2017
DOI: 10.1007/s10799-017-0280-1
|View full text |Cite
|
Sign up to set email alerts
|

Cyberloafing in the workplace: mitigation tactics and their impact on individuals’ behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(41 citation statements)
references
References 72 publications
0
40
1
Order By: Relevance
“…However, an employee who is involved in cyberloafing for 2 hours per day uses the internet for information (Andel, Kessler, Pindek, Kleinman, & Spector, 2019). This causes the organization to become worried about employee cyberloafing behavior because they neglect their responsibilities for their work by surfing the internet for their personal interests (Khansa, Barkhi, Ray, & Davis, 2017). Recent developments suggest that cyberloafing in the workplace has been recognized as a form of counterproductive behavior that endangers organizations (Pindek, Krajcevska, & Spector, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…However, an employee who is involved in cyberloafing for 2 hours per day uses the internet for information (Andel, Kessler, Pindek, Kleinman, & Spector, 2019). This causes the organization to become worried about employee cyberloafing behavior because they neglect their responsibilities for their work by surfing the internet for their personal interests (Khansa, Barkhi, Ray, & Davis, 2017). Recent developments suggest that cyberloafing in the workplace has been recognized as a form of counterproductive behavior that endangers organizations (Pindek, Krajcevska, & Spector, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…Given the potential concerns and risks related to the Internet usage, organizations often adopt various policies to regulate employees' Internet usage (e.g., Bock et al, 2010;Wong et al, 2005). Internet monitoring is one such policy that has been widely discussed in prior literature and adopted in organizations (Khansa et al, 2017;Khansa et al, 2018). It was reported that 63% of employers monitor employees' Internet connections in the US (Posey et al, 2011).…”
Section: R1-7mentioning
confidence: 99%
“…Note that it is challenging to obtain a full ordering as the number of alternatives increases. According to the small probability event principle, we set a threshold for the approximate probability to simplify the categories used for sorting in the SMAA‐ER method; we use p < .05 (Khansa, Barkhi, Ray, & Davis, ).…”
Section: Numerical Examplementioning
confidence: 99%