Correlates of different forms of cyberloafing: The role of norms and external locus of control

  title={Correlates of different forms of cyberloafing: The role of norms and external locus of control},
  author={Anita L. Blanchard and Christine A. Henle},
  journal={Computers in Human Behavior},
Cyberloafing is the personal use of email and the Internet while at work. The purpose of this study is to identify the different forms of cyberloafing and their antecedents. We propose that cyberloafing has two primary forms: minor cyberloafing (e.g., sending and receiving personal email at work) and serious cyberloafing (e.g., online gambling, surfing adult oriented web sites). Additionally, we hypothesize that employees’ perceptions of coworker and supervisor norms supporting cyberloafing are… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.
40 Citations
49 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 40 extracted citations


Publications referenced by this paper.
Showing 1-10 of 49 references

A typology of deviant workplace behavior: A multidimensional scaling study

  • S. L. Robinson, R. J. Bennett
  • Academy of Management Journal,
  • 1995
Highly Influential
4 Excerpts

A multidimensional scaling approach to personal web usage in the workplace

  • M. Anandarajan, P. Devine, C. Simmers
  • 2004
Highly Influential
4 Excerpts

Constructive and destructive personal web use in the workplace: Mapping employee attitudes

  • M. Anandarajan, C. Simmers
  • 2004
Highly Influential
5 Excerpts

Perceptions of Internet abuse, liability, and fair use

  • A. L. Blanchard, C. A. Henle
  • Human Behavior
  • 2008

All the Internet’s a stage. Why don’t C.E.O.’s use it? The New York Times, July 20

  • D E.
  • Security Management,
  • 2006

Best practices in exploratory factor analysis : Four recommendations for getting the most out of your data

  • J. W. Osborne
  • Practical Assessment , Research and Evaluation
  • 2005
2 Excerpts

How to write an acceptable Internet usage policy

  • B. Welebir, B. Kleiner
  • Journal of Management
  • 2005
1 Excerpt

Similar Papers

Loading similar papers…