CONSCIENTIOUSNESS DAN KEBIJAKAN ORGANISASI: MAMPUKAH MENGURANGI PERILAKU CYBERLOAFING?

Sekar A. Ati
Universitas Gunadarma
Indonesia
Anita Zulkaida
Universitas Gunadarma
Indonesia

Abstract

Dengan semakin meningkatnya penggunaan internet saat ini turut juga mendorong pemanfaatannya di dunia korporasi. Namun, hal ini mendorong karyawannya untuk memanfaatkan fasilitas ini untuk hal-hal di luar pekerjaan mereka. Penelitian ini bertujuan untuk menguji pengaruh kepribadian big five dimensi conscientiousness dan kebijakan organisasi terhadap perilaku cyberloafing. Subjek penelitian merupakan karyawan pada level staf yang tempat kerjanya memberikan fasilitas akses internet, sudah bekerja di perusahaan saat ini selama minimal enam bulan, serta domisili bekerja di daerah Jabodetabek dan didapatkan sejumlah 120 responden dengan teknik purposive sampling. Analisis yang digunakan adalah teknik regresi berganda. Hasil penelitian menunjukkan bahwa conscientiousness dan kebijakan organisasi secara bersamaan tidak berpengaruh terhadap perilaku cyberloafing. Conscientiousness juga tidak berpengaruh secara signifikan terhadap perilaku cyberloafing sementara kebijakan organisasi memiliki pengaruh signifikan secara positif terhadap perilaku cyberloafing.

Keywords
cyberloafing; conscientiousness; kebijakan organisasi
References

Agung, B. (2018). Orang Indonesia 'curi waktu' belanja online saat jam kerja. Retrieved Desember 2, 2018, from CNN Indonesia: https://www.cnnindonesia.com/teknologi/20180130184015-185-272703/orang-indonesia-curi-waktu-belanja-online-saat-jam-kerja

Agustini, R. (2017). Big Five personality dan relationship satisfaction pada dewasa awal yang berpacaran. Skripsi (tidak diterbitkan). Depok: Universitas Gunadarma.

Anandarajan, M., Simmers, C., & Igbaria, M. (2000). An exploratory investigation of the antecedents and impact of internet usage: An individual perspectives. Behaviour & Information Technology, 19(1), 69-85. doi: 10.1080/014492900118803

Andreassen, C. S., Torsheim, T., & Pallesen, S. (2014). Predictors of use of social network sites at work: A specific type of cyberloafing. Journal of Computer-Mediated Communication, 19(4), 906-921. doi: 10.1111/jcc4.12085

Bègue, L., Beauvois, J. L., Courbet, D., Oberlé, D., & Lepage, J. (2015). Personality predicts obedience in a Milgram paradigm. Journal of Personality, 83(3), 299-306.

Berta, A. (2012). Browsing saat kerja di kantor. Retrieved Desember 3, 2018, from Kompasiana: https://www.kompasiana.com/brainy/550e0d58813311c22cbc613c/browsing-saat-kerja-di-kantor

Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing: The role of norms and external locus of control. Computers in Human Behavior, 24(3), 1067-1084. doi: 10.1016/j.chb.2007.03.008

Blau, G., Yang , Y., & Ward-Cook, G. (2006). Testing a measure of cyberloafing. Journal of Apllied Health, 35(1), 1-17.

Bock, G. W., Park, S. C., & Zhang, Y. (2010). Why employees do non-work-related computing in the workplace? Journal of Computer Information Systems, 50(3), 150-163. doi: 10.1080/ 08874417.2010.11645417

Brehm, S. S., & Brehm, J. W. (1981). Psychological reactance: A theory of freedom and control. New York: Academic Press.

Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computer & Security, 39, 447-459. doi: 10.1016/j.cose.2013.09.009

De-Lara, P. Z.-M., & Mesa, A. O. (2010). Bringing cyber loafers back on the right track. Industrial Management & Data Systems, 110(7), 1038 - 1053. doi: 10.1108/02635571011069095

De-Lara, P. Z.-M., Tacoronte, D. V., & Ding, J.-M. T. (2006). Do current anti cyberloafing disciplinary practices have a replica in research findings?: A study of the effects of coercive strategies on workplace internet misuse. Internet Research, 16(4), 450-467. doi:10.1108/10662240610690052

Ewen, R. B. (2010). An introduction to theories of personality (7th ed.). Abingdon: Taylor and Francis Group, LLC.

Funder, D. C. (2008). Persons, situations, and person–situation interactions. In O. P. John, R. W. Robins, & L. A. Pervin (Eds.), Handbook of personality: Theory and research (3rd ed., p. 568). New York: The Guilford Press.

İnce, M., & Gül, H. (2011). The relation of cyber slacking behaviors with various organizational outputs: Example of Karamanoglu Mehmetbey University. European Journal of Scientific Research, 52(4), 507-527.

John, O. P., Naumann, L. P., & Soto, C. J. (2008). Paradigm shift to the integrative Big Five trait taxonomy. In O. P. John, R. W. Robins, & L. A. Pervin (Eds.), Handbook of personality (3rd ed.). New York: The Guillford Press.

Katadata. (2018). 4 miliar penduduk bumi telah terkoneksi internet. Retrieved Desember 2, 2018, from Katadata: https://databoks.katadata.co.id/datapublish/2018/07/23/4-miliar-penduduk-bumi-telah-terkoneksi-internet

Kaufman, C. (2006). Handbook of information security, threats, vulnerabilities, prevention, detection, and management (Vol. 3). (H. Bidgoli, Ed.) New Jersey: John Wiley & Sons.

Kim, K., Triana, M. D., Chung, K., & Oh, N. (2015). When do employees cyberloaf? An interactionist perspective examining personality, justice and empowerment. Human Resource Management, 55(6), 1-17. doi: 10.1002/hrm.21699

Kim, S. J., & Byrne, S. (2011). Conceptualizing personal web usage in work contexts: A preliminary framework. Computers in Human Behavior, 27(6), 2271-2283. doi: 10.1016/j.chb.2011.07.006

Krishnan, S., Lim, V. K., & Teo, T. S. (2010). How does personality matter? Investigating the impact of big-five personality traits on cyberloafing. International Conference on Information Systems, (pp. 1-16). Saint Louis, Missouri, USA.

Landoll, D. J. (2016). Information security policies, procedurs, and standards: A practitioner's reference. New York : Taylor & Francis Group.

Lim, V. K. (2002). The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675-694. doi: 10.1002/job.161

Lim, V. K., & Chen, D. J. (2012). Cyberloafing at the workplace: Gain or drain on work? Behaviour & Information Technology, 31(4), 343-353.

Lim, V. K., & Teo, T. S. (2005). Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study. Information and Management, 42(8), 1081–1093. doi: 10.1016/j.im.2004.12.002

Mastrangelo, P. M., Everton, W., & Jolton, J. A. (2006). Personal use of work computers: Distraction versus destruction. Cyberpsychology & Behavior, 9(6), 730-741. doi:10.1089/cpb.2006.9.730

McCrae, R. R., & Costa, P. T. (2003). Personality in adulthood: A five-factor theory perspective (2nd ed.). New York: The Guilford Press.

Mount, M., Ilies, R., & Johnson, E. (2006). Relationship of personality traits and counterproductive work behaviors: The mediating effects of job satisfaction. Personnel Psychology, 59(3), 591-622. doi: 10.1111/j.1744-6570.2006.00048.x

Quoquab, F., Salam, Z. A., & Halimah, S. (2015). Does cyberloafing boost employee productivity? 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET) (pp. 119-122). IEEE.

Ramadhan, B. (2018). Inilah Perkembangan Digital Indonesia Tahun 2018. Retrieved Desember 2, 2018, from Good News From Indonesia: https://www.goodnewsfromindonesia.id/2018/ 02/06/inilah-perkembangan-digital-indonesia-tahun-2018

Sekhar, G. S. (2009). Business policy and strategic management. New Delhi: I. K International Publishing House.

Sipior, J. C., & Ward, B. T. (2002). A strategic response to the broad spectrum of internet abuse. Information Systems Management, 19(4), 71-79. doi: 10.1201/1078/43202.19.4.20020901/ 38837.9

Ugrin, J. C., & Pearson, J. M. (2013). The effects of sanctions and stigmas on cyberloafing. Computers in Human Behavior, 29(3), 812-820. doi: 10.1016/j.chb.2012.11.005

Varghese, L., & Barber, L. K. (2017). A preliminary study exploring moderating effects of role stressors on the relationship between big five personality traits and workplace cyberloafing. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 11(4). doi:10.5817/CP2017-4-4

Weatherbee, T. G. (2010). Counterproductive use of technology at work: Information & communications technologies and cyberdeviancy. Human Resource Management Review, 20(1), 35-44. doi: 10.1016/j.hrmr.2009.03.012

Whitty, M. T., & Carr, A. N. (2006). New Rules in the workplace: Applying object relations theory to explain problem Internet and email behavior in the workplace. Computers in Human Behavior, 22(2), 235-250. doi: 10.1016/j.chb.2004.06.005

Wiastuti, R. D., Livensa, Lestari, N. S., & Triana, I. (2019). Employee personality traits towards cyberloafing activities in hotel industry. Tourism Proceeding, (pp. 139-147). Jakarta.

Information
PDF
502 times PDF : 398 times
Article Tools