324
Views
0
CrossRef citations to date
0
Altmetric
Research Article

How external monitoring can mitigate cyberloafing: understanding the mediating and moderating roles of employees’ self-control

, ORCID Icon &
Received 27 Sep 2021, Accepted 13 Aug 2023, Published online: 28 Aug 2023

References

  • Agarwal, U. 2019. “Impact of Supervisors’ Perceived Communication Style on Subordinate's Psychological Capital and Cyberloafing.” Australasian Journal of Information Systems 23: 1–27. doi:10.3127/ajis.v23i0.1759.
  • Ajzen, I. 1991. “The Theory of Planned Behavior.” Organizational Behavior and Human Decision Processes 50: 179–211. doi:10.1016/0749-5978(91)90020-T.
  • Akers, R. L. 1991. “Self-Control as a General Theory of Crime.” Journal of Quantitative Criminology 7: 201–211. doi:10.1007/BF01268629.
  • Askew, K. L., and J. E. Buckner. 2017. “The Role of the Work Station: Visibility of One’s Computer Screen to Coworkers Influences Cyberloafing Through Self-Efficacy to Hide Cyberloafing.” The Psychologist-Manager Journal 20: 267. doi:10.1037/mgr0000061.
  • Askew, K. L., A. Ilie, J. A. Bauer, D. V. Simonet, J. E. Buckner, and T. A. Robertson. 2018. “Disentangling How Coworkers and Supervisors Influence Employee Cyberloafing: What Normative Information Are Employees Attending To?” Journal of Leadership & Organizational Studies, 154805181881309.
  • Barlow, J. B., M. Warkentin, D. Ormond, and A. Dennis. 2018. “Don’t Even Think About it! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance.” Journal of the Association for Information Systems 19: 689–715. doi:10.17705/1jais.00506.
  • Bellack, A. S., J. Schwartz, and R. H. Rozensky. 1974. “The Contribution of External Control to Self-Control in a Weight Reduction Program.” Journal of Behavior Therapy and Experimental Psychiatry 5: 245–249. doi:10.1016/0005-7916(74)90071-8.
  • Belot, M., and M. Schröder. 2015. “The Spillover Effects of Monitoring: A Field Experiment.” Management Science 62: 37–45. doi:10.1287/mnsc.2014.2089.
  • Bergin, C., and D. A. Bergin. 1999. “Classroom Discipline That Promotes Self-Control.” Journal of Applied Developmental Psychology 20: 189–206. doi:10.1016/S0193-3973(99)00013-1.
  • Brewer, K. T., J. K. Cochran, R. A. Powers, and C. S. Sellers. 2019. “Intimate Partner Violence and the Capacity and Desire for Self-Control.” Deviant Behavior 40: 753–777. doi:10.1080/01639625.2018.1438066.
  • Cenfetelli, R. T., and G. Bassellier. 2009. “Interpretation of Formative Measurement in Information Systems Research.” MIS Quarterly 33: 689–707. doi:10.2307/20650323.
  • Cheng, B., X. Zhou, G. Guo, and K. Yang. 2020. “Perceived Overqualification and Cyberloafing: A Moderated-Mediation Model Based on Equity Theory.” Journal of Business Ethics 164: 565–577. doi:10.1007/s10551-018-4026-8.
  • Cochran, J. K., V. Aleksa, and M. B. Chamlin. 2006. “Self-Restraint: A Study on the Capacity and Desire for Self-Control.” Western Criminology Review 7: 27–40.
  • D'arcy, J., A. Hovav, and D. Galletta. 2009. “User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach.” Information Systems Research 20 (1): 79–98.
  • Diestel, S., W. Rivkin, and K.-H. Schmidt. 2015. “Sleep Quality and Self-Control Capacity as Protective Resources in the Daily Emotional Labor Process: Results from two Diary Studies.” Journal of Applied Psychology 100: 809–827. doi:10.1037/a0038373.
  • Duckworth, A. L., E. P. Shulman, A. J. Mastronarde, S. D. Patrick, J. Zhang, and J. Druckman. 2015. “Will not Want: Self-Control Rather Than Motivation Explains the Female Advantage in Report Card Grades.” Learning and Individual Differences 39: 13–23. doi:10.1016/j.lindif.2015.02.006.
  • Elrehail, H., S. U. Rehman, N. I. Chaudhry, and A. Alzghoul. 2021. “Nexus among Cyberloafing Behavior, job Demands and job Resources: A Mediated-Moderated Model.” Education and Information Technologies 26: 4731–4749. doi:10.1007/s10639-021-10496-1.
  • Fishbach, A., and Y. Trope. 2005. “The Substitutability of External Control and Self-Control.” Journal of Experimental Social Psychology 41: 256–270. doi:10.1016/j.jesp.2004.07.002.
  • Gefen, D., and D. W. Straub. 2005. “A Practical Guide to Factorial Validity Using PLS-Graph: Tutorial and Annotated Example.” Communications of the AIS 16: 91–109.
  • Glassman, J., M. Prosch, and B. B. M. Shao. 2015. “To Monitor or not to Monitor: Effectiveness of a Cyberloafing Countermeasure.” Information & Management 52: 170–182. doi:10.1016/j.im.2014.08.001.
  • Gottfredson, M. R., and T. Hirschi. 1990. A General Theory of Crime. Redwood City, CA: Stanford University Press. doi:10.1515/9781503621794.
  • Hair, J. F., R. L. Tatham, R. E. Anderson, and W. Black. 2006. Multivariate Data Analysis. Upper Saddle River, NJ: Pearson Prentice Hall.
  • Halbesleben, J. R., J.-P. Neveu, S. C. Paustian-Underdahl, and M. Westman. 2014. “Getting to the “COR” Understanding the Role of Resources in Conservation of Resources Theory.” Journal of Management 40: 1334–1364. doi:10.1177/0149206314527130.
  • Hayes, A. F. 2017. Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach. New York, NY: Guilford Publications.
  • Henle, C. A., and A. L. Blanchard. 2008. “The Interaction of Work Stressors and Organizational Sanctions on Cyberloafing.” Journal of Managerial Issues 20 (3): 383–400.
  • Holt, T. J., A. M. Bossler, and D. C. May. 2012. “Low Self-Control, Deviant Peer Associations, and Juvenile Cyberdeviance.” American Journal of Criminal Justice 37: 378–395. doi:10.1007/s12103-011-9117-3.
  • Hulland, J. 1999. “Use of Partial Least Squares (PLS) in Strategic Management Research: A Review of Four Recent Studies.” Strategic Management Journal 20: 195–204. doi:10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7.
  • Jiang, H., M. Siponen, and A. Tsohou. 2023. “Personal use of Technology at Work: A Literature Review and a Theoretical Model for Understanding how it Affects Employee job Performance.” European Journal of Information Systems 32 (2): 331–345.
  • Jiang, H., A. Tsohou, M. Siponen, and Y. Li. 2020. “Examining the Side Effects of Organizational Internet Monitoring on Employees.” Internet Research 30: 1613–1630. doi:10.1108/INTR-08-2019-0360.
  • Kanfer, F. H., and J. Zich. 1974. “Self-control Training: The Effects of External Control on Children's Resistance to Temptation.” Developmental Psychology 10: 108. doi:10.1037/h0035544.
  • Khansa, L., J. Kuem, M. Siponen, and S. S. Kim. 2017. “To Cyberloaf or not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls.” Journal of Management Information Systems 34: 141–176. doi:10.1080/07421222.2017.1297173.
  • Koay, K. Y. 2018. “Workplace Ostracism and Cyberloafing: A Moderated–Mediation Model.” Internet Research 28: 1122–1141. doi:10.1108/IntR-07-2017-0268.
  • Koay, K. Y., P. C. H. Soh, and K. W. Chew. 2017. “Do Employees’ Private Demands Lead to Cyberloafing? The Mediating Role of job Stress.” Management Research Review 40 (9): 1025–1038..
  • Kock, N. 2015. “Common Method Bias in PLS-SEM: A Full Collinearity Assessment Approach.” International Journal of e-Collaboration (Ijec) 11: 1–10.
  • Lades, L. K., and W. Hofmann. 2019. “Temptation, Self-Control, and Inter-Temporal Choice.” Journal of Bioeconomics 21: 47–70. doi:10.1007/s10818-019-09284-2.
  • Lawrence, T. B., and S. L. Robinson. 2007. “Ain't Misbehavin: Workplace Deviance as Organizational Resistance.” Journal of Management 33: 378–394. doi:10.1177/0149206307300816.
  • Lewis, C. C. 1981. “The Effects of Parental Firm Control: A Reinterpretation of Findings.” Psychological Bulletin 90: 547. doi:10.1037/0033-2909.90.3.547.
  • Li, H., X. R. Luo, J. Zhang, and R. Sarathy. 2018. “Self-control, Organizational Context, and Rational Choice in Internet Abuses at Work.” Information & Management 55: 358–367. doi:10.1016/j.im.2017.09.002.
  • Li, H., J. Zhang, and R. Sarathy. 2010. “Understanding Compliance with Internet use Policy from the Perspective of Rational Choice Theory.” Decision Support Systems 48: 635–645. doi:10.1016/j.dss.2009.12.005.
  • Lim, V. K. G. 2002. “The IT way of Loafing on the Job: Cyberloafing, Neutralizing and Organizational Justice.” Journal of Organizational Behavior 23: 675–694. doi:10.1002/job.161.
  • Lim, V. K. G., and D. J. Q. Chen. 2012. “Cyberloafing at the Workplace: Gain or Drain on Work?” Behaviour & Information Technology 31: 343–353. doi:10.1080/01449290903353054.
  • Lowry, P. B., J. D’arcy, B. Hammer, and G. D. Moody. 2016. “‘Cargo Cult’ Science in Traditional Organization and Information Systems Survey Research: A Case for Using Nontraditional Methods of Data Collection, Including Mechanical Turk and Online Panels.” The Journal of Strategic Information Systems 25: 232–240. doi:10.1016/j.jsis.2016.06.002.
  • Lowry, P. B., G. D. Moody, D. F. Galletta, and A. Vance. 2013. “The Drivers in the use of Online Whistle-Blowing Reporting Systems.” Journal of Management Information Systems 30: 153–189.
  • Lowry, P. B., C. Posey, R. B. J. Bennett, and T. L. Roberts. 2015. “Leveraging Fairness and Reactance Theories to Deter Reactive Computer Abuse Following Enhanced Organisational Information Security Policies: An Empirical Study of the Influence of Counterfactual Reasoning and Organisational Trust.” Information Systems Journal 25: 193–230. doi:10.1111/isj.12063.
  • Lowry, P. B., and D. Wilson. 2016. “Creating Agile Organizations Through IT: The Influence of Internal it Service Perceptions on it Service Quality and IT Agility.” Journal of Strategic Information Systems 25.
  • Luqman, A., S. Talwar, A. Masood, and A. Dhir. 2021. “Does Enterprise Social Media use Promote Employee Creativity and Well-Being?” Journal of Business Research 131: 40–54. doi:10.1016/j.jbusres.2021.03.051.
  • Mason, W., and S. Suri. 2012. “Conducting Behavioral Research on Amazon’s Mechanical Turk.” Behavior Research Methods 44: 1–23. doi:10.3758/s13428-011-0124-6.
  • Moffitt, T. E., L. Arseneault, D. Belsky, N. Dickson, R. J. Hancox, H. Harrington, R. Houts, et al. 2011. “A Gradient of Childhood Self-Control Predicts Health, Wealth, and Public Safety.” Proceedings of the National Academy of Sciences 108: 2693–2698. doi:10.1073/pnas.1010076108.
  • Moody, G. D., and M. Siponen. 2013. “Using the Theory of Interpersonal Behavior to Explain non-Work-Related Personal use of the Internet at Work.” Information & Management 50: 322–335. doi:10.1016/j.im.2013.04.005.
  • Nusrat, A., Y. He, A. Luqman, A. Waheed, and A. Dhir. 2021. “Enterprise Social Media and Cyber-Slacking: A Kahn’s Model Perspective.” Information & Management 58: 103405. doi:10.1016/j.im.2020.103405.
  • O’Neill, T. A., L. A. Hambley, and A. Bercovich. 2014. “Prediction of Cyberslacking When Employees are Working Away from the Office.” Computers in Human Behavior 34: 291–298. doi:10.1016/j.chb.2014.02.015.
  • Page, D. 2015. “Teachers’ Personal web use at Work.” Behaviour & Information Technology 34: 443–453. doi:10.1080/0144929X.2014.928744.
  • Pierce, L., D. C. Snow, and A. Mcafee. 2015. “Cleaning House: The Impact of Information Technology Monitoring on Employee Theft and Productivity.” Management Science 61 (10): 2299–2319.
  • Piquero, A. R., and J. A. Bouffard. 2007. “Something old, Something new: A Preliminary Investigation of Hirschi’s Redefined Self-Control.” Justice Quarterly 24: 1–27. doi:10.1080/07418820701200935.
  • Posey, C., B. Bennett, T. Roberts, and P. B. Lowry. 2011. “When Computer Monitoring Backfires: Invasion of Privacy and Organizational Injustice as Precursors to Computer Abuse.” Journal of Information System Security 7: 24–47.
  • Posey, C., T. Roberts, and P. B. Lowry. 2015. “The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets.” Journal of Management Information Systems 32: 179–214. doi:10.1080/07421222.2015.1138374.
  • Pratt, T. C., and F. T. Cullen. 2000. “The Empirical Status of Gottfredson and Hirschi's General Theory of Crime: A Meta-Analysis.” Criminology; An interdisciplinary Journal 38: 931–964. doi:10.1111/j.1745-9125.2000.tb00911.x.
  • Qian, Y., and H. Jiang. 2023. “The Impacts of Within-Task and Between-Task Personal Internet Usage on Employee Creative Performance: The Moderating Role of Perceived Organisational Support.” Internet Research. doi:10.1108/INTR-09-2022-0751.
  • Restubog, S. L. D., P. R. J. M. Garcia, L. S. Toledano, R. K. Amarnani, L. R. Tolentino, and R. L. Tang. 2011. “Yielding to (Cyber)-Temptation: Exploring the Buffering Role of Self-Control in the Relationship Between Organizational Justice and Cyberloafing Behavior in the Workplace.” Journal of Research in Personality 45: 247–251. doi:10.1016/j.jrp.2011.01.006.
  • Roberts, N., D. E. Campbell, and L. R. Vijayasarathy. 2016. “Using Information Systems to Sense Opportunities for Innovation: Integrating Postadoptive use Behaviors with the Dynamic Managerial Capability Perspective.” Journal of Management Information Systems 33: 45–69. doi:10.1080/07421222.2016.1172452.
  • Schwarz, A., T. Rizzuto, C. Carraher-Wolverton, J. L. Rold N, and R. Barrera-Barrera. 2017. “Examining the Impact and Detection of the Urban Legend of Common Method Bias.” DATABASE for Advances in Information Systems 48: 93–119. doi:10.1145/3051473.3051479.
  • Schwarzer, R., M. Diehl, and G. S. Schmitz. 1999. “Self-regulation.” Berlin: Freie Universtitat Berlin. Pridobljeno 20: 2007.
  • Sheikh, A., A. Aghaz, and M. Mohammadi. 2019. “Cyberloafing and Personality Traits: An Investigation among Knowledge-Workers Across the Iranian Knowledge-Intensive Sectors.” Behaviour & Information Technology 38: 1213–1224. doi:10.1080/0144929X.2019.1580311.
  • Sokol-Katz, J., R. Dunham, and R. Zimmerman. 1997. “Family Structure Versus Parental Attachment in Controlling Adolescent Deviant Behavior: A Social Control Model.” Adolescence 32: 199–215.
  • Stanton, J. M., and E. M. Weiss. 2000. “Electronic Monitoring in Their own Words: An Exploratory Study of Employees’ Experiences with new Types of Surveillance.” Computers in Human Behavior 16: 423–440. doi:10.1016/S0747-5632(00)00018-2.
  • Tandon, A., A. Dhir, I. Almugren, G. N. AlNemer, and M. Mäntymäki. 2021a. “Fear of Missing out (FoMO) among Social Media Users: A Systematic Literature Review, Synthesis and Framework for Future Research.” Internet Research 31 (3): 782–821.
  • Tandon, A., A. Dhir, N. Islam, S. Talwar, and M. Mäntymäki. 2021b. “Psychological and Behavioral Outcomes of Social Media-Induced Fear of Missing out at the Workplace.” Journal of Business Research 136: 186–197. doi:10.1016/j.jbusres.2021.07.036.
  • Tandon, A., A. Dhir, S. Talwar, P. Kaur, and M. Mäntymäki. 2022a. “Social Media Induced Fear of Missing out (FoMO) and Phubbing: Behavioural, Relational and Psychological Outcomes.” Technological Forecasting and Social Change 174: 121149. doi:10.1016/j.techfore.2021.121149.
  • Tandon, A., P. Kaur, N. Ruparel, J. U. Islam, and A. Dhir. 2022b. “Cyberloafing and Cyberslacking in the Workplace: Systematic Literature Review of Past Achievements and Future Promises.” Internet Research 32 (1): 55–89.
  • Tittle, C. R., D. A. Ward, and H. G. Grasmick. 2004. “Capacity for Self-Control and Individuals’ Interest in Exercising Self-Control.” Journal of Quantitative Criminology 20: 143–172. doi:10.1023/B:JOQC.0000029092.81837.74.
  • Tønnessen, Ø, A. Dhir, and B.-T. Flåten. 2021. “Digital Knowledge Sharing and Creative Performance: Work from Home During the COVID-19 Pandemic.” Technological Forecasting and Social Change 170: 120866. doi:10.1016/j.techfore.2021.120866.
  • Usman, M., U. Javed, A. Shoukat, and N. A. Bashir. 2021. “Does Meaningful Work Reduce Cyberloafing? Important Roles of Affective Commitment and Leader-Member Exchange.” Behaviour & Information Technology 40: 206–220. doi:10.1080/0144929X.2019.1683607.
  • Vance, A., P. B. Lowry, and D. Eggett. 2015. “Increasing Accountability Through User-Interface Design Artifacts.” MIS Quarterly 39: 345–366. doi:10.25300/MISQ/2015/39.2.04.
  • Wagner, D. T., C. M. Barnes, V. K. Lim, and D. L. Ferris. 2012. “Lost Sleep and Cyberloafing: Evidence from the Laboratory and a Daylight Saving Time Quasi-Experiment.” Journal of Applied Psychology 97: 1068. doi:10.1037/a0027557.
  • Wu, J., M. Song, P. Zoghbi-Manrique-de-Lara, H. Jiang, S. Guo, and W. Zhang. 2023. “Why Cyberloafing Can be Socially Learned in the Workplace: The Role of Employees’ Perceived Certainty of Formal and Informal Sanctions.” Information Technology & People 36 (4): 1603–1625.
  • Yousaf, S., M. I. Rasheed, P. Kaur, N. Islam, and A. Dhir. 2022. “The Dark Side of Phubbing in the Workplace: Investigating the Role of Intrinsic Motivation and the use of Enterprise Social Media (ESM) in a Cross-Cultural Setting.” Journal of Business Research 143: 81–93. doi:10.1016/j.jbusres.2022.01.043.
  • Zhang, Y., S.-C. Huang, and S. M. Broniarczyk. 2010. “Counteractive Construal in Consumer Goal Pursuit.” Journal of Consumer Research 37: 129–142. doi:10.1086/649912.
  • Zhang, H., H. Zhao, J. Liu, Y. Xu, and H. Lu. 2015. “The Dampening Effect of Employees’ Future Orientation on Cyberloafing Behaviors: The Mediating Role of Self-Control.” Frontiers in Psychology 6: 1482.
  • Zoghbi-Manrique-De-Lara, P., and A. Olivares-Mesa. 2010. “Bringing Cyber Loafers Back on the Right Track.” Industrial Management & Data Systems 110: 1038–1053. doi:10.1108/02635571011069095.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.