob Branger,et al.  From automated home to sustainable, healthy and manufacturing home: a new story enabled by the Internet-of-Things and Industry 4.0 , 2015 .

[29]  Alok Mishra,et al.  Predictive Effect of Gender and Sector Differences on Internet Usage Among Employees , 2010 .

[30]  Qiang Chen,et al.  A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor, and Intelligent Medicine Box , 2014, IEEE Transactions on Industrial Informatics.

[31]  Marko Sarstedt,et al.  Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .

[32]  W. Reinartz,et al.  An Empirical Comparison of the Efficacy of Covariance-Based and Variance-Based SEM , 2009 .

[33]  G. Favretto,et al.  Organizational Aspects of Cyberloafing , 2009 .

[34]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[35]  A. Taneja Determinants Of Adverse Usage Of Information Systems Assets: A Study Of Antecedents Of IS Exploit In Organizations , 2007 .

[36]  B. Verplanken,et al.  Reflections on past behavior: A self-report index of habit strength , 2003 .

[37]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[38]  Katelyn Y. A. McKenna,et al.  Employee job attitudes and organizational characteristics as predictors of cyberloafing , 2011, Comput. Hum. Behav..

[39]  Rudolf R. Sinkovics,et al.  The Use of Partial Least Squares Path Modeling in International Marketing , 2009 .

[40]  W. Block Cyberslacking, Business Ethics and Managerial Economics , 2011 .

[41]  Fariborz Rahimnia,et al.  Functions of control mechanisms in mitigating workplace loafing; evidence from an Islamic society , 2015, Comput. Hum. Behav..

[42]  Pablo Zoghbi Manrique de Lara,et al.  Internet Research , 2022 .

[43]  Trent Jaeger,et al.  A Flexible Security System for Using Internet Content , 1997, IEEE Softw..

[44]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[45]  Marko Sarstedt,et al.  Structural modeling of heterogeneous data with partial least squares , 2010 .

[46]  Gregory Moody,et al.  A multi-theoretical perspective on IS security behaviors , 2011 .

[47]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[48]  John Michael Pearson,et al.  Explaining Cyberloafing through a Theoretical Integration of Theory of Interpersonal Behavior and Theory of Organizational Justice , 2014, J. Organ. End User Comput..

[49]  L. G. Pee,et al.  Behavioral Factors Affecting Internet Abuse in the Workplace – An Empirical Investigation , 2004 .

[50]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[51]  Alok Mishra,et al.  Ethical behavior issues in software use: An analysis of public and private sectors , 2009, Comput. Hum. Behav..

[52]  Murugan Anandarajan,et al.  Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management , 2003 .

[53]  Jeffrey M. Stanton,et al.  Company profile of the frequent internet user , 2002, CACM.

[54]  Joey F. George,et al.  The theory of planned behavior and Internet purchasing , 2004, Internet Res..

[55]  Aakash Taneja,et al.  Cyber-slacking in the classroom: Potential for digital distraction in the new age , 2015, Comput. Educ..

[56]  Matthew S. Eastin,et al.  Psychology of Communication Technology Use in the Workplace , 2007, Cyberpsychology Behav. Soc. Netw..

[57]  Cornelius J. König,et al.  Exploring the positive side of personal internet use at work: Does it help in managing the border between work and nonwork? , 2014, Comput. Hum. Behav..

[58]  Lida Xu,et al.  Compressed Sensing Signal and Data Acquisition in Wireless Sensor Networks and Internet of Things , 2013, IEEE Transactions on Industrial Informatics.

[59]  Dennis F. Galletta,et al.  Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..

[60]  Slaven Brumec PREDICTING THE INTENTION TO USE INTERNET – A COMPARATIVE STUDY , 2008 .

[61]  Zauwiyah Ahmad,et al.  Personal Internet use: The use of personal mobile devices at the workplace , 2015 .

[62]  H C Triandis,et al.  Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[63]  Anita L. Blanchard,et al.  Correlates of different forms of cyberloafing: The role of norms and external locus of control , 2008, Comput. Hum. Behav..

[64]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[65]  Gee-Woo Bock,et al.  Why Employees Do Non-Work-Related Computing: An Investigation of Factors Affecting NWRC in a Workplace , 2006, PACIS.

[66]  Anat Hovav,et al.  Deterring internal information systems misuse , 2007, CACM.

[67]  Thompson S. H. Teo,et al.  Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study , 2005, Inf. Manag..

[68]  Jatinder N. D. Gupta,et al.  Improving Workers' Productivity and Reducing Internet Abuse , 2004, J. Comput. Inf. Syst..

[69]  Ståle Pallesen,et al.  Predictors of Use of Social Network Sites at Work - A Specific Type of Cyberloafing , 2014, J. Comput. Mediat. Commun..

[70]  Waiman Cheung,et al.  Determinants of the intention to use Internet/WWW at work: a confirmatory study , 2001, Inf. Manag..

[71]  Claire A. Simmers Aligning internet usage with business priorities , 2002, CACM.

[72]  Meng U. Taing,et al.  Explaining cyberloafing: The role of the theory of planned behavior , 2014, Comput. Hum. Behav..

[73]  Yeolib Kim,et al.  Personality predictors for the use of multiple internet functions , 2015, Internet Res..

[74]  Lisa Seymour,et al.  Web access for IT staff: a developing world perspective on web abuse , 2007, Electron. Libr..

[75]  Sandra L. Robinson,et al.  Dysfunctional Workplace Behavior , 2008 .

[76]  Vivien K. G. Lim,et al.  Cyberloafing at the workplace: gain or drain on work? , 2012, Behav. Inf. Technol..

[77]  Hongming Cai,et al.  IoT-Based Configurable Information Service Platform for Product Lifecycle Management , 2014, IEEE Transactions on Industrial Informatics.

[78]  Leonard M. Jessup,et al.  Does electronic monitoring of employee internet usage work? , 2002, CACM.

[79]  Manish Gupta,et al.  A fuzzy ANP based approach in the selection of the best E-Business strategy and to assess the impact of E-Procurement on organizational performance , 2014, Information Technology and Management.

[80]  D. Galletta,et al.  An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .