{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T02:10:44Z","timestamp":1767665444519,"version":"3.37.3"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T00:00:00Z","timestamp":1671062400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T00:00:00Z","timestamp":1671062400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Educ Inf Technol"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s10639-022-11524-4","type":"journal-article","created":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T16:13:08Z","timestamp":1671120788000},"page":"8113-8133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Cyberloafing in academia: a sequential exploration into students\u2019 perceptions"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5216-9674","authenticated-orcid":false,"given":"Elham","family":"Heidari","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9149-3503","authenticated-orcid":false,"given":"Alireza","family":"Moghaddam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7180-3455","authenticated-orcid":false,"given":"Ghasem","family":"Salimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,15]]},"reference":[{"issue":"6","key":"11524_CR1","doi-asserted-by":"publisher","first-page":"888","DOI":"10.2522\/ptj.20140018","volume":"96","author":"WFM Aertssen","year":"2016","unstructured":"Aertssen, W. F. M., Ferguson, G. D., & Smits-Engelsman, B. C. M. (2016). Reliability and structural and construct validity of the functional strength measurement in children aged 4 to 10 years. Physical Therapy, 96(6), 888\u2013897. https:\/\/doi.org\/10.2522\/ptj.20140018.","journal-title":"Physical Therapy"},{"key":"11524_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.chb.2017.02.043","volume":"72","author":"Y Akbulut","year":"2017","unstructured":"Akbulut, Y., D\u00f6nmez, O., & Dursun, \u00d6. \u00d6. (2017). Cyberloafing and social desirability bias among students and employees. Computers in Human Behavior, 72, 87\u201395. https:\/\/doi.org\/10.1016\/j.chb.2017.02.043.","journal-title":"Computers in Human Behavior"},{"key":"11524_CR3","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1016\/j.chb.2015.11.002","volume":"55","author":"Y Akbulut","year":"2016","unstructured":"Akbulut, Y., Dursun, \u00d6. \u00d6., D\u00f6nmez, O., & \u015eahin, Y. L. (2016). In search of a measure to investigate cyberloafing in educational settings. Computers in Human Behavior, 55, 616\u2013625. https:\/\/doi.org\/10.1016\/j.chb.2015.11.002.","journal-title":"Computers in Human Behavior"},{"issue":"9\u201310","key":"11524_CR4","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1111\/jocn.12681","volume":"24","author":"R Al-Amer","year":"2015","unstructured":"Al-Amer, R., Ramjan, L., Glew, P., Darwish, M., & Salamonson, Y. (2015). Translation of interviews from a source language to a target language: examining issues in cross-cultural health care research. Journal of Clinical Nursing, 24(9\u201310), 1151\u20131162. https:\/\/doi.org\/10.1111\/jocn.12681.","journal-title":"Journal of Clinical Nursing"},{"issue":"3","key":"11524_CR5","doi-asserted-by":"publisher","first-page":"351","DOI":"10.46328\/ijte.84","volume":"4","author":"M Alanoglu","year":"2021","unstructured":"Alanoglu, M., & Karabatak, S. (2021). Examining of the smartphone cyberloafing in the class: relationship with the attitude towards learning and prevention of cyberloafing. International Journal of Technology in Education (IJTE), 4(3), 351\u2013372. https:\/\/doi.org\/10.46328\/ijte.84.","journal-title":"International Journal of Technology in Education (IJTE)"},{"issue":"3","key":"11524_CR6","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1016\/j.chb.2007.03.008","volume":"24","author":"AL Blanchard","year":"2008","unstructured":"Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing: the role of norms and external locus of control. Computers in Human Behavior, 24(3), 1067\u20131084. https:\/\/doi.org\/10.1016\/j.chb.2007.03.008.","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"11524_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77\u2013101. https:\/\/doi.org\/10.1191\/1478088706qp063oa.","journal-title":"Qualitative Research in Psychology"},{"issue":"2","key":"11524_CR8","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1089\/cpb.2007.0037","volume":"11","author":"A Carmeli","year":"2008","unstructured":"Carmeli, A., Sternberg, A., & Elizur, D. (2008). Organizational culture, creative behavior, and information and communication technology (ICT) usage: a facet analysis. Cyberpsychology & Behavior, 11(2), 175\u2013180.","journal-title":"Cyberpsychology & Behavior"},{"issue":"1","key":"11524_CR9","first-page":"332","volume":"17","author":"HC Chu","year":"2014","unstructured":"Chu, H. C. (2014). Potential negative effects of mobile learning on students\u2019 learning achievement and cognitive load: a format assessment perspective. Educational Technology & Society, 17(1), 332\u2013344.","journal-title":"Educational Technology & Society"},{"key":"11524_CR10","unstructured":"Cohen, D., & Crabtree, B. (2006). External audits. Retrieved from: http:\/\/qualres.org\/HomeExte-3704.html"},{"key":"11524_CR11","volume-title":"Statistical power analysis for the behavioral sciences","author":"J Cohen","year":"1988","unstructured":"Cohen, J. (1988). Statistical power analysis for the behavioral sciences (2nd ed.). Hillsdale, N.J: L. Erlbaum Associates.","edition":"2"},{"key":"11524_CR12","unstructured":"Creswell, J. W., & Plano Clark, V. L. (2011). Designing and conducting mixed methods research (Third edition.). SAGE."},{"key":"11524_CR13","unstructured":"Creswell, J. W., & Poth, C. N. (2017). Qualitative inquiry & research design: Choosing among five approaches (Fourth edition.). SAGE."},{"issue":"4","key":"11524_CR14","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1089\/109493102760275581","volume":"5","author":"RA Davis","year":"2002","unstructured":"Davis, R. A., Flett, G. L., & Besser, A. (2002). Validation of a new scale for measuring problematic internet use: implications for pre-employment screening. Cyberpsychology & Behavior, 5(4), 331\u2013345.","journal-title":"Cyberpsychology & Behavior"},{"key":"11524_CR15","volume-title":"The investigation of the relationship between cyberloafing, internet addiction, information literacy and cyber bullying. ECER 2016","author":"\u00d6 Demir","year":"2016","unstructured":"Demir, \u00d6., & Sefero\u011flu, S. S. (2016). The investigation of the relationship between cyberloafing, internet addiction, information literacy and cyber bullying. ECER 2016. Leading Education: The Distinct Contributions of Educational Research and Researchers."},{"key":"11524_CR16","unstructured":"Doorn, O. (2011). Cyberloafing: A multi-dimensional construct placed in a theoretical framework. (MS Thesis, Eindhoven University of Technology, Netherlands)."},{"key":"11524_CR17","doi-asserted-by":"publisher","unstructured":"Dwyer, S. C., & Buckle, J. L. (2009). The space between: on being an insider-outsider in qualitative research. International Journal of Qualitative Methods, 17(1), https:\/\/doi.org\/10.1177\/1609406918788176.","DOI":"10.1177\/1609406918788176"},{"issue":"2","key":"11524_CR18","doi-asserted-by":"publisher","first-page":"e202106","DOI":"10.30935\/ojcmt\/10823","volume":"11","author":"K Elciyar","year":"2021","unstructured":"Elciyar, K., & Simsek, A. (2021). An investigation of cyberloafing in a large-scale technology organization from the perspective of the theory of interpersonal behavior. Online Journal of Communication and Media Technologies, 11(2), e202106. https:\/\/doi.org\/10.30935\/ojcmt\/10823.","journal-title":"Online Journal of Communication and Media Technologies"},{"issue":"3","key":"11524_CR19","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1089\/cpb.2007.0146","volume":"11","author":"RK Garrett","year":"2008","unstructured":"Garrett, R. K., & Danziger, J. N. (2008). On cyberslacking: workplace status and personal internet use at work. CyberPsychology & Behavior, 11(3), 287\u2013292.","journal-title":"CyberPsychology & Behavior"},{"key":"11524_CR20","unstructured":"Gregory, M. (2011). A multi-theoretical perspective on IS security behaviors. (Academic Dissertation University of Oulu, Faculty of Science, Finland)."},{"issue":"1","key":"11524_CR21","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1108\/IntR-12-2014-0317","volume":"27","author":"Z Huma","year":"2017","unstructured":"Huma, Z., Hussain, S., Thurasamy, R., & Malik, M. I. (2017). Determinants of cyberloafing: a comparative study of a public and private sector organization. Internet Research, 27(1), 97\u2013117. https:\/\/doi.org\/10.1108\/IntR-12-2014-0317.","journal-title":"Internet Research"},{"issue":"1","key":"11524_CR22","doi-asserted-by":"publisher","first-page":"37","DOI":"10.18844\/cjes.v11i1.431","volume":"11","author":"H Keser","year":"2016","unstructured":"Keser, H., Kavuk, M., & Numanoglu, G. (2016). The relationship between cyberloafing and internet addiction. Cypriot Journal of Educational Sciences, 11(1), 37\u201342.","journal-title":"Cypriot Journal of Educational Sciences"},{"key":"11524_CR23","doi-asserted-by":"publisher","first-page":"63","DOI":"10.28945\/4022","volume":"17","author":"H Khechine","year":"2018","unstructured":"Khechine, H., & Lakhal, S. (2018). Technology as a double-edged sword: from behavior prediction with UTAUT to students\u2019 outcomes considering personal characteristics. Journal of Information Technology Education, 17, 63\u2013102. https:\/\/doi.org\/10.28945\/4022.","journal-title":"Journal of Information Technology Education"},{"key":"11524_CR24","unstructured":"Koay, K. Y. (2017). Antecedents and consequences of cyberloafing among ICT employees in MSC status companies. (Master\u2019s thesis, Multimedia University)."},{"issue":"3","key":"11524_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5210\/fm.v22i3.7302","volume":"22","author":"KY Koay","year":"2017","unstructured":"Koay, K. Y., Soh, P. C. H., & Chew, K. W. (2017). Antecedents and consequences of cyberloafing: evidence from the malaysian ICT industry. First Monday, 22(3), 1. https:\/\/doi.org\/10.5210\/fm.v22i3.7302.","journal-title":"First Monday"},{"issue":"3","key":"11524_CR26","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1177\/001316447003000308","volume":"30","author":"RV Krejcie","year":"1970","unstructured":"Krejcie, R. V., & Morgan, D. W. (1970). Determining sample size for research activities. Educational and Psychological Measurement, 30(3), 607\u2013610. https:\/\/doi.org\/10.1177\/001316447003000308.","journal-title":"Educational and Psychological Measurement"},{"key":"11524_CR27","unstructured":"Krueger, R. A., & Casey, M. A. (2015). Focus groups: A practical guide for applied research (5th edition.). SAGE Publications, Inc."},{"issue":"6","key":"11524_CR28","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1016\/j.chb.2004.03.030","volume":"22","author":"SM Li","year":"2006","unstructured":"Li, S. M., & Chung, T. M. (2006). Internet function and internet addictive behavior. Computers in Human Behavior, 22(6), 1067\u20131071. https:\/\/doi.org\/10.1016\/j.chb.2004.03.030.","journal-title":"Computers in Human Behavior"},{"issue":"6","key":"11524_CR29","doi-asserted-by":"publisher","first-page":"2192","DOI":"10.1016\/j.chb.2011.06.015","volume":"27","author":"B Liberman","year":"2011","unstructured":"Liberman, B., Seidman, G., McKenna, K. Y., & Buffardi, L. E. (2011). Employee job attitudes and organizational characteristics as predictors of cyberloafing. Computers in Human Behavior, 27(6), 2192\u20132199. https:\/\/doi.org\/10.1016\/j.chb.2011.06.015.","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"11524_CR30","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1002\/job.161","volume":"23","author":"VKG Lim","year":"2002","unstructured":"Lim, V. K. G. (2002). The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675\u2013694. https:\/\/doi.org\/10.1002\/job.161.","journal-title":"Journal of Organizational Behavior"},{"key":"11524_CR31","doi-asserted-by":"crossref","unstructured":"Lim, V. K. G., & Chen, D. J. Q. (2009). Impact of cyberloafing on affect, work depletion, facilitation and engagement. Conference Paper SIOP 2009, 1\u201320.","DOI":"10.1037\/e518422013-369"},{"issue":"8","key":"11524_CR32","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1016\/j.im.2004.12.002","volume":"42","author":"VKG Lim","year":"2005","unstructured":"Lim, V. K. G., & Teo, T. S. H. (2005). Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: an exploratory study. Information & Management, 42(8), 1081\u20131093. https:\/\/doi.org\/10.1016\/j.im.2004.12.002.","journal-title":"Information & Management"},{"key":"11524_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/0147-1767(85)90062-8","volume-title":"Naturalistic inquiry","author":"YS Lincoln","year":"1985","unstructured":"Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry. Beverly Hills, CA: Sage Publications."},{"key":"11524_CR34","doi-asserted-by":"publisher","first-page":"106160","DOI":"10.1016\/j.childyouth.2021.106160","volume":"128","author":"M Maqableh","year":"2021","unstructured":"Maqableh, M., & Alia, M. (2021). Evaluation online learning of undergraduate students under lockdown amidst COVID-19 pandemic: the online learning experience and students\u2019 satisfaction. Children and Youth Services Review, 128, 106160. https:\/\/doi.org\/10.1016\/j.childyouth.2021.106160.","journal-title":"Children and Youth Services Review"},{"key":"11524_CR35","doi-asserted-by":"publisher","unstructured":"Metin-Orta, I., & Demirtepe-Sayg\u0131l\u0131, D. (2021). Cyberloafing behaviors among university students: their relationships with positive and negative affect. Current Psychology, 1\u201314. https:\/\/doi.org\/10.1007\/s12144-021-02374-3.","DOI":"10.1007\/s12144-021-02374-3"},{"key":"11524_CR36","doi-asserted-by":"publisher","unstructured":"Metin-Orta, I., & Demirutku, K. (2022). Cyberloafing behaviors among university students and its relation to hedonistic-stimulation value orientation, cyberloafing attitudes, and time spent on the internet. Current Psychology, 4271\u20134282. https:\/\/doi.org\/10.1007\/s12144-020-00932-9.","DOI":"10.1007\/s12144-020-00932-9"},{"key":"11524_CR37","doi-asserted-by":"publisher","unstructured":"Miheli\u010d, K. K., Lim, V. K. G., & Culiberg, B. (2022). Cyberloafing among Gen Z students: the role of norms, moral disengagement, multitasking self-efficacy, and psychological outcomes. European Journal of Psychology of Education, 1\u201319. https:\/\/doi.org\/10.1007\/s10212-022-00617-w.","DOI":"10.1007\/s10212-022-00617-w"},{"key":"11524_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.04.005","author":"GD Moody","year":"2013","unstructured":"Moody, G. D., & Siponen, M. (2013). Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work.Information & Management, 50(6),322\u2013335. https:\/\/doi.org\/10.1016\/j.im.2013.04.005"},{"key":"11524_CR39","doi-asserted-by":"publisher","unstructured":"Nilsson, L. E. (2016). Technology as a double-edged sword: A promise yet to be fulfilled or a vehicle for cheating? In Handbook of Academic Integrity (pp.\u00a0607\u2013623). Springer Singapore. https:\/\/doi.org\/10.1007\/978-981-287-098-8_21","DOI":"10.1007\/978-981-287-098-8_21"},{"issue":"2","key":"11524_CR40","first-page":"102","volume":"4","author":"DE Ozler","year":"2012","unstructured":"Ozler, D. E., & Polat, G. (2012). Cyberloafing phenomenon in organizations: determinants and impacts. International Journal of eBusiness and eGovernment Studies, 4(2), 102\u2013116.","journal-title":"International Journal of eBusiness and eGovernment Studies"},{"issue":"2","key":"11524_CR41","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.im.2008.01.004","volume":"45","author":"LG Pee","year":"2008","unstructured":"Pee, L. G., Woon, I. M., & Kankanhalli, A. (2008). Explaining non-work-related computing in the workplace: a comparison of alternative models. Information & Management, 45(2), 120\u2013130. https:\/\/doi.org\/10.1016\/j.im.2008.01.004.","journal-title":"Information & Management"},{"issue":"5","key":"11524_CR42","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1108\/17515631011080704","volume":"11","author":"T Ramayah","year":"2010","unstructured":"Ramayah, T. (2010). Personal web usage and work inefficiency. Business Strategy Series, 11(5), 295\u2013301. https:\/\/doi.org\/10.1108\/17515631011080704.","journal-title":"Business Strategy Series"},{"issue":"5","key":"11524_CR43","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1097\/NMD.0000000000000130","volume":"202","author":"C Regehr","year":"2014","unstructured":"Regehr, C., Glancy, D., Pitts, A., & LeBlanc, V. R. (2014). Interventions to reduce the consequences of stress in physicians: a review and meta-analysis. The Journal of Nervous and Mental Disease, 202(5), 353\u2013359. https:\/\/doi.org\/10.1097\/NMD.0000000000000130.","journal-title":"The Journal of Nervous and Mental Disease"},{"key":"11524_CR44","doi-asserted-by":"crossref","unstructured":"Richards, S. L. D., & Morse, J. M. (2013). Readme first for a user\u2019s guide to qualitative methods (Third Edition.). Sage.","DOI":"10.4135\/9781071909898"},{"issue":"1","key":"11524_CR45","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10648-016-9388-9","volume":"30","author":"GJ Rop","year":"2018","unstructured":"Rop, G. J., van Wermeskerken, M., de Nooijer, J., Verkoeijen, P., & van Gog, T. (2018). Task experience as a boundary condition for the negative effects of irrelevant information on learning. Educational Psychology Review, 30(1), 229\u2013253. https:\/\/doi.org\/10.1007\/s10648-016-9388-9.","journal-title":"Educational Psychology Review"},{"issue":"2","key":"11524_CR46","doi-asserted-by":"publisher","first-page":"10","DOI":"10.5897\/JMCS2016.0499","volume":"9","author":"H Shafaat","year":"2017","unstructured":"Shafaat, H., & Truptimayee, P. (2017). Exploring cyberloafing behavior in South-central Ethiopia: a close look at Madda Walabu University. Journal of Media and Communication Studies, 9(2), 10\u201316.","journal-title":"Journal of Media and Communication Studies"},{"key":"11524_CR47","doi-asserted-by":"publisher","unstructured":"Soh, P. C. H., Koay, K. Y., & Chew, K. W. (2017). Conceptual view of cyberloafing and non-work domain. SHS Web of Conferences, 33, 29\u2013. https:\/\/doi.org\/10.1051\/shsconf\/20173300029","DOI":"10.1051\/shsconf\/20173300029"},{"key":"11524_CR48","unstructured":"Stoddart, S. R. (2016). The impact of cyberloafing and mindfulness on employee burnout. (Doctoral dissertation, Wayne State University)."},{"issue":"1","key":"11524_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s41239-021-00250-5","volume":"18","author":"S Toker","year":"2021","unstructured":"Toker, S., & Baturay, M. H. (2021). Factors affecting cyberloafing in computer laboratory teaching settings. International Journal of Educational Technology in Higher Education, 18(1), 1\u201324. https:\/\/doi.org\/10.1186\/s41239-021-00250-5.","journal-title":"International Journal of Educational Technology in Higher Education"},{"key":"11524_CR50","doi-asserted-by":"publisher","unstructured":"Totty, S., Betts, T., Pearson, J., & Setterstrom, A. (2014). Explaining cyberloafing through a theoretical integration of theory of interpersonal behavior and theory of organizational justice. In Business Education and Ethics: Concepts, Methodologies, Tools, and Applications (pp.\u00a0144\u2013165). IGI Global. https:\/\/doi.org\/10.4018\/978-1-5225-3153-1.ch008","DOI":"10.4018\/978-1-5225-3153-1.ch008"},{"key":"11524_CR51","volume-title":"Interpersonal behavior","author":"HC Triandis","year":"1977","unstructured":"Triandis, H. C. (1977). Interpersonal behavior. Monterey, Calif: Brooks\/Cole Pub. Co."},{"issue":"1","key":"11524_CR52","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s10758-017-9340-1","volume":"24","author":"F Varol","year":"2017","unstructured":"Varol, F., & Y\u0131ld\u0131r\u0131m, E. (2017). Cyberloafing in higher education: reasons and suggestions from students\u2019 perspectives. Technology Knowledge and Learning, 24(1), 129\u2013142. https:\/\/doi.org\/10.1007\/s10758-017-9340-1.","journal-title":"Technology Knowledge and Learning"},{"issue":"5","key":"11524_CR53","doi-asserted-by":"publisher","first-page":"1751","DOI":"10.1016\/j.chb.2011.03.002","volume":"27","author":"J Vitak","year":"2011","unstructured":"Vitak, J., Crouse, J., & LaRose, R. (2011). Personal internet use at work: understanding cyberslacking. Computers in Human Behavior, 27(5), 1751\u20131759. https:\/\/doi.org\/10.1016\/j.chb.2011.03.002.","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"11524_CR54","doi-asserted-by":"publisher","first-page":"1068","DOI":"10.1037\/a0027557","volume":"97","author":"DT Wagner","year":"2012","unstructured":"Wagner, D. T., Barnes, C. M., Lim, V. K. G., & Ferris, D. L. (2012). Lost sleep and cyberloafing: evidence from the laboratory and a daylight saving time quasi-experiment. Journal of Applied Psychology, 97(5), 1068\u20131076. https:\/\/doi.org\/10.1037\/a0027557.","journal-title":"Journal of Applied Psychology"},{"key":"11524_CR55","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1016\/j.sbspro.2013.06.114","volume":"83","author":"S Ya\u015far","year":"2013","unstructured":"Ya\u015far, S., & Yurdug\u00fcl, H. (2013). The investigation of relation between cyberloafing activities and cyberloafing behaviors in higher education. Procedia-Social and Behavioral Sciences, 83, 600\u2013604.","journal-title":"Procedia-Social and Behavioral Sciences"},{"key":"11524_CR56","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.chb.2014.12.023","volume":"45","author":"FGK Y\u0131lmaz","year":"2015","unstructured":"Y\u0131lmaz, F. G. K., Y\u0131lmaz, R., \u00d6zt\u00fcrk, H. T., Sezer, B., & Karademir, T. (2015). Cyberloafing as a barrier to the successful integration of information and communication technologies into teaching and learning environments. Computers in Human Behavior, 45, 290\u2013298. https:\/\/doi.org\/10.1016\/j.chb.2014.12.023.","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"11524_CR57","doi-asserted-by":"publisher","first-page":"165","DOI":"10.15171\/jcs.2015.017","volume":"4","author":"V Zamanzadeh","year":"2015","unstructured":"Zamanzadeh, V., Ghahramanian, A., Rassouli, M., Abbaszadeh, A., Alavi-Majd, H., & Nikanfar, A. R. (2015). Design and implementation content validity study: development of an instrument for measuring patient-centered communication. Journal of Caring Sciences, 4(2), 165\u2013178. https:\/\/doi.org\/10.15171\/jcs.2015.017.","journal-title":"Journal of Caring Sciences"},{"key":"11524_CR58","doi-asserted-by":"publisher","DOI":"10.1111\/bjep.12531","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., Tian, Y., Yao, L., Duan, C., Sun, X., & Niu, G. (2022). Teaching presence predicts cyberloafing during online learning: from the perspective of the community of inquiry framework and social learning theory. British Journal of Educational Psychology. https:\/\/doi.org\/10.1111\/bjep.12531.","journal-title":"British Journal of Educational Psychology"},{"issue":"5","key":"11524_CR59","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1080\/0144929X.2010.549511","volume":"31","author":"P Zoghbi-Manrique-de-Lara","year":"2012","unstructured":"Zoghbi-Manrique-de-Lara, P. (2012). Reconsidering the boundaries of the cyberloafing activity: the case of a university. Behaviour & Information Technology, 31(5), 469\u2013479. https:\/\/doi.org\/10.1080\/0144929X.2010.549511.","journal-title":"Behaviour & Information Technology"},{"issue":"4","key":"11524_CR60","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1108\/10662240610690052","volume":"16","author":"P Zoghbi-Manrique-de-Lara","year":"2006","unstructured":"Zoghbi-Manrique-de-Lara, P., Tacoronte, D. V., & Ding, J. M. T. (2006). Do current anti-cyberloafing disciplinary practices have a replica in research findings?: a study of the effects of coercive strategies on workplace internet misuse. Internet Research, 16(4), 450\u2013467. https:\/\/doi.org\/10.1108\/10662240610690052.","journal-title":"Internet Research"},{"issue":"1","key":"11524_CR61","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6920-8-24","volume":"8","author":"Ali Bikmoradi","year":"2008","unstructured":"Ali, Bikmoradi Mats, Brommels Alireza, Shoghli Zohreh, Sohrabi Italo, Masiello (2008) Requirements for effective academic leadership in Iran: A Nominal Group Technique exercise. BMC Medical Education 8(1) 24 10.1186\/1472-6920-8-24","journal-title":"BMC Medical Education"},{"key":"11524_CR62","doi-asserted-by":"publisher","DOI":"10.46743\/2160-3715\/2022.5210","author":"Maryam Roshanbin","year":"2022","unstructured":"Maryam, Roshanbin Mus, Nushi Zahra, Abolhassani (2022) University Foreign Language Teachers\u2019 Perceptions of Professor-Student Rapport: A Hybrid Qualitative Study. The Qualitative Report 10.46743\/2160-3715\/2022.5210","journal-title":"The Qualitative Report"}],"container-title":["Education and Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-022-11524-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10639-022-11524-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-022-11524-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T07:11:36Z","timestamp":1688368296000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10639-022-11524-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,15]]},"references-count":62,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["11524"],"URL":"https:\/\/doi.org\/10.1007\/s10639-022-11524-4","relation":{"references":[{"id-type":"uri","id":"","asserted-by":"subject"}]},"ISSN":["1360-2357","1573-7608"],"issn-type":[{"type":"print","value":"1360-2357"},{"type":"electronic","value":"1573-7608"}],"subject":[],"published":{"date-parts":[[2022,12,15]]},"assertion":[{"value":"27 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Statements and declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Statements and declarations"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Statements and declarations"}},{"value":"The authors have no financial or proprietary interests in any material discussed in this article.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Statements and declarations"}}]}}