Location
CBM 149
Start Date
15-11-2019 9:00 AM
Presentation Type
Podium
Department
Management and Marketing
Session
Session 1
Description
As technology permeates every aspect of our lives, employees are increasingly using technology for personal purposes during office hours. The largest proportion of non-work-related activities at work is spent using technologies on activities such as responding to emails on a personal email account, checking friends’ Facebook updates, reading sports or news, and paying bills online. While practitioners have been wrestling with cyberloafing prevalent in the workplace, research on the matter has grown exponentially over the last decade. Despite the growing empirical evidence, lacking is an integrated understanding of the phenomenon. In order for this area of inquiry to develop into a strong program and thus provide more useful advice to practitioners, a framework is needed to integrate the literature and provide a clear agenda for future research. Therefore, the aim of this paper is to provide a comprehensive review of literature on cyberloafing that can guide future research.
Included in
A Review on Cyberloafing
CBM 149
As technology permeates every aspect of our lives, employees are increasingly using technology for personal purposes during office hours. The largest proportion of non-work-related activities at work is spent using technologies on activities such as responding to emails on a personal email account, checking friends’ Facebook updates, reading sports or news, and paying bills online. While practitioners have been wrestling with cyberloafing prevalent in the workplace, research on the matter has grown exponentially over the last decade. Despite the growing empirical evidence, lacking is an integrated understanding of the phenomenon. In order for this area of inquiry to develop into a strong program and thus provide more useful advice to practitioners, a framework is needed to integrate the literature and provide a clear agenda for future research. Therefore, the aim of this paper is to provide a comprehensive review of literature on cyberloafing that can guide future research.