Article ID Journal Published Year Pages File Type
351216 Computers in Human Behavior 2013 9 Pages PDF
Abstract

Cyberloafing has become a pervasive problem for many organizations and some researchers have suggested that a deterrence approach utilizing acceptable use policies for Internet-based applications coupled with mechanisms designed to monitor employee Internet usage and detect unauthorized usage can be an effective way to reduce it. However, the results of studies that have examined the effects of acceptable use policies and detection mechanisms on reducing cyberloafing are mixed. This study attempts to reconcile those inconsistencies by using an experiment to show that the deterrence model affects various types of cyberloafing differently. The results reveal that individually, threats termination and detection mechanisms are effective deterrents against activities like viewing pornography, managing personal finances, and personal shopping, but must be coupled together and actively enforced to dissuade activities like personal emailing and social networking.

• Viewing pornography, managing finances, and shopping at work were rated abusive. • Emailing and social networking at work were rated non-abusive. • Potential termination and likely detection effectively deterred abusive behaviors. • Potential termination, detection, and enforcement deterred non-abusive behaviors.

Related Topics
Physical Sciences and Engineering Computer Science Computer Science Applications
Authors
, ,