Sunteți pe pagina 1din 6

Management Decision

Internet and employee productivity


H. Joseph Wen, Binshan Lin,
Article information:
To cite this document:
H. Joseph Wen, Binshan Lin, (1998) "Internet and employee productivity", Management Decision, Vol. 36 Issue: 6,
pp.395-398, https://doi.org/10.1108/00251749810223628
Permanent link to this document:
https://doi.org/10.1108/00251749810223628
Downloaded on: 27 February 2019, At: 05:59 (PT)
References: this document contains references to 13 other documents.
To copy this document: permissions@emeraldinsight.com
The fulltext of this document has been downloaded 3042 times since 2006*
Users who downloaded this article also downloaded:
(2006),"Optimizing fixed and variable compensation costs for employee productivity", International Journal of Productivity
Downloaded by Universiti Teknologi MARA At 05:59 27 February 2019 (PT)

and Performance Management, Vol. 55 Iss 2 pp. 155-162 <a href="https://doi.org/10.1108/17410400610641726">https://


doi.org/10.1108/17410400610641726</a>
(1995),"Impact of employee benefits on work motivation and productivity", International Journal of Career Management, Vol.
7 Iss 6 pp. 10-14 <a href="https://doi.org/10.1108/09556219510098064">https://doi.org/10.1108/09556219510098064</a>

Access to this document was granted through an Emerald subscription provided by emerald-srm:434496 []
For Authors
If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service
information about how to choose which publication to write for and submission guidelines are available for all. Please
visit www.emeraldinsight.com/authors for more information.
About Emerald www.emeraldinsight.com
Emerald is a global publisher linking research and practice to the benefit of society. The company manages a portfolio of
more than 290 journals and over 2,350 books and book series volumes, as well as providing an extensive range of online
products and additional customer resources and services.
Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the Committee on Publication
Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive preservation.

*Related content and download information correct at time of download.


Internet and employee productivity

H. Joseph Wen
School of Management, New Jersey Institute of Technology, Newark, USA
Binshan Lin
Management and Marketing, Louisiana State University, Shreveport, Louisiana,
USA

With the explosion of interest purposes is undermining their employees’


in the Internet, deploying Introduction productivity (Roman, 1996).
desktop Internet access for The Internet is probably the most important Corporations need to explore the different
corporations is becoming global information resource of this century, avenues of offering the Internet to their
common place. Corporate marking as it does the convergence of our two employees. Meanwhile, many productivity
managers are dealing with most critical business tools: the telephone and issues arise when personal interests take over
issues of blocking objection- the computer. Basic equipment for the average while on company time. For instance, an Inter-
Downloaded by Universiti Teknologi MARA At 05:59 27 February 2019 (PT)

able material and limiting the professional employee are now a phone, a net access report revealed that on company
viewing of leisure sites that time the Disney Web page was encountered for
computer and an IP address. Widespread desk-
can impede employee produc- three consecutive hours. The company lost
top Internet access for employees, however,
tivity. The concerns are two- three hours of wages paid to this employee for
brings new challenges to management. Some
fold: (1) Corporations need to personal reasons (Wiesendanger, 1993). Many
of the most critical issues include: employee
block and monitor any ele- Internet accesses are given to management to
productivity; potential liability under sexual
ments deemed unfit for use, as the person deems fit; however, certain
harassment laws; and corporate/personal
employees on the Internet, policies and monitoring devices need to be in
which can include references time (Bhimani, 1996; Conorich, 1996; Yankus,
place before embarking on providing Internet
to issues such as sex, vio- 1996).
access to desktops. Another example of Inter-
lence, nudity, racism and As companies come to rely on the Internet as
net access is a positive one. A senior manager
pornography, just to mention an informational tool for acquiring an incredi- was able to complete a very detailed market
a few; (2) Curb the amount of ble source of information, sharing a wealth of study analysis using the resources on the
time employees spend on the resources and ideas, communicating with Internet to provide upper management with a
Web surfing sports and per- people in remote corners of the globe and huge very definite direction to follow based on the
sonal leisure sites when they amounts of readily accessible reference mate- results of the study, which if it was accom-
should be working. Useful rials, there is a dilemma with delivering this plished using a traditional approach may have
guidelines do exist for man- type of information technology – the drain on taken days, whereas this particular task
agers looking to evaluate employee productivity, which may translate involved only a few hours. There is a great deal
employee productivity in the into thousands of dollars lost each year. Not of benefit in delivering the Internet to the
Internet-based world. It many corporations have yet to see the tremen- employees’ desktops, there just needs to be a
largely consists of taking a dous impact of providing this technology to plan, and a way of controlling the productivity.
systematic approach to the employees at the desktop in a network envi- This is not the first time productivity has
exploration of broad-gauged ronment and very little research is currently come into play with regards to new technology
questions about Internet available on this topic. (Notes, 1996; Pitkow and Kehoe, 1996). The
access issues, blocking and This paper addresses the impact of Internet introduction to the telephone – for one, had
monitoring, and the nature of access on employee productivity. Useful guide- many dilemmas with regards to productivity
your corporate culture or lines do exist for managers looking to evaluate and still today is a productivity issue. Monitor-
policies. employee productivity in the Internet-based ing the time spent on phone calls for an
world. It largely consists of taking a system- employee is common practice today to ensure
atic approach to the exploration of broad- there is no abuse. Corporations can tell from a
gauged questions about Internet access issues, detailed bill what extensions their employees
blocking and monitoring, and the nature of are dialing and the amount of time spent on
your corporate culture or policies. each call. As the owner of the technology
equipment, the corporation has a right to
know how it is being used and in what capac-
Some critical issues ity. The same holds true for the introduction of
the computer to the desktop (Thach and Wood-
Bringing the Internet to employees’ desks has man, 1996). Many concerns were directed to
many advantages for marketing, research, the area that employees will play the games
communication and simple convenience. How- that come with Windows, thereby reducing
Management Decision ever, a recent survey developed by Robert Half their productivity. In many places today games
36/6 [1998] 395–398 International Inc. showed that 55 percent of are still a means of wasting time for some
© MCB University Press 150 executives polled said that time spent employees. This level of technology is minimal
[ISSN 0025-1747] accessing the Internet for non-business compared to the amount of time that can be
[ 395 ]
H. Joseph Wen and wasted on the Internet. Browsing and surfing formats and distribution methods while dic-
Binshan Lin can burn a lot of time! tating neither a labeling vocabulary nor who
Internet and employee Concern that employees are using the Inter- should pay attention to which label (Resnick
productivity net for activities other than their jobs has led and Miller, 1996). An illustration of Internet
Management Decision some companies to monitor what their PICS blocking tools is shown in Figure 1.
36/6 [1998] 395–398 In addition to the term blocking, we need to
employees are doing on the Internet, much as
they would review phone records for unautho- refine the type of blocking needed for the cor-
rized calls. Though monitoring workers is porate environment – flexible blocking (Quin-
hardly a new phenomenon, the practice of lan, 1996). Not everyone needs to block recep-
monitoring Internet use, if it catches hold, is tion of the same material. Employers may
sure to fan the debate over employees’ rights to need to block and restrict sites that are sexual
privacy. Eavesdropping on employee telephone or violence related as well as prevent employ-
conversations has been common practice in ees from visiting recreational sites during
some industries for many years, particularly normal work hours. The blockers that have
in customer service jobs. Office computer been out for some time primarily keep chil-
networks make it possible to peer at employ- dren from accessing objectionable material
ees’ PC screens without leaving their desks. but allow recreational material to be accessed.
Downloaded by Universiti Teknologi MARA At 05:59 27 February 2019 (PT)

It is the fear of the impact on employee pro- Corporations need to control this recreational
ductivity that has led many corporations to material as much as objectionable material in
use software monitors/blockers to help screen order to keep employees focussed on their jobs
the sites a particular user can or cannot view. and not on personal issues.
Lockheed uses an Internet blocker program to Internet monitoring, on the other hand,
restrict access to Internet sources that could provides the employer with the ability to track
“create a legal liability” for the company – an employee’s Internet movements and report
including not only sexually explicit material, on them. This gives the employee access to
but gambling sites and areas that transmit surf and browse at will and through reports,
hate mail. There is also an issue of legal liabil- active daily monitoring and on-line notifica-
ity should sexually explicit material be left on tion, administrators report on activity. Some
a computer where it might be found by some- in the industry feel monitoring is the direction
one who would consider it offensive or hostile. to follow since blockers always need to be
Although no one can cite an instance in which updated to be effective. However, one can
a company has been sued for sexual harass- argue that monitoring takes more time to
ment because of material that came into an analyze the data.
office through an Internet connection there is There is a tremendous need for an advanced
a general worry that this could happen. set of monitoring/blocking tools to solve cor-
If a corporation’s vision is to place resources porate Internet productivity issues. We have
at the employee’s desktop and maintain a developed a list of what we believe are the
productive working environment, Internet minimal functional requirements for a good
blocking/monitoring software and corporate monitoring/blocking tool:
Internet policies need to be in place for the 1 Allow employers to prevent Web surfing that
successful implementation of this technology. is not directly related to business. It protects
a corporation from legal exposure, espe-
cially in relation to downloading of porno-
Internet blockers and monitors graphic or racist material, and from
unwanted content. Its primary aim is to
Internet blockers give the corporation the enhance productivity by stopping employ-
ability to limit their employees access to objec- ees from wasting time on visiting unautho-
tionable material on the Internet. Employers rized sites.
can choose blockers to alert them when access 2 Give the network administrators complete
is attempted to areas, which are deemed unac- control of which Internet services users can
ceptable to the corporation. As more and more access and when. It works at the operating
desktops are becoming equipped with Internet system level and can issue a violation
access, the more these blockers will be com- notice to the user, outlining why access has
mon place (McCloy, 1995). been denied and referencing the company’s
In the TV industry, to block inappropriate acceptable use policies, which will be dis-
materials, users install a V-chip, which blocks cussed at a later point in this paper. Reports
reception based on labels embedded in the can be used just like telephone bills,
broadcast stream. On the Internet, we can do employers can evaluate length of time and
better, with richer labels that reflect diverse location on the Internet.
viewpoints and more selection criteria. The 3 Monitor the most popular sites and generate
Platform for Internet Content Selection (PICS) detailed reports on what sites are being
establishes Internet conventions for label accessed, the number of times, what time of
[ 396 ]
H. Joseph Wen and Figure 1
Binshan Lin Internet content selection blocking tools
Internet and employee
productivity
Management Decision
36/6 [1998] 395–398

Label A Label A
Label C INTERNET Label B

Reject Accept
Accept Accept
Downloaded by Universiti Teknologi MARA At 05:59 27 February 2019 (PT)

Web Server with Blocking Software


Ethernet

day and who are the frequent users. This The following guidelines can provide the basis
useful information can be used to generate from which corporations can develop their
usage reports for an individual on the net- own Internet policies so the desktop Internet
work and analyze network performance as experience can be most effective and satisfy-
well as measure productivity from the site ing:
related to a particular employee’s job. • Determine what are acceptable amounts of
4 Allow the employer to shape the Internet to time to be spent on-line. Employees need to be
the needs of the corporation. It will allow aware of what is an acceptable amount of
access to work-related on-line resources, and time to be on the Internet without interfer-
block those that are better left for off-hours. It ing with normal work activity. If the search-
allows administrators to set a “master ing is not productive the employee must stop
block list” – a listing of researched Internet and move on to other alternatives to acquire
sites containing material, which might be the information.
• Determine what amount of that time can be
found questionable. However, non-business
personal time, if any. Employees will need to
related sites could be made accessible after
know if they are to have personal time on the
normal working hours.
Internet, reminding them that personal time
Even with Internet monitoring and blocking, means still being logged in at the company’s
corporations will need to establish sound identification and liability.
Internet policies and guidelines for the deliv- • Determine what material should and should
ery of a successful Internet access. not be accessed. Education is key. Employees
need to know what is acceptable and not
acceptable material on the Internet. This
Developing corporate Internet sounds easy enough but you would be sur-
policies prised at how one person’s acceptable sub-
ject matter varies greatly from another’s.
Employees must know what they should or • Determine guidelines for downloading from
should not be doing. Establishing good Inter- the Internet. In an effort to maintain a clean
net use policies will allow the corporation to network environment, employees must be
successfully control the deployment of the educated on downloading from reliable
Internet to the desktop. To set guidelines in sources, and the impact of possibly infecting
advance, gives the corporation an edge on the network with a virus.
employee productivity issues and what is • State what should be done when objectionable
considered acceptable and what is not accept- material has been accessed or discovered.
able in their environment (Cohen, 1996; Kall- This is a very important topic to the guide-
man, 1993). lines and policies. Since the corporation is
[ 397 ]
H. Joseph Wen and liable for any type of sexually explicit mater- Internet monitors and blockers must demand
Binshan Lin ial (or any other objectionable material), it a product that performs both – gives the
Internet and employee becomes necessary to invoke procedures to employer guidance into sites which should not
productivity reprimand employees. Strong corporate be accessed and from an administrative point
Management Decision statements of action should be addressed. of view, ensures enough reporting takes place
36/6 [1998] 395–398 • State a policy for chat room use.Chat room to back up actions taken for reprimanding an
use usually allows employees to speak freely employee for accessing inappropriate Internet
on the Internet and it is up to the corpora- sites. Meanwhile, Internet access policies
tion to set policy on this issue, reminding the must indicate how much time the company
employee that the he/she is representing the considers appropriate for Internet activities.
company. Many corporations may choose to Education and a definition of the limits that an
deny this privilege altogether, since there is employee can have will greatly impact
no accurate means of measuring the conver- employee productivity.
sations. More and more corporations will encounter
• Determine when employees should and this dilemma and it will be very interesting to
should not be on-line. To prevent a bottleneck see the outcome. Internet employee productiv-
in the bandwidth of the network, designated ity issues will create a very serious new job
Downloaded by Universiti Teknologi MARA At 05:59 27 February 2019 (PT)

times for Internet usage should be deter- position within corporations, because it will
mined. take plenty of resources to ensure that the
• Establish rules on sending and receiving e- Internet technology today can proceed effec-
mail. The employee needs to be aware that e- tively into tomorrow.
mail can be monitored by the corporation
and certain phrases or content is acceptable References
or not acceptable for the corporation. Bhimani, A. (1996), “Securing the commercial
• Above all, document the policies, publish Internet”, Communications of the ACM, Vol. 39
them and communicate the necessity of abid- No. 6, pp. 232-48.
ing by the corporation’s established policies. Cohen, S. (1996), “Inside job: a guide to Internets”,
Training & Development, pp. 63-4.
It is essential for each employee on the net- Conorich, D. (1996), “Managing security in a multi-
work to recognize his/her responsibility to the platform environment”, Information Systems
company in having access to the Internet’s Security, Vol. 5, pp. 34-5.
vast services, sites, systems and people. The Kallman, E. (1993), “Electronic monitoring of
employee is ultimately responsible for his/her employees: issues and guidelines”, Journal of
Systems Management, Vol. 6, pp. 17-21.
actions in accessing the Internet. However, on
McCloy, A. (1995), “Cyber sentry blocks office
the Internet the corporation has exposure
Internet access”, Boston Business Journal,
from each employee. It is the responsibility of
Vol. 15, pp. 8-10.
all employees to abide by corporate Internet Notes, G.R. (1996), “Internet directions in 1996”,
use policy to minimize corporate liability. In Online, No. 5, pp. 33-8.
providing these guidelines and setting policy, Pitkow, J.E. and Kehoe, C.M. (1996), “Emerging
usage of the Internet can be an effective infor- trends in the WWW user population”, Commu-
mational tool, but just like the phone system is nications of the ACM, Vol. 39, pp. 106-8.
today, employers will need to monitor exces- Quinlan, K.T. (1996), “Computers, work and the
sive behavior on both technology platforms. workplace”, Computer-Mediated Communica-
tion, pp. 30-5.
Resnick, P. and Miller, J. (1996), “PICS: Internet
access controls without censorship”, Commu-
Conclusion
nications of the ACM, Vol. 39 No. 10, pp. 87-98.
The Internet provides employees with a fertile Roman, L.A. (1996), “Survey: employees traveling
field of business information. However, compa- in cyberspace while on the clock”, Memphis
nies should take employees’ Web surfing very Business Journal, pp. 2-3.
seriously. If not, it can become a wasteland of Thach, L. and Woodman, R.W. (1996), “Organiza-
lost productivity when employees spend an tional change and IT: managing on the edge of
cyberspace”, Journal of Management, pp. 30-45.
excessive amount of time surfing the Web.
Wiesendanger, B. (1993), “Electronic delivery and
In this paper, we recommend companies to
feedback systems come of age”, Public Rela-
apply monitoring/blocking tools and develop tions Journal, No. 1, pp. 10-14.
Internet access policies for employees who Yankus, M. (1996), “Corporate censor”, Internet
have access to the Internet. The choice for World, No. 3, pp. 60-4.

2 How do you see your organization chang-


Application questions
ing over the next five years with the fur-
1 Does the Internet make us more produc- ther developments and applications of the
tive? Internet?

[ 398 ]
This article has been cited by:

1. Farzana Quoquab, Zarina Abdul Salam, Siti Halimah. Does cyberloafing boost employee productivity? 119-122. [Crossref]
2. James Richards. 2011. What has the internet ever done for employees? A review, map and research agenda. Employee Relations
34:1, 22-43. [Abstract] [Full Text] [PDF]
3. Jin Yan, Zibly Adam. Role of self-rationalization and perceived company web policy for employee personal web usage in the
workplace 1-6. [Crossref]
4. Pruthikrai Mahatanankoon, Murugan Anandarajan, Magid Igbaria. 2004. Development of a Measure of Personal Web Usage
in the Workplace. CyberPsychology & Behavior 7:1, 93-104. [Crossref]
Downloaded by Universiti Teknologi MARA At 05:59 27 February 2019 (PT)

S-ar putea să vă placă și