An Investigation of Cyberloafing in a Large-Scale Technology Organization From the Perspective of the Theory of Interpersonal Behavior

Kemal Elciyar 1, Ali Simsek 1 *
More Detail
1 Anadolu University, TURKEY
* Corresponding Author
Online Journal of Communication and Media Technologies, Volume 11, Issue 2, Article No: e202106.
OPEN ACCESS   2536 Views   2044 Downloads   Published online: 03 Apr 2021
Download Full Text (PDF)


Employees in many organizations often spend time with information and communication technologies and engage in personal business instead of spending their time fully on work-related tasks. For some, such activities constitute inefficient use of time because they prevent employees from completing the tasks that they are responsible. For some others, cyberloafing behaviors help employees to reduce their stress and increase their efficiency. The purpose of this study was to examine the relationship of some organizational and individual variables with cyberloafing in the context of Interpersonal Behavior Theory. This mixed research study was designed with an explanatory approach. Quantitative data was collected from 240 employees; then by considering the quantitative data, interview questions were prepared and the qualitative data collection process was completed with 20 participants. According to the results; the perceptions of employees about the penalties and benefits that may emerge in case of cyberloafing affect their attitudes towards cyberloafing positively. Positive emotions for cyberloafing and social factors have a positive effect on cyberloafing intention. Social factors have a positive relationship with roles, rules and self-concept. Habits and intention increase employees’ cyberloafing behaviors. The most frequent cyberloafing behaviors are messaging and reading news. The implications of the results are discussed.


Elciyar, K., & Simsek, A. (2021). An Investigation of Cyberloafing in a Large-Scale Technology Organization From the Perspective of the Theory of Interpersonal Behavior. Online Journal of Communication and Media Technologies, 11(2), e202106.


  • Aku, A. (2017). Role of middle managers in mitigating employee cyberloafing in the workplace. Walden Dissertations and Doctoral Studies (No: 3967).
  • Anandarajan, M. (2002). Profiling web usage in the workplace: A behavior-based artificial ıntelligence approach. Journal of Management Information Systems, 19(1), 243-266.
  • Anandarajan, M., & Simmers, C. (2004). Constructive and destructive personal web use in the workplace: Mapping employee attitudes. In M. Anandarajan & C. Simmers (Eds.), Personal web usage in the workplace: A guide to effective human resource management (pp. 1-27). Information Science.
  • Anandarajan, Murugan, Simmers, C., & Igbaria, M. (2000). An exploratory investigation of the antecedents and impact of internet usage: An individual perspective. Behaviour & Information Technology, 19(1), 69-85.
  • Anderson, J. C. & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411-423.
  • Bailey, K. (2008). Methods of social research. New York: Simon and Schuster.
  • Bamberg, S., & Schmidt, P. (2003). Incentives, morality, or habit? Predicting students’ car use for university routes with the models of Ajzen, Schwartz, and Triandis. Environment and Behavior, 35(2), 264-285.
  • Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing: The role of norms and external locus of control. Computers in Human Behavior, 24(3), 1067-1084.
  • Case, C., & Young, K. (2002). Employee internet management: Current business practices and outcomes. Cyberpsychology & Behavior, 5, 355-361.
  • Coker, B. L. S. (2011). Freedom to surf: the positive effects of workplace Internet leisure browsing. New Technology, Work and Employment, 26(3), 238-247.
  • Creswell, J. W., & Clark, V. L. P. (2017). Designing and conducting mixed methods research. Sage.
  • Cullen, M. J. & Sackett, P. R. (2003). Personality and counterproductive work behavior. In M. Barrick & A. M. Ryan (Eds.), Personality and work in (pp. 150-182). Jossey-Bass.
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
  • Garrett, R. K., & Danziger, J. (2008). On cyberslacking: Workplace status and personal internet use at work. Cyberpsychology & Behavior, 11, 287-292.
  • Greenfield, D., & Davis, R. (2002). Lost in cyberspace: The Web @ Work. Cyberpsychology & Behavior, 5, 347-353.
  • Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (1998). Multivariate data analysis. Prentice Hall.
  • Hartijasti, Y., & Fathonah, N. (2015). The importance of internet policies socialization on cyberloafing in Indonesian workplace. Asian Journal of Information and Communications, 7(2), 68-80.
  • Hooper, D., Coughlan, J., & Mullen, M. R. (2008). Structural equation modelling: Guidelines for determining model fit. Electronic Journal of Business Research Methods, 6(1), 53-60.
  • Hu, L., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1-55.
  • Jackson, T. (2005). Motivating sustainable consumption: A review of evidence on consumer behaviour and behavioural change. Sustainable Development Research Network, 15. University of Surrey.
  • Jia, H., Jia, R., & Karau, S. (2013). Cyberloafing and personality: The impact of the Big Five traits and workplace situational factors. Journal of Leadership & Organizational Studies, 20(3), 358-365.
  • Johnson, J., & Chalmers, K. (2007). Identifying employee internet abuse. 40th Annual Hawaii International Conference on System Sciences-HICSS’07 (pp. 247b-247b). Waikoloa, HI.
  • Kamins, A. (1995, July). Cyber-loafing: Does employee time online add up to net losses. New York Daily News.
  • Kline, R. B. (2005). Principles and practice of structural equation modeling (2nd ed.). Guilford.
  • Lim, V. K. G. (2002). The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675-694.
  • Lim, V. K. G., & Chen, D. J. Q. (2012). Cyberloafing at the workplace: Gain or drain on work? Behaviour & Information Technology, 31(4), 343-353.
  • Lim, V. K. G., & Teo, T. S. H. (2005). Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study. Information & Management, 42(8), 1081-1093.
  • Lim, V. K. G., Teo, T., & Loo, G. (2002). How do I loaf here? Let me count the ways. Commun. ACM, 45, 66-70.
  • Limayem, M., Khalifa, M., & Chin, W. W. (2004). Factors motivating software piracy: a longitudinal study. IEEE Transactions on Engineering Management, 51(4), 414-425.
  • Madden, M. (2009). The audience for online video-sharing sites shoots up. Pew Internet & American Life Project.
  • Mahatanankoon, P., & Igbaria, M. (Ed.). (2004). Impact of personal ınternet usage on employee’s well-being. In M. Anandarajan & C. Simmers (Eds.), Personal web usage in the workplace: A guide to effective human resource management (pp. 246-263). Information Science.
  • Malachowski, D. (2011). Wasted time at work costing companies billions.,lunch%20and%20scheduled%20break%2Dtime
  • Moody, G., & Siponen, M. (2013). Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work. Information & Management, 50, 322-335.
  • Oravec, J. A. (2002). Constructive approaches to Internet recreation in the workplace. Commun. ACM, 45, 60-63.
  • Ozdemir, M. (2010). Nitel veri analizi: Sosyal bilimlerde yöntembilim sorunsalı üzerine bir çalışma [Qualitative data analysis: A study on the methodology problematic in social sciences]. Eskişehir Osmangazi Üniversitesi Sosyal Bilimler Dergisi, 11(1), 323-343.
  • Ozler, D. & Polat, G. (2012). Cyberloafing phenomenon in organizations: Determinants and impacts. International Journal of EBusiness and EGovernment Studies, 4, 1-15.
  • Pallant, J. (2001). SPSS survival manual. SPSS.
  • Patton, M. Q. (2015). Qualitative research and evaluation methods: Integrating theory and practice (4th ed.). Sage.
  • Pee, L. G., Woon, I. M. Y., & Kankanhalli, A. (2008). Explaining non-work-related computing in the workplace: A comparison of alternative models. Information & Management, 45(2), 120-130.
  • Robinson, J. (2010). Triandis’ theory of interpersonal behaviour in understanding software piracy behaviour in the South African context (Unpublished doctoral dissertation). University of the Witwatersrand. Johannesburg, South Africa.
  • Simsek, A., & Simsek, E. (2019). Beneficial and detrimental effects of cyberloafing in the workplace. Journal of Organizational Behavior Review, 1(1), 97-114.
  • Simsek, A., Elciyar, K., & Kizilhan, T. (2019). A comparative study on social media addiction of high school and university students. Contemporary Educational Technology, 10(2), 106-119.
  • Sipior, J. C., & Ward, B. T. (2002). A strategic response to the broad spectrum of Internet abuse. Information Systems Management, 19(4), 71-79.
  • Son, J.-Y., & Park, J. (2016). Procedural justice to enhance compliance with non-work-related computing (NWRC) rules: Its determinants and interaction with privacy concerns. International Journal of Information Management, 36(3), 309-321.
  • Sonnentag, S. (2003). Recovery, work engagement, and proactive behavior: A new look at the interface between nonwork and work. The Journal of Applied Psychology, 88, 518-528.
  • Stanton, J. M. (2002). Company profile of the frequent ınternet user. Commun. ACM, 45(1), 55-59.
  • Triandis, H. C. (1977). Interpersonal behavior. Brooks/Cole.
  • Triandis, H. C. (1980). Attitudes, values, and interpersonal behaviour. In M. P. Page (Ed.), 1979 Nebraska Symposium on Motivation: Beliefs, attitudes, and values (pp. 195-260). University of Nebraska Press.
  • Woon, I. M. Y., & Pee, L. G. (2004). Behavioral factors affecting Internet abuse in the workplace-an empirical investigation. SIGHCI 2004 Proceedings, 5. Vienna: Association for Computing Machinery.
  • Yeik, K., Soh, P., & Chew, K.-W. (2017). Antecedents and consequences of cyberloafing: Evidence from Malaysian ICT industry. First Monday, 22, 3-6.
  • Young, K. (2010). Policies and procedures to manage employee Internet abuse. Computers in Human Behavior, 26(6), 1467-1471.
  • Zoghbi-Manrique-de-Lara, P., & Mesa, A. (2010). Bringing cyber loafers back on the right track. Industrial Management and Data Systems, 110, 1038-1053.