Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Effects of Organizational Controls on Employees' Cyber-loafing: The Moderating Effects of Trait Mindfulness

Published: 24 January 2022 Publication History

Abstract

Cyber-loafing is a workplace deviant behavior that may impose perennial losses and security threats to organizations. Due to the destructive impact, organizations take controls to manage employees' cyber-loafing behavior. While previous research concerning these cyber-loafing controls has yielded inconsistent results, this research further advances this line of research through two primarily adopted organizational controls: computer monitoring and Internet usage policy. We contend that the inconsistent results of the effects of computer monitoring and Internet usage policy on cyber-loafing behavior are due to ignoring the influence of individual differences. Motivated thus, we draw on pertaining literature of trait mindfulness to propose that trait mindfulness moderates the effect of perceived computer monitoring and perceived Internet usage policy on behavioral automaticity towards cyber-loafing, which leads to employees' cyber-loafing behavior. In essence, this paper sheds new light on the relationships amid organizational controls, cyber-loafing behavior, and the moderating effects of trait mindfulness. 450 responses were collected to test these hypotheses. Our results show that trait mindfulness enhances the negative effect of perceived Internet usage policy on behavioral automaticity towards cyber-loafing. In addition, we find out that trait mindfulness has an indirect effect on employees' cyber-loafing behavior by reducing behavioral automaticity.

References

[1]
Andrade, E. B., Kaltcheva, V., & Weita, B. (2002). Self-disclosure on the web: The impact of privacy policy, reward, and company reputation. Advances in Consumer Research, 29(1), 350--353.
[2]
Andreassen, C. S., Torsheim, T., & Pallesen, S. (2014). Predictors of use of social network sites at work - a specific type of cyberloafing. Journal of Computer-Mediated Communication, 19(4), 906--921.
[3]
Askew, K., Buckner, J. E., Taing, M. U., Ilie, A., Bauer, J. A., & Coovert, M. D. (2014). Explaining cyberloafing: The role of the theory of planned behavior. Computers in Human Behavior, 36, 510--519.
[4]
Aurigemma, S., & Mattson, T. (2019). Generally speaking, context matters: Making the case for a change from universal to particular ISP research. Journal of the Association for Information Systems, 20(12), 1700--1742.
[5]
Baer, R. A., Smith, G. T., Hopkins, J., Krietemeyer, J., & Toney, L. (2006). Using self-report assessment methods to explore facets of mindfulness. Assessment, 13(1), 27--45.
[6]
Barnett, J., & Breakwell, G. M. (2001). Risk perception and experience: Hazard personality profiles and individual differences. Risk Analysis, 21(1), 171--178.
[7]
Bishop, S. R., Lau, M., Shapiro, S., Carlson, L., Anderson, N. D., Carmody, J., Segal, Z. V., Abbey, S., Speca, M., Velting, D., & Devins, G. (2004). Mindfulness: A proposed operational definition. Clinical Psychology: Science and Practice, 11(3), 230--241.
[8]
Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing: The role of norms and external locus of control. Computers in Human Behavior, 24(3), 1067--1084.
[9]
Brown, K. W., & Ryan, R. M. (2003). The benefits of being present: mindfulness and its role in psychological well-being. Journal of Personality and Social Psychology, 84(4), 822--848.
[10]
Brown, K. W., Weinstein, N., & Creswell, J. D. (2012). Trait mindfulness modulates neuroendocrine and affective responses to social evaluative threat. Psychoneuroendocrinology, 37(12), 2037--2041.
[11]
Chen, K., Chen, J., Zhan, W., & Sharma, P. (2020). When in Rome! Complaint contagion effect in multi-actor service ecosystems. Journal of Business Research, forthcoming.
[12]
D'Arcy, J., & Hovav, A. (2009). Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89(1), 59--71.
[13]
D'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79--98.
[14]
Feldman, G., Greeson, J., Renna, M., & Robbins-Monteith, K. (2011). Mindfulness predicts less texting while driving among young adults: Examining attention-and emotion-regulation motives as potential mediators. Personality and Individual Differences, 51(7), 856--861.
[15]
Feldman, G., Hayes, A., Kumar, S., Greeson, J., & Laurenceau, J.-P. (2007). Mindfulness and emotion regulation: The development and initial validation of the Cognitive and Affective Mindfulness Scale-Revised (CAMS-R). Journal of Psychopathology and Behavioral Assessment, 29(3), 177--190.
[16]
Fiol, C. M., & O'Connor, E. J. (2003). Waking up! Mindfulness in the face of bandwagons. Academy of Management Review, 28(1), 54--70.
[17]
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39--50.
[18]
Galletta, D. F., and Polak, P. (2003). An empirical investigation of antecedents of internet abuse in the workplace. Paper presented at the Proceedings of the 2nd Annual Workshop on HCI Research in MIS.
[19]
Gardner, B., Abraham, C., Lally, P., & de Bruijn, G.-J. (2012). Towards parsimony in habit measurement: Testing the convergent and predictive validity of an automaticity subscale of the Self-Report Habit Index. International Journal of Behavioral Nutrition and Physical Activity, 9(1), 102--114.
[20]
Garrett, R. K., & Danziger, J. N. (2008). Disaffection or expected outcomes: Understanding personal Internet use during work. Journal of Computer-Mediated Communication, 13(4), 937--958.
[21]
Glassman, J., Prosch, M., & Shao, B. B. (2015). To monitor or not to monitor: Effectiveness of a cyberloafing countermeasure. Information & Management, 52(2), 170--182.
[22]
Glomb, T. M., Duffy, M. K., Bono, J. E., & Yang, T. (2011). Mindfulness at work. In A. Joshi, H. Liao, & J. J. Martocchio (Eds.), Research in Personnel and Human Resources Management (pp. 115--157). Emerald Group Publishing Limited.
[23]
Good, D. J., Lyddy, C. J., Glomb, T. M., Bono, J. E., Brown, K. W., Duffy, M. K., Baer, R. A., Brewer, J. A., & Lazar, S. W. (2016). Contemplating mindfulness at work: An integrative review. Journal of Management, 42(1), 877--880.
[24]
Guan, B., & Hsu, C. (2020). The role of abusive supervision and organizational commitment on employees' information security policy noncompliance intention. Internet Research, forthcoming.
[25]
Hair, J. F., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2016). A primer on partial least squares structural equation modeling (PLS-SEM) (2nd ed.). Sage Publications.
[26]
Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139--152.
[27]
Hassan, H. M., Reza, D. M., & Farkhad, M. A.-A. (2015). An experimental study of influential elements on cyberloafing from general deterrence theory perspective: Case study: Tehran subway organization. International Business Research, 8(3), 91--98.
[28]
Henle, C. A., & Blanchard, A. L. (2008). The interaction of work stressors and organizational sanctions on cyberloafing. Journal of Managerial Issues, 20(3), 383--400.
[29]
Henle, C. A., Kohut, G., & Booth, R. (2009). Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory. Computers in Human Behavior, 25(4), 902--910.
[30]
Hussain, S., & Parida, T. (2017). Exploring cyberloafing behavior in south-central Ethiopia: A close look at Madda Walabu University. Journal of Media and Communication Studies, 9(2), 10--16.
[31]
Jamaluddin, H., Ahmad, Z., Alias, M., & Simun, M. (2015). Personal Internet use: The use of personal mobile devices at the workplace. Procedia-Social and Behavioral Sciences, 172, 495--502.
[32]
Jensen, M. L., Dinger, M., Wright, R. T., & Thatcher, J. B. (2017). Training to mitigate phishing attacks using mindfulness techniques. Journal of Management Information Systems, 34(2), 597--626.
[33]
Jia, H., Jia, R., & Karau, S. (2013). Cyberloafing and personality: The impact of the Big Five traits and workplace situational factors. Journal of Leadership & Organizational Studies, 20(3), 358--365.
[34]
Jimenez, S. S., Niles, B. L., & Park, C. L. (2010). A mindfulness model of affect regulation and depressive symptoms: Positive emotions, mood regulation expectancies, and self-acceptance as regulatory mechanisms. Personality and Individual Differences, 49(6), 645--650.
[35]
Johnson, A. M., & Lederer, A. L. (2010). CEO/CIO mutual understanding, strategic alignment, and the contribution of IS to the organization. Information & Management, 47(3), 138--149.
[36]
Jordan, C. H., Wang, W., Donatoni, L., & Meier, B. P. (2014). Mindful eating: Trait and state mindfulness predict healthier eating behavior. Personality and Individual Differences, 68, 107--111.
[37]
Khansa, L., Kuem, J., Siponen, M., & Kim, S. S. (2017). To cyberloaf or not to cyberloaf: The impact of the announcement of formal organizational controls. Journal of Management Information Systems, 34(1), 141--176.
[38]
Kiken, L. G., Garland, E. L., Bluth, K., Palsson, O. S., & Gaylord, S. A. (2015). From a state to a trait: Trajectories of state mindfulness in meditation during intervention predict changes in trait mindfulness. Personality and Individual Differences, 81, 41--46.
[39]
Kim, K., del Carmen Triana, M., Chung, K., & Oh, N. (2016). When do employees cyberloaf? An interactionist perspective examining personality, justice, and empowerment. Human Resource Management, 55(6), 1041--1058.
[40]
Koay, K. Y., Soh, P. C.-H., & Chew, K. W. (2017). Do employees' private demands lead to cyberloafing? The mediating role of job stress. Management Research Review, 40(9), 1025--1038.
[41]
Kong, D. T. (2016). The pathway to unethical pro-organizational behavior: Organizational identification as a joint function of work passion and trait mindfulness. Personality and Individual Differences, 93, 86--91.
[42]
Leary, M. R., & Tate, E. B. (2007). The multi-faceted nature of mindfulness. Psychological Inquiry, 18(4), 251--255.
[43]
Levinthal, D., & Rerup, C. (2006). Crossing an apparent chasm: Bridging mindful and less-mindful perspectives on organizational learning. Organization Science, 17(4), 502--513.
[44]
Li, H., Luo, X. R., & Chen, Y. (2020). Understanding information security policy violation from a situational action perspective. Journal of the Association for Information Systems, forthcoming.
[45]
Li, H., Sarathy, R., Zhang, J., & Luo, X. (2014). Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance. Information Systems Journal, 24(6), 479--502.
[46]
Li, H., Zhang, J., & Sarathy, R. (2010). Understanding compliance with internet use policy from the perspective of rational choice theory. Decision Support Systems, 48(4), 635--645.
[47]
Liberman, B., Seidman, G., Mckenna, K. Y., & Buffardi, L. E. (2011). Employee job attitudes and organizational characteristics as predictors of cyberloafing. Computers in Human behavior, 27(6), 2192--2199.
[48]
Lim, V. K. (2002). The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675--694.
[49]
Limayem, M., Hirt, S. G., & Cheung, C. M. (2007). How habit limits the predictive power of intention: The case of information systems continuance. MIS Quarterly, 31(4), 705--737.
[50]
Liu, P., Wang, X. T., & Li, A. (2019). Predicting work--family balance: A new perspective on person--environment fit. Frontiers in Psychology, 10, forthcoming.
[51]
Long, E. C., & Christian, M. S. (2015). Mindfulness buffers retaliatory responses to injustice: A regulatory approach. Journal of Applied Psychology, 100(5), 1409--1422.
[52]
Lueke, A., & Gibson, B. (2015). Mindfulness meditation reduces implicit age and race bias: The role of reduced automaticity of responding. Social Psychological and Personality Science, 6(3), 284--291.
[53]
Luo, X. R., Li, H., Hu, Q., & Xu, H. (2020). Why do individual employees commit malicious computer abuses? A routine activity theory approach. Journal of the Association for Information Systems, forthcoming.
[54]
MacKay, J. (2019). The state of work life balance in 2019: What we learned from studying 185 million hours of working time. RescueTime. https://blog.rescuetime.com/work-life-balance-study-2019/
[55]
Mesmer-Magnus, J., Manapragada, A., Viswesvaran, C., & Allen, J. W. (2017). Trait mindfulness at work: A meta-analysis of the personal and professional correlates of trait mindfulness. Human Performance, 30(2--3), 79--98.
[56]
Moody, G. D., & Siponen, M. (2013). Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work. Information & Management, 50(6), 322--335.
[57]
Moore, M. M., & Brown, P. M. (2019). The association of self-regulation, habit, and mindfulness with texting while driving. Accident Analysis & Prevention, 123, 20--28.
[58]
Mrazek, M. D., Smallwood, J., & Schooler, J. W. (2012). Mindfulness and mind-wandering: Finding convergence through opposing constructs. Emotion, 12(3), 442--448.
[59]
Panek, E. T., Bayer, J. B., Dal Cin, S., & Campbell, S. W. (2015). Automaticity, mindfulness, and self-control as predictors of dangerous texting behavior. Mobile Media & Communication, 3(3), 383--400.
[60]
Papies, E. K., Barsalou, L. W., & Custers, R. (2012). Mindful attention prevents mindless impulses. Social Psychological and Personality Science, 3(3), 291--299.
[61]
Pee, L. G., Woon, I. M., & Kankanhalli, A. (2008). Explaining non-work-related computing in the workplace: A comparison of alternative models. Information & Management, 45(2), 120--130.
[62]
Peng, L., Zhang, W., Wang, X., & Liang, S. (2019). Moderating effects of time pressure on the relationship between perceived value and purchase intention in social E-commerce sales promotion: Considering the impact of product involvement. Information & Management, 56(2), 317--328.
[63]
Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879--903.
[64]
Posey, C., Bennett, B., Roberts, T., & Lowry, P. B. (2011). When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse. Journal of Information System Security, 7(1), 24--47.
[65]
Restubog, S. L. D., Garcia, P. R. J. M., Toledano, L. S., Amarnani, R. K., Tolentino, L. R., & Tang, R. L. (2011). Yielding to (cyber)-temptation: Exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace. Journal of Research in Personality, 45(2), 247--251.
[66]
Ruedy, N. E., & Schweitzer, M. E. (2010). In the moment: The effect of mindfulness on ethical decision making. Journal of Business Ethics, 95(1), 73--87.
[67]
Shrout, P. E., & Bolger, N. (2002). Mediation in experimental and nonexperimental studies: New procedures and recommendations. Psychological Methods, 7(4), 422--445.
[68]
Sultana, R., Im, I., & Im, K. S. (2019). Do IT freelancers increase their entrepreneurial behavior and performance by using IT self-efficacy and social capital? Evidence from Bangladesh. Information & Management, 56(6), forthcoming.
[69]
Teo, T. S. H., Srivastava, S. C., Ranganathan, C., & Loo, J. W. K. (2011). A framework for stakeholder oriented mindfulness: case of RFID implementation at YCH Group, Singapore. European Journal of Information Systems, 20(2), 201--220.
[70]
Thatcher, J. B., Wright, R. T., Sun, H., Zagenczyk, T. J., & Klein, R. (2018). Mindfulness in information technology use: definitions, distinctions, and a new measure. MIS Quarterly, 42(3), 831--847.
[71]
Triandis, H. C. (1977). Interpersonal Behavior. Brooks/Cole Publishing Company.
[72]
Ugrin, J. C., & Pearson, J. M. (2013). The effects of sanctions and stigmas on cyberloafing. Computers in Human Behavior, 29(3), 812--820.
[73]
Urbaczewski, A., & Jessup, L. M. (2002). Does electronic monitoring of employee internet usage work? Communications of the ACM, 45(1), 80--83.
[74]
Vance, A., Lowry, P. B., & Eggett, D. (2013). Using accountability to reduce access policy violations in information systems. Journal of Management Information Systems, 29(4), 263--290.
[75]
Vance, A., Lowry, P. B., & Eggett, D. (2015). Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations. MIS Quarterly, 39(2), 345--366.
[76]
Verplanken, B. (2006). Beyond frequency: Habit as mental construct. British Journal of Social Psychology, 45(3), 639--656.
[77]
Vidrine, J. I., Businelle, M. S., Cinciripini, P., Li, Y., Marcus, M. T., Waters, A. J., Reitzel, L. R., & Wetter, D. W. (2009). Associations of mindfulness with nicotine dependence, withdrawal, and agency. Substance Abuse, 30(4), 318--327.
[78]
Wadlinger, H. A., & Isaacowitz, D. M. (2011). Fixing our focus: Training attention to regulate emotion. Personality and Social Psychology Review, 15(1), 75--102.
[79]
Wan, H. C., Downey, L. A., & Stough, C. (2014). Understanding non-work presenteeism: Relationships between emotional intelligence, boredom, procrastination and job stress. Personality and Individual Differences, 65, 86--90.
[80]
Wang, J., Tian, J., & Shen, Z. (2013). The effects and moderators of cyber-loafing controls: An empirical study of Chinese public servants. Information Technology and Management, 14(4), 269--282.
[81]
Wang, X., Peng, L., & Xu, F. (2018). Do incentives in SWOM communication matter? A positive emotion perspective. Journal of Electronic Commerce Research, 19(2), 135--153.
[82]
Weatherbee, T. G. (2010). Counterproductive use of technology at work: Information & communications technologies and cyberdeviancy. Human Resource Management Review, 20(1), 35--44.
[83]
Weissenfeld, K., Abramova, O., & Krasnova, H. (2019). Antecedents for cyberloafing - A literature review. Paper presented at the 14th International Conference on Wirtschaftsinformatik, Siegen, Germany.
[84]
Wood, W., & Neal, D. T. (2016). Healthy through habit: Interventions for initiating & maintaining health behavior change. Behavioral Science & Policy, 2(1), 71--83.
[85]
Zoghbi-Manrique-de-Lara, P., & Olivares-Mesa, A. (2010). Bringing cyber loafers back on the right track. Industrial Management & Data Systems, 110(7), 1038--1053.
[86]
Zweig, D., & Webster, J. (2003). Personality as a moderator of monitoring acceptance. Computers in Human Behavior, 19(4), 479--493.

Cited By

View all
  • (2024)Mindfulness in the business context: a multi-level modelInternational Journal of Organizational Analysis10.1108/IJOA-04-2024-4466Online publication date: 12-Nov-2024
  • (2024)How Organizational Electronic Performance Monitoring Affects Employee Proactive Behaviors: The Psychological Reactance PerspectiveInternational Journal of Human–Computer Interaction10.1080/10447318.2024.2371690(1-15)Online publication date: 2-Jul-2024
  • (2022)Scrutinizing the interactions between college students' cyberloafing levels, reasons of cyberloafing, and academic self-efficacy by path analysisi-manager's Journal of Educational Technology10.26634/jet.19.1.1881719:1(21)Online publication date: 2022
  • Show More Cited By

Index Terms

  1. Effects of Organizational Controls on Employees' Cyber-loafing: The Moderating Effects of Trait Mindfulness

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM SIGMIS Database: the DATABASE for Advances in Information Systems
    ACM SIGMIS Database: the DATABASE for Advances in Information Systems  Volume 53, Issue 1
    February 2022
    127 pages
    ISSN:0095-0033
    EISSN:1532-0936
    DOI:10.1145/3514097
    Issue’s Table of Contents
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 January 2022
    Published in SIGMIS Volume 53, Issue 1

    Check for updates

    Author Tags

    1. behavioral automaticity
    2. cyber-loafing
    3. organizational controls.
    4. trait mindfulness

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)106
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Mindfulness in the business context: a multi-level modelInternational Journal of Organizational Analysis10.1108/IJOA-04-2024-4466Online publication date: 12-Nov-2024
    • (2024)How Organizational Electronic Performance Monitoring Affects Employee Proactive Behaviors: The Psychological Reactance PerspectiveInternational Journal of Human–Computer Interaction10.1080/10447318.2024.2371690(1-15)Online publication date: 2-Jul-2024
    • (2022)Scrutinizing the interactions between college students' cyberloafing levels, reasons of cyberloafing, and academic self-efficacy by path analysisi-manager's Journal of Educational Technology10.26634/jet.19.1.1881719:1(21)Online publication date: 2022
    • (2022)The impact of electronic monitoring on employees' job satisfaction, stress, performance, and counterproductive work behavior: A meta-analysisComputers in Human Behavior Reports10.1016/j.chbr.2022.1002278(100227)Online publication date: Dec-2022
    • (2022)Cyberslacking for Coping Stress? Exploring the Role of Mindfulness as Personal ResourceInternational Journal of Global Business and Competitiveness10.1007/s42943-022-00064-w17:S1(56-67)Online publication date: 5-Sep-2022

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media