Date of Conferral
Doctor of Information Technology (D.I.T.)
Information Systems and Technology
Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using thematic analysis. The major themes were using tools, policy, and procedures to monitor cyberloafing and using tools, trust, and policies as strategies to deter cyberloafing. One recommendation for practitioners is to incorporate hardware and software tools to monitor and deter cyberloafing early when hiring employees for a small business. The implications for positive social change include the potential to foster greater economic stability in the community while promoting a healthy working environment.
Dooly, Veronica Pugh, "Strategies to Monitor and Deter Cyberloafing in Small Businesses: A Case Study" (2021). Walden Dissertations and Doctoral Studies. 10789.