Next Article in Journal
Modelling the Relationship between the Nature of Work Factors and Driving Performance Mediating by Role of Fatigue
Next Article in Special Issue
How Are Techno-Stressors Associated with Mental Health and Work Outcomes? A Systematic Review of Occupational Exposure to Information and Communication Technologies within the Technostress Model
Previous Article in Journal
Machine Learning for Analyzing Non-Countermeasure Factors Affecting Early Spread of COVID-19
Previous Article in Special Issue
Economic Stress at Work: Its Impact over Absenteeism and Innovation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Do Deterrence Mechanisms Reduce Cyberloafing When It Is an Observed Workplace Norm? A Moderated Mediation Model

1
Department of Business Administration, School of Business, Anhui University of Technology, Ma’anshan 243032, China
2
Department of Accounting, College of Business Administration, University of Northern Iowa, 1227 West 27th Street, Cedar Falls, IA 50614, USA
*
Author to whom correspondence should be addressed.
Int. J. Environ. Res. Public Health 2021, 18(13), 6751; https://doi.org/10.3390/ijerph18136751
Submission received: 21 March 2021 / Revised: 4 June 2021 / Accepted: 19 June 2021 / Published: 23 June 2021

Abstract

:
Despite the documented individual, job, and organizational antecedents of cyberloafing at the workplace, few studies have addressed whether, how and when group factors affect employees’ cyberloafing behaviors. Drawing on social learning theory and general deterrence theory, the purpose of this study is to test if observability of coworkers’ cyberloafing behavior affects employees’ perceptions of norms related to cyberloafing and subsequent cyberloafing behaviors and to test if sanctions can play a role in buffering these effects. An investigation of 335 employees working at Chinese enterprises establishes that observing others engaging in cyberloafing influences the employees’ perceived norms and cyberloafing behaviors and that employees’ perceived norms related to cyberloafing play a partial mediating role in the relationship between observability and employees’ cyberloafing. As predicted, we also found that perceived certainty and severity of potential sanctions for cyberloafing moderate the effect of observability on employees’ cyberloafing as well as the indirect effect of observability on employees’ cyberloafing via perceived norms related to cyberloafing. This study enriched the cyberloafing literature by revealing how observability of cyberloafing influences employees’ cyberloafing and by unveiling two boundary conditions under which the cyberloafing learning effect can be buffered.

1. Introduction

The Internet, mobile devices, and social media are widely used for work and pleasure and are entrenched elements of our daily lives [1,2]. The boundaries between work and non-work are increasingly blurring [3], and employees commonly engage in non-work online activities in the workplace. Restubog et al. [4] found that approximately 30–50% of employees use the Internet for non-work activities during the workday. Internet use at work for personal purposes is commonly called cyberloafing. Typical forms of cyberloafing include receiving or sending personal emails, browsing news, and shopping, amongst other things [5]. Studies show that employees’ cyberloafing can be destructive [6], lead to employees’ fatigue and a reduced focus on work, and in turn, cause a decline in productivity and output quality [7,8].
Employees’ cyberloafing has become a significant concern for managers and a hot topic for academic scholars due to the potential consequences [9]. Researchers have examined antecedents of employees’ cyberloafing in individual, job, and organizational contexts. Factors such as gender, education, personality, Internet experience, overqualification, and other individual characteristics influence employees’ cyberloafing [10,11,12,13,14,15]. Job-related factors such as stress, emotional conflict, burnout, overload, and boredom affect individuals’ propensity to cyberloaf [16,17,18,19]. Organizational factors which influence cyberloafing include organizational justice or injustice, organizational commitment, affective commitment, leader–member exchange, and punishment [5,19,20,21,22]. Unfortunately, however, group-level factors have been underestimated. Research shows that people’s behavior is easily affected by the behavior of coworkers and supervisors, as essential parts of the group, which are similar to or close to themselves [23,24]. As behaviors become widespread, they become group norms, and norms influence more future behavior. Thus, it is important to explore how employees respond to norms related to workplace cyberloafing behaviors that they learn from observing coworkers and supervisors.
Two recent studies show the relationship between coworkers’ cyberloafing and employees’ cyberloafing [25,26]. However, such studies on the interpersonal effect of cyberloafing suffer from several shortcomings. First, research has not examined the underlying mechanisms through which coworkers’ cyberloafing influences employees’ cyberloafing. We propose that perceived norms developed through observing others’ cyberloafing influences employees’ cyberloafing and mediates the relationship between observability and cyberloafing behavior. The mediating effect is based on social learning theory [27,28] which suggests employees learn from observing others, resulting in norms. Second, despite the significant effect of observability on employees’ cyberloafing, the current literature offers little insight into moderators that can weaken this effect. To fill this research gap, this study identifies two conditions, perceived certainty and severity of sanctions, which have been found to reduce cyberloafing [29,30,31], and tests their moderating effect on the relationship between observability, perceived norms, and employees’ cyberloafing behavior. We base our propositions on Beccaria’s general deterrence theory (GDT) [32]. Finally, prior research focused on individuals in the U.S., an individualistic culture. It is unclear whether research findings are robust in the context of a collectivistic culture. Given that individuals in collectivist countries are more susceptible to peoples’ influence to achieve internal harmony [28], it is important to update existing findings with evidence from collectivist countries (e.g., China in this study).
The remainder of the study describes the theoretical foundation underlying this study and the model, hypotheses proposed, the research methodology, and the results, and finally makes a final discussion and conclusion.

1.1. Theoretical Foundation and Research Model

The social learning theory argues that individuals learn about group norms and acceptable behaviors by observing others [27,28]. Specifically, employees’ behaviors are often similar to coworkers, because they spend more time with coworkers than other strangers and are more likely to be influenced by them [33]. Therefore, for employees, the behavior of coworkers has a certain reference significance. Akers, et al. [34] suggested that individuals determine whether to learn others’ deviant behavior by judging whether this behavior is acceptable or not. If some deviant behavior (e.g., cyberloafing in this study) is found to be tolerant by most individuals, it can develop into a group norm which makes individuals more likely to imitate them [27,34,35,36]. The social learning process of this kind of deviant behavior also exists in cyberloafing at workplace.
Social learning theory also points out that the individual’s perception of reinforcement strengthens or weakens the individual’s learning behavior [28,34]. Reinforcement is divided into positive reinforcement and negative reinforcement. As a negative reinforcement measure, sanctions can weaken the individual’s social learning behavior to a certain extent [37]. In order to avoid sanctions, the individual reduces the possibility of learning deviant behavior. The deterrence theory divides sanctions into the certainty of sanctions, the severity of sanction, and the celerity of sanctions. However, more studies have established that the certainty and severity of sanctions have a certain effect on the deviant behavior of employees [30,38]. Therefore, our study further explores the inhibitory effect of individual perception of certainty and severity of sanctions on the process of employees’ behavior learning of cyberloafing.
This study draws on social learning theory and general deterrence theory to theoretically established an integrated framework, which is more suitable for answering three related research questions: (1) Whether observability influences employees’ cyberloafing (H1)? (2) How observability influences employees’ cyberloafing (H2)? (3) When observability influences employees’ cyberloafing (H3a, H3b, H4a, and H4b)? Thus, the integrated research model displayed in Figure 1 is proposed to reveal the direct effect of observability on cyberloafing, the mediating effect of perceived norms on the observability-cyberloafing link, and the moderating effect of perceived certainty and severity of sanctions on the observability-cyberloafing link and on the perceived norms-cyberloafing link.

1.2. The Main Effect of Observability and Employees’ Cyberloafing

Cyberloafing can be considered a deviant workplace behavior if it breaks rules and ultimately wastes time and resources, and damages the organization [39,40]. Deviant workplace behavior is commonplace [41], and cyberloafing is particularly problematic as Restubog, Garcia, Toledano, Amarnani, Tolentino, and Tang [4] found that approximately 30–50 percent of employees use the Internet for non-work activities during the workday, and the data show that more than half of the time employees use the Internet during the workday is non-work related [42]. Other data also show that over 60 percent of organizations have reprimanded and over 30 percent have terminated employees for cyberloafing [43].
Social learning theory states that people learn how to engage in their environment by learning through social exchange and social relationships [28]. The workplace is made up of a complex network of social exchanges and influences that impact how employees feel and behave. Employees observe, learn, and react to the complex workplace environment. Robinson and O’Leary-Kelly [27] state that “individuals carefully analyze their work environments and adjust their individual actions accordingly.” Akinyele [44] find that workplace productivity problems can namely be attributed to the work environment and cyberloafing behavior is affected by a wide range of workplace factors, including employees stress [45], mechanisms for self-management [46], Internet monitoring [9], and the use of policies and sanctions [14], amongst other things.
The workplace also facilitates social exchange, including through generalized exchange [47], which is an indirect exchange between group members where they receive feedback indirectly through observation [48]. Thus, the workplace is greatly affected by social learning. Sutherland [49] introduced differential association theory to argue that individuals learn social behavior through interaction with intimate others and that through interactions, people develop attitudes, perceptions, values, motives, and ultimately behaviors. Sutherland asserts that people are influenced by both the frequency and intensity of their interactions with others. Bandura [28], Burgess and Akers [50], and Akers [37] connect differential association theory with social learning theory that conceptualizes the interplay between differential association, imitation, and differential reinforcement.
Differential association [49] relates to how people formulate decisions to engage in deviant behavior by learning about others’ behaviors through personal interactions. Bandura [28] and Akers [37] further assert that indirect interaction and indirect information influence imitation. Both Akers [37] and Sutherland [49] suggest that the ultimate effects are influenced by the duration of the interaction. Imitation is the byproduct of social learning [51], and researchers have already shown that employees imitate other employees’ behaviors such as absenteeism [52]. Considering social learning theory and evidence that the workplace facilitates social learning and employee imitation of one another, we hypothesize that when employees observe coworkers cyberloafing, they are more likely to cyberloaf themselves.
Hypothesis 1 (H1).
Observability is positively associated with employees’ workplace cyberloafing.

1.3. The Mediating Effects of Perceived Norms on the Relationship between Observability and Employees’ Cyberloafing

Bandura’s [28] social learning theory explains how individuals amass information about their social environment and how to behave. Individuals emulate role models and follow the standardized norms of the environment. Robinson and O’Leary-Kelly [27] suggest that worker behaviors set the standards for normative and acceptable behavior, which employees emulate. From that perspective, workplace cyberloafing is a learned behavior where employees are influenced by standardized workplace norms, including norms related to cyberloafing that are learned through observation. Thus, greater observability leads to stronger perceptions that workplace cyberloafing is a normal behavior and vice versa.
Social learning theory says people seek ways to justify improper behaviors [53]. One way to justify behavior is to have consistent group norms, which can be learned through interaction with others in the environment. We see this phenomena in other contexts such as software piracy where people believe engaging in unethical or even illegal behavior is acceptable if most people do it, and the more people that do it, the firmer the belief [54]. Bandura [28] and Willison [55] argued that norms and the “everyone else does it” excuse for self-justification can be learned through the social environment. This view is supported by Blanchard and Henle [56], who propose that employees do not consider cyberloafing during working hours to be inappropriate because their colleagues or supervisors do the same. Lim and Teo [57] find that “About 88% of respondents reported that it is acceptable to use company Internet access to cyberloaf when they perceived that everyone else engaged in it.” Along the same vein, Askew, et al. [58] shows that peoples’ perceptions of norms related to cyberloafing affect their attitude, and attitudes are the precursor to behavior. Thus, social learning theory supports our conjecture that observing others’ cyberloafing in the workplace influences perceived norms, which influence cyberloafing behavior. Increased observability creates an opportunity for social learning and the development of norms, which in turn influence behavior as a form of neutralizing. Thus, we hypothesize:
Hypothesis 2 (H2).
Perceived norms as related to cyberloafing mediate the relationship between observability and employees’ workplace cyberloafing.

1.4. The Moderating Effect of Perceived Certainty and Severity of Sanctions on the Relationship between Observability and Employees’ Cyberloafing

General deterrence theory (GDT) [32] is a criminal justice theory that has been used to examine the effects of sanctions and consequences on cyberloafing [14]. GDT proposes that policies and regulations, imposed on individuals by authorities (such as organizations), affect individual attitudes, choices, and actions. The key premise behind this model is that individuals make rational decisions to benefit themselves. GDT assumes individuals weigh potential consequences for taking an action [14,32,59]. Furthermore, GDT is more effective at deterring behaviors that are engaged in by rational choice [60].
GDT suggests that perceived certainty and severity of sanctions are the two most effective deterrence mechanisms [61]. In this paper, perceived certainty of sanctions refers to the possibility that employees are caught when they engage in cyberloafing, and perceived severity of sanctions is defined as the perception that severe sanctions take place if caught. Previous studies have shown that when individuals are aware of the high visibility of misbehavior, sanctions imposed by the working group may weaken the spread of organizational misbehavior to individuals [24], employees reduce the occurrence of the behavior which is more likely to be detected, and the potential negative consequences for this behavior are likely to be severe [32,62,63]. Robinson and O’Leary Kelly found that there is a positive relationship between the anti-social behavior of individuals and the degree of anti-social behavior of working group members, and the management sanctions for this behavior moderates the relationship between them [27]. Berry and Westfall pointed out that more than 60% of college students said they were less likely to use their mobile phones in class if they saw their classmate punished (for example, confiscating their phone or demoting) [64]. Similarly, Brinda and Basu [65] links immediate sanctions with significantly reduced employees’ cyberloafing once the cyberloafing was detected. To put it differently, perceived certainty and severity of sanctions in the condition of high perception could effectively reduce employees’ cyberloafing. Thus, we hypothesize:
Hypothesis 3a (H3a).
Perceived certainty of sanctions moderates the association between observability and employees’ workplace cyberloafing.
Hypothesis 3b (H3b).
Perceived severity of sanctions moderates the association between observability and employees’ workplace cyberloafing.

1.5. The Moderating Effect of Perceived Certainty and Severity of Sanctions on the Relationship between Perceived Norms and Employees’ Cyberloafing

We predict that perceived norms about workplace cyberloafing are augmented by externally imposed sanctions and consequences for such behavior. Group norms are not only norms that support employees’ cyberloafing, but they can be transformed by sanctions to reflect that cyberloafing is either not admitted or tolerated. Strong sanctions punishing employees for workplace cyberloafing mitigate the effects of beliefs that cyberloafing is a commonly accepted practice, whereas weak sanctions amply normative beliefs that cyberloafing is acceptable.
Consistent with the central tenets of GDT, D’Arcy, Hovav, and Galletta [30] found that certain sanctions can reduce cyberloafing, and Ugrin and Pearson [14] found that employee cyberloafing can be deterred when employees perceive potential sanctions to be severe and enforced. In a recent field study, Hensel and Agnieszka [22] find that the perceived certainty and severity of sanctions send a strong signal, and they conclude that the perception that consequences are likely to be certain and severe improve people’s understanding and awareness of the view that the behavior is wrong, and perceptions of wrongdoing reduce illicit behavior [38,66].
In addition to deterring behavior directly, we propose that perceptions about potential consequences interact with observations of workplace behaviors that develop into workplace norms. Individuals make further decisions based on contact with information that supports or conflicts with the behavior [67]. When the organization conveys information about sanctions to employees, employees may change their previous attitudes or decisions if the sanctions are severe; even if this behavior conforms to the group norms, individuals still reduce or suspend cyberloafing. For example, Lee and Lee [68] found that individuals are less likely to cyberloaf in the workplace when they have observed individuals get punished for such behavior. However, weak sanctions reinforce previous attitudes or decisions. Friedman, Simon, and Liu pointed out that when individuals observes unpunished organizational misbehavior, they are more likely to hold the view that this behavior is normative and are more likely to engage in similar behaviors [69]. Observations of coworkers engaging in cyberloafing may create a normative workplace behavior, as hypothesized above, while observations of sanctions being levied against individuals that cyberloafing should effectively moderate any relationship between perceptions of norms and workplace cyberloafing. Considering the aforementioned evidence, it is reasonable to conclude that even when individuals’ perceptions that cyberloafing is a normal behavior in the workplace, fear about the certainty and severity of sanctions for engaging in cyberloafing should moderate any relationship between perceived norms and workplace cyberloafing. Thus, we hypothesize:
Hypothesis 4a (H4a).
Perceived certainty of sanctions moderates the association between perceived norms and employees’ workplace cyberloafing.
Hypothesis 4b (H4b).
Perceived severity of sanctions moderates the association between perceived norms and employees’ workplace cyberloafing.

2. Materials and Methods

2.1. Sampling and Procedures

We tested our model using an online survey to collect self-reported data for testing the hypotheses. To ensure the representativeness of the sample, we targeted at full-time employees working in enterprises located in the Internet, catering and tourism, manufacturing, finance, and real estate industries, in 25 different provinces in central and eastern China (e.g., Guangdong, Shanghai, Jiangsu, Hebei, and Beijing). This study was approved by the Ethics Committee of Anhui University of Technology (YXLLSP20201202 and 20.05.2020). All participants gave their informed consent for inclusion prior to the survey. In order to decrease potential effect of socially desirable responding on data quality, our questionnaires were distributed to participants on an online survey platform (www.wjx.com, accessed date: 20 June 2021), which has collected 7.119 billion responses for its users, to keep high levels of anonymity and more reliability in collecting sensitive information [70,71]. Specifically, with the paid service from (www.wjx.com, accessed date: 20 June 2021) researchers first asked it to send questionnaires to Internet users of enterprises in a variety of designated industries. Then, the questionnaires were randomly sent to target participants with a quick response (QR) code through WeChat, one of the most popular social media application in China and all over the world [72].
The data collection lasted for 3 weeks, from 20 May to 10 June 2020, and participants could access questionnaire from computers and mobile devices during off-duty hours (i.e., 18:00–23:00). Before filling the questionnaires, participants were asked to take about 3 min to understand the purpose and instructions of the survey, and then it took them about 2 min to complete all the questionnaires. Each participant received a reward (e.g., member points in the survey platform) worth about 2 RMB (approximately equal to 30 cents) after completing the questionnaires. Furthermore, followed by previous studies like Wu, Mei, Liu and Ugrin [8], we set IP address recognition to ensure that the questionnaire can only be filled out once with the same IP and set a strict time limit that if it took less than 2 min or more than 10 min, it would be considered as an invalid questionnaire. In total, we randomly distributed 397 questionnaires in our online survey. After eliminating invalid and incomplete responses, a total of 335 valid questionnaires were obtained, with an effective response rate of 84.38%.
Of the 335 responses, 59.7% of them were female, 62.1% of them were married, and 83.0% of them worked in lower-level management positions or below. The participants were evenly distributed among different income groups: less than 3000 Yuan (11%), between 3001 and 5000 Yuan (18.2%), between 5001 and 7000 Yuan (29.9%), between 7001 and 10,000 Yuan (22.7%), and more than 10,000 Yuan (18.2%). The most common educational level was university or junior college (85.6%), followed by master’s or above (9.9%), senior or technical secondary school (3.9%), and junior high school or below (0.6%). Working years included less than 3 years (19.1%), between 3 and 5 years (20.9%), between 6 and 7 years (26.0%), between 8 and 10 years (13.7%), and more than 10 years (20.3%).

2.2. Measures

We adapted several scales that have been validated in other research for use in our survey instrument. All items were scored with 7-point Likert scales. A summary of the scales are as follows:
Observability (OS): We measured observability by adopting the two-item scale created by Siponen, et al. [61]. The items state, “In my organization, employees’ use of the Internet at work for non-work-related activities is widely visible” and “In my organization, employees’ use of the Internet at work for non-work-related activities is visible in public.” The Cronbach’s alpha for our responses was 0.892, indicating the items are reliable.
Perceived Norms (PN): We measured perceived norms by adapting the four-item scale created by [54]. The items are as follows: “If it were prevalent in the company to use the Internet at work for non-work-related activities, and if a lot of people were doing it?”, “If it were held that other people are benefiting from using the Internet at work for non-work-related activities, and why should not I?”, “If it were held that no one else seems to care whether or not they get caught when they use the Internet at work for non-work-related activities?”, and “If using the Internet at work for non-work-related activities makes me feel at least a little more ‘cool’.” The Cronbach’s alpha for the four-item scale was 0.799, indicating the scale is reliable.
Perceived certainty of sanctions (CS): We assessed perceived certainty of sanctions by adapting a three-item scale created by Siponen and Vance [61]. The items are as follows “What is the chance you would receive sanctions if you engage in cyberloafing during working hours?”, “What is the chance that you would be formally sanctioned if management learned you had used the Internet at work for non-work-related activities?”, and “What is the chance that you would be formally reprimanded if management learned you had used the Internet at work for non-work-related activities?” The Cronbach’s alpha was 0.843, indicating the scale is reliable.
Perceived severity of sanctions (SS): We assessed perceived severity of sanctions by adapting a three-item scale created by Siponen and Vance [61]. The items are as follows: “How much of a problem would it create in your life if you were formally sanctions for cyberloafing during work hours?”, “How much of a problem would it create in your life if you were formally sanctioned for using the Internet at work for non-work-related activities?”, and “How much of a problem would it create in your life if you were formally reprimanded for using the Internet at work for non-work-related activities?” The Cronbach’s alpha was 0.811, indicating the scale is reliable.
Employees’ cyberloafing (EC): We measured employee cyberloafing using the three-item scale adopted from Moody and Siponen [73]. The items are as follows: “In general, I use the Internet at work for non-work-related purposes.”, “I access the Internet at work for non-work-related purposes several times each day”, and “I spend a significant amount of time on the Internet at work for non-work-related purposes.” The Cronbach’s alpha was 0.818, indicating the scale is reliable.
Control variables: We included control variables that have correlated with employees’ cyberloafing in previous studies (see discussions in [5,8,74,75]). We control for gender (GD), education (ED), income (IC), marital status (MS), position (PS), and work experience (WY).

3. Results

3.1. Confirmatory Factor Analysis

To verify the convergent validity and discriminant validity of the scale, we analyzed the 335 questionnaires using Mplus 7.0 software (University of California, Los Angeles, USA). Table 1 displays the results of a confirmatory factor analysis of the measurement model. The model fit indices (χ2/df = 2.061, CFI = 0.957, TLI = 0.943, SRMR = 0.041, RMSEA = 0.056) suggest that the model is acceptable [76]. The standardized loadings for the variables range from 0.556~0.914, with all being over 0.5. The average of the variance extracted (AVE) of the latent variables ranged from 0.507 to 0.813, larger than the threshold of 0.50. The composite reliabilities (CR) ranged from 0.802~0.897, with all being higher than the recommended threshold value of 0.7, presenting good convergent validity for the scales.
As suggested by Fornell and Larcker [77], the square root of AVE, by comparison, is greater than the correlation coefficient between other potential variables and this latent variable (Table 2), indicating that the discriminant validity among the five main variables in this study is good.

3.2. Common Method Biases Analysis

We tested for common method bias, which could have been introduced by the survey instrument, for all variables and consistent with Harman’s one-factor test [78] and a confirmatory factor analysis [79]. The principal axis factoring analysis was used to extract common factors and generated five principal components, accounting for 74.39% of the variance. The first principal component explains 30.20% of the variance. We also used robust maximum likelihood method to perform a confirmatory factor analysis and compared the fit indices of five competing models. The fit indices of the five-factor model (χ2/df = 2.061, CFI = 0.957, TLI = 0.943, SRMR = 0.041, RMSEA = 0.056) was considerably better (Δχ2 = 1200.4, Δdf = 10, p < 0.001) than that of the single-factor model (χ2/df = 15.169, CFI = 0.349, TLI = 0.241, SRMR = 0.174, RMSEA = 0.206) and other alternative models. Therefore, we concluded that there is little threat of common method bias in the data.

3.3. Correlation Analysis

Table 2 presents the means, standard deviations, and correlation coefficients for the variables assessed in the study. There is significant positive correlation between observability and perceived norms (r = 0.568, p < 0.01) and employees’ cyberloafing (r = 0.387, p< 0.01). There is also a positive correlation between perceived norms and employees’ cyberloafing (r = 0.308, p < 0.01). Employees cyberloafing has a significantly negative correlation with both perceived certainty (r = −0.216, p < 0.01) and severity of sanctions (r = −0.247, p < 0.01). Taken as a whole, the correlation analysis is consistent with the theoretical expectations, which lays a foundation for later hypothesis testing.

3.4. Mediation Effect Analysis

We tested for mediation using the procedure outlined in Zhao, et al. [80]. In doing so, we performed a Bootstrap analysis applying the SPSS PROCESS script developed by Hayes [81] and generated 5000 bootstrapped samples to test the mediating effect of perceived norms. The results are shown in Table 3. The relationships between observability, perceived norms, and employees’ cyberloafing are modeled using regression analysis. The results show that observability positively associates with employees’ cyberloafing and perceived norms. Furthermore, perceived norms are positively associated with employees’ cyberloafing. The bias-corrected bootstrap method shows that the 95% confidence interval for the path mediated by perceived norms is (0.003, 0.133), excluding zero, indicating that perceived norms partially mediates the relationship between observability and employees’ cyberloafing. Thus, H1 and H2 are supported.

3.5. Moderated Mediation Effect Analysis

We estimated the moderating effect of perceived certainty and severity of sanctions on the relation between observability and employees’ cyberloafing and the relation between perceived norms and employees’ cyberloafing using the PROCESS macro (Model 17), as recommended by Hayes [82]. Table 4 illustrates that both the interactions between observability and perceived certainty, as well as the severity of sanctions, are negatively correlated with employees’ cyberloafing. This further suggests that perceived certainty and severity of sanctions negatively moderate the relationship between observability and employees’ cyberloafing. Thus, H3a and H3b are supported. Furthermore, the results show that the effect of perceived norms on employees’ cyberloafing is also moderated by perceived certainty and the severity of sanctions, supporting H4a and H4b. To further interpret these interaction effects, we plotted the two-way interactions. As shown in Figure 2, the relationship between observability and cyberloafing was stronger among employees who perceived that the certainty or severity of sanctions was low. Similarly, perceived norms have greater effect on cyberloafing when employees perceived low certainty or severity of sanctions (see Figure 3).
Index indicators were employed to further verify the moderated mediation effect in accordance with the approach suggested by Hayes [82]. Table 5 shows that the association between perceived norms and employees’ cyberloafing is stronger when perceived certainty and severity of sanctions are low but not significant under conditions of the other three combinations. The indexes of partial moderated mediation indicate that the mediation of perceived norms were moderated by both perceived certainty and severity of sanctions, because the 95% confidence interval was ranging from −0.107 to −0.0003 and from −0.134 to −0.011, respectively, not including zero.

4. Discussion

In recent years, increasing academic attention has been paid to antecedents of cyberloafing behavior at workplace because of its destructive effects on both organizations and employees. To deepen the understanding of what induces employees’ cyberloafing, the purpose of this study is to examine the effect of observability of cyberloafing on employees’ cyberloafing with perceived norms as a mediator and perceived certainty and severity of sanctions as two moderators from the perspective of social learning and deterrence. The findings show that observability of cyberloafing is positively associated with employees’ perceived norms and subsequent cyberloafing, and perceived norms partially mediate the relationship between observability and employee cyberloafing. This means that observability indirectly affects employees’ cyberloafing by increasing the likelihood that employees believe that cyberloafing is a workplace norm. The results also indicate that the perceived certainty and severity of sanctions buffer the relationship between observability and employee cyberloafing and alleviate the mediating effect of perceived norms. These findings suggest that when employees perceive that potential sanctions for cyberloafing are certain or severe, they are less likely to engage in cyberloafing activities when they observe others’ cyberloafing at workplace.
This study has several theoretical implications for cyberloafing research. First, it contributes to our understanding of cyberloafing by identifying a new antecedent of cyberloafing behaviors. Prior studies have found that cyberloafing is predicted by individual [4,83,84,85], job-related [86,87,88,89,90], and organizational factors [5,19,20,21] but neglected the potential effect of antecedents at group context. This study extends the scope of the extant research by exploring cyberloafing from the perspective of interpersonal social learning and reveals that observability of cyberloafing at workplace can be one of the reasons for understanding employees’ cyberloafing. Second, our results advance our understanding of social contagion of cyberloafing by examining the mechanism through which such behavioral contagion occurs. Although recent studies have provided preliminary evidence that coworkers’ cyberloafing is associated with employees’ cyberloafing in the U.S. with individualistic culture [25,26], the potential underlying mechanisms through which coworkers’ cyberloafing influences employees’ cyberloafing has not been discussed. This study thus provides further evidence from China, which has a significant collectivistic culture, to support these studies and expands existing findings by including perceived norms related to cyberloafing as a new mechanism underlying the influence of observability on employee cyberloafing based on social learning theory [28]. Third, this research contributes largely to the existing body of knowledge by filling the cyberloafing literature gap on a better understanding of two conditions under which observability influences employees’ cyberloafing behaviors, with a particular emphasis on the moderating role played by employees’ perception of sanction certainty and severity in predicting their response to others’ cyberloafing at workplace. Our findings demonstrate that a high level of perceived certainty or severity of sanctions can serve as an effective deterrence strategy for preventing social contagion of cyberloafing at workplace, thus broadening our knowledge on organizational situations inducing or resisting employees’ cyberloafing which have been examined in recent studies [15,91].
This study has important implications for management. First, management can expect that employee cyberloafing swells once it starts and if there are no negative consequences. As employees see others spending time online, they may be swayed to do so themselves. This may be exacerbated in modern open office environments. It seems that certain and severe consequences are more effectual in office layouts where peoples’ activities are observable. The management should reduce the screen visibility of employees by setting up compartments so that they cannot see what their coworkers are doing on the computer, thus reducing the possibility of cyberloafing learning. Second, employees who observe others around them engaging in cyberloafing often do not perceive cyberloafing to be a deviant behavior [56] and have little awareness of the negative effects of cyberloafing [92]. Therefore, strengthening the education of employees and advanced warning of the detrimental effects of cyberloafing may be necessary for enterprises to stop employees. Third, the results suggest employers, particularly in China, need to set clear rules through Internet-use policies and clearly define the consequences for cyberloafing [93,94]. Once policies are designed, consequences must be effectively put into practice when people violate rules, to be a warning that such behavior in the enterprise is inappropriate.
This study takes place in China, a country with a highly collective culture that may be more susceptible to influence from observations and norms. It would be interesting to see if these relationships hold true in a more individualistic culture, such as the United States. The study also has a relatively small sample, and it mainly comes from surveys of employees working at organizations located in the Yangtze River Delta, Pearl River Delta, and Bohai Bay. Thus, the sample may not even capture a holistic view of China, as China itself has many regional cultures. The study is also limited in that it only examines two facets of deterrence: certainty and severity. We test the effects of the perceived certainty and severity of sanctions on the relations between observability and perceived norms on employees’ cyberloafing, but we did not test the effects of the perceived celerity of sanctions or how quickly the punishment occurs [95]. Future research could explore this additional factor.

5. Conclusions

A growing body of studies on cyberloafing at workplace has established the negative effects of cyberloafing on employees’ job outcomes and mental health, and identified factors that predict employees’ cyberloafing behaviors. However, very few studies have examined how and when observability of cyberloafing at workplace influences employees’ levels of cyberloafing. The present study is the first study to investigate the effects of observability on employees’ cyberloafing with the mediation of perceived norms and test the moderations of perceived certainty and severity of sanctions in a sample of 335 employees in China. We substantiate that observability of cyberloafing decreases employees’ cyberloafing behaviors directly and indirectly by the enhancement of perceived norms. Furthermore, perceived certainty and severity of potential sanctions for cyberloafing moderate the effect of observability on employees’ cyberloafing and the indirect effect of perceived normalcy on it. Our results suggest that managers benefit from administering certain and severe sanctions on cyberloafing activities to avoid the ubiquitous office culture of cyberloafing.

Author Contributions

Conceptualization, M.S., J.U. and J.W.; methodology, M.S. and S.G.; validation, M.S.; formal analysis, M.S., J.U., J.W. and W.Z.; investigation, M.S. and W.Z.; writing—original draft preparation, M.S. and M.L.; writing—review and editing, M.L. and J.U.; supervision, J.W.; funding acquisition, J.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Humanity and Social Science Major Foundation of Education Committee of Anhui province, grant number SK2019ZD07 and Philosophical and Social Science Key Foundation of Anhui Province, grant number AHSKZ2020D19.

Institutional Review Board Statement

The study was conducted according to the guidelines of the Declaration of Helsinki and approved by the Ethics Committee of Anhui University of Technology (YXLLSP20201202 and 20.05.2020).

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study prior to the survey.

Data Availability Statement

The datasets used in this research are available upon request from the corresponding author. The data are not publicly available due to restrictions, i.e., privacy or ethical.

Acknowledgments

The authors particularly appreciate all the survey participants. We also express our gratitude to the editor and anonymous reviewers of this paper for their excellent work and contributions to the refinements and improvements of the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ngai, E.W.; Tao, S.S.; Moon, K.K. Social media research: Theories, constructs, and conceptual frameworks. Int. J. Inf. Manag. 2015, 35, 33–44. [Google Scholar] [CrossRef]
  2. Sherlyanita, A.K.; Rakhmawati, N.A. Pengaruh Dan Pola Aktivitas Penggunaan Internet Serta Media Sosial Pada Siswa SMPN 52 Surabaya. J. Inf. Syst. Eng. Bus. Intell. 2016, 2, 17. [Google Scholar] [CrossRef] [Green Version]
  3. Lim, V.K.G.; Chen, D.J.Q. Cyberloafing at the Workplace: Gain or Drain on Work? Behav. Inf. Technol. 2012, 31, 343–353. [Google Scholar] [CrossRef]
  4. Restubog, S.L.D.; Garcia, P.R.J.M.; Toledano, L.S.; Amarnani, R.K.; Tolentino, L.R.; Tang, R.L. Yielding to cyber-temptation:Exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace. J. Res. Personal. 2011, 45, 247–251. [Google Scholar] [CrossRef]
  5. Lim, V.K.G. The IT Way of Loafing on the Job: Cyberloafing, Neutralizing and Organizational Justice. J. Organ. Behav. 2002, 23, 675–694. [Google Scholar] [CrossRef]
  6. Koay, K.Y.; Soh, P.C. Should Cyberloafing Be Allowed in the Workplace? Hum. Resour. Manag. Int. Dig. 2018, 26, 4–6. [Google Scholar] [CrossRef]
  7. D’Abate, C.P.; Eddy, E.R. Engaging in Personal Business on the Job: Extending the Presenteeism Construct. Hum. Resour. Dev. Q. 2007, 18, 361–383. [Google Scholar] [CrossRef]
  8. Wu, J.; Mei, W.; Liu, L.; Ugrin, J.C. The bright and dark sides of social cyberloafing: Effects on employee mental health in China. J. Bus. Res. 2020, 112, 56–64. [Google Scholar] [CrossRef]
  9. Glassman, J.; Prosch, M.; Shao, B.B.M. To Monitor or not to Monitor: Effectiveness of a Cyberloafing Countermeasure. Inf. Manag. 2015, 52, 170–182. [Google Scholar] [CrossRef]
  10. Alharthi, S.; Levy, Y.; Wang, L.; Hur, I. Employees‘ Mobile Cyberslacking and Their Commitment to the Organization. J. Comput. Inf. Syst. 2019, 61, 1–13. [Google Scholar] [CrossRef]
  11. Baturay, M.H.; Toker, S. An investigation of the impact of demographics on cyberloafing from an educational setting angle. Comput. Hum. Behav. 2015, 50, 358–366. [Google Scholar] [CrossRef]
  12. Dursun, O.O.; Donmez, O.; Akbulut, Y. Predictors of Cyberloafing among Preservice Information Technology Teachers. Contemp. Educ. Technol. 2018, 9, 22–41. [Google Scholar]
  13. Sheikh, A.; Atashgah, M.S.; Adibzadegan, M. The antecedents of cyberloafing: A case study in an Iranian copper industry. Comput. Hum. Behav. 2015, 51, 172–179. [Google Scholar] [CrossRef]
  14. Ugrin, J.C.; Pearson, J.M. The Effects of Sanctions and Stigmas on Cyberloafing. Comput. Hum. Behav. 2013, 29, 812–820. [Google Scholar] [CrossRef]
  15. Cheng, B.; Zhou, X.; Guo, G.; Yang, K. Perceived Overqualification and Cyberloafing: A Moderated-Mediation Model Based on Equity Theory. J. Bus. Ethics 2020, 164, 565–577. [Google Scholar] [CrossRef]
  16. Carpenter, N.C.; Berry, C.M. Are counterproductive work behavior and withdrawal empirically distinct? A meta-analytic investigation. J. Manag. 2014, 43, 834–863. [Google Scholar] [CrossRef]
  17. Pindek, S.; Krajcevska, A.; Spector, P.E. Cyberloafing as a coping mechanism: Dealing with workplace boredom. Comput. Hum. Behav. 2018, 86, 147–152. [Google Scholar] [CrossRef]
  18. Zoghbi-Manrique-de-Lara, P.; Sharifiatashgah, M. The relationship between perceived crowding and cyberloafing in open offices at Iranian IT-based companies. Cogn. Technol. Work 2020, 23, 331–342. [Google Scholar] [CrossRef]
  19. Przemysław, G.; Hensel, K.A. Job Overload, Organizational Commitment, and Motivation as Antecedents of Cyberloafing: Evidence from Employee Monitoring Software. Eur. Manag. Rev. 2020. [Google Scholar] [CrossRef]
  20. Zoghbi-Manrique-de-Lara, P. Relationship between Organizational Justice and Cyberloafing in the Workplace: Has “Anomia“ a Say in the Matter? Cyberpsychol. Behav. 2007, 10, 464–470. [Google Scholar] [CrossRef] [PubMed]
  21. Usman, M.; Javed, U.; Shoukat, A.; Bashir, N.A. Does meaningful work reduce cyberloafing? Important roles of affective commitment and leader-member exchange. Behav. Inf. Technol. 2019. [Google Scholar] [CrossRef]
  22. Hensel, P.G.; Agnieszka, K. Curbing cyberloafing: Studying general and specific deterrence effects with field evidence. Eur. J. Inf. Syst. 2020, 30, 219–235. [Google Scholar] [CrossRef]
  23. Degoey, P. Contagious justice: Exploring the social construction of justice in organizations. Res. Organ. Behav. 2000, 22, 51–102. [Google Scholar] [CrossRef]
  24. Ferguson, M.J. From Bad to Worse: A Social Contagion Model of Organizational Misbehavior. SSRN Electron. J. 2006. [Google Scholar] [CrossRef] [Green Version]
  25. Khansa, L.; Kuem, J.; Siponen, M.; Kim, S.S. To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls. J. Manag. Inf. Syst. 2017, 34, 141–176. [Google Scholar] [CrossRef]
  26. Askew, K.L.; Ilie, A.; Bauer, J.A.; Simonet, D.V.; Buckner, J.E.; Roberts, T.A. Disentangling How Coworkers and Supervisors Influence Employee Cyberloafing: What Normative Information Are Employees Attending To? J. Leadersh. Organ. Stud. 2018, 26, 526–544. [Google Scholar] [CrossRef]
  27. Robinson, S.L.; O’Leary-Kelly, A.M. Monkey See, Monkey Do: The Influence of Work Groups on the Antisocial Behavior of Employees. Acad. Manag. J. 1998, 41, 658–672. [Google Scholar]
  28. Bandura, A. Social Learning Theory; Prentice-Hall: Englewood Cliffs, NJ, USA, 1977. [Google Scholar]
  29. Cheng, L.; Li, W.; Zhai, Q.; Smyth, R. Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory. Comput. Hum. Behav. 2014, 38, 220–228. [Google Scholar] [CrossRef] [Green Version]
  30. D’Arcy, J.; Hovav, A.; Galletta, D. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Inf. Syst. Res. 2009, 20, 79–98. [Google Scholar] [CrossRef] [Green Version]
  31. Wenzel, M. The social side of sanctions: Personal and social norms as moderators of deterrence. Law Hum. Behav. 2004, 28, 547–567. [Google Scholar] [CrossRef] [Green Version]
  32. Beccaria, C. On Crimes and Punishments; Prentice Hall: Upper Saddle River, NJ, USA, 1963. [Google Scholar]
  33. Laland, K.N. Social learning strategies. Learn. Behav. 2004, 32, 4–14. [Google Scholar] [CrossRef]
  34. Akers, R.L.; Krohn, M.D.; Lanza-Kaduce, L.; Rodosevich, M. Social learning and deviant behavior: A specific test of a general theory. Am. Sociol. Rev. 1979, 44, 636–655. [Google Scholar] [CrossRef] [PubMed]
  35. Kura, K.M.; Shamsudin, F.M.; Chauhan, A. Perceived group norms as predictors of deviant behaviour at work. Int. Bus. Manag. 2013, 7, 121–126. [Google Scholar]
  36. Bikhchandani, S.; Hirshleifer, D.; Welch, I. Learning from the Behavior of Others: Conformity, Fads, and Informational Cascades. J. Econ. Perspect. 1998, 12, 151–170. [Google Scholar] [CrossRef] [Green Version]
  37. Akers, R.L. Social Learning and Social Structure: A General Theory of Crime and Deviance; Northeastern University Press: Boston, MA, USA, 1998. [Google Scholar]
  38. Straub, D.W. Effective IS Security: An Empirical Study. Inf. Syst. Res. 1990, 1, 255–276. [Google Scholar] [CrossRef]
  39. Bennett, R.; Robinson, S. Development of a measure of workplace deviance. J. Appl. Psychol. 2000, 85, 349–360. [Google Scholar] [CrossRef] [Green Version]
  40. Robinson, S.; Bennett, R. A typology of deviant workplace behaviors: A multidimensional scaling study. Acad. Manag. J. 1995, 38, 555–572. [Google Scholar]
  41. Kaptein, M. Understanding unethical behavior by unraveling ethical culture. Hum. Relat. 2011, 64, 843–869. [Google Scholar] [CrossRef]
  42. Whitty, M.T.; Carr, A.N. New rules in the workplace: Applying object-relations theory to explain problem Internet and email behaviour in the workplace. Comput. Hum. Behav. 2006, 22, 235–250. [Google Scholar] [CrossRef] [Green Version]
  43. Greenfield, D.; Davis, R. Lost in Cyberspace: The Web at Work. Cyberpsychol. Behav. Impact Internet Multimed. Virtual Real. Behav. Soc. 2002, 5, 347–353. [Google Scholar] [CrossRef]
  44. Akinyele, S. Needs Satisfaction: An Effective Tool for Workers Commitment to Work. Res. J. Bus. Manag. 2007, 1, 72–79. [Google Scholar]
  45. Andel, S.A.; Kessler, S.R.; Pindek, S.; Kleinman, G.; Spector, P. Is cyberloafing more complex than we originally thought? Cyberloafing as a coping response to workplace aggression exposure. Comput. Hum. Behav. 2019, 101, 124–130. [Google Scholar] [CrossRef]
  46. Wagner, D.T.; Barnes, C.M.; Lim, V.; Ferris, D.L. Lost sleep and cyberloafing: Evidence from the laboratory and a daylight saving time quasi-experiment. J. Appl. Psychol. 2012, 97, 1068–1076. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  47. Yoshikawa, K.; Wu, C.-H.; Lee, H. Generalized Social Exchange and Its Relevance to New Era Workplace Relationships. Ind. Organ. Psychol. 2018, 11, 486–492. [Google Scholar] [CrossRef] [Green Version]
  48. Yamagishi, T.; Cook, K. Generalized Exchange and Social Dilemmas. Soc. Psychol. Q. 1993, 56, 235–248. [Google Scholar] [CrossRef]
  49. Sutherland, E.H. Principles of Criminology, 4th ed.; Lippincott: Philadelphia, PA, USA, 1947. [Google Scholar]
  50. Burgess, R.L.; Akers, R.L. A Differential Association-Reinforcement Theory of Criminal Behavior. Soc. Probl. 1966, 14, 128–147. [Google Scholar] [CrossRef]
  51. Bird, C.; Miller, N.E.; Dollard, J. Social Learning and Imitation. Am. J. Psychol. 1942, 55, 459. [Google Scholar] [CrossRef]
  52. Brummelhuis, L.T.; Johns, G.; Lyons, B.; Hoeven, C.T. Why and when do employees imitate the absenteeism of co-workers? Organ. Behav. Hum. Decis. Process. 2016, 134, 16–30. [Google Scholar] [CrossRef]
  53. Sykes, G.; Matza, D. Techniques of Neutralization: A Theory of Delinquency. Am. Sociol. Rev. 1957, 22, 664–670. [Google Scholar] [CrossRef]
  54. Hinduja, S. Neutralization theory and online software piracy: An empirical analysis. Ethics Inf. Technol. 2007, 9, 187–204. [Google Scholar] [CrossRef]
  55. Willison, R. Understanding the Perpetration of Employee Computer Crime in the Organisational Context. Inf. Organ. 2006, 16, 304–324. [Google Scholar] [CrossRef] [Green Version]
  56. Blanchard, A.L.; Henle, C.A. Correlates of different forms of cyberloafing: The role of norms and external locus of control. Comput. Hum. Behav. 2008, 24, 1067–1084. [Google Scholar] [CrossRef]
  57. Lim, V.K.G.; Teo, T.S.H. Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study. Inf. Manag. 2005, 42, 1081–1093. [Google Scholar] [CrossRef]
  58. Askew, K.; Buckner, J.E.; Taing, M.U.; Ilie, A.; Bauer, J.A.; Coovert, M.D. Explaining cyberloafing: The role of the theory of planned behavior. Comput. Hum. Behav. 2014, 36, 510–519. [Google Scholar] [CrossRef]
  59. Tyler, T.R.; Blader, S.L. Can Business Effectively Regulate Employee Conduct? The Antecedents of Rule Following in Work Settings. Acad. Manag. J. 2005, 48, 1143–1158. [Google Scholar] [CrossRef]
  60. Braithwaite, J.; Geis, G. On Theory and Action for Corporate Crime Control. Crime Delinq. 1982, 28, 292–314. [Google Scholar] [CrossRef]
  61. Siponen, M.; Vance, A. Neutralization: New insights into the problem of employee information systems security policy violations. MIS Q. 2010, 34, 487–502. [Google Scholar] [CrossRef]
  62. Piquero, A.; Paternoster, R.; Pogarsky, G.; Loughran, T.A. Elaborating the Individual Difference Component in Deterrence Theory. Annu. Rev. Law Soc. Sci. 2011, 7, 335–360. [Google Scholar] [CrossRef] [Green Version]
  63. Williams, K.R.; Hawkins, R. Perceptual Research on General Deterrence: A Critical Review. Law Soc. Rev. 1986, 20, 545–572. [Google Scholar] [CrossRef]
  64. Berry, M.J.; Westfall, A. Dial D for distraction: The making and breaking of cell phone policies in the college classroom. Coll. Teach. 2015, 63, 62–71. [Google Scholar] [CrossRef]
  65. Brinda, S.; Basu, P.A. Cyberloafing: The Di(sguised)gital Way of Loafing on the Job. Iup J. Organ. Behav. 2017, 16, 19–37. [Google Scholar]
  66. Gibbs, J.P. Crime, Punishment, and Deterrence; Elsevier: New York, NY, USA, 1975. [Google Scholar]
  67. Rogers, E.M. Diffusion of Innovation; The Free Press: New York, NY, USA, 1995. [Google Scholar]
  68. Lee, J.; Lee, Y. A holistic model of computer abuse within organizations. Inf. Manag. Comput. Secur. 2002, 10, 57–63. [Google Scholar] [CrossRef]
  69. Friedman, R.; Simons, T.; Liu, L. Behavior integrity as a driver of cross-race differences in employee attitudes. In Proceedings of the Academy of Management Annual Meetings, Seattle, WA, USA, 3–6 August 2003. [Google Scholar]
  70. Che, H.L.; Yang, C. Examining WeChat users’ motivations, trust, attitudes, and positive word-of-mouth: Evidence from China. Comput. Hum. Behav. 2014, 41, 104–111. [Google Scholar]
  71. Wu, J.; Liu, L.; Huang, L. Consumer acceptance of mobile payment across time. Ind. Manag. Data Syst. 2017, 117, 1761–1776. [Google Scholar] [CrossRef]
  72. Zheng, J.; Qi, Z.; Dou, Y.; Tan, Y. How Mega Is the Mega? Exploring the Spillover Effects of WeChat Using Graphical Model. Inf. Syst. Res. 2019, 30, 1343–1362. [Google Scholar] [CrossRef]
  73. Moody, G.D.; Siponen, M. Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work. Inf. Manag. 2013, 50, 322–335. [Google Scholar] [CrossRef]
  74. Agarwal, U.A.; Avey, J.B. Abusive supervisors and employees who cyberloaf: Examining the roles of psychological capital and contract breach. Internet Res. 2020, 30, 789–809. [Google Scholar] [CrossRef]
  75. Reed, K.; Doty, D.H.; May, D.R. The impact of aging on self-efficacy and computer skill acquisition. J. Manag. Issues 2005, 54, 212–228. [Google Scholar]
  76. Anderson, J.C.; Gerbing, D.W. Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach. Psychol. Bull. 1988, 103, 411–423. [Google Scholar] [CrossRef]
  77. Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
  78. Podsakoff, P.M.; Mackenzie, S.B.; Podsakoff, N.P. Sources of method bias in social science research and recommendations on how to control it. Annu. Rev. Psychol. 2012, 63, 539–569. [Google Scholar] [CrossRef] [Green Version]
  79. Slater, S.F.; Olson, E.M.; Hult, G.T.M. The moderating influence of strategic orientation on the strategy formation capability–performance relationship. Strateg. Manag. J. 2006, 27, 1221–1231. [Google Scholar] [CrossRef]
  80. Zhao, X.; Lynch, J.; Chen, Q. Reconsidering Baron and Kenny: Myths and Truths about Mediation Analysis. J. Consum. Res. 2010, 37, 197–206. [Google Scholar] [CrossRef]
  81. Hayes, A. Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach; The Guilford Press: New York, NY, USA, 2013. [Google Scholar]
  82. Hayes, A.F. Partial, conditional, and moderated moderated mediation: Quantification, inference, and interpretation. Commun. Monogr. 2018, 85, 4–40. [Google Scholar] [CrossRef]
  83. Kim, S.J.; Byrne, S. Conceptualizing personal web usage in work contexts: A preliminary framework. Comput. Hum. Behav. 2011, 27, 2271–2283. [Google Scholar] [CrossRef]
  84. O’Neill, A.; Hambley, A.; Chatellier, G. Cyberslacking, engagement, and personality in distributed work environments. Comput. Hum. Behav. 2014, 40, 152–160. [Google Scholar] [CrossRef]
  85. Jia, R.; Jia, H.H. An Individual Trait-based Investigation of Employee Cyberloafing. J. Inf. Technol. Manag. 2015, 26, 58–71. [Google Scholar]
  86. Jia, H.; Jia, R.; Karau, S. Cyberloafing and Personality: The Impact of the Big Five Traits and Workplace Situational Factors. J. Leadersh. Organ. Stud. 2013, 20, 358–365. [Google Scholar] [CrossRef]
  87. Vitak, J.; Crouse, J.; LaRose, R. Personal Internet use at work: Understanding cyberslacking. Comput. Hum. Behav. 2011, 27, 1751–1759. [Google Scholar] [CrossRef]
  88. Henle, C.A.; Blanchard, A.L. The Interaction of Work Stressors and Organizational Sanctions on Cyberloafing. J. Manag. Issues 2008, 20, 383–400. [Google Scholar]
  89. Ugrin, J.C.; Pearson, J.M.; Odom, M.D. Profiling Cyber-Slackers in the Workplace: Demographic, Cultural, and Workplace Factors. J. Internet Commer. 2008, 6, 75–89. [Google Scholar] [CrossRef]
  90. Koay, K.Y.; Soh, P.C.-H.; Chew, K.W. Do employees’ private demands lead to cyberloafing? The mediating role of job stress. Manag. Res. Rev. 2017, 40, 1025–1038. [Google Scholar] [CrossRef]
  91. Nivedhitha, K.S.; Sheik Manzoor, A.K. Get employees talking through enterprise social media! Reduce cyberslacking: A moderated mediation model. Internet Res. 2020, 30, 1167–1202. [Google Scholar]
  92. Weatherbee, T.G. Counterproductive use of technology at work: Information & communications technologies and cyberdeviancy. Hum. Resour. Manag. Rev. 2010, 20, 35–44. [Google Scholar]
  93. Mercado, B.K.; Giordano, C.; Dilchert, S. A meta-analytic investigation of cyberloafing. Career Dev. Int. 2017, 22, 546–564. [Google Scholar] [CrossRef]
  94. Ugrin, J.C.; Pearson, J.M. Exploring Internet Abuse in the Workplace: How Can We Maximize Deterrence Efforts? Rev. Bus. 2008, 28, 29–39. [Google Scholar]
  95. Higgins, G.E.; Wilson, A.L.; Fell, B.D. An Application of Deterrence Theory to Software Piracy. J. Crim. Justice Pop. Cult. 2005, 12, 166–184. [Google Scholar]
Figure 1. Research model.
Figure 1. Research model.
Ijerph 18 06751 g001
Figure 2. The interaction effect of OS and CS, as well as SS, on EC. Note: OS, observability; CS, perceived certainty of sanctions; SS, perceived severity of sanctions; and EC, employees’ cyberloafing.
Figure 2. The interaction effect of OS and CS, as well as SS, on EC. Note: OS, observability; CS, perceived certainty of sanctions; SS, perceived severity of sanctions; and EC, employees’ cyberloafing.
Ijerph 18 06751 g002
Figure 3. The interaction effect of PN and CS, as well as SS, on EC. Note: PN, perceived norms; CS, perceived certainty of sanctions; SS, perceived severity of sanctions; and EC, employees’ cyberloafing.
Figure 3. The interaction effect of PN and CS, as well as SS, on EC. Note: PN, perceived norms; CS, perceived certainty of sanctions; SS, perceived severity of sanctions; and EC, employees’ cyberloafing.
Ijerph 18 06751 g003
Table 1. Fit indices of the factor models.
Table 1. Fit indices of the factor models.
Modelχ2dfχ2/dfCFITLISRMRRMSEA∆χ2(∆df)
Single-factor model1365.2449015.1690.3490.2410.1740.2061200.4 (10) ***
Two-factor model1104.68589112.4120.4820.3890.1690.185939.9(9) ***
Three-factor model900.9568710.3560.5850.4990.1690.167736.1 (7) ***
Four-factor model321.003843.8210.8790.8490.0600.092156.2(4) ***
Five-factor model164.808802.0610.9570.9430.0410.056
Notes: OS, observability; PN, perceived norms; CS, perceived certainty of sanctions; SS, perceived severity of sanctions; EC, employees’ cyberloafing; single-factor model: OS + PN + CS + SS + EC; two-factor model: OS + PN + CS + SS, EC; three-factor model: OS + CS + SS, PN, EC; four-factor model: OS, PN, CS + SS, EC; and five-factor model: OS, PN, CS, SS, EC. *** p < 0.001.
Table 2. Means, standard deviations, and correlation coefficients of all variables.
Table 2. Means, standard deviations, and correlation coefficients of all variables.
VariablesMeanSDOSPNCSSSEC
OS4.2211.2660.902
PN3.9080.9010.568 ***0.712
CS4.2281.211−0.148 **−0.0900.801
SS4.8950.977−0.034−0.0800.506 ***0.769
EC3.3091.1740.387 ***0.308 ***−0.216 ***−0.247 ***0.780
Note: OS, observability; PN, perceived norms; CS, perceived certainty of sanctions; SS, perceived severity of sanctions; and EC, employees’ cyberloafing. The square roots of AVE values are bold and reported in diagonal. ** p < 0.01, and *** p < 0.001.
Table 3. Multiple regression analyses of the mediation effect.
Table 3. Multiple regression analyses of the mediation effect.
VariablesECPNEC
βtβtβT
GD−0.094−0.7610.0240.276−0.099−0.798
ED−0.118−0.7500.0400.367−0.125−0.797
IC0.0641.112−0.019−0.4820.0671.175
MS−0.283−1.6250.0710.591−0.295−1.703
WY0.1292.077−0.004−0.0850.1298 *2.098
PS−0.141−1.627−0.056−0.934−0.131−1.522
OS0.368 ***7.8230.402 ***12.3490.299 ***5.279
PN 0.172 *2.160
R20.1700.3260.182
F9.592 ***22.589 ***9.070 ***
Notes: OS, observability; PN, perceived norms; CS, perceived certainty of sanctions; SS, perceived severity of sanctions; and EC, employees’ cyberloafing; * p < 0.05, *** p < 0.001.
Table 4. The moderating effect of CS and SS.
Table 4. The moderating effect of CS and SS.
PNEC
βTβt
GD0.0240.2760.0250.230
ED0.0400.367−0.196−1.418
IC−0.019−0.4820.0170.337
MS0.0710.591−0.199−1.313
WY−0.004−0.0850.0951.731
PS−0.056−0.934−0.069−0.907
OS0.402 ***12.3490.359 ***6.989
CS −0.037−0.715
OS*CS −0.085 *−2.008
SS −0.190 **−3.037
OS*SS −0.123 *−2.094
PN 0.236 *3.327
PN*CS −0.142 *−2.174
PN*SS −0.171 *−1.990
R20.3260.390
F22.589 ***14.589 ***
Notes: OS, observability; PN, perceived norms; CS, perceived certainty of sanctions; SS, perceived severity of sanctions; and EC, employees’ cyberloafing; * p < 0.05, ** p < 0.01, *** p < 0.001.
Table 5. The moderated mediation effect of CS and SS.
Table 5. The moderated mediation effect of CS and SS.
Moderator VariableConditional indirect effects
EffectBoot SE95% CI
LLCIULCI
Low CS, Low SS0.2310.0460.1430.326
Low CS, High SS0.0970.058−0.0300.200
High CS, Low SS0.0930.062−0.0170.227
High CS, High SS−0.0410.043−0.1220.046
Indices of partial moderated mediation
IndexBoot SE95% CI
LLCIULCI
CS−0.0570.027−0.107−0.0003
SS−0.0690.032−0.134−0.011
Notes: CS, perceived certainty of sanctions; and SS, perceived severity of sanctions.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Song, M.; Ugrin, J.; Li, M.; Wu, J.; Guo, S.; Zhang, W. Do Deterrence Mechanisms Reduce Cyberloafing When It Is an Observed Workplace Norm? A Moderated Mediation Model. Int. J. Environ. Res. Public Health 2021, 18, 6751. https://doi.org/10.3390/ijerph18136751

AMA Style

Song M, Ugrin J, Li M, Wu J, Guo S, Zhang W. Do Deterrence Mechanisms Reduce Cyberloafing When It Is an Observed Workplace Norm? A Moderated Mediation Model. International Journal of Environmental Research and Public Health. 2021; 18(13):6751. https://doi.org/10.3390/ijerph18136751

Chicago/Turabian Style

Song, Mengmeng, Joseph Ugrin, Man Li, Jinnan Wu, Shanshan Guo, and Wenpei Zhang. 2021. "Do Deterrence Mechanisms Reduce Cyberloafing When It Is an Observed Workplace Norm? A Moderated Mediation Model" International Journal of Environmental Research and Public Health 18, no. 13: 6751. https://doi.org/10.3390/ijerph18136751

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop