فهرست:
1-1) مساله اصلی تحقیق.. 2
1-2 ) تشریح موضوع ضرورت و اهمیت تحقیق: 4
1-3)اهداف(کلی و جزئی) تحقیق : 6
1-4)سوالات تحقیق : 6
1-5)روشهای تجزیه و تحلیل اطلاعات: 6
1-6)فرایند تحقیق بصورت فلوچارت: 7
1-7)تعریف واژه ها و اصطلاحات تخصصی: 7
2-1) مقدمه. 9
2-2)مبانی نظری.. 10
2-2-1) اینترنت... 10
2-2-1-1) استفاده از اینترنت در محل کار 10
2-2-1-2) اعتیاد به اینترنت... 11
2-2-1-3) چرا سوء استفاده از اینترنت رخ میدهد؟ 12
2-2-2)سایبرلوفینگ... 13
2-2-2-1) تعاریف... 13
2-2-2-2) فعالیتهای سایبرلوفینگ... 14
2-2-2-3) نگرش های منفی نسبت به سایبرلوفینگ... 16
2-2-2-4) تاثیرات سایبرلوفینگ بر احساسات کارکنان.. 17
2-2-2-5) نگرش مثبت به سایبرلوفینگ... 18
2-2-2-5-1) تأثیر سایبرلوفینگ بر خلاقیت و دانش کارمندان سازمان.. 19
2-2-2-5-2) تأثیر مثبت سایبرلوفینگ بر استرس در محیط کار 20
2-2-2-5-2-1) روش های مقابله با استرس... 21
2-2-2-6) علل گرایش کارکنان به سایبرلوفینگ... 22
2-2-2-6-1) ارتباط گرایش به سایبرلوفینگ و عدالت در سازمان.. 23
2-2-2-6-2) ارتباط گرایش به سایبرلوفینگ و وظایف سازمانی.. 25
2-2-2-7) )راهکارهای کاهش سایبرلوفینگ... 26
2-2-2-7-1) قوانین قابل قبول استفاده از اینترنت (AUP) 27
2-2-2-7-2) برنامه و سیاستهای مربوط به کاهش اثرات منفی سایبرلوفینگ... 29
2-2-2-7-3) مراحل تعریف شده برای کاهش سایبرلوفینگ در سازمان.. 30
2-3)رضایت شغلی.. 31
2-3-1)تعریف رضایت شغلی.. 31
2-3-2)عوامل مؤثر بر رضایت شغلی.. 32
2-4)تعهد سازمانی.. 33
2-4-1)تعاریف مختلف از تعهد سازمانی.. 33
2-4-1-1)تعریف عملیاتی تعهد سازمانی: 34
2-4-1-2)تعریف تعهد عاطفی: 34
2-4-1-3)تعریف تعهد هنجاری: 34
2-4-1-4)تعریف تعهد مستمر. 34
2-4-2)اهمیت تعهد سازمانی.. 35
2-5)عجین شدن با شغل.. 36
2-5-1)تعاریف عجین شدن شغلی: 36
2-5-2)عجین شدن با کار و تعهد سازمانى.. 37
3-1)مقدمه: 46
3-2) روش تحقیق.. 46
3-2-1) تحقیق کاربردی.. 46
3-2-2) تحقیق توصیفی.. 46
3-3) متغیرهای تحقیق.. 46
3-4)سوال ها اصلی تحقیق: 47
3-5)مدل تحقیق.. 48
3-6)روش گردآوری اطلاعات.. 50
3-7)روایی و پایایی پرسشنامه. 53
3-7-1) روایی/ اعتبار 53
3-7-2) پایایی.. 53
3-8)محدوده تحقیق.. 55
3-8-1)قلمرو موضوعی تحقیق: به لحاظ موضوعی این تحقیق در حوزه مدیریت منابع انسانی قرار میگیرد. 55
3-8-2)قلمرو زمانی تحقیق: قلمرو زمانی این پژوهش بهمن سال 91 تا اواخر شهریور ماه 92 میباشد. 55
3-8-3)قلمرو مکانی تحقیق: قلمرو مکانی این تحقیق دانشگاههای شهرستان بابل و حومه میباشد. 55
3-9)جامعه آماری و نمونه آماری.. 55
3-9-1)جامعه آماری.. 55
3-9-2)نمونه آماری تعیین اندازه ی نمونه: 55
3-9-3)روشهای نمونهگیری.. 56
3-10) روش تجزیه و تحلیل دادهها 56
3-10-1) ضریب همبستگی.. 56
3-10-2) مدل معادلات ساختاری.. 57
4-1) مقدمه. 59
4-2) بررسی ویژگی های جمعیت شناختی نمونه آماری.. 59
4-2-1) جنسیت... 60
4-2-2) سن.. 61
4-2-3) تحصیلات.. 63
4-2-4) سابقه کار 65
4-2-5) سمت شغلی.. 67
4-3)آزمون t 69
5-3)مدل تحقیق.. 97
منابع و ماخذ. 108
منبع:
منابع و ماخذ
آذر و مؤمنی، عادل و منصور، ١٣٨٥ ، آمار و کاربرد آن در مدیریت، انتشارات سمت.
آذر، عادل و مومنی، منصور. (1381). "آمار و کاربرد آن در مدیریت، جلد دوم، تحلیل آماری"، تهران: انتشارات سمت.
آذر، عادل، مؤمنی، منصور، 1383, «آمار و کارُبرد آن در مدیریت»، جلد اول، چاپ دهم، تهران : انتشارات سمت.
باقری، مسلم؛ تولایی، روح الله(مرداد وشهریور ١٣٨٩) ). بررسی تاثیر تعهد سازمانی بر عملکرد سازمانها).توسعه انسانی پلیس. ٧(30): 73-96.
جامع، انتشارات صفار- اشراقی
حسینی ا. تحلیل قوای بدنی و روانی ناشی از کار. فصلنامه علمی پژوهشی اصول بهداشت روان. 1378 ؛دوره 1 (شماره 2): 24-31.
دانایی فرد و الوانی و آذر، حسن و سید مھدی و عادل، ١٣٨٧ ، روش شناسی پفوھش کمی در مدیریت: رویکری
رابینز ،ا.پ .( 1374 )مدیریت رفتار سازمانی .ترجمه ع ،پارساییان وم،اعرابی .تهران :موسسه مطالعات وپژوهشهای بازرگانی.
ساروقی، احمد ؛(1375)."بررسی تاثیر تعهد سازمانی بر تمایل به ترک خدمت مدیران و کارکنان راه آهن"پایان نامه کارشناسی ارشد، دانشگاه تهران
ساعتچی م. روانشناسی کار( کاربرد روانشناسی در کار، سازمان و مدیریت). تهران: نشر ویرایش؛ 1384.
قلی پور، آرین؛ نرگسیان، عباس و طهماسبی، رضا (1387). اعتیاد به کار: چالش جدید مدیریت منابع انسانی در سازمانها.دانش مدیریت، سال 21 ، شماره 81
مورهد و گریفن ؛(1337)، "رفتار سازمانی" ترجمه سید مهدی الوانی، غلامرضا معمارزاده، انتشارات مروارید، تهران
Ackroyd, S. and Thompson, P. (1999), Organizational Misbehavior, Sage, London.
Among Civil Engineers in Australia and the Implications for Employee Turnover.
Anandarajan, M., Simmers, C., & Igbaria, M. (2000). An exploratory investigation of the antecedents and impact of internet usage: An individual perspective.Behaviour and Information Technology, 19(1), 69–85.
Aquino, K., Lewis, M.U. and Bradfield, M. (1999), “Justice constructs, negative affectivity, andemployee deviance: a proposed model and empirical test”, Journal of OrganizationBehavior, Vol. 20, pp. 1073-91.
Armstrong, L., Phillips, J. G., and Saling, L. L. “Potential determinants of higher Internet usage,” International Journal of Human Computer Studies (53), 2000, pp. 537-550.
Ashford, S. J. (1986). Feedback-seeking in individual adaptation: A resource perspective. Academy ofManagement Journal, 29, 465–487.
Belanger, F., & Van Slyke, C. (2002). Abuse or learning? Communications of the ACM, 45, 64–65.
Bennett, N. and Naumann, S.E. (2004), “Withholding effort at work: understanding andpreventing shirking, job neglect, social loafing, and free riding”, in Kidwell, R.E. andMartin, C.L. (Eds), Managing Organizational Deviance, Sage, Thousand Oaks, CA,pp. 113-26.
Bennett, R.J. and Robinson, S.L. (2000), “Development of a measure of workplace deviance”,Journal of Applied Psychology, Vol. 85 No. 3, pp. 349-60.
Blanchard, Anita L. Henle, Christine A.(2008), “Correlates of different forms of cyberloafing: The role of norms and external locus of control” Computers in Human Behavior 24 , 1067–1084
Block, W. (2001). Cyberslacking, business ethics and managerial economics. Journal of Business Ethics, 33(3), 225-231.
Chen, D.J.Q. & Lim, V.K.G. (2012) Positivity in adversity: Psychological capital during job
Chen, D.J.Q. & Lim, V.K.G. (2012) Threats to self esteem and self concept: Physical
Ciocchetti, C.A. (2001). Monitoring Employee Email: Efficient Workplaces vs. Employee Privacy, Duke Law & Tech. Rev. 0026, 7/25/01.
Conference, San Diego, California, USA, 26th – 28th Apr.
Construction Management and Economics, No. 21, pp. 69-80.
Davis, R. A. (2001). Cyberslacking. Internet abuse in the workplace. http://www.internetaddiction.ca/ cyberslacking.htm
Effects of Role Stress, Job Autonomy and Social Support. Administration in Social Work, Vol. 32, No. 3, pp. 5-25.
Erik R. Eddy, Caroline P. D’Abate, Paul W. Thurston Jr, (2009), “Explaining engagement in personal activities on company time ” Personnel Review, Vol. 39 No. 5, , pp. 639-654
Erik R. Eddy, Caroline P. D’Abate, Paul W. Thurston Jr, (2009), “Explaining engagement in personal activities on company time ” Personnel Review, Vol. 39 No. 5, , pp. 639-654
Eyres, P. (2002). Avoiding costly e-mail disasters. Journal of Property Management, 67(1), January/February, 74-75.
Fallows, D., (2003), E-mail at Work, Washington, D.C.: Pew Internet and American Life Project
Fertell, D. (2002). Cyber-slacking kills productivity. National Underwriter, 106(38), September 23, 41-42.
Flynn, N. 2001. The ePolicy Handbook. Designing and Implementing Effective E-mail, Internet, and Software Policies. New York, NY: AMACOM.
Foster, M. (2001). Be alert to the signs of employee Internet addiction. National Public Accountant 46, 39–40.
Garrett, R. and Danziger, J. (2008), “On cyberslacking: workplace status and personal internet use”, CyberPsychology & Behavior, Vol. 11.
Goode, W.J., 1960. A theory of role strain. American Sociological Review, 25, 483–496.
Greenberg, J., and Scott, S. K. “Why do employees bite the hand that feed them? Employee theft as a social exchange process,” in Research in organizational behavior, L. L.Cummings and B. M. Staw (eds.), Vol. 18, JAI Press, Greenwich, CT, 1996, pp. 111-156.
Greenberg, L., and Barling, J. “Predicting employee aggression against co-workers,
Greengard, S. (2000). The high cost of cyberslacking. Workforce,79(12), 22-24.
Griffiths, M.D. (2000a), “Does internet and computer ‘addiction’ exist? Some case study evidence”, Cyberpsychology & Behavior, Vol. 3, pp. 211-8.
Griffiths, M.D. (2000b), “Excessive internet use: implications for sexual behavior”,Cyberpsychology & Behavior, Vol. 3, pp. 537-52.
Griffiths, M.D. (2000c), “Internet addiction: time to be taken seriously?”, Addiction Research,Vol. 8, pp. 413-8.
Griffiths, mark. (2010), “ internet abuse and internet addiction in the workplace”, The Journal of Workplace Learning Vol. 22 No. 7, 2010,pp. 463-472
Griffiths, mark. (2010), “ internet abuse and internet addiction in the workplace”, The Journal of Workplace Learning Vol. 22 No. 7, 2010,pp. 463-472
Harrington, S. (1996). The effect of code of ethics and personal denial of responsibility on computer abuse judgements and intentions. MIS Quarterly, 20(3), 257-278.
Higgins, G., Wolfe, S. and Marcum, C. (2008), “Digital piracy: an examination of three measurements of self-control”, Deviant Behavior, Vol. 29, pp. 440-60.
Hollinger, R. C., & Clark, J. P. (1983). Theft by employees. Lexington, MA: Lexington Books.
Kidwell, R.E. and Martin, C.L. (2005), “The prevalence (and ambiguity) of deviant behavior at work”, in Kidwell, R.E. and Martin, C.L. (Eds), Managing Organizational Deviance, Sage,Thousand Oaks, CA, pp. 1-21.
Kim, H. and Stoner, M. (2008). Burnout and Turnover Intention Among Social Workers:
Lee, J. and Lee, Y. (2002). A holistic model of computer abuse within organizations. Information Management & Computer Security, 10(2), 57-63.
Lee, O., Lim, K. and Wong, W. (2005). Why employees do non-work-related computing: An exploratory investigation through multiple theoretical perspectives. Proceedings of the 35th Hawaii International Conference on System Sciences.
Levy, M. (1994). Electronic Monitoring in the Workplace: Power Through the Panopticon, http://is.gseis.ucla.edu/impact/s94/students/mike/mike_paper.html, page 4, notes that with little or no employee participation in implementing the monitoring creates employee "resentment, increased levels of stress, and perhaps not even any increase in productivity.
Liberman, Benjamin, Seidman, Gwendolyn, Mckenna, Katelyn Y.A, Buffardi, Laura E., “Employee job attitudes and organizational characteristics as predictors of cyberloafing”, Computers in Human Behavior 27, 2192–2199.
Lichtash, A. E. (2004). Inappropriate use of e-mail and the Internet in the workplace: The arbitration picture.Dispute Resolution Journal, 59(February/April), 26–36.
Lim, V. K. G., & Teo, T. S. H. (2005). Prevalence, perceived seriousness,justification and regulation of cyberloafing in Singapore: An exploratory study. Information & Management, 42, 1081–1093. doi:10.1016/j.im.2004.12.002
Lim, Vivien K.G., (2002), “The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice ”, Journal of Organizational Behavior J. Organiz. Behav. 23, 675–694.
Lim, Vivien K.G., (2002), “The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice ”, Journal of Organizational Behavior J. Organiz. Behav. 23, 675–694.
Lind, E.A. and Tyler, T.R. (1988), The Social Psychology of Procedural Justice, Plenum, New York,NY.
Lingard, Helen (2003). The Impact of Individual and Job Characteristics on 'Burnout'
loss and reemployment. 27th Annual Society of Industrial and Organizational Psychology
Macklem, K., 2006. You got too much mail. Maclean’s,119 (5), 20–22.
Malachowski, D. (2005), “Wasted time at work costing companies billions”, available at: www.sfgate.com/bin/.cgi?f¼/TMP
Malachowski, D. (2005). Wasted time at work costing companies billions. Retrieved December 15, 2005, fromhttp://www.salary.com/careers/layoutscripts/crel_display.asp?tab=cre&cat=nocat&ser=Ser374&part=Par555.
Malachowski, D. (2005). Wasted time at work costing companies billions. Salary. Retrieved from http://www.salary.com/careers/layoutscripts.
Martinko, M.J., Gundlach, M.J. and Douglas, S.C. (2002), “Toward an integrative theory of counterproductive workplace behavior: a causal reasoning perspective”, International Journal of Selection and Assessment, Vol. 10 Nos 1/2, pp. 36-50.
Mills, J. E., Hu, B., Beldona, S., & Clay, J. (2001). Cyberslacking! A liability issue for wired workplaces. Cornell Hotel and Restaurant Administration Quarterly, 42, 34–47.
Mills, J. E., Hu, B., Beldona, S., & Clay, J. (2001). Cyberslacking! A liability issue for wired workplaces. CornellHotel and Restaurant Administration Quarterly, 42, 34–47.
Mirchandani, D. and Motwani, J. (2003), “Reducing internet abuse in the workplace”,SAMAdvancedManagement Journal, Vol. 68, pp. 22-7.
Mirchandani, D., & Motwani, J. (2003). Reducing Internet abuse in the workplace. SAM Advanced Management Journal, 68, 22–55.
Mobley, M., & Wilson, M. (1998). Cultural aspects of Internet usage: A preliminary inquiry. Educational Technology Research and Development, 46(3), 109–113.
Morrison, E. W. (1993). Longitudinal study of the effects of information seeking on newcomer socialization.Journal of Applied Psychology, 78, 173–183.
O.N. van Doorn,(2011) ,"Cyberloafing: A multi-dimensional construct placed in a theoretical framework" BSc Industrial Engineering and Management Science – TU/e (2008) Student identity number 0547224
Oravec, J.A. (2002). Constructive approaches to Internet recreation in the workplace. Communications of the ACM, 45, 60-63.
Panko, R. R., & Beh, H. G. (2002). Monitoring for pornography and sexual harassment. Communications of the ACM, 45, 84–87.
Robinson, S.L. and Bennett, R.J. (1995), “A typology of deviant workplace behaviors: a multidimensional scaling study”, Academy of Management Journal, Vol. 38, pp. 555-72.
Scheuermann, L. S., & Langford, H. P. (1997). Perceptions of Internet abuse, liability, and fair use. Perceptual and Motor Skills, 85, 847–850.
Scott, B. A., & Judge, T. A. (2006). Insomnia, emotions, and job satisfaction:A multilevel study. Journal of Management, 32, 622–645. doi:10.1177/0149206306289762
Sharma, S. K. and J. N. D. Gupta. 2003/2004. "Improving Workers' Productivity and Reducing Internet Abuse." The Journal of Computer Information Systems 44: 74-78.
Siau, K., Nah, F. F., & Teng, L. (2002). Acceptable Internet use policy. Communications of the ACM, 45, 75–79.Sipior, J. C., & Ward, B. T. (2002). A strategic response to the broad spectrum of Internet abuse. InformationSystems Management, 19, 71–79.
Skarlicki, D. P., & Folger, R. (1997). Retaliation in the workplace: the roles of distributive, procedural and interactional justice. Journal of Applied Psychology, 82, 434–443.
Skarlicki, D.P. and Folger, R. (1997), “Retaliation in the workplace: the roles of distributive,procedural, and interactional justice”, Journal of Applied Psychology, Vol. 82, pp. 434-43.
Stanton, J.M., & Weiss, E.M. (2000). Electronic monitoring in their own words: An exploratory study of employees’ experiences with new types of surveillance. Computers in Human Behavior, 16, 423-440.
subordinates and supervisors: The role of person behaviors and perceived workplace factors,” Journal of Organizational Behavior (20), 1998, pp. 897913.
Surmacz, J. (2002). More and more workers are going online while on the job. http://www.websense.com/company/news/features/02/100102.cfm
Taneja, A. (2006), “Determinants of adverse usage of information systems assets: a study of antecedents of IS emploit in organizations”, unpublished doctoral dissertation, University of Texas-Arlington, Arlington, TX.
Urbaczewski, A. and Jessup, L. M. (2002). Does electronic monitoring of employee Internet usage work? Communications of the ACM, 45(1) 80-83.
Vardi, Y. and Weiner, Y. (1996), “Misbehavior in organizations: a motivational framework”,Organizational Science, Vol. 7 No. 2, pp. 151-65.
Venegas, Jennifer megan,(2009), “effectiveness of an intervention to increase employees awareness of frequency and seriousness of cyberloafing” , A thesis presented to the department of psychology California State University, Long Beach, Copyright ,by ProQuest LLC
Vivien, K.G. Lim, Thompson, S.H. Teo. (2005), “Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore An exploratory study”, Information & Management 42 , 1081–1093.
Vivien, K.G. Lim, Thompson, S.H. Teo. (2005), “Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore An exploratory study”, Information & Management 42 , 1081–1093.
Wallace, P. (1999), The Psychology of the Internet, Cambridge University Press, Cambridge.
Whitty, M.T., & Carr, A.N. (2006). New rules in the workplace: Applying object-relations theory to explain problem Internet and email behaviour in the workplace. Computers in Human Behaviour, 22, 235-250.
Widyanto, L. and Griffiths, M.D. (2006), “Internet addiction: does it really exist?”,in Gackenbach, J. (Ed.), Psychology and the Internet: Intrapersonal, Interpersonal and Transpersonal Applications, 2nd ed., Academic Press, New York, NY, pp. 141-63 (revisited).
Woon, I. and Pee, L. (2004). Behavioral factors affecting Internet abuse in the workplace--an empirical investigation. Proceedings of the Third Annual Workshop on HCl Research in MIS.
Yellowees, P. and Marks, S. (2007), “Problematic internet use or internet addiction”, Computers in Human Behavior, Vol. 23, pp. 1447-53.
Young, K. (1996), “Psychology of computer use: XL. Addictive use of the internet: a case that breaks the stereotype”, Psychological Reports, Vol. 79, pp. 899-902.
Young, K. (1996), “Psychology of computer use: XL. Addictive use of the internet: a case that breaks the stereotype”, Psychological Reports, Vol. 79, pp. 899-902.
Young, K. (1999), “Internet addiction: evaluation and treatment”, Student British Medical Journal,Vol. 7, pp. 351-2.
Young, K. (1999), “Internet addiction: evaluation and treatment”, Student British Medical Journal,Vol. 7, pp. 351-2.
Zoghbi-manrique-de-lara, Pablo, Olivares-mesa, Aristides. (2010), “Bringing cyber loafers back on the right track ” Industrial Management & Data Systems Vol. 110 No. 7, pp. 1038-1053.
Zoghbi-manrique-de-lara, Pablo,(2006), "Fear in organizations. Does intimidation by formal punishment mediate the relationship between interactional justice and workplace internet deviance?" Journal of Managerial Psychology Vol. 21 No. 6, pp. 580
Zoghbi-manrique-de-lara, Pablo,(2007), “Inequity, conflict, and compliance dilemma as causes of cyberloafing”, International Journal of Conflict Management Vol. 20 No. 2, pp. 188-201
Zoghbi-manrique-de-lara, Pablo,(2007), “REDEFINING OCB AS CYBERCIVISM.Do Work Attitudes also Explain Organizational Citizenship Internet Behaviors? ” Management Research, vol. 5, no. 1, pp. 43–52.