Volume 2, Issue 1 (3-2022)                   HASES 2022, 2(1): 155-165 | Back to browse issues page


XML Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Saatchian V, Azizi B, Mahmoudi A. Investigating the Effective Factors on Web Browsing of Human Resources in Sport Organizations (Case Study: Ministry of Sport and Youth). HASES. 2022; 2 (1) :155-165
URL: http://hasesjournal.com/article-1-37-en.html
1- Assistant professor in sport management, Department of Sports sciences, Imam Reza international university of Mashhad , saatchian.vahid@gmail.com
2- Ph.D. Candidate in sport management, faculty of sports sciences, ferdowsi university of Mashhad
3- Assistant professor in sport management, faculty of physical education and sports sciences, tehran university
Abstract:   (701 Views)
The purpose of this study was to investigate the effective factors on web browsing (Cyberloafing) of human resources in sport organizations. The research method was descriptive-correlational and based on structural equations and also the data were collected by questionnaire. The statistical population of the study consisted of all employees of the Ministry of Sport and Youth, among whom, 237 were randomly selected as sample and finally 225 (93.74%) questionnaires were analyzed. A 14-question questionnaire was used to collect the data. Finally, the collected data were analyzed in two parts: descriptive and inferential statistics using SPSS and LISREL software. The results showed that the predictive power of this model based on the sum of variance of the three factors was 61.52%. Also, there is a significant priority among the cyberloafing components, according to which the attitude of employees is in the first priority, descriptive norms in the second priority and perceived barriers in the third priority. Considering the way employees use the internet and web browsing, the need for more in-depth research and attention to these types of HR behaviors become more apparent.
Full-Text [PDF 738 kb]   (79 Downloads)    
Type of Study: Original Article | Subject: Sport Managment
Received: 2022/01/31 | Accepted: 2022/02/28 | Published: 2022/03/1

References
1. Anandarajan, M., Igbaria, M., & Anakwe, U. P. (2002). IT acceptance in a lessdeveloped country: A motivational factor perspective. International Journal of Information Management, 22(1), 47-65. [Google Scholar] [DOI:10.1016/S0268-4012(01)00040-8]
2. Andreassen, C. S., Torsheim, T., & Pallesen, S. (2014). Predictors of use of social network sites at work - A specific type of cyberloafing. Journal of Computer-Mediated Communication, 19(4), 906-921. [Google Scholar] [DOI:10.1111/jcc4.12085]
3. Askew, K., Buckner, J. E., Taing, M. U., Ilie, A., Bauer, J. A., & Coovert, M. D. (2014). Explaining cyberloafing: The role of the theory of planned behavior. Computers in Human Behavior, 36, 510-519. [Google Scholar] [DOI:10.1016/j.chb.2014.04.006]
4. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787-2805. [Google Scholar] [DOI:10.1016/j.comnet.2010.05.010]
5. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. [Google Scholar] [DOI:10.1016/0749-5978(91)90020-T]
6. Barlow, J., Bean, L., & Hott, D. D. (2003). Employee ?spy? software: Should you use it? Journal of Corporate Accounting & Finance, 14(4), 7-12. [Google Scholar] [DOI:10.1002/jcaf.10162]
7. Belk, R. (2014). Digital consumption and the extended self. Journal of Marketing Management, 30(11-12), 1101-1118. [Google Scholar] [DOI:10.1080/0267257X.2014.939217]
8. Bequai, A. (1998). Balancing legal concerns over crime and security in cyberspace. Computers & Security, 17(4), 293-298. [Google Scholar] [DOI:10.1016/S0167-4048(98)80008-4]
9. Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing: The role of norms and external locus of control. Computers in Human Behavior, 24(3), 1067-1084. [Google Scholar] [DOI:10.1016/j.chb.2007.03.008]
10. Blau, G., Yang, Y., & Ward-Cook, K. (2006). Testing a measure of cyberloafing. Journal of Allied Health, 35(1), 9-17. [Google Scholar]
11. Bock, G.-W., Park, S. C., & Zhang, Y. (2010). Why employees do non-work-related computing in the workplace. Journal of Computer Information Systems, 50(3). [Google Scholar]
12. Carmeli, A., Sternberg, A., & Elizur, D. (2008). Organizational culture, creative behavior, and information and communication technology (ICT) usage: A facet analysis. Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 11(2), 175-180. [Google Scholar] [DOI:10.1089/cpb.2007.0037]
13. Cinar, O., Karciooglu, F. (2015). The relationship between cyber loafing and organizational citizenship behavior: A survey study in Erzurum/Turkey. 11th International Strategic Management Conference. Michigan Retirement Research Center Research. [Google Scholar] [DOI:10.1016/j.sbspro.2015.10.114]
14. Chen, J. V., Ross, W. H., & Yang, H.-H. (2011). Personality and motivational factors predicting internet abuse at work. Cyberpsychology: Journal of Psychosocial Research on Cyberspace., 5(1). [Google Scholar]
15. Chou, C., Condron, L., & Belland, J. (2005). A Review of the Research on Internet Addiction. Educational Psychology Review, 17(4), 363-388. [Google Scholar] [DOI:10.1007/s10648-005-8138-1]
16. Davis, R. a., Flett, G. L., & Besser, A. (2002). Validation of a new scale for measuring problematic internet use: Implications for pre-employment screening. Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 5(4), 331-345. [Google Scholar] [DOI:10.1089/109493102760275581]
17. De Lara, P. Z. M., & Rodríguez, T. F. E. (2007). Organizational anomie as moderator of the relationship between an unfavorable attitudinal environment and citizenship behavior (OCB): An empirical study among university administration and services personnel. Personnel Review, 36(6), 843-866. [Google Scholar] [DOI:10.1108/00483480710822391]
18. Eddy, E. R., D'Abate, C, P., Thurston Jr, T, W. (2010). Explaining Engagement in Personal Activities on Company Time. Personnel Review, Vol. 39, No. 3, 1-15. [Google Scholar] [DOI:10.1108/00483481011064181]
19. Elwell, J. S. (2014). The transmediated self: Life between the digital and the analog. Convergence: The International Journal of Research into New Media Technologies., 20(2), 233-249. [Google Scholar] [DOI:10.1177/1354856513501423]
20. Everton, W. J., Mastrangelo, P. M., & Jolton, J. A. (2005). Personality correlates of employees' personal use of work computers. CyberPsychology & Behavior, 8(2), 143-153. [Google Scholar] [DOI:10.1089/cpb.2005.8.143]
21. Galperin, B. L., & Burke, R. J. (2006). Uncovering the relationship between workaholism and workplace destructive and constructive deviance: An exploratory study. The International Journal of Human Resource Management, 17(2), 331-347. [Google Scholar] [DOI:10.1080/09585190500404853]
22. García-Morales, V. J., Jiménez-Barrionuevo, M. M., & Gutiérrez-Gutiérrez, L. (2012). Transformational leadership influence on organizational performance through organizational learning and innovation. Journal of Business Research, 65(7), 1040-1050. [Google Scholar] [DOI:10.1016/j.jbusres.2011.03.005]
23. Garrett, R. K., & Danziger, J. N. (2008). On cyberslacking: Workplace status and personal internet use at work. Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 11(3), 287-292. [Google Scholar] [DOI:10.1089/cpb.2007.0146]
24. Gholipour, A., Bamdad, M. (2012). Typology of the values of individuals and its relation to Internet web browsing. The first national congress of cybercrime and emerging social harm. (In Persian). [Google Scholar]
25. Hartijasti, Y., & Fathonah, N. (2014). Cyberloafing Across Generation X and Y in Indonesia. Journal of Information Technology Applications & Management, 21(1), 1-16. [Google Scholar]
26. Henle, C. A., & Blanchard, A. L. (2008). The interaction of work stressors and organizational sanctions on cyberloafing. Journal of Managerial Issues, 20(3), 383-400. [Google Scholar] [DOI:10.1037/t13460-000]
27. Henle, C. A., Kohut, G., & Booth, R. (2009). Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory. Computers in Human Behavior, 25(4), 902-910. [Google Scholar] [DOI:10.1016/j.chb.2009.03.005]
28. König, C. J., & Caner de la Guardia, M. E. (2014). Exploring the positive side of personal internet use at work: Does it help in managing the border between work and nonwork? Computers in Human Behavior, 30, 355-360. [Google Scholar] [DOI:10.1016/j.chb.2013.09.021]
29. Liberman, B., Seidman, G., McKenna, K. Y. a., & Buffardi, L. E. (2011). Employee job attitudes and organizational characteristics as predictors of cyberloafing. Computers in Human Behavior, 27(6), 2192-2199. [Google Scholar] [DOI:10.1016/j.chb.2011.06.015]
30. Lim, V. K. G. (2002). The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675-694 (April). [Google Scholar] [DOI:10.1002/job.161]
31. Lim, V. K. G., & Teo, T. S. H. (2005). Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore. Information & Management, 42(8), 1081-1093. [Google Scholar] [DOI:10.1016/j.im.2004.12.002]
32. Mahatanankoon, P., Anandarajan, M., & Igbaria, M. (2004). Development of a measure of personal web usage in the workplace. Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 7(1), 93-104. [Google Scholar] [DOI:10.1089/109493104322820165]
33. Martin, L. E., Brock, M. E., Buckley, M. R., & Ketchen, D. J. (2010). Time banditry: Examining the purloining of time in organizations. Human Resource Management Review, 20(1), 26-34. [Google Scholar] [DOI:10.1016/j.hrmr.2009.03.013]
34. Mastrangelo, P. M., Everton, W., & Jolton, J. a. (2006). Personal use of work computers: Distraction versus destruction. Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 9(6), 730-741. [Google Scholar] [DOI:10.1089/cpb.2006.9.730]
35. Mousavi Arfa, M, H., Rouhani, S. (2013). Study the causes and consequences of cyberlofing. Media and Culture. Third Year, No. 1, 135-157. (In Persian). [Google Scholar]
36. Pelling, E. L., & White, K. M. (2009). The theory of planned behavior applied to young people's use of social networking web sites. CyberPsychology & Behavior, 12(6), 755-759. [Google Scholar] [DOI:10.1089/cpb.2009.0109]
37. Restubog, S. L. D., Garcia, P. R. J. M., Toledano, L. S., Amarnani, R. K., Tolentino, L. R., & Tang, R. L. (2011). Yielding to (cyber)-temptation: Exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace. Journal of Research in Personality, 45(2), 247-251. [Google Scholar] [DOI:10.1016/j.jrp.2011.01.006]
38. Saleem, H., Beaudry, A., & Croteau, A.-M. (2011). Antecedents of computer selfefficacy: A study of the role of personality traits and gender. Computers in Human Behavior, 27(5), 1922-1936. [Google Scholar] [DOI:10.1016/j.chb.2011.04.017]
39. Seymour, L., & Nadasen, K. (2007). Web access for IT staff: A developing world perspective on web abuse. The Electronic Library, 25(5), 543-557. [Google Scholar] [DOI:10.1108/02640470710829532]
40. Ugrin, J. C., & Michael Pearson, J. (2013). The effects of sanctions and stigmas on cyberloafing. Computers in Human Behavior, 29(3), 812-820. [Google Scholar] [DOI:10.1016/j.chb.2012.11.005]
41. Vitak, J., Crouse, J., & LaRose, R. (2011). Personal Internet use at work: Understanding cyberslacking. Computers in Human Behavior, 27(5), 1751-1759. [Google Scholar] [DOI:10.1016/j.chb.2011.03.002]
42. Weatherbee, T. G. (2010). Counterproductive use of technology at work: Information & communications technologies and cyberdeviancy. Human Resource Management Review, 20(1), 35-44. [Google Scholar] [DOI:10.1016/j.hrmr.2009.03.012]
43. Yellowlees, P. M., & Marks, S. (2007). Problematic internet use or internet addiction? Computers in Human Behavior, 23(3), 1447-1453. [Google Scholar] [DOI:10.1016/j.chb.2005.05.004]
44. Zoghbi-Manrique-de-Lara, P. (2009). Inequity, conflict, and compliance dilemma as causes of cyberloafing. International Journal of Conflict Management, 20(2), 188-201. [Google Scholar] [DOI:10.1108/10444060910949630]
45. Zoghbi-Manrique-de-Lara, P. (2011). Reconsidering the boundaries of the cyberloafing activity: The case of a university. Behaviour & Information Technology, 31(5), 469-479. [Google Scholar] [DOI:10.1080/0144929X.2010.549511]
46. Zoghbi-Manrique-de-Lara, P., & Olivares-Mesa, A. (2010). Bringing cyber loafers back on the right track. Industrial Management & Data Systems, 110(7), 1038-1053. [Google Scholar] [DOI:10.1108/02635571011069095]
47. Zoghbi Manrique de Lara, P., Verano Tacoronte, D., & Ting Ding, J. (2006). Do current anti-cyberloafing disciplinary practices have a replica in research findings? Internet Research, 16(4), 450-467. [Google Scholar] [DOI:10.1108/10662240610690052]

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2022 All Rights Reserved | Journal of Humanistic approach to sport and exercise studies

Designed & Developed by : Yektaweb