You are on page 1of 13

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/233294894

Reconsidering the boundaries of the cyberloafing activity: The case of a


university

Article  in  Behaviour and Information Technology · May 2012


DOI: 10.1080/0144929X.2010.549511

CITATIONS READS

28 485

1 author:

Pablo Zoghbi-Manrique-de-Lara
Universidad de Las Palmas de Gran Canaria
72 PUBLICATIONS   826 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Crowding and workplace deviance in open-plan offices View project

All content following this page was uploaded by Pablo Zoghbi-Manrique-de-Lara on 01 June 2014.

The user has requested enhancement of the downloaded file.


This article was downloaded by: [ULPGC. Biblioteca]
On: 29 January 2013, At: 02:00
Publisher: Taylor & Francis
Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House,
37-41 Mortimer Street, London W1T 3JH, UK

Behaviour & Information Technology


Publication details, including instructions for authors and subscription information:
http://www.tandfonline.com/loi/tbit20

Reconsidering the boundaries of the cyberloafing


activity: the case of a university
a
Pablo Zoghbi-Manrique-de-Lara
a
Department of Economics & Management, University of Las Palmas de Gran Canaria,
Campus Universitario de Tafira, Edificio Empresariales, Module C, 35017 Las Palmas de Gran
Canaria (The Canary Islands), Spain
Version of record first published: 07 Mar 2011.

To cite this article: Pablo Zoghbi-Manrique-de-Lara (2012): Reconsidering the boundaries of the cyberloafing activity: the
case of a university, Behaviour & Information Technology, 31:5, 469-479

To link to this article: http://dx.doi.org/10.1080/0144929X.2010.549511

PLEASE SCROLL DOWN FOR ARTICLE

Full terms and conditions of use: http://www.tandfonline.com/page/terms-and-conditions

This article may be used for research, teaching, and private study purposes. Any substantial or systematic
reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to
anyone is expressly forbidden.

The publisher does not give any warranty express or implied or make any representation that the contents
will be complete or accurate or up to date. The accuracy of any instructions, formulae, and drug doses should
be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims,
proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in
connection with or arising out of the use of this material.
Behaviour & Information Technology
Vol. 31, No. 5, May 2012, 469–479

Reconsidering the boundaries of the cyberloafing activity: the case of a university


Pablo Zoghbi-Manrique-de-Lara*
Department of Economics & Management, University of Las Palmas de Gran Canaria, Campus Universitario de Tafira, Edificio
Empresariales, Module C, 35017 Las Palmas de Gran Canaria (The Canary Islands), Spain
(Received 7 March 2010; final version received 9 December 2010)

While many scholars generally conceptualise cyberloafing as just one more type of conventional deviant behaviour
at work, others consider this activity to be innocuous or even productive. In either case, cyberloafing is viewed as
merely misusing Internet resources, without contemplating its potential online character. The purpose of this study is
to address these aspects of the cyberloafing ontology. It suggests that under certain conditions cyberloafing (a) could
become a virtual activity, (b) is distinct from conventional forms of deviance and (c) that it may impair the
organisation’s effectiveness. Cyberloafing by instructors in degree courses was examined in a university with a
Downloaded by [ULPGC. Biblioteca] at 02:00 29 January 2013

specific culture of teaching and using e-resources. The argument developed here is that cyberloafing among
instructors acts as a contextual activity that obstructs the technological core of this university over the Internet. This
fact would lead cyberloafing to be (a) perceived by students ‘on the other side of the Net’, (b) significantly
differentiated by teachers as a behaviour distinct from conventional deviance and (c) counter-productive since it
would harm the teaching-learning process. Results of confirmatory factor analysis indicated that cyberloafing and
conventional deviance measures are separate. Unlike conventional deviance, individual cyberloafing was found to be
negatively associated with student satisfaction with the teaching service, as rated in each degree course. Since this
negative impact mainly occurred in a virtual environment, the results also suggest that cyberloafing can become
online behaviour that impairs the organisation’s effectiveness over the Internet. Theoretical and practical
implications of the results are finally discussed.
Keywords: cyberloafing; IT behaviour; cyber-deviance; employee online behaviour; organisational effectiveness;
satisfaction with teaching service

employees while online, cyberloafing can be ‘delivered’


1. Introduction across the Internet and, hence, perceived by other users
Employees’ cyberloafing activities are a cause for as virtual activity. One of the aims of this study is to
concern in many organisations. Lim (2002, p. 677) examine this issue.
defines these cyber activities as ‘. . . any voluntary act If cyberloafing is able to take place over the
of employees using their companies’ Internet access Internet, then the accepted specificities of these virtual
during office hours to surf non-job-related websites for environments (such as greater perceived anonymity,
personal purposes and to check (including receiving fewer social sanctions, and less recognition, among
and sending) personal email’ (e.g. managing a personal others) (see e.g. IJsselsteijn et al. 2003) may give it
portfolio of auctions on eBay). The link in the specific traits. Cyberloafing, in that case, would not
literature between cyberloafing and workplace de- completely share the nature of conventional deviance,
viance seems clear. Lim (2002) and Lim and Teo and it is reasonable to expect that employees would
(2005) seminally conceptualised cyberloafing as just significantly discriminate between the two behaviours.
one type of counterproductive or deviant workplace As a result, since the existing constructs of conven-
behaviour (DWB) (deviance) that harms the organisa- tional deviance do not capture online behaviour at
tional production (Robinson and Bennett 1995, work, measures of the two behaviours should reflect
Bennett and Robinson 2000). Since cyberloafing is a this distinction; that is, conventional deviance and
cyber activity, and in some way involved in environ- cyberloafing measures should differ. The exploration
ments supported by information and communication of the uniqueness of cyberloafing measures compared
technologies (ICTs), consistently thinking of cyberloaf- to conventional deviance measures constitutes, hence,
ing as conventional deviance may be an understand- the second aim of this paper.
able but risky assumption. It seems reasonable to Given that in the literature cyberloafing is con-
question whether, in addition to being performed by sidered just one more type of conventional deviance,

*Email: pzoghbi@dede.ulpgc.es

ISSN 0144-929X print/ISSN 1362-3001 online


Ó 2012 Taylor & Francis
http://dx.doi.org/10.1080/0144929X.2010.549511
http://www.tandfonline.com
470 P. Zoghbi-Manrique-de-Lara

the same literature is very clear in assuming that considered, its aims, and other organisational condi-
cyberloafing is counterproductive (Lim 2002, Lim and tions. This argument led us to focus specifically on one
Teo 2005). This interpretation would imply that Spanish public university in this study, in which 270
cyberloafing not only puts the well-being of the (17.46%) of the 1547 teachers and 15,367 (68%) of the
organisation or its members at risk (Robinson and 22,599 students were investigated. The way the
Bennett 1995), but it also harms the organisation’s teaching is organised in this specific university would
effectiveness in some way. However, neither the make it possible for instructors’ cyberloafing to be
seminal literature nor subsequent research on cyber- activity delivered online that, unlike conventional
loafing is conclusive in this regard. The majority of the deviance, can impair the effective functioning of the
empirical work conducted on cyberloafing reports on university.
its prevalence (Hallett 2002, Amble 2004, DebtCubed During the last decade, the university under study
2006, Fox 2007) or simply assumes its counter- has developed a large cultural background in imple-
productivity (Zoghbi et al. 2006). Moreover, the basic menting e-support facilities for learning and online
arguments offered by the literature in defending tutorials, and it has started other important ‘virtual
cyberloafing’s counter-productivity are generally con- campus’ services that favour online instructor–student
ceptual and do not provide enough empirical evidence. interaction. As early as 2004, it pioneered (Molist
Some prior studies, for example, simply argue that 2006) the implementation of ‘the modular object-
Downloaded by [ULPGC. Biblioteca] at 02:00 29 January 2013

these cyber activities can decrease performance be- oriented dynamic learning environment’ (Moodle) in
cause they constitute an unproductive use of time and Spain, and it was ranked third in providing Internet
distract employees from meeting their work demands services, according to an annual report on the
(Lim 2002, Lim and Teo 2005, Lim and Chen 2009). development of new technologies (ICTs) in Spanish
Since cyberloafing has been suggested as a palliative universities (Fundacion Auna 2003). Although face-to-
coping strategy against negative workplace experiences face learning also exists, the vast majority of contacts
such as stress (e.g. Oravec 2002, 2004, Stanton 2002, between teachers and students currently take place
Anandarajan and Simmers 2005), it is not clear online. Finally, the university offers several different
whether all of the time lost due to cyberloafing is types of units (degrees, centres, departments, among
counterproductive in the end. Other arguments, others). In the present study, we chose to examine the
although not conclusive either, focus on information 58 degree programs, given that teachers in these units
systems’ performance and suggest that cyberloafing are especially permanent over time and have a stronger
could lead employees to put security at risk by internal homogeneity compared to other types of units.
propagating, for instance, spyware infection (Levoie The plan for this study is as follows. First, it aims
and Pychyl 2001). to use structural equation modelling (SEM) to test (a)
The picture becomes even more complicated whether, unlike conventional deviance, cyberloafing is
because recent studies seem to suggest that not all supported in this university as a virtual activity
cyberloafing activities are similarly counterproductive. reaching targets across the Internet. Next, (b) we will
For example, by dividing cyberloafing into two types, conduct a confirmatory factor analysis (CFA) that
namely, serious (e.g. online gambling, surfing adult- significantly supports the distinction between these
oriented web sites) and minor (e.g. sending and behaviours as reported by teachers, and lastly (c) we
receiving personal email at work), Blanchard and will use SEM to test whether cyberloafing impairs
Henle (2008) suggest that minor cyberloafing is university effectiveness over the Internet, operationa-
innocuous. Lim and Chen’s (2009) recent work, lised as student satisfaction with the teaching service
however, challenges the Blanchard and Henle (2008) (SSTS). The paper concludes by discussing theoretical
findings by showing that email activities (i.e. minor and practical implications.
cyberloafing) have a negative impact on employees’
work, while browsing activities have a positive impact.
These important inconsistencies in the literature 2. Theoretical background and hypotheses
suggest that dividing cyberloafing into types may not Robinson and Bennett (1995) labelled misbehaviour at
be a sufficiently useful strategy to explain how and work as DWBs (hereinafter, deviance), which form
when it is counterproductive. Better understanding of part of the basis of this paper. These authors define
any potential ability of cyberloafing to inflict harm on deviance as behaviours that employees exhibit volun-
performance seems to be needed (Weatherbee 2010). tarily, significantly violating organisational norms, and
This study aims to explore the above-mentioned putting at risk the well-being of the organisation, its
aspects of the cyberloafing activity. We argue that members, or both. In a later study, Bennett and
cyberloafing could become a counterproductive online Robinson (2000) divided deviance into two types:
behaviour depending on the type of organisation behaviour that is directly harmful to the organisation
Behaviour & Information Technology 471

as a whole (organisational deviance), and behaviour activity in that they will not significantly affect targets
that is more concerned with harming individuals over the Internet.
within the organisation (interpersonal deviance). Ex- H2: Teachers’ cyberloafing is a virtual activity in that it
amples of organisational deviance would include will significantly affect targets over the Internet.
coming in late to work without giving prior notice
and putting little effort into work, whereas gossiping Maruping and Agarwal (2004) noted that prior
about and blaming coworkers would be examples of empirical research is clear in stating that the extant
interpersonal deviance. theory in traditional contexts cannot be directly
Since cyberloafing is a human activity, it stems applied to virtual settings, thus suggesting that the
from real rather than virtual behaviour. Thus, the fundamental nature of the interactions in face-to-face
actions of connecting to the Internet or wasting work and Internet environments could be different.
time, for instance, are verifiable acts of cyberloafing Although virtual interactions may not be fundamen-
from a strictly real perception. Unlike conventional tally a function of the medium itself, and cyberloafing
deviance, these behaviours are carried out by employ- activity delivered across new technologies (ICTs) ‘is’
ees while they are connected online, raising the always the same, the teachers’ awareness of the
probability that cyberloafing also constitutes a virtual medium they are using could somehow determine the
activity. Indeed, employees’ cyberloafing implies ‘log- character of their cyberloafing. Otherwise, can
Downloaded by [ULPGC. Biblioteca] at 02:00 29 January 2013

ging out’ other users and ignoring their emails, virtual cyberloafing exist without the new technologies
delaying online work, decreasing their presence in (ICTs), and if not, can we talk about the behaviours
virtual groups, or just being ‘unavailable’. Even without simultaneously considering the medium
though these behaviours can be the object of a real over which they are delivered? Thus, although
perception, it is clear that they may be virtual activities ‘real’ cyberloafing could consist of conventional
as well. deviance activities, the way instructors believe these
It seems clear that the behaviour is an immutable behaviours are ‘experienced’ by their students over the
fact. Since it has already happened – whatever it is – it Internet may also determine the way they carry them
cannot be changed. What can be changed is how it is out.
‘experienced’. Therefore, although the cyberloafing Unlike in many other organisational contexts, in
activity, in this sense, ‘is’ always the same, the fact the studied university cyberloafing is expected to be
that it is ultimately virtual may be closely related to perceived online by users who are not ‘sporadic clients’
whether it is ‘experienced’ by other users ‘on the other but instead remain in the university for a number of
side of the Net’. In turn, this perception may depend years. Instructors in this university, therefore, will be
on the characteristics of the jobs that cyberloafers particularly aware that their cyberloafing is transferred
habitually perform. If cyberloafers’ jobs comprise online to the same students together with the rest of
offline tasks to a greater extent, the content of their their daily virtual communications. Mediating tech-
interactions over the Internet will be more amorphous nology frequently constrains the breadth of behaviours
and exploratory in character, making it unlikely for (Lea and Spears 1992), and unlike while performing
cyberloafing to be perceived. In contrast, the more conventional deviance, instructors are likely to sense
cyberloafing is involved in operational and institu- social distance from students and anonymity to a
tional activities, the greater the possibility that greater extent, as well as greater impunity (IJsselsteijn
cyberloafing will be perceived online and more easily et al. 2003). To cope with this situation, they may reject
confirmed. some traditional forms of communication in favour of
Since in this specific university setting teachers are more virtual patterns (Ferguson and Ferguson 1988,
employed primarily to interact with students in a Walther 1992). Teachers may even perceive that their
specific teaching-learning framework and by using e- cyberloafing is harmful for reasons (e.g. leading their
resources, the probability that virtual interactions will students to log out and miss instruction) that are very
be more rigidly defined here, and, hence, that different from those existing in face-to-face contexts
cyberloafing will be perceived by student-users, (e.g. upsetting them while waiting for tutorials at their
appears to be high. For this reason, we postulate desks). Therefore, we suggest that teachers in this
that, unlike conventional forms of organisational and specific university context cannot self-report their
interpersonal deviance, the instructors’ cyberloafing cyberloafing as being equal to other acts of conven-
while online in the case of our university does not tional deviance.
merely consist of misusing the Internet resources.
H3: When self-reported, teachers’ cyberloafing is a
H1: Teachers’ conventional forms of organisational distinct behaviour compared to conventional forms of
(1a) and interpersonal (1b) deviance are not virtual both organisational and interpersonal deviance.
472 P. Zoghbi-Manrique-de-Lara

The main aim of the state university under study is Therefore, when instructors, due to cyberloafing,
to provide students with a high-quality teaching frequently ignore student emails or postpone re-
service. Therefore, its effectiveness can be measured sponses, put their computer equipment at risk, or
by how it rates on students’ satisfaction with the delay their virtual teaching activities, for example, they
teaching service (SSTS). Based on Borman and are probably performing contextual activities that, in
Motowidlo (1993), higher rates of SSTS could be this case, obstruct the organisational, social, and
achieved depending on the effectiveness with which psychological context of the university over the
instructors perform task and contextual activities. Internet, ultimately harming SSTS.
Task activities would contribute to the university’s Some research in the literature on service quality
technical core either directly, by implementing a part also appears to support our argument. Prior work
of its technological process, or indirectly, by providing confirms how the perception of quality of the service
it with needed materials or services (Borman and delivered is the result of a significant effect of employ-
Motowidlo 1997). On the other hand, contextual ees’ attitudes and behaviours in the ‘critical moments’
activities or extra-role performance (to use the Van of interactions with clients (Bitner et al. 1994, Lee and
Dyne et al. (1995) terminology) would act across the Lin 2005). Other studies also report that if information
organisational, social, and psychological context where technology is used to provide ‘personalisation’
the technical core also exists. Although in a negative (a website presents clients with selected information
Downloaded by [ULPGC. Biblioteca] at 02:00 29 January 2013

direction, cyberloafing is somewhat defined (Lim 2002) on their specific needs), e-service is able to create
in similar ways to contextual activities (Borman and individualised attention, personal thank you notes
Motowidlo 1997). Indeed, both contextual activities from online stores, and a message area for clients’
and cyberloafing include voluntary behaviours that are questions or comments (Yang 2001). Cyberloafing
not role-prescribed, and that tend to be similar across seems to follow the opposite path in the case of our
jobs (Phillips and Reddie 2007). university, hindering these quality attributes of a good
The inconsistency in the discussion on cyberloaf- e-service and harming the students’ satisfaction with
ing counter-productivity, however, seems to suggest the web-based teaching service and the SSTS in the
that cyberloafing does not always act as a contextual end. Twofold dimensionality is expected concerning
activity obstructing the technical core of the organi- SSTS. Grönroos (1982) identifies two service-quality
sation. Even if cyberloafing is delivered online, an dimensions – a technical aspect (‘what’ service is
innocuous (or even productive) virtual cyberloafing provided) and a functional aspect (‘how’ the service is
appears to be possible. If an employee, for example, provided) (see also, Lehtinen (1983), Berry et al.
is cyberloafing to cope with stress, and most of the (1985), Parasuraman et al. (1985)).
tasks in his/her job are essentially offline, cyberloaf- Finally, previous research provides evidence that
ing can take place online, but it would be based on clients may state their perceptions at different levels
less rigidly defined virtual interactions. Because it (Waldman and Gopalakrishnan 1996, Yoon et al.
forms part of less structured interactions, cyberloaf- 2001). As a first step, it is likely that students would
ing may be innocuous in this case, and even positively associate a teacher’s cyberloafing with the
perceived as fruitful (Lim and Chen 2009), since it service delivered by this teacher individually. Even-
is difficult to say what is being harmed – going back tually, teachers who exhibit cyberloafing would then
to the Borman and Motowidlo (1993) concept of contribute to shaping a negative image of their unit’s
contextual performance. Therefore, if we can say effectiveness among students. In the aggregate, stu-
what the technical core ‘is’, it becomes easier to say dents can transfer (associate) their SSTS from indivi-
how and when cyberloafing is inflicting social and dual cyberloafing to the service delivered by the unit
psychological harm. responsible for this cyberloafing. As a result, at the
At the studied university, the instructors’ interac- studied university, in degree courses that receive low
tions with students are mainly online and ultimately ratings on (technical or/and functional) SSTS, there
focus on the teaching-learning process. Because they may be more individual cyberloafing activities among
are operational and institutional, we know what is the teachers.
being hindered and supported. On that basis, instruc-
tors play a key role in supporting the technological H4a: Individual cyberloafing by teachers is negatively
associated with the students’ satisfaction with the
core of the university. They perform as a large and very
technical teaching service (technical SSTS), as rated
important front-line workforce that interacts repeat- in each degree course.
edly with a narrow range of students over time.
H4b: Individual cyberloafing by teachers is negatively
Regarding this point, Organ (1988) suggests that it is associated with the students’ satisfaction with the
in the aggregate, across time and across persons, when functional teaching service (functional SSTS), as rated
extra-role performance is able to impact performance. in each degree course.
Behaviour & Information Technology 473

3. Method 3.2.1. Cyberloafing


3.1. Procedure and sample characteristics We used a five-item scale adapted from the one
Data were collected from 270 (17.46%) of the 1547 proposed by Lim (2002), which included eight items
teachers and 15,367 (68%) of the 22,599 students at referring to browsing activities and three to emailing
a Spanish public university. Intranet email was used activities. We selected four of the former, and one of
in the former case, while (individually distributed) the email activities, which combined Lim’s ‘send’ and
questionnaires were used in the latter. The teacher ‘read’ email. Lim’s third item, ‘check’ email, was
sample consisted of 64.6% males and 35.4% females. omitted, since we believe it overlaps with ‘read’ email.
While 40% were 40 years old or younger, only 4.2% The scale is expected to be one-dimensional.
were older than 60. Some 68% of the sample held
tenured positions, while the remainder did not. No
contextual conditions were found that led us to 3.2.2. Conventional deviance
presume varying willingness to respond. In order to The scale used was a reduced version of the one
avoid reticence and interference in their responses, developed by Bennett and Robinson (2000) for
the participants were previously informed that the assessing DWBs. Some deviance referred to in this
research project had received official approval and scale regarding ethnic, religious or racial differences,
Downloaded by [ULPGC. Biblioteca] at 02:00 29 January 2013

that their IP addresses were unidentifiable. With and even working hours, did not apply to the studied
regard to the students, 10,836 were males (47.95%) university. Thus, this particular university led us to
and 11,763 females (52.05%). Only 2647 were 30 select 10 of those items in an attempt to obtain 2
years of age or above (11.71%), while the rest were dimensions, 6 items about organisational and 4 about
between 18 and 29 years old. interpersonal deviance.
The descriptive structures of the teacher sample
are quite similar to the population data. In effect, in
the university as a whole, 932 (60.28%) teachers held 3.2.3. Student satisfaction with teaching service
tenured positions, while the remaining 615 had some We used the 20-item scale of the office of institutional
other type of contract. With regard to age, 501 evaluation at the university under study to assess
(32.5%) were 40 years old or younger, and only 89 SSTS. The scale includes attributes similar to those
(5.7%) were 60 or older. In terms of gender, 68% proposed by Casanueva et al. (1997) (see Appendix B).
were males and 32% females. In our study, there We averaged the scores on each of the 20 items
were eventually 270 valid responses after 12 were reported by the students in each degree. We then
rejected due to incorrect completion or incoherent included these averages in the database for each of the
information. In addition, a total of 61,298 student 270 responding teachers, according to the degree
assessments in the annual teacher evaluation pro- program where he/she teaches. When necessary, we
gram were considered. Each assessment evaluates chose the degree in which the teachers had the highest
one teacher in one subject. The number of students teaching load. We expect to find the two SSTS
and the number of assessments indicate that each dimensions proposed by the literature, i.e. technical
student evaluated an average of 2.71 subjects, and and functional SSTS.
each teacher was evaluated by an average of 39.6 We examined the factor structures of cyberloafing,
students. Considering the average student/subject organisational and interpersonal deviance, as well as
and subject/student ratios, at least 68% of the the five-factor structure – where the two dimensions of
students participated in the evaluations, and more SSTS were also included – to ensure that each variable
than 95% of the teachers were evaluated in at least was separate. Initially, we intended to use CFAs for
one subject. this purpose. However, given that CFA is used when
strong theory and/or a strong empirical base is
available, and this base is weak when it comes to
3.2. Measures differentiating cyberloafing from organisational de-
Student satisfaction with teaching service (SSTS) viance, we first conducted an EFA to examine the focal
measures had a 5-point response format (e.g. 1 ¼ independent variables (cyberloafing, organisational
strongly disagree, 5 ¼ strongly agree). The items used and interpersonal deviance). We then conducted the
in the case of cyberloafing and deviance were scored on two planned CFAs. In this regard, although research-
a 7-point scale ranging from (1) never to (7) constantly. ers typically use either individual item or scale
All items are presented in the Appendices. The (composite) scores as indicators of latent constructs,
reliabilities were established by using Cronbach’s in order to examine the five-factor structure we chose
alpha. individual items for cyberloafing and conventional
474 P. Zoghbi-Manrique-de-Lara

deviance, but composite scores for SSTS, for two p 5 0.001; CFI ¼ 0.603, NFI ¼ 0.582, RMSEA ¼
reasons. First, SEM is limited in its ability to calculate 0.176), provided a significantly better fit to the data,
model estimates with large numbers of indicators i.e. Dw2(3) ¼ 616.628, p 5 0.01. Thus, CFA also
(Bentler and Chou 1987, Aquino et al. 1999). Second, provides support for the distinctiveness of the cyber-
it is difficult to find a match in models with large loafing measure compared to organisational
numbers of manifest indicators (Joreskog and Sorbom and interpersonal deviance measures, as H3 postu-
1986, Williams and Hazer 1986). Thus, before SSTS lated. In addition, the results of the five-factor CFA
items were entered into the CFA, they were averaged (which includes the items from the SSTS
according to the two dimensions identified by the EFA dimensions, but averaged) show that this solution is
in Appendix B. acceptable (w2 ¼ 249.651, df ¼ 111, p 5 0.001, CFI ¼
0.934, NFI ¼ 0.889, RMSEA ¼ 0.068) especially
based on RMSEA, which is less than 0.8 (see Browne
4. Results and Cudeck 1993). These patterns suggest the distinc-
Table 1 shows the correlations (r) between all the tiveness of all the variables under study.
research variables and reliabilities on the main The remaining hypotheses (H1, H2 and H4) were
diagonal. Cyberloafing is moderately inter-correlated then tested by using SEM and predicting the SSTS
with organisational (r ¼ 0.453; p 5 0.001) and inter- as the criterion variable. Regardless of whether the
Downloaded by [ULPGC. Biblioteca] at 02:00 29 January 2013

personal deviance (r ¼ 0.331; p 5 0.001), and the effects are positive or negative, conventional organi-
latter two with each other (r ¼ 0.600; p 5 0.01). In sational deviance (H1a), interpersonal deviance
addition, unlike organisational and interpersonal (H1b), and cyberloafing (H2) will be supported as
deviance, cyberloafing correlates negatively with func- performing as virtual activity if they show effects on
tional SSTS (r ¼ 70.184; p 5 0.01). Therefore, these virtual targets in the form of SSTS. If the
patterns could suggest findings in the expected direc- cyberloafing effects on SSTS are, in addition,
tions. However, suspect correlations between technical significantly negative, support for cyberloafing as
and functional SSTS (r ¼ 0.747; p 5 0.001) demand counterproductive (H4) is encountered as well. The
further tests to discover whether they are separate items provided in the two Appendices define the
dimensions. observed variables of the model in Figure 1. To
The EFA results for the three-factor (cyberloafing, seek support for H1a and H1b, in addition to
organisational and interpersonal deviance) structure cyberloafing, we entered in the model the two
are presented in Appendix A. As we can see, the items conventional deviance dimensions found in the
loaded supporting cyberloafing as a separate factor EFA in Appendix A. In order to gain rigour, unlike
compared to the other conventional deviance dimen- in the previous five-factor CFA conducted, here we
sions. Next, in the EFA results for SSTS, technical and included the items from the SSTS dimensions not
functional SSTS dimensions were identified and are averaged, even though in doing so we were aware
presented in Appendix B. Technical SSTS include, for that our model had a large number of manifest
example, giving clear explanations and making the indicators that could be difficult to match (Joreskog
topics easy to understand, while the functional SSTS and Sorbom 1986, Williams and Hazer 1986). As
include punctuality, attendance and compliance, suspected, the various indices used show that the fit
among others. We then conducted the CFA of the of this model was mediocre (see Figure 1). However,
cyberloafing, organisational and interpersonal de- an inspection of the paths from cyberloafing to SSTS
viance foci. Results of this CFA indicate that the reveals that they are significant, thus adding support
three-factor model (w2 ¼ 226.356, df ¼ 87, p 5 0.001; for cyberloafing as a virtual activity (H2). Since both
CFI ¼ 0.927, NFI ¼ 0.888, RMSEA ¼ 0.077), com- paths from cyberloafing to technical (B ¼ –.152;
pared to the one-factor model (w2 ¼ 842.984, df ¼ 90, p ¼ .04) and functional SSTS (B ¼ –.249; p ¼ .009)

Table 1. Means, standard deviations, correlations and reliabilities.

Variables M SD 1 2 3 4 5
1. Cyberloafing 2.87 1.57 (0.862)
2. Organisational deviance 2.48 1.34 0.453** (0.863)
3. Interpersonal deviance 2.55 1.35 0.331** 0.600** (0.801)
4. SSTS (technical service) 2.78 0.88 –0.071 –0.015 –0.058 (0.993)
5. SSTS (functional service) 3.05 1.43 –0.184* 0.031 –0.018 0.747** (0.976)

Note: The numbers in parentheses on the diagonal are coefficient alphas. N ¼ 270. *p 5 0.01, **p 5 0.001.
Behaviour & Information Technology 475
Downloaded by [ULPGC. Biblioteca] at 02:00 29 January 2013

Figure 1. Accepted model of cyberloafing and conventional deviance as predictors of SSTS. N ¼ 270; w2 ¼ 1662.488; df ¼ 315;
p 5 0.001; CFI ¼ 0.804; NFI ¼ 0.771; RMSEA ¼ 0.126. Levels of significance: *p 5 0.05; **p 5 0.01.

are, in addition, negative, support for cyberloafing’s Figure 1 clearly shows how organisational deviance
counter-productivity (H4) is also found. unexpectedly has an (positive) impact on SSTS. In that
Finally, Figure 1 also shows how interpersonal organisational deviance is also able to reach targets via
deviance does not significantly impact SSTS, thus the Internet (SSTS), the results appear to support the
adding support for H1b which postulates that it does idea that the virtual nature is not exclusive to
not perform as virtual activity in the studied university. cyberloafing. One explanation for this unexpected
Regarding H1a, nevertheless, organisational deviance result could be found in the mixed nature of the study
was supported as a virtual activity, since it unexpect- context where both behaviours were performed.
edly increased levels of both technical (B ¼ 0.196; Although online interactions dominate the teaching
p 5 0.05) and functional SSTS (B ¼ 0.167; p 5 0.05). activity, instructor and student face-to-face interac-
tions also exist; therefore, organisational deviance
could positively affect SSTS as an ‘offline’ behaviour.
5. Discussion Related to this positive impact, there is a body of
This study was an initial attempt to provide a literature addressing the potential positive conse-
preliminary exploration of the conditions under which quences of organisational deviance, such as decreased
cyberloafing performs as a distinct type of conven- levels of employees’ work alienation due to a sense of
tional deviant behaviour at work and becomes a regaining control over work processes, less role
counterproductive cyber activity with effects via the conflict, and reduced employee resistance (Ackroyd
Internet. Overall, in light of the results, this idea has and Thompson 1999). Although these face-to-face
gained strength. Beyond a simple influence based on effects ultimately exist, they are much more unlikely in
the human–computer interaction (HCI), as Lim and the case of cyberloafing, since it is performed privately
Chen (2009) recently reported, since this impact by teachers in their offices, which means that students
occurred across the virtual context of one specific are not able to observe their behaviours in this area.
university, the results suggest that cyberloafing is able As a further explanation, the cyberloafing variable
to impact performance, but over the Internet. How- may be acting here as a suppressor (MacKinnon et al.
ever, some inconsistencies in our results should be 2000). As we know, a suppressor is a mediating
discussed, as well as the role that this university variable that can reverse the direction of the relation-
context plays in these results. Below we address some ship that it potentially mediates when the suppressor,
theoretical and practical implications derived from this predictor and criterion variables are entered in the
study. same model. Given the non-significant main effects of
476 P. Zoghbi-Manrique-de-Lara

organisational deviance on SSTS suggested by correla- cyberloafing’s counter-productivity is supported in


tions in Table 1, the fact that this relationship becomes this study context. Students are not ‘sporadic users’,
positive in Figure 1 may indeed point to cyberloafing which may suggest that, generally, satisfaction with
as a suppressor. This explanation would imply that service of permanent clients or customers over time
cyberloafing can explain the relationship between could be ‘an easier target’ to harm. In other words,
organisational deviance and SSTS and play a mediat- some types of client-users and harm may be more
ing role in this link. Raising the possibility of this prone to producing effects of cyberloafing via the
mediation does not seem unreasonable. When students Internet than others. Third, the design of this study
are faced with cyberloafing, they appear to express suggests that, among other reasons, the virtual side of
dissatisfaction with the teachers’ punctuality, atten- cyberloafing was perceived because students were
dance, and compliance as SSTS attributes (see chosen who belonged to internally homogenous units,
Appendix B). However, these SSTS attributes may degree courses, which means that these students are
also be affected by organisational deviance (see e.g. ultimately linked to a narrow range of teachers.
item ‘spend too much time fantasising or daydreaming Consequently, it is likely that the more clients are
instead of working’ in Appendix A) if cyberloafing (see linked to the same service providers over time and
e.g. ‘surfing the Net and thereby escape a little’ in interact with homogenous units of an organisation, the
Appendix A) mediates this link. In other words, as a more these clients are likely to be impacted by virtual
Downloaded by [ULPGC. Biblioteca] at 02:00 29 January 2013

mediator, cyberloafing seems to be ‘hacking a path’ cyberloafing. Lastly, teachers in this university are
(fantasising or daydreaming instead of working þ by mainly performing task activities online. Thus, their
surfing the Net) from organisational deviance to SSTS virtual interactions are probably operational and
by carrying its effects out across a virtual environment. institutional to a greater extent, causing their cyber-
Without doubt, this suggestion is an interesting one loafing to act as a contextual activity that obstructs the
that should be developed in future research. technical core over the Internet. If this is the case,
How and when cyberloafing becomes counter- cyberloafers’ positions may generally be playing a role
productive are imperative questions, so that its in the final counter-productivity of cyberloafing.
potential effects can be controlled. Since the results This research relating organisational online beha-
support teachers’ cyberloafing as a virtual activity in viour to the misuse of technology bridges the
our university context, in that it significantly reached organisational research literature and approaches to
targets across the Internet, real and virtual facets may similar issues found in the diverse HCI literature.
potentially coexist in the nature of cyberloafing. Computer Supported Collaborative Work is frequently
Therefore, cyberloafing should be reconsidered as a conducted in organisational settings by virtual teams.
potential harm ‘on both sides of the Net’. Although Despite their benefits, virtual teams encounter numer-
corporations already strongly support strict regulation ous challenges due to the negative impact of virtuality
of Internet usage (Mirchandani 2004, Flynn 2005), on their effective performance (Hinds and Kiesler
these monitoring practices against cyberloafing may 2002, IJsselsteijn 2003). Given its supported online
not be enough, given that the scope of its harm may be character and negative influence on teaching’s rela-
broader than previously assumed. Control mechanisms tional and instrumental processes, the presence of
for cyberloafing ‘on the other side of the Net’ may be cyberloafing might exacerbate these deficits in virtual
necessary as well. In this regard, the feedback of activity. For instance, cyberloafing among members of
students, customers and clients in general, for example, virtual groups may suffocate interactions among
could be very useful. members, which subsequently hinders trusting, deeper
The educational context specifically used for this and more ‘spontaneous’ communication. Proper tech-
study may suggest some of the conditions under which nology design and management able to discourage
cyberloafing becomes counterproductive over the cyberloafing may definitively contribute to virtual
Internet. First, instructors are employees with jobs groups’ effectiveness.
that per se generate a large number of virtual contacts This study also opens up avenues for future
on a daily basis. We believe this prevalence should be research into new ideas about cyberloafing as a virtual
considered, since it may aggregate its virtual impacts activity. For example, given that new technologies
across time and persons (Organ 1988), making (ICTs) seem to be capable of ‘creating’ online
cyberloafing more able to impact performance. Sec- behaviour, ‘cyberloafing’ not fundamentally derived
ond, the results show how cyberloafing performs in a from the action of a real person would be plausible.
counterproductive way when it specifically targets Thus, new technologies (ICTs) can provide instructors
student satisfaction (SSTS). This finding should lead with programs with algorithms that detect when
us to consider this measure (SSTS) and the specific students are logged on and allow them to interact
characteristics of students as targets, when online with ‘virtual instructors’. Through this system,
Behaviour & Information Technology 477

instructors could send students standard notes, auto- Aquino, K., Lewis, M.U., and Bradfield, M., 1999. Justice
matic messages with some guidance, and even gestural constructs, negative affectivity, and employee deviance: a
proposed model and empirical test. Journal of Organiza-
icons, even when they are not personally involved in tion Behavior, 20 (7), 1073–1091.
the action itself. Since this way of interacting with Bennett, R.J. and Robinson, S.L., 2000. Development of a
students does not seem to mitigate the salience of these measure of workplace deviance. Journal of Applied
‘behaviours’, and teachers (although offline) can still Psychology, 85 (3), 349–360.
remain ‘involved’ with (or responsible for) said Bentler, P.M. and Chou, C.P., 1987. Practical issues in
structural modeling. Sociological Methods and Research,
behaviours, it seems clear that this cyber activity 16 (1), 78–117.
does not stem from a ‘real teacher’. In this case, the Berry, L.L., Zeithaml, V.A., and Parasuraman, A., 1985.
‘real’ side of cyberloafing should just comprise the Quality comes in services, too. Business Horizon, 28 (3),
instructor’s neglect of (or loafing in) the proper 44–52.
supervision and maintenance of this program. Bitner, M.J., Booms, B.H., and Mohr, L.A., 1994. Critical
service encounters: the employee’s viewpoint. Journal of
Finally, we believe our study has strengths and Marketing, 58 (4), 95–106.
several important weaknesses. Concerning the former, Blanchard, A.L. and Henle, C.A., 2008. Correlates of
in spite of the use of self-reported measurements, the different forms of cyberloafing: the role of norms and
assessments of cyberloafing and SSTS were obtained external locus of control. Computers in Human Behavior,
from different sources, thus avoiding mono-method/ 24, 1067–1084.
Borman, W.C. and Motowidlo, S.J., 1993. Expanding the
Downloaded by [ULPGC. Biblioteca] at 02:00 29 January 2013

source biases. However, this study only focuses on one criterion domain to include elements of contextual
area of service, namely SSTS. Future research should performance. In: N. Schmitt and W.C. Borman, eds.
focus on a broader concept of service and other Personnel selection in organizations. San Francisco, CA:
scientific indicators like performance or work produc- Jossey Bass, 71–98.
tivity. Second, the peculiarities of the context studied Borman, W.C. and Motowidlo, S.J., 1997. Task
performance and contextual performance: the meaning
impede the generalisability of our findings. For the for personnel selection research. Human Performance, 10
same reason, the performance of the constructs used in (2), 99–109.
the present research could also vary. Third, there are Browne, M.W. and Cudeck, R., 1993. Alternative ways of
other possible antecedents to SSTS that have not been assessing model fit. In: K.A. Bollen and J.S. Long, eds.
controlled and could have an impact on SSTS (e.g. Testing structural equation models. Newbury Park, CA:
Sage, 136–162.
instructors’ experience and educational background). Casanueva, C., Periáñez, R.Y., and Rufino, J.E., 1997.
Finally, the fieldwork was conducted in such a way Calidad percibida por el alumno en el servicio docente
that individual SSTS was not compared to the universitario: desarrollo de una escala de medida. In: M.
cyberloafing shown by each teacher individually. This Ruiz, ed. XI Congreso Nacional Aedem Lleida, 2, 27–34.
condition keeps our study from pursuing a complete Debt Cubed., 2006. Are your internet costs going through the
roof? Debt Cubed, 21 (1), 10.
analysis at the individual level. Ferguson, S.D. and Ferguson, S., 1988. Organizational
In conclusion, the Internet channel increasingly communication. 2nd ed. New Brunswick, NJ: Transaction
plays a key role in employees’ contact with clients, and Publishers (Rutgers University).
the findings of this study have important implications Flynn, N., 2005. 2005 electronic monitoring and surveillance
for the role cyberloafing can play as a virtual activity in survey. New York: American Management Association.
Fox, A., 2007. Caught in the web. HR Magazine, Society for
achieving high-quality service in organisations. With- Human Resource Management, December 2007, 35–39.
out a doubt, under similar organisational conditions to Fundación, Auna., 2003. Informe sobre el desarrollo de la
those in the present study, managers need to reconsider Sociedad de la Información en España, eEspaña 2003.
strategies and policies designed to decrease the harm of Publicaciones: eEspaña.
cyberloafing, since it may occur ‘on both sides of the Grönroos, C., 1982. Strategic management and marketing in
service sector. Cambridge, MA: Marketing Science
Net’. Institute.
Hallett, T., 2002. Christmas cyberloafing cost UK businesses
£154 million [online]. Available from: http://hardware.
References silicon.com/servers/0,39024647,11036829,00.htm [Acces-
Ackroyd, S. and Thompson, P., 1999. Organizational sed 16 October 2008].
misbehavior. London, UK: Sage. Hinds, P.J. and Kiesler, S., 2002. Distributed work: new
Amble, B., 2004. Does cyberloafing undermine productivity? research on working across distance using technology.
[online]. Available from: http://www.management-issues. Cambridge: MIT Press.
com/2006/8/24/research/does-cyberloafing-undermining IJsselsteijn, W., van Baren, J., and van Lanen, F., 2003.
productivity.asp [Accessed 16 October 2008]. Staying in touch: social presence and connectedness
Anandarajan, M. and Simmers, C.A., 2005. Developing through synchronous and asynchronous communication
human capital through personal web use in the media. In: C. Stephanidis and J. Jacko, eds. Human-
workplace: mapping employee perceptions. Communica- computer interaction: theory and practice (Part II),
tions of the Association for Information System, 15, 776– Volume 2 of the proceedings of HCI international 2003.
791. Hillsdale, NJ: Lawrence Erlbaum, 924–928.
478 P. Zoghbi-Manrique-de-Lara

Joreskog, K.G. and Sorbom, D., 1986. Lisrel IV: analysis of Organ, D.W., 1988. Organizational citizenship behavior: the
linear structural relationship by maximum likelihood, good soldier syndrome. Lanham, MD: Lexington Books.
instrumental variables, and least squares methods. 4th Parasuraman, A., Zeithaml, V.A., and Berry, L.L., 1985. A
ed. Moorseville, IN: Scientific Software. conceptual model of service quality and its implications
Lea, M. and Spears, R., 1992. Paralanguage and social for future research. Journal of Marketing, 49 (4), 41–50.
perception in computer-mediated communication. Jour- Phillips, J.G. and Reddie, L., 2007. Decisional style and self-
nal of Organizational Computing and Electronic Com- reported Email use in the workplace. Computers in
merce, 2 (3), 321–341. Human Behavior, 23 (5), 2414–2428.
Lee, G.-G. and Lin, H.-F., 2005. Customer perceptions of e- Robinson, S.L. and Bennett, R.J., 1995. A typology of
service quality in online shopping. International Journal deviant workplace behaviors: a multidimensional scaling
of Retail and Distribution Management, 33 (2), 161–176. study. Academy of Management Journal, 38, 555–572.
Lehtinen, J., 1983. Customer oriented service system. Work- Stanton, J.M., 2002. Company profile of the frequent
ing paper, Service Management Institute, Helsinki. Internet user. Communications of the ACM, 45 (1), 55–59.
Levoie, J.A.A. and Pychyl, T.A., 2001. Cyberslacking and Straub, D.W. and Welke, R.J., 1998. Coping with systems
the procrastination superhighway: a web-based survey of risk: security planning models for management decision-
online procrastination, attitudes, and emotion. Social making. MIS Quarterly, 22 (4), 441–469.
Science Computer Review, 19 (4), 431–444. Van Dyne, L., Cummings, L.L., and Parks, J.M., 1995.
Lim, V.K.G., 2002. The IT way of loafing on the job: Extra-role behaviors: In pursuit of construct and defini-
cyberloafing, neutralizing and organizational justice. tional clarity (a bridge over muddied waters). In: L.L.
Journal of Organizational Behavior, 23 (5), 675–694. Cummings and B.M. Staw, eds. Research in organiza-
Lim, V.K.G. and Chen, D.J.Q., 2009. Cyberloafing at tional behavior. Vol. 17. Greenwich, CT: JAI, 215–285.
Downloaded by [ULPGC. Biblioteca] at 02:00 29 January 2013

the workplace: gain or drain on work? Behaviour & Waldman, D.A. and Gopalakrishnan, M., 1996. Opera-
Information Technology, iFirst, doi: 10.1080/ tional, organizational and human resource factors
01449290903353054. predictive of customers’ perceptions of service quality.
Lim, V.K.G. and Teo, T.S.H., 2005. Prevalence, perceived Journal of Quality Management, 1 (1), 23–35.
seriousness, justification and regulation of cyberloafing in Walther, J.B., 1992. Interpersonal effects in computer
Singapore – an exploratory study. Information and mediated interaction: a relational perspective. Commu-
Management, 42, 1081–1093. nication Research, 19 (1), 52–90.
MacKinnon, D.P., Krull, J.L., and Lockwood, C.M., 2000. Weatherbee, T.G., 2010. Counterproductive use of technol-
Equivalence of the mediation, confounding and suppres- ogy at work: information and communications technol-
sion effect. Prevention Science, 1 (4), 173–181. ogies and cyberdeviancy: new perspectives in the study of
Maruping, L.M. and Agarwal, R., 2004. Managing team counterproductive behavior in organizations. Human
interpersonal processes through technology: a task- Resource Management Review, 20 (1), 35–44.
technology fit perspective. Journal of Applied Psychology, Williams, L.J. and Hazer, J.T., 1986. Antecedents and
89 (6), 975–990. consequences of satisfaction and commitment in turn-
Mirchandani, D.A., 2004. A deterrence theory perspective on over models: a reanalysis using latent variable structural
personal web usage. In: C.A. Simmers, ed. Personal web equation methods. Journal of Applied Psychology, 71 (2),
usage in workplace: a guide to effective human resources 219–231.
management. Hershey, PA: Information Science Publish- Yang, Z., 2001. Customer perceptions of service quality in
ing, 111–124. internet-based electronic commerce. Proceedings of the
Molist, M., 2006. Institutos y universidades apuestan por la 30th EMAC Conference, Bergen, 8–11.
plataforma libre de ‘e-learning’ Moodle, CiberP@is, 13 Yoon, M.H., Beatty, S.E., and Suh, J., 2001. The effect of
April, Education. Available from: http://www.elpais.es/ work climate on critical employee and customer out-
articulo/portada/Institutos/universidades/apuestan/plata comes: an employee-level analysis. International Journal
forma/libre/elearning/Moodle/elpcibpor/200060413elpcib of Service Industry Management, 12 (5), 500–521.
por_1/Tes/ Zoghbi, P., Verano-Tacoronte, D., and Ting-Ding, J.M.,
Oravec, J.A., 2002. Constructive approaches to Internet 2006. Do current anti-cyberloafing disciplinary practices
recreation to workplace. Communications of the ACM, 45 have a replica in research findings? A study of the effects
(1), 60–63. of coercive strategies on workplace Internet misuse.
Oravec, J.A., 2004. When work morphs into play: using Internet Research, 16 (4), 450–467.
constructive recreation to support the flexible workplace.
In: M. Anandarajan, ed. Personal web usage in the
workplace: a guide to effective human resource manage-
ment. Hershey, PA: Idea Group Publishing.
Behaviour & Information Technology 479

Appendix A. Exploratory factor analysis with the cyberloafing and conventional deviance variables

F1 F2 F3
(F1) Organisational deviance (eigenvalue ¼ 5.9; explained variance % ¼ 39.4)
X01: Spend too much time fantasising or daydreaming instead of working 0.710 0.268 0.083
X02: Come to work late without giving prior notice 0.658 0.102 0.112
X03: Intentionally worked slower than I could have worked 0.847 0.179 0.189
X04: Neglected to follow my boss’s instructions 0.529 0.060 0.398
X05: Put little effort into my work 0.807 0.166 0.279
X06: Taken an additional or longer break than is acceptable at my workplace 0.772 0.211 0.247
(F2) Cyberloafing (eigenvalue ¼ 2.3; explained variance % ¼ 15.0)
I use the Internet at work to . . .
X07 . . . visit websites and digital newspapers to seek personal information 0.183 0.810 0.018
X08 . . . download software or files for personal or family use 0.143 0.798 0.091
X09 . . . read or send personal (non-work) emails 0.076 0.790 0.162
X10 . . . visit the website of my bank to look at my account 0.194 0.783 0.054
X11 . . . surf the Net and thereby escape a little 0.190 0.689 0.124
(F3) Interpersonal deviance (eigenvalue ¼ 1.5; explained variance % ¼ 9.7)
X12: Said something hurtful to some colleague at work 0.225 0.050 0.815
X13: Publicly embarrassed colleagues at work 0.313 0.043 0.718
X14: Made fun of colleagues at work 0.220 0.279 0.772
Downloaded by [ULPGC. Biblioteca] at 02:00 29 January 2013

X15: Acted rudely towards colleagues at work 0.091 0.084 0.795

Note: Total explained variance % ¼ 64.13; Kaiser-Meyer-Olkin ¼ 0.896; Varimax Rotation; Bartlett’s sphere test (chi-squared approximately
1895.934; df ¼ 105; Sig. ¼ 0.000).

Appendix B. Exploratory factor analysis of student satisfaction with teaching service (SSTS)

F1 F2
(F1) Technical quality (eigenvalue ¼ 17.4; explained variance % ¼ 51.1)
Y01: My teacher gives clear explanations 0.799 0.526
Y02: My teacher uses appropriate resources to explain the subject 0.841 0.450
Y03: My teacher makes it easy to understand the subject 0.831 0.508
Y04: My teacher has got me interested in the subject 0.922 0.268
Y05: I would like to study another subject with this teacher 0.886 0.158
Y06: My teacher has teaching skills (*) 0.751 0.611
Y07: Taking into account the conditions in which 0.717 0.644
this subject is taught (number of students, timetable,
means, etc.), I am satisfied with this teacher’s work (*)
Y08: My teacher is a good teacher (*) 0.708 0.669
(F2) Functional quality (eigenvalue ¼ 1.4; explained variance % ¼ 43.1)
Y09: The assessments coincide with what my teacher explains in class (*) 0.660 0.610
Y10: My teacher has a good command of the subject content (*) 0.517 0.640
Y11: My teacher answers our questions with precision (*) 0.609 0.691
Y12: My teacher is receptive to our questions and suggestions (*) 0.604 0.700
Y13: My teacher applies the assessment criteria shown in the subject program (*) 0.575 0.754
Y14: From the start of the course, students know the assessment criteria for the subject 0.396 0.816
Y15: My teacher respects us 0.286 0.858
Y16: The students are notified when the teacher cannot give a class 0.450 0.749
Y17: My teacher is punctual 0.381 0.798
Y18: My teacher presented the subject program at the start of the course 0.428 0.761
Y19: My teacher regularly complies with office hours 0.561 0.775
Y20: My teacher regularly attends classes 0.136 0.905

Note: (*) Items removed because they did not clearly load in any factor (difference of load below 0.2). Total explained variance % ¼ 94.23;
Kaiser-Meyer-Olkin ¼ 0.897; Varimax rotation; Bartlett’s sphere test (chi-squared approximately ¼ 11140.219; df ¼ 190; Sig. ¼ 0.000).

View publication stats

You might also like