Skip to main content
Log in

The effects and moderators of cyber-loafing controls: an empirical study of Chinese public servants

  • Published:
Information Technology and Management Aims and scope Submit manuscript

Abstract

Cyber-loafing—using the internet for non-work purposes during work time—can lower employee productivity and expose organizations to security risks. Organizations need to control this type of behavior. We studied two control methods: internet use policies and electronic monitoring. We empirically investigated the effectiveness of these two methods and how their effectiveness is influenced by the employees’ individual differences. Based on the data collected from 209 Chinese public servants, we found that both methods can significantly lower employees’ cyber-loafing intentions. Additionally, an internet use policy is more effective for employees with a high level of self-esteem than for those with a low level of self-esteem, whereas electronic monitoring is more effective for employees with a high level of job satisfaction than for those with a low level of job satisfaction. This study advances the theoretical understanding of methods for the control of cyber-loafing and has practical implications for the mitigation of its negative effects.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Lim VKG (2002) The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. J Organ Behav 23:675–694

    Article  Google Scholar 

  2. Lim VKG, Teo TSH, Loo GL (2002) How do I loaf here? Let me count the ways. Commun ACM 45(1):66–70

    Article  Google Scholar 

  3. Garrett RK, Danziger JN (2008) On cyberslacking: workplace status and personal Internet use at work. CyberPsychol Behav 11(3):287–292

    Article  Google Scholar 

  4. Garrett RK, Danziger JN (2008) Disaffection or expected outcomes: understanding personal Internet use during work. J Comput Mediat Commun 13(4):937–958

    Article  Google Scholar 

  5. Salary.com. The 2008 Wasting Time at Work Survey Reveals a Record Number of People Waste Time at Work 2009 [cited 2009 September 16]; Available from: http://www.salary.com/Articles/ArticleDetail.asp?part=par1083

  6. 8e6 Technologies, 2008 Personal Internet Use Survey: United States and United Kingdom. 2008

  7. Sinha A (2008) Websense survey—email and IM top the productivity loss, Porn Usage goes up, in Indian IT Industry. 2008

  8. Chinese office workers world’s worst in cyberslacking (2005) Auguest 18, 2005 [cited; Available from: http://english.people.com.cn/200508/18/eng20050818_203246.html

  9. Web@Work Survey 2006 (2006) [cited 2011 September 16]; Available from: http://www.securitymanagement.com/archive/library/websense_technofile0906.pdf

  10. Oswalt B, Elliott-Howard F, Austin SF (2003) Cyberslacking—Legal and ethical issues facing IT managers, in Annual conference of the international association for computer information systems. Las Vegas, NV

  11. Foltz CB, Cronan TP, Jones TW (2005) Have you met your organization’s comptuer usage policy? Ind Manag Data Syst 105(2):137–146

    Article  Google Scholar 

  12. Henle CA, Blanchard AL (2008) The interaction of work stressors and organizational sanctions on cyberloafing. J Manag Issues 20(3):383–400

    Google Scholar 

  13. Henle CA, Kohut G, Booth R (2009) Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: an empirical test of justice theory. Comput Hum Behav 25:902–910

    Article  Google Scholar 

  14. Liao Q, Luo X, Gurung A, Li L (2008) Workplace management and employee misuse: does punishment matter? J Comput Inform Syst 50(2):49–59

    Google Scholar 

  15. Anandarajan M, Paravastu N, Caiib BC, Simmers CA (2006) Perceptions of personal Web usage in the workplace: a Q-methodology approach. Cyber Psychol Behav 9(3):325–335

    Article  Google Scholar 

  16. Weatherbee TG (2009) Counterproductive use of technology at work: information & communications technologies and cyberdeviancy. Hum Resour Manag Rev 20:35–44

    Article  Google Scholar 

  17. Spector PE, Penney L, Bruursema K, Goh A, Kessler S (2005) The dimensionality of counterproductivity: are all counterproductive behaviours created equal? J Vocat Behav 68:446–460

    Article  Google Scholar 

  18. Bock G-W, Ho SL (2009) Non-work related computing (NWRC). Commun ACM 52(4):124–128

    Article  Google Scholar 

  19. Lim VKG, Chen DJQ (2009) Cyberloafing at the workplace: gain or drain on work? Behav Inf Technol, 11

  20. Vitak J, Crouse J, LaRose R (2011) Personal internet use at work: understanding cyberslacking. Comput Hum Behav 27:5, 1751

    Article  Google Scholar 

  21. Everton WJ, Mastrangelo PM, Jolton JA (2005) Personality correlates of employees’ personal use of work computers. CyberPsychol Behav 8(2):143–153

    Article  Google Scholar 

  22. Chen JV, Chen CC, Yang H (2008) An empirical evaluation of key factors contributing to internet abuse in the workplace. Ind Manag Data Syst 108(1):87–106

    Article  Google Scholar 

  23. Hollinger RC (1991) Neutralizing in the workplace: an empirical analysis of property theft and production deviance. Deviant Behav 12:169–202

    Article  Google Scholar 

  24. Minor WW (1981) Techniques of neutralization: a reconceptualization and empirical examination. J Res Crime Delinq 18:295–318

    Article  Google Scholar 

  25. Lim VKG, Teo TSH (2005) Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore. An exploratory study. Inf Manag 42:1081–1093

    Article  Google Scholar 

  26. Pee LG, Woon IMY, Kankanhalli A (2008) Explaining non-work-related computing in the workplace: a comparison of alternative models. Inf Manag 45:120–130

    Article  Google Scholar 

  27. Lee J, Yonghuwa L (2002) A holistic model of computer abuse within organizations. Inf Manag ComputSecur 10(2):57–63

    Google Scholar 

  28. de Lara PZM, Tacoronte DV, Ding JMT (2006) Do current anti-cyberloafing disciplinary practices have a replica in research findings?: a study of the effects of coercive strategies on workplace Internet misuse. Internet Res 16(4):450–467

    Article  Google Scholar 

  29. American Management Association (2007) Electronic monitoring and surveillance Survey. AMA/ePolicy Institute Research

  30. Dohertya NF, Anastasakisa L, Fulfordb H (2011) Reinforcing the security of corporate information resources: a critical review of the role of the acceptable use policy. Int J Inf Manag 31(3):201–209

    Article  Google Scholar 

  31. Baumgardner A (1990) To know oneself is to like oneself: self-certainty and self-affect. J Pers Soc Psychol 58(6):1062–1072

    Article  Google Scholar 

  32. Spector PE (1997) Job satisfaction: application, assessment, cause, and consequences. Sage Publications, Inc., London

    Google Scholar 

  33. Siau K, Nah FF-H, Teng L (2002) Acceptable internet use policy. Commun ACM 45(1):75–79

    Article  Google Scholar 

  34. Urbaczewski A, Jessup LM (2002) Does electronic monitoring of employee internet usage work? Commun ACM 45(1):80–83

    Article  Google Scholar 

  35. Stanton J, Weiss E (2000) Electronic monitoring in their own words: an exploratory study of employees’ experiences with new types of surveillance. Comput Hum Behav 16(4):423–440

    Article  Google Scholar 

  36. Alder GS, Noel TW, Ambrose ML (2006) Clarifying the effects of Internet monitoring on job attitudes: the mediating role of employee trust. Inf Manag 43(7):894–903

    Article  Google Scholar 

  37. Coopersmith S (1967) The antecedents of self-esteem. Freeman

  38. Harter S (1990) Self and identity development. The developing adolescent, At the threshold, pp 352–387

    Google Scholar 

  39. Dettinger S, Hart G (2007) The relationship between self-esteem and indirect aggression in the workplace. J Psychiatr Psychol 1(1)

  40. Brockner J (1988) Self-esteem at work. Lexington, Lexington, MA

    Google Scholar 

  41. Korman AK (1967) Self-esteem as a moderator of the relationship between self-perceived abilities and vocational choice. J Appl Psychol 51:65–67

    Article  Google Scholar 

  42. Korman AK (1970) Toward an hypothesis of work behavior. J Appl Psychol 54:31–41

    Article  Google Scholar 

  43. Leary MR, Tambor ES, Terdal SQ, Downs DL (1995) Self-esteem as an interpersonal monitor: the sociometer hypothesis. J Pers Soc Psychol 68(3):518–530

    Article  Google Scholar 

  44. Carver CS, Scheier MF (1981) Attention and self-regulation: a control theory approach to human behavior. Springer, New York

    Book  Google Scholar 

  45. Locke E (1976) The nature and causes of job satisfaction. Handb ind organ psychol 1:1297–1343

    Google Scholar 

  46. Spector PE (1985) Measurement of human service staff satisfaction: development of the job satisfaction survey. Am J Commun Psychol 13(6):693–713

    Article  Google Scholar 

  47. Bowling NA (2007) Is the job satisfaction-job performance relationship spurious? A meta-analytic examination. J Vocat Behav 71(2):167–185

    Article  Google Scholar 

  48. Dalal RS (2005) A meta-analysis of the relationship between organizational citizenship behavior and counterproductive work behavior. J Appl Psychol 90:1241–1255

    Article  Google Scholar 

  49. Judge TA, Scott BA, Ilies R (2006) Hostility, job attitudes, and workplace deviance: test of a multi-level model. J Appl Psychol 91:126–138

    Article  Google Scholar 

  50. Judge TA, Thoresen CJ, Bono JE, Patton GK (2001) The job satisfaction—Job performance relationship: a qualitative and quantitative review. Psychol Bull 127:376–407

    Article  Google Scholar 

  51. Mount M, Ilies R, Johnson E (2006) Relationship of personality traits and counterproductive work behaviors: the mediating effects of job satisfaction. Pers Psychol 59:591–622

    Article  Google Scholar 

  52. LePine JA, Erez A, Johnson DE (2002) The nature and dimensionality of organizational citizenship behavior: a critical review and meta-analysis. J Appl Psychol 87(1):52

    Article  Google Scholar 

  53. Organ DW, Ryan K (1995) A meta-analytic review of attitudinal and dispositional predictors of organizational citizenship behavior. Pers Psychol 48(4):775–802

    Article  Google Scholar 

  54. Gould S (1979) An equity-exchange model of organizational involvement. Acad Manag Rev 25:53–62

    Google Scholar 

  55. Gouldner AW (1960) The norm of reciprocity: a preliminary statement. Am Sociol Rev 25:161–178

    Article  Google Scholar 

  56. Li H, Zhang J, Sarathy R (2010) Understanding compliance with internet use policy from the perspective of rational choice theory. Decis Support Syst 48:635–645

    Article  Google Scholar 

  57. Alder GS, Schminkee M, Noel TW, Kuenzi M (2008) Employee reactions to Internet monitoring: the moderating role of ethical orientation. J Bus Ethics 80:481–498

    Article  Google Scholar 

  58. China, The Internet in China, in The Internet in China. 2010, Information Office of the State Council of the People’s Republic of China: Beijing

  59. www.henan.gov.cn (2006) Henan publishes ten disciplines; Public servants’ chatting online during work time is prohibited. [cited 2012 January 8th, 2012]; Available from: http://www.henan.gov.cn/hdjl/system/2006/12/25/010016206.shtml

  60. www.chinanews.com (2011) Ningbo city monitors public servants’ online activities during work time. Browsing non-work related websites is prohibited. [cited 2012 January 08, 2012]; Available from: http://www.chinanews.com/sh/2011/01-13/2787143.shtml

  61. Chang M, Cheung W (2001) Determinants of the intention to use Internet/WWW at work: a confirmatory study. Inf Manag 39(1):1–14

    Article  Google Scholar 

  62. Rosenberg M (1962) Self-esteem and concern with public affairs. Public Opin Q 26(2):201–211

    Article  Google Scholar 

  63. Nunnally J, Bernstein I (1994) Psychometric theory, McGraw-Hill New York. p 736

  64. Hair JF, Tatham RL, Anderson RE, Black W (1998) Multivariate data analysis, Prentice Hall

  65. Aiken LS, West SG (1991) Multiple regression: testing and interpreting interactions

  66. Cronbach LJ (1987) Statistical tests for moderator variables: flaws in analyses recently proposed. Psychol Bull 102(3):414–417

    Article  Google Scholar 

  67. Armstrong L, Phillips JG, Saling LL (2000) Potential determinants of heavier internet usage. Int J Hum Comput Stud 53(4):537–550

    Article  Google Scholar 

  68. Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Quarterly, 425–478

  69. Venkatesh V, Brown SA, Maruping LM, Bala H (2008) Predicting different conceptualizations of system use: the competing roles of behavioral intention, facilitating conditions, and behavioral expectation. MIS Quarterly 32(3):483–502

    Google Scholar 

Download references

Acknowledgments

This research is supported by the National Natural Science Foundation of China (Grant No. 71002089 and Grant No. 71171157).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jijie Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, J., Tian, J. & Shen, Z. The effects and moderators of cyber-loafing controls: an empirical study of Chinese public servants. Inf Technol Manag 14, 269–282 (2013). https://doi.org/10.1007/s10799-013-0164-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10799-013-0164-y

Keywords

Navigation