1,027
Views
29
CrossRef citations to date
0
Altmetric
Original Articles

Cyberloafing and personality traits: an investigation among knowledge-workers across the Iranian knowledge-intensive sectors

, &
Pages 1213-1224 | Received 05 Sep 2016, Accepted 29 Jan 2019, Published online: 07 Mar 2019

References

  • Aghaz, A., and A. Sheikh. 2016. “Cyberloafing and Job Burnout: An Investigation in the Knowledge-Intensive Sector.” Computers in Human Behavior 62: 51–60.
  • Alvesson, M. 2011. “De-Essentializing the Knowledge Intensive Firm: Reflections on Sceptical Research Going Against the Mainstream.” Journal of Management Studies 48 (7): 1640–1661.
  • Amichai-Hamburger, Y., and G. Vinitzky. 2010. “Social Network Use and Personality.” Computers in Human Behavior 26 (6): 1289–1295.
  • Barrick, M. R., M. K. Mount, and N. Li. 2013. “The Theory of Purposeful Work Behavior: The Role of Personality, Higher-Order Goals, and Job Characteristics.” Academy of Management Review 38 (1): 132–153.
  • Belanger, F., and C. Van Slyke. (2002). “Abuse or Learning?” Communications of the ACM 45 (1): 64–65.
  • Belk, R. W. 2013. “Extended Self in a Digital World.” Journal of Consumer Research 40 (3): 477–500.
  • Berry, C. M., N. C. Carpenter, and C. L. Barratt. 2012. “Do Other-Reports of Counterproductive Work Behavior Provide an Incremental Contribution Over Self-Reports?” A Meta-Analytic Comparison. Journal of Applied Psychology 97 (3): 613.
  • Berry, C. M., D. S. Ones, and P. R. Sackett. 2007. “Interpersonal Deviance, Organizational Deviance, and Their Common Correlates: A Review and Meta-Analysis.” Journal of Applied Psychology 92 (2): 410.
  • Blanchard, A. L., and C. A. Henle. 2008. “Correlates of Different Forms of Cyberloafing: The Role of Norms and External Locus of Control.” Computers in Human Behavior 24 (3): 1067–1084.
  • Bolton, L. R., L. K. Becker, and L. K. Barber. 2010. “Big Five Trait Predictors of Differential Counterproductive Work Behavior Dimensions.” Personality and Individual Differences 49 (5): 537–541.
  • Borghans, L., B. H. H. Golsteyn, J. Heckman, and J. E. Humphries. 2011. “Identification Problems in Personality Psychology.” Personality and Individual Differences 51 (3): 315–320.
  • Bowling, N. A., and K. J. Eschleman. 2010. “Employee Personality as a Moderator of the Relationships Between Work Stressors and Counterproductive Work Behavior.” Journal of Occupational Health Psychology 15 (1): 91.
  • Buckner, J. E., C. M. Castille, and T. L. Sheets. 2012. “The Five Factor Model of Personality and Employees’ Excessive use of Technology.” Computers in Human Behavior 28 (5): 1947–1953.
  • Caplan, S. E. 2002. “Problematic Internet use and Psychosocial Well-Being: Development of a Theory-Based Cognitive–Behavioral Measurement Instrument.” Computers in Human Behavior 18 (5): 553–575.
  • Chudzikowski, K., G. Fink, W. Mayrhofer, and L. A. Migliore. 2011. “Relation Between Big Five Personality Traits and Hofstede’s Cultural Dimensions: Samples From the USA and India.” Cross Cultural Management: An International Journal 18 (1): 38–54.
  • Colbert, A. E., M. K. Mount, J. K. Harter, L. A. Witt, and M. R. Barrick. 2004. “Interactive Effects of Personality and Perceptions of the Work Situation on Workplace Deviance.” Journal of Applied Psychology 89 (4): 599.
  • Collins, J., and D. K. Cooke. 2013. “Creative Role Models, Personality and Performance.” Journal of Management Development 32 (4): 336–350.
  • Correa, T., A. W. Hinsley, and H. G. De Zuniga. (2010). “Who Interacts on the Web?: The Intersection of Users’ Personality and Social Media Use.” Computers in Human Behavior 26 (2): 247–253.
  • Cullen, M. J., and P. R. Sackett. 2003. “Personality and Counterproductive Workplace Behavior.” Personality and Work: Reconsidering the Role of Personality in Organizations 14 (2): 150–182.
  • Erdheim, J., M. Wang, and M. J. Zickar. 2006. “Linking the Big Five Personality Constructs to Organizational Commitment.” Personality and Individual Differences 41 (5): 959–970.
  • Ferris, D. L., D. J. Brown, and D. Heller. 2009. “Organizational Supports and Organizational Deviance: The Mediating Role of Organization-Based Self-Esteem.” Organizational Behavior and Human Decision Processes 108 (2): 279–286.
  • Ferris, D. L., R. E. Johnson, C. C. Rosen, and J. A. Tan. 2012. “Core Self-Evaluations a Review and Evaluation of the Literature.” Journal of Management 38 (1): 81–128.
  • George, L. G., R. Helson, and O. P. John. 2011. “The “CEO” of Women’s Work Lives: How Big Five Conscientiousness, Extraversion, and Openness Predict 50 Years of Work Experiences in a Changing Sociocultural Context.” Journal of Personality and Social Psychology 101 (4): 812.
  • Ghorpade, J., J. Lackritz, and G. Singh. 2007. “Burnout and Personality Evidence From Academia.” Journal of Career Assessment 15 (2): 240–256.
  • Glassman, J., M. Prosch, and B. B. M. Shao. 2015. “To Monitor or not to Monitor: Effectiveness of a Cyberloafing Countermeasure.” Information & Management 52 (2): 170–182.
  • Guadagno, R. E., B. M. Okdie, and C. A. Eno. 2008. “Who Blogs? Personality Predictors of Blogging.” Computers in Human Behavior 24 (5): 1993–2004.
  • Henle, C. A. 2005. “Predicting Workplace Deviance From the Interaction Between Organizational Justice and Personality.” Journal of Managerial Issues 17 (2): 247–263.
  • Henle, C. A., and A. L. Blanchard. 2008. “The Interaction of Work Stressors and Organizational Sanctions on Cyberloafing.” Journal of Managerial Issues 20 (3): 383–400.
  • Hirschi, A., B. Lee, E. J. Porfeli, and F. W. Vondracek. 2013. “Proactive Motivation and Engagement in Career Behaviors: Investigating Direct, Mediated, and Moderated Effects.” Journal of Vocational Behavior 83 (1): 31–40.
  • Jia, H., R. Jia, and S. Karau. 2013. “Cyberloafing and Personality: The Impact of the Big Five Traits and Workplace Situational Factors.” Journal of Leadership & Organizational Studies 20 (3): 358–365.
  • Jian, G. 2013. “Understanding the Wired Workplace: The Effects of Job Characteristics on Employees’ Personal Online Communication at Work.” Communication Research Reports 30 (1): 22–33.
  • John, O. P., E. M. Donahue, and R. L. Kentle. 1991. The big five inventory—versions 4a and 54. Berkeley, CA: Berkeley Institute of Personality and Social Research, University of California.
  • Judge, T. A., A. Erez, J. E. Bono, and C. J. Thoresen. 2002. “Are Measures of Self-Esteem, Neuroticism, Locus of Control, and Generalized Self-Efficacy Indicators of a Common Core Construct?” Journal of Personality and Social Psychology 83 (3): 693.
  • Judge, T. A., J. A. LePine, and B. L. Rich. 2006. “Loving Yourself Abundantly: Relationship of the Narcissistic Personality to Self-and Other Perceptions of Workplace Deviance, Leadership, and Task and Contextual Performance.” Journal of Applied Psychology 91 (4): 762.
  • Kalshoven, K., D. N. Den Hartog, and A. H. B. De Hoogh. (2011). “Ethical Leader Behavior and Big Five Factors of Personality.” Journal of Business Ethics 100 (2): 349–366.
  • Kanfer, R., C. R. Wanberg, and T. M. Kantrowitz. 2001. “Job Search and Employment: A Personality–Motivational Analysis and Meta-Analytic Review.” Journal of Applied Psychology 86 (5): 837.
  • Kanungo, R. N., and M. Mendonca. 2001. “Ethical Leadership and Governance in Organizations: A Preamble.” Canadian Journal of Administrative Sciences 18 (4): 241.
  • Kim, K., M. del Carmen Triana, K. Chung, and N. Oh. 2016. “When do Employees Cyberloaf? An Interactionist Perspective Examining Personality, Justice, and Empowerment.” Human Resource Management 55 (6): 1041–1058.
  • Kinnie, N., and J. Swart. 2012. “Committed to Whom? Professional Knowledge Worker Commitment in Cross-Boundary Organisations.” Human Resource Management Journal 22 (1): 21–38.
  • Kluemper, D. H., B. D. McLarty, and M. N. Bing. 2015. “Acquaintance Ratings of the Big Five Personality Traits: Incremental Validity Beyond and Interactive Effects with Self-Reports in the Prediction of Workplace Deviance.” Journal of Applied Psychology 100 (1): 237.
  • Kühnel, J., H. Zacher, J. De Bloom, and R. Bledow. (2017). “Take a Break! Benefits of Sleep and Short Breaks for Daily Work Engagement.” European Journal of Work and Organizational Psychology 26 (4): 481–491.
  • Leutner, F., G. Ahmetoglu, R. Akhtar, and T. Chamorro-Premuzic. 2014. “The Relationship Between the Entrepreneurial Personality and the Big Five Personality Traits.” Personality and Individual Differences 63: 58–63.
  • Li, S. M., and T. M. Chung. 2006. “Internet Function and Internet Addictive Behavior.” Computers in Human Behavior 22 (6): 1067–1071.
  • Liberman, B., G. Seidman, K. Y. Mckenna, and L. E. Buffardi. 2011. “Employee Job Attitudes and Organizational Characteristics as Predictors of Cyberloafing.” Computers in Human Behavior 27 (6): 2192–2199.
  • Lim, V. K. G. 2002. “The IT way of Loafing on the job: Cyberloafing, Neutralizing and Organizational Justice.” Journal of Organizational Behavior 694 (April): 675–694.
  • Lim, V. K. G., and D. J. Q. Chen. 2012. “Cyberloafing at the Workplace: Gain or Drain on Work?” Behaviour & Information Technology 31 (4): 343–353.
  • Lim, V. K. G., and T. S. H. Teo. 2005. “Prevalence, Perceived Seriousness, Justification and Regulation of Cyberloafing in Singapore.” Information & Management 42 (8): 1081–1093.
  • Mahatanankoon, P., M. Anandarajan, and M. Igbaria. 2004. “Development of a Measure of Personal Web Usage in the Workplace.” Cyberpsychology & Behavior : The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society 7 (1): 93–104.
  • Marcus, B., and H. Schuler. 2004. “Antecedents of Counterproductive Behavior at Work: A General Perspective.” Journal of Applied Psychology 89 (4): 647.
  • Matte, F., and F. Cooren. 2015. “Learning as Dialogue: An “On-the-Go” Approach to Dealing with Organizational Tensions.” In Francophone Perspectives of Learning Through Work, 169–187. Cham: Springer.
  • McLean, L., M. Tingley, R. N. Scott, and J. Rickards. 2001. “Computer Terminal Work and the Benefit of Microbreaks.” Applied Ergonomics 32 (3): 225–237.
  • O’Neill, T. A., L. A. Hambley, and G. S. Chatellier. 2014. “Cyberslacking, Engagement, and Personality in Distributed Work Environments.” Computers in Human Behavior 40: 152–160.
  • Ones, D. S., C. Viswesvaran, and S. Dilchert. 2005. “Cognitive Ability in Selection Decisions.” In Handbook of Understanding and Measuring Intelligence, edited by O. Wilhelm and R. W. Engle, 431–468. California: Sage Publications.
  • Ozer, D. J., and V. Benet-Martinez. 2006. “Personality and the Prediction of Consequential Outcomes.” Annual Review of Psychology 57: 401–421.
  • Panaccio, A., and C. Vandenberghe. 2012. “Five-factor Model of Personality and Organizational Commitment: The Mediating Role of Positive and Negative Affective States.” Journal of Vocational Behavior 80 (3): 647–658.
  • Peters, M. L., G. L. R. Godaert, R. E. Ballieux, and C. J. Heijnen. 2003. “Moderation of Physiological Stress Responses by Personality Traits and Daily Hassles: Less Flexibility of Immune System Responses.” Biological Psychology 65 (1): 21–48.
  • Pierce, J. L., and D. G. Gardner. 2009. “Relationships of Personality and Job Characteristics with Organization-Based Self-Esteem.” Journal of Managerial Psychology 24 (5): 392–409.
  • Ramayah, T. 2010. “Personal Web Usage and Work Inefficiency.” Business Strategy Series 11 (5): 295–301.
  • Restubog, S. L. D., P. R. J. M. Garcia, L. S. Toledano, R. K. Amarnani, L. R. Tolentino, and R. L. Tang. 2011. “Yielding to (Cyber)-Temptation: Exploring the Buffering Role of Self-Control in the Relationship Between Organizational Justice and Cyberloafing Behavior in the Workplace.” Journal of Research in Personality 45 (2): 247–251.
  • Roberts, B. W. 2006. “Personality Development and Organizational Behavior.” Research in Organizational Behavior 27: 1–40.
  • Ross, C., E. S. Orr, M. Sisic, J. M. Arseneault, M. G. Simmering, and R. R. Orr. 2009. “Personality and Motivations Associated with Facebook Use.” Computers in Human Behavior 25 (2): 578–586.
  • Salgado, J. F. 2002. “The Big Five Personality Dimensions and Counterproductive Behaviors.” International Journal of Selection and Assessment 10: 117–125.
  • Sanders, B. A. 2008. “Using Personality Traits to Predict Police Officer Performance.” Policing: An International Journal of Police Strategies & Management 31 (1): 129–147.
  • Schmitt, D. P., J. Allik, R. R. McCrae, and V. Benet-Martínez. 2007. “The Geographic Distribution of Big Five Personality Traits Patterns and Profiles of Human Self-Description Across 56 Nations.” Journal of Cross-Cultural Psychology 38 (2): 173–212.
  • Sheikh, A., M. S. Atashgah, and M. Adibzadegan. 2015. “The Antecedents of Cyberloafing: A Case Study in an Iranian Copper Industry.” Computers in Human Behavior 51: 172–179.
  • Shiner, R. L., A. S. Masten, and A. Tellegen. 2002. “A Developmental Perspective on Personality in Emerging Adulthood: Childhood Antecedents and Concurrent Adaptation.” Journal of Personality and Social Psychology 83 (5): 1165.
  • Stanton, J. M. 2002. “Company Profile of the Frequent Internet User.” Communications of the ACM 45 (1): 55–59.
  • Taylor, S. G., and D. H. Kluemper. 2012. “Linking Perceptions of Role Stress and Incivility to Workplace Aggression: the Moderating Role of Personality.” Journal of Occupational Health Psychology 17 (3): 316.
  • Tepper, B. J., M. K. Duffy, and J. D. Shaw. 2001. “Personality Moderators of the Relationship Between Abusive Supervision and Subordinates’ Resistance.” Journal of Applied Psychology 86 (5): 974.
  • Tett, R. P., and D. D. Burnett. 2003. “A Personality Trait-Based Interactionist Model of Job Performance.” Journal of Applied Psychology 88 (3): 500.
  • Thalmayer, A. G., and G. Saucier. 2014. “The Questionnaire Big Six in 26 Nations: Developing Cross-Culturally Applicable Big Six, Big Five and Big Two Inventories.” European Journal of Personality 28 (5): 482–496.
  • Treviño, L. K., M. Brown, and L. P. Hartman. 2003. “A Qualitative Investigation of Perceived Executive Ethical Leadership: Perceptions From Inside and Outside the Executive Suite.” Human Relations 56 (1): 5–37.
  • Van Dijck, J. 2013. The Culture of Connectivity: A Critical History of Social Media. Oxford: Oxford University Press.
  • van Doorn, O. N. 2011. Cyberloafing: A Multi-Dimensional Construct Placed in a Theoretical Framework. Eindhoven: University of Eindhoven.
  • Vitak, J., J. Crouse, and R. LaRose. 2011. “Personal Internet use at Work: Understanding Cyberslacking.” Computers in Human Behavior 27 (5): 1751–1759.
  • Wang, J., J. Tian, and Z. Shen. 2013. “The Effects and Moderators of Cyber-Loafing Controls: An Empirical Study of Chinese Public Servants.” Information Technology and Management 14 (4): 269–282.
  • Weatherbee, T. G. 2010. “Counterproductive use of Technology at Work: Information & Communications Technologies and Cyberdeviancy.” Human Resource Management Review 20 (1): 35–44.
  • Williamson, J. M., A. E. Pemberton, and J. W. Lounsbury. 2008. “Personality Traits of Individuals in Different Specialties of Librarianship.” Journal of Documentation 64 (2): 273–286.
  • Yellowlees, P. M., and S. Marks. 2007. “Problematic Internet use or Internet Addiction?” Computers in Human Behavior 23 (3): 1447–1453.
  • Young, K. 2010. “Policies and Procedures to Manage Employee Internet Abuse.” Computers in Human Behavior 26 (6): 1467–1471.
  • Zweig, D., and J. Webster. 2004. “What are We Measuring? An Examination of the Relationships Between the Big-Five Personality Traits, Goal Orientation, and Performance Intentions.” Personality and Individual Differences 36 (7): 1693–1708.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.