Traditional cyberloafing, mobile cyberloafing and personal mobile-internet loafing in business organizations: Exploring cognitive ethical logics

Sauvik Kumar Batabyal, K. Bhal
{"title":"Traditional cyberloafing, mobile cyberloafing and personal mobile-internet loafing in business organizations: Exploring cognitive ethical logics","authors":"Sauvik Kumar Batabyal, K. Bhal","doi":"10.1108/jices-07-2019-0081","DOIUrl":null,"url":null,"abstract":"Possession and usage of data-enabled smartphones have added further complexity to the issue of cyberloafing behavior and it certainly evokes newer ethical concerns. This study aims to explore how working individuals perceive the ethicality of their cyberloafing behaviors at the workplace and the cognitive logics they apply to justify their cyberloafing behavior.,Incorporating constructivist grounded theory methodology, 19 working managers from various organizations were interviewed face-to-face and responses were audio-recorded with prior consent. The recordings were transcribed verbatim, simultaneously analyzed and coded to let the themes emerge out of the data.,The research showed that working managers use varied combinations of office computers, personal laptops, smartphones, wireless internet provided at the office and personal mobile-internet to loaf around at workplaces. Moreover, it unearthed that employees use nine different neutralization techniques and six different ethical logics (with normative undertones) in a network fashion while considering the ethicality of cyberloafing behavior.,Recognizing the complexities is imperative to moderate any deviant behavior in an organization. The layers of ethicality and neutralization tactics will equip the working managers and companies to place the required internet and smartphone usage policies in the future.,This research has taken into account all forms of cyberloafing behaviors. The perceived ethicality of cyberloafing behavior at the workplace was not fully explored in a holistic manner before, specifically in the Indian context.","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Inf. Commun. Ethics Soc.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/jices-07-2019-0081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

Possession and usage of data-enabled smartphones have added further complexity to the issue of cyberloafing behavior and it certainly evokes newer ethical concerns. This study aims to explore how working individuals perceive the ethicality of their cyberloafing behaviors at the workplace and the cognitive logics they apply to justify their cyberloafing behavior.,Incorporating constructivist grounded theory methodology, 19 working managers from various organizations were interviewed face-to-face and responses were audio-recorded with prior consent. The recordings were transcribed verbatim, simultaneously analyzed and coded to let the themes emerge out of the data.,The research showed that working managers use varied combinations of office computers, personal laptops, smartphones, wireless internet provided at the office and personal mobile-internet to loaf around at workplaces. Moreover, it unearthed that employees use nine different neutralization techniques and six different ethical logics (with normative undertones) in a network fashion while considering the ethicality of cyberloafing behavior.,Recognizing the complexities is imperative to moderate any deviant behavior in an organization. The layers of ethicality and neutralization tactics will equip the working managers and companies to place the required internet and smartphone usage policies in the future.,This research has taken into account all forms of cyberloafing behaviors. The perceived ethicality of cyberloafing behavior at the workplace was not fully explored in a holistic manner before, specifically in the Indian context.
商业组织中的传统网络漫游、移动网络漫游和个人移动互联网漫游:认知伦理逻辑探索
拥有和使用具有数据功能的智能手机使网络闲逛行为的问题变得更加复杂,它肯定会引发新的道德问题。本研究旨在探讨工作个体如何感知其在工作场所的网络闲逛行为的伦理性,以及他们为其网络闲逛行为辩护的认知逻辑。采用建构主义扎根理论方法,对来自不同组织的19名在职经理进行了面对面访谈,并在事先同意的情况下对他们的回答进行了录音。录音被逐字抄录,同时进行分析和编码,让主题从数据中浮现出来。研究表明,在职经理们使用办公电脑、个人笔记本电脑、智能手机、办公室提供的无线互联网和个人移动互联网等各种组合在工作场所闲逛。此外,研究发现,员工在考虑网络闲逛行为的伦理性时,以网络方式使用了九种不同的中和技术和六种不同的伦理逻辑(具有规范性的底色)。认识到复杂性对于缓和组织中的任何越轨行为是必要的。道德和中立策略的层次将使工作经理和公司在未来制定所需的互联网和智能手机使用政策。这项研究考虑了所有形式的网络闲逛行为。在此之前,特别是在印度的背景下,人们并没有以整体的方式充分探讨工作场所网络闲逛行为的道德观念。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信