This paper addresses the issue of cyberloafing, a widespread problem for many organizations. Some researchers propose a deterrence approach, using acceptable use policies for internet-based applications along with mechanisms to monitor employee internet usage and detect unauthorized usage, as an effective solution. However, studies examining the effects of acceptable use policies and detection mechanisms on reducing cyberloafing have produced mixed results. This study aims to resolve these inconsistencies by using an experiment to demonstrate that the deterrence model impacts different types of cyberloafing in varied ways. The findings suggest that threats of termination and detection mechanisms individually serve as effective deterrents against activities such as viewing pornography, managing personal finances, and personal shopping. However, to discourage activities like personal emailing and social networking, these measures must be combined and actively enforced.
Online safety awareness and human factors: An application of the theory of human ecology
Efforts have been made on large and small scales to reduce cybersecurity threats around the world, including in...