Full length article In search of a measure to investigate cyberloang in educational settings Yavuz Akbulut a, * , Ozcan Ozgür Dursun a , Onur D onmez b , Yusuf Levent S ¸ ahin a a Department of Computer Education & Instructional Technology, Faculty of Education, Anadolu University, Yunusemre Campus, 26470, Eskisehir, Turkey b Department of Computer Education & Instructional Technology, Faculty of Education, Ege University, _ Izmir, Turkey article info Article history: Received 5 June 2015 Received in revised form 14 October 2015 Accepted 3 November 2015 Available online xxx Keywords: Cyberloang Cyberslacking Scale development Media in education abstract Cyberloang is among the problematic tech-trends in contemporary work-based and educational set- tings. The current study administered an existing three-factor scale to three samples. The factor structure was not conrmed among high school teachers (n: 33), high school students (n: 479) and un- dergraduates (n: 86). A new and more comprehensive scale to address contemporary cyberloang be- haviors during lectures was developed through literature review, expert panels and observations. Data from undergraduate students (n: 471) were used for construct validation with an exploratory factor analysis (EFA), which revealed a ve-factor structure and explained 70.44% of the total variance. Factors were sharing, shopping, real-time updating, accessing online content and gaming/gambling. The scale was administered to another undergraduate student sample (n: 215) and a social networker student group (n: 515). The structure was validated in these new samples through conrmatory factor analyses (CFA). The scale and current ndings are expected to facilitate further cyberloang research in educa- tional settings. © 2015 Elsevier Ltd. All rights reserved. 1. Introduction Proliferation of internet technologies brought about many socio-psychological phenomena such as technology anxiety, Internet addiction and cyberbullying. Among these phenomena, intentional use of Internet access for personal purposes during work or lectures has become an issue of concern. Referred to as cyberslacking (Block, 2001; Greengard, 2000) or cyberloang (Lim, 2002; Polito, 1997), this counterproductive use is one of the most common ways employees waste time at work (Weatherbee, 2010). Moreover, the density of cyberloang is expected to trend upward due to constant advances in online connectivity opportunities and increasing availability of high-tech mobile devices. Prevalence and predictors of cyberloang in work-based set- tings have been documented well with empirical studies (Andreassen, Torsheim, & Pallesen, 2014; Garrett & Danziger, 2008; Sheikh, Atashgah, & Adibzadegan, 2015; Vitak, Crouse, & LaRose, 2011). While some scholars considered it as a counterproductive act which can cause economic loss (Block, 2001; Greengard, 2000) and reduced system performance due to excessive use of band- width (Sipior & Ward, 2002), others addressed its restorative and pleasurable consequences as well (Lim & Chen, 2009; Mastrangelo, Everton, & Jolton, 2006; Page, 2015). Recent work further investi- gated countermeasures to address cyberloang such as blocking websites in the black list, providing reminder mechanisms to reduce misuse (Glassman, Prosch, & Shao, 2015), employing secu- rity systems to monitor Internet activity or enforcement of sanc- tions on those who caught cyberloang (Ugrin & Pearson, 2013). Though the issue has been primarily investigated in work-based settings, cyberloang is catching attention from the eld of edu- cation owing to massive technology integration investments and students' increasing access to digital technologies. Nevertheless, cyberloang studies in educational settings are relatively novel. Online searches through relevant terms (i.e., cyberloang, cyber- slacking) reveal only a few studies in educational settings where university teachers (Zoghbi-Manrique-de-Lara, 2012), classroom teachers (McBride, Milligan, & Nichols, 2013), or in-service teacher training students (Page, 2015) are taken into consideration. That is, work-based settings are again the primary source of empirical data as observed in the previous literature. Recent studies began to evaluate the non-academic technology * Corresponding author. E-mail addresses: yavuzakbulut@anadolu.edu.tr (Y. Akbulut), oodursun@ anadolu.edu.tr ( O. O. Dursun), onur.donmez@ege.edu.tr (O. Donmez), ylsahin@ anadolu.edu.tr (Y.L. S ¸ ahin). Contents lists available at ScienceDirect Computers in Human Behavior journal homepage: www.elsevier.com/locate/comphumbeh http://dx.doi.org/10.1016/j.chb.2015.11.002 0747-5632/© 2015 Elsevier Ltd. All rights reserved. Computers in Human Behavior 55 (2016) 616e625