Factors Influencing the Cyberslacking Behavior and Internet Abusive Intention in Academic Settings: A Structural Equation Modeling Approach
DOI:
https://doi.org/10.61841/bmyxvw64Keywords:
Cyberslacking, Structural Equation, Internet AbusiveAbstract
In this study, a new research model is proposed to evaluate the abusive intention of cyberslacking behavior among the employees of a company. Cyberslacking can be considered the non-productive behavior where the employees get engaged in personal activities on the internet during office hours, leaving their assigned activities behind. This behavior creates a psychological effect on the employees, and productivity gets diminished as a result. The aims of this study were firstly to find out the factors that influence cyberslacking behavior and secondly to examine whether there exists any relationship between cyberslacking behavior and internet abusive intention. In our model, low self-esteem, private demand, and rules and regulations have a direct impact on cyberslacking behavior, and 4 hypotheses were developed accordingly. Data was collected from 106 academics from two different universities through a survey questionnaire. SPSS v.21 was used to calculate the frequency of the demographic questionnaire, and Smart PLS v.3.0 was employed to test the hypotheses. According to the result, both the self-esteem and private demand had a significant effect, but rules and regulations did not have a significant effect on cyberslacking behavior. Most importantly, our newly proposed model established the relationship between cyber-slacking and abuse intention, and the hypothesis resulted in significance.
Downloads
References
[1] J. Vitak, J. Crouse, and R. Larose, “Personal Internet use at work: Understanding cyberslacking,” Comput. Human Behav., vol. 27, no. 5, pp. 1751–1759, 2011.
[2] N. P. Rana, E. Slade, S. Kitching, and Y. K. Dwivedi, “The IT way of loafing in class: Extending the theory of planned behavior (TPB) to understand students‟ cyberslacking intentions,” Comput. Human Behav., vol.1, no. October 2018, pp. 114–123, 2019.
[3] M. Madden, “The Audience for Online Video-Sharing Sites Shoots Up The share of online adults who watch videos on video-sharin”g 2009.
[4] S.L.D. Restubog, K.L. Scott, and T.J. Zagenczyk, “When Distress Hits Home: The Role of Contextual Factors and Psychological Distress in Predicting Employees‟ Responses to Abusive Supervision, vol. 96, no. 4, pp. 713–729, 2011.
[5] Kian Yeik Koay, Patrick Chin-Hooi Soh, and Kok Wai Chew, “Antecedents and consequences of cyberloafing: Evidence from the Malaysian ICT industry,” First Monday, Volume 22, Number 3, 6 March 2017.
[6] Daniel Bukszpan. “The highest grossing children's movies of all time,” 2011. Retrieved from
https://www.cnbc.com/2011/04/14/The-Highest-Grossing-Childrens-Movies-of-All-Time.html
[7] S.M. Heathfield, "How (and why) to Foster Employee Satisfaction," May 12, 2019. Retrieved from
https://www.thebalancecareers.com/employee-satisfaction-1918014
[8] Stats, October 24, 2017. Retrieved from https://staffmonitoring.com/p32/stats.htm
[9] J.V Chen and C.C. Chen, “An empirical evaluation of key factors contributing to internet abuse in the
workplace,” vol. 108, no. 1, pp. 87–106, 2007.
[10] One-Ki Daniel, Lim, Kai H, Wong Wing Man, “Why employees do non-work-related computing: an
exploratory investigation through multiple theoretical perspectives,” Proceedings of the Annual Hawaii
International Conference on System Sciences, pp. 185c-185c, 2005.
[11] S. Vahdati and N. Yasini, “Computers in Human Behavior Factors affecting internet frauds in private sector : A
case study in Cyberspace Surveillance and Scam Monitoring Agency of Iran,” Comput. Human Behav., vol.
51, pp. 180–187, 2015.
[12] H.M. Hassan, D.M. Reza, and M.A. Farkhad, “An Experimental Study of Influential Elements on Cyberloafing from General Deterrence Theory Perspective Case Study: Tehran Subway Organization,” vol. 8, no. 3, pp. 91–98, 2015.
[13] Rewarch, “Internet addiction - time to be taken seriously?” vol. 8, no. 5, pp. 413–418, 2000.
[14] J. Jonathan, E. Hee, E. Park, and R.L. Baskerville, “Information & Management A model of emotion and computer abuse,” vol. 53, pp. 91–108, 2016.
[15] Mahmud, T. Ramayah, and S. Kurnia, “To use or not to use: Modelling end user grumbling as user resistance in pre-implementation stage of enterprise resource planning system,” Inf. Syst., vol. 69, pp. 164–179, 2017.
[16] T.R. Toma, “Satisfaction and its impact on revisit intention and word of newspaper reading satisfaction and its
impact,” no. September 2018, 2019.
[17] J.F. Hair, J.J. Risher, and C.M. Ringle, “When to use and how to report the results of PLS-SEM,” vol. 31, no. 1, 1,pp. 2–24, 2018.
[18] T.H.E. Algebra, O.F. Factor, and S. Modeling. “Unobservable Variables and Measurement Error: Algebra and Statistics,” vol. XVIII, no. August, pp. 382–388, 1981.
[19] C.M. Ringle and R.R. Sinkovics, “The use of partial least squares path modeling in international vol. 20, no. 2009, pp. 277–319, 2004.
[20] C.J. König, M.E. Caner, and D. Guardia. “Computers in Human Behavior Exploring the positive side of personal internet use at work: Does it help in managing the border between work and nonwork?” vol. 30, pp.355–360, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.