Please use this identifier to cite or link to this item:
https://hdl.handle.net/10321/5593
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mkhize, Nonhlanhla Beata | en_US |
dc.contributor.author | Nyide, Celani John | en_US |
dc.contributor.author | Mthalane, Peggy Pinky | en_US |
dc.date.accessioned | 2024-10-13T04:44:11Z | - |
dc.date.available | 2024-10-13T04:44:11Z | - |
dc.date.issued | 2024 | - |
dc.identifier.citation | Mkhize, N. B., Nyide, C. J. and Mthalane, P. P. 2024. Evaluation of managerial tools for preventing and controlling cyber-loafing among administrative staff: a case study of a selected municipality in KwaZulu-Natal, South Africa. African Journal of Inter/Multidisciplinary Studies. 6(1): 1-12. doi:10.51415/ajims.v6i1.1374 | en_US |
dc.identifier.issn | 2663-4597 | - |
dc.identifier.issn | 2663-4589 (Online) | - |
dc.identifier.uri | https://hdl.handle.net/10321/5593 | - |
dc.description.abstract | Organizations have implemented systems to address cyber-loafing, but these measures are often insufficient to completely prevent employees from engaging in such activities. Consequently, the role of managers in mitigating cyber-loafing becomes crucial. However, the specific strategies employed by managers to reduce and control cyber-loafing remain unclear. This paper aims to evaluate the tools used by managers to prevent and control cyber-loafing among administrative staff in the workplace. The paper proposes effective measures to mitigate this phenomenon. The study employed a mixed-method approach, combining qualitative and quantitative research methodologies. Purposive sampling was utilized, with a sample size of 156 administrative staff for the quantitative study and 11 managers and supervisors for the qualitative segment. The quantitative data revealed that administrative staff use company internet and computers to perform cyber-loafing activities. Managers and supervisors can apply various tools, including software monitoring systems, internet policies, and employee monitoring, to control cyber-loafing activities. The General Deterrence Theory (GDT) framework was used to explain the tools used to curb cyber-loafing in the study under investigation. Additionally, other deterrent mechanisms and organisational control measures are identified and discussed in specific instances. This research contributes to a comprehensive understanding of the role of managers in addressing cyber-loafing and proposes practical tools and strategies that can be implemented by organisations to effectively mitigate this phenomenon. By enhancing managerial approaches to cyber-loafing, organisations can improve productivity and ensure a secure work environment. | en_US |
dc.format.extent | 12 p | en_US |
dc.language.iso | en | en_US |
dc.publisher | Durban University of Technology | en_US |
dc.relation.ispartof | African Journal of Inter/Multidisciplinary Studies; Vol. 6, Issue 1 | en_US |
dc.subject | Administrative staff | en_US |
dc.subject | Cyber-loafing | en_US |
dc.subject | Deterrent mechanisms | en_US |
dc.subject | General deterrence theory | en_US |
dc.subject | Management tools | en_US |
dc.title | Evaluation of managerial tools for preventing and controlling cyber-loafing among administrative staff : a case study of a selected municipality in KwaZulu-Natal, South Africa | en_US |
dc.type | Article | en_US |
dc.date.updated | 2024-10-01T10:56:17Z | - |
dc.publisher.uri | http://dx.doi.org/10.51415/ajims.v6i1.1374 | en_US |
dc.identifier.doi | 10.51415/ajims.v6i1.1374 | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.grantfulltext | open | - |
item.openairetype | Article | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | Research Publications (Management Sciences) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Mkhize et al. 2024.pdf | 319.53 kB | Adobe PDF | View/Open | |
AJIMS Copyright Clearance.docx | 215.85 kB | Microsoft Word XML | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.