Repository logo
 

Evaluation of tools used by managers to prevent and control cyber-loafing by administrative staff

dc.contributor.advisorNyide, Celani John
dc.contributor.advisorMthalane, Peggy Pinky
dc.contributor.authorMkhize, Nonhlanhla Beataen_US
dc.date.accessioned2023-06-07T13:27:46Z
dc.date.available2023-06-07T13:27:46Z
dc.date.issued2022-12-05
dc.descriptionSubmitted in fulfilment of the requirements of the degree of Master of Management Sciences in Administration and Information Management in the Faculty of Accounting and Informatics at the Durban University of Technology, 2022.en_US
dc.description.abstractComputer technology and the Internet have improved communication and productivity across organisations. Regardless of the many advantages that the Internet has brought to organisations, cyber-loafing is a serious challenge that many organisations are faced with. This habit has increased in such a way that it has negatively impacted the organisation’s productivity because employees are skipping their duties as they engage in cyber-loafing. Furthermore, this act leaves organisations in a vulnerable position, exposing the company to serious risks of breaching security policies. With the advent of the Fourth Industrial Revolution, the Internet and computer technology will continue to play a pivotal role and companies will continue to face serious problems dealing with cyber-loafing during work hours. Organisations are reported to have put in place systems to reduce cyber-loafing, such as software programmes designed to monitor, track and lock down the illegal use of the Internet. Unfortunately, these systems do not completely prevent employees from engaging in cyber-loafing; hence, the role of managers in mitigating this act cannot be ignored. The role played by managers in reducing and controlling cyber-loafing is not clear. Therefore, the purpose of this research was to evaluate tools used by managers to prevent and control cyber-loafing by administrative staff in the workplace and suggest effective tools that can be put in place to mitigate this phenomenon. This study employed a mixed method, which combines the elements of qualitative and quantitative research approaches. This method was considered necessary to gain an in-depth understanding of the phenomenon and to strengthen the validity of the findings. Using purposive sampling, the sample size for the quantitative study was 156 administrative staff and the sample size for the qualitative part of the study was 11 managers and supervisors. The results of this study demonstrate that there are major and minor cyber-loafing activities among the investigated administrative staff. Sending and receiving emails were ranked highest among cyber-loafing deeds. Other major cyber- loafing activities found were visiting holiday and travel websites, visiting social media sites, pursuing studies, accessing online news, accessing auction sites and checking weather forecasts. The least popular activities were accessing online magazines, gaming and sports and shopping. The results from the quantitative data also revealed that administrative staff at the research site acknowledge that there are some tools used at their workplace to control cyber- loafing activities. Findings from qualitative data corroborate the quantitative results. This triangulation process indicates that managers and supervisors have strategies in place to combat cyber-loafing among administrative staff. Some managers and supervisors keep an eye on their employees and walk around them while they work. Whilst managers and supervisors employ some tools to curb cyber-loafing activities within the organisation, it is the responsibility of the ICT department to monitor internet usage and block websites.en_US
dc.description.levelMen_US
dc.format.extent175 pen_US
dc.identifier.doihttps://doi.org/10.51415/10321/4770
dc.identifier.urihttps://hdl.handle.net/10321/4770
dc.language.isoenen_US
dc.subject.lcshPersonal Internet use in the workplaceen_US
dc.subject.lcshElectronic monitoring in the workplaceen_US
dc.subject.lcshLingeringen_US
dc.subject.lcshLabor productivityen_US
dc.subject.lcshInformation technology--Managementen_US
dc.subject.lcshOrganizational behavioren_US
dc.titleEvaluation of tools used by managers to prevent and control cyber-loafing by administrative staffen_US
dc.typeThesisen_US
local.sdgSDG03

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
Mkhize_NB_2022.pdf
Size:
3.04 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.22 KB
Format:
Item-specific license agreed upon to submission
Description: