Access the full text.
Sign up today, get DeepDyve free for 14 days.
Audra Hovorka‐Mead, Wiluam Ross, Tracy Whipple, Michella Renchin (2002)
WATCHING THE DETECTIVES: SEASONAL STUDENT EMPLOYEE REACTIONS TO ELECTRONIC MONITORING WITH AND WITHOUT ADVANCE NOTIFICATIONPersonnel Psychology, 55
Dinesh Mirchandani (2004)
A Deterrence Theory Perspective on Personal Web Usage
Jacob Cohen, P. Cohen, S. West, L. Aiken (1979)
Applied multiple regression/correlation analysis for the behavioral sciences
L. Atwater, Shelley Dionne, J. Camobreco, B. Avolio, A. Lau (1998)
Individual attributes and leadership style: predicting the use of punishment and its effectsJournal of Organizational Behavior, 19
D. Straub, William Nance (1990)
Discovering and Disciplining Computer Abuse in Organizations: A Field StudyMIS Q., 14
D. Straub, R. Welke (1998)
Coping With Systems Risk: Security Planning Models for Management Decision MakingMIS Q., 22
N. Flynn
2005 Electronic Monitoring & Surveillance Survey
Qinyu Liao, A. Gurung, X. Luo, Long Li (2009)
Workplace Management and Employee Misuse: Does Punishment Matter?Journal of Computer Information Systems, 50
Hsiu-Fen Lin (2009)
Examination of cognitive absorption influencing the intention to use a virtual communityBehaviour & Information Technology, 28
(1981)
Politics as Leadership, University of Missouri Press, Columbia, MO
B. Kleck, H. Ono, A.H. Hastorf
The effects of physical space upon face‐to‐face interaction
R. Decharms, R. Hamblin (1959)
STRUCTURAL FACTORS AND INDIVIDUAL NEEDS IN GROUP BEHAVIOR
D. Cherrington, H. Reitz, W. Scott (1971)
EFFECTS OF CONTINGENT AND NONCONTINGENT REWARD ON THE RELATIONSHIP BETWEEN SATISFACTION AND TASK PERFORMANCEJournal of Applied Psychology, 55
R. White, R. Lippitt
Leader behavior and member reaction in three social climates
Jintae Lee, Younghwa Lee (2002)
A holistic model of computer abuse within organizationsInf. Manag. Comput. Secur., 10
Roland Kidwell, N. Bennett (1994)
Employee Reactions to Electronic Control SystemsGroup & Organization Management, 19
(2000)
The impact of quality training on stress, anxiety and fear in the workplace
J. George (1992)
Extrinsic and Intrinsic Origins of Perceived Social Loafing in OrganizationsAcademy of Management Journal, 35
T. Hemmingsson, I. Lundberg (1998)
Work control, work demands, and work social support in relation to alcoholism among young men.Alcoholism, clinical and experimental research, 22 4
A. Kankanhalli, H. Teo, B. Tan, K. Wei (2003)
An integrative study of information systems security effectivenessInt. J. Inf. Manag., 23
C. O'Reilly, Jennifer Chatman (1986)
Organizational commitment and psychological attachment: The effects of compliance, identification, and internalization on prosocial behavior.Journal of Applied Psychology, 71
J. Mills, Bo Hu, Srikanth Beldona, J. Clay (2001)
Cyberslacking!: A Liability Issue for Wired WorkplacesCornell Hotel and Restaurant Administration Quarterly, 42
Gareth Jones (1984)
Task Visibility, Free Riding, and Shirking: Explaining the Effect of Structure and Technology on Employee BehaviorAcademy of Management Review, 9
Karl Aquino, Bella Galperin, R. Bennett (2004)
Social Status and Aggressiveness as Moderators of the Relationship Between Interactional Justice and Workplace DevianceJournal of Applied Social Psychology, 34
(2006)
Understanding dysfunctional cyberbehavior: the role of organizational justice
C.A. O'Reilly, J.A. Chatman
Organizational commitment and psychological attachment
J. Gaskin (2003)
Internet Acceptable Usage Policies
S. Murphy, Sandy Wayne, R. Liden, B. Erdogan (2003)
Understanding Social Loafing: The Role of Justice Perceptions and Exchange RelationshipsHuman Relations, 56
A. Tenbrunsel, D. Messick (1999)
Sanctioning Systems, Decision Frames, and CooperationAdministrative Science Quarterly, 44
W. Ronan, G. Latham, S. Kinne (1973)
Effects of goal setting and supervision on worker behavior in an industrial situation.Journal of Applied Psychology, 58
Dinesh Mirchandani, J. Motwani (2003)
Reducing Internet Abuse in the WorkplaceSAM Advanced Management Journal, 68
G. Alder, Marshall Schminke, Terry Noel, Maribeth Kuenzi (2008)
Employee Reactions to Internet Monitoring: The Moderating Role of Ethical OrientationJournal of Business Ethics, 80
S. Milgram (1975)
Obedience to Authority: An Experimental View
J.A.A. Levoie, T.A. Pychyl
Cyberslacking and the procrastination superhighway: a web‐based survey of online procrastination, attitudes, and emotion
D. Greenfield, Richard Davis (2002)
Lost in Cyberspace: The Web @ WorkCyberpsychology & behavior : the impact of the Internet, multimedia and virtual reality on behavior and society, 5 4
Paul Spector (1986)
Perceived Control by Employees: A Meta-Analysis of Studies Concerning Autonomy and Participation at WorkHuman Relations, 39
B. Bass (1990)
Bass & Stogdill's handbook of leadership: Theory, research, and managerial applications, 3rd ed.
J. Gaskin (1998)
Internet Acceptable Usage Policies: Writing and ImplementationInf. Syst. Manag., 15
H. Kelman (1958)
Compliance, identification, and internalization three processes of attitude changeJournal of Conflict Resolution, 2
Jane Howell (1988)
Two faces of charisma: Socialized and personalized leadership in organizations.
Wanda Trahan, D. Steiner (1994)
Factors affecting supervisors' use of disciplinary actions following poor performanceJournal of Organizational Behavior, 15
H. Kelman (1990)
Crimes of Obedience
P. Lara (2006)
Fear in organizations: Does intimidation by formal punishment mediate the relationship between interactional justice and workplace internet deviance?Journal of Managerial Psychology, 21
S. Youngblood, L. Treviño, Monica Favia (1992)
Reactions to unjust dismissal and third-party dispute resolution: A justice frameworkEmployee Responsibilities and Rights Journal, 5
P. Lara, Domingo Tacoronte, Jyh-Ming Ding (2006)
Do current anti-cyberloafing disciplinary practices have a replica in research findings?: A study of the effects of coercive strategies on workplace Internet misuseInternet Res., 16
T. Tyler, S. Blader (2005)
Can Businesses Effectively Regulate Employee Conduct? The Antecedents of Rule Following in Work SettingsAcademy of Management Journal, 48
G. Ball, L. Treviño, H. Sims (1994)
Just and Unjust Punishment: Influences on Subordinate Performance and CitizenshipAcademy of Management Journal, 37
R. Kleck, H. Ono, A. Hastorf (1966)
The Efects of Physical Deviance upon Face-to-Face InteractionHuman Relations, 19
Christine Henle, Gary Kohut, R. Booth (2009)
Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theoryComput. Hum. Behav., 25
Donald Conlon, C. Meyer, Jaclyn Nowakowski (2005)
How does organizational justice affect performance, withdrawal, and counterproductive behavior?
P. Mahatanankoon
Internet abuse in the workplace: extension of workplace deviance model
B. Liberman, Gwendolyn Seidman, Katelyn McKenna, Laura Buffardi (2011)
Employee job attitudes and organizational characteristics as predictors of cyberloafingComput. Hum. Behav., 27
Peter Monge, Kenneth Kirste (1980)
Measuring Proximity in Human OrganizationSocial Psychology Quarterly, 43
V. Lim, Don Chen (2012)
Cyberloafing at the workplace: gain or drain on work?Behaviour & Information Technology, 31
Likoebe Maruping, Ritu Agarwal (2004)
Managing team interpersonal processes through technology: a task-technology fit perspective.The Journal of applied psychology, 89 6
(2005)
Wasted time at work costing companies billions
(1968)
Leader behavior and member reaction in three social climates”, Group Dynamics: Research and Theory
A. Friedman (1977)
Responsible Autonomy Versus Direct Control Over the Labour ProcessCapital & Class, 1
H.C. Kelman
Compliance, identification, and internalisation
Peter Monge, Lynda Rothman, E. Eisenberg, K. Miller, Kenneth Kirste (1985)
The Dynamics of Organizational ProximityManagement Science, 31
L. Toothaker (1994)
Multiple Regression: Testing and Interpreting InteractionsJournal of the Operational Research Society, 45
R. Cialdini (1984)
Influence: Science and Practice
R.E. Kidwell, N. Bennett
Employee reactions to electronic control systems: the role of procedural fairness
V. Lim (2002)
The IT way of loafing on the job: cyberloafing, neutralizing and organizational justiceJournal of Organizational Behavior, 23
(2006)
The Empirical Status of Deterrence Theory, Transaction
M. McCall (1982)
Stogdill's Handbook of LeadershipAcademy of Management Review, 7
Jennifer Lavoie, T. Pychyl (2001)
Cyberslacking and the Procrastination SuperhighwaySocial Science Computer Review, 19
N. Pors (2001)
Misbehaviour in the public library: Internet use, filters and difficult peopleNew Library World, 102
C. Schrag (1954)
Leadership Among Prison InmatesAmerican Sociological Review, 19
D. Galletta, P. Polak (2003)
An Empirical Investigation of Antecedents of Internet Abuse in the Workplace
R.C. Tucker
Politics as Leadership
Lam-for Kwok, D. Longley (1999)
Information security management and modellingInf. Manag. Comput. Secur., 7
Margaret Blair, Lynn Stout (2001)
Trust, Trustworthiness, and the Behavioral Foundations of Corporate LawUniversity of Pennsylvania Law Review, 149
J. Sipior, Burke Ward (2002)
A Strategic Response to the Broad Spectrum of Internet AbuseInformation Systems Management, 19
T.C. Pratt, F.T. Cullen, K.R. Blevins, L.E. Daigle, T.D. Madensen
The Empirical Status of Deterrence Theory
J. Stanton (2000)
Traditional and Electronic Monitoring from an Organizational Justice PerspectiveJournal of Business and Psychology, 15
K. Young, Carl Case (2004)
Internet Abuse in the Workplace: New Trends in Risk ManagementCyberpsychology & behavior : the impact of the Internet, multimedia and virtual reality on behavior and society, 7 1
Sang Lee, Sang-Gun Lee, Sangjin Yoo (2004)
An integrative model of computer abuse based on social control and general deterrence theoriesInf. Manag., 41
Anita Blanchard, Christine Henle (2008)
Correlates of different forms of cyberloafing: The role of norms and external locus of controlComput. Hum. Behav., 24
Kelly Zellars, B. Tepper, M. Duffy (2002)
Abusive supervision and subordinates' organizational citizenship behavior.The Journal of applied psychology, 87 6
K. Hsaio, D. Kerr, S. Madnick
Computer Security
Purpose – Despite the use in companies of policy and control mechanisms to tackle cyberloafing, these practices are still popular among employees. The purpose of this paper is to suggest that control systems alone are unable to deter cyberloafing because they are eventually perceived as a sort of “ineffectual dog that may bark a lot, but ultimately does not bite.” Instead, control systems are only expected to deter cyberloafing if employees view them as leading to punitive consequences. Design/methodology/approach – First, given the easy visibility of cyberloafing activities, the paper proposes a design for control systems that not only includes perceptions of organizational control (monitoring), but also perceptions of the supervisor's physical proximity (proximity). Data are collected from university administration and services personnel, whose main working tool is the computer. They all have internet access and individual e‐mail, a stable physical location at work, and a supervisor. Multiple hierarchical regressions are used to test whether in reality proximity and monitoring are unable to decrease cyberloafing unless they interact together with employees' fear of formal punishment (punishment). Findings – Only by interacting together and with punishment are proximity and monitoring able to deter cyber loafers from engaging in cyberloafing. Research limitations/implications – The study could suffer from mono‐method/source bias, and the university that supplied the sample has certain job conditions similar to those of the public sector, thus raising concerns about the generalizability of the results. Practical implications – The results suggest that organizational managers should not only ensure that control systems are able to discover incidents and identify the perpetrators, but they should also follow them up with punitive consequences. Only if control systems are implemented together with punishment are they effective in eliciting perceived certainty among cyber loafers of being caught and sanctioned, and hence in “bringing them back on the right track.” Originality/value – Despite the extensive use of control systems to deter cyberloafing, there are no previous empirical studies that have examined and supported the negative interacting effects of proximity, monitoring, and punishment on cyberloafing.
Industrial Management & Data Systems – Emerald Publishing
Published: Aug 24, 2010
Keywords: Employee behaviour; Human resource management; Internet; Organizational culture; System monitoring; Punishment
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.