Correlates of different forms of cyberloafing: The role of norms and external locus of control

被引:214
作者
Blanchard, Anita L. [1 ]
Henle, Christine A. [2 ]
机构
[1] Univ N Carolina, Dept Psychol, Charlotte, NC 28223 USA
[2] Univ N Carolina, Dept Management, Charlotte, NC 28223 USA
关键词
computer mediated communication; internet; organizations; antisocial behavior; social norms;
D O I
10.1016/j.chb.2007.03.008
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Cyberloafing is the personal use of email and the Internet while at work. The purpose of this Study is to identify the different, forms of cyberloafing and their antecedents. We propose that cyberloafing has two primary forms: minor cyberloafing (e.g., sending and receiving personal email at work) and serious cyberloafing (e.g., online gambling, surfing adult oriented web sites). Additionally, we hypothesize that employees' perceptions of coworker and supervisor norms supporting cyberloafing are related to minor cyberloafing but not Serious cyberloafing. We also hypothesize that external locus of control (i.e., a belief that chance and powerful others determines one's outcomes), as art antecedent of other counterproductive work behaviors, will be related to both minor and serious cyberloafing. Two hundred and twenty two employed graduate business students were surveyed. Two forms of cyberloafing were identified: one composed of minor cyberloafing behaviors and one composed of the more serious cyberloafing behaviors. As predicted, employees' perceptions of their coworkers' and supervisor's norms were positively related to minor cyberloafing, but not related to serious cyberloafing. Also as predicted, belief in chance was positively related to both minor and serious cyberloafing. A belief in powerful others was not related to minor or serious cyberloafing. Implications for policy development to regulate cyberloafing in organizations are discussed. (c) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1067 / 1084
页数:18
相关论文
共 48 条
[1]   Theories of reasoned action and planned behavior as models of condom use:: A meta-analysis [J].
Albarracín, D ;
Johnson, BT ;
Fishbein, M ;
Muellerleile, PA .
PSYCHOLOGICAL BULLETIN, 2001, 127 (01) :142-161
[2]  
Anandarajan M., 2004, PERSONAL WEB USAGE W, DOI [10.4018/978-1-59140-148-3, DOI 10.4018/978-1-59140-148-3]
[3]  
*AOM, 2003, EM RUL POL PRACT SUR
[4]  
ASHFORD SJ, 1986, ACAD MANAGE J, V29, P465, DOI 10.5465/256219
[5]  
BECKER TE, 1995, J MANAGE, V21, P617, DOI 10.1177/014920639502100402
[6]   Abuse or learning? [J].
Belanger, F ;
Van Slyke, C .
COMMUNICATIONS OF THE ACM, 2002, 45 (01) :64-65
[7]   Cyberslacking, business ethics and managerial economics [J].
Block, W .
JOURNAL OF BUSINESS ETHICS, 2001, 33 (03) :225-231
[8]   Unintended consequences of emerging communication technologies: Instant Messaging in the workplace [J].
Cameron, AF ;
Webster, J .
COMPUTERS IN HUMAN BEHAVIOR, 2005, 21 (01) :85-103
[9]   Employee Internet management: Current business practices and outcomes [J].
Case, CJ ;
Young, KS .
CYBERPSYCHOLOGY & BEHAVIOR, 2002, 5 (04) :355-361
[10]  
Costello AB., 2005, PRACTICAL ASSESSMENT, V10, P7, DOI [DOI 10.7275/JYJ1-4868, 10.7275/jyj1-4868]