Factors Influencing the Cyberslacking Behavior and Internet Abusive Intention in Academic Settings: A Structural Equation Modeling Approach

Authors

  • Shampa Rani Das Department of Software Engineering, Daffodil International University, Dhaka, Bangladesh Author
  • Mohammad Hassan Seif Associate Professor, Department of Educational Science, Payame Noor University, Tehran, Iran Author
  • Imran Mahmud Department of Information Technology & Management, Daffodil International University, Dhaka, Bangladesh Author
  • Ali Vafaei-Zadeh Graduate School of Business, Universiti Sains Malaysia, Penang, Malaysia Author

DOI:

https://doi.org/10.61841/bmyxvw64

Keywords:

Cyberslacking, Structural Equation, Internet Abusive

Abstract

In this study, a new research model is proposed to evaluate the abusive intention of cyberslacking behavior among the employees of a company. Cyberslacking can be considered the non-productive behavior where the employees get engaged in personal activities on the internet during office hours, leaving their assigned activities behind. This behavior creates a psychological effect on the employees, and productivity gets diminished as a result. The aims of this study were firstly to find out the factors that influence cyberslacking behavior and secondly to examine whether there exists any relationship between cyberslacking behavior and internet abusive intention. In our model, low self-esteem, private demand, and rules and regulations have a direct impact on cyberslacking behavior, and 4 hypotheses were developed accordingly. Data was collected from 106 academics from two different universities through a survey questionnaire. SPSS v.21 was used to calculate the frequency of the demographic questionnaire, and Smart PLS v.3.0 was employed to test the hypotheses. According to the result, both the self-esteem and private demand had a significant effect, but rules and regulations did not have a significant effect on cyberslacking behavior. Most importantly, our newly proposed model established the relationship between cyber-slacking and abuse intention, and the hypothesis resulted in significance. 

Downloads

Download data is not yet available.

References

[1] J. Vitak, J. Crouse, and R. Larose, “Personal Internet use at work: Understanding cyberslacking,” Comput. Human Behav., vol. 27, no. 5, pp. 1751–1759, 2011.

[2] N. P. Rana, E. Slade, S. Kitching, and Y. K. Dwivedi, “The IT way of loafing in class: Extending the theory of planned behavior (TPB) to understand students‟ cyberslacking intentions,” Comput. Human Behav., vol.1, no. October 2018, pp. 114–123, 2019.

[3] M. Madden, “The Audience for Online Video-Sharing Sites Shoots Up The share of online adults who watch videos on video-sharin”g 2009.

[4] S.L.D. Restubog, K.L. Scott, and T.J. Zagenczyk, “When Distress Hits Home: The Role of Contextual Factors and Psychological Distress in Predicting Employees‟ Responses to Abusive Supervision, vol. 96, no. 4, pp. 713–729, 2011.

[5] Kian Yeik Koay, Patrick Chin-Hooi Soh, and Kok Wai Chew, “Antecedents and consequences of cyberloafing: Evidence from the Malaysian ICT industry,” First Monday, Volume 22, Number 3, 6 March 2017.

[6] Daniel Bukszpan. “The highest grossing children's movies of all time,” 2011. Retrieved from

https://www.cnbc.com/2011/04/14/The-Highest-Grossing-Childrens-Movies-of-All-Time.html

[7] S.M. Heathfield, "How (and why) to Foster Employee Satisfaction," May 12, 2019. Retrieved from

https://www.thebalancecareers.com/employee-satisfaction-1918014

[8] Stats, October 24, 2017. Retrieved from https://staffmonitoring.com/p32/stats.htm

[9] J.V Chen and C.C. Chen, “An empirical evaluation of key factors contributing to internet abuse in the

workplace,” vol. 108, no. 1, pp. 87–106, 2007.

[10] One-Ki Daniel, Lim, Kai H, Wong Wing Man, “Why employees do non-work-related computing: an

exploratory investigation through multiple theoretical perspectives,” Proceedings of the Annual Hawaii

International Conference on System Sciences, pp. 185c-185c, 2005.

[11] S. Vahdati and N. Yasini, “Computers in Human Behavior Factors affecting internet frauds in private sector : A

case study in Cyberspace Surveillance and Scam Monitoring Agency of Iran,” Comput. Human Behav., vol.

51, pp. 180–187, 2015.

[12] H.M. Hassan, D.M. Reza, and M.A. Farkhad, “An Experimental Study of Influential Elements on Cyberloafing from General Deterrence Theory Perspective Case Study: Tehran Subway Organization,” vol. 8, no. 3, pp. 91–98, 2015.

[13] Rewarch, “Internet addiction - time to be taken seriously?” vol. 8, no. 5, pp. 413–418, 2000.

[14] J. Jonathan, E. Hee, E. Park, and R.L. Baskerville, “Information & Management A model of emotion and computer abuse,” vol. 53, pp. 91–108, 2016.

[15] Mahmud, T. Ramayah, and S. Kurnia, “To use or not to use: Modelling end user grumbling as user resistance in pre-implementation stage of enterprise resource planning system,” Inf. Syst., vol. 69, pp. 164–179, 2017.

[16] T.R. Toma, “Satisfaction and its impact on revisit intention and word of newspaper reading satisfaction and its

impact,” no. September 2018, 2019.

[17] J.F. Hair, J.J. Risher, and C.M. Ringle, “When to use and how to report the results of PLS-SEM,” vol. 31, no. 1, 1,pp. 2–24, 2018.

[18] T.H.E. Algebra, O.F. Factor, and S. Modeling. “Unobservable Variables and Measurement Error: Algebra and Statistics,” vol. XVIII, no. August, pp. 382–388, 1981.

[19] C.M. Ringle and R.R. Sinkovics, “The use of partial least squares path modeling in international vol. 20, no. 2009, pp. 277–319, 2004.

[20] C.J. König, M.E. Caner, and D. Guardia. “Computers in Human Behavior Exploring the positive side of personal internet use at work: Does it help in managing the border between work and nonwork?” vol. 30, pp.355–360, 2014.

Downloads

Published

31.07.2020

How to Cite

Rani Das, S., Hassan Seif, M., Mahmud, I., & Vafaei-Zadeh, A. (2020). Factors Influencing the Cyberslacking Behavior and Internet Abusive Intention in Academic Settings: A Structural Equation Modeling Approach. International Journal of Psychosocial Rehabilitation, 24(5), 7311-7318. https://doi.org/10.61841/bmyxvw64