SlideShare a Scribd company logo
HUMAN RESOURCES
ON
CYBER LOAFING
Presented By,
MBA (IB)
SUNNY KUMAR(15382061)
Instructor,
Dr. P.G ARUL (Assistant Professor)
Department of International Business
WHAT IS CYBER LOAFING?
 Cyber loafing is anytime you're on the web at work doing non-work-
related activities. The study finds that 60 to 80 percent of the time
workers spend on the Internet on the job is spent doing things that
have nothing to do with work.'
 it In today’s world, cyberloafing is becoming more and more of a problem.
  it is the “norm” for 21st Century employees.
  Cyberloafing, also known as cyberslacking, consists of using the company internet for 
personal tasks such as chatting, email, shopping, etc.
 Goldbricking also known in computer-related tasks as cyber slacking or cyber
loafing, generally refers to an employee doing less work than they theoretically 
 . Cyberloafing is No.1 reported way employees waste time, according to a
survey of 10,000 employees, and 44.7% cited cyberloafing as their No.1
distraction at work…
 A modern example is staff who use their work internet access for personal
reasons while maintaining the appearance of working, which can lead to
inefficiency.
 According to study by Kansas State University;between 60 and 80% of
people cyberloaf…
 cyberloafing costs U.S. employers $1 billion per year in computer
resources,
FACTORS AFFECTING CYBER LOAFING
 An internet presence in the workplace is the main facilitator,
 Dissatisfaction with one’s job, to a lack of sleep can lead to an
increase in cyber loafing behaviours.
 As demands on workers increase, most cyber loafing occurs in an
attempt to regulate the work-life balance.
 THE MOST COMMON FORMS OF CYBER
LOAFING ARE
 Checking personal email,
 Social media,
 Playing games,
 Watching videos, 
 Online shopping,
 Managing finances,
 Find new job … 
SOLUTIONS OF CYBER LOFING..
 Many firms employ surveillance software to track employees' Internet activity in an
effort to limit liability and improve productivity.
 Other methods used to reduce goldbricking include installation of proxy servers to
prevent programs from accessing resources like Facebook, Messenger, yahoochat or
some online gambling services,
 Monitoring
THERE ARE VARIOUS TECHNIQUES THAT CAN BE
USED TO HELP PREVENT CYBER LOAFING FROM
HAPPENING IN YOUR ORGANIZATION.
 It is important to remember that it is not enough to simply have a
policy in place because it must also be enforced.
 Second, depending on how ethical your employees are, their
likelihood of engaging in cyber loafing will vary. If the company
treats its employees well and makes decisions ethically, there is a
greater chance that the employees will notice this and will not
want to do anything to harm the organization.
 Besides these methods, it is also possible to allot a specific amount
of time for employees to use the Internet however they choose. This
way, they can take a break and come back to their work with a
clear head.
REAL LIFE EXAMPLE
 Goldbricking became a mainstream topic when Yahoo! announced in late February of
2013 that it was banning the practice of telecommuting  because it discovered its
remote employees were not logging into the corporate VPN often enough.
Cyber loofing

More Related Content

What's hot

CORRUPTION IN PUBLIC LIFE.pptx
CORRUPTION IN PUBLIC LIFE.pptxCORRUPTION IN PUBLIC LIFE.pptx
CORRUPTION IN PUBLIC LIFE.pptx
Garimakaushik34
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
AlankarSharma13
 
research on rape in india
research on rape in indiaresearch on rape in india
research on rape in indialoveuhs
 
Impacts of corruption n definition
Impacts of corruption n definitionImpacts of corruption n definition
Impacts of corruption n definition
salsa moyara
 
Corruption In India
Corruption In IndiaCorruption In India
Corruption In India
Akshay Bharwani
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
Pratham Jaiswal
 
HMSI HR Failure
HMSI HR FailureHMSI HR Failure
HMSI HR Failure
Manas Tripathy
 
E mail fraud
E mail fraudE mail fraud
E mail fraud
slire
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
Amit Pal Singh
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Aayushi Singh
 
Data Analytics on Healthcare Fraud
Data Analytics on Healthcare FraudData Analytics on Healthcare Fraud
Data Analytics on Healthcare FraudNicholas Szeto
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
Avanzo net
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
JoelGautham
 
Facebook data breach
Facebook data breachFacebook data breach
Facebook data breach
Green Gyaanam
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
kscheidy
 
Project on welfare faculty provided to employees by bank of india
Project on welfare faculty provided to employees by bank of indiaProject on welfare faculty provided to employees by bank of india
Project on welfare faculty provided to employees by bank of india
Projects Kart
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Quirky Kid
 

What's hot (20)

CORRUPTION IN PUBLIC LIFE.pptx
CORRUPTION IN PUBLIC LIFE.pptxCORRUPTION IN PUBLIC LIFE.pptx
CORRUPTION IN PUBLIC LIFE.pptx
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
 
research on rape in india
research on rape in indiaresearch on rape in india
research on rape in india
 
Impacts of corruption n definition
Impacts of corruption n definitionImpacts of corruption n definition
Impacts of corruption n definition
 
Corruption In India
Corruption In IndiaCorruption In India
Corruption In India
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
HMSI HR Failure
HMSI HR FailureHMSI HR Failure
HMSI HR Failure
 
E mail fraud
E mail fraudE mail fraud
E mail fraud
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Financial scam
Financial scamFinancial scam
Financial scam
 
Data Analytics on Healthcare Fraud
Data Analytics on Healthcare FraudData Analytics on Healthcare Fraud
Data Analytics on Healthcare Fraud
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Facebook data breach
Facebook data breachFacebook data breach
Facebook data breach
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
Project on welfare faculty provided to employees by bank of india
Project on welfare faculty provided to employees by bank of indiaProject on welfare faculty provided to employees by bank of india
Project on welfare faculty provided to employees by bank of india
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Whistleblowing
WhistleblowingWhistleblowing
Whistleblowing
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 

Similar to Cyber loofing

Cyberslacking
CyberslackingCyberslacking
Cyberslacking
Trevor Dierdorff
 
see attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docxsee attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docx
bagotjesusa
 
Social Networking in the Business World: A Strategic Approach
Social Networking in the Business World: A Strategic ApproachSocial Networking in the Business World: A Strategic Approach
Social Networking in the Business World: A Strategic Approachlinkedinlion11
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET Journal
 
Social networking as_a_business_tool_0930_final
Social networking as_a_business_tool_0930_finalSocial networking as_a_business_tool_0930_final
Social networking as_a_business_tool_0930_final
Praneta Pardikar
 
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaper
James Tanner
 
Three tools to reduce employee apathy
Three tools to reduce employee apathyThree tools to reduce employee apathy
Three tools to reduce employee apathy
Stephen P. Abbey
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
Trefor Smith
 
Making sense of your Digital Workplace
Making sense of your Digital WorkplaceMaking sense of your Digital Workplace
Making sense of your Digital Workplace
Sam Marshall
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
ssuserf9c51d
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
mattinsonjanel
 
the rise of telecommuting and what it means for your business
the rise of telecommuting and what it means for your businessthe rise of telecommuting and what it means for your business
the rise of telecommuting and what it means for your businesswilliamsjohnseoexperts
 
Ethics and it professional practises (assignment 2)
Ethics and it professional practises (assignment 2)Ethics and it professional practises (assignment 2)
Ethics and it professional practises (assignment 2)Farah Azudin
 
Excellency In Remote Work
Excellency  In Remote WorkExcellency  In Remote Work
Excellency In Remote Work
AMRBunge
 
2014 Guide to Backroom-to-Boardroom Payroll and HR
2014 Guide to Backroom-to-Boardroom Payroll and HR2014 Guide to Backroom-to-Boardroom Payroll and HR
2014 Guide to Backroom-to-Boardroom Payroll and HR
Paylocity
 
Technology In Canada
Technology In CanadaTechnology In Canada
Technology In Canada
Karen Gilchrist
 
Goldbricking
GoldbrickingGoldbricking
Goldbricking
GAURAV. H .TANDON
 

Similar to Cyber loofing (20)

Cyberslacking
CyberslackingCyberslacking
Cyberslacking
 
see attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docxsee attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docx
 
Social Networking in the Business World: A Strategic Approach
Social Networking in the Business World: A Strategic ApproachSocial Networking in the Business World: A Strategic Approach
Social Networking in the Business World: A Strategic Approach
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
 
8. eBook #8 time theft
8. eBook #8 time theft8. eBook #8 time theft
8. eBook #8 time theft
 
UK_DE_Survey White Paper
UK_DE_Survey White PaperUK_DE_Survey White Paper
UK_DE_Survey White Paper
 
Social networking as_a_business_tool_0930_final
Social networking as_a_business_tool_0930_finalSocial networking as_a_business_tool_0930_final
Social networking as_a_business_tool_0930_final
 
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaper
 
Three tools to reduce employee apathy
Three tools to reduce employee apathyThree tools to reduce employee apathy
Three tools to reduce employee apathy
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
 
Making sense of your Digital Workplace
Making sense of your Digital WorkplaceMaking sense of your Digital Workplace
Making sense of your Digital Workplace
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
 
the rise of telecommuting and what it means for your business
the rise of telecommuting and what it means for your businessthe rise of telecommuting and what it means for your business
the rise of telecommuting and what it means for your business
 
Ethics and it professional practises (assignment 2)
Ethics and it professional practises (assignment 2)Ethics and it professional practises (assignment 2)
Ethics and it professional practises (assignment 2)
 
Excellency In Remote Work
Excellency  In Remote WorkExcellency  In Remote Work
Excellency In Remote Work
 
2014 Guide to Backroom-to-Boardroom Payroll and HR
2014 Guide to Backroom-to-Boardroom Payroll and HR2014 Guide to Backroom-to-Boardroom Payroll and HR
2014 Guide to Backroom-to-Boardroom Payroll and HR
 
Technology In Canada
Technology In CanadaTechnology In Canada
Technology In Canada
 
Goldbricking
GoldbrickingGoldbricking
Goldbricking
 

Recently uploaded

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

Cyber loofing

  • 1. HUMAN RESOURCES ON CYBER LOAFING Presented By, MBA (IB) SUNNY KUMAR(15382061) Instructor, Dr. P.G ARUL (Assistant Professor) Department of International Business
  • 2. WHAT IS CYBER LOAFING?  Cyber loafing is anytime you're on the web at work doing non-work- related activities. The study finds that 60 to 80 percent of the time workers spend on the Internet on the job is spent doing things that have nothing to do with work.'
  • 4.  . Cyberloafing is No.1 reported way employees waste time, according to a survey of 10,000 employees, and 44.7% cited cyberloafing as their No.1 distraction at work…  A modern example is staff who use their work internet access for personal reasons while maintaining the appearance of working, which can lead to inefficiency.  According to study by Kansas State University;between 60 and 80% of people cyberloaf…  cyberloafing costs U.S. employers $1 billion per year in computer resources,
  • 5. FACTORS AFFECTING CYBER LOAFING  An internet presence in the workplace is the main facilitator,  Dissatisfaction with one’s job, to a lack of sleep can lead to an increase in cyber loafing behaviours.  As demands on workers increase, most cyber loafing occurs in an attempt to regulate the work-life balance.
  • 6.  THE MOST COMMON FORMS OF CYBER LOAFING ARE  Checking personal email,  Social media,  Playing games,  Watching videos,   Online shopping,  Managing finances,  Find new job … 
  • 7. SOLUTIONS OF CYBER LOFING..  Many firms employ surveillance software to track employees' Internet activity in an effort to limit liability and improve productivity.  Other methods used to reduce goldbricking include installation of proxy servers to prevent programs from accessing resources like Facebook, Messenger, yahoochat or some online gambling services,  Monitoring
  • 8. THERE ARE VARIOUS TECHNIQUES THAT CAN BE USED TO HELP PREVENT CYBER LOAFING FROM HAPPENING IN YOUR ORGANIZATION.  It is important to remember that it is not enough to simply have a policy in place because it must also be enforced.  Second, depending on how ethical your employees are, their likelihood of engaging in cyber loafing will vary. If the company treats its employees well and makes decisions ethically, there is a greater chance that the employees will notice this and will not want to do anything to harm the organization.  Besides these methods, it is also possible to allot a specific amount of time for employees to use the Internet however they choose. This way, they can take a break and come back to their work with a clear head.
  • 9. REAL LIFE EXAMPLE  Goldbricking became a mainstream topic when Yahoo! announced in late February of 2013 that it was banning the practice of telecommuting  because it discovered its remote employees were not logging into the corporate VPN often enough.