Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

See

discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/7165535

Testing a measure of cyberloafing

Article in Journal of allied health · February 2006


Source: PubMed

CITATIONS READS

35 612

3 authors, including:

Gary Blau
Temple University
138 PUBLICATIONS 4,093 CITATIONS

SEE PROFILE

All content following this page was uploaded by Gary Blau on 31 January 2014.

The user has requested enhancement of the downloaded file. All in-text references underlined in blue are added to the original document
and are linked to publications on ResearchGate, letting you access and read them immediately.
ORIGINAL ARTICLES

 Testing a Measure of Cyberloafing


Gary Blau, PhD
Yang Yang
Kory Ward-Cook, PhD [Author: Please list degree[s] for Yang Yang.]

Using a primary sample of medical technologists (MTs) and Since then, cyberloafing has become an important
a second validation sample, the results of this study showed employee issue for many companies. In a survey of 224
initial support for a three-factor measure of cyberloafing. organizations in the United States, almost all of these
The three scales were labeled browsing-related, non-work- organizations had Internet access policies (IAPs) outlining
related e-mail, and interactive cyberloafing. MTs who per-
appropriate and inappropriate use of the Internet at work.7
ceived unfair treatment in their organization (i.e., lower
By contrast, in Singapore, fewer organizations have such
organizational justice) were more likely to exhibit all three
types of cyberloafing. MTs who did not care as much about IAPs.3 Despite the prevalence of these IAPs, more than
punctuality and attendance (i.e., higher time abuse) were 60% of these companies had disciplined employees for
more likely to display browsing-related and non-work- inappropriate uses such as accessing pornography, online
related e-mail cyberloafing. Finally, MTs who perceived an chatting, gaming, investing, or shopping at work.7 The pur-
inability to control their work environment (i.e., power- pose of this study is to further explore the construct of
lessness) were more likely to display interactive cyberloaf- cyberloafing2 by testing an expanded version of an online
ing. Study limitations and suggestions for future research survey cyberloafing measure initially used by Lim et al.2,3
are discussed. J Allied Health 2006; 35:9–17.
Construct Definition

Lim2 has defined cyberloafing as “misuse of the internet,


THE INTERNET has been well recognized as playing a crit- i.e., any voluntary act of employees’ using their companies’
ical role in helping many companies to reduce costs, internet access during office hours to surf non-job related
shorten product cycle times, and market products and serv- web sites for personal purposes and to check personal e-
ices more efficiently.1 It is also recognized, however, that mail.” This definition is similar to but more comprehensive
the Internet serves as a double-edged sword for businesses in than definitions offered by others.4,6 The literature on
that it opens up new opportunities for employees to “loaf” cyberloafing to date clearly assumes that cyberloafing is a
on the job,2,3 by providing access to what Anandarajan4 proscribed employee behavior that must be monitored and
called the “world’s biggest playground.” According to a controlled by organizations through IAPs.4,7,8
survey by Vault.com,5 90% of the employees surveyed It can be argued that cyberloafing is embedded in the
admitted to surfing or browsing recreational sites during larger construct of employee workplace deviant behavior,
office hours and 84% said they sent personal e-mail from which is broadly defined as “voluntary behavior that vio-
work. Surfwatch software has estimated that nearly one lates significant organizational norms.”9 Robinson and Ben-
third of American workers’ time on the Internet is spent nett’s typology of deviant workplace behavior (DWB) con-
“cheating the boss out of real work.”5 A literature search sists of four quadrants, arranged on two dimensions, from
indicated that the term “cyberloafing” or “wasting time on minor to serious and from interpersonal to organizational.9
the Internet while at work” was initially used by Frook.6 There are labels for each quadrant: minor, organizational is
labeled “production deviance”; serious, organizational is
labeled “property deviance”; minor, interpersonal is labeled
Dr. Blau is Chair of the Human Resource Management Department, “political deviance”; and serious, interpersonal is labeled
Temple University, Philadelphia, Pennsylvania; Dr. Yang is ■■■■■, “personal aggression.” Lim classified cyberloafing in the
University of Western Ontario, London, Ontario, Canada; and Dr. Ward-
Cook is Executive Director of the Board of Registry, American Society for
production deviance quadrant9 because cyberloafing behav-
Clinical Pathology, Chicago, Illinois. iors take away time from employee productivity.2 Specific
noncyberloafing behaviors within this production deviance
Received January 21, 2004; revision accepted August 2, 2004. quadrant include employees making personal calls, coming
in late or leaving early, and wasting company resources.9
Address correspondence and reprint requests to: Gary Blau, PhD, HRA
Department, 384 Speakman Hall, Temple University, 1810 North 13th
However, Bennett and Robinson10 did not formally meas-
Street, Philadelphia, PA 19122. Tel 215-204-6906; fax xxx-xxx-xxxx; e- ure cyberloafing in the measure of DWB that they subse-
mail gblau@1temple.edu. [Author: Please list your fax #?] quently developed.

9
Lim2 found a two-factor measure of cyberloafing in her misuse of company property, specifically the employee’s per-
study of 188 working adults in Singapore. She labeled factor sonal computer and related resources (e.g., Intranet). This
1 “browsing activities,” which consisted of eight items, for quadrant is more potentially serious or harmful to the
example, browsing sports-related Web sites, investment- organization than production deviance.9 Downloading
related Web sites, general news sites, and adult-oriented non–work-related information, posting messages on
(sexually explicit) Web sites. The second factor was labeled non–work-related items, or using the Internet to gain addi-
“e-mailing activities,” which consisted of three items: tional income at work are generally violations of use of
checking, sending, and receiving non–work-related e-mail. company property.8,14 Integrating the different types of
Surprisingly, however, Lim2 did not keep these factors sep- cyberloafing behavior measured across the previously cited
arate in subsequent analyses. Instead, she combined all 11 studies inductively suggests that the two more “passive”
items together into one general cyberloafing scale, which types of cyberloafing (i.e., browsing and e-mailing) both fit
had a reliability of 0.88. Lim’s2 cyberloafing scale was the into the production deviance DWB quadrant, and a third
only previously tested measure found in a literature search. more “interactive” type of cyberloafing (i.e., interactive
cyberloafing) fits into the more organizationally serious
An Expanded Cyberloafing Construct property deviance DWB quadrant.
within the DWB Typology
Relationships of Correlates to
Additional examples of cyberloafing behavior found in the Types of Cyberloafing
literature include moonlighting (using the Internet to gain
additional income), posting messages, downloading ORGANIZATIONAL JUSTICE
non–work-related information, using chat rooms, and game
playing.8,11,12 These examples fit within Lim’s2 general defi- Why would employees cyberloaf? From a theoretical per-
nition of cyberloafing (misuse of the Internet) yet were not spective, exchange theorists15,16 have suggested looking at
incorporated into her initial scale. All types of cyberloafing human interactions through the “lens” of social economics,
behaviors involve the employee sitting in a chair and star- that is, individuals being concerned about the ratio of
ing at their computer screen. However, these latter cyber- inputs they invest in a relationship relative to the outcomes
loafing items generally require more synchronous virtual or or rewards they receive. If employees perceive that they
live interaction, either with other people or the software have been treated unfairly (i.e., a lack of justice), they can
technology.13 In order to post messages, download informa- become upset and motivated to reciprocate by cyberloaf-
tion, play games, or use a chat room, the user is typically ing.2,3 Prior research suggests three types of organizational
required to have greater interaction either with the soft- justice17: distributive justice (perceived fairness in outcome
ware or other users. Such “interactiveness” typically allocations), procedural justice (perceived fairness of the
requires greater immediate effort and often takes longer to procedures used to determine outcome allocations), and
complete than browsing or a quick e-mail.13 Furthermore, interactional justice (perceived fairness of interpersonal
the user would have probably identified the Web site treatment). Adding all three types of justice together cre-
required for such interactive cyberloafing based on previous ates a general organizational justice measure. Lim2 found all
browsing-related activity. three types of justice to be equally negatively related to her
For example, if when initially browsing a non–work- general cyberloafing scale, which indicates that they can be
related Web site, an employee then decides to download combined. The general nature of this relationship is that as
information from this Web site, additional time and effort employees believe they are unfairly treated by the organiza-
are involved in doing this. Similarly, if an employee comes tion, they are more likely to cyberloaf.
across information found while browsing that he or she
then wants to post for others, additional interaction with TIME ABUSE AND POWERLESSNESS
the software is required. Online chatting and playing games
require two-way “live” or virtual interaction with others. It will be useful to examine differential relationships of cor-
Finally, using the Internet to moonlight or gain additional relates to types of cyberloafing. Finding evidence for such
income requires a higher level of interaction with either differential relationships represents a form of discriminant
the software or other users than e-mailing or browsing. E- validity.18 Such discriminant validity would further support
mailing is asynchronous or not immediately interactive, distinguishing among these three types of cyberloafing. One
because messages typically stay on one’s computer system differential correlate is time abuse, defined in this study as
and can be responded to at a later time. Browsing generally “the degree to which an employee is concerned about their
means surfing or looking and is generally one way and punctuality and attendance.” As noted earlier, punctuality
therefore not as “interactive.”13 and attendance behaviors fall in the same production
These additional cyberloafing behaviors seem to be deviance quadrant9 as general cyberloafing.2 Attitude
better captured in a different quadrant within Robinson toward one’s punctuality and attendance can be considered
and Bennett’s9 DWB typology, that is, property deviance, or a more “passive” type of work withdrawal.19 The general

10 BLAU ET AL., Testing A Measure of Cyberloafing


logic is that an employee can show high production ing data, of the 451 respondents, 36 did not answer the
deviance (e.g., wasting resources, arriving late, and leaving cyberloafing items, reducing the potential full sample to
early) in a number of different ways.9 This suggests that time 415. Of these 415 respondents, 148 answered “no” to the
abuse–oriented employees would be more likely to show pas- question, “Is Internet access easily available to you at
sive (i.e., browsing-related and non–work-related e-mail work?” This further reduced the sample size to 267 MTs.
cyberloafing) rather than interactive cyberloafing behaviors. Exploratory factor analysis on the cyberloafing items was
The second differential correlate to be tested is power- performed using these 267 MTs. However, based on the
lessness, which can be defined as an individual’s perceived other variables used in this study, including the control
inability to control his or her work environment.20 Per- variable of “no job changes” over this period, complete data
ceived powerlessness is generally upsetting to employees were available for only 227 MTs. Job “constancy” over the
and has been found to be a cause of more extreme employee study time frame was necessary to better assess variable rela-
DWBs such as theft and violence.21,22 With perceived pow- tionships to subsequent cyberloafing behaviors. A general
erlessness, there is a greater potential violation of the “psy- reduction in sample size over any type of longitudinal time
chological contract,” leading to a stronger employee frame is not uncommon.24
response to restore this contract. Thus, employees with A demographic comparison on gender, age, number of
higher perceived powerlessness should be more likely to years in field, marital status, and education level for the 227
engage in interactive cyberloafing because by being syn- complete-data MT sample with the 224 (451 - 227)
chronous or involving greater interaction opportunities, [Comp: set as minus.] remaining MTs showed no signifi-
interactive cyberloafing is a more direct, albeit riskier,7 way cant demographic differences. A 1999 breakdown of the
to restore employees’ sense of control regarding their work sample of 227 MTs showed that their median age was 31 yrs
environment.23 This literature collectively suggests the fol- (range, 27–61 yrs), 83% were female, the median number of
lowing study hypothesis. years in the field was 7 (range, 4–27 yrs), 69% were mar-
ried, 94% had a baccalaureate degree, and 6% had an
Hypothesis 1. Browsing-related, non–work-related e-mail, and advanced degree. By 2002, these demographics either
interactive cyberloafing are three distinct types of cyberloafing remained stable or increased as expected (e.g., age, years in
behaviors. the field). Population demographics collected by the Amer-
ican Society for Clinical Pathology in 2000 on 73,471 MTs
Methods showed that 82% were female and that the median age was
43 yrs. Thus, the sample studied here is representative for
gender but is younger.
PRIMARY SAMPLE AND PROCEDURE

This sample is part of a longitudinal study on the career MEASURES


paths of recently graduated medical technologists (MTs) by
the Board of Registry of the American Society for Clinical Powerlessness
Pathology. MTs work in a laboratory in a variety of health-
related settings (e.g., hospitals, independent laboratories). Perceived powerlessness was measured for 2001 using the
They are responsible for the accurate performance of tests three-item scale developed by Ashford et al.20 A sample
(e.g., analyzing blood, urine, and tissue samples, growing item is “I have enough power in this organization to control
cultures) that help to determine the presence or absence of events that might affect my job.” Unless indicated other-
disease. The requirement for entry into medical technology wise, all multi-item scales used a four-point response scale
is a baccalaureate degree and clinical education in a pro- (1, strongly disagree; 2, disagree; 3, agree; 4, strongly agree).
gram accredited by the National Accrediting Agency for
Clinical Laboratory Sciences. Differences in job level were Time Abuse
controlled for by using such a homogeneous sample.
Within this longitudinal study, surveys measuring differ- Time abuse attitude toward punctuality and attendance was
ent variables were collected from a sample of MTs across dif- measured for 2001 using a five-item measure designed for
ferent organizations for 2001 and 2002. Surveys were mailed this study. Sample items are “it’s no big deal if I’m late for
in the spring following the year in question. In 2001, 501 of work” and “over the past year, I have called in sick when I
1,156 MTs (43%) returned their surveys containing demo- probably could have worked.”
graphic, powerlessness, and time abuse data. In 2002, 451 of
1,156 MTs (39%) returned their surveys containing demo- Organizational Justice
graphic, organizational justice, and cyberloafing data. MTs
were matched over time using their social security numbers. Organizational justice data were collected for 2002 using 12
Although there were 451 respondents across the two sur- items, four each for distributive, procedural, and interac-
veys, complete data across both years were available for a tional justice. For distributive justice, a four-item measure
much smaller number of MTs. Starting with the cyberloaf- based on Price and Mueller25 was used. A sample item is

Journal of Allied Health, Spring 2006, Volume 35, Number 1 11


“my organization rewards me fairly considering the stresses gal secretary, landscaper, psychologist, bartender, security
and strains of my job.” For procedural justice, a four-item officer, and data entry clerk. Other demographic informa-
measure based on Niehoff and Moorman26 was used. A tion on the 177 respondents were as follows: 56% were
sample item is “job decisions are applied consistently by female; 53% were married; 3% indicated they were younger
management across all affected employees.” For interac- than 21 yrs of age, 51% were 21–35 yrs of age, 35% were
tional justice, a four-item measure also based on a measure 36–50 yrs of age, and 11% were 51–65 yrs of age; and 88%
by Niehoff and Moorman26 was used. A sample item is indicated that they worked at least 35 hrs per week. These
“when making a decision affecting me, my supervisor treats demographics indicate that this sample was more heteroge-
me with dignity and respect.” neous than the MTs.
At the end of the survey, respondents were asked if they
Cyberloafing could be “contacted at a later date to follow up on their ini-
tial responses.” Of the 177 respondents, 80 (45%) provided
Cyberloafing data were collected for 2002. Sixteen items e-mail address information for such follow-up. Approxi-
were measured and represented an integration of cyberloaf- mately 6 mos later, the same 16-item measure was e-mailed
ing items measured across a number of previously cited to these respondents. Of the 80 respondents contacted, 63
studies.2,8,11,12 Ten of the 16 items were taken directly from (79%) provided complete survey responses.
Lim’s2 11-item scale. The only item not used was “browsing
adult-oriented (sexually explicit) Web sites.” Given the Cyberloafing
gender breakdown of the sample, this item was believed to
be offensive to respondents. The other six items were new To test the generalizability of the cyberloafing measure, the
and needed to test an expanded view of cyberloafing. All same 16 cyberloafing items collected for the primary sample
items, including the perceived offensive item, were pilot of MTs were collected for this sample. The same four-point
tested among medical technology experts at the 2002 frequency response scale was also used.
research and development meeting of the American Soci-
ety for Clinical Pathology.27 As noted earlier, MTs were first Results
asked if they had Internet access easily available to them at
work. If they replied “no,” they were asked to skip the 16 FACTOR ANALYSES
cyberloafing items that immediately followed in the survey.
This lead-in item eliminated 148 of the 415 respondents Exploratory factor analyses were used on the primary
(36%), leaving 267 (64%) who answered “yes” and then sample of MTs, because the 16 items collectively repre-
filled out these 16 items. The lead-in phrase asked “how sented a unique set of cyberloafing items.28 The results are
often do you engage in each activity during work hours…” shown in Table 1. Following the recommendations made by
The following four-point frequency scale was used: 1, hardly Ford et al.,29 a principal components analysis with orthogo-
ever (once every few months or less); 2, rarely (about once nal rotation was performed, with a scree test indicating that
a month); 3, sometimes (at least once a week); 4, frequently a three-factor solution best represented the data. [Author:
(at least once a day). In the sentence starting “Following the…” is “scree test”
correct?] Three criteria were used to retain an item on a
VALIDATION SAMPLE AND PROCEDURE factor: the item must have a factor loading of at least 0.40,
the difference between the two highest loadings across fac-
Data were initially collected in early spring 2003 from a tors for an item must be greater than 0.10, and a factor must
sample of 232 working adults employed across a number of be represented by at least three items.28 The results in Table
different organizations. Respondents were attending 1 indicate that six items (items 1, 2, 4, 6, 11, and 16)
evening undergraduate or graduate human resource man- cleanly loaded on factor 1, which was named “browsing-
agement classes part-time at a university in the northeast- related cyberloafing,” and this accounted for 29% of the
ern United States. Of these 232 adults, 55 (24%) answered variance. Regarding item 2, “shop online for personal
“no” to the question “is Internet access easily available to goods,” Lim2 also found this item to load strongly on her
you at work?” This reduced the sample size to 177. Occupa- “browsing activities” scale. Shopping online is typically a
tionally, these 177 respondents indicated that they were fairly “passive” type of cyberloafing with a low level of user
represented as follows: 15% medical/health (e.g., nursing, interaction required.13 Item 16, “browsing non–job-related
physical therapy), 18% technical (e.g., engineering, infor- Web sites,” is a “catch all” for other Web sites not specifi-
mation technology, financial services), 31% administrative cally mentioned (e.g., adult entertainment).
(management, advertising, government related), 6% edu- Three items (items 3, 5, and 7) cleanly loaded on factor
cation (e.g., teaching, religious, library services), 14% serv- 2, which was named “non-work-related e-mail cyberloaf-
ice (e.g., hospitality, sales, real estate), and 16% “other,” in ing,” and this accounted for 13% of the variance. Finally,
which respondents were asked to fill in their current job seven items (items 8, 9, 10, 12, 13, 14, and 15) cleanly
title. Job titles reported included caretaker, waitress, parale- loaded on factor 3, which was named “interactive cyber-

12 BLAU ET AL., Testing A Measure of Cyberloafing


TABLE 1. Exploratory Factor Analysis of Cyberloafing Items
Factor
______________________________________
Items 1 2 3
1. Browse sports-related Web sites 0.70 0.01 0.02
2. Shop online for personal goods 0.54 0.24 0.15
3. Check non-work-related e-mail 0.25 0.85 0.01
4. Browse investment-related Web sites 0.55 0.07 0.19
5. Send non-work-related e-mail 0.22 0.89 0.15
6. Browse entertainment-related Web sites 0.60 0.23 0.22
7. Receive non-work-related e-mail 0.15 0.90 0.07
8. Play online games 0.30 –0.02 0.43
9. Download non-work-related information 0.31 0.30 0.44
10. Download online games 0.20 0.04 0.62
11. Browse general news Web sites 0.73 0.19 0.05
12. Chat with other people in online chat rooms 0.06 –0.01 0.81
13. Chat with other people with instant messenger 0.03 0.10 0.68
14. Post messages on non-work-related items 0.20 0.06 0.45
15. Use the Internet to gain additional income while at work 0.01 0.07 0.62
16. Browse non-work-related Web sites 0.71 0.31 0.08

Eigenvalues (retained scale items, unrotated) 4.71 2.07 1.44


Percentage variance explained 29.41 12.93 8.98
Cumulative variance explained 29.41 42.34 51.32
Note. N = 267. Values in bold indicate primary factor loading.

loafing,” and this accounted for 9% of the variance. loafing, 0.75; non-work-related e-mail cyberloafing, 0.87;
Regarding the loadings across factors for items 8 (“play and interactive cyberloafing, 0.68. Test-retest reliabilities
online games”) and 9 (“download non–work-related infor- for the follow-up sample of 63 repeat respondents were as
mation”), it can be argued that a difference of at least 0.10 follows: browsing-related cyberloafing, 0.64; non-work-
across loadings, with the secondary loadings being mar- related e-mail cyberloafing, 0.70; and interactive cyberloaf-
ginal, can justify item classification on the “dominant” ing, 0.60. These test-retest reliabilities suggest that the self-
loading factor.30 Overall, the three-factor solution reported cyberloafing was fairly stable over the reported
explained 51% of the variance, which is consistent with 6-mo period. Overall, the results support hypothesis 1, that
other studies using exploratory factor analyses.31 These is, browsing-related, non-work-related e-mail, and interac-
items were then summed for each factor and used in subse- tive cyberloafing are three distinct types of cyberloafing.
quent analyses. Reliabilities for each scale were assessed
using Cronbach’s .28 Ideally, scale reliabilities should be at ADDITIONAL RESULTS WITH MT SAMPLE
least 0.70.28 The following ? levels were found for each
cyberloafing scale: browsing-related cyberloafing, 0.78; Table 3 shows the means, standard deviations, reliabilities,
non-work-related e-mail cyberloafing, 0.91; and interactive and correlations for study variables for MTs. Study variable
cyberloafing, 0.69. means are given based on the four-point response scale for
Confirmatory factor analyses were used on the valida- easier interpretation. Looking at the scale means for the
tion sample to test how well these 16 items “fit” the pro- three cyberloafing scales, non-work-related e-mail cyber-
posed three-factor solution compared with other factor- loafing has the highest mean of the scales (2.01), but all
solution models on a new set of data.32 The results across three have low means (browsing-related cyberloafing, 1.44;
different models are shown in Table 2. Significant model interactive cyberloafing, 1.22). For the validation sample, a
improvement is seen going from one factor (overall cyber- similar pattern of cyberloafing scale means was found, that
loafing) to two factors (non-work-related e-mail cyberloaf- is, non-work-related e-mail cyberloafing had the highest
ing and browsing-related cyberloafing) to three factors mean (2.19), followed by browsing-related cyberloafing
(non-work-related e-mail cyberloafing, browsing-related (1.64) and then interactive cyberloafing (1.43).
cyberloafing, and interactive cyberloafing). Adequate fit is Given that cyberloafing is an example of DWB, which
indicated when the fit indices are at least 0.90 and the root should have a lower frequency of occurrence,9 lower means
mean square measures are less than 0.08.33,34 Overall, these are to be expected. Scale reliabilities for study variables are
statistics indicate an acceptable fit and further support the generally good (i.e., >0.70), with only the interactive
distinctiveness of the three cyberloafing scales. The follow- cyberloafing scale being marginal (0.69). Correlations
ing scale reliabilities were found: browsing-related cyber- among the cyberloafing scales are moderate, with the high-

Journal of Allied Health, Spring 2006, Volume 35, Number 1 13


TABLE 2. Overall Fit Indices for Cyberloafing Items for the Validation Sample
Model 2 df CFI AGFI RMSR RMSEA
1 factor 588.81* 85 0.754 0.668 0.102 0.134
2 factors 409.73* 84 0.861 0.807 0.059 0.088
3 factors 311.47* 82 0.944 0.902 0.032 0.061
*p < 0.05, significant decrease in 2 value.
CFI, comparative fit index; AGFI, adjusted goodness-of-fit index; RMSR, root square mean residual; RMSEA, root mean square error of approximation.

est being 0.50, indicating 25% (0.502) overlap between in browsing-related and non-work-related e-mail cyberloaf-
browsing-related cyberloafing and non-work-related e-mail ing, while those who perceived less control at work were
cyberloafing. A similar pattern of correlations among cyber- more likely to interactively cyberloaf. Because the time
loafing scales was found for the validation sample: r = 0.53 abuse and powerlessness data were collected 1 yr before the
(browsing with non-work-related e-mail cyberloafing), r = cyberloafing data, stronger causal inferences about these
0.51 (browsing with interactive cyberloafing), and r = 0.27 relationships can be made.18 However, these correlations
(non-work-related e-mail with interactive cyberloafing). were not strong. Several reasons may account for this.
Statistical texts28 generally use 0.80 as the correlation First, by using only a four-point frequency response scale
“cutoff” for indicating variable redundancy. These correla- for each cyberloafing item, this reduced the score range for
tional results support using each cyberloafing scale as a dis- items and subsequently formed scales. Range restriction in
tinct variable. variables can decrease correlations with other variables.28
Looking at correlational relationships, powerlessness had Future research should consider using a seven-point fre-
a positive correlation to only interactive (0.24) cyberloaf- quency response scale for measuring cyberloafing items: 1,
ing. Time abuse was positively related to both browsing- never; 2, hardly ever (about once every few months); 3,
related and non-work-related e-mail cyberloafing but not to rarely (about once a month); 4, occasionally (at least sev-
interactive cyberloafing. Organizational justice was nega- eral times per month); 5, sometimes (at least once per
tively related to all three cyberloafing scales, that is, brows- week); 6, frequently (at least once per day); 7, very fre-
ing-related cyberloafing (–0.19), non-work-related e-mail quently (at least several times per day). Greater measure-
cyberloafing (–0.16), and interactive cyberloafing (–0.13). ment precision should also help scale reliability,28 because
[Comp: set as minuses.] Organizational justice was the only the reliability of the interactive cyberloafing scale used here
variable significantly related to overall cyberloafing. These was marginal. In addition, gathering data on the amount of
correlation results provide additional support for hypothesis time spent on cyberloafing behaviors would be useful.
1, that is, that browsing-related, non-work-related e-mail, Cyberloafers who take frequent but short breaks to cyber-
and interactive cyberloafing are three distinct scales. loaf may still stay productive versus cyberloafers who spend
longer periods cyberloafing. This suggests that future
Discussion research should also examine the relationship between
cyberloafing and employee performance.
The exploratory and confirmatory factor analytic results of Another factor that may help explain the lower levels of
this study suggest that there are three related but distinct cyberloafing found and weaker correlational results may be
types of cyberloafing: browsing-related, non-work-related e- the nature of the samples used. Both the primary and vali-
mail, and interactive cyberloafing. Perhaps some might view dation samples used paper-and-pencil surveys to record
distinguishing among these types of cyberloafing as “splitting cyberloafing behavior as opposed to using an online survey,
hairs,” because they all collectively mean that an employee is as Lim2 did. Lim2 acknowledged the possibility that using
not being work productive. However, we believe that these such an online survey technique may build in a stronger
distinctions are meaningful. The first two types of cyberloaf- cyberloafing bias among online respondents. Two limita-
ing fit within Robinson and Bennett’s9 production deviance tions associated with the paper-and-pencil survey approach
DWB quadrant, while the third type of cyberloafing is better used here are eliminating respondents who did not have
placed in their property deviance DWB quadrant. To our easy work access to the Internet and respondents underesti-
knowledge, this is the first study that has found empirical mating their actual cyberloafing to show higher levels of
support for such cyberloafing scale distinctions. social desirability.35 However, results with a smaller subset
The correlational results also supported distinguishing of validation sample respondents did indicate that cyber-
between types of cyberloafing. Greater time abuse was loafing behaviors were fairly stable over a 6-mo period.
related to more browsing-related and non-work-related e- Given the large number of organizations represented by
mail cyberloafing, while greater powerlessness was related to the primary and validation sample respondents, IAPs from
more interactive cyberloafing. MTs who were more lax in such organizations were not gathered.7 [Author: Is the sen-
their attendance and punctuality were more likely to engage tence starting “Given the…” okay as edited?] Gathering

14 BLAU ET AL., Testing A Measure of Cyberloafing


TABLE 3. Means, Standard Deviations, Reliabilities, and Correlations of Study Variables
Mean SD 1 2 3 4 5 6 7
1. Powerlessness, 2001 2.36 0.63 (0.80)*
2. Time abuse, 2001 1.53 0.54 0.16 (0.74)
3. Organizational justice, 2002 2.51 0.52 –0.33 –0.15 (0.90)
4. Browsing-related cyberloafing, 2002 1.44 0.51 0.10 0.17 –0.19 (0.78)
5. Non-work-related e-mail cyberloafing,
2002 2.01 0.95 0.04 0.15 –0.16 0.50 (0.91)
6. Interactive cyberloafing, 2002 1.22 0.20 0.24 0.03 –0.13 0.48 0.22 (0.69)
7. Overall cyberloafing, 2002† 1.57 0.46 0.12 0.10 –0.20 0.75 0.90 0.51 (0.88)

Note. N= 227. r > 0.13 significant at p < 0.05; r > 0.17 significant at p < 0.01 (two tailed). Correlations in bold indicate antecedents that are statistically
significant. [Author: Please check that the note in Table 3 is correct as edited.]
*Internal consistency scale reliabilities (in parentheses).
†Overall cyberloafing = (browsing + non-work-related e-mail + interactive cyberloafing)/3.

such policy information in future research may help to ately spreading computer viruses, or somehow sabotaging a
understand different levels of employee cyberloafing behav- company’s Intranet.8 Clearly, these hostile cyberloafing
ior, especially by using a large sample within one organiza- behaviors require higher levels of user information technol-
tion. For example, an organization’s culture may be more ogy proficiency. In addition, recent research has found that
permissive about some types of cyberloafing (e.g., non- certain personality characteristics, including loneliness/
work-related e-mail) versus other types (e.g., interactive).36 depression and diminished impulse control, are positively
Additional variance in cyberloafing behavior could have associated with problematic Internet use.40
been accounted for by incorporating more variables in the From a theoretical standpoint, these more hostile cyber-
research design. For example, Lim2 found that the “metaphor loafing behaviors would fit into another DWB quadrant
of the ledger” variable mediated the general relationship of (i.e., personal aggression) within the Robinson and Bennett
organizational justice to cyberloafing. The metaphor of the typology. Personal aggression involves “behaving in an
ledger allows employees to rationalize that they are “entitled” aggressive or hostile manner towards other individuals.”9
to cyberloaf because of their past good behaviors, which they Deliberately spreading computer viruses or somehow sabo-
can then “cash in.”37 Such a variable is part of a mental taging a company’s Intranet seems clearly intended to hurt
exchange16 that each employee develops within their own the productivity of other company employees. Specific
psychological contract with their organization. Employee noncyberloafing behaviors within this personal aggression
feelings of frustration or anger may have been useful to meas- quadrant include employees stealing from other employees,
ure, because angrier38 and more frustrated39 employees verbally abusing a customer, and endangering coworkers
exhibit greater DWB. Unfortunately, survey length con- with reckless behavior.9 Future research could test for three
straints prohibited such additional measures; however, these different levels of cyberloafing, each level fitting into a dif-
variables should be measured in future research. ferent DWB quadrant: browsing-related and non-work-
There are other ideas to think about for future research. related e-mail (production deviance), benign interactive
While browsing-related and especially non-work-related e- (property deviance), and hostile interactive (personal
mail cyberloafing are more “tightly defined and measure- aggression). Getting employees to self-report such
able,”2 the interactive cyberloafing scale is broader and is not extremely hostile cyberloafing behaviors would clearly be
as easy to measure. There may even be a kind of “pecking very challenging, if not impossible. It may be left to the
order” to different types of cyberloafing. For example, non- information technology staff vigilantly monitoring an orga-
work-related e-mail tends to focus on specific family and nization’s IAP during difficult times (e.g., downsizing-
friends. In some ways it may be the easiest to rationalize related layoffs or disciplinary action against specific
doing, as the higher means found here suggest. Browsing is employees) to “catch” such extreme employee behavior.
less personal and involves an employee deliberately going to Research on organizational aggression41 suggests that
specific non-work-related Web sites if the organization’s IAP social learning theory, or learning from others,42 can help us
allows them.7 An employee generally would have already to further understand cyberloafing as a DWB. If employees
first “browsed” a Web site to then engage in interactive choose others who exhibit deviant behaviors, specifically
cyberloafing (e.g., downloading non-work-related informa- cyberloafing behaviors, as role models, these employees are
tion, posting messages, and playing online games). Future more likely to behave in the same way.41,42 For example,
research is needed to test such a cyberloafing “pecking order.” Bacharach et al.43 found that coworkers’ permissiveness
The types of interactive cyberloafing measured here about drinking, as measured by perceived coworker drink-
were sample relevant but also fairly “benign” compared ing norms and coworker drinking behavior, was positively
with hostile interactive behaviors such as hacking, deliber- related to employee problem drinking. This suggests meas-

Journal of Allied Health, Spring 2006, Volume 35, Number 1 15


uring coworker permissiveness about cyberloafing via per- measure for distinguishing among several different types of
ceived peer cyberloafing norms and peer cyberloafing cyberloafing and beginning to test differential correlates for
behaviors. Furthermore, there may be different degrees of understanding these types of cyberloafing using a sample of
coworker permissiveness depending on the level of cyber- MTs. Clearly, additional research as discussed above, using
loafing. For example, it is “okay” to cyberloaf via non-work- other “convenient Internet access” samples, is needed.
related e-mail or even browsing as long as an employee’s Such samples could include other allied heath profession-
work gets done, but under no circumstances should an als, such as physical therapists, dietitians, nutritionists,
employee interactively cyberloaf. Coworker cyberloafing occupational therapists, speech language pathologists, and
permissiveness would be more easily measured with a radiographers. We hope that this study stimulates future
sample in which there is high Internet access across proxi- research efforts.
mally located employees in an organization.
The authors thank the Board of Registry for permission to use the primary
Finally, future research should investigate the potential
data and Donna Surges Tatum, Lidia Dobria, Johnna Gueorguieva, and
“positive side” to cyberloafing behaviors. For many profes- Keith McCoy for their efforts in preparing the primary data set.
sional and technical jobs, employees are becoming increas-
ingly “tied” to their personal computers to accomplish REFERENCES
tasks, even when they are home.44 As such, some “degree”
of cyberloafing may give these employees a much needed 1. Anandarajan M, Simmers C, Igbaria M: An exploratory investiga-
“break” from their work. This suggests future research test- tion of the antedents and impact of internet usage: an individual per-
ing the relationship of cyberloafing to positive outcomes spective. Behav Inf Technol 2000; 19:69–85.
2. Lim V: The IT way of loafing on the job: cyberloafing, neutralizing
such as reducing job stress or perceived work overload. By
and organizational justice. J Organ Behav 2002; 23:675–694.
allowing an employee to accomplish non-work-related 3. Lim V, Teo T, Loo G: How do I loaf here? Let me count the ways.
tasks over lunch, so that the employee can better manage Commun ACM 2002; 45:66–70.
their time, such non-work-related e-mail may be an exam- 4. Anandarajan M: Internet abuse in the workplace. Commun ACM
ple of constructive deviance behavior.45 2002; 45:53–54.
5. Naughton K, Raymond J, Shulman K, et al: Cyberslacking.
Although cyberloafing may be beneficial at times to Newsweek November 29, 1999; 134(22):62–65.
employees, most of the discussion and research to date on 6. Frook J: Web-filtering products for businesses. Communications Week
cyberloafing has clearly emphasized that it is a DWB to be March 18, 1996; 601:1–3.
monitored and controlled.2,3,7,8 The results here suggest 7. Greenfield D, Davis R: Lost in cyberspace: the web at work.
Cyberpsychol Behav 2002; 5:347–353.
that if employees perceive they are treated unfairly by the
8. Siau K, Nah F, Teng L: Acceptable internet use policy. Commun
organization in some way, they are more likely to cyberloaf. ACM 2002; 45:75–79.
Although the organizational justice and cyberloafing data 9. Robinson S, Bennett R: A typology of deviant workplace behaviors:
were collected at the same time, the reverse explanation, a multi-dimensional scaling study. Acad Manage J 1995; 38:555–572.
that is, that increased cyberloafing leads to lower perceived 10. Bennett R, Robinson S: Development of a measure of workplace
deviance. J Appl Psychol 2000; 85:349–360.
organizational justice, does not seem as powerful. Consis-
11. Case C, Young K: Employee internet management: current business
tent with the literature on organizational justice17 and practices and outcomes. Cyberpsychol Behav 2002; 5:355–361.
DWB,9,10 cyberloafing seems to be better cast as an out- 12. Stuller J: Games workers play. Across the Board 1997; 7:16–22.
come, not a cause, of perceived organizational justice.2 13. Xia L, Sudharsham D: Effects of interruptions on consumer online
From a human resource and management perspective, decision processes. J Consumer Psychol 2002; 12:265–280.
14. Greengard S: The high cost of cyberslacking. Workforce 2000;
the results of this study first point to an organization iden- 79(12):22–23.
tifying the “amount” and “type” of cyberloafing among its 15. Blau P: Exchange and Power in Social Life. New York, NY: Wiley; 1964.
employees. Beyond company monitoring of employees’ 16. Homans G: Social Behavior: Its Elementary Forms. New York, NY:
Internet use while at work, an anonymous survey can allow Harcourt, Brace and World; 1961.
for collection of convergent, valid self-report cyberloafing 17. Colquitt J, Conlon D, Wesson M, et al: Justice at the millennium: a
meta-analytic review of 25 years of organizational justice research. J
data. Self-report data have been shown to be valid for other Appl Psychol 2001; 86:425–445.
DWBs such as absenteeism.46 If a company’s typical 18. Campbell D, Fiske D: Convergent and discriminant validity by the
employee policy allows for 30 min/day of normal “break multitrait-multi-method matrix. Psychol Bull 1959; 56:81–105.
time” and 1 hr for lunch, then policies okaying non-work- 19. Herzberg F, Mausner B, Snyderman B: The Motivation to Work. New
related e-mail and “acceptable” browsing during this York, NY: Wiley; 1959.
20. Ashford S, Lee C, Bobko P: Content, causes and consequences of job
normal “down” time may prevent or significantly reduce insecurity: a theory-based measure and substantive test. Acad Manage
subsequent proscribed cyberloafing behavior. It is more J 1989; 32:803–829.
excessive or harmful cyberloafing behaviors, acknowledged 21. Bennett R: Perceived powerlessness as a cause of employee deviance.
in an anonymous survey, that may be indicative of deeper In: Griffin R, O’Leary Kelly A, Collins J, (eds). Dysfunctional Work-
employee concerns about how they are being treated. place Behavior. Greenwich, Conn: JAI Press; 1998:pp 221–239.
22. Giacalone R, Greenberg J: Antisocial Behavior in Organizations. Thou-
To conclude, cyberloafing is and will continue to be an sand Oaks, Calif: Sage; 1997.
ongoing concern for employers where their employees have 23. Sunoo B: This employee may be loafing: can you tell? Should you
convenient Internet access.1,5 This study has suggested a care? Personnel J 1996; 75:54–62.

16 BLAU ET AL., Testing A Measure of Cyberloafing


24. Winefield A, Tiggerman M: Employment status and psychological 36. Keng S, Nah F, Teng L: Acceptable internet use policy. Commun
well-being: longitudinal study. J Appl Psychol 1990; 75:455–459. ACM 2002; 45:75–79.
25. Price J, Mueller C: Absenteeism and Turnover of Hospital Employees. 37. Hollinger R: Neutralizing in the workplace: an empirical analysis of
Greenwich, Conn: JAI Press; 1986. property theft and production deviance. Deviant Behav 1991; 12:
26. Niehoff B, Moorman R: Justice as a mediator of the relationship 169–202.
between methods of monitoring and organizational citizenship 38. Lee K, Allen N: Organizational citizenship behavior and workplace
behavior. Acad Manage J 1993; 36:527–556. deviance: the role of affect and cognitions. J Appl Psychol 2002;
27. American Society of Clinical Pathologists: Research and develop- 87:131–142.
ment committee meeting, October 2002, Washington, DC. 39. Fox S, Spector P: A model of work frustration-aggression. J Organ
28. Nunnally J: Psychometric Theory. New York, NY: McGraw Hill; 1978. Behav 1999; 20:915–931.
29. Ford J, MacCallum R, Tait M: The application of exploratory factor 40. Davis R, Flett G, Besser A: Validation of a new scale for measuring
analysis in applied psychology: a critical review and analysis. Person- problematic internet use: implications for pre-employment screen-
nel Psychol 1986; 39:291–314. ing. Cyberpsychology Behav 2002; 5:331–345.
30. Child D: The Essentials of Factor Analysis. London, England: Holt, 41. O’Leary-Kelly A, Griffin R, Glew D: Organizationally-motivated
Rinehart & Winston; 1970. aggression: a research framework. Acad Manage Rev 1996; 21:225–253.
31. Hinkin T: A review of scale development practices in the study of 42. Bandura A: Aggression: Social Learning Analysis. Englewood Cliffs,
organizations. J Manage 1995; 21:967–988. NJ: Prentice Hall; 1973.
32. Arbuckle J, Wothke W: Amos 4.0 User’s Guide. Chicago, Ill: Small- 43. Bacharach S, Bamberger P, Sonnenstuhl W: Driven to drink: mana-
Waters Corp; 1999. gerial control, work-related risk factors and employee problem drink-
33. Bentler P: Comparative fit indexes in structural models. Psychol Bull ing. Acad Manage J 2002; 45:637–658.
1990; 107:238–246. 44. Jones S: Cybersociety: Computer-Mediated Communication and Com-
34. Browne M, Cudek R: Alternate ways of assessing model fit. In: munity. Newbury Park, CA: Sage; 1995.
Bollen K, Long J (eds). Testing Structural Equations Models. Newbury 45. Warren D: Constructive and destructive deviance in organizations.
Park, Calif: Sage; 1993. Acad Manage Rev 2003; 28:622–632.
35. Cheyne C, Ritter F: Targeting audiences on the internet. Commun 46. Johns G: How often were you absent? A review of the use of self-
ACM 2001; 44:94–98. reported absence data. J Appl Psychol 1994; 79:574–591.

Journal of Allied Health, Spring 2006, Volume 35, Number 1 17

View publication stats

You might also like