ArticlePDF Available

A meta-analytic investigation of cyberloafing

Authors:

Abstract and Figures

Purpose Cyberloafing, using technology to idle instead of work, is a particularly concerning issue for many organizations due to its perceived widespread impact on productivity. The purpose of this paper is to meta-analytically examine the growing literature on this construct in order to gain insights into its nomological network and guide future research. Design/methodology/approach After a systematic literature search, the authors conducted psychometric meta-analyses to estimate the relationships of 39 different correlates with cyberloafing. The meta-analytic database was comprised of 54 independent samples contributing 609 effect sizes. Findings Results indicate that boredom, engagement, and self-control exhibit strong relationships with cyberloafing, but employees’ attitudes surrounding and opportunities to engage in cyberloafing also proved powerful predictors. Contrary to common stereotypes, age and other demographic variables exhibited negligible effects. Employment variables (e.g. tenure, organization level, and income) were also negligibly related to cyberloafing. Emotional stability, conscientiousness, and agreeableness exhibited modest negative relationships with cyberloafing, whereas self-control demonstrated a strong negative relationship. Although cyberloafing strongly correlated with overall counterproductive work behaviors, the findings suggest it is unrelated to other components of job performance. Research limitations/implications Because the cyberloafing literature is in its early stages, the present study drew on a limited number of samples for several of the relationships analyzed. Rather than providing conclusive evidence of the nomological network of cyberloafing, these analyses reinforce the need for empirical investigation into several important relationships. Originality/value As the first quantitative review of the emerging cyberloafing literature, this study synthesizes related studies from disparate disciplines, examines the nomological network of cyberloafing, and highlights future directions for research into this phenomenon.
Content may be subject to copyright.
Career Development International
A meta-analytic investigation of cyberloafing
Brittany K. Mercado, Casey Giordano, Stephan Dilchert,
Article information:
To cite this document:
Brittany K. Mercado, Casey Giordano, Stephan Dilchert, (2017) "A meta-analytic investigation of
cyberloafing", Career Development International, Vol. 22 Issue: 5, pp.546-564, https://doi.org/10.1108/
CDI-08-2017-0142
Permanent link to this document:
https://doi.org/10.1108/CDI-08-2017-0142
Downloaded on: 16 October 2017, At: 08:49 (PT)
References: this document contains references to 84 other documents.
To copy this document: permissions@emeraldinsight.com
The fulltext of this document has been downloaded 75 times since 2017*
Users who downloaded this article also downloaded:
(2017),"Determinants of cyberloafing: a comparative study of a public and private sector
organization", Internet Research, Vol. 27 Iss 1 pp. 97-117 <a href="https://doi.org/10.1108/
IntR-12-2014-0317">https://doi.org/10.1108/IntR-12-2014-0317</a>
(2017),"Using personality facets to understand the nature of personality-satisfaction relationships:
Findings from meta-analytic bifactor latent modeling", Career Development International, Vol. 22
Iss 5 pp. 477-506 <a href="https://doi.org/10.1108/CDI-08-2017-0141">https://doi.org/10.1108/
CDI-08-2017-0141</a>
Access to this document was granted through an Emerald subscription provided by emerald-
srm:198213 []
For Authors
If you would like to write for this, or any other Emerald publication, then please use our Emerald
for Authors service information about how to choose which publication to write for and submission
guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information.
About Emerald www.emeraldinsight.com
Emerald is a global publisher linking research and practice to the benefit of society. The company
manages a portfolio of more than 290 journals and over 2,350 books and book series volumes, as
well as providing an extensive range of online products and additional customer resources and
services.
Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the
Committee on Publication Ethics (COPE) and also works with Portico and the LOCKSS initiative for
digital archive preservation.
*Related content and download information correct at time of download.
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
A meta-analytic investigation
of cyberloafing
Brittany K. Mercado
Martha & Spencer Love School of Business, Elon University,
Elon, North Carolina, USA
Casey Giordano
Department of Psychology, University of Minnesota Twin Cities, Minneapolis,
Minnesota, USA, and
Stephan Dilchert
Department of Management, Baruch College, CUNY, New York, New York, USA
Abstract
Purpose Cyberloafing, using technology to idle instead of work, is a particularly concerning issue for many
organizations due to its perceived widespread impact on productivity. The purpose of this paper is to meta-
analytically examine the growing literature on this construct in order to gain insights into its nomological
network and guide future research.
Design/methodology/approach After a systematic literature search, the authors conducted
psychometric meta-analyses to estimate the relationships of 39 different correlates with cyberloafing.
The meta-analytic database was comprised of 54 independent samples contributing 609 effect sizes.
Findings Results indicate that boredom, engagement, and self-control exhibit strong relationships with
cyberloafing, but employeesattitudes surrounding and opportunities to engage in cyberloafing also proved
powerful predictors. Contrary to common stereotypes, age and other demographic variables exhibited
negligible effects. Employment variables (e.g. tenure, organization level, and income) were also negligibly
related to cyberloafing. Emotional stability, conscientiousness, and agreeableness exhibited modest negative
relationships with cyberloafing, whereas self-control demonstrated a strong negative relationship. Although
cyberloafing strongly correlated with overall counterproductive work behaviors, the findings suggest it is
unrelated to other components of job performance.
Research limitations/implications Because the cyberloafing literature is in its early stages, the present
study drew on a limited number of samples for several of the relationships analyzed. Rather than providing
conclusive evidence of the nomological network of cyberloafing, these analyses reinforce the need for
empirical investigation into several important relationships.
Originality/value As the first quantitative review of the emerging cyberloafing literature, this study
synthesizes related studies from disparate disciplines, examines the nomological network of cyberloafing, and
highlights future directions for research into this phenomenon.
Keywords Meta-analysis, Productivity, Cyberloafing
Paper type Research paper
Technological advances positively contribute to employee productivity in many ways,
increasing accessibility of critical information, catalyzing task completion, and enhancing
collaboration in a variety of ways (e.g. telecommuting, enabling virtual teamwork).
However, jobs with frequent and convenient information technology access also provide
employees with opportunities to misuse such technology. In a recent survey of over two
thousand employed Americans, 62 percent of employees reported spending some of their
workday on social networking websites, and 10 percent indicated that they spend
30 percent or more of their workday on these sites (Ethics Resource Center, 2012). Of those
employees who were actively utilizing social media at work, only 14 percent limited their use
to lunch hours or other unpaid time. Similarly, Salary.coms (2014) Wasting Time at Work
Survey found that 89 percent of employees reported wasting time at work every day, with
57 percent reporting wasting at least an hour each day; all of the commonly preferred time
wasting techniques consisted of visiting various webpages for personal purposes.
Career Development International
Vol. 22 No. 5, 2017
pp. 546-564
© Emerald Publishing Limited
1362-0436
DOI 10.1108/CDI-08-2017-0142
Received 24 May 2016
Revised 1 February 2017
Accepted 14 July 2017
The current issue and full text archive of this journal is available on Emerald Insight at:
www.emeraldinsight.com/1362-0436.htm
546
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
Organizations are clearly concerned with their workerscyberloafing. This is exemplified by
the 43 percent of employers who block access to social media platforms on organization-owned
computers or handheld devices (Society for Human Resource Management, 2011). The extent of
employee time losses have alarmed organizations and consequently sparked a growing interest
among both scholars and practitioners who seek to identify mechanisms to reduce or avoid
these costly employee behaviors.
Cyberloafing
Lim (2002) originally conceptualized cyberloafing as employeesvoluntary use of their
organizationsinternet access for nonwork purposes during work time or, more simply, the
IT way of idling on the job(p. 678). Since cyberloafing was introduced in the academic
literature, opportunities to engage in technologically-facilitated loafing have expanded
greatly, resulting in a proliferation of conceptualizations of the construct. Many studies now
define and operationalize cyberloafing more broadly to include behaviors that use
information technology for purposes other than internet activity (e.g. nonwork-related
computing; Bock and Ho, 2009), while others examine specific types of cyberloafing, such as
social media use, that have risen in prevalence in recent years (Charoensukmongkol, 2014).
Recent empirical work in this area has also broadened the construct definition to include
additional devices that employees can utilize to cyberloaf (e.g. tablets, smartphones), no
longer requiring that technology be organizationally provided. In fact, items in the most
commonly used cyberloafing measures focus on specific activities but do not specify how
employees obtained access to technology. These conceptual shifts reflect technological
advances that have occurred in the past two decades. For example, in the early days of
cyberloafing, internet access was less common and more expensive; therefore, employees
unsanctioned use of organizationally provided bandwidth was a prime concern. Today, with
employees frequently bringing their own data-enabled devices to work, managers are
concerned with other consequences of cyberloafing, such as time theft, productivity losses,
or unsafe behaviors. Despite subtle differences among the many conceptualizations of
cyberloafing and related constructs, they uniformly focus on employees using technological
devices to facilitate a break or escapefrom work and attend to nonwork tasks. As such,
these behaviors can be considered a form of withdrawal that is facilitated by information
technology. Therefore, for the purposes of this study, we will inclusively conceptualize
cyberloafing as employee behaviors that involve using information and communication
technologies to engage in nonwork behaviors instead of working. This approach
encompasses the many definitions encountered in our systematic review of the literature.
Cyberloafing threatens nearly all organizations because employees in most jobs have the
opportunity to engage in these behaviors on a variety of information technology devices.
Workers paid hourly can cyberloaf during dedicated work hours just as salaried workers
can use the internet for personal matters instead of accomplishing work tasks.
A salesperson reading the news rather than helping a customer; a receptionist e-mailing
friends during work hours; and an executive browsing Facebook during meetings are all
examples of cyberloafing. Also, unlike hacking or financial theft, cyberloafing does not
require extensive technological skill or criminal intent. The increasing use of
organizationally and privately owned internet-connected technological devices for both
personal and professional purposes, and their ubiquity among workers across occupations
regardless of job complexity, make cyberloafing a serious organizational concern.
Some scholars have explored the constructs structure and identified potential
dimensionality. Blanchard and Henle (2008) empirically distinguished two primary forms
of cyberloafing, minor and serious. In their taxonomy, minor cyberloafing consists primarily
of e-mail-related and slacking behaviors, whereas serious cyberloafing includes behaviors
such as viewing adult-oriented sites and online gambling. Other scholars have distinguished
547
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
construct structure by the content of the behaviors, such as Lim and Teos (2005) e-mail vs
browsing distinction or Mahatanankoon et al.s (2004) three dimensions of personal
web usage in the workplace: personal e-commerce (e.g. buying and selling online);
personal information research (e.g. researching personal hobbies); and personal
communication (e.g. interacting with family and friends). Because various investigations
have utilized different conceptualizations and measures of cyberloafing, there remains a
certain lack of clarity regarding the constructs structure. Findings to date suggest that
cyberloafing ranges in severity and encompasses several different types of behaviors, from
surfing the internet and conducting personal errands to sending text messages and
communicating on social media while working.
The nomological network of cyberloafing has been of particular interest to researchers and
practitioners alike as they attempt to better understand the phenomenon and find paths to its
prediction and prevention. Scholars have examined a vast array of correlates. Classic theories
have guided investigation into cyberloafings relationships with perceptions of justice
(e.g. neutralization; Lim, 2002), employee attitudes, and intentions (e.g. theory of planned
behavior; Askew et al., 2014). Additionally, personality variables and job characteristics have
received attention, likely due to the direct practical implications of such findings (e.g. through
use in employee selection).
Beyond predicting cyberloafing, substantial inquiry has focused on whether
cyberloafing indeed results in detrimental outcomes (i.e. negatively relates to job
performance) or whether it might provide a necessary mechanism for overburdened
employees to take crucial breaks (i.e. with neutral or even positive impact on productivity).
Essentially, managers and researchers have both questioned whether cyberloafing is a
counterproductive work behavior. Media reports provide scenarios in which cyberloafing
is clearly counterproductive. For example, consider the train dispatcher who was playing
mobile games on the job (Smale, 2016). Due to his inattention, he failed to properly direct
two trains which then collided, leaving over 80 passengers injured and 11 killed.
As horrific and egregious as single cases may be, not all instances of cyberloafing
behaviors are necessarily deemed negative in the scholarly literature, which has presented
varied perspectives.
Block (2001) argued that cyberloafing was just a new version of traditional loafing; viewing
it as merely another form of employee counterproductivity; he posited that it should be
managed using the same techniques and strategies that had traditionally been effective for
other CWB. Bock and Ho (2009), along with others, demonstrated not only the negative
influence of nonwork-related computing on job performance but also the larger negative effects
of nonwork-related computing compared to other nonwork activities that do not involve
technology (e.g. traditional loafing). Another study investigated emergency department
employeesFacebook usage on hospital workstations and found the health care workers spent
an average of 12 minutes per hour browsing Facebook alone (Black et al., 2013). Unfortunately,
such nonwork-related behavior increased with workload, such that employees viewed
Facebook more frequently in times of higher patient volumeand severity. In this case,the costs
of a behavior as seemingly harmless as social networking extend beyond organizational
resource loss to more significant consequences, including endangering patient well-being.
In contrast, Cao et al. (2016) recently demonstrated that social media use can promote
employeessocial capital,facilitating knowledge transfer and consequently work performance.
Lim and Chen (2012) also considered the potential benefits of cyberloafing to employees
emotional states and demonstrated that certain forms of cyberloafing, such as browsing the
internet, positively influenced employeespositive affect. Beyond the costs and benefits of
cyberloafing to organizations, these behaviors may yield additional, nonwork benefits to
employees. Because technology has blurred the work-life boundaries for many workers,
invading personal time with work tasks (e.g. constant accessibility and off-hours e-mailing),
548
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
employees may see cyberloafing as a way to restore the balance between work and
nonwork domains.
We have undertaken this review without an a priori judgment of how and why
cyberloafing behaviors should be addressed, recognizing their potential to be manifestations
of counterproductivity or opportunities for necessary cognitive relief. We attempt to
investigate the nomological network of cyberloafing and allow evidence to demonstrate the
nature and valence of these work behaviors. Employers are trying to reduce occurrence of
cyberloafing behaviors, but further insight is needed in order to determine whether (and if so,
to what extent) a reduction in employee cyberloafing actually aligns with organizational goals,
both in terms of productivity as well as employee engagement.
The present study
We have two primary objectives for this meta-analytic investigation of cyberloafing.
First, we seek to summarize the growing literature on cyberloafing and related constructs.
Although this body of work is still in its early stages, substantial progress has been made
over the past 15 years to understand these behaviors and their correlates. Because that
progress spanned different disciplines and conceptual labels, many important findings have
gone undetected rather than contributing to a coherent body of work. We hope that by
cumulating results from these studies, we can help catalyze research into employee
cyberloafing. The secondary objective for this study is to guide future research by
highlighting areas that are promising, yet neglected to date.
Methods
Literature search and inclusion criteria
We conducted a sixfold literature search to uncover studies that were relevant for inclusion
in the present set of meta-analyses. First, we searched the PsycINFO, PsycARTICLES,
Business Source Complete, Academic Search Complete, Social Sciences Full Text, and
SocINDEX with Full Text databases using the following keywords: personal internet use,
nonwork related computing, cyberloaf*, cyberslack*, cyberdevian*, and social media in
conjunction with (AND)employee*, work*, and job. We included databases from beyond
industrial organizational psychology, organizational behavior, and management due to the
interdisciplinary nature of the cyberloafing construct. Second, we used Google Scholar to
identify articles that cited Lims (2002) seminal article on cyberloafing. This technique
allowed us to locate many unpublished documents, including works-in-progress and
conference papers that were made available online by the authors. The majority of included
studies were sourced from these first two searches. Third, we conducted manual searches of
the programs from the annual conferences of the Academy of Management and the Society
for Industrial and Organizational Psychology for the past ten years, yielding 16 relevant
presentations. Six of those had since become available in other published form, and we
contacted the authors to inquire about the remaining ten. Of those authors contacted, three
provided sufficient results to be considered for inclusion. Fourth, because Computers in
Human Behavior was the most common publication outlet among the uncovered studies, we
also examined the journals upcoming issues, including articles that are available online
first, in press, or in preparation and may not yet be indexed. This search yielded three
relevant articles, two of which were usable. Fifth, we contacted prominent researchers in this
research domain to request potentially available raw data and unpublished work. However,
none of these researchers had unpublished work to share. Finally, we conducted a search of
the reference lists of all included studies. This yielded an additional 91 studies to be
considered for inclusion.
Studies with sufficient information to extract a correlation (or effect size that could be
converted to a correlation) between cyberloafing behaviors and any other variable were obtained.
549
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
Over the past decade, constructs highly congruent with cyberloafing have emerged under
different labels in other disciplines, including cyberslacking, personal web usage,
technological time banditry, nonwork-related computing, social media use at work, and
counterproductive computer use (Anandarajan and Simmers, 2004; Bock and Ho, 2009;
Brock et al., 2013; Charoensukmongkol, 2014; Gallagher, 2009; Pee et al., 2008; Vitak et al., 2011).
Due to their conceptual similarity, we included a variety of these variables in our data set as
forms of cyberloafing. Although this approach leads to slightly more heterogeneous analyses in
terms of construct measures included, the primary differences between these behavioral
categories are their names, and it was our intention to examine the cyberloafing
construct comprehensively.
The initial database consisted of 221 sources that reported a relationship between
cyberloafing and other variables of interest. Of these, we retained only studies that met the
following five inclusion criteria: First, we only included studies that utilized behavioral
measures of cyberloafing (e.g. excluding studies relying purely on intentions to commit such
behaviors). Second, studies had to operationalize cyberloafing within an occupational
context (e.g. studies drawing on students cyberloafing in class were excluded). Third, we
included only studies that involved reports of employee cyberloafing behaviors in real work
settings and thus excluded experimental manipulations of cyberloafing in laboratory
studies. Fourth, we included studies that reported correlations or effect sizes that could be
converted to correlations, but not studies that only reported results from multiple regression
or structural equation modeling analyses. Fifth, we excluded any sources that suppressed
statistically insignificant results to avoid an upward bias in cumulated effects (Schmidt and
Hunter, 2014). In total, 49 studies met these inclusion criteria and were subsequently coded
by the second author. In total, 12 percent of these studies were coded by an additional coder;
they identified only one discrepancy, which was subsequently resolved. The coded studies
were based on 54 unique samples and yielded 609 separate effect sizes. Several studies
contributed multiple independent samples, which offset the deficit created by studies using
duplicate sample pools (e.g. Pew internet and American Life sample)[1]. In most studies,
numerous correlates were examined in each sample and thus contributed to separate meta-
analyses reported here. In order to avoid second order sampling error to the degree possible,
we analyze and report only relationships where at least three independent samples reported
an effect for the variables of interest, in line with previous conventions
(e.g. Berry et al., 2007; Cohen-Charash and Spector, 2001). In sum, we utilized 315 distinct
correlation coefficients to examine the relationships between cyberloafing and 40 variables.
Table I lists and defines the core constructs included in these analyses.
Measures of cyberloafing
Our broad literature search approach led to the inclusion of studies utilizing a wide variety of
measures of cyberloafing. Two of the most common measures, Lims (2002) and Lim and Teos
(2005) cyberloafing scales, asked how time was spent online at work. More recently, Mercado and
Dilchert (2016a, b, c, d) assessed the extent to which employees engage in various cyberloafing
behaviors while they should be working. Despite these differences, there is substantial similarity
across items both within and across measures, with each scale comprised primarily of various
internet browsing and messaging behaviors. Due to differences in facet structures across these
measures,withmanystudiesreportingonlyone general factor of cyberloafing, an overall
cyberloafing dimension was most appropriate and feasible for these meta-analyses.
Meta-analytic procedure
In addition to coding effect sizes between cyberloafing and each reported variable,
we recorded rating source (e.g. self-report, other rating, objective records), measure
characteristics (e.g. item number, reliability estimates), and sample characteristics
550
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
(e.g. demographics and work experience) for potential use in moderator analyses.
Psychometric meta-analyses were conducted based on procedures outlined by Schmidt and
Hunter (2014) using the Open Psychometric Meta-Analysis software (Wiernik, 2015).
Occasionally, a single source reported multiple effect sizes from the same unique sample
that were relevant to the same analysis (e.g. multiple job performance facets). To ensure
Variable Definition
Cyberloafing Employee behaviors that involve using information and communication technologies
to engage in nonwork behaviors instead of working
Agreeableness The Big Five personality dimension reflecting the extent to which a person is likable,
cooperative, and conflict-avoidant
Conscientiousness The Big Five personality dimension reflecting the extent to which a person is
dedicated, disciplined, orderly, and detail-oriented
Emotional stability The Big Five personality dimension reflecting the extent to which a person is calm
and secure and is not anxious or volatile
Openness The Big Five personality dimension reflecting the extent to which a person is
curious, intelligent, imaginative, and independent
Extraversion The Big Five personality dimension reflecting the extent to which a person is
sociable, assertive, gregarious, and energetic
Self-control The personality trait reflecting the extent to which a person monitors and inhibits
his/her impulses, thoughts, and behaviors
Self-efficacy The extent to which a person believes in his/her own abilities, including general as
well as technology-specific forms of self-efficacy
Boredom The extent to which a person experiences a negative affective state of under-
stimulation and disengagement from his/her situation
Job satisfaction The extent to which an employee experiences a positive affective state upon
appraising his/her job
Attitudinal
engagement
The extent to which an employee is enthusiastic about his/her work and committed
to the organization, including identification with the job and perceptions of
meaningfulness with his/her work
Empowerment/job
autonomy
The extent to which an employee perceives authority or power over his/her work
tasks or within the workplace more generally
Support The extent to which an employee perceives support from his/her manager,
organization, or coworkers
Organizational justice The extent to which an employee perceives fairness in the workplace
Distributive justice The extent to which an employee perceives fairness in the distribution of outcomes
or rewards
Interactional justice The extent to which an employee perceives he/she has been fairly and
respectfully treated
Procedural justice The extent to which an employee perceives fairness in the processes used to
determine reward or outcome distribution
Neutralization The extent to which a person rationalizes deviant behaviors to justify or excuse them
Performance Employee behaviors that contribute to the organization and its members, including
job and task performance as well as citizenship behaviors
Overall CWB Employee behaviors that detract from organizational goals or well-being,
including those that bring about negative consequences for the organization
and/or its members
Time theft/loafing Employee behaviors that use paid work time for nonwork purposes
Norms The extent to which an employee perceives cyberloafing to be normal or prevalent in
his/her workplace
Monitoring The extent to which an employee perceives that his/her cyberloafing is being
monitored electronically by the organization
Guidelines or rules The extent to which a workplace is governed by guidelines, rules or policies about
technology use at work
Consequences The extent to which an employee perceives that there will be punishment, sanctions,
or other costs as a result of their cyberloafing
Table I.
Overview of
core constructs
551
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
independence of effect size estimates contributing to each analysis, and (secondarily) to
ensure consistency with regard to the constructs included in each analysis, we formed
composite correlations (cf. Ghiselli et al., 1981) for cases where the required scale
intercorrelations were available and averaged effects if this was not the case. Averaging
correlations leads to a more conservative estimate of the underlying relationships; thus,
average correlations are acceptable alternatives when a composite cannot be computed
(Schmidt and Hunter, 2014). When composite correlations were calculated, reliabilities of the
composites were calculated using Mosiers (1943) formula. In cumulating the available
effects in individual meta-analyses, the biasing influences of sampling error as well as
attenuation due to measurement error in the predictor and criterion were corrected using
statistical artifact distributions. A list of artifact distributions used in the corrections can be
found in Table II. Due to the limited number of studies as well as a lack of consistent
normative information for cyberloafing and other construct measures in this emerging
research domain, it was difficult to ascertain the extent to which range restriction had an
influence on the observed effects. Therefore, no corrections for range restriction could be
applied. Any resulting true correlations should be considered conservative estimates for this
reason. Moderator analyses were also not conducted due to the lack of consistently available
information as well as insufficient sample sizes from the included studies.
Results
Table III presents meta-analytic results for the relationship between cyberloafing,
demographic background, and employment variables. Gender and age displayed negligible
relationships with cyberloafing ( ρ¼0.07, 0.08, respectively), whereas education
displayed a modest positive effect ( ρ¼0.11), signifying that more educated individuals
engaged in greater cyberloafing. Employment variables also exhibited varied relationships
with cyberloafing. Job tenure, organizational level, and income demonstrated negligible
effects ( ρ¼0.08, 0.08, and 0.05, respectively), indicating that cyberloafing is pervasive
across various types of employees and organizational levels. However, hours worked per
week demonstrated a small positive relationship ( ρ¼0.12) with cyberloafing, indicating
that individuals engage in such behaviors as their time on the job/task increases.
Personality variables displayed a modest but persuasive pattern of true-score
correlations with cyberloafing (see Table IV ). While openness and extraversion were
unrelated to cyberloafing ( ρ¼0.01 and 0.00, respectively), agreeableness,
conscientiousness, and emotional stability demonstrated modest negative relationships
(ρ¼0.11, 0.11, and 0.16, respectively). Such a pattern of results might be expected
based on previous findings on the relationships between these three Big Five dimensions
(often conceptualized as the core of a construct termed socialization)and
counterproductive work behaviors (CWB) (see Berry et al., 2007; Ones et al., 1993, 2005).
The two narrower traits for which sufficient data were available, self-control and
self-efficacy, displayed even more notable relationships. Self-control demonstrated a
negative and moderately strong relationship ( ρ¼0.32); self-efficacy (across global and
computer/internet-specific measures) exhibited a moderate positive relationship with
cyberloafing ( ρ¼0.20)[2]. In sum, individuals who are high in self-control are less likely to
exhibit cyberloafing; the same is true (albeit to a lesser degree) of individuals who are high
in socialization as well as those lower on self-efficacy.
We next examined the relationships between attitudinal, engagement, and organization
perception variables and cyberloafing (see Table V ). Both boredom and empowerment/job
autonomy demonstrated moderate positive relationships with cyberloafing ( ρ¼0.24 and
0.21, respectively), indicating that bored employees and those who are empowered to
determine the course of their daily actions are more likely to engage in cyberloafing.
In contrast, employee engagement was moderately negatively related to cyberloafing
552
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
(ρ¼0.21), suggesting that engaged employees who are highly committed to their jobs will
be less likely to cyberloaf. Cyberloafing was negligibly related to both job satisfaction
(ρ¼0.04, and 0.01, with and without one extreme outlier, respectively) and perceptions of
organizational support ( ρ¼0.03).
Following employee attitudes, we considered how employee perceptions of the organization
might influence their behaviors. Organizational justice demonstrated a small negative
Variable k rxx SDrxx Mffiffiffiffi
rxx
pSD ffiffiffiffiffiffi
rxx
p
Cyberloafing 42 0.87 0.07 0.93 0.04
Emotional stability
a
459 0.77 0.10 0.87 0.06
Extraversion
a
186 0.80 0.07 0.89 0.04
Openness
a
32 0.76 0.08 0.87 0.05
Agreeableness
a
26 0.79 0.05 0.89 0.03
Conscientiousness
a
90 0.77 0.08 0.87 0.05
Self-control
a
48 0.70 0.12 0.84 0.07
Self-efficacy
a
264 0.90 0.00 ––
Boredom 7 0.91 0.04 0.95 0.02
Job satisfaction
a
13 0.84 0.06 0.92 0.03
Attitudinal engagement 5 0.88 0.09 0.94 0.05
Empowerment/job autonomy 3 0.90 0.02 0.95 0.01
Support 4 0.83 0.11 0.91 0.06
Organizational justice 5 0.92 0.04 0.96 0.02
Distributive justice
a
66 0.91 –– –
Interactional justice 8 0.86 0.06 0.92 0.04
Procedural justice
a
66 0.91 –– –
Neutralization 3 0.89 0.05 0.94 0.03
Performance
a,b
7 0.90 –– –
Overall CWB 7 0.86 0.05 0.93 0.03
Time theft/loafing 4 0.70 0.06 0.84 0.04
Favorable attitude toward cyberloafing 7 0.90 0.04 0.95 0.02
Intentions to cyberloaf 6 0.89 0.09 0.94 0.05
Perceived benefits of cyberloafing 4 0.89 0.05 0.94 0.03
Habitual cyberloafing 5 0.86 0.07 0.93 0.04
Usage/time on internet 1 0.91 0.00 0.95 0.00
Internet/social media skills/experience 1 0.79 0.00 0.89 0.00
Ability to hide cyberloafing 3 0.89 0.03 0.94 0.02
Norms 10 0.86 0.08 0.93 0.04
Monitoring 2 0.75 0.01 0.86 0.01
Guidelines or rules 2 0.73 0.00 0.85 0.00
Consequences 4 0.89 0.06 0.94 0.03
Notes: k, number of independent reliability estimates in distribution; rxx , average reliability estimate; SDrxx ,
standard deviation of reliability estimates; Mffiffiffiffi
rxx
p, average of the square roots of reliability estimates; SD ffiffiffiffiffiffi
rxx
p,
standard deviation of the square roots of the reliability estimate. Analyses for variables not listed in this table
were not corrected for attenuation due to unreliability.
a
Reliability artifact distribution obtained from existing
meta-analytic literature; for rows with missing SD of estimates, only kand the mean of estimates were
available from the literature. Reliability artifact distributions for Big Five personality trait measures as well
as the compound trait self-control were obtained from Dilchert (2008), who compiled comprehensive artifact
distributions based on meta-analytic work by Ones and colleagues (sources included Birkland and Ones, 2006,
for emotional stability; Davies et al., 2008, for extraversion; Connelly et al., 2008, for openness; Connelly et al.,
2008, for Agreeableness; and Connelly and Ones, 2007, for conscientiousness). The artifact distribution for
self-efficacy measures was obtained from Seltzer (2013);
b
the typically more suitable value of 0.52 used in
most meta-analysis of supervisory ratings of job performance was not used, as all studies contributing to the
present meta-analysis employed exclusively self-report measures of performance. Correlations with job
performance were corrected using an internal consistency reliability estimate of 0.90, based on seven values
reported in the meta-analysis by Harris and Schaubroeck (1988)
Table II.
Reliability artifact
distributions
553
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
relationship with cyberloafing ( ρ¼0.12); this effect also occurred at the dimension level for
interactional justice and procedural justice ( ρ¼0.10 and 0.11, respectively) but not
distributive justice ( ρ¼0.00). Neutralization, a rationalization process that utilizes perceptions
of inequity as justification for ones own wrongdoing, was strongly positively related to
cyberloafing ( ρ¼0.43), suggesting that individuals are more likely to engage in it if they feel
they are owed due to not being repaid for investments they have made into the company.
Next, we examined the influence of employeesattitudes toward cyberloafing and their
opportunities to engage in these behaviors (see Table VI for detailed results). Favorable
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
Gender
a
23 7,019 0.07 0.11 0.09 0.02 0.07 0.10 0.11, 0.03 0.20, 0.05
Age 23 8,301 0.08 0.12 0.10 0.02 0.08 0.11 0.13, 0.04 0.22, 0.06
Education 6 2,948 0.11 0.13 0.12 0.05 0.11 0.13 0.00, 0.23 0.05, 0.28
Hours worked 6 1,858 0.11 0.06 0.00 0.02 0.12 0.00 0.07, 0.17 0.12, 0.12
Job tenure 10 3,116 0.07 0.10 0.08 0.03 0.08 0.09 0.14, 0.01 0.19, 0.03
Organization level 8 2,943 0.07 0.13 0.12 0.05 0.08 0.13 0.01, 0.17 0.08, 0.24
Income 8 2,807 0.05 0.11 0.10 0.04 0.05 0.11 0.03, 0.14 0.08, 0.19
Notes: k, number of independent samples contributing to analysis; N, total sample size; r, mean sample-size-
weighted observed correlation; SD
r
, standard deviation of mean sample-size-weighted correlations; SD
res
,
residual standard deviation; SEr, standard error of r;ρ, true-score correlation (corrected for unreliability in
both measures for cases where artifact distributions are listed in Table II); 90% CI
ρ
¼90% confidence interval
of ρ; 80% CV
ρ
¼80% credibility values of ρ.
a
Male ¼0, female ¼1
Table III.
Meta-analytic results
for demographic
background and
employment variables
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
Emotional stability 8 2,253 0.13 0.08 0.05 0.03 0.16 0.06 0.22, 0.09 0.24, 0.08
Extraversion 7 2,006 0.00 0.10 0.08 0.04 0.00 0.09 0.08, 0.09 0.12, 0.12
Openness 7 2,006 0.01 0.07 0.04 0.03 0.01 0.05 0.06, 0.07 0.05, 0.07
Agreeableness 7 2,005 0.09 0.06 0.00 0.02 0.11 0.00 0.16, 0.06 0.12, 0.11
Conscientiousness 11 3,212 0.09 0.07 0.04 0.02 0.11 0.05 0.16, 0.07 0.17, 0.05
Self-control 5 1,224 0.25 0.27 0.27 0.12 0.32 0.34 0.65, 0.02 0.76, 0.12
Self-efficacy 6 1,744 0.17 0.10 0.08 0.04 0.20 0.09 0.10, 0.29 0.08, 0.31
Note: See Table III for notes
Table IV.
Meta-analytic results
for personality
variables
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
Boredom 7 1,939 0.21 0.08 0.05 0.03 0.24 0.06 0.17, 0.31 0.16, 0.32
Job satisfaction 14 4,868 0.04 0.19 0.18 0.05 0.04 0.22 0.15, 0.06 0.32, 0.23
(without outlier) 13 4,595 0.01 0.06 0.03 0.02 0.01 0.04 0.03, 0.05 0.04, 0.06
Attitudinal engagement 7 2,333 0.18 0.20 0.19 0.08 0.21 0.22 0.40, 0.02 0.49, 0.07
Empowerment/job
autonomy 4 1,788 0.18 0.09 0.08 0.05 0.21 0.09 0.08, 0.33 0.09, 0.32
Support 4 866 0.03 0.10 0.07 0.05 0.03 0.08 0.11, 0.17 0.08, 0.14
Organizational justice 6 1,132 0.10 0.08 0.04 0.03 0.12 0.04 0.19, 0.04 0.17, 0.06
Distributive justice 8 2,051 0.00 0.16 0.15 0.06 0.00 0.17 0.12, 0.12 0.21, 0.22
Interactional justice 8 2,585 0.09 0.14 0.13 0.05 0.10 0.15 0.21, 0.01 0.29, 0.09
Procedural justice 9 2,289 0.10 0.15 0.14 0.05 0.11 0.15 0.22, 0.01 0.30, 0.08
Neutralization 3 684 0.38 0.08 0.05 0.04 0.43 0.05 0.28, 0.58 0.36, 0.50
Note: See Table III for notes
Table V.
Meta-analytic results
for attitudinal,
engagement, and
organization
perception variables
554
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
attitudes toward cyberloafing exhibited a strong positive relationship ( ρ¼0.42) and
intentions to cyberloaf very strongly positively correlated with cyberloafing ( ρ¼0.61).
Additionally, employee perceptions of the benefits of cyberloafing demonstrated a moderate
positive relationship with the construct ( ρ¼0.28). Habitual cyberloafing exhibited a very
strong positive effect on cyberloafing ( ρ¼0.66), indicating that individuals who display
addictive behavioral tendencies of technology use across life contexts engage in more
cyberloafing at work. Employeestechnology access (e.g. the proportion of time spent on the
internet) was positively related to cyberloafing ( ρ¼0.20). Employeestechnology skills and
experience strongly positively related to the construct ( ρ¼0.40). Additionally, as might be
expected, employeesability to hide cyberloafing demonstrated a strong positive
relationship with cyberloafing ( ρ¼0.41).
We also examined the relationships between cyberloafing and CWB as well as overall
performance, conceptualized heterogeneously as the positive components of job performance
(e.g. work performance, task performance, organizational citizenship behaviors; see Table VII).
Cyberloafing was negligibly related to performance ( ρ¼0.05), yet it was strongly positively
related to overall CWB ( ρ¼0.38) and the narrower counterproductivity construct of time theft/
loafing other than cyberloafing ( ρ¼0.39). To better understand the structure and homogeneity
of the construct, we also investigated the intercorrelations among facets of cyberloafing in the
few studies that reported such results (see Table VIII). Whether studies separated cyberloafing
by content of behavior (e.g. e-mailing vs browsing) or severity, subscales of cyberloafing were
very highly correlated ( ρs¼0.69 and 0.71, respectively for content and severity taxa).
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
Favorable attitude toward
cyberloafing 8 1,919 0.37 0.14 0.12 0.05 0.42 0.14 0.32, 0.52 0.24, 0.60
Intentions to cyberloaf 6 1,622 0.53 0.05 0.03 0.02 0.61 0.03 0.55, 0.66 0.56, 0.65
Perceived benefits of cyberloafing 5 2,201 0.24 0.23 0.23 0.10 0.28 0.26 0.02, 0.53 0.06, 0.61
Habitual cyberloafing 5 851 0.57 0.14 0.13 0.06 0.66 0.15 0.50, 0.81 0.47, 0.85
Usage/time on internet 9 2,745 0.17 0.09 0.07 0.03 0.20 0.07 0.14, 0.26 0.10, 0.29
Internet/social media skills/experience 3 742 0.33 0.14 0.13 0.08 0.40 0.16 0.11, 0.69 0.20, 0.60
Ability to hide cyberloafing 3 695 0.36 0.13 0.11 0.07 0.41 0.13 0.16, 0.65 0.24, 0.57
Note: See Table III for notes
Table VI.
Meta-analytic results
for attitude and
opportunity variables
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
Performance 14 3,866 0.05 0.16 0.15 0.04 0.05 0.17 0.14, 0.04 0.27, 0.17
Overall CWB 9 2,659 0.32 0.12 0.11 0.04 0.38 0.12 0.29, 0.46 0.22, 0.53
Time theft/loafing 4 1,150 0.30 0.16 0.15 0.08 0.39 0.19 0.15, 0.63 0.15, 0.64
Note: See Table III for notes
Table VII.
Meta-analytic results
for performance
variables
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
E-mailing activities
Browsing activities 4 1,010 0.61 0.07 0.05 0.04 0.69 0.06 0.59, 0.79 0.61, 0.76
Serious behaviors
Minor behaviors 2 561 0.59 0.21 0.21 0.15 0.71 0.25 0.44, 1.00 0.39, 1.00
Note: See Table III for notes
Table VIII.
Meta-analytic
intercorrelation results
for cyberloafing facets
555
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
The last group of variables we examined consisted of organizational norms and policies
(see Table IX for detailed results). Although monitoring exhibited a negligible relationship
with cyberloafing ( ρ¼0.06), organizational guidelines or rules governing technology use
negatively influenced cyberloafing ( ρ¼0.15). In contrast, employeesperceptions of
negative consequences of cyberloafing were unrelated to the criterion ( ρ¼0.01). Unlike the
other organizational influences, norms were strongly positively related to cyberloafing
(ρ¼0.37), such that employees who perceived cyberloafing behaviors to be normal and
prevalent were substantially more likely to display such behaviors themselves.
Discussion and directions for future research
Results from this first meta-analysis of the increasingly popular cyberloafing construct
yielded several noteworthy findings. First, although young, inexperienced employees
(or specific generations and cohorts, such as Millennials) are often accused of greater misuse
of information technology and increased cyberloafing, our results indicate that age, job
tenure, and organizational level are unrelated to the phenomenon. This is particularly
striking, given current, widespread concerns regarding the unprofessionalism of todays
younger cohorts with regard to many workplace behaviors, especially those relating to
information technology use (e.g. Center for Professional Excellence at York College of
Pennsylvania, 2013). This disparity between coworkersperceptions of younger employees
technology use and the lack of age effects in cyberloafing may be explained by the largely
hidden nature of technology use. Younger employees might more readily adopt technology
in general, which might be misinterpreted by colleagues as cyberloafing. In contrast to the
negligible effects of age, education demonstrated a small positive effect on cyberloafing.
Although surprising, the positive effect of job autonomy may shed some light on this
finding, given the likelihood that individuals with higher education might hold positions
granting them more opportunities to cyberloaf.
Second, although several broader personality variables exhibited relationships with
cyberloafing, we identified two narrow personality traits that were more useful in
explaining potential mechanisms. For example, self-control was strongly negatively
related to cyberloafing. This evidence is in line with research on the importance of
predictor-criterion bandwidth matching, and suggests that further investigation into
specific personality traits and their relationships with this narrow-bandwidth subset of
work behaviors is merited. An important caveat should be noted: although these initial
findings are interesting, the self-control-cyberloafing relationship was limited by a very
small number of samples contributing to the analyses (k¼5). These effects certainly merit
further empirical investigation across new samples and job contexts. Research examining
the mechanisms underlying this relationship can enhance understanding of cyberloafing as
well as provide an evidence-based foundation on which to develop managerial interventions
to reduce these behaviors.
Another narrow trait, self-efficacy, also demonstrated a noteworthy relationship with
cyberloafing. Most importantly, self-efficacy is generally regarded as a desirable trait as it
empowers individuals to accomplish their tasks. However, in this case, our findings indicate
Variable kN rSD
r
SD
res
SE of rρSD
ρ
90% CI
ρ
80% CV
ρ
Norms 12 2,580 0.32 0.17 0.16 0.05 0.37 0.18 0.27, 0.47 0.14, 0.61
Monitoring 7 1,504 0.05 0.06 0.00 0.02 0.06 0.00 0.11, 0.00 0.06, 0.06
Guidelines or rules 8 2,430 0.12 0.15 0.13 0.05 0.15 .17 0.27, 0.03 0.37, 0.07
Consequences 5 996 0.00 0.26 0.25 0.11 0.01 0.28 0.27, 0.28 0.35, 0.36
Note: See Table III for notes
Table IX.
Meta-analytic results
for norms and
organizational policies
556
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
that self-efficacy exhibits a moderate positive relationship with cyberloafing. This is yet
another opportunity for future research to more deeply explore the mechanism of the
cyberloafing phenomenon. Employers would not typically wish to reduce the self-efficacy of
their employees (either general or computer-specific), yet they may wish to diminish their
employeescyberloafing. Further investigation is necessary to determine how employers
can continue to encourage self-efficacy among their employees without fostering
cyberloafing. Does quantity of workload influence the effects of self-efficacy? Do people
with high self-efficacy exhibit greater optimism with regard to task ease and thus feel
enabled to procrastinate? Do capable employees experience greater boredom? Do employees
with greater self-efficacy feel more fully invested in their organizations and thus rationalize
their cyberloafing? Finally, how do computer/internet specific self-efficacy measures
interact with opportunity to engage in or hide cyberloafing in determining employees
behaviors? Each of these questions presents an opportunity for future investigation that can
guide distinct and practically meaningful organizational interventions. Another strong
predictor of cyberloafing was a rationalization technique called neutralization. The studies
that we meta-analyzed operationalized neutralization using the metaphor of the ledger,
which consists of employees considering how much they contribute to the organization.
Then, the employees evaluate whether they feel they have been sufficiently compensated or
recognized for those contributions. If they do not feel that the relationship is equitable,
employees feel reduced guilt and enhanced justification when engaging in questionable acts.
Very little research has examined neutralization in the context of cyberloafing
(in our analyses, k¼3), but some scholars have already begun to examine the
mechanisms at play in this relationship. For example, perceptions of injustice have been
examined as a predictor of neutralization (Lim, 2002). However, the scholarly literature has
yet to examine how employeesexperiences of neutralization and consequent cyberloafing
behavior might be positively influenced. Are there opportunities to alleviate these
perceptions of inequity before the situation escalates? Can these negative employee
experiences be remedied, at least in part, by avenues to voice employeesconcerns and
managerial interventions that prioritize them? Although rationalization is generally linked
to undesirable behaviors, few empirical investigations to date have attempted to provide
solutions to these problems.
Much concern about cyberloafing has stemmed from its apparent prevalence within
organizations. Most people have witnessed or participated in these behaviors, and many
employers have terminated employees for them (American Management Association and
The ePolicy Institute, 2007). Our findings on the strong relationship between norms and
cyberloafing further emphasize the problematic nature of cyberloafing becoming a normal
and acceptable behavior. People who do not perceive these behaviors as deviant are
substantially more likely to engage in them, thus perpetuating the normality of these largely
unproductive behaviors. Perhaps further contributing to this issue is the ineffectiveness of
monitoring initiatives and sanctions in the management of these behaviors. While such
interventions might be indirectly responsible for some deterrence via norms, they are clearly
insufficient to address the growing trend. Therefore, new interventions merit further
exploration, potentially including personnel selection and training to influence norms as
well as job design considerations to account for bored and disengaged employees.
Cyberloafing has become controversial in recent years as scholars have debated its
nature as a negative detractor from organizational effectiveness vis-a-vis a positive
contributor to employee productivity and well-being via recovery. Although our analyses do
not allow us to infer the nature of these relationships, our findings do indicate that
cyberloafing is only negligibly related to job performance. This does not mean
that cyberloafing is entirely unproblematic. On the contrary, our results indicate that
cyberloafing is strongly positively related to overall CWB as well as the narrower
557
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
counterproductivity construct of time theft/loafing. Future research is necessary to better
understand this phenomenon, particularly in light of past research indicating that other
forms of counterproductive behaviors negatively relate to the positive components of job
performance (Berry et al., 2007; Dalal, 2005; Rotundo and Sackett, 2002). It is possible that
the apparent null relationship between cyberloafing and performance is instead
substantially more complex, moderated by the length, frequency, or type of cyberloafing
where only some forms or levels are problematic. The various conceptualizations of
cyberloafing included in this analysis may also be responsible for these findings.
The majority of studies summarized in our meta-analyses relied on measures that did not
explicitly mention whether the behavior was interfering with a work task, thus
compromising performance. For example, social media use in the workplace may manifest
itself in a variety of ways, some perhaps restorative or merely insubstantial, while others
could compromise performance for an entire workday (e.g. constant connectivity that
distracts from a task which requires focus). In addition, using the measures employed by
these studies, the same behavior could be counterproductive for some employees (e.g. those
who should be working) but not for others who might have downtime while they await
their next task, a rationale consistent with earlier arguments by information systems
scholars (e.g. Silver et al., 1995).
Even if cyberloafing serves as an effective recovery method for employees, it still has
substantial potential to cause harm to the organization. Employers should consider ways to
differentiate between legitimate and illegitimate (i.e. counterproductive) forms of
cyberloafing. If cyberloafing is a type of positive break, it can be managed similarly to
other work breaks, which are typically governed by organizational guidelines and
sanctions. For example, in many positions, meal and rest breaks are clearly delineated and
monitored. If such breaks were not governed, some individuals would abuse the
opportunity, and such behavior would be considered a form of CWB by most definitions.
The same approach can be taken in managing cyberloafing to provide fair and equitable
treatment across employees while also preserving productivity. Related to the limitations
listed above, we found several notable methodological weaknesses in primary studies.
First, we found that many different scales are utilized to assess cyberloafing and related
constructs. Although the differences sometimes reflect only a slightly different
conceptualization, they are typically the result of each study adapting a common
measure (i.e. Lim, 2002; Lim and Teo, 2005). This has led to extensive inconsistency and
sometimes incomparability across studies. Just as importantly, the proliferation of measures
has hindered the advancement of systematic research on cyberloafing as many studies
focus on adapting and validating scales for specific applications rather than on furthering
our understanding of these important employee behaviors generally. The majority of
studies that adapt common measures often do so without providing psychometric evidence
to support those decisions. For this literature to evolve and grow systematically, a validated,
generally applicable scale must be established and widely accepted. Although the analyses
relied on few studies, we were encouraged by the strong convergence of cyberloafing facets,
demonstrating substantial homogeneity across items and supporting our decision to focus
on overall cyberloafing. Although the construct of cyberloafing has been assessed in many
different ways, there is a notable lack of other-reports of employee cyberloafing. This is
perhaps to be expected, as previous works on cyberloafing have emphasized the potential
for employees to conceal these behaviors (Wagner et al., 2012; Zhang et al., 2015). However,
especially considering the notable relationship between cyberloafing and habitual
cyberloafing, employees may not fully recognize the extent to which they engage in these
behaviors. Other reports might provide deeper insights into these behaviors.
Another methodological limitation of cyberloafing investigations to date is that they
have assumed stability in employee cyberloafing over time. Essentially, these behaviors are
558
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
assessed as though employees maintain a constant level of cyberloafing. However, there are
rational arguments and some limited empirical evidence to suggest that situational
influences can have more substantial impact on cyberloafing on certain occasions (e.g. when
employees are sleep-deprived; Wagner et al., 2012). Therefore, within-subject investigation into
the changes in employee cyberloafing would greatly contribute to this growing literature.
Conclusions
In this study, we meta-analytically summarized the growing literature on employee
cyberloafing. Our findings suggest several important influences on these generally undesirable
behaviors, including moderate effects of personality variables as well as strong effects of
contextual influences (e.g. norms) and employee attitudes. Just as importantly, we identified
many opportunities for future development of this literature. Investigations of cyberloafing are
still in their nascent stages, and extensive research is needed to better understand these
employee behaviors and their antecedents and outcomes. Prior to this study, the various
studies on cyberloafing each created new frameworks based on a limited number of variables
relevant to one specific foundational theory (e.g. theory of planned behavior). While continued
development of this literature is necessary, we hope that these findings will aid researchers in
developing frameworks more holistically and selecting variables based on evidence of their
relevance to the relationship of interest. The present set of meta-analytic results can provide a
starting place for a more empirically grounded approach to model formation.
Notes
1. Following proper meta-analytic procedure, each unique sample contributed to any given analysis only
once, even if it was reported in multiple sources. In those cases, the source with the most comprehensive
information (e.g. on predictor or criterion measures or reliability estimates) was included.
2. Seltzers (2013) meta-analytic investigation showed that there is high convergence of global and
domain-specific self-efficacy measures, as well as high convergence of self-efficacy measures across
different specific domains. This, in addition to the modest SD
ρ
, suggests relative homogeneity and
generalizability of findings despite the inclusion of the different types of scales in this analysis.
References
Entries marked with * indicate sources that contributed data to the meta-analyses.
American Management Association and The ePolicy Institute (2007), 2007 electronic monitoring and
surveillance survey, available at: www.epolicyinstitute.com/2007-survey-results (accessed
April 21, 2015).
Anandarajan, M. and Simmers, C.A. (Eds) (2004), Personal Web Usage in the Workplace: A Guide to
Effective Human Resources Management, IGI Global, Hershey, PA, available at: www.igi-
globalsolve.aspx?doi=10.4018/978-1-59140-148-3 (accessed March 28, 2015).
*Askew, K., Buckner, J.E., Taing, M.U., Ilie, A., Bauer, J.A. and Coovert, M.D. (2014), Explaining
cyberloafing: the role of the theory of planned behavior,Computers in Human Behavior, Vol. 36,
pp. 510-519, available at: http://doi.org/10.1016/j.chb.2014.04.006
Berry, C.M., Ones, D.S. and Sackett, P.R. (2007), Interpersonal deviance, organizational deviance, and
their common correlates: a review and meta-analysis,Journal of Applied Psychology, Vol. 92
No. 2, pp. 410-424, available at: http://doi.org/10.1037/0021-9010.92.2.410
Birkland, A.S. and Ones, D.S. (2006), The structure of emotional stability: a meta-analytic
investigation, paper presented at the International Congress of Applied Psychology, Athens.
Black, E., Light, J., Black, N.P. and Thompson, L. (2013), Online social network use by health care
providers in a high traffic patient care environment,Journal of Medical Internet Research,
Vol. 15 No. 5, pp. 68-72.
559
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
*Blanchard, A.L. and Henle, C.A. (2008), Correlates of different forms of cyberloafing: the role of norms
and external locus of control,Computers in Human Behavior, Vol. 24 No. 3, pp. 1067-1084,
available at: http://doi.org/10.1016/j.chb.2007.03.008
Block, W. (2001), Cyberslacking, business ethics and managerial economics,Journal of Business
Ethics, Vol. 33 No. 3, pp. 225-231.
Bock, G.-W. and Ho, S.L. (2009), Non-work related computing (NWRC),Communications of the ACM,
Vol. 52 No. 4, pp. 124-128.
*Brock, M.E., Martin, L.E. and Buckley, M.R. (2013), Time theft in organizations: the development of
the Time Banditry Questionnaire,International Journal of Selection and Assessment, Vol. 21
No. 3, pp. 309-321, available at: http://doi.org/10.1111/ijsa.12040
*Cao, X., Guo, X., Vogel, D. and Zhang, X. (2016), Exploring the influence of social media on employee
work performance,Internet Research, Vol. 26 No. 2, pp. 529-545, available at: http://doi.org/10.
1108/IntR-11-2014-0299
Center for Professional Excellence at York College of Pennsylvania (2013), National professionalism
survey, workplace report, York, PA, available at: www.ycp.edu/media/york-website/cpe/York-
College-Professionalism-in-the-Work placeStudy2013.pdf (accessed May 19, 2016).
*Charoensukmongkol, P. (2014), Effects of support and job demands on social media use and work
outcomes,Computers in Human Behavior, Vol. 36, pp. 340-349, available at: http://doi.org/10.
1016/j.chb.2014.03.061
Cohen-Charash, Y. and Spector, P.E. (2001), The role of justice in organizations: a meta-analysis,
Organizational Behavior and Human Decision Processes, Vol. 86 No. 2, pp. 278-321, available at:
https://doi.org/10.1006/obhd.2001.2958
Connelly, B.S., Davies, S.E., Ones, D.S. and Birkland, A.S. (2008), Agreeableness: a meta-analytic
review of structure, convergence, and predictive validity, in Thomas, J.P. and Viswesvaran, C.
(Eds), Personality in the Workplace: Advances in Measurement and Assessment, Symposium
conducted at the annual conference of the Society for Industrial and Organizational Psychology,
San Francisco, CA, April.
Connelly, B.S., Davies, S.E., Ones, D.S. and Birkland, A.S. (2008), Opening up openness: a metaanalytic
review of measures of the personality construct, poster presented at the annual conference of
the Society for Personality and Social Psychology, Albuquerque, NM, January.
Connelly, B.S. and Ones, D.S. (2007), Combining conscientiousness scales: cant get enough of the trait,
baby, poster presented at the annual conference of the Society for Industrial and Organizational
Psychology, New York City, NY, April.
Dalal, R.S. (2005), A meta-analysis of the relationship between organizational citizenship behavior and
counterproductive work behavior,Journal of Applied Psychology, Vol. 90 No. 6, pp. 1241-1255,
available at: http://doi.org/10.1037/0021-9010.90.6.1241
Davies, S.E., Connelly, B.S., Ones, D.S. and Birkland, A.S. (2008), Enhancing the role of extraversion
for work related behaviors, poster presented at the annual conference of the Society for
Industrial and Organizational Psychology, San Francisco, CA, April.
Dilchert, S. (2008), Measurement and prediction of creativity at work, doctoral dissertation, UMI
Dissertations Publishing No. 3504763, University of Minnesota, Minneapolis, MN.
Ethics Resource Center (2012), National business ethics survey of social networkers: new risks and
opportunities at work, available at: https://higherlogicdownload.s3.amazonaws.com/THEECOA/
1651fdd3-e31c-4ac8-a93d-9 b99f9e75727/UploadedImages/research/nbessnwebinar.pdf (accessed
May 11, 2016).
*Gallagher, E.C. (2009), Narcissism and forgiveness as moderators of organizational justice and
workplace counterproductive computer use (M.A.), University of Nebraska at Omaha, Omaha,
NE, available at: http://search.proquest.com/docview/250832319/abstract/7A83D7F33D2
141A3PQ/1 (accessed May 13, 2016).
Ghiselli, E.E., Campbell, J.P. and Zedeck, S. (1981), Measurement Theory for the Behavioral Sciences,
Freeman, San Francisco, CA.
560
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
Harris, M.M. and Schaubroeck, J. (1988), A meta-analysis of self-supervisor, self-peer, and
peer-supervisor ratings,Personnel Psychology, Vol. 41 No. 1, pp. 43-62.
*Lim, V.K.G. (2002), The IT way of loafing on the job: cyberloafing, neutralizing and organizational
justice,Journal of Organizational Behavior, Vol. 23 No. 5, pp. 675-694, available at: http://doi.
org/10.1002/job.161
*Lim, V.K.G. and Chen, D.J.Q. (2012), Cyberloafing at the workplace: gain or drain on work?,
Behaviour & Information Technology, Vol. 31 No. 4, pp. 343-353, available at: http://doi.org/10.10
80/01449290903353054
*Lim, V.K.G. and Teo, T.S.H. (2005), Prevalence, perceived seriousness, justification and regulation of
cyberloafing in Singapore: an exploratory study,Information & Management, Vol. 42 No. 8,
pp. 1081-1093, available at: http://doi.org/10.1016/j.im.2004.12.002
*Mahatanankoon, P., Anandarajan, M. and Igbaria, M. (2004), Development of a measure of personal
web usage in the workplace,CyberPsychology & Behavior, Vol. 7 No. 1, pp. 93-104, available at:
http://doi.org/10.1089/109493104322820165
*Mercado, B.K. and Dilchert, S. (2016a), Cyberloafing scores for a sample of employed adults,
unpublished raw data.
*Mercado, B.K. and Dilchert, S. (2016b), Cyberloafing scores for a sample of employed students,
unpublished raw data.
*Mercado, B.K. and Dilchert, S. (2016c), Cyber counterproductive work behavior scores for a sample of
employed adults, unpublished raw data.
*Mercado, B.K. and Dilchert, S. (2016d), Cyber counterproductive work behavior scores for a sample of
employed students, unpublished raw data.
Mosier, C.I. (1943), On the reliability of a weighted composite,Psychometrika, Vol. 8 No. 3, pp. 161-168,
available at: http://doi.org/10.1007/BF02288700
Ones, D.S., Viswesvaran, C. and Dilchert, S. (2005), Personality at work: raising awareness and
correcting misconceptions,Human Performance, Vol. 18 No. 4, pp. 389-404.
Ones, D.S., Viswesvaran, C. and Schmidt, F.L. (1993), Comprehensive metaanalysis of integrity test
validities: findings and implications for personnel selection and theories of job performance,
Journal of Applied Psychology, Vol. 78 No. 4, pp. 679-703.
Pee, L.G., Woon, I.M.Y. and Kankanhalli, A. (2008), Explaining non-work-related computing in the
workplace: a comparison of alternative models,Information & Management, Vol. 45 No. 2,
pp. 120-130, available at: http://doi.org/10.1016/j.im.2008.01.004
Rotundo, M. and Sackett, P.R. (2002), The relative importance of task, citizenship, and
counterproductive performance to global ratings of job performance: a policy-capturing
approach,Journal of Applied Psychology, Vol. 87 No. 1, pp. 66-80.
Salary.com (2014), Wasting time at work, available at: www.salary.com/2014-wasting-time-at-work/slide/3/
(accessed May 18, 2016).
Schmidt, F.L. and Hunter, J.E. (2014), Methods of Meta-Analysis: Correcting Error and Bias in Research
Findings, 3rd ed., Sage Publications, Inc., Thousand Oaks, CA.
Seltzer, B.K. (2013), The nomological network of selfefficacy and psychometric properties of its
general and specific measures, doctoral dissertation, UMI Dissertations Publishing
No. 3559516, University of Minnesota, Minneapolis, MN.
Silver, M., Markus, M. and Beath, C. (1995), The information technology interaction model: a foundation
for the MBA core course,MIS Quarterly, Vol. 19 No. 3, pp. 361-390, doi: 10.2307/249600.
Society for Human Resource Management (2011), Social media in the workplace, available at: www.
shrm.org/research/surveyfindings/articles/pages/socialmediaintheworkplace.aspx (accessed
April 21, 2015).
Smale, A. (2016), Dispatcher playing with cellphone is faulted in German train crash,The New York
Times, April 13, available at: www.nytimes.com/2016/04/14/world/europe/bavaria-germany-
train-crash.html
561
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
*Vitak, J., Crouse, J. and LaRose, R. (2011), Personal internet use at work: understanding
cyberslacking,Computers in Human Behavior, Vol. 27 No. 5, pp. 1751-1759.
Wagner, D.T., Barnes, C.M., Lim, V.K.G. and Ferris, D.L. (2012), Lost sleep and cyberloafing: evidence
from the laboratory and a daylight saving time quasiexperiment,Journal of Applied
Psychology, Vol. 97 No. 5, pp. 1068-1076, available at: http://doi.org/10.1037/a0027557
Wiernik, B.M. (2015), Open psychometric meta-analysis (Computer software), available at:
https://github.com/bwiernik/opma
*Zhang, H., Zhao, H., Liu, J., Xu, Y. and Lu, H. (2015), The dampening effect of employeesfuture
orientation on cyberloafing behaviors: the mediating role of selfcontrol,Frontiers in
Psychology, Vol. 6, pp. 1-10, available at: http://doi.org/10.3389/fpsyg.2015.01482
Additional sources contributing to the meta-analysis
*Aghaz, A. and Sheikh, A. (2016), Cyberloafing and job burnout: an investigation in the
knowledgeintensive sector,Computers in Human Behavior, Vol. 62, pp. 51-60, available at:
http://doi.org/10.1016/j.chb.2016.03.069
*Ahmadi, H., Bagheri, F., Ebrahimi, S.A., Rokni, M.A.N. and Kahreh, M.S. (2011), Deviant work
behavior: explaining relationship between organizational justice and cyber-loafing as a deviant
work behavior,American Journal of Scientific Research, No. 24, pp. 103-116.
*Ali-Hassan, H., Nevo, D. and Wade, M. (2015), Linking dimensions of social media use to job
performance: the role of social capital,Journal of Strategic Information Systems, Vol. 24 No. 2,
pp. 65-89, available at: http://doi.org/10.1016/j.jsis.2015.03.001
*Al-Shuaibi, A.S.I., Subramaniam, C. and Shamsudin, F.M. (2014), The mediating influence of job
satisfaction on the relationship between HR practices and cyberdeviance,Journal of Marketing
& Management, Vol. 5 No. 1, pp. 105-119.
*Askew, K. (2013), The relationship between cyberloafing and task performance and an examination
of the theory of planned behavior as a model of cyberloafing, doctoral dissertation, ProQuest
Information & Learning, University of South Florida, Ann Arbor, MI.
*Betts, T.K., Setterstrom, A.J., Pearson, J.M. and Totty, S. (2014), Explaining cyberloafing through a
theoretical integration of theory of interpersonal behavior and theory of organizational justice,
Journal of Organizational and End User Computing, Vol. 26 No. 4, pp. 23-42, available at: http://
doi.org/10.4018/joeuc.2014100102
*Blau, G., Yang, Y. and Ward-Cook, K. (2006), Testing a measure of cyberloafing,Journal of Allied
Health, Vol. 35 No. 1, pp. 9-17.
*Bock, G.-W., Park, S.C. and Zhang, Y. (2010), Why employees do non-work-related computing in the
workplace,Journal of Computer Information Systems, Vol. 50 No. 3, pp. 150-163.
*Brooks, S.L. (2014), Social media usage: examination of influencers and effects, doctoral dissertation,
ProQuest Information & Learning, Washington State University, Ann Arbor, MI.
ınar, O. and Karcıoğlu, F. (2015), The relationship between cyber loafing and organizational
citizenship behavior: a survey study in Erzurum/Turkey,Procedia –‑ Social and Behavioral
Sciences, Vol. 207, pp. 444-453, available at: http://doi.org/10.1016/j.sbspro.2015.10.114
*Eastin, M.S., Glynn, C.J. and Griffiths, R.P. (2007), Psychology of communication technology use in
the workplace,CyberPsychology & Behavior, Vol. 10 No. 3, pp. 436-443, available at: https://doi.
org/10.1089/cpb.2006.9935
*Everton, W.J., Mastrangelo, P.M. and Jolton, J.A. (2005), Personality correlates of employeespersonal
use of work computers,CyberPsychology & Behavior, Vol. 8 No. 2, pp. 143-153, available at:
http://doi.org/10.1089/cpb.2005.8.143
*Garrett, R.K. and Danziger, J.N. (2008), Disaffection or expected outcomes: understanding personal
internet use during work,Journal of Computer-Mediated Communication, Vol. 13 No. 4,
pp. 937-958, available at: https://doi.org/10.1111/j.1083-6101.2008.00425.x
562
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
*Gorsuch, J.L. (2014), The effects of control and work/family centrality on the personal use of work
computers, Cleveland State University, Cleveland, OH, available at: http://rave.ohiolink.edu/
etdc/view?acc_num=csu1397838982 (accessed February 10, 2014).
*Jia, H., Jia, R. and Karau, S. (2013), Cyberloafing and personality: the impact of the Big Five traits and
workplace situational factors,Journal of Leadership & Organizational Studies, Vol. 20 No. 3,
pp. 358-365, available at: http://doi.org/10.1177/1548051813488208
*Jian, G. (2013), Understanding the wired workplace: the effects of job characteristics on employees
personal online communication at work,Communication Research Reports, Vol. 30 No. 1,
pp. 22-33, available at: http://doi.org/10.1080/08824096.2012.746221
*Kim, K., Triana, M., Chung, K. and Oh, N. (2015), When do employees cyberloaf? An interactionist
perspective examining personality, justice, and empowerment,Human Resource Management,
Vol. 55 No. 6, pp. 1041-1058, available at: http://doi.org/10.1002/hrm.21699
*König, C.J. and de la Guardia, M.E.C. (2014), Exploring the positive side of personal internet use at
work: does it help in managing the border between work and nonwork?,Computers in Human
Behavior, Vol. 30, pp. 355-360, available at: http://doi.org/10.1016/j.chb.2013.09.021
*Landers, R.N. and Callan, R.C. (2014), Validation of the beneficial and harmful work-related social
media behavioral taxonomies: development of the workrelated social media questionnaire,
Social Science Computer Review, Vol. 32 No. 5, pp. 628-646, available at: http://doi.org/10.1177/0
894439314524891
*Lee, O.K.D., Lim, K.H. and Wong, W.M. (2005), Why employees do non-work-related computing: an
exploratory investigation through multiple theoretical perspectives,Proceedings of the 38th
Annual Hawaii International Conference on System Sciences, p. 185c, available at: https://doi.org/
10.1109/HICSS.2005.698
*Lee, Y., Lee, Z. and Kim, Y. (2007), Understanding personal web usage in organizations,Journal of
Organizational Computing & Electronic Commerce, Vol. 17 No. 1, pp. 75-99, available at: http://
doi.org/10.1080/10919390701291067
*Liberman, B., Seidman, G., McKenna, K.Y.A. and Buffardi, L.E. (2011), Employee job attitudes and
organizational characteristics as predictors of cyberloafing,Computers in Human Behavior,
Vol. 27 No. 6, pp. 2192-2199, available at: http://doi.org/10.1016/j.chb.2011.06.015
*Lim, V.K. and Teo, T.S. (2011), The virtual art of loafing on the job: an empirical
study of cyberloafing, presented at the Pacific Asia Conference on Information Systems,
pp. 1-17.
*Messarra, L.C., Karkoulian, S. and McCarthy, R. (2011), To restrict or not to restrict personal internet
usage on the job,Education, Business and Society: Contemporary Middle Eastern Issues, Vol. 4
No. 4, pp. 253-266, available at: http://doi.org/10.1108/17537981111190042
*Niaei, M., Peidaei, M.M. and Nasiripour, A.A. (2014), The relation between staff cyberloafing and
organizational commitment in organization of environmental protection,Kuwait Chapter of the
Arabian Journal of Business and Management Review, Vol. 3 No. 7, pp. 59-71.
*Polzer-Debruyne, A.M. (2008), Psychological and workplace attributes that influence personal web
use (PWU) , doctoral dissertation, Massey University, Albany, available at: http://mro.massey.
ac.nz/xmlui/handle/10179/772
*Polzer-Debruyne, A.M., Stratton, M.T. and Stark, G. (2014), Personal web use in the workplace:
Why does it persist in a context of strict security and monitoring?,International Journal of
Business Administration, Vol. 5 No. 3, pp. 1-18, available at: http://doi.org/http://dx.doi.org/10.
5430/ijba.v5n3p1
*Rahimnia, F. and Mazidi, A.R.K. (2015), Functions of control mechanisms in mitigating workplace
loafing; evidence from an Islamic society,Computers in Human Behavior, Vol. 48, pp. 671-6681,
available at: http://doi.org/10.1016/j.chb.2015.02.035
*Ramayah, T. (2010), Personal web usage and work inefficiency,Business Strategy Series, Vol. 11
No. 5, pp. 295-301, available at: https://doi.org/10.1108/17515631011080704
563
Meta-analytic
investigation
of cyberloafing
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
*Restubog, S.L.D., Garcia, P.R.J.M., Toledano, L.S., Amarnani, R.K., Tolentino, L.R. and Tang, R.L.
(2011), Yielding to (cyber)-temptation: exploring the buffering role of selfcontrol
in the relationship between organizational justice and cyberloafing behavior in the
workplace,Journal of Research in Personality, Vol. 45 No. 2, pp. 247-251, available at: http://
doi.org/10.1016/j.jrp.2011.01.006
*Salas, S. (2009), A study of the relationship between employee virtuality and technology deviance as
mediated by leadership and employee perceptions, doctoral dissertation, Florida International
University, Miami, FL.
*Tennakoon, K.U.S., da Silveira, G.J.C. and Taras, D.G. (2013), Drivers of contextspecific ICT use across
work and nonwork domains: a boundary theory perspective,Information and Organization,
Vol. 23 No. 2, pp. 107-128, available at: http://doi.org/10.1016/j.infoandorg.2013.03.002
*Thatcher, A., Wretschko, G. and Fisher, J. (2007), Problematic internet use in South African
information technology workers, in Dainoff, M.J. (Ed.), Ergonomics and Health Aspects of Work
with Computers, Springer, Berlin and Heidelberg, pp. 339-348, available at: http://link.springer.
com/chapter/10.1007/978-3-540-73333-1_41
*Venkatraman, S. (2008), The Darthside of technology use: cyberdeviant workplace behaviors,
PhD, University of Arkansas, Fayetteville, AR, available at: http://search.proquest.com/
pqdtglobal/docview/304688488/abstract/CBE2AF175BCB42 BCPQ/1?accountid=10226
*Wyatt, K. and Phillips, J.G. (2005), Internet use and misuse in the workplace,Proceedings of the 17th
Australia Conference on Computer-Human Interaction: Citizens Online: Considerations for
Today and the Future. Computer-Human Interaction Special Interest Group (CHISIG) of
Australia,Narrabundah, pp. 1-4, available at: http://dl.acm.org/citation.cfm?id=1108368.1108437
*Zoghbi-Manrique-de-Lara, P. and Olivares-Mesa, A. (2010), Bringing cyber loafers back on the right
track,Industrial Management & Data Systems, Vol. 110 No. 7, pp. 1038-1053, available at:
http://doi.org/10.1108/02635571011069095
Corresponding author
Brittany K. Mercado can be contacted at: bmercado2@elon.edu
For instructions on how to order reprints of this article, please visit our website:
www.emeraldgrouppublishing.com/licensing/reprints.htm
Or contact us for further details: permissions@emeraldinsight.com
564
CDI
22,5
Downloaded by University of Minnesota Twin Cities At 08:49 16 October 2017 (PT)
... This approach precludes investigations into which of a variety of intercorrelated predictors most merits attention. Compounding this problem, the Mercado et al. (2017) review illustrates that several of the weakest cyberloafing predictors were also the most frequently studied. Evidently, scientists and practitioners seeking to understand and reduce cyberloafing would benefit from more direct guidance identifying its most influential and important predictors. ...
... Due to this conceptual alignment and the strong correlation between CWB and cyberloafing (ρ = .38; Mercado et al., 2017), our investigation was enriched by the robust nomological network of CWB. ...
... Although cyberloafing relates to CWB, evidence suggests that these two constructs exhibit differential patterns of relationships with personological and situational constructs (e.g., Pindek et al., 2018). Most prominently, the Big Five personality dimensions exhibit drastically weaker validities for predicting cyberloafing (ρs ranged from .00 to -.16; Mercado et al., 2017) than for overall CWB (ρs ranged from .02 to -.46; Berry et al., 2007). Conversely, contextual factors, such as organizational and social factors (e.g., Askew et al., 2014;Pee et al., 2008) tend to play comparatively larger roles in predicting cyberloafing than for CWB (Pindek et al., 2018). ...
Article
Full-text available
Cyberloafing occurs when employees use technology to loaf instead of work. Despite mounting organizational concern and psychological research on cyberloafing, research provides little actionable guidance to address cyberloafing. Therefore, the present study builds on previous cyberloafing investigations in three primary ways. First, we utilize a person-situation framework to compare personological and situational construct domains. Second, we extend the cyberloafing nomological network by investigating previously unexamined, yet powerful, predictors. Third, we employ a multivariate approach to identify the most important cyberloafing antecedents. From seven cyberloafing constructs, we found that boredom, logical reasoning, and interpersonal conflict were the most important correlates. Our results highlight novel, important predictors of cyberloafing and allow us to provide empirically-based recommendations for developing cyberloafing interventions.
... However, selfefficacy concerning extreme technology usage still needs to be studied [2]. Furthermore, Mashi & Salimon [49], Mercado et al. [51], and Pindek et al. [60] recommended that individual differences (technology self-efficacy) should be examined concerning cyberloafing. Hence, based on the future directions suggested by the abovementioned studies, the current study will investigate the mediating role of IA between technology self-efficacy (TSE) and cyber-loafing. ...
... Neutralization refers to employees " trying to justify, excuse, or justify their deviant behavior" [46]. Mercado et al. [51] conducted a meta-analysis on cyberloafing and suggested neutralization as a strong determinant of cyberloafing. Although limited studies have reported neutralization in the context of cyberloafing, its effect on other deviant behaviors has been reported previously, such as Miller's [52] examination of the impact of neutralization techniques on intent to violate the security policy. ...
... Our research focuses on TSE and studies its relationship with cyberloafing (a specific form of counterproductive workplace behavior). Even though the concept of TSE has rarely been studied alongside cyberloafing [5,51], selfefficacy (SE) has been extensively studied and explored with respect to counterproductive workplace behavior (CWB). Brender-Ilan & Sheaffer [14] conducted a study to examine the influence of SE on CWB and revealed that employees SE determines their tendency to indulge in potentially serious and risky behaviors. ...
Article
Full-text available
Cyberloafing is common in today's organizational environment, where employees utilize the organization's internet during working hours for personal use. Based on the need to investigate what makes employees engage in such deviant behavior, this study investigates the influence of technology self-efficacy on cyberloafing with consideration for the mediating role of internet addiction and moderating role of three neutralization techniques. Hence, four hypotheses were proposed and statistically tested. Data were collected at three different periods from 334 employees of telecommunication companies in Pakistan. The study's findings revealed that internet addiction mediates the relationship between technology self-efficacy and cyberloafing by utilizing the PROCESS approach for mediation and moderation. Furthermore, denial of responsibility and defense of necessity is positively related to cyberloafing. Lastly, neutralization techniques moderate the relationship between internet addiction and cyberloafing.
... Self-efficacy refers to individuals' beliefs in their capacity to exercise control over challenging demands and their own functioning (Bandura, 1982). Self-efficacy is also included among the variables that have a significant impact on cyberloafing (Lee et al. 2007;Gökçearslan et al. 2016 would not typically wish to reduce their employees' self-efficacy, yet they may wish to diminish their cyberloafing (Mercado et al., 2017). However, from one perspective, surfing the Internet at the workplace may result from high self-efficacy levels (Gökçearslan et al., 2016), and, on the other hand, individuals who are high in self-efficacy may perceive themselves as good regulators and therefore not cyberloaf (Prasad et al., 2010). ...
... However, from one perspective, surfing the Internet at the workplace may result from high self-efficacy levels (Gökçearslan et al., 2016), and, on the other hand, individuals who are high in self-efficacy may perceive themselves as good regulators and therefore not cyberloaf (Prasad et al., 2010). Therefore, this presents an opportunity to deeply explore the mechanism of the cyberloafing phenomenon (Mercado et al., 2017). ...
... First, previous studies (cf. Andreassen et al., 2014;Mercado et al., 2017) have provided significant or less significant results on various factors that influence cyberloafing; however, the issues of work and time organisation, which lead to cyberloafing, have not been sufficiently addressed. This study contributes to the limited but growing body of literature on the effects of workload on cyberloafing (Usman et al., 2014) and to similarly underexplored aspects of self-efficacy and time management relationships with cyberloafing (Sawitri and Mayasari, 2017;Ötken et al., 2020). ...
Article
Full-text available
This study examined the direct and indirect relationships (via job satisfaction) between workload, self-efficacy, time management skills, and cyberloafing. Survey data were collected from 217 employees representing the retail jewellery industry. To analyse the data, structural equation modelling was performed using the AMOS software package. We discovered that job satisfaction mediates the relationship between workload, time-management skills, self-efficacy, and cyberloafing. Moreover, we found no direct effect of workload and self-efficacy on cyberloafing. However, we observed that time management skills are negatively associated with cyberloafing. Thus, the findings of this study suggest that cyberloafing is a counterproductive form of withdrawal behaviour, which is a response to job dissatisfaction associated with high workload, low self-efficacy, and poor time management skills. The research results are discussed within the context of their theoretical and practical impact. The current findings are expected to facilitate further cyberloafing research and highlight the importance of job satisfaction in employees’ cyberloafing.
... For instance, while Piotrowski's (2012) content analysis of emerging literature indicated under-researched areas (i.e., employee attitudes towards non-work related behavior, social media use among young workers and the benefits of training programs), these areas have since been addressed (Andreassen et al., 2014;Zoghbi-Manrique-de-Lara et al., 2019). To our knowledge, Mercado et al.'s (2017) paper is the only meta-analytic study that has been published. Recently, Tandon et al. ...
... Gender. While most studies found that men were more likely to cyberloaf, or report higher levels of intention to do so (Ahmad & Omar, 2017;Andreassen et al., 2014;Betts et al., 2014;Everton et al., 2005;Henle & Blanchard, 2008;Jia et al., 2013;Lim & Chen, 2012;Page, 2015;Mastrangelo et al., 2006;Sheikh et al., 2015;Vitak et al., 2011), others did not find significant differences between genders (Çınar & Karcıoğlu, 2015;Phillips and Reddie, 2007;Mercado et al., 2017;Ugrin et al., 2007). Research on employees' perception of cyberloafing showed that compared to men, women viewed cyberloafing to be more unacceptable (Ahmad & Jamaluddin, 2009). ...
Article
Full-text available
In an increasingly digitized world, the concept of cyberloafing has gained much attention as employees use the Internet for personal purposes during work hours. Over the last two decades, scholars have examined different aspects and types of cyberloafing in a variety of contexts, developed typologies to categorize them, and discussed the antecedents, consequences, and regulation of cyberloafing. Due to the growing interest in this topic, a comprehensive and updated review of existing literature is much needed. In this review, we examine research on cyberloafing at the workplace settings. As well, we developed and presented a research model that integrates existing studies, and propose directions for future research.
... We headed for gender because previous research shows that males might spend more time cyberloafing than females (Garrett & Danziger, 2008). We controlled education because individuals who got more education probably prefer engaging in greater cyberloafing (Mercado et al., 2017). Research showed that people who are married or younger tend to use social media at work, especially married people who are more likely to be interrupted by housework (Kühnel et al., 2017;Saxbe et al., 2011). ...
... It is impossible to eliminate cyberloafing behavior, the best and most effective way for managers is to take specific measures to intervene. Prior research suggests that cyberloafing has threatened nearly all organizations (Lim & Chen, 2012;Mercado et al., 2017), particularly in the world of high-tech organizations, the waste of the high cost of human resources brought significant loss to the organizations. To address this problem, organizations have taken a number of steps, including the installation of Internet monitoring systems and the implementation of Internet usage policies. ...
Article
Full-text available
Cyberloafng ubiquitously exists in organizations and has increasingly gained concerns among scholars and managers. Exploring the correlations among perceived overqualification, learning, performance climate, and cyberloafing is the goal of this current study. Under the conservation of resources theory, we looked into the hypothesis that perceived overqualification might influence the occurrence of cyberloafing, but resorting to learning would counter this effect, thus diminishing cyberloafing. Further, we explored the moderating effect of performance climate. We collected two-wave source data from 404 Chinese employees to test these ideas. Results support the notion that a suppressed mediational model of learning is supported empirically: perceived overqualification fosters employee cyberloafing, but also increases the propensity to learning, which decreases employee cyberloafing. Moreover, the indirect impact of perceived overqualification on cyberloafing thru learning is moderated by performance climate. On account of the results, we end up discussing the potential implications for theoretical research and for organizational management practices.
... 26,32,34 Based on the literary review of studies using the SCT, regarding online behaviors, including cyberslacking, the variables of multitasking self-efficacy and self-regulation are factors with significantly influence online behaviors. 21,29,31,32,[35][36][37] These are related to the individual factor (P) which is the cognition of a person related to his or her confidence in accessing the internet (media multitasking, self-efficacy) and the ability to engage in self-regulation, when accessing the internet. ...
Article
Full-text available
Introduction: University students, as members of the digital generation, often access the internet for non-academic purposes while attending lectures in the classroom. Internet access for non-academic purposes during lectures is known as academic cyberslacking. This study aims to test the effects of media multitasking, self-efficacy, self-regulation, social media engagement, and Attention, Relevance, Confidence, and Satisfaction (ARCS) motivation, on the engagement in academic cyberslacking by university students. Methods: The participants were 1485 university students, who had previously engaged in academic cyberslacking during lectures. The research instruments in this study were an academic cyberslacking scale, a media multitasking self-efficacy scale, a self-regulation scale, a social media engagement scale, and an ARCS motivation scale. The research model and hypotheses are tested using structural equation model (SEM) by Lisrel. Confirmatory factor analysis (CFA) is also used to analyze all the instruments. The respondents' demographic data were analyzed using SPSS. Results: The results showed that it is only media multitasking self-efficacy and social media engagement which have any significant effects regarding academic cyberslacking. Self-regulation and ARCS motivation do not have direct association with academic cyberslacking. Conclusion: Students do academic cyberslacking during lectures. Media multitasking self-efficacy and social media engagement can predict students' academic cyberslacking. It is recommended that students direct their involvement in the digital environment to more constructive efforts during lectures.
Article
The internet is widely used to facilitate internal operations and provide real-time services in the hospitality industry. However, hospitality employees can also use the internet for nonwork purposes during working hours, behavior which is known as cyberloafing. Given that cyberloafing is typically viewed as impeding productivity in the hospitality industry, it is increasingly necessary to predict and manage hospitality employees’ cyberloafing. Can empowering leadership help manage such behavior? Drawing on conservation of resources theory, we expect that empowering leadership may have paradoxical effects on cyberloafing via two competing mechanisms. On the one hand, empowering leadership can increase cyberloafing by increasing role ambiguity; on the other hand, empowering leadership can reduce cyberloafing by increasing organization-based self-esteem (OBSE). Moreover, we expect that these two indirect relationships depend on hospitality employees’ power distance. Based on two-wave data collected from 201 employee-coworker dyads in the hospitality industry, the results of regression analyses provide support for our predictions. Moreover, for employees with lower (versus higher) power distance, empowering leadership is more likely to elicit employee OBSE (versus role ambiguity) and thus reduce (versus increase) their cyberloafing. This study expands our knowledge regarding the antecedents of hospitality employee cyberloafing in the context of empowering leadership and provides new insights for practitioners regarding ways of managing hospitality employee cyberloafing based on the connection between empowering leadership and employee power distance.
Thesis
„Homeoffice jetzt – wo immer es möglich ist“ (Heil, 2021). Diese Forderung stellte Bundesminister für Arbeit und Soziales, Hubertus Heil (SPD), im Rahmen eines Interviews mit dem Norddeutschen Rundfunk. Die Ermöglichung des Home-Office, also des Arbeitens von zuhause aus, soll während der Corona-Pandemie dazu beitragen, dass Kontakte reduziert und Infektionsketten unterbrochen werden. In der Tat ist der Anteil an Arbeitnehmern, die während der aktuellen Zeit ausschließlich oder überwiegend von zuhause arbeiten, recht gering. Während vor der Corona-Pandemie etwa vier Prozent aller Arbeitnehmer im Home-Office ar- beiteten, sind es einer Erhebung der Hans-Böckler-Stiftung (2021) zufolge, deren Ergebnisse Sie in der obigen Abbildung sehen, aktuell circa 20 Prozent. Im europäischen Vergleich ist das nur Mittelmaß. Spitzenreiter ist Belgien mit einer Home-Office-Quote von circa 50 Prozent (Eurofound, 2020).Doch wie sind diese Anteile zu bewerten? Ist eine hohe Home-Office-Quote tatsächlich erstrebenswerter für Arbeitgeber und Arbeitnehmer? Diese Fragestellung soll in diesem Artikel be- antwortet werden. Insbesondere werden die arbeits- und organisationspsychologischen Aspekte der Thematik beleuchtet.
Article
Full-text available
Purpose – The purpose of this paper is to investigate the influence of social media on employees’ work performance, as well as the underlying mechanism for how they create value at work. Design/methodology/approach – Based on media synchronicity and social capital theories, the authors propose that social media can foster employees’ social capital and subsequently facilitate knowledge transfer. Both social capital and knowledge transfer help promote work performance. Specifically, the authors adopt shared vision, network ties and trust to represent, respectively, the cognitive, structural and relational dimensions of social capital. The research model is tested using data collected from 379 Chinese working professionals. Findings – The empirical results reveal that social media can promote the formation of employees’ social capital indicated by network ties, shared vision and trust, which, in turn, can facilitate knowledge transfer. Shared vision and knowledge transfer positively influence work performance. Although network ties and trust do not have a direct impact on work performance, the influence is partially mediated by knowledge transfer. Practical implications – For organizations that wish to build knowledge networks in the workplace, connecting experts with various social media can effectively complement other knowledge management technology. Further, managers should encourage employees to consciously exploit the byproducts created via social media, e.g., social capital, to promote knowledge exchange. Originality/value – The integration of media synchronicity and social capital theories offers a new theoretical lens and reasonable explanations for investigating communication performance. The research offers empirical evidence regarding how the influence of social media on work performance is transmitted through social capital and knowledge transfer. The authors quantify social media’s benefits for organizations, providing managers an impetus to deploy them in the workplace with optimistic expectation.
Article
Full-text available
The purpose of this study is to find out the relationship between cyber loafing and organizational citizenship behavior (OCB). The data for this study was gathered from 360 public workers in the province of Erzurum/Turkey. As a result of the study, we found out that there was no relationship between cyber loafing and organizational citizenship behavior. The level of cyber loafing was found as low and the level of OCB was found as high. We observed that there were statistically significant differences between the levels of cyber loafing and OCB according to the demographic characteristics of workers.
Article
Full-text available
Previous studies on reducing employees' cyberloafing behaviors have primarily examined the external control factors but seldomly taken individual internal subjective factors into consideration. Future orientation, an important individual factor, is defined as the extent to which one plans for future time and considers future consequences of one's current behavior. To explore further whether and how employees' future orientation can dampen their cyberloafing behaviors, two studies were conducted to examine the relationship between employees' future orientation and cyberloafing behaviors. The mediation effect of employees' objective and subjective self-control between them was also examined. In Study 1, a set of questionnaires was completed, and the results revealed that the relationship between employees' future orientation and cyberloafing behaviors was negative, and objective self-control mediated the relationship. Next, we conducted a priming experiment (Study 2) to examine the causal relationship and psychological mechanism between employees' future orientation and cyberloafing behaviors. The results demonstrated that employees' future-orientation dampened their attitudes and intentions to engage in cyberloafing, and subjective self-control mediated this dampening effect. Theoretical and practical implications of these findings are also discussed.
Article
Full-text available
Over the last decade, Personal Web Use (PWU) in the workplace has received considerable attention. This study examined factors that both inhibit and encourage PWU behaviors. The context was a municipal government agency in the U.S. with strong policy and electronic restrictions on PWU. Our study builds on extant research by investigating both self-reported PWU (from an online survey of 116 users at the agency) and objective reports from the agency's electronic monitoring (EM) of PWU. Results of our hypothesis tests indicated that group norms, individual moral norms, and perceived time availability had an effect on PWU while boredom had no effect. Group norms moderated individual moral norms' effect on PWU. Discrepancies between individuals' self-reports and the agency's electronic reports of PWU are explained in terms of differing perceptions of what defines PWU. We describe implications important to both scholars and practitioners.
Article
Cyberloafing in the knowledge-intensive settings has hitherto remained an underexplored research terrain. This is despite that, among others, the implications of cyberloafing in the knowledge-intensive context are more costly to the employers as compared to other less-knowledge-intensive settings. The motivations, moderators and consequences of cyberloafing among knowledge workers appear to have multifarious differences and contextual nuances. One of the significant determinants and increasing vulnerabilities of the knowledge-intensive setting is job burnout. This paper particularly focuses on and studies the inter-relationship of job burnout and cyberloafing. The viewpoints of knowledge-workers at a cross-section of organizational levels have been studied through quantitative surveys. The findings show that both facets of cyberloafing (activities and behaviors) have significant impact on job burnout among knowledge workers. It is also proved that cyberloafing ‘behaviors’ is a stronger predictor of job burnout than cyberloafing ‘activities’.
Article
Cyberloafing is an issue of growing concern for contemporary organizations. This paper develops an integrated research model which combines the Theory of Interpersonal Behavior and Organizational Justice to provide a holistic examination for cyberloafing behavior. Data was collected from working respondents via on-line questionnaire to test the research model. The results of this study found that the metaphor of the ledger from the organizational justice model was a significant predictor of intent to cyberloaf, while the four types of organizational justice were not significant predictors of the metaphor of the ledger. The effects of constructs from the Theory of Interpersonal Behavior performed as expected with the exception of the direct relationship between facilitating conditions and cyberloafing behavior. Overall, the results suggest that combining these two models provides a rich explanation of antecedents to cyberloafing.
Article
The principal objective of this study was to determine why employees conduct NWRC (non-work-related computing) activities, and further to suggest some methods for curbing NWRC. The proposed research model developed herein was tested via a survey of 167 employees in China and Singapore. The results of this study reveal, first, that NWRC intention is significantly predictive of NWRC behavior, NWRC attitudes and subjective norms are significant predictors of behavioral intentions, and that the perceived benefits of NWRC are related positively to NWRC attitudes. Secondly, in comparison with each research model with or without habitual behavior under different levels of control, the results of this study demonstrated that habits occupy a critical position between NWRC intentions and behavior. Finally, employees are more likely to engage in NWRC even when subjected to strict control measures, owing to their habitual behavior. Some measures to reduce NWRC behavior are also proposed based on the findings of this study.
Article
Organizations are increasingly adopting new technologies, such as social media, that afford employees a repertoire of uses not simply focused on work, but also on socialization and entertainment. Knowledge regarding the impact of such diverse technologies on job performance, however, is currently limited. This study adopts a technology use lens to study the effect of three categories of social media use – social, hedonic, and cognitive – on job performance, as mediated by three dimensions of social capital. The research was conducted via a large-scale survey within a multinational Information Technology company. Social and cognitive uses of technology were empirically shown to have a positive, albeit indirect, effect on employees’ routine and innovative job performance. Hedonic use of the technology, while having a direct negative impact on routine performance was shown to positively contribute to the development of social ties, leading to a mitigating positive influence on innovative performance. This interesting positive side of hedonic use, along with all findings from our study, are discussed and used to offer insights to future research and practice.