Escolar Documentos
Profissional Documentos
Cultura Documentos
as unproductive internet usage in the workplace. Regarding the workplace, internet abuse is on
the deviant use of the internet technology model (DUIT). DUIT is the theoretical model used to
classify cyber activities in the workplace and at the present seeking to give guidelines for
identifying the behaviors (Mahatanankoon, 2006, pp. 156).
Problems in cyberspace are not limited to just children anymore. Using cyberspace is
almost essential for the day to day activities in the workplace. With the internet being used both
at work and on-demand anywhere through new technology, adults are connected just as much if
not more as children and teens. Technology has led to a growth of new concepts affecting adults
in the cyber and work community. This paper discusses two of the trends affecting adults via
internet addiction and internet abuse: cyberbullying and cyberslacking, while referring to the
current research to understand the terms in relation to the workplace and how employers combat
these behaviors.
Since cyberspace has an unlimited reach bullying has become much more dangerous. The
bullying can occur at anytime, anywhere, and with the power of smart devices often.
Cyberbullying has a vast array of audiences and media options to use, that can be anonymous
and hard to track, providing a source of danger.
Another danger cyberspace has offered bullies is a faster, easier way to encourage the
mob mentality, thus turning cyberbullying into cyber-mobbing. Cyber-mobbing is a synonym for
cyberbullying in Germany, but in the United States it is defined in several ways. For this
document cyber-mobbing is defined: cyber-cruelty that involves a group sharing the same
malicious mindset or intent (Garner, 2013).
This definition allows for both bullying out of malice or just a group of people with the
same opinion attacking some, like with Justine Sacco. Sacco, a 30-year PR (public relations)
consultant, shattered by a retweet. Sacco, a former senior director of corporate communications
at IAC, on her way to South Africa tweeted Going to Africa. Hope I dont get AIDS. Just
kidding, Im white! meaning to be funny. After being retweeted by one of her 175 followers,
whom had 1500 followers she became a global figure of hate. She lost her job, her and her
familys reputation, and social life when the members of the Twitter audience mobbed her with
replies. (Ronson, 2015; Waterlow, 2015). Sacco was and sometimes still is viciously assaulted
by thousands of people including fellow co-workers. Giving an illustrating of cyberbullyings
effectiveness and an example of cyberbullying in the workplace. While a lot of the current
research discusses cyberbullying in the work through statistics it is important to consider the real
life implications.
Before elaborating on the subject there is a need to explain and define cyberbullying in
the workplace. CB in the workplace is a somewhat new concept and problem, therefore research
have done their best to define the ever changing word. Combining the definitions of
cyberbullying (as defined above) and general workplace bullying defined as a situation in which
an employee is systemically exposed to repeated negative treatment from
supervisorscolleagues or subordinatesover a long period of time (cited in Zhang &
Leidner, 2014, p. 1). In the workplace cyberbullying is also synonymous with cyber-harassment
having the added characteristic of offensive and/or obscene material, including those of a sexual
or racial via email; as email is the vast majority of communication in the workplace (Whitty &
Carr, 2006, pp. 2378).
As mentioned much of the information on cyberbullying in the workplace is statistical
and gives surprising numbers of prevalence in the workplace. In a report published in 2012
entitled Punched from the Screen, eight out of ten employees were CB by being ignored,
gossiped about, being degraded, or receiving an offensive email or text (Cyber bullying in the
workplace is on the rise, 2015). Eight out of ten people is an alarming rate, preceding to the
belief that most, if not all have been on both terminals of the bullying, the receiver and giver.
Also, lending to the idea employees are not going as they should be, introducing cyberslacking
into the work.
Cyberslacking as well referred to as cyberloafing (CL) also a very new term that bears no
clear definition. The most common definition refers to CS/CL, the overuse of internet, mobile
technology resources, cyber deviance, and personal use during work hours at the workplace.
There are sources that add the words companies internet, and voluntary acts, to define CS/CL
(Lim & Chen, 2012; Mahatanankoon, 2006; Vitak, Crouse, & Larose, 2011; Whitty & Carr,
2006). A study reported employees spend at least one hour a work day on non-work related
activities which much of it spent on the net. These CS activities range from watching video on
YouTube to shopping to looking at pornographic materials (Vitak et al., 2011). According to the
office software, a company with software to help companys combat cyber issues in the
workplace, offer that 90% of employees believe the internet can be addictive, 41% admit to
surfing the internet for over three hours per week, 70% of all web traffic to pornography sites
occur during the work hours of 9 am-5 pm, (Productivity Statistics, n.d.). The problem of
pornography in the workplace has become an internal cultural issue according to some cyber and
legal experts, creating a plausible statement why people no longer view it as a fireable offense.
A study was conducted theorizing why employees cyberslack. There were three reasons
mentioned: organizational justice, time abuse, and powerlessness. When an employee thinks they
have been mistreated at work the need for retaliation may come up. For instance, if an employee
undergoes stress or the boss is picking on them, they will do things not included in their job
description to retaliate. This also gives the employee a sense of power in an otherwise powerless
situation. For an entry level clerk or perhaps even a vice president of a company thinks as if they
possess no ability to change or offer any of the goings on within the company the question
becomes why they should do anything at all. The last theory is time abuse or lack of concern for
deadlines. The idea of being late is not a big deal in the grand scheme of things (Blau, Yang, &
Ward-Cook, 2006, pp. 102). This is costing companies a great deal of time, money, and security
issues. In 2006 the United States alone 178$ billion was lost due to cyberslacking (Vitak et al.,
2011, p. 1752).
Besides, could cyberslacking have a positive outcome in the work? What are the
emotional ramifications of CB and CS? Manage the emotional demands of employees subject to
the employer?
Conclusion
It appears the use of the internet for work is inevitable, causing more and more problems
in the workplace. Companies are losing billions, staff is slacking off, causing arise in bullying,
and people are becoming addicted. The issues of cyberbullying and cyberslacking are still in
their infancy stage and the real influences are not yet recognized. The researchers all agree more
research is required. However, this paper has shown the real life implications of how adults are
not immune to cyberbullying. It has also shown adults are a major component of how
cyberslacking became an issue. Also, proving more people need to be informed of the topics and
the issues they cause. As technology continues to change the workplace will need to keep up.
Bibliography
Anandarajan, M., & Simmers, C. (2004). Personal Web Usage in the Workplace: A Guide to
Effective Human Resources Management. Hershey, PA: Information Science Publishing.
Blau, G., Yang, Y., & Ward-Cook, K. (2006). Testing a measure of cyberloafing. Journal of
Allied Health, 35(1), 917.
Cyber bullying in the workplace is on the rise. (2015). Retrieved March 9, 2015, from
http://www.acas.org.uk/index.aspx?articleid=4023
Fisher, G. L., & Pancheco, J. (2009). Encyclopedia of substance abuse prevention, treatment, &
recovery. In G. L. Fisher & N. A. Roget (Eds.), Encyclopedia of Substance Abuse
Prevention, Treatment, & Recovery (pp. 499501). Thousand Oaks: Sage Publications, Inc.
Retrieved from http://www.loc.gov/catdir/toc/ecip0819/2008022786.html
Garner, E. (2013). When Cyberbullying Turns Into Cyber-Mobbing: Death By Suicide.
Huffington Post. Retrieved from http://www.huffingtonpost.com/sue-scheff/whencyberbullying-turns-into-cyber-mobbing_b_3957416.html
Lim, V. K. G., & Chen, D. J. Q. (2012). Cyberloafing at the workplace: gain or drain on work?
Behaviour & Information Technology, 31(4), 343353.
http://doi.org/10.1080/01449290903353054
Mahatanankoon, P. (2006). Internet Abuse in the Workplace. In M. Anandarajan, T. S. H. Teo,
& C. A. Simmers (Eds.), Internet and Workplace Transformation (pp. 1528). M.E. Sharpe,
Inc. Retrieved from http://www.ebrary.com
Productivity Statistics. (n.d.). Retrieved March 9, 2015, from
http://www.theofficesoftware.com/productivity_statistics/
Ronson, J. (2015, February 12). How One Stupid Tweet Blew Up Justine Sacco s Life. NY
Times. Retrieved from http://www.nytimes.com/2015/02/15/magazine/how-one-stupidtweet-ruined-justine-saccos-life.html?_r=1
Sabella, R. A. (2009). Cyberbullying: Who, What, Where, Why, and What Now? Counseling
and Human Development, 41(8).
Vitak, J., Crouse, J., & Larose, R. (2011). Personal Internet use at work: Understanding
cyberslacking. Computers in Human Behavior, 27(5), 17511759.
http://doi.org/10.1016/j.chb.2011.03.002
Waterlow, L. (2015). Justine Sacco reveals how she destroyed her life with racist Twitter post
before trip to Africa. DailyMail.com. Retrieved from
10
http://www.dailymail.co.uk/femail/article-2955322/Justine-Sacco-reveals-destroyed-liferacist-tweet-trip-Africa.html
Whitty, M. T., & Carr, A. N. (2006). New rules in the workplace: Applying object-relations
theory to explain problem Internet and email behaviour in the workplace. Computers in
Human Behavior, 22(2), 235250. http://doi.org/10.1016/j.chb.2004.06.005
Zhang, S., & Leidner, D. (2014). Workplace cyberbullying: The antecedents and consequences.
Twentieth Americas Conference on Information Systems. Retrieved from
http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1669&context=amcis2014