Content uploaded by Casey Giordano
Author content
All content in this area was uploaded by Casey Giordano on Jul 24, 2019
Content may be subject to copyright.
Career Development International
A meta-analytic investigation of cyberloafing
Brittany K. Mercado, Casey Giordano, Stephan Dilchert,
Article information:
To cite this document:
Brittany K. Mercado, Casey Giordano, Stephan Dilchert, (2017) "A meta-analytic investigation of
cyberloafing", Career Development International, Vol. 22 Issue: 5, pp.546-564, https://doi.org/10.1108/
CDI-08-2017-0142
Permanent link to this document:
https://doi.org/10.1108/CDI-08-2017-0142
Downloaded on: 16 October 2017, At: 08:49 (PT)
References: this document contains references to 84 other documents.
To copy this document: permissions@emeraldinsight.com
The fulltext of this document has been downloaded 75 times since 2017*
Users who downloaded this article also downloaded:
(2017),"Determinants of cyberloafing: a comparative study of a public and private sector
organization", Internet Research, Vol. 27 Iss 1 pp. 97-117 <a href="https://doi.org/10.1108/
IntR-12-2014-0317">https://doi.org/10.1108/IntR-12-2014-0317</a>
(2017),"Using personality facets to understand the nature of personality-satisfaction relationships:
Findings from meta-analytic bifactor latent modeling", Career Development International, Vol. 22
Iss 5 pp. 477-506 <a href="https://doi.org/10.1108/CDI-08-2017-0141">https://doi.org/10.1108/
CDI-08-2017-0141</a>
Access to this document was granted through an Emerald subscription provided by emerald-
srm:198213 []
For Authors
If you would like to write for this, or any other Emerald publication, then please use our Emerald
for Authors service information about how to choose which publication to write for and submission
guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information.
About Emerald www.emeraldinsight.com
Emerald is a global publisher linking research and practice to the benefit of society. The company
manages a portfolio of more than 290 journals and over 2,350 books and book series volumes, as
well as providing an extensive range of online products and additional customer resources and
services.
Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the
Committee on Publication Ethics (COPE) and also works with Portico and the LOCKSS initiative for
digital archive preservation.
*Related content and download information correct at time of download.
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
A meta-analytic investigation
of cyberloafing
Brittany K. Mercado
Martha & Spencer Love School of Business, Elon University,
Elon, North Carolina, USA
Casey Giordano
Department of Psychology, University of Minnesota Twin Cities, Minneapolis,
Minnesota, USA, and
Stephan Dilchert
Department of Management, Baruch College, CUNY, New York, New York, USA
Abstract
Purpose –Cyberloafing, using technology to idle instead of work, is a particularly concerning issue for many
organizations due to its perceived widespread impact on productivity. The purpose of this paper is to meta-
analytically examine the growing literature on this construct in order to gain insights into its nomological
network and guide future research.
Design/methodology/approach –After a systematic literature search, the authors conducted
psychometric meta-analyses to estimate the relationships of 39 different correlates with cyberloafing.
The meta-analytic database was comprised of 54 independent samples contributing 609 effect sizes.
Findings –Results indicate that boredom, engagement, and self-control exhibit strong relationships with
cyberloafing, but employees’attitudes surrounding and opportunities to engage in cyberloafing also proved
powerful predictors. Contrary to common stereotypes, age and other demographic variables exhibited
negligible effects. Employment variables (e.g. tenure, organization level, and income) were also negligibly
related to cyberloafing. Emotional stability, conscientiousness, and agreeableness exhibited modest negative
relationships with cyberloafing, whereas self-control demonstrated a strong negative relationship. Although
cyberloafing strongly correlated with overall counterproductive work behaviors, the findings suggest it is
unrelated to other components of job performance.
Research limitations/implications –Because the cyberloafing literature is in its early stages, the present
study drew on a limited number of samples for several of the relationships analyzed. Rather than providing
conclusive evidence of the nomological network of cyberloafing, these analyses reinforce the need for
empirical investigation into several important relationships.
Originality/value –As the first quantitative review of the emerging cyberloafing literature, this study
synthesizes related studies from disparate disciplines, examines the nomological network of cyberloafing, and
highlights future directions for research into this phenomenon.
Keywords Meta-analysis, Productivity, Cyberloafing
Paper type Research paper
Technological advances positively contribute to employee productivity in many ways,
increasing accessibility of critical information, catalyzing task completion, and enhancing
collaboration in a variety of ways (e.g. telecommuting, enabling virtual teamwork).
However, jobs with frequent and convenient information technology access also provide
employees with opportunities to misuse such technology. In a recent survey of over two
thousand employed Americans, 62 percent of employees reported spending some of their
workday on social networking websites, and 10 percent indicated that they spend
30 percent or more of their workday on these sites (Ethics Resource Center, 2012). Of those
employees who were actively utilizing social media at work, only 14 percent limited their use
to lunch hours or other unpaid time. Similarly, Salary.com’s (2014) Wasting Time at Work
Survey found that 89 percent of employees reported wasting time at work every day, with
57 percent reporting wasting at least an hour each day; all of the commonly preferred time
wasting techniques consisted of visiting various webpages for personal purposes.
Career Development International
Vol. 22 No. 5, 2017
pp. 546-564
© Emerald Publishing Limited
1362-0436
DOI 10.1108/CDI-08-2017-0142
Received 24 May 2016
Revised 1 February 2017
Accepted 14 July 2017
The current issue and full text archive of this journal is available on Emerald Insight at:
www.emeraldinsight.com/1362-0436.htm
546
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
Organizations are clearly concerned with their workers’cyberloafing. This is exemplified by
the 43 percent of employers who block access to social media platforms on organization-owned
computers or handheld devices (Society for Human Resource Management, 2011). The extent of
employee time losses have alarmed organizations and consequently sparked a growing interest
among both scholars and practitioners who seek to identify mechanisms to reduce or avoid
these costly employee behaviors.
Cyberloafing
Lim (2002) originally conceptualized cyberloafing as employees’voluntary use of their
organizations’internet access for nonwork purposes during work time or, more simply, the
“IT way of idling on the job”(p. 678). Since cyberloafing was introduced in the academic
literature, opportunities to engage in technologically-facilitated loafing have expanded
greatly, resulting in a proliferation of conceptualizations of the construct. Many studies now
define and operationalize cyberloafing more broadly to include behaviors that use
information technology for purposes other than internet activity (e.g. nonwork-related
computing; Bock and Ho, 2009), while others examine specific types of cyberloafing, such as
social media use, that have risen in prevalence in recent years (Charoensukmongkol, 2014).
Recent empirical work in this area has also broadened the construct definition to include
additional devices that employees can utilize to cyberloaf (e.g. tablets, smartphones), no
longer requiring that technology be organizationally provided. In fact, items in the most
commonly used cyberloafing measures focus on specific activities but do not specify how
employees obtained access to technology. These conceptual shifts reflect technological
advances that have occurred in the past two decades. For example, in the early days of
cyberloafing, internet access was less common and more expensive; therefore, employees’
unsanctioned use of organizationally provided bandwidth was a prime concern. Today, with
employees frequently bringing their own data-enabled devices to work, managers are
concerned with other consequences of cyberloafing, such as time theft, productivity losses,
or unsafe behaviors. Despite subtle differences among the many conceptualizations of
cyberloafing and related constructs, they uniformly focus on employees using technological
devices to facilitate a break or “escape”from work and attend to nonwork tasks. As such,
these behaviors can be considered a form of withdrawal that is facilitated by information
technology. Therefore, for the purposes of this study, we will inclusively conceptualize
cyberloafing as employee behaviors that involve using information and communication
technologies to engage in nonwork behaviors instead of working. This approach
encompasses the many definitions encountered in our systematic review of the literature.
Cyberloafing threatens nearly all organizations because employees in most jobs have the
opportunity to engage in these behaviors on a variety of information technology devices.
Workers paid hourly can cyberloaf during dedicated work hours just as salaried workers
can use the internet for personal matters instead of accomplishing work tasks.
A salesperson reading the news rather than helping a customer; a receptionist e-mailing
friends during work hours; and an executive browsing Facebook during meetings are all
examples of cyberloafing. Also, unlike hacking or financial theft, cyberloafing does not
require extensive technological skill or criminal intent. The increasing use of
organizationally and privately owned internet-connected technological devices for both
personal and professional purposes, and their ubiquity among workers across occupations
regardless of job complexity, make cyberloafing a serious organizational concern.
Some scholars have explored the construct’s structure and identified potential
dimensionality. Blanchard and Henle (2008) empirically distinguished two primary forms
of cyberloafing, minor and serious. In their taxonomy, minor cyberloafing consists primarily
of e-mail-related and slacking behaviors, whereas serious cyberloafing includes behaviors
such as viewing adult-oriented sites and online gambling. Other scholars have distinguished
547
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
construct structure by the content of the behaviors, such as Lim and Teo’s (2005) e-mail vs
browsing distinction or Mahatanankoon et al.’s (2004) three dimensions of personal
web usage in the workplace: personal e-commerce (e.g. buying and selling online);
personal information research (e.g. researching personal hobbies); and personal
communication (e.g. interacting with family and friends). Because various investigations
have utilized different conceptualizations and measures of cyberloafing, there remains a
certain lack of clarity regarding the construct’s structure. Findings to date suggest that
cyberloafing ranges in severity and encompasses several different types of behaviors, from
surfing the internet and conducting personal errands to sending text messages and
communicating on social media while working.
The nomological network of cyberloafing has been of particular interest to researchers and
practitioners alike as they attempt to better understand the phenomenon and find paths to its
prediction and prevention. Scholars have examined a vast array of correlates. Classic theories
have guided investigation into cyberloafing’s relationships with perceptions of justice
(e.g. neutralization; Lim, 2002), employee attitudes, and intentions (e.g. theory of planned
behavior; Askew et al., 2014). Additionally, personality variables and job characteristics have
received attention, likely due to the direct practical implications of such findings (e.g. through
use in employee selection).
Beyond predicting cyberloafing, substantial inquiry has focused on whether
cyberloafing indeed results in detrimental outcomes (i.e. negatively relates to job
performance) or whether it might provide a necessary mechanism for overburdened
employees to take crucial breaks (i.e. with neutral or even positive impact on productivity).
Essentially, managers and researchers have both questioned whether cyberloafing is a
counterproductive work behavior. Media reports provide scenarios in which cyberloafing
is clearly counterproductive. For example, consider the train dispatcher who was playing
mobile games on the job (Smale, 2016). Due to his inattention, he failed to properly direct
two trains which then collided, leaving over 80 passengers injured and 11 killed.
As horrific and egregious as single cases may be, not all instances of cyberloafing
behaviors are necessarily deemed negative in the scholarly literature, which has presented
varied perspectives.
Block (2001) argued that cyberloafing was just a new version of traditional loafing; viewing
it as merely another form of employee counterproductivity; he posited that it should be
managed using the same techniques and strategies that had traditionally been effective for
other CWB. Bock and Ho (2009), along with others, demonstrated not only the negative
influence of nonwork-related computing on job performance but also the larger negative effects
of nonwork-related computing compared to other nonwork activities that do not involve
technology (e.g. traditional loafing). Another study investigated emergency department
employees’Facebook usage on hospital workstations and found the health care workers spent
an average of 12 minutes per hour browsing Facebook alone (Black et al., 2013). Unfortunately,
such nonwork-related behavior increased with workload, such that employees viewed
Facebook more frequently in times of higher patient volumeand severity. In this case,the costs
of a behavior as seemingly harmless as social networking extend beyond organizational
resource loss to more significant consequences, including endangering patient well-being.
In contrast, Cao et al. (2016) recently demonstrated that social media use can promote
employees’social capital,facilitating knowledge transfer and consequently work performance.
Lim and Chen (2012) also considered the potential benefits of cyberloafing to employees’
emotional states and demonstrated that certain forms of cyberloafing, such as browsing the
internet, positively influenced employees’positive affect. Beyond the costs and benefits of
cyberloafing to organizations, these behaviors may yield additional, nonwork benefits to
employees. Because technology has blurred the work-life boundaries for many workers,
invading personal time with work tasks (e.g. constant accessibility and off-hours e-mailing),
548
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
employees may see cyberloafing as a way to restore the balance between work and
nonwork domains.
We have undertaken this review without an a priori judgment of how and why
cyberloafing behaviors should be addressed, recognizing their potential to be manifestations
of counterproductivity or opportunities for necessary cognitive relief. We attempt to
investigate the nomological network of cyberloafing and allow evidence to demonstrate the
nature and valence of these work behaviors. Employers are trying to reduce occurrence of
cyberloafing behaviors, but further insight is needed in order to determine whether (and if so,
to what extent) a reduction in employee cyberloafing actually aligns with organizational goals,
both in terms of productivity as well as employee engagement.
The present study
We have two primary objectives for this meta-analytic investigation of cyberloafing.
First, we seek to summarize the growing literature on cyberloafing and related constructs.
Although this body of work is still in its early stages, substantial progress has been made
over the past 15 years to understand these behaviors and their correlates. Because that
progress spanned different disciplines and conceptual labels, many important findings have
gone undetected rather than contributing to a coherent body of work. We hope that by
cumulating results from these studies, we can help catalyze research into employee
cyberloafing. The secondary objective for this study is to guide future research by
highlighting areas that are promising, yet neglected to date.
Methods
Literature search and inclusion criteria
We conducted a sixfold literature search to uncover studies that were relevant for inclusion
in the present set of meta-analyses. First, we searched the PsycINFO, PsycARTICLES,
Business Source Complete, Academic Search Complete, Social Sciences Full Text, and
SocINDEX with Full Text databases using the following keywords: personal internet use,
nonwork related computing, cyberloaf*, cyberslack*, cyberdevian*, and social media in
conjunction with (“AND”)employee*, work*, and job. We included databases from beyond
industrial organizational psychology, organizational behavior, and management due to the
interdisciplinary nature of the cyberloafing construct. Second, we used Google Scholar to
identify articles that cited Lim’s (2002) seminal article on cyberloafing. This technique
allowed us to locate many unpublished documents, including works-in-progress and
conference papers that were made available online by the authors. The majority of included
studies were sourced from these first two searches. Third, we conducted manual searches of
the programs from the annual conferences of the Academy of Management and the Society
for Industrial and Organizational Psychology for the past ten years, yielding 16 relevant
presentations. Six of those had since become available in other published form, and we
contacted the authors to inquire about the remaining ten. Of those authors contacted, three
provided sufficient results to be considered for inclusion. Fourth, because Computers in
Human Behavior was the most common publication outlet among the uncovered studies, we
also examined the journal’s upcoming issues, including articles that are available online
first, in press, or in preparation and may not yet be indexed. This search yielded three
relevant articles, two of which were usable. Fifth, we contacted prominent researchers in this
research domain to request potentially available raw data and unpublished work. However,
none of these researchers had unpublished work to share. Finally, we conducted a search of
the reference lists of all included studies. This yielded an additional 91 studies to be
considered for inclusion.
Studies with sufficient information to extract a correlation (or effect size that could be
converted to a correlation) between cyberloafing behaviors and any other variable were obtained.
549
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
Over the past decade, constructs highly congruent with cyberloafing have emerged under
different labels in other disciplines, including cyberslacking, personal web usage,
technological time banditry, nonwork-related computing, social media use at work, and
counterproductive computer use (Anandarajan and Simmers, 2004; Bock and Ho, 2009;
Brock et al., 2013; Charoensukmongkol, 2014; Gallagher, 2009; Pee et al., 2008; Vitak et al., 2011).
Due to their conceptual similarity, we included a variety of these variables in our data set as
forms of cyberloafing. Although this approach leads to slightly more heterogeneous analyses in
terms of construct measures included, the primary differences between these behavioral
categories are their names, and it was our intention to examine the cyberloafing
construct comprehensively.
The initial database consisted of 221 sources that reported a relationship between
cyberloafing and other variables of interest. Of these, we retained only studies that met the
following five inclusion criteria: First, we only included studies that utilized behavioral
measures of cyberloafing (e.g. excluding studies relying purely on intentions to commit such
behaviors). Second, studies had to operationalize cyberloafing within an occupational
context (e.g. studies drawing on students cyberloafing in class were excluded). Third, we
included only studies that involved reports of employee cyberloafing behaviors in real work
settings and thus excluded experimental manipulations of cyberloafing in laboratory
studies. Fourth, we included studies that reported correlations or effect sizes that could be
converted to correlations, but not studies that only reported results from multiple regression
or structural equation modeling analyses. Fifth, we excluded any sources that suppressed
statistically insignificant results to avoid an upward bias in cumulated effects (Schmidt and
Hunter, 2014). In total, 49 studies met these inclusion criteria and were subsequently coded
by the second author. In total, 12 percent of these studies were coded by an additional coder;
they identified only one discrepancy, which was subsequently resolved. The coded studies
were based on 54 unique samples and yielded 609 separate effect sizes. Several studies
contributed multiple independent samples, which offset the deficit created by studies using
duplicate sample pools (e.g. Pew internet and American Life sample)[1]. In most studies,
numerous correlates were examined in each sample and thus contributed to separate meta-
analyses reported here. In order to avoid second order sampling error to the degree possible,
we analyze and report only relationships where at least three independent samples reported
an effect for the variables of interest, in line with previous conventions
(e.g. Berry et al., 2007; Cohen-Charash and Spector, 2001). In sum, we utilized 315 distinct
correlation coefficients to examine the relationships between cyberloafing and 40 variables.
Table I lists and defines the core constructs included in these analyses.
Measures of cyberloafing
Our broad literature search approach led to the inclusion of studies utilizing a wide variety of
measures of cyberloafing. Two of the most common measures, Lim’s (2002) and Lim and Teo’s
(2005) cyberloafing scales, asked how time was spent online at work. More recently, Mercado and
Dilchert (2016a, b, c, d) assessed the extent to which employees engage in various cyberloafing
behaviors while they should be working. Despite these differences, there is substantial similarity
across items both within and across measures, with each scale comprised primarily of various
internet browsing and messaging behaviors. Due to differences in facet structures across these
measures,withmanystudiesreportingonlyone general factor of cyberloafing, an overall
cyberloafing dimension was most appropriate and feasible for these meta-analyses.
Meta-analytic procedure
In addition to coding effect sizes between cyberloafing and each reported variable,
we recorded rating source (e.g. self-report, other rating, objective records), measure
characteristics (e.g. item number, reliability estimates), and sample characteristics
550
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
(e.g. demographics and work experience) for potential use in moderator analyses.
Psychometric meta-analyses were conducted based on procedures outlined by Schmidt and
Hunter (2014) using the Open Psychometric Meta-Analysis software (Wiernik, 2015).
Occasionally, a single source reported multiple effect sizes from the same unique sample
that were relevant to the same analysis (e.g. multiple job performance facets). To ensure
Variable Definition
Cyberloafing Employee behaviors that involve using information and communication technologies
to engage in nonwork behaviors instead of working
Agreeableness The Big Five personality dimension reflecting the extent to which a person is likable,
cooperative, and conflict-avoidant
Conscientiousness The Big Five personality dimension reflecting the extent to which a person is
dedicated, disciplined, orderly, and detail-oriented
Emotional stability The Big Five personality dimension reflecting the extent to which a person is calm
and secure and is not anxious or volatile
Openness The Big Five personality dimension reflecting the extent to which a person is
curious, intelligent, imaginative, and independent
Extraversion The Big Five personality dimension reflecting the extent to which a person is
sociable, assertive, gregarious, and energetic
Self-control The personality trait reflecting the extent to which a person monitors and inhibits
his/her impulses, thoughts, and behaviors
Self-efficacy The extent to which a person believes in his/her own abilities, including general as
well as technology-specific forms of self-efficacy
Boredom The extent to which a person experiences a negative affective state of under-
stimulation and disengagement from his/her situation
Job satisfaction The extent to which an employee experiences a positive affective state upon
appraising his/her job
Attitudinal
engagement
The extent to which an employee is enthusiastic about his/her work and committed
to the organization, including identification with the job and perceptions of
meaningfulness with his/her work
Empowerment/job
autonomy
The extent to which an employee perceives authority or power over his/her work
tasks or within the workplace more generally
Support The extent to which an employee perceives support from his/her manager,
organization, or coworkers
Organizational justice The extent to which an employee perceives fairness in the workplace
Distributive justice The extent to which an employee perceives fairness in the distribution of outcomes
or rewards
Interactional justice The extent to which an employee perceives he/she has been fairly and
respectfully treated
Procedural justice The extent to which an employee perceives fairness in the processes used to
determine reward or outcome distribution
Neutralization The extent to which a person rationalizes deviant behaviors to justify or excuse them
Performance Employee behaviors that contribute to the organization and its members, including
job and task performance as well as citizenship behaviors
Overall CWB Employee behaviors that detract from organizational goals or well-being,
including those that bring about negative consequences for the organization
and/or its members
Time theft/loafing Employee behaviors that use paid work time for nonwork purposes
Norms The extent to which an employee perceives cyberloafing to be normal or prevalent in
his/her workplace
Monitoring The extent to which an employee perceives that his/her cyberloafing is being
monitored electronically by the organization
Guidelines or rules The extent to which a workplace is governed by guidelines, rules or policies about
technology use at work
Consequences The extent to which an employee perceives that there will be punishment, sanctions,
or other costs as a result of their cyberloafing
Table I.
Overview of
core constructs
551
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
independence of effect size estimates contributing to each analysis, and (secondarily) to
ensure consistency with regard to the constructs included in each analysis, we formed
composite correlations (cf. Ghiselli et al., 1981) for cases where the required scale
intercorrelations were available and averaged effects if this was not the case. Averaging
correlations leads to a more conservative estimate of the underlying relationships; thus,
average correlations are acceptable alternatives when a composite cannot be computed
(Schmidt and Hunter, 2014). When composite correlations were calculated, reliabilities of the
composites were calculated using Mosier’s (1943) formula. In cumulating the available
effects in individual meta-analyses, the biasing influences of sampling error as well as
attenuation due to measurement error in the predictor and criterion were corrected using
statistical artifact distributions. A list of artifact distributions used in the corrections can be
found in Table II. Due to the limited number of studies as well as a lack of consistent
normative information for cyberloafing and other construct measures in this emerging
research domain, it was difficult to ascertain the extent to which range restriction had an
influence on the observed effects. Therefore, no corrections for range restriction could be
applied. Any resulting true correlations should be considered conservative estimates for this
reason. Moderator analyses were also not conducted due to the lack of consistently available
information as well as insufficient sample sizes from the included studies.
Results
Table III presents meta-analytic results for the relationship between cyberloafing,
demographic background, and employment variables. Gender and age displayed negligible
relationships with cyberloafing ( ρ¼−0.07, −0.08, respectively), whereas education
displayed a modest positive effect ( ρ¼0.11), signifying that more educated individuals
engaged in greater cyberloafing. Employment variables also exhibited varied relationships
with cyberloafing. Job tenure, organizational level, and income demonstrated negligible
effects ( ρ¼−0.08, 0.08, and 0.05, respectively), indicating that cyberloafing is pervasive
across various types of employees and organizational levels. However, hours worked per
week demonstrated a small positive relationship ( ρ¼0.12) with cyberloafing, indicating
that individuals engage in such behaviors as their time on the job/task increases.
Personality variables displayed a modest but persuasive pattern of true-score
correlations with cyberloafing (see Table IV ). While openness and extraversion were
unrelated to cyberloafing ( ρ¼0.01 and 0.00, respectively), agreeableness,
conscientiousness, and emotional stability demonstrated modest negative relationships
(ρ¼−0.11, −0.11, and −0.16, respectively). Such a pattern of results might be expected
based on previous findings on the relationships between these three Big Five dimensions
(often conceptualized as the core of a construct termed “socialization”)and
counterproductive work behaviors (CWB) (see Berry et al., 2007; Ones et al., 1993, 2005).
The two narrower traits for which sufficient data were available, self-control and
self-efficacy, displayed even more notable relationships. Self-control demonstrated a
negative and moderately strong relationship ( ρ¼−0.32); self-efficacy (across global and
computer/internet-specific measures) exhibited a moderate positive relationship with
cyberloafing ( ρ¼0.20)[2]. In sum, individuals who are high in self-control are less likely to
exhibit cyberloafing; the same is true (albeit to a lesser degree) of individuals who are high
in socialization as well as those lower on self-efficacy.
We next examined the relationships between attitudinal, engagement, and organization
perception variables and cyberloafing (see Table V ). Both boredom and empowerment/job
autonomy demonstrated moderate positive relationships with cyberloafing ( ρ¼0.24 and
0.21, respectively), indicating that bored employees and those who are empowered to
determine the course of their daily actions are more likely to engage in cyberloafing.
In contrast, employee engagement was moderately negatively related to cyberloafing
552
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
(ρ¼−0.21), suggesting that engaged employees who are highly committed to their jobs will
be less likely to cyberloaf. Cyberloafing was negligibly related to both job satisfaction
(ρ¼−0.04, and 0.01, with and without one extreme outlier, respectively) and perceptions of
organizational support ( ρ¼0.03).
Following employee attitudes, we considered how employee perceptions of the organization
might influence their behaviors. Organizational justice demonstrated a small negative
Variable k rxx SDrxx Mffiffiffiffiffi
rxx
pSD ffiffiffiffiffiffi
rxx
p
Cyberloafing 42 0.87 0.07 0.93 0.04
Emotional stability
a
459 0.77 0.10 0.87 0.06
Extraversion
a
186 0.80 0.07 0.89 0.04
Openness
a
32 0.76 0.08 0.87 0.05
Agreeableness
a
26 0.79 0.05 0.89 0.03
Conscientiousness
a
90 0.77 0.08 0.87 0.05
Self-control
a
48 0.70 0.12 0.84 0.07
Self-efficacy
a
264 0.90 0.00 ––
Boredom 7 0.91 0.04 0.95 0.02
Job satisfaction
a
13 0.84 0.06 0.92 0.03
Attitudinal engagement 5 0.88 0.09 0.94 0.05
Empowerment/job autonomy 3 0.90 0.02 0.95 0.01
Support 4 0.83 0.11 0.91 0.06
Organizational justice 5 0.92 0.04 0.96 0.02
Distributive justice
a
66 0.91 –– –
Interactional justice 8 0.86 0.06 0.92 0.04
Procedural justice
a
66 0.91 –– –
Neutralization 3 0.89 0.05 0.94 0.03
Performance
a,b
7 0.90 –– –
Overall CWB 7 0.86 0.05 0.93 0.03
Time theft/loafing 4 0.70 0.06 0.84 0.04
Favorable attitude toward cyberloafing 7 0.90 0.04 0.95 0.02
Intentions to cyberloaf 6 0.89 0.09 0.94 0.05
Perceived benefits of cyberloafing 4 0.89 0.05 0.94 0.03
Habitual cyberloafing 5 0.86 0.07 0.93 0.04
Usage/time on internet 1 0.91 0.00 0.95 0.00
Internet/social media skills/experience 1 0.79 0.00 0.89 0.00
Ability to hide cyberloafing 3 0.89 0.03 0.94 0.02
Norms 10 0.86 0.08 0.93 0.04
Monitoring 2 0.75 0.01 0.86 0.01
Guidelines or rules 2 0.73 0.00 0.85 0.00
Consequences 4 0.89 0.06 0.94 0.03
Notes: k, number of independent reliability estimates in distribution; rxx , average reliability estimate; SDrxx ,
standard deviation of reliability estimates; Mffiffiffiffiffi
rxx
p, average of the square roots of reliability estimates; SD ffiffiffiffiffiffi
rxx
p,
standard deviation of the square roots of the reliability estimate. Analyses for variables not listed in this table
were not corrected for attenuation due to unreliability.
a
Reliability artifact distribution obtained from existing
meta-analytic literature; for rows with missing SD of estimates, only kand the mean of estimates were
available from the literature. Reliability artifact distributions for Big Five personality trait measures as well
as the compound trait self-control were obtained from Dilchert (2008), who compiled comprehensive artifact
distributions based on meta-analytic work by Ones and colleagues (sources included Birkland and Ones, 2006,
for emotional stability; Davies et al., 2008, for extraversion; Connelly et al., 2008, for openness; Connelly et al.,
2008, for Agreeableness; and Connelly and Ones, 2007, for conscientiousness). The artifact distribution for
self-efficacy measures was obtained from Seltzer (2013);
b
the typically more suitable value of 0.52 used in
most meta-analysis of supervisory ratings of job performance was not used, as all studies contributing to the
present meta-analysis employed exclusively self-report measures of performance. Correlations with job
performance were corrected using an internal consistency reliability estimate of 0.90, based on seven values
reported in the meta-analysis by Harris and Schaubroeck (1988)
Table II.
Reliability artifact
distributions
553
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
relationship with cyberloafing ( ρ¼−0.12); this effect also occurred at the dimension level for
interactional justice and procedural justice ( ρ¼−0.10 and −0.11, respectively) but not
distributive justice ( ρ¼0.00). Neutralization, a rationalization process that utilizes perceptions
of inequity as justification for one’s own wrongdoing, was strongly positively related to
cyberloafing ( ρ¼0.43), suggesting that individuals are more likely to engage in it if they feel
they are owed due to not being repaid for investments they have made into the company.
Next, we examined the influence of employees’attitudes toward cyberloafing and their
opportunities to engage in these behaviors (see Table VI for detailed results). Favorable
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
Gender
a
23 7,019 −0.07 0.11 0.09 0.02 −0.07 0.10 −0.11, −0.03 −0.20, 0.05
Age 23 8,301 −0.08 0.12 0.10 0.02 −0.08 0.11 −0.13, −0.04 −0.22, 0.06
Education 6 2,948 0.11 0.13 0.12 0.05 0.11 0.13 0.00, 0.23 −0.05, 0.28
Hours worked 6 1,858 0.11 0.06 0.00 0.02 0.12 0.00 0.07, 0.17 0.12, 0.12
Job tenure 10 3,116 −0.07 0.10 0.08 0.03 −0.08 0.09 −0.14, −0.01 −0.19, 0.03
Organization level 8 2,943 0.07 0.13 0.12 0.05 0.08 0.13 −0.01, 0.17 −0.08, 0.24
Income 8 2,807 0.05 0.11 0.10 0.04 0.05 0.11 −0.03, 0.14 −0.08, 0.19
Notes: k, number of independent samples contributing to analysis; N, total sample size; r, mean sample-size-
weighted observed correlation; SD
r
, standard deviation of mean sample-size-weighted correlations; SD
res
,
residual standard deviation; SEr, standard error of r;ρ, true-score correlation (corrected for unreliability in
both measures for cases where artifact distributions are listed in Table II); 90% CI
ρ
¼90% confidence interval
of ρ; 80% CV
ρ
¼80% credibility values of ρ.
a
Male ¼0, female ¼1
Table III.
Meta-analytic results
for demographic
background and
employment variables
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
Emotional stability 8 2,253 −0.13 0.08 0.05 0.03 −0.16 0.06 −0.22, −0.09 −0.24, −0.08
Extraversion 7 2,006 0.00 0.10 0.08 0.04 0.00 0.09 −0.08, 0.09 −0.12, 0.12
Openness 7 2,006 0.01 0.07 0.04 0.03 0.01 0.05 −0.06, 0.07 −0.05, 0.07
Agreeableness 7 2,005 −0.09 0.06 0.00 0.02 −0.11 0.00 −0.16, −0.06 −0.12, −0.11
Conscientiousness 11 3,212 −0.09 0.07 0.04 0.02 −0.11 0.05 −0.16, −0.07 −0.17, −0.05
Self-control 5 1,224 −0.25 0.27 0.27 0.12 −0.32 0.34 −0.65, 0.02 −0.76, 0.12
Self-efficacy 6 1,744 0.17 0.10 0.08 0.04 0.20 0.09 0.10, 0.29 0.08, 0.31
Note: See Table III for notes
Table IV.
Meta-analytic results
for personality
variables
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
Boredom 7 1,939 0.21 0.08 0.05 0.03 0.24 0.06 0.17, 0.31 0.16, 0.32
Job satisfaction 14 4,868 −0.04 0.19 0.18 0.05 −0.04 0.22 −0.15, 0.06 −0.32, 0.23
(without outlier) 13 4,595 0.01 0.06 0.03 0.02 0.01 0.04 −0.03, 0.05 −0.04, 0.06
Attitudinal engagement 7 2,333 −0.18 0.20 0.19 0.08 −0.21 0.22 −0.40, −0.02 −0.49, 0.07
Empowerment/job
autonomy 4 1,788 0.18 0.09 0.08 0.05 0.21 0.09 0.08, 0.33 0.09, 0.32
Support 4 866 0.03 0.10 0.07 0.05 0.03 0.08 −0.11, 0.17 −0.08, 0.14
Organizational justice 6 1,132 −0.10 0.08 0.04 0.03 −0.12 0.04 −0.19, −0.04 −0.17, −0.06
Distributive justice 8 2,051 0.00 0.16 0.15 0.06 0.00 0.17 −0.12, 0.12 −0.21, 0.22
Interactional justice 8 2,585 −0.09 0.14 0.13 0.05 −0.10 0.15 −0.21, 0.01 −0.29, 0.09
Procedural justice 9 2,289 −0.10 0.15 0.14 0.05 −0.11 0.15 −0.22, −0.01 −0.30, 0.08
Neutralization 3 684 0.38 0.08 0.05 0.04 0.43 0.05 0.28, 0.58 0.36, 0.50
Note: See Table III for notes
Table V.
Meta-analytic results
for attitudinal,
engagement, and
organization
perception variables
554
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
attitudes toward cyberloafing exhibited a strong positive relationship ( ρ¼0.42) and
intentions to cyberloaf very strongly positively correlated with cyberloafing ( ρ¼0.61).
Additionally, employee perceptions of the benefits of cyberloafing demonstrated a moderate
positive relationship with the construct ( ρ¼0.28). Habitual cyberloafing exhibited a very
strong positive effect on cyberloafing ( ρ¼0.66), indicating that individuals who display
addictive behavioral tendencies of technology use across life contexts engage in more
cyberloafing at work. Employees’technology access (e.g. the proportion of time spent on the
internet) was positively related to cyberloafing ( ρ¼0.20). Employees’technology skills and
experience strongly positively related to the construct ( ρ¼0.40). Additionally, as might be
expected, employees’ability to hide cyberloafing demonstrated a strong positive
relationship with cyberloafing ( ρ¼0.41).
We also examined the relationships between cyberloafing and CWB as well as overall
performance, conceptualized heterogeneously as the positive components of job performance
(e.g. work performance, task performance, organizational citizenship behaviors; see Table VII).
Cyberloafing was negligibly related to performance ( ρ¼−0.05), yet it was strongly positively
related to overall CWB ( ρ¼0.38) and the narrower counterproductivity construct of time theft/
loafing other than cyberloafing ( ρ¼0.39). To better understand the structure and homogeneity
of the construct, we also investigated the intercorrelations among facets of cyberloafing in the
few studies that reported such results (see Table VIII). Whether studies separated cyberloafing
by content of behavior (e.g. e-mailing vs browsing) or severity, subscales of cyberloafing were
very highly correlated ( ρs¼0.69 and 0.71, respectively for content and severity taxa).
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
Favorable attitude toward
cyberloafing 8 1,919 0.37 0.14 0.12 0.05 0.42 0.14 0.32, 0.52 0.24, 0.60
Intentions to cyberloaf 6 1,622 0.53 0.05 0.03 0.02 0.61 0.03 0.55, 0.66 0.56, 0.65
Perceived benefits of cyberloafing 5 2,201 0.24 0.23 0.23 0.10 0.28 0.26 0.02, 0.53 −0.06, 0.61
Habitual cyberloafing 5 851 0.57 0.14 0.13 0.06 0.66 0.15 0.50, 0.81 0.47, 0.85
Usage/time on internet 9 2,745 0.17 0.09 0.07 0.03 0.20 0.07 0.14, 0.26 0.10, 0.29
Internet/social media skills/experience 3 742 0.33 0.14 0.13 0.08 0.40 0.16 0.11, 0.69 0.20, 0.60
Ability to hide cyberloafing 3 695 0.36 0.13 0.11 0.07 0.41 0.13 0.16, 0.65 0.24, 0.57
Note: See Table III for notes
Table VI.
Meta-analytic results
for attitude and
opportunity variables
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
Performance 14 3,866 −0.05 0.16 0.15 0.04 −0.05 0.17 −0.14, 0.04 −0.27, 0.17
Overall CWB 9 2,659 0.32 0.12 0.11 0.04 0.38 0.12 0.29, 0.46 0.22, 0.53
Time theft/loafing 4 1,150 0.30 0.16 0.15 0.08 0.39 0.19 0.15, 0.63 0.15, 0.64
Note: See Table III for notes
Table VII.
Meta-analytic results
for performance
variables
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
E-mailing activities
Browsing activities 4 1,010 0.61 0.07 0.05 0.04 0.69 0.06 0.59, 0.79 0.61, 0.76
Serious behaviors
Minor behaviors 2 561 0.59 0.21 0.21 0.15 0.71 0.25 −0.44, 1.00 0.39, 1.00
Note: See Table III for notes
Table VIII.
Meta-analytic
intercorrelation results
for cyberloafing facets
555
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
The last group of variables we examined consisted of organizational norms and policies
(see Table IX for detailed results). Although monitoring exhibited a negligible relationship
with cyberloafing ( ρ¼−0.06), organizational guidelines or rules governing technology use
negatively influenced cyberloafing ( ρ¼−0.15). In contrast, employees’perceptions of
negative consequences of cyberloafing were unrelated to the criterion ( ρ¼0.01). Unlike the
other organizational influences, norms were strongly positively related to cyberloafing
(ρ¼0.37), such that employees who perceived cyberloafing behaviors to be normal and
prevalent were substantially more likely to display such behaviors themselves.
Discussion and directions for future research
Results from this first meta-analysis of the increasingly popular cyberloafing construct
yielded several noteworthy findings. First, although young, inexperienced employees
(or specific generations and cohorts, such as Millennials) are often accused of greater misuse
of information technology and increased cyberloafing, our results indicate that age, job
tenure, and organizational level are unrelated to the phenomenon. This is particularly
striking, given current, widespread concerns regarding the unprofessionalism of today’s
younger cohorts with regard to many workplace behaviors, especially those relating to
information technology use (e.g. Center for Professional Excellence at York College of
Pennsylvania, 2013). This disparity between coworkers’perceptions of younger employees’
technology use and the lack of age effects in cyberloafing may be explained by the largely
hidden nature of technology use. Younger employees might more readily adopt technology
in general, which might be misinterpreted by colleagues as cyberloafing. In contrast to the
negligible effects of age, education demonstrated a small positive effect on cyberloafing.
Although surprising, the positive effect of job autonomy may shed some light on this
finding, given the likelihood that individuals with higher education might hold positions
granting them more opportunities to cyberloaf.
Second, although several broader personality variables exhibited relationships with
cyberloafing, we identified two narrow personality traits that were more useful in
explaining potential mechanisms. For example, self-control was strongly negatively
related to cyberloafing. This evidence is in line with research on the importance of
predictor-criterion bandwidth matching, and suggests that further investigation into
specific personality traits and their relationships with this narrow-bandwidth subset of
work behaviors is merited. An important caveat should be noted: although these initial
findings are interesting, the self-control-cyberloafing relationship was limited by a very
small number of samples contributing to the analyses (k¼5). These effects certainly merit
further empirical investigation across new samples and job contexts. Research examining
the mechanisms underlying this relationship can enhance understanding of cyberloafing as
well as provide an evidence-based foundation on which to develop managerial interventions
to reduce these behaviors.
Another narrow trait, self-efficacy, also demonstrated a noteworthy relationship with
cyberloafing. Most importantly, self-efficacy is generally regarded as a desirable trait as it
empowers individuals to accomplish their tasks. However, in this case, our findings indicate
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
Norms 12 2,580 0.32 0.17 0.16 0.05 0.37 0.18 0.27, 0.47 0.14, 0.61
Monitoring 7 1,504 −0.05 0.06 0.00 0.02 −0.06 0.00 −0.11, 0.00 −0.06, −0.06
Guidelines or rules 8 2,430 −0.12 0.15 0.13 0.05 −0.15 .17 −0.27, −0.03 −0.37, 0.07
Consequences 5 996 0.00 0.26 0.25 0.11 0.01 0.28 −0.27, 0.28 −0.35, 0.36
Note: See Table III for notes
Table IX.
Meta-analytic results
for norms and
organizational policies
556
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
that self-efficacy exhibits a moderate positive relationship with cyberloafing. This is yet
another opportunity for future research to more deeply explore the mechanism of the
cyberloafing phenomenon. Employers would not typically wish to reduce the self-efficacy of
their employees (either general or computer-specific), yet they may wish to diminish their
employees’cyberloafing. Further investigation is necessary to determine how employers
can continue to encourage self-efficacy among their employees without fostering
cyberloafing. Does quantity of workload influence the effects of self-efficacy? Do people
with high self-efficacy exhibit greater optimism with regard to task ease and thus feel
enabled to procrastinate? Do capable employees experience greater boredom? Do employees
with greater self-efficacy feel more fully invested in their organizations and thus rationalize
their cyberloafing? Finally, how do computer/internet specific self-efficacy measures
interact with opportunity to engage in or hide cyberloafing in determining employees’
behaviors? Each of these questions presents an opportunity for future investigation that can
guide distinct and practically meaningful organizational interventions. Another strong
predictor of cyberloafing was a rationalization technique called neutralization. The studies
that we meta-analyzed operationalized neutralization using the “metaphor of the ledger,”
which consists of employees considering how much they contribute to the organization.
Then, the employees evaluate whether they feel they have been sufficiently compensated or
recognized for those contributions. If they do not feel that the relationship is equitable,
employees feel reduced guilt and enhanced justification when engaging in questionable acts.
Very little research has examined neutralization in the context of cyberloafing
(in our analyses, k¼3), but some scholars have already begun to examine the
mechanisms at play in this relationship. For example, perceptions of injustice have been
examined as a predictor of neutralization (Lim, 2002). However, the scholarly literature has
yet to examine how employees’experiences of neutralization and consequent cyberloafing
behavior might be positively influenced. Are there opportunities to alleviate these
perceptions of inequity before the situation escalates? Can these negative employee
experiences be remedied, at least in part, by avenues to voice employees’concerns and
managerial interventions that prioritize them? Although rationalization is generally linked
to undesirable behaviors, few empirical investigations to date have attempted to provide
solutions to these problems.
Much concern about cyberloafing has stemmed from its apparent prevalence within
organizations. Most people have witnessed or participated in these behaviors, and many
employers have terminated employees for them (American Management Association and
The ePolicy Institute, 2007). Our findings on the strong relationship between norms and
cyberloafing further emphasize the problematic nature of cyberloafing becoming a normal
and acceptable behavior. People who do not perceive these behaviors as deviant are
substantially more likely to engage in them, thus perpetuating the normality of these largely
unproductive behaviors. Perhaps further contributing to this issue is the ineffectiveness of
monitoring initiatives and sanctions in the management of these behaviors. While such
interventions might be indirectly responsible for some deterrence via norms, they are clearly
insufficient to address the growing trend. Therefore, new interventions merit further
exploration, potentially including personnel selection and training to influence norms as
well as job design considerations to account for bored and disengaged employees.
Cyberloafing has become controversial in recent years as scholars have debated its
nature as a negative detractor from organizational effectiveness vis-a-vis a positive
contributor to employee productivity and well-being via recovery. Although our analyses do
not allow us to infer the nature of these relationships, our findings do indicate that
cyberloafing is only negligibly related to job performance. This does not mean
that cyberloafing is entirely unproblematic. On the contrary, our results indicate that
cyberloafing is strongly positively related to overall CWB as well as the narrower
557
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
counterproductivity construct of time theft/loafing. Future research is necessary to better
understand this phenomenon, particularly in light of past research indicating that other
forms of counterproductive behaviors negatively relate to the positive components of job
performance (Berry et al., 2007; Dalal, 2005; Rotundo and Sackett, 2002). It is possible that
the apparent null relationship between cyberloafing and performance is instead
substantially more complex, moderated by the length, frequency, or type of cyberloafing
where only some forms or levels are problematic. The various conceptualizations of
cyberloafing included in this analysis may also be responsible for these findings.
The majority of studies summarized in our meta-analyses relied on measures that did not
explicitly mention whether the behavior was interfering with a work task, thus
compromising performance. For example, social media use in the workplace may manifest
itself in a variety of ways, some perhaps restorative or merely insubstantial, while others
could compromise performance for an entire workday (e.g. constant connectivity that
distracts from a task which requires focus). In addition, using the measures employed by
these studies, the same behavior could be counterproductive for some employees (e.g. those
who should be working) but not for others who might have downtime while they await
their next task, a rationale consistent with earlier arguments by information systems
scholars (e.g. Silver et al., 1995).
Even if cyberloafing serves as an effective recovery method for employees, it still has
substantial potential to cause harm to the organization. Employers should consider ways to
differentiate between legitimate and illegitimate (i.e. counterproductive) forms of
cyberloafing. If cyberloafing is a type of positive break, it can be managed similarly to
other work breaks, which are typically governed by organizational guidelines and
sanctions. For example, in many positions, meal and rest breaks are clearly delineated and
monitored. If such breaks were not governed, some individuals would abuse the
opportunity, and such behavior would be considered a form of CWB by most definitions.
The same approach can be taken in managing cyberloafing to provide fair and equitable
treatment across employees while also preserving productivity. Related to the limitations
listed above, we found several notable methodological weaknesses in primary studies.
First, we found that many different scales are utilized to assess cyberloafing and related
constructs. Although the differences sometimes reflect only a slightly different
conceptualization, they are typically the result of each study adapting a common
measure (i.e. Lim, 2002; Lim and Teo, 2005). This has led to extensive inconsistency and
sometimes incomparability across studies. Just as importantly, the proliferation of measures
has hindered the advancement of systematic research on cyberloafing as many studies
focus on adapting and validating scales for specific applications rather than on furthering
our understanding of these important employee behaviors generally. The majority of
studies that adapt common measures often do so without providing psychometric evidence
to support those decisions. For this literature to evolve and grow systematically, a validated,
generally applicable scale must be established and widely accepted. Although the analyses
relied on few studies, we were encouraged by the strong convergence of cyberloafing facets,
demonstrating substantial homogeneity across items and supporting our decision to focus
on overall cyberloafing. Although the construct of cyberloafing has been assessed in many
different ways, there is a notable lack of other-reports of employee cyberloafing. This is
perhaps to be expected, as previous works on cyberloafing have emphasized the potential
for employees to conceal these behaviors (Wagner et al., 2012; Zhang et al., 2015). However,
especially considering the notable relationship between cyberloafing and habitual
cyberloafing, employees may not fully recognize the extent to which they engage in these
behaviors. Other reports might provide deeper insights into these behaviors.
Another methodological limitation of cyberloafing investigations to date is that they
have assumed stability in employee cyberloafing over time. Essentially, these behaviors are
558
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
assessed as though employees maintain a constant level of cyberloafing. However, there are
rational arguments –and some limited empirical evidence –to suggest that situational
influences can have more substantial impact on cyberloafing on certain occasions (e.g. when
employees are sleep-deprived; Wagner et al., 2012). Therefore, within-subject investigation into
the changes in employee cyberloafing would greatly contribute to this growing literature.
Conclusions
In this study, we meta-analytically summarized the growing literature on employee
cyberloafing. Our findings suggest several important influences on these generally undesirable
behaviors, including moderate effects of personality variables as well as strong effects of
contextual influences (e.g. norms) and employee attitudes. Just as importantly, we identified
many opportunities for future development of this literature. Investigations of cyberloafing are
still in their nascent stages, and extensive research is needed to better understand these
employee behaviors and their antecedents and outcomes. Prior to this study, the various
studies on cyberloafing each created new frameworks based on a limited number of variables
relevant to one specific foundational theory (e.g. theory of planned behavior). While continued
development of this literature is necessary, we hope that these findings will aid researchers in
developing frameworks more holistically and selecting variables based on evidence of their
relevance to the relationship of interest. The present set of meta-analytic results can provide a
starting place for a more empirically grounded approach to model formation.
Notes
1. Following proper meta-analytic procedure, each unique sample contributed to any given analysis only
once, even if it was reported in multiple sources. In those cases, the source with the most comprehensive
information (e.g. on predictor or criterion measures or reliability estimates) was included.
2. Seltzer’s (2013) meta-analytic investigation showed that there is high convergence of global and
domain-specific self-efficacy measures, as well as high convergence of self-efficacy measures across
different specific domains. This, in addition to the modest SD
ρ
, suggests relative homogeneity and
generalizability of findings despite the inclusion of the different types of scales in this analysis.
References
Entries marked with * indicate sources that contributed data to the meta-analyses.
American Management Association and The ePolicy Institute (2007), “2007 electronic monitoring and
surveillance survey”, available at: www.epolicyinstitute.com/2007-survey-results (accessed
April 21, 2015).
Anandarajan, M. and Simmers, C.A. (Eds) (2004), Personal Web Usage in the Workplace: A Guide to
Effective Human Resources Management, IGI Global, Hershey, PA, available at: www.igi-
globalsolve.aspx?doi=10.4018/978-1-59140-148-3 (accessed March 28, 2015).
*Askew, K., Buckner, J.E., Taing, M.U., Ilie, A., Bauer, J.A. and Coovert, M.D. (2014), “Explaining
cyberloafing: the role of the theory of planned behavior”,Computers in Human Behavior, Vol. 36,
pp. 510-519, available at: http://doi.org/10.1016/j.chb.2014.04.006
Berry, C.M., Ones, D.S. and Sackett, P.R. (2007), “Interpersonal deviance, organizational deviance, and
their common correlates: a review and meta-analysis”,Journal of Applied Psychology, Vol. 92
No. 2, pp. 410-424, available at: http://doi.org/10.1037/0021-9010.92.2.410
Birkland, A.S. and Ones, D.S. (2006), “The structure of emotional stability: a meta-analytic
investigation”, paper presented at the International Congress of Applied Psychology, Athens.
Black, E., Light, J., Black, N.P. and Thompson, L. (2013), “Online social network use by health care
providers in a high traffic patient care environment”,Journal of Medical Internet Research,
Vol. 15 No. 5, pp. 68-72.
559
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
*Blanchard, A.L. and Henle, C.A. (2008), “Correlates of different forms of cyberloafing: the role of norms
and external locus of control”,Computers in Human Behavior, Vol. 24 No. 3, pp. 1067-1084,
available at: http://doi.org/10.1016/j.chb.2007.03.008
Block, W. (2001), “Cyberslacking, business ethics and managerial economics”,Journal of Business
Ethics, Vol. 33 No. 3, pp. 225-231.
Bock, G.-W. and Ho, S.L. (2009), “Non-work related computing (NWRC)”,Communications of the ACM,
Vol. 52 No. 4, pp. 124-128.
*Brock, M.E., Martin, L.E. and Buckley, M.R. (2013), “Time theft in organizations: the development of
the Time Banditry Questionnaire”,International Journal of Selection and Assessment, Vol. 21
No. 3, pp. 309-321, available at: http://doi.org/10.1111/ijsa.12040
*Cao, X., Guo, X., Vogel, D. and Zhang, X. (2016), “Exploring the influence of social media on employee
work performance”,Internet Research, Vol. 26 No. 2, pp. 529-545, available at: http://doi.org/10.
1108/IntR-11-2014-0299
Center for Professional Excellence at York College of Pennsylvania (2013), “National professionalism
survey”, workplace report, York, PA, available at: www.ycp.edu/media/york-website/cpe/York-
College-Professionalism-in-the-Work place‑Study‑2013.pdf (accessed May 19, 2016).
*Charoensukmongkol, P. (2014), “Effects of support and job demands on social media use and work
outcomes”,Computers in Human Behavior, Vol. 36, pp. 340-349, available at: http://doi.org/10.
1016/j.chb.2014.03.061
Cohen-Charash, Y. and Spector, P.E. (2001), “The role of justice in organizations: a meta-analysis”,
Organizational Behavior and Human Decision Processes, Vol. 86 No. 2, pp. 278-321, available at:
https://doi.org/10.1006/obhd.2001.2958
Connelly, B.S., Davies, S.E., Ones, D.S. and Birkland, A.S. (2008), “Agreeableness: a meta-analytic
review of structure, convergence, and predictive validity”, in Thomas, J.P. and Viswesvaran, C.
(Eds), Personality in the Workplace: Advances in Measurement and Assessment, Symposium
conducted at the annual conference of the Society for Industrial and Organizational Psychology,
San Francisco, CA, April.
Connelly, B.S., Davies, S.E., Ones, D.S. and Birkland, A.S. (2008), “Opening up openness: a meta‑analytic
review of measures of the personality construct”, poster presented at the annual conference of
the Society for Personality and Social Psychology, Albuquerque, NM, January.
Connelly, B.S. and Ones, D.S. (2007), “Combining conscientiousness scales: can’t get enough of the trait,
baby”, poster presented at the annual conference of the Society for Industrial and Organizational
Psychology, New York City, NY, April.
Dalal, R.S. (2005), “A meta-analysis of the relationship between organizational citizenship behavior and
counterproductive work behavior”,Journal of Applied Psychology, Vol. 90 No. 6, pp. 1241-1255,
available at: http://doi.org/10.1037/0021-9010.90.6.1241
Davies, S.E., Connelly, B.S., Ones, D.S. and Birkland, A.S. (2008), “Enhancing the role of extraversion
for work related behaviors”, poster presented at the annual conference of the Society for
Industrial and Organizational Psychology, San Francisco, CA, April.
Dilchert, S. (2008), “Measurement and prediction of creativity at work”, doctoral dissertation, UMI
Dissertations Publishing No. 3504763, University of Minnesota, Minneapolis, MN.
Ethics Resource Center (2012), “National business ethics survey of social networkers: new risks and
opportunities at work”, available at: https://higherlogicdownload.s3.amazonaws.com/THEECOA/
1651fdd3-e31c-4ac8-a93d-9 b99f9e75727/UploadedImages/research/nbes‑snwebinar.pdf (accessed
May 11, 2016).
*Gallagher, E.C. (2009), “Narcissism and forgiveness as moderators of organizational justice and
workplace counterproductive computer use (M.A.)”, University of Nebraska at Omaha, Omaha,
NE, available at: http://search.proquest.com/docview/250832319/abstract/7A83D7F33D2
141A3PQ/1 (accessed May 13, 2016).
Ghiselli, E.E., Campbell, J.P. and Zedeck, S. (1981), Measurement Theory for the Behavioral Sciences,
Freeman, San Francisco, CA.
560
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
Harris, M.M. and Schaubroeck, J. (1988), “A meta-analysis of self-supervisor, self-peer, and
peer-supervisor ratings”,Personnel Psychology, Vol. 41 No. 1, pp. 43-62.
*Lim, V.K.G. (2002), “The IT way of loafing on the job: cyberloafing, neutralizing and organizational
justice”,Journal of Organizational Behavior, Vol. 23 No. 5, pp. 675-694, available at: http://doi.
org/10.1002/job.161
*Lim, V.K.G. and Chen, D.J.Q. (2012), “Cyberloafing at the workplace: gain or drain on work?”,
Behaviour & Information Technology, Vol. 31 No. 4, pp. 343-353, available at: http://doi.org/10.10
80/01449290903353054
*Lim, V.K.G. and Teo, T.S.H. (2005), “Prevalence, perceived seriousness, justification and regulation of
cyberloafing in Singapore: an exploratory study”,Information & Management, Vol. 42 No. 8,
pp. 1081-1093, available at: http://doi.org/10.1016/j.im.2004.12.002
*Mahatanankoon, P., Anandarajan, M. and Igbaria, M. (2004), “Development of a measure of personal
web usage in the workplace”,CyberPsychology & Behavior, Vol. 7 No. 1, pp. 93-104, available at:
http://doi.org/10.1089/109493104322820165
*Mercado, B.K. and Dilchert, S. (2016a), “Cyberloafing scores for a sample of employed adults”,
unpublished raw data.
*Mercado, B.K. and Dilchert, S. (2016b), “Cyberloafing scores for a sample of employed students”,
unpublished raw data.
*Mercado, B.K. and Dilchert, S. (2016c), “Cyber counterproductive work behavior scores for a sample of
employed adults”, unpublished raw data.
*Mercado, B.K. and Dilchert, S. (2016d), “Cyber counterproductive work behavior scores for a sample of
employed students”, unpublished raw data.
Mosier, C.I. (1943), “On the reliability of a weighted composite”,Psychometrika, Vol. 8 No. 3, pp. 161-168,
available at: http://doi.org/10.1007/BF02288700
Ones, D.S., Viswesvaran, C. and Dilchert, S. (2005), “Personality at work: raising awareness and
correcting misconceptions”,Human Performance, Vol. 18 No. 4, pp. 389-404.
Ones, D.S., Viswesvaran, C. and Schmidt, F.L. (1993), “Comprehensive meta‑analysis of integrity test
validities: findings and implications for personnel selection and theories of job performance”,
Journal of Applied Psychology, Vol. 78 No. 4, pp. 679-703.
Pee, L.G., Woon, I.M.Y. and Kankanhalli, A. (2008), “Explaining non-work-related computing in the
workplace: a comparison of alternative models”,Information & Management, Vol. 45 No. 2,
pp. 120-130, available at: http://doi.org/10.1016/j.im.2008.01.004
Rotundo, M. and Sackett, P.R. (2002), “The relative importance of task, citizenship, and
counterproductive performance to global ratings of job performance: a policy-capturing
approach”,Journal of Applied Psychology, Vol. 87 No. 1, pp. 66-80.
Salary.com (2014), “Wasting time at work”, available at: www.salary.com/2014-wasting-time-at-work/slide/3/
(accessed May 18, 2016).
Schmidt, F.L. and Hunter, J.E. (2014), Methods of Meta-Analysis: Correcting Error and Bias in Research
Findings, 3rd ed., Sage Publications, Inc., Thousand Oaks, CA.
Seltzer, B.K. (2013), “The nomological network of self‑efficacy and psychometric properties of its
general and specific measures”, doctoral dissertation, UMI Dissertations Publishing
No. 3559516, University of Minnesota, Minneapolis, MN.
Silver, M., Markus, M. and Beath, C. (1995), “The information technology interaction model: a foundation
for the MBA core course”,MIS Quarterly, Vol. 19 No. 3, pp. 361-390, doi: 10.2307/249600.
Society for Human Resource Management (2011), “Social media in the workplace”, available at: www.
shrm.org/research/surveyfindings/articles/pages/socialmediaintheworkplace.aspx (accessed
April 21, 2015).
Smale, A. (2016), “Dispatcher playing with cellphone is faulted in German train crash”,The New York
Times, April 13, available at: www.nytimes.com/2016/04/14/world/europe/bavaria-germany-
train-crash.html
561
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
*Vitak, J., Crouse, J. and LaRose, R. (2011), “Personal internet use at work: understanding
cyberslacking”,Computers in Human Behavior, Vol. 27 No. 5, pp. 1751-1759.
Wagner, D.T., Barnes, C.M., Lim, V.K.G. and Ferris, D.L. (2012), “Lost sleep and cyberloafing: evidence
from the laboratory and a daylight saving time quasi‑experiment”,Journal of Applied
Psychology, Vol. 97 No. 5, pp. 1068-1076, available at: http://doi.org/10.1037/a0027557
Wiernik, B.M. (2015), “Open psychometric meta-analysis (Computer software)”, available at:
https://github.com/bwiernik/opma
*Zhang, H., Zhao, H., Liu, J., Xu, Y. and Lu, H. (2015), “The dampening effect of employees’future
orientation on cyberloafing behaviors: the mediating role of self‑control”,Frontiers in
Psychology, Vol. 6, pp. 1-10, available at: http://doi.org/10.3389/fpsyg.2015.01482
Additional sources contributing to the meta-analysis
*Aghaz, A. and Sheikh, A. (2016), “Cyberloafing and job burnout: an investigation in the
knowledge‑intensive sector”,Computers in Human Behavior, Vol. 62, pp. 51-60, available at:
http://doi.org/10.1016/j.chb.2016.03.069
*Ahmadi, H., Bagheri, F., Ebrahimi, S.A., Rokni, M.A.N. and Kahreh, M.S. (2011), “Deviant work
behavior: explaining relationship between organizational justice and cyber-loafing as a deviant
work behavior”,American Journal of Scientific Research, No. 24, pp. 103-116.
*Ali-Hassan, H., Nevo, D. and Wade, M. (2015), “Linking dimensions of social media use to job
performance: the role of social capital”,Journal of Strategic Information Systems, Vol. 24 No. 2,
pp. 65-89, available at: http://doi.org/10.1016/j.jsis.2015.03.001
*Al-Shuaibi, A.S.I., Subramaniam, C. and Shamsudin, F.M. (2014), “The mediating influence of job
satisfaction on the relationship between HR practices and cyberdeviance”,Journal of Marketing
& Management, Vol. 5 No. 1, pp. 105-119.
*Askew, K. (2013), “The relationship between cyberloafing and task performance and an examination
of the theory of planned behavior as a model of cyberloafing”, doctoral dissertation, ProQuest
Information & Learning, University of South Florida, Ann Arbor, MI.
*Betts, T.K., Setterstrom, A.J., Pearson, J.M. and Totty, S. (2014), “Explaining cyberloafing through a
theoretical integration of theory of interpersonal behavior and theory of organizational justice”,
Journal of Organizational and End User Computing, Vol. 26 No. 4, pp. 23-42, available at: http://
doi.org/10.4018/joeuc.2014100102
*Blau, G., Yang, Y. and Ward-Cook, K. (2006), “Testing a measure of cyberloafing”,Journal of Allied
Health, Vol. 35 No. 1, pp. 9-17.
*Bock, G.-W., Park, S.C. and Zhang, Y. (2010), “Why employees do non-work-related computing in the
workplace”,Journal of Computer Information Systems, Vol. 50 No. 3, pp. 150-163.
*Brooks, S.L. (2014), “Social media usage: examination of influencers and effects”, doctoral dissertation,
ProQuest Information & Learning, Washington State University, Ann Arbor, MI.
*Çınar, O. and Karcıoğlu, F. (2015), “The relationship between cyber loafing and organizational
citizenship behavior: a survey study in Erzurum/Turkey”,Procedia –‑ Social and Behavioral
Sciences, Vol. 207, pp. 444-453, available at: http://doi.org/10.1016/j.sbspro.2015.10.114
*Eastin, M.S., Glynn, C.J. and Griffiths, R.P. (2007), “Psychology of communication technology use in
the workplace”,CyberPsychology & Behavior, Vol. 10 No. 3, pp. 436-443, available at: https://doi.
org/10.1089/cpb.2006.9935
*Everton, W.J., Mastrangelo, P.M. and Jolton, J.A. (2005), “Personality correlates of employees’personal
use of work computers”,CyberPsychology & Behavior, Vol. 8 No. 2, pp. 143-153, available at:
http://doi.org/10.1089/cpb.2005.8.143
*Garrett, R.K. and Danziger, J.N. (2008), “Disaffection or expected outcomes: understanding personal
internet use during work”,Journal of Computer-Mediated Communication, Vol. 13 No. 4,
pp. 937-958, available at: https://doi.org/10.1111/j.1083-6101.2008.00425.x
562
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
*Gorsuch, J.L. (2014), “The effects of control and work/family centrality on the personal use of work
computers”, Cleveland State University, Cleveland, OH, available at: http://rave.ohiolink.edu/
etdc/view?acc_num=csu1397838982 (accessed February 10, 2014).
*Jia, H., Jia, R. and Karau, S. (2013), “Cyberloafing and personality: the impact of the Big Five traits and
workplace situational factors”,Journal of Leadership & Organizational Studies, Vol. 20 No. 3,
pp. 358-365, available at: http://doi.org/10.1177/1548051813488208
*Jian, G. (2013), “Understanding the wired workplace: the effects of job characteristics on employees’
personal online communication at work”,Communication Research Reports, Vol. 30 No. 1,
pp. 22-33, available at: http://doi.org/10.1080/08824096.2012.746221
*Kim, K., Triana, M., Chung, K. and Oh, N. (2015), “When do employees cyberloaf? An interactionist
perspective examining personality, justice, and empowerment”,Human Resource Management,
Vol. 55 No. 6, pp. 1041-1058, available at: http://doi.org/10.1002/hrm.21699
*König, C.J. and de la Guardia, M.E.C. (2014), “Exploring the positive side of personal internet use at
work: does it help in managing the border between work and nonwork?”,Computers in Human
Behavior, Vol. 30, pp. 355-360, available at: http://doi.org/10.1016/j.chb.2013.09.021
*Landers, R.N. and Callan, R.C. (2014), “Validation of the beneficial and harmful work-related social
media behavioral taxonomies: development of the work‑related social media questionnaire”,
Social Science Computer Review, Vol. 32 No. 5, pp. 628-646, available at: http://doi.org/10.1177/0
894439314524891
*Lee, O.K.D., Lim, K.H. and Wong, W.M. (2005), “Why employees do non-work-related computing: an
exploratory investigation through multiple theoretical perspectives”,Proceedings of the 38th
Annual Hawaii International Conference on System Sciences, p. 185c, available at: https://doi.org/
10.1109/HICSS.2005.698
*Lee, Y., Lee, Z. and Kim, Y. (2007), “Understanding personal web usage in organizations”,Journal of
Organizational Computing & Electronic Commerce, Vol. 17 No. 1, pp. 75-99, available at: http://
doi.org/10.1080/10919390701291067
*Liberman, B., Seidman, G., McKenna, K.Y.A. and Buffardi, L.E. (2011), “Employee job attitudes and
organizational characteristics as predictors of cyberloafing”,Computers in Human Behavior,
Vol. 27 No. 6, pp. 2192-2199, available at: http://doi.org/10.1016/j.chb.2011.06.015
*Lim, V.K. and Teo, T.S. (2011), “The virtual art of loafing on the job: an empirical
study of cyberloafing”, presented at the Pacific Asia Conference on Information Systems,
pp. 1-17.
*Messarra, L.C., Karkoulian, S. and McCarthy, R. (2011), “To restrict or not to restrict personal internet
usage on the job”,Education, Business and Society: Contemporary Middle Eastern Issues, Vol. 4
No. 4, pp. 253-266, available at: http://doi.org/10.1108/17537981111190042
*Niaei, M., Peidaei, M.M. and Nasiripour, A.A. (2014), “The relation between staff cyberloafing and
organizational commitment in organization of environmental protection”,Kuwait Chapter of the
Arabian Journal of Business and Management Review, Vol. 3 No. 7, pp. 59-71.
*Polzer-Debruyne, A.M. (2008), “Psychological and workplace attributes that influence personal web
use (PWU) ”, doctoral dissertation, Massey University, Albany, available at: http://mro.massey.
ac.nz/xmlui/handle/10179/772
*Polzer-Debruyne, A.M., Stratton, M.T. and Stark, G. (2014), “Personal web use in the workplace:
Why does it persist in a context of strict security and monitoring?”,International Journal of
Business Administration, Vol. 5 No. 3, pp. 1-18, available at: http://doi.org/http://dx.doi.org/10.
5430/ijba.v5n3p1
*Rahimnia, F. and Mazidi, A.R.K. (2015), “Functions of control mechanisms in mitigating workplace
loafing; evidence from an Islamic society”,Computers in Human Behavior, Vol. 48, pp. 671-6681,
available at: http://doi.org/10.1016/j.chb.2015.02.035
*Ramayah, T. (2010), “Personal web usage and work inefficiency”,Business Strategy Series, Vol. 11
No. 5, pp. 295-301, available at: https://doi.org/10.1108/17515631011080704
563
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
*Restubog, S.L.D., Garcia, P.R.J.M., Toledano, L.S., Amarnani, R.K., Tolentino, L.R. and Tang, R.L.
(2011), “Yielding to (cyber)-temptation: exploring the buffering role of self‑control
in the relationship between organizational justice and cyberloafing behavior in the
workplace”,Journal of Research in Personality, Vol. 45 No. 2, pp. 247-251, available at: http://
doi.org/10.1016/j.jrp.2011.01.006
*Salas, S. (2009), “A study of the relationship between employee virtuality and technology deviance as
mediated by leadership and employee perceptions”, doctoral dissertation, Florida International
University, Miami, FL.
*Tennakoon, K.U.S., da Silveira, G.J.C. and Taras, D.G. (2013), “Drivers of context‑specific ICT use across
work and nonwork domains: a boundary theory perspective”,Information and Organization,
Vol. 23 No. 2, pp. 107-128, available at: http://doi.org/10.1016/j.infoandorg.2013.03.002
*Thatcher, A., Wretschko, G. and Fisher, J. (2007), “Problematic internet use in South African
information technology workers”, in Dainoff, M.J. (Ed.), Ergonomics and Health Aspects of Work
with Computers, Springer, Berlin and Heidelberg, pp. 339-348, available at: http://link.springer.
com/chapter/10.1007/978-3-540-73333-1_41
*Venkatraman, S. (2008), “The ‘Darth’side of technology use: cyberdeviant workplace behaviors”,
PhD, University of Arkansas, Fayetteville, AR, available at: http://search.proquest.com/
pqdtglobal/docview/304688488/abstract/CBE2AF175BCB42 BCPQ/1?accountid=10226
*Wyatt, K. and Phillips, J.G. (2005), “Internet use and misuse in the workplace”,Proceedings of the 17th
Australia Conference on Computer-Human Interaction: Citizens Online: Considerations for
Today and the Future. Computer-Human Interaction Special Interest Group (CHISIG) of
Australia,Narrabundah, pp. 1-4, available at: http://dl.acm.org/citation.cfm?id=1108368.1108437
*Zoghbi-Manrique-de-Lara, P. and Olivares-Mesa, A. (2010), “Bringing cyber loafers back on the right
track”,Industrial Management & Data Systems, Vol. 110 No. 7, pp. 1038-1053, available at:
http://doi.org/10.1108/02635571011069095
Corresponding author
Brittany K. Mercado can be contacted at: bmercado2@elon.edu
For instructions on how to order reprints of this article, please visit our website:
www.emeraldgrouppublishing.com/licensing/reprints.htm
Or contact us for further details: permissions@emeraldinsight.com
564
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)