期刊文献+

员工网络闲逛的研究综述及管理启示 被引量:5

Review on Employees' Cyberloafing and Its Managerial Implications
原文传递
导出
摘要 网络闲逛是一种新形式的工作怠工,是指在工作时间内,员工出于非工作目的,使用网络从事与工作无关的活动,具有隐蔽性、普遍性和危害性。通过对文献的回顾和分析发现,来自个体和环境两方面的因素会影响到网络闲逛行为发生。中和理论、自我耗损理论和计划行为理论可以用来解释网络闲逛的心理机制。最后,对未来研究方向进行了展望,并结合网络闲逛的理论和影响因素,为人力资源管理实践提供了相应的管理建议。 Cybedoafing is a new form of counterproductive work behaviors, which means that employees use their companies' Internet access for non-work-related activities during the working hours. It is characterized by concealment, universality and harmfulness. Several individual internal factors and some external environment factors can influence individual' s eyberloafing behaviors. There are three theories can be used to explain the psychological mechanism of cyberloafing, namely, the neutralization theory, ego depletion model, and the theory of planned behavior. In the end, we presented several prospects for future research for researchers and provided several managerial suggestions for enterprise managers.
出处 《中国人力资源开发》 北大核心 2016年第1期41-48,共8页 Human Resources Development of China
基金 国家自然科学基金重大研究计划"非常规突发事件应急管理研究"培育项目"非常规突发事件对公众心理的影响规律及心理重建策略"(91024005) 国家科技支撑计划资助项目"我国若干重点职业人群心理压力和职业枯竭的评估 预警与干预示范研究"(2009BAI77B04)资助
关键词 网络闲逛 中和理论 自我耗损理论 计划行为理论 管理启示 Cyberloafing Neutralization Theory Ego Depletion Model Theory ofPlanned Behavior Managerial Suggestions
  • 相关文献

参考文献40

  • 1戴春林,季慧丽,毛丽红.网络怠工研究:回顾与展望[J].心理与行为研究,2014,12(3):418-422. 被引量:11
  • 2Ajzen,I. From intentions to actions: A theory of planned behavior. BerlinHeidelberg: Springer, 1985.
  • 3Askew K, Buckner J E,Taing M U, Ilie A, Bauer J A, & Coovert M D. Explainir^cyberloafing: The role of the theory of planned behavior. Computers in Human Behavior,2014,36(7): 510-519.
  • 4Askew K, Coovert M D, Vandello J A, Taing M U, & Bauer J A. Workenvironment factors predict cyberloafing. Paper presented at the Poster presented at theAnnual Meeting of the Association for Psychological Science. Washington DC, 2011.
  • 5Askew K L. The relationship between cyberloafing and task performance andan examination of the theory of planned behavior as a model of cyberloafing. DoctorialDissertations, University of Soutii Florida, 2012.
  • 6BarlowJ, Bean L, Hott D D. Employee “spy” software: Should you use it?Journal of Corporate Accounting & Finance, 2003,14(4): 7-12.
  • 7BarnesC M. I'll sleep when I'm dead: Managing those too busy to sleep.Organizational Dynamics, 2011,40(1): 18-26.
  • 8BamesC M, Schaubroeck J, Huth M, Ghumman S. Lack of sleep and unethicalconduct. Organizational Behavior and Human Decision Processes, 2011,115(2): 169-180.
  • 9BanmeisterR F,Muraven M, Tice D M. Ego depletion: A resource model ofvolition, self-regulation, and controlled processing. Social Cognition, 2000, 18(2): 130-150.
  • 10Berry C M, Ones D S, Sackett P R. Interpersonal deviance, organizationaldeviance, and their common correlates: A review and meta-analysis. Journal of AppliedPsychology, 2007,92(2): 410-424.

二级参考文献31

  • 1Aquino , K., Lewis, M. U., & Bradfield, M. (1999). Justice con- structs, negative affectivity, and employee deviance: A proposed model and empirical test. Journal of Organizational Behavior, 20 (7), 1073 - 1091.
  • 2Anandmajan, M., & Simmers, C. A. (2004). Constructive and dys- functional personal web usage in the workplace: mapping employee attitudes. In M. Anandarajan, & C. A. Simmers (Eds.), Person- al web usage in the workplace: A guide to effective human resources management( pp. 1 -27), Idea Group Inc.
  • 3Blau, P. M. (1964). Exchange and power in social life. New York: Wiley.
  • 4Blau, G., Yang, Y., & Ward-Cook, K. (2006). Testing a measure of cyberloafing. Journal of AUied Health, 35( 1 ) , 9 - 17.
  • 5Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing: The role of norms and external locus of con- trol. Computers in Human Behavior, 24(3), 1067 - 1084.
  • 6van Doom, O. (2011). Cyberloafing: A multi-dimensional construct placed in a theoretical framework. Master Thesis in Eindhoven Uni- versity of Technology, The Netherlands.
  • 7Friedman, W. H. (2000). Is the answer to internet addiction internet in- terdiction? In Proceedings of the 2000 Americas conference on infor- mation systems.
  • 8Greenberg, J. ( 1998 ). The cognitive geometry of employee theft : Nego- tiating "the line" between taking and stealing. Monographs in Or- ganizational Behavior and Industrial Relations, 23, 147-194.
  • 9Guthrie, R., & Gray, P. (1996). Junk computing. Information Systems Management, 13( 1 ), 23 -28.
  • 10Homans, G. C. (1973). Social behaviour: Its elementary forms. New York: Harcourt Brace Jovanovich.

共引文献10

同被引文献36

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部