Elsevier

Computers in Human Behavior

Volume 50, September 2015, Pages 358-366
Computers in Human Behavior

An investigation of the impact of demographics on cyberloafing from an educational setting angle

https://doi.org/10.1016/j.chb.2015.03.081Get rights and content

Highlights

  • Male students cyberloaf more than female students.

  • Nine-year of the Internet experience is a threshold for more cyberloafing.

  • Every day Internet usage causes more cyberloafing.

  • Advanced and expert internet skills result in more cyberloafing.

  • The dominance of males in cyberloafing diminishes in socialization.

Abstract

In the current study, the impact of demographics on cyberloafing behaviors are investigated in educational settings. Correlational study method was utilized. There are 282 high schools students in the study. Two instruments, demographic information and cyberloafing questionnaires, are used to collect data. Demographic information are gender, grade, Internet skills, Internet usage and Internet experience. Cyberloafing behaviors are personal business, news follow-up and socialization. Findings indicate that males cyberloaf more than females. Advanced-expert users cyberloaf more than novice-intermediate users. Those who uses internet everyday cyberloaf more than other people using internet less often. Nine years more experience in internet experience increase cyberloafing behaviors. The relationships between demographics and different types of cyberloafing are also analyzed for deep understanding. The dominance of male cyberloafing diminishes in socialization behaviors. Internet skills is only associated with socialization. The results are discussed, and recommendation for further studies are presented.

Introduction

In order to fully exploit of human capital, knowledge and learning, use of Information and Communication Technologies have become critical in Knowledge Economy (Lytras & de Pablos, 2011). Today, one cannot think of a workplace without computers and the Internet. Despite the benefits provided by the Internet, its misuse has become extensive (Liberman, Seidman, McKenna, & Buffardi, 2011). According to Henle, Kohut, and Booth (2009), technology has created a revolution that hangs over the workplace like a double-edged sword. It is impossible to ignore the ‘dark side’ of Internet usage at work: While employees may spend great amounts of time using computers with Internet connections for work-related tasks, they may sometimes use this technology for non-work-related tasks during working hours, and, according to Blanchard and Henle (2008), the amount of time employees spend on Internet-based non-work-related tasks has increased in recent years. Popular non-work-related Internet-based activities include online shopping; blogging; gaming; instant messaging; gambling; booking vacations; viewing pornography; job hunting; checking, sending, and receiving private emails; personal investing; participating in auctions, visiting sports, news and entertainment sites; and general ‘surfing the net’ (Lim, 2002, Vitak et al., 2011, O’Neill et al., 2014).

In general, the literature uses the term ‘cyberloafing’ to describe a set of behaviors in which an employee engages in electronically-mediated activities that his or her immediate supervisor would not consider job-related (Askew, Coovert, Vandello, Taing, & Bauer, 2011). Research that views cyberloafing as negative behavior refers to “the personal use of email and the Internet while at work,” often times under the guise of doing actual work (Blanchard & Henle, 2008); “voluntary acts of employees using their companies’ Internet access for non-work-related purposes during working hours”; and “a counterproductive work-place behavior resulting in production deviance” (Lim, 2002). ‘Cyberslacking’, another widely used term, is similarly described as an extension of typical counterproductive workplace behavior that involves distraction and putting off work to ‘surf the Internet’ for non-work purposes (O’Neill, Hambley, & Chatelier, 2014). Lesser-used terms used to refer to the same phenomenon include ‘cyberbludging’, ‘online loafing’, ‘internet deviance’, ‘problematic internet use’, ‘internet addiction’, ‘internet dependency’, ‘internet abuse’ and ‘internet addiction disorder’ (Kim & Byrne, 2011).

Lim and Chen (2012) conceptualized cyberloafing as a form of workplace cyber activity that detracts employees from their work, prevents them from completing tasks and sometimes results in financial losses due to reduced worker productivity. Oswalt, Elliott-Howard, and Austin (2003) goes further to suggest that cyberloafing threatens network security, strains organizational bandwidth and can leave employers vulnerable to lawsuits on a variety of issues, ranging from securities fraud to sexual harassment.

While indicating that the temptation to use the Internet for personal reasons distracts employees from their work, Kim and Byrne (2011) described cyberloafing as unproblematic but aimless, slacking behavior caused by a lack of self-control. On the other hand, cyberloafing has also been described as a positive workplace behavior, with studies referring to cyberloafing as a stress-reducer that adds variety to daily routines (Lim & Chen, 2009) and as a necessary form of periodic break that allows employees to recharge their energy level and increase their work performance (Lim and Chen, 2012, Sonnentag, 2003). A study by Coker (2013) found that Workplace Internet Leisure Browsing replenishes employees’ attention more than less enjoyable types of breaks in the experiment. As part of the same study, a nation-wide survey on Workplace Internet Leisure Browsing found an association between Workplace Internet Leisure Browsing and perceived productivity among individuals under 30 years of age. Furthermore, König and De La Guardia (2014) stated that since employees are expected to check their work e-mails at home, they may reciprocate this by answering personal e-mails at work. Thus, there is a blurred-border between work and non-work internet behaviors.

Lim and Chen (2012) found the effects of cyberloafing to vary between men and women, with men reporting a more positive impact than women. The authors also distinguished between two different types of cyberloafing behavior – emailing and browsing – and found that while emailing had a negative impact on employee emotions, browsing had a positive impact. Another study by Blanchard and Henle (2008) also made distinctions between different forms of cyberloafing: minor, e.g. sending and receiving personal e-mails at work, and serious, e.g. online gambling and surfing adult-oriented sites.

It should also be noted that most studies examining cyberloafing have focused on traditional Internet-based activities, rarely on more recent Web 2.0 activities such as watching online videos, blogging, or using social network sites (Vitak et al., 2011).

Section snippets

Who Cyberloafs? Differences in cyberloafing

At present, not much is known about factors that influence attitudes toward and actual use of the Internet for personal purposes while at work. The literature does indicate that employees are more likely to cyberloaf if the behavior is understood and accepted as a cultural norm of the organization (D’Abate, 2005); if they want to reduce their stress (Lim & Chen, 2009); and because it is restorative and associated with greater happiness at work (Stanton, 2002). At the same time, employees

Cyberloafing at school

Development of school characteristics and building unique school culture for the use of ICT policies as one part of school innovation management is required to prevent misuse while being a part of competitive knowledge economy (Zhao & Ordóñez de Pablos, 2009). Because cyberloafing is considered to occur mainly in office environments (Pee, Woon, & Kankanhalli, 2008), research into the subject is conducted mainly in workplace settings. However, with the expansion of computers and Internet access

Procedures

This study was designed as a correlational study (Creswell, 2012), which allowed the researchers to evaluate the relationships and impacts among independent and dependent variables.

Purpose of the study

This study aimed to observe the nature of cyberloafing behaviors as they occur in educational settings; to examine the extent to which cyberloafing behaviors are affected by previously identified demographic characteristics; and to analyze the cause-effect relationships between demographics and different types of

Types of cyberloafing in educational settings

The higher the score on the cyberloafing questionnaire, the more types of reported cyberloafing behaviors were engaged in by participants. Overall, participants reported engaging in more than 40% of the cyberloafing behaviors listed on the questionnaire, including 33.6% of personal business, 45.2% of news follow-up, and 46.9% of socialization behaviors. Descriptive statistics related to cyberloafing are presented in Table 2.

Demographic variables affecting cyberloafing in educational settings

A multiple regression model with a stepwise method was used to test the

Discussion

The study findings are discussed below according to the specific research questions.

Conclusion and recommendations for further studies

Most studies on cyberloafing are conducted in work settings, where cyberloafing is an inherently controversial issue. In contrast, the present study examined cyberloafing in an educational setting, focusing on different types of demographic characteristics and different types of cyberloafing. The study attempted to analyze the extent to which literature-driven demographics affected different types of cyberloafing in order to gain greater insight into cyberloafing behaviors and their

References (79)

  • D. Mueller

    Digital underlife in the networked writing classroom

    Computers and Composition

    (2009)
  • T.A. O’Neill et al.

    Prediction of cyberslacking when employees are working away from the office

    Computers in Human Behavior

    (2014)
  • T.A. O’Neill et al.

    Cyberslacking, engagement, and personality in distributed work environments

    Computers in Human Behavior

    (2014)
  • L.G. Pee et al.

    Explaining non-work-related computing in the workplace: A comparison of alternative models

    Information and Management

    (2008)
  • U. Pfeil et al.

    Age differences in online social networking – A study of user profiles and the social capital divide among teenagers and older users in MySpace

    Computers in Human Behavior

    (2009)
  • C. Roda et al.

    Attention aware systems: Theories, applications, and research agenda

    Computers in Human Behavior

    (2006)
  • P. Schumacher et al.

    Gender, Internet and computer attitudes and experiences

    Computers in Human Behavior

    (2001)
  • J.H. Steiger

    Understanding the limitations of global fit assessment in structural equation modeling

    Personality and Individual Differences

    (2007)
  • J.G. Trafton et al.

    Preparing to resume an interrupted task: Effects of prospective goal encoding and retrospective rehearsal

    International Journal of Human Computer Studies

    (2003)
  • J.C. Ugrin et al.

    The effects of sanctions and stigmas on cyberloafing

    Computers in Human Behavior

    (2013)
  • J. Vitak et al.

    Personal Internet use at work: Understanding cyberslacking

    Computers in Human Behavior

    (2011)
  • A. Acar

    Antecedents and consequences of online social networking behavior: The case of Facebook

    Journal of Website Promotion

    (2008)
  • M. Anandarajan et al.

    An exploratory investigation of the antecedents and impact of internet usage: An individual perspective

    Behaviour & Information Technology

    (2000)
  • C.S. Andreassen et al.

    Predictors of use of social network sites at work – A specific type of cyberloafing

    Journal of Computer-Mediated Communication

    (2014)
  • Askew, K., Coovert, M. D., Vandello, J. A., Taing, M. U., & Bauer, J. A. (2011). Work environment factors predict...
  • M. Barak et al.

    Wireless laptops as means for promoting active learning in large lecture halls

    Journal of Research on Technology in Education

    (2006)
  • A. Broos

    Gender and information and communication technologies (ICT) anxiety: Male self-assurance and female hesitation

    CyberPsychology & Behavior

    (2005)
  • Brubaker, A. T. (2006). Faculty perceptions of the impact of student laptop use in a wireless internet environment on...
  • B.M. Byrne

    Structural equation modeling with LISREL, PRELIS and SIMPLIS: Basic concepts, applications and programming

    (1998)
  • M.M. Chun et al.

    Visual attention

  • B.L.S. Coker

    Workplace Internet leisure browsing

    Human Performance

    (2013)
  • J.W. Creswell

    Educational research: Planning, conducting, and evaluating quantitative and qualitative research

    (2012)
  • C.P. D’Abate

    Working hard or hardly working: A study of individuals engaging in personal business on the job

    Human Relations

    (2005)
  • A. Diamantopoulos et al.

    Introducing LISREL

    (2000)
  • E. Ergün et al.

    Öğrenci Gözüyle Siber Aylaklık ve Nedenleri [The Student’s Perspective of Cyberloafing and Its Causes]

    Eğitim Teknolojisi: Kuram ve Uygulama

    (2012)
  • K.A. Ericsson

    Deliberate practice and acquisition of expert performance: A general overview

    Academic Emergency Medicine

    (2008)
  • K.A. Ericsson et al.

    Expert performance: Its structure and acquisition

    American Psychologist

    (1994)
  • K.A. Ericsson

    An introduction to Cambridge handbook of expertise and expert performance: its development, organization, and content

  • K.A. Ericsson et al.

    The role of deliberate practice in the acquisition of expert performance

    Psychological Review

    (1993)
  • 1

    Tel.: +90 312 470 46 16; fax: +90 312 470 00 07.

    2

    Both authors equally contributed to this work.

    View full text