The Good, Bad and Ugly Sides of Internet Usage in the Workplace
Objective: Computer was designed to help in human daily activities especially in replacing typewriter, a common tool in most offices. The purpose of this paper is to identify positive and negative effect of Internet usage, as well as its factors and impacts.
Methodology: Reviews of articles are retrieved from databases of SCOPUS and Science Direct from 2006 to 2016.
Results: Many people misuse the Internet for personal usage especially during working hours and it known as cyberloafing.
Implication: Computer is used together with internet in the world of information technology for faster communication after 2000s. Internet and social media can improve work performance especially in marketing and communication. However, the misuse of internet had caused cyberloafing issues due to ease of access. Mostly, it is related to factors such as personality-related factors, organizational-related factors, and work-related factors.
Article Analytics Summary
Al-shuaibi, A. S. I., Subramaniam, C., & Mohd Shamsudin, F. (2014). The Mediating Influence of Job Satisfaction on the Relationship between HR practices and Cyber deviance. Journal of Marketing and Management, 5(1), 105–119. http://doi.org/10.1017/jmo.2014.50 DOI: https://doi.org/10.1017/jmo.2014.50
Alshuaibi, A. S. I., Mohd Shamsudin, F., & Alshuaibi, M. S. I. (2015). Internet misuse at work in Jordan: Challenges and implications. In Faridahwati Mohd. Shamsudin & Ahmad Said Abrahim Alshuaibi (Ed.), Proceedings of the 3rd convention of the world association of business schools (WAiBS) 2015: Enhancing Productivity and sustainability (pp. 68–78). Universiti Utara Malaysia. Retrieved from http://3rd.waibs.org/images/Proceedingsof3rdWAiBS2015.pdf#page=68
Anandarajan, M., Simmers, C., & Igbaria, M. (2000). An exploratory investigation of the antecedents and impact of internet usage: An individual perspective. Behaviour & Information Technology, 19(1), 69–85. http://doi.org/10.1080/014492900118803 DOI: https://doi.org/10.1080/014492900118803
Andreassen, C. S., Torsheim, T., & Pallesen, S. (2014). Predictors of use of social network sites at work - a specific type of cyberloafing. Journal of Computer-Mediated Communication, 19(4), 906–921. http://doi.org/10.1111/jcc4.12085 DOI: https://doi.org/10.1111/jcc4.12085
Banerjee, P., & Singh, S. (2015). Managers’ perspectives on the effects of online grapevine communication: A qualitative inquiry. The Qualitative Report, 20(6), 765–779. Retrieved from http://www.nova.edu/ssss/QR/QR20/6/singh3.pdf
Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing: The role of norms and external locus of control. Computers in Human Behavior, 24, 1067–1084. http://doi.org/10.1016/j.chb.2007.03.008 DOI: https://doi.org/10.1016/j.chb.2007.03.008
Christopherson, K. M. (2007). The positive and negative implications of anonymity in internet social interactions: “On the internet, nobody knows you’re a dog”. Computers in Human Behavior, 23, 3038–3056. http://doi.org/10.1016/j.chb.2006.09.001 DOI: https://doi.org/10.1016/j.chb.2006.09.001
Edosomwan, S., Prakasan, S. K., Kouame, D., Watson, J., & Seymour, T. (2011). The History of Social Media and its Impact on Business. The Journal of Applied Management and Enterpreneurship, 16(3), 79–91. Retrieved from http://search.proquest.com.eproxy.ucd.ie/docview/889143980
Hart, J., Nailling, E., Bizer, G. Y., & Collins, C. K. (2015). Attachment theory as a framework for explaining engagement with Facebook. Personality and Individual Differences, 77, 33–40. http://doi.org/10.1016/j.paid.2014.12.016 DOI: https://doi.org/10.1016/j.paid.2014.12.016
Jia, R., & Jia, H. H. (2015). An individual trait-based investigation of employee cyberloafing. Journal of Information Technology Management, XXVI(1), 58–71.
Kashyap, A. K. (2015). Cyber stalking threat to networking & legal issues in Indian cyber law. International Journal of Research, 2(4), 945–953. Retrieved from http://www.internationaljournalofresearch.org/index.php/ijr/article/view/1886
Kidwell, R. E. (2010). Loafing in the 21st century: Enhanced opportunities-and remedies-for withholding job effort in the new workplace. Business Horizons, 53(6), 543–552. http://doi.org/10.1016/j.bushor.2010.06.001 DOI: https://doi.org/10.1016/j.bushor.2010.06.001
Kim, Y., Sohn, D., & Choi, S. M. (2011). Cultural difference in motivations for using social network sites: A comparative study of American and Korean college students. Computers in Human Behavior, 27(1), 365–372. http://doi.org/10.1016/j.chb.2010.08.015 DOI: https://doi.org/10.1016/j.chb.2010.08.015
Liberman, B., Seidman, G., McKenna, K. Y. A., & Buffardi, L. E. (2011). Employee job attitudes and organizational characteristics as predictors of cyberloafing. Computers in Human Behavior, 27, 2192–2199. http://doi.org/10.1016/j.chb.2011.06.015 DOI: https://doi.org/10.1016/j.chb.2011.06.015
Lim, V. K. G., & Chen, D. J. Q. (2012). Cyberloafing at the workplace: gain or drain on work? Behaviour & Information Technology, 31(4), 343–353. http://doi.org/10.1080/01449290903353054 DOI: https://doi.org/10.1080/01449290903353054
Lu, H.-P., & Yang, Y.-W. (2014). Toward an understanding of the behavioral intention to use a social networking site: An extension of task-technology fit to social-technology fit. Computers in Human Behavior, 34, 323–332. http://doi.org/10.1016/j.chb.2013.10.020 DOI: https://doi.org/10.1016/j.chb.2013.10.020
Mahatanankoon, P., Anandarajan, M., & Igbaria, M. (2004). Development of a measure of personal web usage in the workplace. Cyber Psychology & Behavior, 7(1), 93–104. DOI: https://doi.org/10.1089/109493104322820165
Miles, J. A. (2012). Management and organization theory. The Jossey-Bass Business & Management Series. San Francisco: Jossey-Bass. http://doi.org/10.1017/CBO9781107415324.004 DOI: https://doi.org/10.1017/CBO9781107415324.004
Miniwatts Marketing Group. (2016). Internet users in the world by regions June 2016. Retrieved November 7, 2016, from http://www.internetworldstats.com/stats.htm
Mishra, M., & Pandey, S. (2014). A theoretical model on the determinants of workplace deviance among employees in the public service organizations of India. International Journal of Business Behavior, 2(3), 1321–1337.
Moody, G. (2011). A multi-theoretical perspective on IS security behaviors. University of Oulu. Linnanmaa: University of Oulu.
Ngai, E. W. T., Tao, S. S. C., & Moon, K. K. L. (2015). Social media research: Theories, constructs, and conceptual frameworks. International Journal of Information Management, 35(1), 33–44. http://doi.org/10.1016/j.ijinfomgt.2014.09.004 DOI: https://doi.org/10.1016/j.ijinfomgt.2014.09.004
O’Neill, T. A., Hambley, L. a., & Chatellier, G. S. (2014). Cyberslacking, engagement, and personality in distributed work environments. Computers in Human Behavior, 40, 152–160. http://doi.org/10.1016/j.chb.2014.08.005 DOI: https://doi.org/10.1016/j.chb.2014.08.005
Pew Research Center. (2016). Social media usage: 2005-2015. Retrieved July 1, 2016, from http://www.pewinternet.org/2015/10/08/social-networking-usage-2005-2015/
Ramayah, T. (2010). Personal web usage and work inefficiency. Business Strategy Series, 11(5), 295–301. http://doi.org/10.1108/17515631011080704 DOI: https://doi.org/10.1108/17515631011080704
Robinson, S. L., & Bennett, R. J. (1995). A typology of deviant workplace behaviors: A multidimensional scaling study. Academy of Management Journal, 38(2), 555–572. http://doi.org/10.2307/256693 DOI: https://doi.org/10.5465/256693
Vitak, J., Crouse, J., & LaRose, R. (2011). Personal Internet use at work: Understanding cyberslacking. Computers in Human Behavior, 27(5), 1751–1759. http://doi.org/10.1016/j.chb.2011.03.002 DOI: https://doi.org/10.1016/j.chb.2011.03.002
CSRC Publishing and JBSEE adhere to Creative Commons Attribution-Non Commercial 4.0 International License. The authors submitting and publishing in JBSEE agree to the copyright policy under creative common license 4.0 (Attribution-Non Commercial 4.0 International). Under this license, the authors published in JBSEE retain the copyright including publishing rights of their scholarly work and agree to let others remix, tweak, and build upon their work non-commercially. All other authors using the content of SBSEE are required to cite author(s) and publisher in their work. CSRC Publishing and JBSEE follow an Open Access Policy for copyright and licensing.