Professional Documents
Culture Documents
a r t i c l e i n f o a b s t r a c t
Article history: Along with the dissemination of mobile technologies and wireless networks in teaching and learning
environments, research has shown that students tend to cyberloaf during the courses. As a result, their
performance is impeded and they could be distracted from the course. In order to prevent cyberloafing
Keywords: behaviors, in some occasions, information and communication technologies (ICT) have been banned or
Cyberloafing behaviors their use is restricted in the schools causing to harm ICT integration in education. In this context, the
Cyberslacking aim of this study was to identify the level of cyberloafing situations observed in courses in computer lab-
University students
oratories and reveal likely variables effective on cyberloafing behaviors which in turn would be helpful
ICT integration
for practitioners to prevent cyberloafing behaviors of students. This research was conducted by using sur-
vey method. Participants in the study were 288 first year undergraduate students who took Computing I
course held in a computer laboratory at the Fall Semester of the academic year of 2013–2014. In order to
identify cyberloafing behaviors of the students when they were fulfilling the learning activities assigned
to them, cyberloafing activities scale as well as Demographic Information Form were used. As a result of
the research, by demonstrating the cyberloafing levels of the students, findings related to the cyberloa-
fing behaviors were interpreted with regard to the variables addressed in the study, considering the total
score obtained from cyberloafing activities scale and the sub-dimensions of the scale, ‘‘individual’’,
‘‘search’’, ‘‘social’’ and ‘‘news’’.
Ó 2014 Elsevier Ltd. All rights reserved.
http://dx.doi.org/10.1016/j.chb.2014.12.023
0747-5632/Ó 2014 Elsevier Ltd. All rights reserved.
F.G. Karaoğlan Yılmaz et al. / Computers in Human Behavior 45 (2015) 290–298 291
Pearson, 2013; Whitty & Carr, 2006). It is observed that behaviors students who cyberloaf. Moreover, it was attempted to identify sit-
of use of internet for the purposes other than course content, uations of cyberloafing behaviors of the students based on their
named as Cyberloafing in the literature, has a variety of conse- daily internet use as well as to examine likely variables effective
quences to students’ learning such as drawing students’ attention on cyberloafing. In terms of dealing with obstacles for ICT integra-
to areas other than the course, and that these behaviors could be tion in education, in addition to examining who tend to cyberloaf as
regarded as obstacles to successful integration of information educational actors, context of teaching and learning practices in
and communication technologies into the learning-teaching envi- computer labs also takes an important place today since these labs
ronments and impede learners’ performance (Ergün & Altun, are used as a digital library, help students do their assignments,
2012; Kalaycı, 2010; Kurt, 2011; Yasßar, 2013). print out, check their emails and so on. However, as mentioned ear-
On taking a closer look at the concept of cyberloafing, it was lier, since the degree of cyberloafing in labs is higher than in class-
originated in the studies dealing with workplace environments rooms; cyber loafing behaviors in computer labs must be
and issues around knowledge management. There has been con- investigated. In particular, at the higher education institutions,
siderable debate over cyberloafing as a counterproductive work some courses have been delivered either via online learning or
behavior (CWB). In research studies focusing on work related blended learning approach and this requires students to frequently
issues, its relations to job satisfaction (Everton, Mastrangelo, & use computer labs. Blended and online courses are run in virtual
Jolton, 2005); negative, positive, neutral effects on performance classes with computer-based systems support relying on computer
or lower task performance (Askew, 2012); types of cyberloafing based communications (Zhang, Ordóñez de Pablos, & Xu, 2014).
(Lim & Chen, 2012) and some other variables have been examined. Computer based communication raises the question of social cyber-
It is noteworthy that in most of the CWB studies social networks loafing behaviors which are likely to impede productivity compared
and mobile technologies which lead to cyberloafing have been to other types of cyberloafing behaviors (Lim & Chen, 2012). In that
regarded as the tools impeding performance. However, in the field sense, computer labs play an important role in emergence of
of education, these technologies have been rapidly taking place cyberloafing.
and have significantly been integrated into the education. For To this end, the goal of the study is to investigate cyberloafing
instance, educational potential of Facebook has widely been dis- behaviors of the university students in computer labs based on
cussed (Pollara & Zhu, 2011; Roblyera, McDanielb, Webbc, some variables. The remainder of this article will explore the fol-
Hermand, & Wittye, 2010) and Facebook has been adopted in edu- lowing research questions:
cation; podcasting applications which are available on mobile
devises have been adopted in educational context to enhance stu- 1. What is the cyberloafing situation of university students in
dent learning experience and to improve students’ academic computer labs?
achievement (Foster & Havemann, 2008; Karaoğlan Yılmaz, 2. Does level of cyberloafing of university students differ with
2014). However, along with the integration of aforementioned regard to;
technologies and social networks into education, there have been (a) Gender.
instances where these technologies are banned or their use is (b) The department in which they study.
restricted due to cyberloafing as well as some anti-social behaviors (c) The location where they connect to internet.
(Barkham & Moss, 2012) while this is a barrier to successful inte- (d) Daily duration of use of internet?
gration of ICT in schools. These instances show that ICT integration
is not only about equipping the schools with technologies but also 2. Method
coping with its unexpected and undesired consequences such as
cyberloafing. In this section, the model of the research, study group, data col-
It is observed that especially students in higher education insti- lection tools and data analysis are presented.
tutions cyberloaf during courses by using their mobile phones
which have access to the internet. There are several studies con-
ducted to explore cyberloafing situations of students at higher edu- 2.1. Research method
cation institutions. In his study, Kalaycı (2010) carried a descriptive
analysis to discover cyberloafing situations of university students In this study, survey method was used in order to reveal cyber-
and examined what kind of actions student took on what kind of loafing situations of university students. As is known, survey
websites. As a result of the study, cyberloafing behaviors per- method helps researchers describe an event or circumstance in
formed by university students were examined quantitatively. In a the form they exist. The event or circumstance is defined in the
study by Kurt (2011), university students’ cyberloafing behaviors conditions they happen and in the form they exist (Fraenkel &
in daily life and cyberloafing behaviors during computing courses Wallen, 2006).
in a computer laboratory were analysed comparatively. Also in a
study by Ergün and Altun (2012), it was aimed to qualitatively 2.1.1. Study group
reveal the reasons for cyberloafing behaviors of students by inter- The study group consisted of 288 students who took Computing
viewing and observing them. In the same vein, Yasßar (2013) exam- I course run at a state university in 2013–2014 in Turkey. In the
ined cyberloafing situations of university students by considering computer lab, there were projection, smartboard, wired network
the variables of locus of control and attitude towards computer and wireless network through which the students could connect
laboratory. to the internet with their mobile devises. In assigning the student
However, in terms of cyberloafing in education, a significant in the study group, convenience sampling method was used. The
body of the studies has been carried out with teacher candidates reason why convenience sampling method was used is that this
while cyberloafing concerns all university students as they are method allows researcher to choose sampling among people in
likely to use mobile technologies (e.g. cell phones) for leisure than his/her neighborhood (Ergün & Altun, 2012). In sampling, in terms
for school or work (Lepp, Li, Barkley, & Salehi-Esfahani, 2015). In of easy accessibility, the students who took at least 2 h course
this research, different from other studies, it was aimed to extend scheduled weekly in the computer lab were selected on a volun-
the scope of this research area by examining the cyberloafing situ- tary basis with regard to convenience sampling approach. Among
ations of students from the departments of universities other than the students, the students in Management Information Systems
education faculties and to examine general profiles of the university department took 3 h Computing I course in the computer lab,
292 F.G. Karaoğlan Yılmaz et al. / Computers in Human Behavior 45 (2015) 290–298
while students in Turkish Language and Literature department Demographic Information Form was formed by the researchers
took 3 h and the students in History department took 2 h course. of present study. The students were asked to answer the questions
This study group was selected to investigate whether taking an in relation to their department in which they are enrolled, their
ICT related course in computer labs has an effect on cyberloafing gender, locations to connect to the internet and daily duration of
behaviors of the students studying in different departments. Also, time on the internet.
the student groups whose course length is different than each
other were chosen to investigate the effect of length of the course
on cyberloafing behaviors. Furthermore, since same researchers of 3. Findings
present study run the courses with the study group, further stu-
dent groups were not selected. These groups of students were cho- Within the context of the research problems, the findings and
sen because the researchers observed their cyberloafing behaviors discussions on the findings are presented below respectively about
as a problem in delivering the course. In other words, an emerging the departments in which the students are enrolled, locations
problem in the teaching and learning practices was the driving where they connected to internet and their daily duration of use
force of this research and thus, this study group was chosen to of internet.
identify the problem in detail in real life context. With regard to the first sub-problem of the research, the
The present study group could provide an insight into cyberloa- descriptive statistics are presented in Table 2 which shows the sit-
fing behaviors of university students in wider population. Conve- uations regarding the cyberloafing levels of the students.
nience sampling method to some extent represents the According to Table 2, the average of total score that obtained
population (Balcı, 2010). Fraenkel and Wallen (2006: 99) suggest from cyberloafing activities scale is 59.88 (2.60 out of 5). In this
that ‘‘In general, convenience samples cannot be considered repre- sense, it can be stated that the cyberloafing situations of university
sentative of any population and should be avoided if at all possi- students are at medium-level.
ble’’; for this reason demographic information of the participants The situation whether the cyberloafing points of university stu-
must be presented. In accordance with this suggestion, the demo- dents in the study group display normal distribution was examined
graphic information of the students is presented in Table 1 below. by using Kolmogorov-Smirnov test. As a result of findings gathered
from the test, it was confirmed that the data collected from cyber-
loafing activities scale displays normal distribution (p > .05). There-
2.1.2. Data collection tools fore, T-test and Anova parametric tests were used in analyzing
Data of this research were collected using cyberloafing activities homogeneous data; and Mann Whitney U and Kruskal Wallis
scale aiming to assess cyberloafing behaviors of the students. The non-parametric tests were used in analyzing non-homogeneous
students’ demographic information was collected using Demo- data. In the research, in the significance tests .05 confidence level
graphic Information Form. was taken basis.
The cyberloafing activities scale which was developed by With regard to the second sub-problem of the research, t-test
Blanchard and Henle (2008), adapted to Turkish by Kalaycı was used to test whether cyberloafing levels of university students
(2010) and revised by Yasßar (2013) through adding several items differ significantly according to gender. The result of this analysis is
was used. In the revised version of the scale, in addition to adding presented in Table 3.
items into the scale, a subdimension, ‘‘searching’’, was also Table 3 shows that the average cyberloafing scores male stu-
included. The revised scale consists of 23 items. Scale items are a dents got from the cyberloafing activities scale is 65.14, whereas
type of five point likert scale and gradings are in the form of the average score of female students is 55.03. When considering
‘‘never’’, ‘‘rarely’’, ‘‘sometimes’’, ‘‘generally’’, ‘‘always’’. The follow- the scale generally with regard to gender, cyberloafing levels of
ing two items could provide examples of the items on the scale; students show statistically significant difference [t(286) = 3.68,
‘‘During the course I visit social networks (Facebook, Twitter, p < .05]. In other words, the level of cyberloafing of male students
etc)’’; ‘‘During the course, I play online games’’. After adding new is higher than that of female students. In terms of sub-dimensions
items into the scale, the validity and reliability of the scale was of the scale, it can be observed that respectively the sub-dimen-
tested again by Yasßar (2013). The scale consists of four sub-dimen- sions individual [t(261.30) = 4.56, p < .05), search [t(286) = 4.72,
sions, and the internal consistency coefficient (Cronbach’s alpha p < .05], social [t(286) = 3.68, p < .05] and news [t(286) = 5.65,
coefficient) of these dimensions valued as ‘‘individual’’ 0.94, p < .05] differ statistically significantly according to gender vari-
‘‘search’’ 0.77, ‘‘social’’ 0.84 and ‘‘news’’ 0.76. The fit indices able. It is determined that this difference results from male stu-
between four-factor model and the data were acceptable dents and the scores obtained from sub-dimensions of the scale
(GFI = 0.92; CFI = 0.92; NNFI = 0.92; RMSEA = 0.08). According to are higher than those of female university students.
Nunnally and Bernstein (1994) Cronbach’s alpha coefficient value Within the context of the second sub-problem of the research,
should be greater than 0.70. Drawing on the measures of the scale, the descriptive values of the cyberloafing degrees based on the
it could be seen that each subdimension of the scale is reliable departments of the students are shown in Table 4.
(Yasßar, 2013). Table 4 shows that the average point students got from cyber-
loafing activities scale is respectively 63.46 for those studying at
Management Information Systems department, 56.64 for those
Table 1
Demographic information of the students. studying at History department and 58.29 for those studying at
Turkish Language and Literature department. It is observed that
Variable Group N %
there are differences between average points obtained from cyber-
Gender Female 150 52.1 loafing activities scale based on the department variable. One-way
Male 138 47.9
(factor) ANOVA for independent measures is used in order to deter-
Total 288 100.0 mine whether this difference is statistically significant. The results
of the test are shown in Table 5.
Department Management Information Systems 114 39.6
History 80 27.8
Table 5 shows that there is a statistically significant difference
Turkish Language and Literature 94 32.6 between cyberloafing levels of the students [F(2, 285) = 5.08,
Total 288 100.0 p < .05]. In other words, cyberloafing levels of the students signifi-
cantly change based on the department of the students. According
F.G. Karaoğlan Yılmaz et al. / Computers in Human Behavior 45 (2015) 290–298 293
Table 2
Students’ scores on their cyberloafing degree.
Table 3
T-test Results of the Students Based on Their Cyberloafing Degree and Gender.
Table 4
Descriptive analysis results of the students based on their department and cyberloafing degree.
Table 5
ANOVA results of the students based on their department and cyberloafing degree.
to the results, it is identified that the difference is between the Table 7 shows that the scores obtained from the scale in the
departments of Management Information Systems ( x ¼ 63:46, sub-dimensions individual [F(4, 283) = .623, p > .05], search
S = 16.57) and History ( x ¼ 56:64, S = 15.36). When looked at [F(4, 283) = .591, p > .05] and news [F(4, 283) = .023, p > .05] do
sub-dimensions, it can be noticed that the difference observed in not significantly differ between cyberloafing levels of the students
individual sub-dimension is between Management Information based on the location to connect to the internet. In other words,
Systems and History, and between Management Information Sys- cyberloafing levels do not differ based on the locations to connect
tems and Turkish Language and Literature; the difference observed to the internet.
in news sub-dimension is between Management Information Sys- Kruskal Wallis is used in order to determine whether there is a
tems and History. However, a significant difference cannot be statistically significant difference for non-homogenous groups. The
observed in search [F(2, 285) = .31, p < .05] and social results of the test are shown in Table 8.
[F(2, 285) = 2.82, p < .05] sub-dimensions. Table 8 shows that the scores obtained from the social sub-
Within the context of second sub-problem, the descriptive val- dimension [x2(sd = 4, n = 288) = .115, p > .05] and general scale
ues of the cyberloafing degrees based on the locations to connect to [x2(sd = 4, n = 288) = .210, p > .05] do not statistically significantly
the internet are shown in Table 6. differ between cyberloafing levels of the students based on the
Table 6 shows that the average point students got from cyber- location to connect to the internet.
loafing activities scale based on the locations to connect to the Within the context of second sub-problem of the research, the
internet is respectively 60.54 at home, 50.83 at school, 59.42 in descriptive values of the cyberloafing degrees based on daily
dormitory, 59.50 in internet cafe and 59.84 on mobile devices. duration of use of internet and cyberloafing degree of university
One-way (factor) ANOVA for independent measures in homoge- students are shown in Table 9.
nous groups is used in order to determine whether this difference Table 9 shows that the average score students got from cyber-
is statistically significant. The results of the test are shown in loafing activities scale is respectively 51.43 for those using internet
Table 7. daily for less than 1 h, 60.42 for those using internet daily for
Table 6
Descriptive analysis results of the students based on their locations to connect to the internet and cyberloafing degree.
Table 7
ANOVA results of the students based on their locations to connect to the internet and cyberloafing degree.
Table 8
Kruskal Wallis test results of the students based on their cyberloafing degree and locations to connect to the internet.
Table 9
Descriptive analysis results of the students based on their daily duration of time on the internet and cyberloafing degree.
between 1 and 3 h, 62.20 for those using internet daily for between between cyberloafing levels of the students based on the daily
4 and 6 h, 67.94 for those using internet daily for between 7 and duration of use of internet. In other words, the cyberloafing levels
9 h, and 74.41 for those using internet daily for 10 h and above. of the students differ significantly based on daily duration of inter-
One-way (factor) ANOVA for independent measures in homoge- net use.
nous groups is used in order to determine whether this difference Kruskal Wallis is used in order to determine whether there is a
is statistically significant. The results of the test are shown in statistically significant difference for non-homogenous groups. The
Table 10. results of the test are shown in Table 11.
Table 10 shows that the scores obtained from the search sub- Table 11 shows that cyberloafing levels of the students signifi-
dimension [F(4, 283) = 4.258, p < .05] and general scale cantly differ in the sub-dimensions individual [x2(sd = 4,
[F(4, 283) = 10.866, p < .05] do not statistically significantly differ n = 288) = 41.685, p < .05], social [x2(sd = 4, n = 288) = 46.306,
Table 10
ANOVA results of the students based on their daily duration of time on the internet and cyberloafing degree.
Table 11
Kruskal Wallis test results of the students based on their cyberloafing degree and duration of internet use.
Subdimensions of cyberloafing scale Daily duration of time on the internet N Sum of ranks Sd x2 P Groups which are significantly different
Individual Less than 1 h 68 98.26 4 41.685 .000 Less than 1 h – Between 1 and 3 h
Between 1 and 3 h 133 146.83 Less than 1 h – Between 4 and 6 h
Between 4 and 6 h 54 160.25 Less than 1 h – Between 7 and 9 h
Between 7 and 9 h 16 187.03 Less than 1 h – 10 h and more
10 h and more 17 221.18 Between 1 and 3 h – 10 h and more
Between 4 and 6 h – 10 h and more
Levene: 3.192 p: .014
Social Less than 1 h 68 100.69 4 46.306 .000 Less than 1 h – Between 1 and 3 h
Between 1 and 3 h 133 141.18 Less than 1 h – Between 4 and 6 h
Between 4 and 6 h 54 164.52 Less than 1 h – Between 7 and 9 h
Between 1 and 3 h 16 210.78 Less than 1 h – 10 h and more
10 h and more 17 219.74 Between 1 and 3 h – Between 1 and 3 h
Between 1 and 3 h – 10 h and more
Between 4 and 6 h – Between7 and 9 h
Between 4 and 6 h – Between7 and 9 h
Levene: 2.876 p: .023
News Less than 1 h 68 124.05 4 10.381 .034 Less than 1 h – Between 1 and 3 h
Between 1 and 3 h 133 154.91 Less than 1 h – 10 h and more
Between 4 and 6 h 54 132.50 Between 4 and 6 h – 10 h and more
Between 7 and 9 h 16 148.28
10 h and more 17 179.41
Levene: 2.479 p: .044
p < .05] and news [x2(sd = 4, n = 288) = 10.381, p < .05] based on daily ‘‘10 hours and more’’ from the news sub-dimension is higher
daily duration of internet use. Mann Whitney-U test is used in than the score obtained by the students using internet daily less
order to determine in what intervals of daily duration of internet than 10 h. When the average score obtained from individual, social
use this significant difference exist. It is observed that scores and news sub-dimensions of the scale was analysed based on the
obtained from the individual sub-dimension of the scale differ daily duration of internet use, it can be seen that the students
between the students using internet daily for ‘‘less than 1 hour’’ who use internet daily 10 h and more get the highest average
and the students using internet daily for ‘‘1–3 hours’’, ‘‘4–6 hours’’, score, whereas the students who use internet daily less than 1 h
‘‘7–9 hours’’ and ‘‘10 hours and more’’. The score got by the stu- get the lowest average score.
dents using internet daily ‘‘less than 1 hour’’ from the individual
sub-dimension is lower than the score obtained by the students
using internet daily more than 1 h. It is observed that scores 4. Conclusion and discussion
obtained from the individual sub-dimension of the scale differ
between the students using internet daily for ‘‘10 hours and more’’ When looked at the findings of this research which aim to
and the students using internet daily for ‘‘1–3 hours’’ and ‘‘4– determine cyberloafing behaviors of university students in com-
6 hours’’. The score got by the students using internet daily puter labs, it can be said that level of cyberloafing situations of
‘‘10 hours and more’’ from the individual sub-dimension is higher the students were generally at medium-level.
than the score obtained by the students using internet daily less It is observed that cyberloafing level of the students signifi-
than 10 h. It is observed that scores obtained from the social sub- cantly differ with regard to the scale generally based on gender
dimension of the scale differ between the students using internet variable. With respect to this finding, cyberloafing levels of male
daily for ‘‘less than 1 hour’’ and the students using internet daily students are higher than those of female students. This finding of
for ‘‘1–3 hours’’, ‘‘4–6 hours’’, ‘‘7–9 hours’’ and ‘‘10 hours and the research is in line with the results in the literature (Askew,
more’’. The score got by the students using internet daily ‘‘less than 2012; De Lara, 2007). In his research, Selwyn (2008) reports that
1 hour’’ from the sub-dimension social is lower than the score female students use internet for academic purposes at a higher
obtained by the students using internet daily more than 1 h. It is level than male students. However, it is noticed that there is no sig-
observed that scores obtained from the social sub-dimension of nificant difference in the levels of cyberloafing behavior of socializ-
the scale differ between the students using internet daily for ‘‘1– ing between male and female students. Similarly, Blanchard and
3 hours’’ and the students using internet daily for ‘‘7–9 hours’’ Henle (2008) separate cyberloafing behaviors as serious and insig-
and ‘‘10 hours and more’’. Similarly, it is observed that scores nificant and show that male demonstrates serious cyberloafing
obtained from the social sub-dimension of the scale differ between behaviors more than female and there is not a significant differ-
the students using internet daily for ‘‘4–6 hours’’ and the students ence in insignificant cyberloafing behaviors.
using internet daily for ‘‘7–9 hours’’ and ‘‘10 hours and more’’. It is It is observed that there are differences between the average
observed that scores obtained from the news sub-dimension of the scores got from cyberloafing activities scale based on department
scale differ between the students using internet daily for ‘‘less than variable of the students. According to the analysis results, it is
1 hour’’ and the students using internet daily for ‘‘1–3 hours’’ and determined that the difference is between Management Informa-
‘‘10 hours and more’’. The score got by the students using internet tion Systems and History departments. With regard to this finding,
daily ‘‘less than 1 hour’’ from the news sub-dimension is lower students in Management Information Systems department who
than the score obtained by the students using internet daily more took weekly 4 h course in the computer lab cyberloafed more com-
than 1 h. It is observed that scores obtained from the news sub- pared to the students in History department who took 2 h weekly
dimension of the scale differ between the students using internet course in the computer lab. With regard to this finding, it is possi-
daily for ‘‘4–6 hours’’ and the students using internet daily for ble to comment that increase in course hours in the computer lab
‘‘10 hours and more’’. The score got by the students using internet leads to the increase in the observation rate of cyberloafing behav-
F.G. Karaoğlan Yılmaz et al. / Computers in Human Behavior 45 (2015) 290–298 297
iors. However it is important to note that at the first sight even if fing behaviors such as hacking and spreading virus (Askew,
decreasing course hours in computer labs could be seen as a solu- 2012; Blanchard & Henle, 2008) could be examined. Also, number
tion to prevent cyberloafing behaviors, research has shown that of the participants could be increased as well as different depart-
students cyberloaf through widespread use of wireless networks ments could be included in a future study to generalize the find-
(Brubaker, 2006), smart boards, computer and mobile devices in ings of this research or reveal out the differences with this
all classrooms at a school. For this reason, it is important to train research to give insights of contextual differences in emergence
the students as well as the teachers and families on ethical use of cyberloafing behaviors. Finally, further psychological factors as
of technology and raise awareness on this issue in order to prevent antecedents of cyberloafing such as addiction could be researched.
cyberloafing behaviors.
It is observed that the scores obtained from the scale in individ-
References
ual, search and news sub-dimensions depending on the location to
connect to the internet in daily life do not significantly differ Askew, K. L. (2012). The relationship between cyberloafing and task performance and
between cyberloafing levels of the students. This finding shows an examination of the theory of planned behavior as a model of cyberloafing.
that the location and time of using internet at home, in school or Graduate Theses and Dissertations, University of South Florida.
_
Balcı, A. (2010). Sosyal Bilimlerde Arasßtırma: Yöntem, Teknik ve Ilkeler [Research in
via mobile devices do not create a significant difference on cyber- Social Sciences: Methods, Techniques and Principles]. Ankara: Pegem Akademi.
loafing behaviors. One of the reasons of this finding could be due to Barkham, P., & Moss, S. (2012). Should mobile phones be banned in schools? The
the characteristics of the students as digital natives. According to Guardian (27.11.12).
Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing:
Prensky (2001: 1), as digital natives, the students have ‘‘spent their The role of norms and external locus control. Computers in Human Behavior,
entire lives surrounded by and using computers, videogames, dig- 24(3), 1067–1084.
ital music players, video cams, cell phones, and all the other toys Brubaker, A. T. (2006). Faculty perceptions of the impact of student laptop use in a
wireless internet environment on the classroom learning environment and teaching
and tools of the digital age’’. Therefore, it is expected that regard- information and library science. Unpublished Master Thesis, University of North
less of where to connect to the internet, the students are capable Carolina, Chapel Hill.
of accessing to the internet at home, in school or so on, as a result, Chou, C., & Hsiao, M. C. (2000). Internet addiction usage, gratification, and pleasure
experience: The Taiwan college students case. Computers & Education, 35(1),
they can cyberloaf wherever they are unless they have wireless or
65–80.
similar network. De Lara, P. Z. M. (2007). Relationship between organizational justice and
A further finding concerns the level of cyberloafing behavior of cyberloafing in the workplace: Has ‘Anomia’ a say in the matter?
the students which changes significantly depending on daily dura- CyberPsychology & Behavior, 10(3), 464–470.
Ergün, E., & Altun, A. (2012). Öğrenci Gözüyle Siberaylaklık Nedenleri [The Student’s
tion of internet use. When compared the level of cyberloafing with Perspective of Cyberloafing and Its Causes]. Eğitim Teknolojisi Kuram ve
regard to duration of internet use, it is concluded that increase in Uygulama, 2(2), 36–51.
duration of internet use leads to increase in cyberloafing behaviors. Everton, W. J., Mastrangelo, P. M., & Jolton, J. A. (2005). Personality correlates of
employees’ personal use of work computers. CyberPsychology & Behavior, 8(2),
A possible reason for this finding could be that as the time spent on 143–153.
the internet increases, the productivity of the individuals is likely Foster, J. S., & Havemann, S. A. (2008). The basics of educational podcasting: Enhancing
to decrease. Research has shown that as individuals spend time the student learning experience. University of Florida, IFAS-EDIS Publication
MB004.
on the internet, they tend to socialize and play games while reduc- Fraenkel, J. R., & Wallen, N. E. (2006). How to design and evaluate research in
ing the academic productivity (Chou & Hsiao, 2000). Relationship education (6th ed.). New York, NY: McGraw-Hill.
between duration of time on the internet and cyberloafing is Garrett, R. K., & Danziger, N. J. (2008). On cyberslacking: Workplace status and
personal internet use at work. Cyberpsychology & Behavior, 11(3),
important since researchers point out that it is harmful when 287–292.
cyberloafing is done in excess and ‘‘frequent long durations of Kalaycı, E. (2010). Üniversite Öğrencilerinin Siberaylaklık Davranısßları ile Öz
cyberloafing should negatively predict task performance’’ (Askew, Düzenleme Stratejileri Arasındaki Ilis _ ßkinin Incelenmesi
_ [The Investigation of
Relationship between Cyberloafing and Self-regulated Learning Strategies among
2012: 21; Blanchard & Henle, 2008). Long durations of cyberloafing
Undergraduate Students]. Unpublished Master Dissertation, Hacettepe
behaviors lead us to question whether ‘‘addiction’’ could be an Üniversity, Ankara.
antecedent of cyberloafing. This needs a further investigation. Karaoğlan Yılmaz, F. G. (2014). E-Öğrenme Ortamlarında Yansıtıcı Düsßünme
Students from the faculties other than faculty of education are Etkinliklerinin Öğrencilerin Akademik Basßarısına, Sosyal Buradalığına Ve
Güdülenmesine Etkisi [The Effect of Reflective Thinking Activities in E-Learning
dealt with within the scope of the study. When compared both stu- Environments on Academic Success, Social Presence and Motivation]. Unpublished
dent groups regarding the results of the studies, level of cyberloa- PhD Thesis, Ankara University, Ankara.
_
Kurt, M. (2011). Siber Aylaklık Davranısßlarının Karsßılasßtırmalı Olarak Incelenmesi
fing is at medium-level and close to each other. Especially, within
[Contrastive Study of Cyberloafing Behaviors]. In 5th International computer &
the scope of the nation-wide projects being implemented by the instructional technologies symposium, 22–24 September 2011, Fırat University,
educational institutes worldwide, the classrooms in the schools Elazığ- Turkey.
and in the higher education institutes are equipped with wireless Lepp, A., Li, J., Barkley, J. E., & Salehi-Esfahani, S. (2015). Exploring the relationships
between college students’ cell phone use, personality and leisure. Computers in
internet, smart boards and tablet computers. This has the potential Human Behavior, 43, 210–219.
to bring about the problem of cyberloafing especially for the stu- Lim, V. K. G., & Chen, D. J. Q. (2012). Cyberloafing at the workplace: Gain or drain on
dents with low self-control skills and as a result undesirable work? Behaviour & Information Technology, 31(4), 343–353.
Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric theory (3rd ed.). New York:
behaviors may appear during learning process while trying to con- McGraw-Hill.
tribute to learning process with the technological support. As dis- Pollara, P., & Zhu, J. (2011). Social networking and education: Using Facebook as an
cussed earlier, as a solution, the head teachers and teachers tend to Edusocial Space. In Proceedings of society for information technology & teacher
education international conference 2011 (pp. 3330–3338). Chesapeake, VA: AACE.
ban students from bringing ICT in the classrooms. This is a serious
Prensky, M. (2001). Digital natives, digital immigrants. On the Horizon, 9(5).
barrier to ICT integration. Instead of banning, attention of the stu- Roblyera, M. D., McDanielb, M., Webbc, M., Hermand, J., & Wittye, J. V. (2010).
dents, who are distracted due to cyberloafing, could be drawn via Findings on Facebook in higher education: A comparison of college faculty and
teaching and learning methods. Also, they could be given learning student uses and perceptions of social networking sites. The Internet and Higher
Education, 13(3), 134–140.
tasks (e.g. searching for information with regard to a given prob- Selwyn, N. (2008). An investigation of differences in undergraduates’ academic use
lem by the teacher) which they can fulfil via ICT so as to direct of the internet. Active Learning in Higher Education, 9, 11–22.
them to meaningful engagement in the course. Ugrin, J. C., & Pearson, J. M. (2013). The effects of sanctions and stigmas on
cyberloafing. Computers in Human Behavior, 29(3), 812–820.
In the present study, as a limitation, only certain subdimensions Ugrin, J. C., Pearson, J. M., & Odom, M. D. (2008). Cyber-slacking: Self-control, prior
of cyberloafing behaviors on the cyberloafing activities scale were behavior and the impact of deterrence measures. Review of Business Information
taken into account but in future studies, some extreme cyberloa- Systems, 12(1), 75–88.
298 F.G. Karaoğlan Yılmaz et al. / Computers in Human Behavior 45 (2015) 290–298
Whitty, M. T., & Carr, A. N. (2006). New rules in the workplace: Applying object- Locus of Control and Attitudes towards Computer Laboratory on Their Cyberloafing
relations theory to explain problem internet and email behavior in the Behavior]. Yüksek Lisans Tezi, Hacettepe Üniversity, Ankara.
workplace. Computers in Human Behavior, 22, 235–250. Zhang, X., Ordóñez de Pablos, P., & Xu, Q. (2014). Culture effects on the knowledge
Yasßar, S. (2013). Üniversite Öğrencilerinin Denetim Odağı ve Bilgisayar Laboratuvarına sharing in multi-national virtual classes: A mixed method. Computers in Human
Yönelik Tutumlarının Siberaylaklık Davranısßlarına Etkisi [The Effects of Students Behavior, 31, 491–498.