Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Workplace cysberslacking: an investigation based on the theory of planned behavior
Download
index.pdf
Date
2020
Author
Koç, Yasemin Doğa
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
420
views
393
downloads
Cite This
The use of computers and mobiles at workspaces has increased dramatically in the last decade. Employees’ access to the Internet is inevitable and mostly required within working hours. Cyberslacking is a phenomenon that describes the non-work-related behavior conducted in the workplace by using the Internet. The effects of Cyberslacking behaviors in the workplace are still controversial. Literature suggests that Cyberslacking can be a facilitator of both positive and negative workplace behaviors. Thus, it is compelling to identify different types of Cyberslacking that might have contrasting effects in the workplace. The antecedents of this behavior still need investigation (Göncü Köse & Metin, 2018). According to prior literature, there are different theories that explain the concept of Cyberslacking. The present study adopts Theory of Planned Behavior (Ajzen, 2012) to predict Cyberslacking. The theory suggests that behavior is predicted by behavioral intentions, which is also determined by three factors; norms, attitudes, and perceived behavioral control. In this study, first a current Cyberslacking measure is updated with items generated from the preliminary study and validated followed by predicting Cyberslacking based on the Theory of Planned behavior. Further moderation analyses were conducted to validate the proposed model by including interaction effect of organizational norms and personality factors. Results showed that, Cyberslacking behavior has three dimensions, updating, research and planning, and entertainment, each successfully modeled with the Theory of Planned behavior. Also, results provided some evidence for the construct validity of the updated Cyberslacking scale. Facet based analysis revealed that updating and entertainment factors significantly and negatively correlated with agreeableness and the resistance to change, and positively with aggression. The research and planning factor is significantly and negatively correlated with agreeableness and resistance to change, positively with aggression, proactive personality, opinion leadership and openness to experience. Finally, the results of moderation analysis showed that, norms and personality interaction play a role in predicting the presence of the different types of Cyberslacking behavior in the workplace.
Subject Keywords
Cyberslacking
,
scale development
,
validation
,
theory of planned behavior
,
personality
URI
http://etd.lib.metu.edu.tr/upload/12624962/index.pdf
https://hdl.handle.net/11511/46132
Collections
Graduate School of Social Sciences, Thesis
Suggestions
OpenMETU
Core
Context-awareness in ubiquitous computing and the mobile devices
Akcit, Nuhcan; Tomur, Emrah; Karslıoğlu, Mahmut Onur (2015-03-19)
Mobile device use has vastly increased in the last few years. Many people use many mobile devices in their daily lives. Context-aware computing is the main feature of pervasive and ubiquitous computing. Context awareness is also an important topic that becomes more available with ubiquitous computing. As the sensors increase, the data collected via mobile device sensors and sensor networks do not have much value because of the difficulty in analysis and understanding the data. Context-aware computing helps ...
Explainable Security in SDN-Based IoT Networks
Sarica, Alper Kaan; Angın, Pelin (2020-12-01)
The significant advances in wireless networks in the past decade have made a variety of Internet of Things (IoT) use cases possible, greatly facilitating many operations in our daily lives. IoT is only expected to grow with 5G and beyond networks, which will primarily rely on software-defined networking (SDN) and network functions virtualization for achieving the promised quality of service. The prevalence of IoT and the large attack surface that it has created calls for SDN-based intelligent security solut...
StreamMARS: A Streaming Multivariate Adaptive Regression Splines Algorithm
Batmaz, İnci (2019-12-14)
Computers and internet have become inevitable parts of our life in the 1990s, and afterwards, bulk of data are started being recorded in digital platforms automatically. To extract meaningful patterns from such data computational methods are developed in data mining and machine learning domains. Multivariate adaptive regression splines (MARS) is one such method successfully applied to off-line static data for prediction. In about last ten years, we face with the big data problem due to the steady increase i...
Random Walk Based Context-Aware Activity Recommendation for Location Based Social Networks
Bagci, Hakan; Karagöz, Pınar (2015-10-21)
The pervasiveness of location-acquisition technologies enable location-based social networks (LBSN) to become increasingly popular in recent years. Users are able to check-in their current location and share information with other users through these networks. LBSN check-in data can be used for the benefit of users by providing personalized recommendations. There are several location recommendation algorithms that employ LBSN data in the literature. However, there are few number of proposed activity recomme...
EPICS: A Framework for Enforcing Security Policies in Composite Web Services
Ranchal, Rohit; Bhargava, Bharat; Angın, Pelin; ben Othmane, Lotfi (Institute of Electrical and Electronics Engineers (IEEE), 2019-05-01)
With advances in cloud computing and the emergence of service marketplaces, the popularity of composite services marks a paradigm shift from single-domain monolithic systems to cross-domain distributed services, which raises important privacy and security concerns. Access control becomes a challenge in such systems because authentication, authorization and data disclosure may take place across endpoints that are not known to clients. The clients lack options for specifying policies to control the sharing of...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
Y. D. Koç, “Workplace cysberslacking: an investigation based on the theory of planned behavior,” Thesis (M.S.) -- Graduate School of Social Sciences. The Department of Psychology, Middle East Technical University, 2020.