Please use this identifier to cite or link to this item: https://hdl.handle.net/10321/4770
Title: Evaluation of tools used by managers to prevent and control cyber-loafing by administrative staff
Authors: Mkhize, Nonhlanhla Beata 
Issue Date: 5-Dec-2022
Abstract: 
Computer technology and the Internet have improved communication and
productivity across organisations. Regardless of the many advantages that the
Internet has brought to organisations, cyber-loafing is a serious challenge that
many organisations are faced with. This habit has increased in such a way that it
has negatively impacted the organisation’s productivity because employees are
skipping their duties as they engage in cyber-loafing. Furthermore, this act leaves
organisations in a vulnerable position, exposing the company to serious risks of
breaching security policies. With the advent of the Fourth Industrial Revolution,
the Internet and computer technology will continue to play a pivotal role and
companies will continue to face serious problems dealing with cyber-loafing
during work hours.
Organisations are reported to have put in place systems to reduce cyber-loafing,
such as software programmes designed to monitor, track and lock down the
illegal use of the Internet. Unfortunately, these systems do not completely prevent
employees from engaging in cyber-loafing; hence, the role of managers in
mitigating this act cannot be ignored. The role played by managers in reducing
and controlling cyber-loafing is not clear. Therefore, the purpose of this research
was to evaluate tools used by managers to prevent and control cyber-loafing by
administrative staff in the workplace and suggest effective tools that can be put
in place to mitigate this phenomenon. This study employed a mixed method,
which combines the elements of qualitative and quantitative research
approaches. This method was considered necessary to gain an in-depth
understanding of the phenomenon and to strengthen the validity of the findings.
Using purposive sampling, the sample size for the quantitative study was 156
administrative staff and the sample size for the qualitative part of the study was
11 managers and supervisors.
The results of this study demonstrate that there are major and minor cyber-loafing
activities among the investigated administrative staff. Sending and receiving emails were ranked highest among cyber-loafing deeds. Other major cyber-
loafing activities found were visiting holiday and travel websites, visiting social
media sites, pursuing studies, accessing online news, accessing auction sites
and checking weather forecasts. The least popular activities were accessing
online magazines, gaming and sports and shopping. The results from the
quantitative data also revealed that administrative staff at the research site
acknowledge that there are some tools used at their workplace to control cyber-
loafing activities. Findings from qualitative data corroborate the quantitative
results. This triangulation process indicates that managers and supervisors have
strategies in place to combat cyber-loafing among administrative staff. Some
managers and supervisors keep an eye on their employees and walk around
them while they work. Whilst managers and supervisors employ some tools to
curb cyber-loafing activities within the organisation, it is the responsibility of the
ICT department to monitor internet usage and block websites.
Description: 
Submitted in fulfilment of the requirements of the degree of Master of Management Sciences in Administration and Information Management in the Faculty of Accounting and Informatics at the Durban University of Technology, 2022.
URI: https://hdl.handle.net/10321/4770
DOI: https://doi.org/10.51415/10321/4770
Appears in Collections:Theses and dissertations (Accounting and Informatics)

Files in This Item:
File Description SizeFormat
Mkhize_NB_2022.pdf3.11 MBAdobe PDFView/Open
Show full item record

Page view(s)

225
checked on Dec 22, 2024

Download(s)

205
checked on Dec 22, 2024

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.