{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T06:26:30Z","timestamp":1775456790501,"version":"3.50.1"},"reference-count":182,"publisher":"MIS Quarterly","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3,1]]},"abstract":"<jats:p>Employees\u2019 nonwork use of information technology (IT), or cyberslacking, is of growing concern due to its erosion of job performance and other negative organizational consequences. Research on cyberslacking antecedents has drawn on diverse theoretical perspectives, resulting in the lack of a cohesive explanation of cyberslacking. Further, prior studies have generally overlooked IT-specific variables. To address cyberslacking problems in organizations, as well as research gaps in the literature, we used a combination of a literature-based approach and a qualitative inquiry to develop a model of cyberslacking that includes a 2\u00d72 typology of antecedents. The proposed model was tested and supported in a three-wave field study of 395 employees in a U.S. Fortune-100 organization. This study organizes antecedents from diverse research streams and validates their relative impact on cyberslacking, thus providing a cohesive theoretical explanation of cyberslacking. This study also incorporates contextualization (i.e., IT-specific factors) into theory development and enriches the IS literature by examining the nonwork aspects of IT use and their negative consequences to organizations. In addition, the results provide practitioners with insights into the nonwork use of IT in organizations, particularly regarding how they can take organizational action to mitigate cyberslacking and maintain employee productivity.<\/jats:p>","DOI":"10.25300\/misq\/2022\/14985","type":"journal-article","created":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T16:58:03Z","timestamp":1683219483000},"page":"281-316","source":"Crossref","is-referenced-by-count":33,"title":["Cyberslacking in the Workplace: Antecedents and Effects on Job Performance"],"prefix":"10.25300","volume":"47","author":[{"given":"Viswanath","family":"Venkatesh","sequence":"first","affiliation":[{"name":"Pamplin College of Business, Virginia Tech Blacksburg, VA 24061, U.S.A."}]},{"given":"Christy M. K.","family":"Cheung","sequence":"additional","affiliation":[{"name":"Department of Management, Marketing, and Information Systems, School of Business, Hong Kong Baptist University Kowloon, Hong Kong"}]},{"given":"Fred D.","family":"Davis","sequence":"additional","affiliation":[{"name":"Rawls College of Business, Texas Tech University Lubbock, TX, U.S.A."}]},{"given":"Zach W. Y.","family":"Lee","sequence":"additional","affiliation":[{"name":"Durham University Business School, Durham University Durham, U.K."}]}],"member":"10933","published-online":{"date-parts":[[2023,3,1]]},"reference":[{"issue":"3","key":"2025082212293759700_b1-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1111\/isj.12064","article-title":"The many faces of information technology interruptions: A taxonomy and preliminary investigation of their performance effects","volume":"25","author":"Addas","year":"2015","journal-title":"Information Systems Journal"},{"key":"2025082212293759700_b2-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.chb.2016.03.069","article-title":"Cyberloafing and job burnout: An investigation in the knowledge-intensive sector","volume":"62","author":"Aghaz","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"2025082212293759700_b3-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"4","key":"2025082212293759700_b4-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1111\/j.1559-1816.2002.tb00236.x","article-title":"Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior1","volume":"32","author":"Ajzen","year":"2002","journal-title":"Journal of Applied Social Psychology"},{"key":"2025082212293759700_b5-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.chb.2017.02.043","article-title":"Cyberloafing and social desirability bias among students and employees","volume":"72","author":"Akbulut","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"2025082212293759700_b6-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1080\/08874417.2019.1571455","article-title":"Employees\u2019 mobile cyberslacking and their commitment to the organization","volume":"61","author":"Alharthi","year":"2021","journal-title":"Journal of Computer Information Systems"},{"issue":"2","key":"2025082212293759700_b7-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1037\/a0013203","article-title":"The role of overall justice judgments in oganizational justice research: A test of mediation","volume":"94","author":"Ambrose","year":"2009","journal-title":"Journal of Applied Psychology"},{"key":"2025082212293759700_b8-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"crossref","first-page":"61","DOI":"10.4018\/978-1-59140-148-3.ch004","article-title":"Constructive and dysfunctional personal web usage in the workplace: Mapping employee attitudes","volume-title":"Personal web usage in the workplace: A guide to effective human resources management","author":"Anandarajan","year":"2004"},{"issue":"4","key":"2025082212293759700_b9-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1111\/jcc4.12085","article-title":"Predictors of use of social network sites at work - a specific type of cyberloafing","volume":"19","author":"Andreassen","year":"2014","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"4","key":"2025082212293759700_b10-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1007\/s10551-017-3764-3","article-title":"The relationship between individual work values and unethical decision-making and behavior at work","volume":"158","author":"Arciniega","year":"2019","journal-title":"Journal of Business Ethics"},{"key":"2025082212293759700_b11-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1016\/j.chb.2014.04.006","article-title":"Explaining cyberloafing: The role of the theory of planned behavior","volume":"36","author":"Askew","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"2025082212293759700_b12-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1177\/1548051818813091","article-title":"Disentangling how coworkers and supervisors influence employee cyberloafing: What normative information are employees attending to?","volume":"26","author":"Askew","year":"2019","journal-title":"Journal of Leadership & Organizational Studies"},{"issue":"3","key":"2025082212293759700_b13-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1287\/isre.1070.0134","article-title":"Assimilation of interorganizational business process standards","volume":"18","author":"Bala","year":"2007","journal-title":"Information Systems Research"},{"issue":"1","key":"2025082212293759700_b14-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1287\/mnsc.2014.2111","article-title":"Adaptation to information technology: A holistic nomological network from implementation to job outcomes","volume":"62","author":"Bala","year":"2016","journal-title":"Management Science"},{"key":"2025082212293759700_b15-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1080\/00222216.2006.11950087","article-title":"Accounting for leisure preferences from within: The relative contributions of gender, race or ethnicity, personality, affective style, and motivational orientation","volume":"38","author":"Barnett","year":"2006","journal-title":"Journal of Leisure Research"},{"issue":"1","key":"2025082212293759700_b16-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/j.1744-6570.1991.tb00688.x","article-title":"The Big Five personality dimensions and job performance: A meta-analysis","volume":"44","author":"Barrick","year":"1991","journal-title":"Personnel Psychology"},{"key":"2025082212293759700_b17-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1111\/1468-2389.00160","article-title":"Personality and performance at the beginning of the new millennium: What do we know and where do we go next?","volume":"9","author":"Barrick","year":"2001","journal-title":"International Journal of Selection and Assessment"},{"issue":"3","key":"2025082212293759700_b18-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"493","DOI":"10.2307\/25148693","article-title":"Understanding user responses to information technology: A coping model of user adaptation","volume":"29","author":"Beaudry","year":"2005","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025082212293759700_b19-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1037\/0021-9010.85.3.349","article-title":"Development of a measure of workplace deviance","volume":"85","author":"Bennett","year":"2000","journal-title":"The Journal of Applied Psychology"},{"key":"2025082212293759700_b20-10_rn_10_25300_misq_2022_14985","first-page":"247","article-title":"The past, present, and future of workplace deviance research","volume-title":"Organizational behavior: The state of the science","author":"Bennett","year":"2003","edition":"2nd"},{"issue":"4","key":"2025082212293759700_b21-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"23","DOI":"10.4018\/978-1-5225-3153-1.ch008","article-title":"Explaining cyberloafing through a theoretical integration of theory of interpersonal behavior and theory of organizational justice","volume":"26","author":"Betts","year":"2014","journal-title":"Journal of Organizational and End User Computing"},{"issue":"3","key":"2025082212293759700_b22-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1016\/j.chb.2007.03.008","article-title":"Correlates of different forms of cyberloafing: The role of norms and external locus of control","volume":"24","author":"Blanchard","year":"2008","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"2025082212293759700_b23-10_rn_10_25300_misq_2022_14985","first-page":"9","article-title":"Testing a measure of cyberloafing","volume":"35","author":"Blau","year":"2006","journal-title":"Journal of Allied Health"},{"issue":"3","key":"2025082212293759700_b24-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1080\/08874417.2010.11645417","article-title":"Why employees do non-work-related computing in the workplace","volume":"50","author":"Bock","year":"2010","journal-title":"The Journal of Computer Information Systems"},{"key":"2025082212293759700_b25-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"110040","DOI":"10.1016\/j.paid.2020.110040","article-title":"How is extraversion related to social media use? A literature review","volume":"164","author":"Bowden-Green","year":"2020","journal-title":"Personality and Individual Differences"},{"issue":"3","key":"2025082212293759700_b26-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"399","DOI":"10.2307\/25148690","article-title":"Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle","volume":"29","author":"Brown","year":"2005","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025082212293759700_b27-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1287\/isre.1120.0444","article-title":"From use to effective use: A representation theory perspective","volume":"24","author":"Burton-Jones","year":"2013","journal-title":"Information Systems Research"},{"issue":"4","key":"2025082212293759700_b28-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"808","DOI":"10.1287\/isre.1100.0295","article-title":"Identifying and testing the inhibitors of technology usage intentions","volume":"22","author":"Cenfetelli","year":"2011","journal-title":"Information Systems Research"},{"issue":"3","key":"2025082212293759700_b29-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s10551-018-4026-8","article-title":"Perceived overqualification and cyberloafing: A moderated-mediation model based on equity theory","volume":"164","author":"Cheng","year":"2020","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"2025082212293759700_b30-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.dss.2009.12.006","article-title":"A theoretical model of intentional social action in online social networks","volume":"49","author":"Cheung","year":"2010","journal-title":"Decision Support Systems"},{"issue":"4","key":"2025082212293759700_b31-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/367211.367276","article-title":"Targeting audiences on the internet","volume":"44","author":"Cheyne","year":"2001","journal-title":"Communications of the ACM"},{"issue":"4","key":"2025082212293759700_b32-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1287\/isre.8.4.342","article-title":"Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation","volume":"8","author":"Chin","year":"1997","journal-title":"Information Systems Research"},{"issue":"6","key":"2025082212293759700_b33-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1037\/0022-3514.58.6.1015","article-title":"A focus theory of normative conduct: Recycling the concept of norms to reduce littering in public places","volume":"58","author":"Cialdini","year":"1990","journal-title":"Journal of Personality and Social Psychology"},{"key":"2025082212293759700_b34-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","DOI":"10.4324\/9780203774441","volume-title":"Applied multiple regression\/correlation analysis for the behavioral sciences","author":"Cohen","year":"2004"},{"issue":"2","key":"2025082212293759700_b35-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"189","DOI":"10.2307\/249688","article-title":"Computer self-efficacy: Development of a measure and initial test","volume":"19","author":"Compeau","year":"1995","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212293759700_b36-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1287\/isre.1070.0153","article-title":"How does personality matter? Relating the five-factor model to technology acceptance and use","volume":"19","author":"Devaraj","year":"2008","journal-title":"Information Systems Research"},{"key":"2025082212293759700_b37-10_rn_10_25300_misq_2022_14985","volume-title":"Scale development: Theory and applications","author":"DeVellis","year":"2003","edition":"4th"},{"issue":"1","key":"2025082212293759700_b38-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1146\/annurev.ps.41.020190.002221","article-title":"Personality structure: Emergence of the five-factor model","volume":"41","author":"Digman","year":"1990","journal-title":"Annual Review of Psychology"},{"key":"2025082212293759700_b39-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1037\/1040-3590.18.2.192","article-title":"The mini-IPIP scales: Tiny-yet-effective measures of the Big Five factors of personality","volume":"18","author":"Donnellan","year":"2006","journal-title":"Psychological Assessment"},{"key":"2025082212293759700_b40-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983594","article-title":"Causal analysis with panel data","author":"Finkel","year":"1995","journal-title":"SAGE"},{"issue":"1","key":"2025082212293759700_b41-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1287\/isre.1070.0167","article-title":"Does fit matter? The impact of task-technology fit and appropriation on team performance in repeated tasks","volume":"20","author":"Fuller","year":"2009","journal-title":"Information Systems Research"},{"issue":"3","key":"2025082212293759700_b42-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1089\/cpb.2007.0146","article-title":"On cyberslacking: Workplace status and personal internet use at work","volume":"11","author":"Garrett","year":"2008","journal-title":"CyberPsychology & Behavior"},{"key":"2025082212293759700_b43-10_rn_10_25300_misq_2022_14985","volume-title":"The constitution of society","author":"Giddens","year":"1984"},{"issue":"2","key":"2025082212293759700_b44-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.im.2014.08.001","article-title":"To monitor or not to monitor: Effectiveness of a cyberloafing countermeasure","volume":"52","author":"Glassman","year":"2015","journal-title":"Information & Management"},{"issue":"6","key":"2025082212293759700_b45-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"103139","DOI":"10.1016\/j.im.2019.01.001","article-title":"Alone or together? Exploring the role of desire for online group gaming in players\u2019 social game addiction","volume":"56","author":"Gong","year":"2019","journal-title":"Information & Management"},{"issue":"2","key":"2025082212293759700_b46-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"crossref","first-page":"213","DOI":"10.2307\/249689","article-title":"Task-technology fit and individual performance","volume":"19","author":"Goodhue","year":"1995","journal-title":"MIS Quarterly"},{"issue":"6","key":"2025082212293759700_b47-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1086\/225469","article-title":"The strength of weak ties","volume":"78","author":"Granovetter","year":"1973","journal-title":"The American Journal of Sociology"},{"issue":"1","key":"2025082212293759700_b48-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"9","DOI":"10.2307\/257990","article-title":"A taxonomy of organizational justice theories","volume":"12","author":"Greenberg","year":"1987","journal-title":"Academy of Management Review"},{"issue":"4","key":"2025082212293759700_b49-10_rn_10_25300_misq_2022_14985","first-page":"44","article-title":"Net gains to hr technology","volume":"79","author":"Greengard","year":"2000","journal-title":"Workforce"},{"issue":"6","key":"2025082212293759700_b50-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1177\/0149206305279942","article-title":"Bad behavior\u201d in organizations: A review and typology for future research","volume":"31","author":"Griffin","year":"2005","journal-title":"Journal of Management"},{"issue":"7","key":"2025082212293759700_b51-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1080\/0144929X.2019.1617350","article-title":"Does techno-stress justify cyberslacking? An empirical study based on the neutralisation theory","volume":"39","author":"G\u00fc\u011fer\u00e7in","year":"2020","journal-title":"Behaviour & Information Technology"},{"issue":"4","key":"2025082212293759700_b52-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1037\/0021-9010.90.4.799","article-title":"A longitudinal study of the effects of dual-earner couples\u2019 utilization of family-friendly workplace supports on work and family outcomes","volume":"90","author":"Hammer","year":"2005","journal-title":"Journal of Applied Psychology"},{"issue":"3","key":"2025082212293759700_b53-10_rn_10_25300_misq_2022_14985","first-page":"383","article-title":"The interaction of work stressors and organizational sanctions on cyberloafing","volume":"20","author":"Henle","year":"2008","journal-title":"Journal of Managerial Issues"},{"issue":"4","key":"2025082212293759700_b54-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1016\/j.chb.2009.03.005","article-title":"Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory","volume":"25","author":"Henle","year":"2009","journal-title":"Computers in Human Behavior"},{"key":"2025082212293759700_b55-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1111\/emre.12407","article-title":"Job overload, organizational commitment, and motivation as antecedents of cyberloafing: Evidence from employee monitoring software","volume":"17","author":"Hensel","year":"2020","journal-title":"European Management Review"},{"issue":"2","key":"2025082212293759700_b56-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1080\/0960085X.2020.1756701","article-title":"Curbing cyberloafing: Studying general and specific deterrence effects with field evidence","volume":"30","author":"Hensel","year":"2021","journal-title":"European Journal of Information Systems"},{"key":"2025082212293759700_b57-10_rn_10_25300_misq_2022_14985","volume-title":"An empirical assessment of employee cyberslacking in the public sector","author":"Hernandez-Castro","year":"2016"},{"issue":"1","key":"2025082212293759700_b58-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1002\/job.621","article-title":"Towards a multi-foci approach to workplace aggression: A meta-analytic review of outcomes from different perpetrators","volume":"31","author":"Herschcovis","year":"2010","journal-title":"Journal of Organizational Behavior"},{"issue":"21","key":"2025082212293759700_b59-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"2579","DOI":"10.1080\/09585192.2016.1238126","article-title":"The impact of technology on work in the twenty-first century: Exploring the smart and dark side","volume":"27","author":"Holland","year":"2016","journal-title":"The International Journal of Human Resource Management"},{"issue":"1","key":"2025082212293759700_b60-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1108\/PR-11-2013-0211","article-title":"Electronic monitoring and surveillance in the workplace: The effects on trust in management, and the moderating role of occupational type","volume":"44","author":"Holland","year":"2015","journal-title":"Personnel Review"},{"issue":"2","key":"2025082212293759700_b61-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"398","DOI":"10.2307\/2578314","article-title":"Deterrence in the workplace: Perceived certainty, perceived severity, and employee theft","volume":"62","author":"Hollinger","year":"1983","journal-title":"Social Forces"},{"issue":"1","key":"2025082212293759700_b62-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1287\/isre.2013.0501","article-title":"A framework and guidelines for context-specific theorizing in information systems research","volume":"25","author":"Hong","year":"2014","journal-title":"Information Systems Research"},{"issue":"4","key":"2025082212293759700_b63-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1080\/07421222.2016.1267532","article-title":"Examining firms\u2019 green information technology practices: A hierarchical view of key drivers and their effects","volume":"33","author":"Hu","year":"2016","journal-title":"Journal of Management Information Systems"},{"key":"2025082212293759700_b64-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12144-021-01690-y","article-title":"Eager to belong: Social cyberloafing as a coping response to workplace ostracism","author":"Hu","year":"2021","journal-title":"Current Psychology"},{"issue":"1","key":"2025082212293759700_b65-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1108\/IntR-12-2014-0317","article-title":"Determinants of cyberloafing: A comparative study of a public and private sector organization","volume":"27","author":"Huma","year":"2017","journal-title":"Internet Research"},{"issue":"1","key":"2025082212293759700_b66-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/S0268-4012(02)00068-3","article-title":"Reducing the effect of email interruptions on employees","volume":"23","author":"Jackson","year":"2003","journal-title":"International Journal of Information Management"},{"issue":"1","key":"2025082212293759700_b67-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1080\/10447318.2019.1597574","article-title":"Cyberslacking or smart work: Smartphone usage log-analysis focused on app-switching behavior in work and leisure conditions","volume":"36","author":"Jeong","year":"2020","journal-title":"International Journal of Human-Computer Interaction"},{"issue":"3","key":"2025082212293759700_b68-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1177\/1548051813488208","article-title":"Cyberloafing and personality: The impact of the Big Five traits and workplace situational factors","volume":"20","author":"Jia","year":"2013","journal-title":"Journal of Leadership & Organizational Studies"},{"issue":"2","key":"2025082212293759700_b69-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"386","DOI":"10.2307\/20159208","article-title":"The essential impact of context on organizational behavior","volume":"31","author":"Johns","year":"2006","journal-title":"Academy of Management Review"},{"issue":"4","key":"2025082212293759700_b70-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"577","DOI":"10.5465\/amr.2017.0044","article-title":"Reflections on the 2016 decade award: Incorporating context in organizational research","volume":"42","author":"Johns","year":"2017","journal-title":"Academy of Management Review"},{"key":"2025082212293759700_b71-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1037\/0021-9010.87.3.530","article-title":"Five-factor model of personality and job satisfaction: A meta-analysis","volume":"87","author":"Judge","year":"2002","journal-title":"Journal of Applied Psychology"},{"issue":"4","key":"2025082212293759700_b72-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1037\/0021-9010.87.4.797","article-title":"Relationship of personality to performance motivation: A meta-analytic review","volume":"87","author":"Judge","year":"2002","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"2025082212293759700_b73-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1080\/07421222.2017.1297173","article-title":"To cyberloaf or not to cyberloaf: The impact of the announcement of formal organizational controls","volume":"34","author":"Khansa","year":"2017","journal-title":"Journal of Management Information Systems"},{"issue":"6","key":"2025082212293759700_b74-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1002\/hrm.21699","article-title":"When do employees cyberloaf? An interactionist perspective examining personality, justice, and empowerment","volume":"55","author":"Kim","year":"2016","journal-title":"Human Resource Management Review"},{"issue":"4","key":"2025082212293759700_b75-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1108\/IntR-07-2017-0268","article-title":"Workplace ostracism and cyberloafing: A moderated-mediation model","volume":"28","author":"Koay","year":"2018","journal-title":"Internet Research"},{"issue":"3","key":"2025082212293759700_b76-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v22i3.7302","article-title":"Antecedents and consequences of cyberloafing: Evidence from the Malaysian ICT industry","volume":"22","author":"Koay","year":"2017","journal-title":"First Monday"},{"key":"2025082212293759700_b77-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.chb.2013.09.021","article-title":"Exploring the positive side of personal internet use at work: Does it help in managing the border between work and nonwork?","volume":"30","author":"K\u00f6nig","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"9","key":"2025082212293759700_b78-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1037\/\/0003-066x.53.9.1017","article-title":"Internet paradox. A social technology that reduces social involvement and psychological well-being?","volume":"53","author":"Kraut","year":"1998","journal-title":"The American Psychologist"},{"issue":"2","key":"2025082212293759700_b79-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1093\/poq\/nfw054","article-title":"Nonresponse in organizational surveying: Attitudinal distribution form and conditional response probabilities\u2019 impact on patterns of bias","volume":"81","author":"Kulas","year":"2017","journal-title":"Public Opinion Quarterly"},{"key":"2025082212293759700_b80-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"70","DOI":"10.4236\/jhrss.2014.22007","article-title":"Critical analysis of cyberslacking in organizational structures","volume":"2","author":"Kuschnaroff","year":"2014","journal-title":"Journal of Human Resource and Sustainability Studies"},{"issue":"1","key":"2025082212293759700_b81-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1023\/A:1025035004930","article-title":"A qualitative and quantitative review of antecedents of counterproductive behavior in organizations","volume":"18","author":"Lau","year":"2003","journal-title":"Journal of Business and Psychology"},{"issue":"2","key":"2025082212293759700_b82-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1287\/isre.1120.0427","article-title":"Ensuring employees\u2019 it compliance: Carrot or stick?","volume":"24","author":"Liang","year":"2013","journal-title":"Information Systems Research"},{"issue":"6","key":"2025082212293759700_b83-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"2192","DOI":"10.1016\/j.chb.2011.06.015","article-title":"Employee job attitudes and organizational characteristics as predictors of cyberloafing","volume":"27","author":"Liberman","year":"2011","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"2025082212293759700_b84-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1108\/INTR-03-2020-0165","article-title":"The effects of abusive supervision, emotional exhaustion and organizational commitment on cyberloafing: A moderated-mediation examination","volume":"31","author":"Lim","year":"2021","journal-title":"Internet Research"},{"issue":"5","key":"2025082212293759700_b85-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1002\/job.161","article-title":"The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice","volume":"23","author":"Lim","year":"2002","journal-title":"Journal of Organizational Behavior"},{"key":"2025082212293759700_b86-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1016\/j.im.2004.12.002","article-title":"Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore an exploratory study","volume":"42","author":"Lim","year":"2005","journal-title":"Information & Management"},{"issue":"4","key":"2025082212293759700_b87-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1080\/01449290903353054","article-title":"Cyberloafing at the workplace: Gain or drain on work?","volume":"31","author":"Lim","year":"2012","journal-title":"Behaviour & Information Technology"},{"key":"2025082212293759700_b88-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1037\/0021-9010.86.1.114","article-title":"Accounting for common method variance in cross-sectional research designs","volume":"86","author":"Lindell","year":"2001","journal-title":"Journal of Applied Psychology"},{"issue":"4","key":"2025082212293759700_b89-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1037\/0021-9010.89.4.647","article-title":"Antecedents of counterproductive behavior at work: A general perspective","volume":"89","author":"Marcus","year":"2004","journal-title":"Journal of Applied Psychology"},{"key":"2025082212293759700_b90-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"crossref","DOI":"10.1145\/2858036.2858202","article-title":"Neurotics can\u2019t focus: An in situ study of online multitasking in the workplace","author":"Mark","year":"2016"},{"key":"2025082212293759700_b91-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"crossref","DOI":"10.4135\/9781412983389","volume-title":"Analyzing panel data","author":"Markus","year":"1979"},{"issue":"1","key":"2025082212293759700_b92-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1111\/1468-2389.00192","article-title":"Toward an integrative theory of counterproductive workplace behavior: A causal reasoning perspective","volume":"10","author":"Martinko","year":"2002","journal-title":"International Journal of Selection and Assessment"},{"issue":"5","key":"2025082212293759700_b93-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1337","DOI":"10.1287\/orsc.1120.0806","article-title":"The autonomy paradox: The implications of mobile email devices for knowledge professionals","volume":"24","author":"Mazmanian","year":"2013","journal-title":"Organization Science"},{"issue":"3","key":"2025082212293759700_b94-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1037\/0033-2909.120.3.323","article-title":"Social consequences of experiential openness","volume":"120","author":"McCrae","year":"1996","journal-title":"Psychological Bulletin"},{"issue":"4","key":"2025082212293759700_b95-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1002\/j.1556-6676.1991.tb01524.x","article-title":"The neo personality inventory: Using the five-factor modei in counseling","volume":"69","author":"McCrae","year":"1991","journal-title":"Journal of Counseling & Development"},{"issue":"4","key":"2025082212293759700_b96-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"809","DOI":"10.2307\/25148821","article-title":"Dispositional factors in internet use: Personality versus cognitive style","volume":"31","author":"McElroy","year":"2007","journal-title":"MIS Quarterly"},{"key":"2025082212293759700_b97-10_rn_10_25300_misq_2022_14985","volume-title":"Qualitative data analysis","author":"Miles","year":"1984"},{"key":"2025082212293759700_b98-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"crossref","DOI":"10.4135\/9781412984287","volume-title":"Focus groups as qualitative research","author":"Morgan","year":"1997"},{"issue":"4","key":"2025082212293759700_b99-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1108\/ER-12-2015-0216","article-title":"This is not what I wanted: The effect of avoidance coping strategy on non-work-related social media use at the workplace","volume":"38","author":"Ng","year":"2016","journal-title":"Employee Relations"},{"issue":"4","key":"2025082212293759700_b100-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1108\/INTR-04-2019-0138","article-title":"Get employees talking through enterprise social media! Reduce cyberslacking: A moderated mediation model","volume":"30","author":"Nivedhitha","year":"2020","journal-title":"Internet Research"},{"key":"2025082212293759700_b101-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-1-4684-2490-4_4","article-title":"An overview of psychological measurement","volume-title":"Clinical diagnosis of mental disorders: A handbook","author":"Nunnally","year":"1978"},{"key":"2025082212293759700_b102-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.chb.2014.02.015","article-title":"Prediction of cyberslacking when employees are working away from the office","volume":"34","author":"O\u2019Neill","year":"2014","journal-title":"Computers in Human Behavior"},{"key":"2025082212293759700_b103-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.chb.2014.08.005","article-title":"Cyberslacking, engagement, and personality in distributed work environments","volume":"40","author":"O\u2019Neill","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"2025082212293759700_b104-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1037\/0021-9010.78.4.679","article-title":"Comprehensive meta-analysis of integrity test validities: Findings and implications for personnel selection and theories of job performance","volume":"78","author":"Ones","year":"1993","journal-title":"Journal of Applied Psychology"},{"issue":"2","key":"2025082212293759700_b105-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"145","DOI":"10.2307\/3250927","article-title":"Technology and institutions: What can research on information technology and research on organizations learn from each other?","volume":"25","author":"Orlikowski","year":"2001","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025082212293759700_b106-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1287\/orsc.6.4.423","article-title":"Shaping electronic communication: The metastructuring of technology in the context of use","volume":"6","author":"Orlikowski","year":"1995","journal-title":"Organization Science"},{"issue":"2","key":"2025082212293759700_b107-10_rn_10_25300_misq_2022_14985","first-page":"1","article-title":"Cyberloafing phenomenon in organizations: Determinants and impacts","volume":"4","author":"Ozler","year":"2012","journal-title":"International Journal of eBusiness and eGovernment Studies"},{"issue":"5","key":"2025082212293759700_b108-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1080\/0144929X.2014.928744","article-title":"Teachers\u2019 personal web use at work","volume":"34","author":"Page","year":"2015","journal-title":"Behaviour & Information Technology"},{"issue":"2","key":"2025082212293759700_b109-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.im.2008.01.004","article-title":"Explaining non-work-related computing in the workplace: A comparison of alternative models","volume":"45","author":"Pee","year":"2008","journal-title":"Information & Management"},{"key":"2025082212293759700_b110-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.chb.2018.04.040","article-title":"Cyberloafing as a coping mechanism: Dealing with workplace boredom","volume":"86","author":"Pindek","year":"2018","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"2025082212293759700_b111-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1057\/ejis.2011.10","article-title":"Conceptualizing models using multidimensional constructs: A review and guidelines for their use","volume":"21","author":"Polites","year":"2012","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"2025082212293759700_b112-10_rn_10_25300_misq_2022_14985","first-page":"18","article-title":"Cyberloafing can be curbed","volume":"76","author":"Polito","year":"1997","journal-title":"Workforce"},{"issue":"2","key":"2025082212293759700_b113-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.jrp.2011.01.006","article-title":"Yielding to (cyber)-temptation: Exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace","volume":"45","author":"Restubog","year":"2011","journal-title":"Journal of Research in Personality"},{"issue":"1","key":"2025082212293759700_b114-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1287\/isre.2016.0666","article-title":"Extending the concept of control beliefs: Integrating the role of advice networks","volume":"28","author":"Robert","year":"2017","journal-title":"Information Systems Research"},{"issue":"1","key":"2025082212293759700_b115-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1037\/0021-9010.87.1.66","article-title":"The relative importance of task, citizenship, and counterproductive performance to global ratings of job performance: A policy-capturing approach","volume":"87","author":"Rotundo","year":"2002","journal-title":"Journal of Applied Psychology"},{"key":"2025082212293759700_b116-10_rn_10_25300_misq_2022_14985","volume-title":"Theories of personality","author":"Ryckman","year":"2004"},{"key":"2025082212293759700_b117-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"145","DOI":"10.4135\/9781848608320","article-title":"Counterproductive behaviors at work","volume":"1","author":"Sackett","year":"2001","journal-title":"Handbook of industrial, work, and organizational psychology"},{"issue":"1","key":"2025082212293759700_b118-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1111\/1468-2389.00198","article-title":"The Big Five personality dimensions and counterproductive behaviors","volume":"10","author":"Salgado","year":"2002","journal-title":"International Journal of Selection and Assessment"},{"issue":"1","key":"2025082212293759700_b119-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1177\/1525822x11419104","article-title":"Web versus mail: The influence of survey distribution mode on employees\u2019 response","volume":"24","author":"Saunders","year":"2012","journal-title":"Field Methods"},{"issue":"3","key":"2025082212293759700_b120-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"663","DOI":"10.25300\/MISQ\/2016\/40.3.07","article-title":"Capturing the complexity of malleable IT use adaptive structuration theory for individuals","volume":"40","author":"Schmitz","year":"2016","journal-title":"MIS Quarterly"},{"issue":"12","key":"2025082212293759700_b121-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1080\/0144929X.2019.1580311","article-title":"Cyberloafing and personality traits: An investigation among knowledge-workers across the Iranian knowledge-intensive sectors","volume":"38","author":"Sheikh","year":"2019","journal-title":"Behaviour & Information Technology"},{"key":"2025082212293759700_b122-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.chb.2015.04.042","article-title":"The antecedents of cyberloafing: A case study in an Iranian copper industry","volume":"51","author":"Sheikh","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"2025082212293759700_b123-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"339","DOI":"10.2307\/25148734","article-title":"Managing peer-to-peer conflicts in disruptive information technology innovations: The case of software reuse","volume":"30","author":"Sherif","year":"2006","journal-title":"MIS Quarterly"},{"issue":"5","key":"2025082212293759700_b124-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1037\/0022-3514.83.5.1165","article-title":"A developmental perspective on personality in emerging adulthood: Childhood antecedents and concurrent adaptation","volume":"83","author":"Shiner","year":"2002","journal-title":"Journal of Personality and Social Psychology"},{"key":"2025082212293759700_b125-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1108\/S0742-7301(2009)0000028010","article-title":"The neurotic employee: Theoretical analysis of the influence of narrow facets of neuroticism on cognitive, social, and behavioral processes relevant to job performance","volume-title":"Research in personnel and human resources management","author":"Slaughter","year":"2009"},{"issue":"3","key":"2025082212293759700_b126-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.ijinfomgt.2015.12.005","article-title":"Procedural justice to enhance compliance with non-work-related computing (NWRC) rules: Its determinants and interaction with privacy concerns","volume":"36","author":"Son","year":"2016","journal-title":"International Journal of Information Management"},{"key":"2025082212293759700_b127-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3127\/ajis.v24i0.2087","article-title":"The impact of ambivalent perception of bureaucratic structure on cyberloafing","volume":"24","author":"Soral","year":"2020","journal-title":"Australasian Journal of Information Systems"},{"issue":"2","key":"2025082212293759700_b128-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"453","DOI":"10.2307\/41703463","article-title":"Understanding user revisions when using information system features: Adaptive system use and triggers","volume":"36","author":"Sun","year":"2012","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025082212293759700_b129-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"473","DOI":"10.25300\/MISQ\/2015\/39.2.09","article-title":"Support structures and their impacts on employee outcomes: A longitudinal field study of an enterprise system implementation","volume":"39","author":"Sykes","year":"2015","journal-title":"MIS Quarterly"},{"key":"2025082212293759700_b130-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.25300\/MISQ\/2020\/11672","article-title":"Enterprise system implementation and employee job outcomes: Understanding the role of formal and informal support structures using the job strain model","volume":"44","author":"Sykes","year":"2020","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025082212293759700_b131-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"917","DOI":"10.25300\/MISQ\/2017\/41.3.11","article-title":"Explaining post-implementation employee system use and job performance: Impacts of the content and source of social network ties","volume":"41","author":"Sykes","year":"2017","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212293759700_b132-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"51","DOI":"10.25300\/MISQ\/2014\/38.1.03","article-title":"Enterprise system implementation and employee job performance: Understanding the role of advice networks","volume":"38","author":"Sykes","year":"2014","journal-title":"MIS Quarterly"},{"key":"2025082212293759700_b133-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"974","DOI":"10.1037\/0021-9010.86.5.974","article-title":"Personality moderators of the relationship between abusive supervision and subordinates\u2019 resistance","volume":"86","author":"Tepper","year":"2001","journal-title":"Journal of Applied Psychology"},{"issue":"3","key":"2025082212293759700_b134-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"831","DOI":"10.25300\/MISQ\/2018\/11881","article-title":"Mindfulness in information technology use: Definitions, distinctions, and a new measure","volume":"42","author":"Thatcher","year":"2018","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212293759700_b135-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1080\/23808985.2013.11679130","article-title":"Social media use in organizations: Exploring the affordances of visibility, editability, persistence, and association","volume":"36","author":"Treem","year":"2013","journal-title":"Annals of the International Communication Association"},{"key":"2025082212293759700_b136-10_rn_10_25300_misq_2022_14985","volume-title":"Interpersonal behavior","author":"Triandis","year":"1977"},{"issue":"3","key":"2025082212293759700_b137-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1016\/j.chb.2012.11.005","article-title":"The effects of sanctions and stigmas on cyberloafing","volume":"29","author":"Ugrin","year":"2013","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"2025082212293759700_b138-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/502269.502303","article-title":"Does electronic monitoring of employee internet usage work?","volume":"45","author":"Urbaczewski","year":"2002","journal-title":"Communications of the ACM"},{"issue":"2","key":"2025082212293759700_b139-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1080\/0144929X.2019.1683607","article-title":"Does meaningful work reduce cyberloafing? Important roles of affective commitment and leader-member exchange","volume":"40","author":"Usman","year":"2021","journal-title":"Behaviour & Information Technology"},{"issue":"6157","key":"2025082212293759700_b140-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1126\/science.1240474","article-title":"Atypical combinations and scientific impact","volume":"342","author":"Uzzi","year":"2013","journal-title":"Science"},{"issue":"4","key":"2025082212293759700_b141-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1287\/isre.11.4.342.11872","article-title":"Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model","volume":"11","author":"Venkatesh","year":"2000","journal-title":"Information Systems Research"},{"issue":"2","key":"2025082212293759700_b142-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","article-title":"Technology acceptance model 3 and a research agenda on interventions","volume":"39","author":"Venkatesh","year":"2008","journal-title":"Decision Sciences"},{"issue":"5","key":"2025082212293759700_b143-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1111\/j.1937-5956.2010.01148.x","article-title":"Impacts of information and communication technology implementations on employees\u2019 jobs in service organizations in India: A multi-method longitudinal field study","volume":"19","author":"Venkatesh","year":"2010","journal-title":"Production and Operations Management"},{"issue":"1","key":"2025082212293759700_b144-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"21","DOI":"10.25300\/MISQ\/2013\/37.1.02","article-title":"Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems","volume":"37","author":"Venkatesh","year":"2013","journal-title":"MIS Quarterly"},{"key":"2025082212293759700_b145-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"435","DOI":"10.17705\/1jais.00433","article-title":"Guidelines for conducting mixed-methods research: An extension and illustration","volume":"17","author":"Venkatesh","year":"2016","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"2025082212293759700_b146-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"267","DOI":"10.17705\/1jais.00120","article-title":"Dead or alive? The development, trajectory and future of technology adoption research","volume":"8","author":"Venkatesh","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"key":"2025082212293759700_b147-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.obhdp.2006.02.003","article-title":"Role of time in self-prediction of behavior","volume":"100","author":"Venkatesh","year":"2006","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"3","key":"2025082212293759700_b148-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"Venkatesh","year":"2003","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025082212293759700_b149-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1108\/IMDS-08-2020-0506","article-title":"The future is now: Calling for a focus on temporal issues in information system research","volume":"121","author":"Venkatesh","year":"2021","journal-title":"Industrial Management & Data Systems"},{"key":"2025082212293759700_b150-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"903","DOI":"10.25300\/MISQ\/2019\/12338","article-title":"Children\u2019s internet addiction, family-to-work conflict, and job outcomes: A study of parent-child dyads","volume":"43","author":"Venkatesh","year":"2019","journal-title":"MIS Quarterly"},{"issue":"5","key":"2025082212293759700_b151-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"328","DOI":"10.17705\/1jais.00428","article-title":"Unified theory of acceptance and use of technology: A synthesis and the road ahead","volume":"17","author":"Venkatesh","year":"2016","journal-title":"Journal of the Association for Information Systems"},{"issue":"10","key":"2025082212293759700_b152-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00312","article-title":"Hype or help? A longitudinal field study of virtual world use for team collaboration","volume":"13","author":"Venkatesh","year":"2012","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"2025082212293759700_b153-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1080\/07421222.2018.1523531","article-title":"The \u201cdarth\u201d side of technology use: An inductively derived typology of cyberdeviance","volume":"35","author":"Venkatraman","year":"2018","journal-title":"Journal of Management Information Systems"},{"issue":"5","key":"2025082212293759700_b154-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1751","DOI":"10.1016\/j.chb.2011.03.002","article-title":"Personal internet use at work: Understanding cyberslacking","volume":"27","author":"Vitak","year":"2011","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"2025082212293759700_b155-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1093\/poq\/nfs032","article-title":"A comparison of alternative indicators for the risk of nonresponse bias","volume":"76","author":"Wagner","year":"2012","journal-title":"Public Opinion Quarterly"},{"issue":"5","key":"2025082212293759700_b156-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1068","DOI":"10.1037\/a0027557","article-title":"Lost sleep and cyberloafing: Evidence from the laboratory and a daylight saving time quasi-experiment","volume":"97","author":"Wagner","year":"2012","journal-title":"Journal of Applied Psychology"},{"issue":"4","key":"2025082212293759700_b157-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10799-013-0164-y","article-title":"The effects and moderators of cyber-loafing controls: An empirical study of Chinese public servants","volume":"14","author":"Wang","year":"2013","journal-title":"Information Technology and Management"},{"key":"2025082212293759700_b158-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/B978-012134645-4\/50030-5","article-title":"Extraversion and its positive emotional core","volume-title":"Handbook of personality psychology","author":"Watson","year":"1997"},{"issue":"2","key":"2025082212293759700_b159-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1080\/12460125.2020.1798591","article-title":"Analyzing the past to prepare for the future: Writing a literature review","volume":"26","author":"Webster","year":"2002","journal-title":"MIS Quarterly"},{"issue":"5","key":"2025082212293759700_b160-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"540","DOI":"10.5465\/256941","article-title":"The role-based performance scale: Validity analysis of a theory-based measure","volume":"41","author":"Welbourne","year":"1998","journal-title":"Academy of Management Journal"},{"issue":"2","key":"2025082212293759700_b161-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.chb.2004.06.005","article-title":"New rules in the workplace: Applying object-relations theory to explain problem internet and email behaviour in the workplace","volume":"22","author":"Whitty","year":"2006","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"2025082212293759700_b162-10_rn_10_25300_misq_2022_14985","first-page":"38","article-title":"Delinquent behavior and the five-factor model: Hiding in the adaptive landscape?","volume":"2","author":"Wiebe","year":"2004","journal-title":"Individual Differences Research"},{"issue":"1","key":"2025082212293759700_b163-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1","DOI":"10.25300\/MISQ\/2013\/37.1.01","article-title":"Beyond deterrence: An expanded view of employee computer abuse","volume":"37","author":"Willison","year":"2013","journal-title":"MIS Quarterly"},{"key":"2025082212293759700_b164-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.paid.2017.12.032","article-title":"The Big Five, everyday contexts and activities, and affective experience","volume":"136","author":"Wilt","year":"2019","journal-title":"Personality and Individual Differences"},{"key":"2025082212293759700_b165-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1037\/pspp0000054","article-title":"Personality-situation transactions from adolescence to old age","volume":"110","author":"Wrzus","year":"2016","journal-title":"Journal of Personality and Social Psychology"},{"key":"2025082212293759700_b166-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.jbusres.2020.02.043","article-title":"The bright and dark sides of social cyberloafing: Effects on employee mental health in china","volume":"112","author":"Wu","year":"2020","journal-title":"Journal of Business Research"},{"key":"2025082212293759700_b167-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","DOI":"10.4102\/sajhrm.v17i0.1116","article-title":"The relationship between social media usage in the workplace and employee productivity in the public sector: Case study of government departments in Harare","volume":"17","author":"Wushe","year":"2019","journal-title":"SA Journal of Human Resource Management"},{"key":"2025082212293759700_b168-10_rn_10_25300_misq_2022_14985","article-title":"Internet use and misuse in the workplace","author":"Wyatt","year":"2005"},{"issue":"2","key":"2025082212293759700_b169-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1287\/isre.1090.0266","article-title":"Punishment, justice, and compliance in mandatory it settings","volume":"22","author":"Xue","year":"2011","journal-title":"Information Systems Research"},{"issue":"4","key":"2025082212293759700_b170-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1080\/07421222.2015.1138373","article-title":"A multilevel approach to examine employees\u2019 loyal use of ERP systems in organizations","volume":"32","author":"Yen","year":"2015","journal-title":"Journal of Management Information Systems"},{"issue":"6","key":"2025082212293759700_b171-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1016\/j.im.2015.05.006","article-title":"Does it team climate matter? An empirical study of the impact of co-workers and the confucian work ethic on deviance behavior","volume":"52","author":"Zhang","year":"2015","journal-title":"Information & Management"},{"issue":"1","key":"2025082212293759700_b172-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1108\/INTR-10-2018-0469","article-title":"Are overqualified employees bad apples? A dual-pathway model of cyberloafing","volume":"30","author":"Zhang","year":"2020","journal-title":"Internet Research"},{"issue":"3","key":"2025082212293759700_b173-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"811","DOI":"10.25300\/MISQ\/2017\/41.3.07","article-title":"Knowledge management system use and job performance: A multilevel contingency model","volume":"41","author":"Zhang","year":"2017","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025082212293759700_b174-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.25300\/MISQ\/2017\/41.4.12","article-title":"A nomological network of knowledge management system use: Antecedents and consequences","volume":"41","author":"Zhang","year":"2017","journal-title":"MIS Quarterly"},{"key":"2025082212293759700_b175-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-021-01505-0","article-title":"Challenge-hindrance stressors and cyberloafing: A perspective of resource conservation versus resource acquisition","author":"Zhou","year":"2021","journal-title":"Current Psychology"},{"issue":"6","key":"2025082212293759700_b176-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1108\/02683940610684418","article-title":"Fear in organizations: Does intimidation by formal punishment mediate the relationship between interactional justice and workplace internet deviance?","volume":"21","author":"Zoghbi-Manrique-de-Lara","year":"2006","journal-title":"Journal of Managerial Psychology"},{"issue":"3","key":"2025082212293759700_b177-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1089\/cpb.2006.9931","article-title":"Relationship between organizational justice and cyberloafing in the workplace: Has \u201canomia\u201d a say in the matter?","volume":"10","author":"Zoghbi-Manrique-de-Lara","year":"2007","journal-title":"CyberPsychology & Behavior"},{"issue":"2","key":"2025082212293759700_b178-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1108\/1044460910949630","article-title":"Inequity, conflict, and compliance dilemma as causes of cyberloafing","volume":"20","author":"Zoghbi-Manrique-de-Lara","year":"2009","journal-title":"International Journal of Conflict Management"},{"issue":"4","key":"2025082212293759700_b179-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1108\/10662240610690052","article-title":"Do current anti-cyberloafing disciplinary practices have a replica in research findings?","volume":"16","author":"Zoghbi-Manrique-de-Lara","year":"2006","journal-title":"Internet Research"},{"issue":"7","key":"2025082212293759700_b180-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1108\/02635571011069095","article-title":"Bringing cyber loafers back on the right track","volume":"110","author":"Zoghbi-Manrique-de-Lara","year":"2010","journal-title":"Industrial Management & Data Systems"},{"issue":"3","key":"2025082212293759700_b181-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1177\/1548051817696877","article-title":"Corporate culture as a mediator in the relationship between ethical leadership and personal internet use","volume":"24","author":"Zoghbi-Manrique-de-Lara","year":"2017","journal-title":"Journal of Leadership & Organizational Studies"},{"issue":"2","key":"2025082212293759700_b182-10_rn_10_25300_misq_2022_14985","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1108\/PR-12-2017-0384","article-title":"Does supervisors\u2019 mindfulness keep employees from engaging in cyberloafing out of compassion at work?","volume":"49","author":"Zoghbi-Manrique-de-Lara","year":"2020","journal-title":"Personnel Review"}],"container-title":["MIS Quarterly"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/47\/1\/281\/8717\/10_rn_10_25300_misq_2022_14985.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/47\/1\/281\/8717\/10_rn_10_25300_misq_2022_14985.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:29:49Z","timestamp":1755880189000},"score":1,"resource":{"primary":{"URL":"https:\/\/misq.umn.edu\/misq\/article\/47\/1\/281\/2207\/Cyberslacking-in-the-Workplace-Antecedents-and"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,1]]},"references-count":182,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,3,1]]},"published-print":{"date-parts":[[2023,3,1]]}},"URL":"https:\/\/doi.org\/10.25300\/misq\/2022\/14985","relation":{},"ISSN":["0276-7783","2162-9730"],"issn-type":[{"value":"0276-7783","type":"print"},{"value":"2162-9730","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,1]]}}}