“…Some previous research has examined cyberloafing behavior from different theoretical perspectives such as containment theory (Soral et al, 2020), conservation of resource theory and social exchange theory (Lim et al, 2020), the theory of job embeddedness, reactance theory, and conservation of resource theory (Mazidi et al, 2020), social cognitive theory (Zhang et al, 2019), and theory of planned behavior (Askew et al, 2014). However, such studies are still at an emerging stage, suggesting the need for more research to determine cyberloafing behavior through other potential predictors.…”