International Journal of Interactive Mobile Technologies (iJIM) – eISSN: 1865-7923 – Vol 16 No 16 (2022) Paper—Cyberloafing in Educational Settings: A Systematic Literature Review Cyberloafing in Educational Settings: A Systematic Literature Review https://doi.org/10.3991/ijim.v16i16.32285 Suzan Alyahya1(), Azizah Alqahtani2 1School of Graphic Design and Digital Media, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia 2School of Psychology, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia smalyahya@pnu.edu.sa Abstract—Integration of information and communication technologies in educational settings offer added learning opportunities to teachers and stu- dents. However, these come with the expense of cyberloafing among students and educators in computer-mediated environments. Despite the curiosity it has been arousing, so recent is the concept of cyberloafing, which implies that the knowledge accumulated so far is sparse, broad and fragmented. This study aims to systematically review the current challenges in the domain of cyberloafing. The study reviewed twenty-six peer-reviewed scholarly articles to analyse and reveal information on the methods, factors examined, applications, compre- hensive results, and limitations. The findings in this study highlight the need to uncover the phenomenon of cyberloafing in teaching and learning environments, and proposes possible recommendations on issues and gaps open to be explored in future studies. Keywords—communication technology, cyberbludging, cyberdeviance, cyberloafing, cyberloafing, cyberslacking, educational settings, systematic literature review (SLR) 1 Introduction While spreading its influence over personal and professional zones of individuals, widespread use of technology has shown both the positive and negative impacts on the overall functioning of societies. The performance and outcome of employees and stu- dents have been potentially influenced. Integration of technology in daily lives has led to increased productivity and digital literacy of teachers [1], [2]. However, the darker side of the use of technology has in turn manifested itself, and it covers compulsive use of media that results in cyberloafing [3]. Revealing an alarming statistic, [4] report that cyberloafing takes up to three hours of effective work time per day of employees’ accessing the Internet. Cyberloafing is a contemporary phenomenon that represents the dark side of tech- nology use. The term has been referred in the extant literature using different termi- nology [5] such as Cyberslacking, Cyberdeviance, Cyberloafing, and Cyberbludging. iJIM ‒ Vol. 16, No. 16, 2022 113 https://doi.org/10.3991/ijim.v16i16.32285 mailto:smalyahya@pnu.edu.sa Paper—Cyberloafing in Educational Settings: A Systematic Literature Review The present study uses the term ‘Cyberloafing’, for referring to all these behaviours discussed in the following text. In general terms, cyberloafing can be defined as the use of Internet and technology during working hours for personal or non-organizational purposes [5], [6]. Education realizes cyberloafing as the use of the internet and other related tech- nologies by students and teachers during allocated time for teaching and learning to achieve personal objectives at educational institutions [7]–[9]. In educational settings, technology usage is typically for entertainment, e.g., chatting, checking emails, online shopping, and watching videos [10] or some other personal work. Reported as common behaviour, cyberloafing has been intensively researched in the workplace settings. [11] report that 64% of workers acknowledge their engagement in cyberloafing at the work place. Engagement of employees in such a behaviour nega- tively affects their productivity levels during work time [12]. For example, employees cyberloafing at work have tendencies to postpone tasks and spend most of their time on entertainment [13]. This adds human and financial costs to organizations [14], [15]. Due to high organizational stake, scholars have focused on better understanding of cyberloafing in the workplace settings to provide actionable solutions. [16] state that employees engage in cyberloafing for the sake of their stress management. Reizer et al. and She and Li [17], [18] report that engaging in cyberloafing also puts the organiza- tions security at risk. In contrast, the research examining cyberloafing in educational settings is not mature yet, and only a handful of empirical studies are available. Scholars suggest that cyber- loafing could negatively affect the educational environment in terms of the effective- ness of teaching and learning [19], [20]. For teachers, engagement in cyberloafing can influence their teaching productivity. For students, it can shift their focus and reduce their level of engagement in educational activities by affecting their cognitive resources [21]–[23]. Consequently, it negatively influences their academic success [24]–[26]. Given the role that education plays in society, researchers have shifted their focus on the study of cyberloafing in educational settings from the time the peril was rec- ognized. However, despite being fast-growing, the related findings are diverse, broad and scattered. There is no doubt that it is important to understand the underpinnings of cyberloafing in academic settings since it poses a serious threat to the successful integration of information and communication technology in the educational context. Moreover, it poses a negative influence on the future of the students, since they will be future employees. Therefore, the efforts of future researchers in the area need to be encouraged and supported. The present research offers support in terms of amalgamating the existing ideas and findings related to cyberloafing in one place through the usage of Systematic Literature Review (SLR) methodology. SLR is an excellent tool that provides deep insights into not only what has been done, but also sheds light on possible areas of focus in future. SLR helps in the synthesis as well as the critical analysis of the domain under consider- ation, here in this study: cyberloafing in educational settings. The study contributes to the existing knowledge area by critically evaluating the existing findings, implications, limitations, and presenting future recommendations that identify open gaps, which when investigated can offer interesting opportunities for scholars, and inferences for 114 http://www.i-jim.org Paper—Cyberloafing in Educational Settings: A Systematic Literature Review school administrations endeavouring to integrate technology with education success- fully by overcoming its negative aspects like cyberloafing. 2 Methodology As mentioned in the prior section, the study implements SLR methodology to coag- ulate comprehensive information on the prior research related to cyberloafing in educa- tional settings. SLR follows well-defined and transparent steps, follows an established protocol to select and review relevant empirical studies [27]. The protocol consists of three main steps: developing the review plan; executing the review plan; and reporting the review. SLR in this study has been conducted as per the stringent, Preferred Report- ing Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines [28], rec- ommended by the Cochrane Collaboration [29] and the Standard Quality Assessment Criteria for Evaluating Primary Research Papers [30]. The section next describes the three main steps of the SLR research methodology. 2.1 Planning the review At this stage the objectives of the SLR, the search procedure, inclusion and exclu- sion criteria and quality evaluation protocol are specified. 2.2 Research objectives (ROs) RO1: To identify the research profile of the studies on cyberloafing in education, in terms of publishing timeline and volume, research methods, geographi- cal scope, and moderating, control, and dependent variables utilized in the reviewed studies. RO2: To identify key themes emerging from the prior relevant studies and outline the scope of uncovered areas. RO3: To examine the findings, implications, limitations and future work directions presented in the included studies to process implications for future researchers and provide recommendations for future studies. RO4: To develop an integrated framework for the reference of future researchers in the area of cyberloafing in an educational context. 2.3 Search procedure SLR was conducted on online databases targeting three bibliographic databases, namely, Scopus, PubMed, and Web of Science. A Google Scholar search was then conducted in an attempt to find additional articles. The selection was limited to peer-reviewed articles that were in the English language and addressed the theme of cyberloafing or cyberslacking until 2019. The key search terms used to formu-late search queries were: ( TITLE-ABS-KEY ( Cyberloafing ) OR TITLE-ABS-KEY iJIM ‒ Vol. 16, No. 16, 2022 115 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review ( cyberslacking ) OR TITLE-ABS-KEY ( “mobile-loafing” ) OR TITLE-ABS-KEY ( “mobile loafing” ) OR TITLE-ABS-KEY ( “mobile loafing” ) OR TITLE-ABS-KEY ( “mobile slacking” ) OR TITLE-ABS-KEY ( “Internet slacking” ) OR TITLE-ABS- KEY ( “Internet loafing” ) OR TITLE-ABS-KEY ( “online loafing” ) OR TITLE-ABS- KEY ( “online slacking” ) ). Forward and backward citation chaining search was also conducted to ensure selection of all relevant studies. Inclusion and exclusion criteria. To select most relevant studies, four inclusion criteria were specified: 1. Empirical studies on cyberloafing in educational settings will be included. 2. Peer-reviewed, journal articles published in English will be included. 3. Studies published on the topic until July 2019 will be included. 4. Only empirical studies on cyberloafing that include students or teachers as partici- pants will be included. To further ensure a robust selection, four exclusion criteria were specified for elim- inating non-relevant studies: 1. Empirical studies on cyberloafing that focuses on the non-educational setting will be excluded. 2. Duplicate studies appearing on different databases will be excluded. 3. Master and doctoral thesis will be excluded. 4. Studies that do not satisfy the quality evaluation protocol described below will be excluded. Executing the review plan. At this stage the search procedure, inclusion and exclusion criteria discussed above are put into action to identify the candidate studies. The online literature research resulted in 140 articles from Scopus, 11 articles from PubMed, 111 articles from Web of Science and 13 articles through forward and backward search, which make a total of n=275 articles; where n represents the count of articles. Titles and abstracts of manuscripts were screened for eligibility. After the first screen- ing, a second screening was undertaken for duplicates. Titles and abstracts were then examined to iteratively apply the pre-specified inclusion and exclusion criteria to the remaining articles. Studies that meet inclusion criteria were retrieved and their contents were coded to ensure eligibility. All 272 studies found through the search procedure were evaluated thoroughly for selection, however, only 32 articles were found eligi- ble after applying the inclusion and exclusion criteria. Finally, six more were dropped as they failed to meet the quality evaluation protocol and remaining 26 articles were carried forward for synthesis. The process and the articles excluded at each stage is presented in Figure 1. 116 http://www.i-jim.org Paper—Cyberloafing in Educational Settings: A Systematic Literature Review Identified and reviewed relevant articles (n=275) Included Articles for match aganist Inclusion Criteria (n=32) Articles included for Systematic Literature Review (n=26) Excluded articles for unmatch aganist Inclusion Criteria (n=6) Excluded articles for match aganist Exclusion Criteria (n=243) Fig. 1. Selection procedure 2.4 Reporting the review The third stage includes the presentation of the profile and findings of the reviewed studies. The next section represents the profile of the reviewed studies, followed by the section discussing the themes of the reviewed studies. 2.5 Study characteristics From the 26 articles selected for the present SLR, three used qualitative method of analysis for a total subsample size of 509 participants, and 23 studies used quantitative method of analysis, for a total subsample size of 25,558 participants. The overall sam- ple size for the 26 studies is 26,067 participants. Studies included, focused on students and teachers (see Figure 2). Profiles of student participants are shown in Figure 3. iJIM ‒ Vol. 16, No. 16, 2022 117 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review 0.844 25.223 0 5 10 15 20 25 30 Teachers Students C o u n t in t h o u s a n d s Fig. 2. Student and teacher participants Four studies were conducted on teachers with a total sample of 844 participants and 22 studies were conducted on students, with a total sample of 25,223 participants. The student sample was diverse and contains university students and school students. Furthermore, of the qualitative studies, two used open-ended questions; one used the interview. The coding analysis was generally used by qualitative studies. Of the quan- titative designs, all of them used a survey to collect data and one study validated a measure. Details about the included studies’ characteristics are provided in Table A1 in appendix. 95% 20% 11% 10% 0% 20% 40% 60% 80% 100% School Ungraduate Graduate University Approximate count in percentages C yb er lo af in g by s tu de nt s a t d iff er en t l ev el s Fig. 3. Profiles of students surveyed 2.6 Geographic scope of the selected studies Regarding the location, studies included in the present review were distributed around the world, as shown in Figure 4. The studies’ researchers were based in Turkey for 13 of the studies, the United States for three studies, and Spain, United Kingdom, and China, Malaysia, Singapore, and Canada for one study each. Although the studies from Spain were only two, 60% of the sample were Spanish. 118 http://www.i-jim.org Paper—Cyberloafing in Educational Settings: A Systematic Literature Review Fig. 4. Geographic scope of the selected studies 2.7 Publication timelines As shown in Figure 5, publication dates of the studies ranged from 2001 to 2019; 18 studies were published within the last five years, a further six were published within the last ten years, and another two were published over ten years ago. 2.8 Evolving conceptualization and measurement of cyberloafing Technological advancement and improved access to the latest technologies by individuals, requires changes in the existing conceptualization of cyberloafing. [31] report the need to redefine cyberloafing since the previous conceptualization mainly addressed from the perspective of institutional setting. However, such concep- tualization is quite limited and is outpaced by the evolving technology trends. Internet access is no longer limited to organizational settings, as individuals have uninterrupted access to the Internet through their personal connections, wireless network and other modes of online connectivity. Emphasizing the point, [32] report that cyberloafing is different from the conventional deviant behaviour. Furthermore, different kinds of cyberloafing behaviours exhibit different prevalence rates [31]. iJIM ‒ Vol. 16, No. 16, 2022 119 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review For example, in general, cyberloafing is more prevalent in males as compared to females, and students as compared to employees. However, employees cyberloaf more than students when it comes to satisfying their impression management needs [31]. Taking this thought forward, successive attempts have been made to establish new scales to measure cyberloafing. This is necessary, taking into account the advancement in the information and communication technology [33]. Authors in [34] introduced and validated a new scale for cyberloafing, that takes into account five factors: shop- ping, sharing, accessing online content, gaming/gambling and real-time updating. This scale went beyond the previous factors, namely, browsing and emailing. The frequently occurring words found in the literature are depicted in the Figure 6. 1 0 0 0 0 1 0 0 2 0 1 1 2 2 5 3 4 4 0 1 2 3 4 5 6 20 02 20 03 20 04 20 05 20 06 20 07 20 08 20 09 20 10 20 11 20 12 20 13 20 14 20 15 20 16 20 17 20 18 20 19 Pu bl ic at io n co un t Fig. 5. Publication timelines 2.9 Antecedents of cyberloafing Uncovering the antecedents of cyberloafing has been a key focus of the extant lit- erature. The research studies investigating the predictors of cyberloafing can be cate- gorized into three categories. First category reports about the antecedent with regards to cyberloafing in general. This stream found following antecedents of cyberloafing: demographic variables, technology usage status, academic variables [3], [35], addiction [36]–[38], stress, social support [39], nature of online learning activities [3] [40], trait procrastination [38], self-regulation [41], cyberloafing anxiety, distractions from peers engaging in cyberloafing [42]. The study by Durak and Saritepeci [43] reports that per- sonality traits do not predict cyberloafing. Second category lists the predictors for specific kinds of cyberloafing. Prior litera- ture has found the following categories of cyberloafing: {socialization, news follow-up, personal business or individual} [35], [37], and search [37]. The socialization cyber- loafing mainly addresses activities related to social networking, instant messaging, discussing on discussion boards, and checking emails. News follow-up as a cyberloaf- ing activity addresses the engagement with keeping oneself up to date with the latest happenings around the world. Personal business or individual cyberloafing addresses 120 http://www.i-jim.org Paper—Cyberloafing in Educational Settings: A Systematic Literature Review the cyberloafing activities dealing with issues such as online banking, shopping, job seeking, and planning vacations. Finally, Search cyberloafing addresses the issue of engaging in searching information irrelevant to set out learning goals. Studies have revealed that for specific kinds of cyberloafing , internet addiction exerts significant positive influence on individuals, Search cyberloafing and Social cyberloafing [37]. Fig. 6. Word cloud Final category comprises studies that examine the antecedents of cyberloafing intentions, behaviour and attitude. Intentions to engage in cyberloafing are derived from the attitude towards cyberloafing [44], [45], {subjective norms, perceived behavioural control} [8], [42], [44], {escapism, perceived threat} [44], multitasking [8], prescrip- tive norms [45], descriptive norms [42] and cognitive absorption [8]. cyberloafing intentions and habit predict cyberloafing behaviour, including, class engagement influ- enced attitude towards cyberloafing [45]. Consequences of cyberloafing. The extant literature also investigated the consequences of engaging in cyberloafing behaviour in a learning environment. Majority of the reviewed studies have reported that cyberloafing affects performance of individuals. However, [32] report that the influence over individual performance is only valid over the Internet. Durak [3] states that cyberloafing exerts positive influence over academic procrastination. Additionally, engaging in cyberloafing in educational settings negatively influences academic success [3], [10]. Specifically, Wu et al. report that in-class cyberloafing activities negatively influence academic performance [10]. On the other hand, cyberloafing also leads to smartphone addiction [39], [46]. The negative outcomes become detrimental since cyberloafing diverts attention and focus iJIM ‒ Vol. 16, No. 16, 2022 121 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review of teachers and students by diverging them from the tasks that they would execute and complete effectively and efficiently. An example of such distraction is engaging in cyberloafing instead of learning and performing course work during online teaching. Surprisingly, cyberloafing has been found to have some positive outcomes as well. Page [1] found that cyberloafing by teachers at work leads to increased productivity of teachers. Intuitively, accessing the web for personal satisfaction at work may enhance the abilities of teachers to manage stress and balance personal and professional life. Additionally, such personal usage of the web also enhances digital literacy of teachers that contributes towards successful integration of technology with teaching and learning in educational context [1]. Wu et al. [10] report that out-class cyberloafing has small, but significant positive influence on academic performances. However, Wu et al. also report that excessive out-class cyberloafing activities may have negative impact. This implies that cyberloafing at work in moderate amounts brings positive outcomes, nonetheless excessively engaging may equally prove to be detrimental. Moderators and mediators. A limited number of studies investigate the role of moderators and mediators in predicting cyberloafing. Prasad et al. [41] report that self-efficacy, conscientiousness and achievement orientation moderate association of self-regulation and cyberloafing. For example, being high on self-efficacy and self -regulation reduces the tendency to engage in cyberloafing. Additionally, it should be taken into consideration that tendency to indulge in cyberloafing is contingent with the students’ self-regulation despite them being highly efficacious and task-oriented. On the other hand, Gerow [8] found cognitive absorption to mediate the association of multitasking and intentions to engage in cyberloafing. User characteristics. The prior literature reports about the linkages between user characteristics and cyberloafing. The user characteristics can be understood in terms of demographic variables and nature of the users. The popular demographic variable that has received ample attention from the researchers is gender. Literature reporting absence of any relation of gender with cyberloafing is scant [3]. In contrast, most literature reports the presence of association between gender and cyberloafing [37], [47], [48]. Males have usually been found to cyberloaf more as compared to females [35], [37], [47], [48]. In a contradictory finding, Durak & Saritepeci [43] reveal that female teachers show more cyberloafing behaviour than male teachers. When it comes to specific cyberloafing activities, gender influences differ. For example, Batury & Toker [35] state that females become active when it comes to cyberloafing for social reasons. However, Keser et al. [37] report no gender differ- ences with regards to social cyberloafing. Furthermore, males prefer news and indi- vidual cyberloafing activities [37]. Finally, no gender differences were reported in terms of search cyberloafing [37]. Age was one of the demographic variables that was rarely studied in the cyberloafing field. Durak and Saritepeci [43] found that age is negatively related to cyberloafing. cyberloafing would be higher among younger indi- viduals. However, Yan and Yang [38] indicated that age and cyberloafing are not asso- ciated with each other. Other demographic variables such as residence location and family income exert no influence on cyberloafing [39]. In relation to the nature of the user, self-regulation and general self-efficacy have no influence on cyberloafing [46]. Furthermore, habit and consumerism indirectly influence cyberloafing via different neutralization techniques such as denial of responsibility, appeal to higher loyalties, metaphor of ledge, and denial of injury [49]. 122 http://www.i-jim.org Paper—Cyberloafing in Educational Settings: A Systematic Literature Review Technology usage. This theme addresses the influence of the factors related to use of technology on cyberloafing. In this regard, internet experience is correlated with cyberloafing [35]. The individuals who engage in technology and access to the internet every day or more often, tend to cyberloaf more than the users, who use the internet less often [35], [48]. Within this, individuals use the Internet daily cyberloaf for socialization and personal business, rather than news follow-up [35]. Additionally, in terms of skills, advanced or expert users of internet cyberloaf more than the those who are at novice or intermediate level [35], [37], [47]. Interestingly, location and time of internet access has no effect on cyberloafing [26]. Educational characteristics. Educational characteristics address the influence of level of education, academic performance, nature of study and learning environment on Cyberloafing. Gökçearslan et al. [39] reports that level of education has no influence on Cyberloafing. Comparatively, [47] reports that students at higher levels of studies (or senior students) have a high tendency to exhibit cyberloafing behaviours compared to their counterparts at lower levels. Academically, low performing students have a high chance to remain engaged in cyberloafing [47]. Arabaci [47] has examined the influence of the number of hours the educational degree or course requires the student to spend online. Karaoğlan Yılmaz et al. [26] report that time spent on online courses or course activities requiring an online environment is positively correlated with cyberloafing. For example, students spending more time in lab courses, cyberloaf more. This also implies that students of certain study disciplines such as management information systems cyberloaf more as compared to students of other disciplines, such as history [26]. Similarly, some streams of education (e.g., theology teaching department) exhibit more disciplined behaviour than others that influences their tendency to manage or engage in cyberloafing [47]. Additionally, the nature of learning strategies also positively influences cyberloafing [48]. Learning strategies influence class attention of students. The attention in class as also driven by the instructor’s encouragement, reduces the tendency to engage in cyberloafing [44]. Furthermore, physical proximity of the leader also results in reduction of cyberloafing [48]. On the other hand, motivation towards the course or learning does not directly influence cyberloafing [48]. Lack of attention, subjective norms and apathy towards course material share positive correlation with cyberloafing [50]. Psycho-social perceptions formulated by the learning environment (e.g., student cohesiveness, involvement, support from teacher, cooperation, equity, attitudes and task orientation etc.) is weakly correlated with cyberloafing [48]. Gaps and limitations. The examination of the different studies on cyberloafing led to the extraction of mainly nine limitations. These are discussed in the following sections and references to the concerned studies are presented in Table 1. I. Gender imbalance: refers to the dominance of a specific gender group over others. Two studies have reported the prevalence of dominance of males over females [3], [31]. This is important to have gender balance since it influences the study findings in general, and more specifically where gender is one of the study variables. II. Self-reporting bias: as a limitation refers to the possibilities of under-reporting of the behaviour by the respondents. A total of thirteen studies have reported self-reporting to be one of the limitations of their research [3], [43]. This could iJIM ‒ Vol. 16, No. 16, 2022 123 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review be due to different reasons, such as lack of consideration of the behaviour to be a hindrance [8], or anxiousness in revealing confidential information regarding their involvement in the deviant behaviour [42]. This could pose a problem since it can influence study findings by falling prey to common method variance that could inflate or deflate the associations among investigated behaviours. III. Context of research: refers to the limitations posed by context in which the research is being conducted. Sixteen studies have found it to be a problem [44], [48]. This could be due to the region in which the research is conducted, or the type of respondents considered for the study or focusing on a restricted service or institute being investigated. This influences the universal applicability of the research findings. IV. Distinction: refers to the failure in considering the distinction between the antecedents and consequences of cyberloafing. Only a single study has reported a limitation [3]. For example, lack of distinction between antecedents and con- sequences of in-class and out-class activities, while investigating cyberloafing behaviour [3]. This gives an unclear picture of the phenomenon. V. Generalizability: refers to the inability of the study findings to be extrapolated to explain the cyberloafing behaviour of the general user population. About eight studies have specifically reported it as their limitation [45], [49]. However, it might be implicitly meant by other studies when they discuss research context or study design to be the limitations faced by them. Moreover, this is one of the major restrictions faced by the empirical research being conducted in general as well. VI. Conceptualization of cyberloafing: reflects issues in relation to the way the concept of cyberloafing was conceptualized for analysis and investigation. For example, considering cyberloafing in general rather than specific cyberloafing behaviour [45], investigating limited sub-dimensions of cyberloafing behaviour and activities [26], failing to explore cyberloafing explicitly [44], lack of explo- ration of context, where cyberloafing is being investigated, for example sampling issues Zoghbi-Manrique-de-Lara [32], consideration of old scales that fail to incorporate current changes in information and communication technology [38]. Six studies have highlighted this to be their limitation [44], [45]. VII. Inadequate sampling and sampling size: refers to the problems related to low sample size, convenience sampling and failing to incorporate random sampling. This has been reported to be a problem by five studies [44]. VIII. Limitations to study design: refers to the usage of cross-sectional design for data collection rather than longitudinal. However, it also addresses other issues such as the choice of using surveys as a data collection tool that involves self-selection bias. This influence the drawing of the dynamic associations among variables being investigated. Six studies have reported study design as their limiting point [42], [45]. Lastly, the possibility of other variables highlights the limitation in terms of ignoring the other variables that could be incorporated in the study since they could influence cyberloafing behaviour of respondents. Two studies empha- size upon the possible loss of information subjective to lack of consideration of other important variables [44], [50]. For example, multi-tasking, cognitive 124 http://www.i-jim.org Paper—Cyberloafing in Educational Settings: A Systematic Literature Review absorption, awareness of instructor monitoring, individual traits, learning style, goals, interests etc. [44], [50]. The review of the extant literature has led to the identification of the eight open gaps in existing knowledge on cyberloafing in educational settings. These gaps existing in knowledge domain of cyberloafing are discussed in the following section: I. The detrimental consequences of cyberloafing behaviour require more compre- hension [34]. This will help in assisting the individuals suffering intentionally or unintentionally from indulging in cyberloafing. II. Serious cyberloafing behaviour requires further investigation [26]. For example, hacking and spreading viruses. III. Cyberloafing lacks treatment as a broad concept [43]. Majority of the extant research considers a limited view of cyberloafing, which fails to present a more holistic picture. This could be achieved by bringing out associations of varied kinds of variables and cyberloafing. For example, variables such as addiction, social support, cognitive absorption, readiness levels, interests, learning styles, obedience, individual’s personality, and self-efficacy perceptions can be consid- ered [32], [41], [42], [48]. Considering additional variables could also help in overcoming the extant limitations by increasing the existing percentage of cyber- loafing explained. IV. There also exists an open gap that requires better understanding of the factors that trigger or prevent cyberloafing behaviour in different contexts [26], [31], [35]. For example, influence of control, role of job types, characteristics of activity that needs to be engaged in while users get distracted by cyberloafing, and addiction. V. There is a need to consider the influence of cyber activities of the users while analysing the cyberloafing behaviour and drawing implications from the same [3]. VI. Exploration of the cross-cultural nature of cyberloafing demands attention from the research community. It will be interesting to know the cultural aspects that have positive or negative influence on cyberloafing behaviour [35], [39]. VII. Nature of association between addiction and cyberloafing is also an open issue. There have been some attempts at understanding their association [37], [46], how- ever, in-depth exploration is needed for attaining better comprehension of their association. VIII. There is a need to bring forth the underpinnings of the differences among the cyberloafing behaviour exhibited by students and employees [35], [41]. Finally, there is a need for redefining cyberloafing since initial conceptualization mainly dealt with the misuse of the Internet in the institutional settings [31]. However, the situation has changed since individuals have continuous access to the Internet via different ways. iJIM ‒ Vol. 16, No. 16, 2022 125 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review Table 1. Study limitations Limitations Authors Gender imbalance Durak, 2019; Akbulut et al., 2017 Self-reporting Durak, 2019; Akbulut et al., 2017; Yilmaz & Yurdugül, 2018; Taneje et al., 2015; Gokçearslan et al., 2016; Zoghbi-Manrique-de-Lara, 2012; Wu et al., 2018; Li & Titsworth, 2015; Page, 2014; Gerow et al., 2010; Yan & Yang, 2014; Soh et al., 2018; Durak & Saritepeci, 2019 Research context Durak, 2019; Yilmaz & Yurdugül, 2018; Rana et al., 2016; Akbulut et al., 2016; Gokçearslan et al., 2016; Zoghbi-Manrique-de-Lara, 2012; De-Lara, 2007; Prasad et al., 2010; Li & Titsworth, 2015; Keser et al., 2016; Rana et al., 2019; Gerow et al., 2010; Yan & Yang, 2014; Soh et al., 2018; Durak & Saritepeci, 2019; Varol & Yildirim, 2017 Distinction Durak, 2019 Generalizability Yilmaz et al., 2015; Rana et al., 2016; Sharma, 2019; Zoghbi- Manrique-de-Lara, 2012; Prasad et al., 2010; Li & Titsworth, 2015; Rana et al., 2019; Soh et al., 2018 Cyberloafing conceptualization Yilmaz et al., 2015; Zoghbi-Manrique-de-Lara, 2012; Prasad et al., 2010; Rana et al., 2019; Yan & Yang, 2014; Soh et al., 2018 Sampling issues Rana et al., 2016; Taneje et al., 2015; Sharma, 2019; Li & Titsworth, 2015; Rana et al., 2019 Study design Taneje et al., 2015; Prasad et al., 2010; Wu et al., 2018; Gerow et al., 2010; Sharma, 2019; Soh et al., 2018 Possibility of other variables Rana et al., 2016; Rana et al., 2019 2.10 Recommendations for future research The studies analysed using SLR provide some interesting recommendations for con- ducting future research in the area of cyberloafing. Outlines these recommendations is given in the next section: I. The findings from the existing studies should be replicated with users of varied age range, different socio-cultural structures, different regions and different back- grounds to have a more generalizable understanding of cyberloafing [3], [34], [42], [44], [46]–[48]. II. The future studies on cyberloafing should be longitudinal in nature to capture changes over time [3], [8], [10], [49]. III. The existing literature suggests that researchers consider study designs that are based on different research methodologies to gain holistic understanding of cyber- loafing phenomenon, such as considering using focus groups, observations, trian- gulation, interview and surveys [38], [43], [46], [49]. Further, researchers suggest the usage of think-loud protocols in the research design, such as semi-structured interviews and eye-tracking tools [48]. IV. Further investigations on cyberloafing should take into consideration the dynamic nature of information and communication technology [32], [34]. This will enable more accurate estimation of cyberloafing behaviour. 126 http://www.i-jim.org Paper—Cyberloafing in Educational Settings: A Systematic Literature Review V. Future research could examine the distractions causing engagement in cyberloaf- ing by an individual after viewing others in near proximity practicing the same. This could be examined through variables, such as the role of morality, values and concern for others, learning in a classroom or performing work efficiently [42]. VI. Future studies should consider having larger sample sizes [26], [44], [50]. VII. Future research should try to use log-based environments that can help in min- imizing the bias brought as a result of self-reporting nature of study design [3], [10], [44], [45]. 3 Comprehensive framework Based on the process of the reviewed literature, this study proposes a framework that consists of five main components as shown in the Figure 7. The boxes and the dotted lines represent the investigated relationships between cyberloafing and other characteristics. Proposed framework may be employed by future researchers to fur- ther guide them in the field of cyberloafing in various educational settings. Framework offers support to research efforts aimed at exploring the consequences antecedents, mediators, and moderators that might affect Cyberloafing. The different components of this framework are as follows: User characteristics It is argued that there is a link between user characteristics, such as demographic variables and the nature of users and Cyberloafing. The extant research has focused on gender; however, gender influences differ [35], [37]. Future studies may consider inclusion of gender effects and associations with Cyberloafing. Among the demo- graphic variables the age of the participants was rarely focused on in the literature. Few researchers suggested that the nature of users such as self-regulation and general self-efficacy has no influence on cyberloafing [46]. Furthermore, habit and consumer- ism indirectly influence cyberloafing by means of different mechanisms such as meta- phor of ledge and denial of responsibility [49]. Technology usage Extant literature has focused on investigating cyberloafing with relation to tech- nology usage. Few researchers have also suggested that the internet experience and internet skills are correlated with cyberloafing [37]. individuals engaging in Internet activities every day would cyberloaf more than the users, who use the internet less often. Individuals with advanced internet skills cyberloaf more than the ones who don’t have advanced internet skills. However, cyberloafing does not get influenced by loca- tion and time of internet use [26]. Educational characteristics Educational characteristics, such as grade, academic performance, nature of study and learning environment have been studied with relation to cyberloafing. Research has shown that higher grades and academically low performing students and time spent on online courses have a higher tendency to show cyberloafing behaviours [26], [47]. However, Psycho-social perceptions formulated by the learning environment iJIM ‒ Vol. 16, No. 16, 2022 127 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review (e.g., student cohesiveness, involvement, support from teacher, cooperation, equity, attitudes and task orientation etc.) has a weak relationship with cyberloafing [48]. 3.1 Framework methodology This study aims to build a comprehensive framework on previous research on cyber- loafing in educational settings by implementing SLR methodology. Limitations have been reported by prior studies for gender imbalance, self-reporting bias, and research context. Authors posit the need for gender balance in the sample in future research. Further, self-reporting measures may not be considered for collection of cyberloaf- ing data. The context of research should be rich and unlimited to benefit the progress of undertaken research. Further, distinction between antecedents and consequences on cyberloafing should be considered in future research. Conceptualization of cyberloafing in prior research, reflects the issues with regards to the way the concept of cyberloafing was conceptualized for investigation. For exam- ple, as general examination, limited sub-dimensions of cyberloafing behaviour and activities, and failing to explore cyberloafing explicitly [26], [44], [45]. Antecedents. One of the limitations studies referenced in the prior sections reveal lack of distinction between antecedents and consequences. Antecedents, such as demographic variables, academic variables, stress, social support and self-regulation have been studied with relation to cyberloafing. Research has shown that stress and social support have significant effects on cyberloafing [39]. While perceived social support has a small though significant effect on cyberloafing, it was found that the higher the level of stress the higher the level of cyberloafing [39]. Age and gender as demographic variables have been studied in relation to teachers, who cyberloaf. Young aged teachers show higher levels of cyberloafing behaviour than older teachers. Further, female teachers show higher levels of cyberloafing behaviour than male teachers [43]. Academic procrastination and education level, as academic variables have been studied with relation to cyberloafing behaviour. The findings highlight a conceptual relation between cyberloafing and academic procrastination and education level of teachers. Students would give up their academic studies to cyberloaf more. Further, higher the level of education of teachers the higher the level of cyberloafing [43]. How- ever, research has shown that self-regulation has no effect on cyberloafing [46]. The negative effect of self-regulation was not statistically significant [46]. Consequences. The extant literature in this paper showed the positive and negative consequences of engaging in cyberloafing behaviour in a learning environment. Majority of the reviewed studies have reported that cyberloafing has a negative effect on the performance of individuals [3], [38]. Smartphone addiction is one of consequences of cyberloafing [39], [46]. Gokçearslan et al. find that the level of activities of cyberloafing increase individuals’ interest towards smartphone addiction. [45] reported that class engagement was significantly and negatively related to cyber- loafing attitudes. An engaging lesson would decrease students` capability to cyberloaf. Cyberloafing is a source of distractions not only for students, but for teachers as well. The engagement in cyberloafing instead of focusing on learning or teaching, is the source of distraction. Research has shown that distraction caused by cyberloafing acts of others have a negative impact on the attitude toward cyberloafing [44]. Distractions 128 http://www.i-jim.org Paper—Cyberloafing in Educational Settings: A Systematic Literature Review experienced by cyberloafing acts of others would decrease the perception of cyberloaf- ing as fun and enjoyable behaviour [44]. On the other hand, cyberloafing has positive outcomes as well. [1] argues that cyber- loafing by teachers while at work results in an increase of work productivity. This could be due to their ability to manage stress and balance personal and professional life as a result of using the web for personal purposes at work. Additionally, such personal usage of the web also enhances digital literacy of teachers, which could contribute towards successful integration of technology with teaching and learning in educational context [1]. Wu et al. [10] report that out-class cyberloafing has a small but significant positive influence on academic performance. However, they also report that excessive out-class cyberloafing activities will have a negative impact. This means that cyber- loafing at work in moderate amounts brings positive outcomes, nonetheless engaging excessively in cyberloafing may ultimately prove detrimental. Moderators and mediators. Cognitive absorption, conscientiousness trait, achievement goal orientation and academic self-efficacy have been studied as moderators and mediators with relation to cyberloafing. Research has shown that cognitive absorption and academic self-efficacy were considered as predictors of cyberloafing [43]. Prasad et al. [41] report that academic self-efficacy, conscientiousness and achievement orientation moderate the relationship between self-regulation and cyberloafing. Individuals with high self-efficacy and self -regulation tend to engage less in cyberloafing. On the other hand, Gerow et al. [8] found that cognitive absorption mediates the relationship between the ability to multi- task and intentions to engage in cyberloafing. Fig. 7. Comprehensive framework iJIM ‒ Vol. 16, No. 16, 2022 129 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review 4 Study implications This study offers various theoretical and practical implications, which are discussed in the following sub-sections: Theoretical implications SLR methodology adopted is the first attempt at reviewing the phenomenon of cyberloafing in the context of educational settings. This is vital to research and analysis since cyberloafing during the teaching and learning process acts as a threat to achievement of academic goals and successful integration of technology with education. Moreover, current realization on cyberloafing in educational context is broad, diverse and fragmented. In this regard, SLR provides comprehensive understanding by providing information in a concise way on the cyberloafing behaviour. For example, antecedents, outcomes, role of user characteristics in general and specifically related to their technology usage and educational status and its conceptualization. Further- more, it introduces gaps in the current literature concerning cyberloafing, and it also provides future research directions for researchers. In future, researchers could focus on cyberloafing behaviour investigation rather than intentions that may be researched via experimental or log-based study design. SLR provides an integrated framework for comprehending cyberloafing in an educational context. Practical implications The SLR methodology adopted in this study guides to the following three practical implications. I. First, it provides insights to educators and policy makers regarding avoiding or reducing cyberloafing in the teaching and learning environments. It has been found that increased engagement with technology for educational purposes increases the tendency to engage in cyberloafing. However, educators and policy makers must understand that limiting the usage of technology in educational curriculum is not the right solution. This may refrain the reaping the benefits that integration of tech- nology with education could offer. Moreover, students’ possession of smartphones or personal connections to the internet do not let that happen in reality. Hence, educators should think about other ways to limit sources allowing access to the internet at ease. For example, role models of students could be established to refer to and limit the negative consequences of engaging in cyberloafing among the stu- dents. Furthermore, policy-makers could introduce policies in their curriculum and educational institutions guidelines that explicitly inform students about the negative outcomes of engaging in such behaviours. Adoption of such strategies have been quite useful in controlling ragging in educational institutions in India [51], [52]. II. Second, SLR findings can help teachers in understanding cyberloafing more broadly and in a concise way. The findings recommend that teachers should bring in changes in their teaching and learning strategies. For example, informing students about the importance of taught content, physical monitoring, designing of educational activities that are gamified; or to engage students and drive them to engage in flow experience by balancing their skills and level of difficulty tasks etc. III. Third, findings also assist parents, guardians, therapists and psychologists. For example, self-regulation has been identified as a useful strategy for controlling 130 http://www.i-jim.org Paper—Cyberloafing in Educational Settings: A Systematic Literature Review cyberloafing. In this regard, parents and guardians could help their children to learn the importance of self-regulation. Furthermore, psychologists and therapists could help students in learning ways to practice self-regulation skills. Furthermore, par- ents can also teach their children ethics and their importance in their life. Being ethically conscious could also help them in refraining from engaging in cyberloaf- ing. This is especially important since students of today represent the future of the world and nations. They are future employees and it has already been reported that cyberloafing by employees leads to great functional as well as financial losses to the organizations. 5 Limitations Despite the benefits offered by SLR, it suffers from two limitations. I. The current review is subjective and qualitative in nature with regards to inclusion of articles for SLR. This might bring in some bias that could ultimately influence the findings of the conducted research. This recommends future researchers intend- ing to conduct SLR in cyberloafing, or in other themes to incorporate quantitative measures while choosing the articles for inclusion in SLR. For example, they could use meta-analysis for such purposes. Using a quantitative approach for conducting review of cyberloafing in the educational domain may also result in some findings that probably current SLR failed to capture with its current approach. II. The current research considers understanding cyberloafing among students and teachers in general. It does not provide specific information on how cyberloaf- ing varies across students and teachers at school, college or university level. Such information could highlight the need for usage of different strategies especially for students depending on the severity level across all three formal stages of educa- tion. The future research could focus on spotting such differences so that appropri- ate actions could be taken to curb the situation and assist the students as early as possible. 6 Conclusion This study employed Systematic Literature Review (SLR) methodology for review- ing 26 articles and provided a detailed description of: (i) research profile of existing cyberloafing research; (ii) key themes covered by extant research; (iii) provision of future recommendations for research based on the examination of findings, impli- cations, limitations and future research directions; and (iv) proposing an integrated framework for reference of future researchers. The study focussed on the concept of cyberloafing that emerges as a huge barrier to the success of achieving academic goals, as set out for the students and teachers. Cyberloafing poses a threat to the successful integration of technology in educational settings. The findings of this study offer sev- eral theoretical and practical implications of research on cyberloafing. Investigation iJIM ‒ Vol. 16, No. 16, 2022 131 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review on cyberloafing in educational context is still in the infancy stage, in addition to being a broad and fragmented concept. The educational environments demand an in-depth understanding and comprehension of the issue of cyberloafing. 7 Acknowledgment This research project was supported by the Deanship of Scientific Research, Princess Nourah bint Abdulrahman University. 8 References [1] D. Page, “Teachers’ personal web use at work,” Behav. Inf. Technol., vol. 34, no. 5, pp. 443–453, May 2015, https://doi.org/10.1080/0144929X.2014.928744 [2] M. A. Dar and S. A. Bhat, “Evaluation of mobile learning in workplace training,” in 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016, pp. 1468–1473, https://doi.org/10.1109/ICACCI.2016.7732255 [3] H. Y. Durak, “Cyberloafing in learning environments where online social networking sites are used as learning tools: Antecedents and consequences,” J. Educ. Comput. Res., vol. 58, no. 3, pp. 539–569, Aug. 2019, https://doi.org/10.1177/0735633119867766 [4] T. D. Stanley, H. Doucouliagos, and P. Steel, “Does ICT generate economic growth? A meta-regression analysis,” J. Econ. Surv., vol. 32, no. 3, pp. 705–726, Jul. 2018, https:// doi.org/10.1111/joes.12211 [5] H. Yildiz, B. Yildiz, and A. Hamza, “Sanal kaytarma davranişlarinin sergirilmesinde örgüt- sel adalet algisinin rolü var midir,” Bilgi Ekon. ve Yönetimi Derg., vol. 10, no. 2, p. 12, 2015, https://doi.org/10.1089/cyber.2017.0397 [6] V. K. G. Lim, “The IT way of loafing on the job: Cyberloafing, neutralizing and organi- zational justice,” J. Organ. Behav., vol. 23, no. 5, pp. 675–694, Aug. 2002, https://doi. org/10.1002/job.161 [7] T. A. O’Neill, L. A. Hambley, and G. S. Chatellier, “Cyberslacking, engagement, and personality in distributed work environments,” Comput. Human Behav., vol. 40, no. 1, pp. 152–160, 2014, https://doi.org/10.1016/j.chb.2014.08.005 [8] J. E. Gerow, P. S. Galluch, and J. B. Thatcher, “To slack or not to slack: Internet usage in the classroom,” J. Inf. Technol. Theory Appl., vol. 11, no. 3, pp. 5–24, 2010. [9] V. B. Marcus, N. A. Atan, S. M. Yusof, and U. Mastura, “Students’ perception towards engaging factors of extreme e-service learning design for computer network course,” Int. J. Interact. Mob. Technol., vol. 15, no. 05 SE-Papers, pp. 100–115, Mar. 2021, https://doi. org/10.3991/ijim.v15i05.20901 [10] J. Wu, W. Mei, and J. C. Ugrin, “Student cyberloafing in and out of the classroom in China and the relationship with student performance,” Cyberpsychology, Behav. Soc. Netw., vol. 21, no. 3, pp. 199–204, 2018. https://doi.org/10.1089/cyber.2017.0397 [11] G. Jandaghi, S. M. Alvani, H. Zarei Matin, and S. Fakheri Kozekanan, “Cyberloafing man- agement in organizations,” Iran. J. Manag. Stud., vol. 8, no. 3, pp. 335–349, 2015. [12] B. Liberman, G. Seidman, K. Y. A. McKenna, and L. E. Buffardi, “Employee job attitudes and organizational characteristics as predictors of cyberloafing,” Comput. Human Behav., vol. 27, no. 6, pp. 2192–2199, 2011, https://doi.org/10.1016/j.chb.2011.06.015 132 http://www.i-jim.org https://doi.org/10.1080/0144929X.2014.928744 https://doi.org/10.1109/ICACCI.2016.7732255 https://doi.org/10.1177/0735633119867766 https://doi.org/10.1111/joes.12211 https://doi.org/10.1111/joes.12211 https://doi.org/10.1089/cyber.2017.0397 https://doi.org/10.1002/job.161 https://doi.org/10.1002/job.161 https://doi.org/10.1016/j.chb.2014.08.005 https://doi.org/10.3991/ijim.v15i05.20901 https://doi.org/10.3991/ijim.v15i05.20901 https://doi.org/10.1089/cyber.2017.0397 https://doi.org/10.1016/j.chb.2011.06.015 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review [13] P. Zoghbi-Manrique-de-Lara and A. Olivares-Mesa, “Bringing cyber loafers back on the right track,” Ind. Manag. Data Syst., vol. 110, no. 7, pp. 1038–1053, Jan. 2010, https://doi. org/10.1108/02635571011069095 [14] D. E. Ozler and G. Polat, “Cyberloafing phenomenon in organizations: Determinants and impacts,” Int. J. Ebus. eGovernment Stud., vol. 4, no. 2, pp. 1–15, 2012. [15] M. A. Dar and J. Parvez, “Novel Techniques to Enhance the Security of Smartphone Appli- cations,” Int. J. Interact. Mob. Technol., vol. 10, no. 4 SE-Papers, pp. 32–36, Oct. 2016, https://doi.org/10.3991/ijim.v10i4.5869 [16] S. A. Andel, S. R. Kessler, S. Pindek, G. Kleinman, and P. E. Spector, “Is cyberloafing more complex than we originally thought? Cyberloafing as a coping response to workplace aggression exposure,” Comput. Human Behav., vol. 101, no. 1, pp. 124–130, 2019, https:// doi.org/10.1016/j.chb.2019.07.013 [17] Z. She and Q. Li, “When too little or too much hurts: evidence for a curvilinear relationship between cyberloafing and task performance in public organizations,” J. Bus. Ethics, 2022, https://doi.org/10.1007/s10551-022-05038-9 [18] A. Reizer, B. L. Galperin, M. Chavan, A. Behl, and V. Pereira, “Examining the relation- ship between fear of COVID-19, intolerance for uncertainty, and cyberloafing: A medi- ational model,” J. Bus. Res., vol. 145, pp. 660–670, 2022, https://doi.org/10.1016/j. jbusres.2022.03.037 [19] K. K. Mihelič, V. K. G. Lim, and B. Culiberg, “Cyberloafing among Gen Z students: the role of norms, moral disengagement, multitasking self-efficacy, and psychological outcomes,” Eur. J. Psychol. Educ., 2022, https://doi.org/10.1007/s10212-022-00617-w [20] K. Y. Koay and W. C. Poon, “Students’ cyberslacking behaviour in e-learning environ- ments: the role of the Big Five personality traits and situational factors,” J. Appl. Res. High. Educ., vol. ahead-of-print, no. ahead-of-print, Jan. 2022, https://doi.org/10.1108/ JARHE-11-2021-0437 [21] H. Heflin, J. Shewmaker, and J. Nguyen, “Impact of mobile technology on student atti- tudes, engagement, and learning,” Comput. Educ., vol. 107, pp. 91–99, 2017, https://doi. org/10.1016/j.compedu.2017.01.006 [22] F. Sana, T. Weston, and N. J. Cepeda, “Laptop multitasking hinders classroom learning for both users and nearby peers,” Comput. Educ., vol. 62, pp. 24–31, 2013, https://doi. org/10.1016/j.compedu.2012.10.003 [23] E. Wood, L. Zivcakova, P. Gentile, K. Archer, D. De Pasquale, and A. Nosko, “Examining the impact of off-task multi-tasking with technology on real-time classroom learning,” Comput. Educ., vol. 58, no. 1, pp. 365–374, 2012, https://doi.org/10.1016/j.compedu.2011.08.029 [24] K. Askew, “The relationship between cyberloafing and task performance and an examina- tion of the theory of planned behavior as a model of cyberloafing,” ProQuest LLC, Ann Arbor, USA, 2012. [25] E. Ergün and A. Altun, “Öğrenci gözüyle siber aylaklik ve nedenleri,” Eğitim Teknol. Kuram ve Uygul., vol. 2, no. 1, pp. 36–53, 2012. [26] F. G. Karaoğlan Yılmaz, R. Yılmaz, H. T. Öztürk, B. Sezer, and T. Karademir, “Cyberloafing as a barrier to the successful integration of information and communication technol- ogies into teaching and learning environments,” Comput. Human Behav., vol. 45, no. 1, pp. 290–298, 2015, https://doi.org/10.1016/j.chb.2014.12.023 [27] D. Tranfield, D. Denyer, and P. Smart, “Towards a methodology for developing evidence-informed management knowledge by means of systematic review,” Br. J. Manag., vol. 14, no. 3, pp. 207–222, Sep. 2003, https://doi.org/10.1111/1467-8551.00375 [28] D. Moher et al., “Preferred reporting items for systematic reviews and meta-analyses,” The PRISMA statement (Chinese edition), vol. 7, no. 9. pp. 889–896, Sep. 2009, https://doi. org/10.3736/jcim20090918 iJIM ‒ Vol. 16, No. 16, 2022 133 https://doi.org/10.1108/02635571011069095 https://doi.org/10.1108/02635571011069095 https://doi.org/10.3991/ijim.v10i4.5869 https://doi.org/10.1016/j.chb.2019.07.013 https://doi.org/10.1016/j.chb.2019.07.013 https://doi.org/10.1007/s10551-022-05038-9 https://doi.org/10.1016/j.jbusres.2022.03.037 https://doi.org/10.1016/j.jbusres.2022.03.037 https://doi.org/10.1007/s10212-022-00617-w https://doi.org/10.1108/JARHE-11-2021-0437 https://doi.org/10.1108/JARHE-11-2021-0437 https://doi.org/10.1016/j.compedu.2017.01.006 https://doi.org/10.1016/j.compedu.2017.01.006 https://doi.org/10.1016/j.compedu.2012.10.003 https://doi.org/10.1016/j.compedu.2012.10.003 https://doi.org/10.1016/j.compedu.2011.08.029 https://doi.org/10.1016/j.chb.2014.12.023 https://doi.org/10.1111/1467-8551.00375 https://doi.org/10.3736/jcim20090918 https://doi.org/10.3736/jcim20090918 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review [29] J. J. Shuster, “Review: Cochrane handbook for systematic reviews for interventions, Version 5.1.0, published 3/2011. Julian P.T. Higgins and Sally Green, Editors,” in Research Synthesis Methods, vol. 2, no. 2, J. P. T. Higgins and Sally Green, Eds. FL, USA: John Wiley & Sons, Ltd, 2011, pp. 126–130. https://doi.org/10.1002/jrsm.38 [30] L. M. Kmet, L. S. Cook, and R. C. Lee, “Standard quality assessment criteria for evaluat- ing primary research papers from a variety of fields,” 2004. https://era.library.ualberta.ca/ items/48b9b989-c221-4df6-9e35-af782082280e (accessed Sep. 13, 2012). [31] Y. Akbulut, O. Dönmez, and Ö. Ö. Dursun, “Cyberloafing and social desirability bias among students and employees,” Comput. Human Behav., vol. 72, no. 1, pp. 87–95, 2017, https:// doi.org/10.1016/j.chb.2017.02.043 [32] P. Zoghbi-Manrique-de-Lara, “Reconsidering the boundaries of the cyberloafing activity: the case of a university,” Behav. Inf. Technol., vol. 31, no. 5, pp. 469–479, May 2012, https:// doi.org/10.1080/0144929X.2010.549511 [33] M. A. Dar, A. Askar, D. Alyahya, and S. A. Bhat, “Lightweight and secure elliptical curve cryptography (ECC) key exchange for mobile phones,” Int. J. Interact. Mob. Technol., vol. 15, no. 23, pp. 89–103, 2021, https://doi.org/10.3991/ijim.v15i23.26337 [34] Y. Akbulut, Ö. Ö. Dursun, O. Dönmez, and Y. L. Şahin, “In search of a measure to inves- tigate cyberloafing in educational settings,” Comput. Human Behav., vol. 55, pp. 616–625, 2016, https://doi.org/10.1016/j.chb.2015.11.002 [35] M. H. Baturay and S. Toker, “An investigation of the impact of demographics on cyberloaf- ing from an educational setting angle,” Comput. Human Behav., vol. 50, pp. 358–366, 2015, https://doi.org/10.1016/j.chb.2015.03.081 [36] S. Yaşar and H. Yurdugül, “The investigation of relation between cyberloafing activities and cyberloafing behaviors in higher education,” Procedia – Soc. Behav. Sci., vol. 83, no. 1, pp. 600–604, 2013, https://doi.org/10.1016/j.sbspro.2013.06.114 [37] H. Keser, M. Kavuk, and G. Numanoglu, “The relationship between cyber-loafing and internet addiction,” Cypriot J. Educ. Sci., vol. 11, no. 1, pp. 37–42, 2016, https://doi. org/10.18844/cjes.v11i1.431 [38] J. Yan and J. Yang, “Trait procrastination and compulsive Internet use as predictors of cyber- loafing,” in 2014 11th International Conference on Service Systems and Service Manage- ment (ICSSSM), 2014, pp. 1–4, https://doi.org/10.1109/ICSSSM.2014.6874119 [39] Ş. Gökçearslan, Ç. Uluyol, and S. Şahin, “Smartphone addiction, cyberloafing, stress and social support among university students: A path analysis,” Child. Youth Serv. Rev., vol. 91, no. 1, pp. 47–54, 2018, https://doi.org/10.1016/j.childyouth.2018.05.036 [40] S. Al Saleh and S. A. Bhat, “Mobile learning: A systematic review,” Int. J. Comput. Appl., vol. 114, no. 11, pp. 1–5, 2015, https://doi.org/10.5120/20019-1406 [41] S. Prasad, V. K. G. Lim, and D. J. Q. Chen, “Self-regulation, individual characteristics and cyberloafing,” in Pacific Asia Conference On Information Systems (Pacis), 2010, p. 159, [Online]. Available: https://aisel.aisnet.org/pacis2010/159 [42] A. Taneja, V. Fiore, and B. Fischer, “Cyber-slacking in the classroom: Potential for digital distraction in the new age,” Comput. Educ., vol. 82, no. 1, pp. 141–151, 2015, https://doi. org/10.1016/j.compedu.2014.11.009 [43] H. Y. Durak and M. Saritepeci, “Occupational burnout and cyberloafing among teachers: Analysis of personality traits, individual and occupational status variables as predictors,” Soc. Sci. J., vol. 56, no. 1, pp. 69–87, 2019. https://doi.org/10.1016/j.soscij.2018.10.011 [44] N. P. Rana, E. Slade, S. Kitching, and Y. K. Dwivedi, “The IT way of loafing in class: Extending the theory of planned behavior (TPB) to understand students’ cyberslack- ing intentions,” Comput. Human Behav., vol. 101, no. 1, pp. 114–123, 2019, https://doi. org/10.1016/j.chb.2019.07.022 134 http://www.i-jim.org https://doi.org/10.1002/jrsm.38 https://era.library.ualberta.ca/items/48b9b989-c221-4df6-9e35-af782082280e https://era.library.ualberta.ca/items/48b9b989-c221-4df6-9e35-af782082280e https://doi.org/10.1016/j.chb.2017.02.043 https://doi.org/10.1016/j.chb.2017.02.043 https://doi.org/10.1080/0144929X.2010.549511 https://doi.org/10.1080/0144929X.2010.549511 https://doi.org/10.3991/ijim.v15i23.26337 https://doi.org/10.1016/j.chb.2015.11.002 https://doi.org/10.1016/j.chb.2015.03.081 https://doi.org/10.1016/j.sbspro.2013.06.114 https://doi.org/10.18844/cjes.v11i1.431 https://doi.org/10.18844/cjes.v11i1.431 https://doi.org/10.1109/ICSSSM.2014.6874119 https://doi.org/10.1016/j.childyouth.2018.05.036 https://doi.org/10.5120/20019-1406 https://aisel.aisnet.org/pacis2010/159 https://doi.org/10.1016/j.compedu.2014.11.009 https://doi.org/10.1016/j.compedu.2014.11.009 https://doi.org/10.1016/j.soscij.2018.10.011 https://doi.org/10.1016/j.chb.2019.07.022 https://doi.org/10.1016/j.chb.2019.07.022 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review [45] P. C.-H. Soh, K. Y. Koay, and V. K. G. Lim, “Understanding cyberloafing by students through the lens of an extended theory of planned behavior,” First Monday, vol. 23, no. 6, pp. 1–12, 2018, https://doi.org/10.5210/fm.v23i6.7837 [46] Ş. Gökçearslan, F. K. Mumcu, T. Haşlaman, and Y. D. Çevik, “Modelling smartphone addic- tion: The role of smartphone usage, self-regulation, general self-efficacy and cyberloafing in university students,” Comput. Human Behav., vol. 63, pp. 639–649, 2016, https://doi. org/10.1016/j.chb.2016.05.091 [47] I. B. Arabaci, “Investigation faculty of education students’ cyberloafing behaviors in terms of various variables,” Turkish Online J. Educ. Technol., vol. 16, no. 1, pp. 72–82, 2017. [48] R. Yılmaz and H. Yurdugül, “Cyberloafing in IT classrooms: Exploring the role of the psycho-social environment in the classroom, attitude to computers and computing courses, motivation and learning strategies,” J. Comput. High. Educ., vol. 30, no. 3, pp. 530–552, 2018, https://doi.org/10.1007/s12528-018-9184-2 [49] S. Sharma, “I Want It My Way: An Integrated Model of Habits, Consumerism, And Neutralization To Understand Students’ Cyberslacking Behavior,” 2019, [Online]. Available: https://aisel.aisnet.org/amcis2019/is_education/is_education/23 [50] N. Rana, Y. Dwivedi, E. Slade, and B. Lal, “Cyber-Slacking: Exploring Students’ Usage of Internet-Enabled Devices for Non-Class Related Activities,” 2016. [51] M. S. Kumar and R. S. A. Metilda, “Confidential review of maternal deaths in a South Indian state: current status and the way forward,” Sex. Reprod. Heal. Matters, vol. 29, no. 2, p. 2009657, Jan. 2022, https://doi.org/10.1080/26410397.2021.2009657 [52] R. M. A. Saleem, “Hinduism, hindutva and hindu populism in India: An analysis of party manifestos of Indian rightwing parties,” Religions, vol. 12, no. 10, 2021, https://doi. org/10.3390/rel12100803 iJIM ‒ Vol. 16, No. 16, 2022 135 https://doi.org/10.5210/fm.v23i6.7837 https://doi.org/10.1016/j.chb.2016.05.091 https://doi.org/10.1016/j.chb.2016.05.091 https://doi.org/10.1007/s12528-018-9184-2 https://aisel.aisnet.org/amcis2019/is_education/is_education/23 https://doi.org/10.1080/26410397.2021.2009657 https://doi.org/10.3390/rel12100803 https://doi.org/10.3390/rel12100803 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review 9 A pp en di x Ta bl e A 1. P ri or li te ra tu re o n C yb er lo afi ng in e du ca tio na l s et tin gs A ut ho rs & Y ea r Sa m pl e R es ea rc h D es ig n V ar ia bl es St at is ti ca l A na ly si s St ud y F oc us M ed ia to r M od er at or D ep en de nt In de pe nd en t D ur ak (2 01 9) 17 1 Tu rk is h U ni ve rs ity St ud en ts (7 0% fe m al e) $@ Su rv ey C yb er lo afi ng be ha vi ou r, A ca de m ic su cc es s, A ca de m ic pr oc ra st in at io n G en de r, Te ch no lo gy us ag e st at us , O nl in e le ar ni ng ac tiv iti es , s el f- ef fic ac y, M ot iv at io n, C og ni tiv e ab so rp tio n, Su cc es s in te nt io n, C yb er lo afi ng R eg re ss io n m od el e xp la in s th e re la tio ns o f s tu de nt s C yb er lo afi ng w ith de m og ra ph ic a nd ac ad em ic v ar ia bl es – – R an a et a l. (2 01 9) 18 8 B ri tis h U nd er gr ad ua te a nd Po st gr ad ua te S tu de nt s (4 8% fe m al e) $ @ Su rv ey C yb er sl ac ki ng L ac k of a tte nt io n, A pa th y, D is tr ac tio n, at tit ud e, S ub je ct iv e no rm , e rc ei ve d th re at , P er ce iv ed be ha vi or al c on tr ol , E sc ap is m R eg re ss io n, Fa ct or an al ys is fa ct or s in flu en ci ng C yb er lo afi ng th ro ug h th e th eo ry o f pl an ne d be ha vi ou r – – Sh ar m a (2 01 9) 30 3 A m er ic an U nd er gr ad ua te U ni ve rs ity S tu de nt s (4 5% fe m al e M ea n ag e 29 y ea rs Su rv ey C yb er sl ac ki ng be ha vi ou r H ab its , C on su m er is m , N eu tr al iz at io n R eg re ss io n th e ro le o f h ab its , co ns um er is m a nd ne ut ra liz at io n on cy be rs la ck in g be ha vi ou r – – V ar ol & Y ild ir m (2 01 9) 18 4 Tu rk ey U ni ve rs ity St ud en ts (5 1% fe m al e) $@ Q ua lit at iv e st ud y In st ru ct or , St ud en t,C ou rs e co nt en t l ea rn in g en vi ro nm en t C od in g St ud en ts C yb er lo afi ng re as on s an d so lu tio ns – – 136 http://www.i-jim.org Paper—Cyberloafing in Educational Settings: A Systematic Literature Review D ur ak & Sa ri te pe ci (2 01 9) 19 4 Tu rk is h Te ac he rs (7 0% fe m al e) M ea n ag e 33 y ea rs @ Su rv ey C yb er lo afi ng D em og ra ph ic va ri ab le s, IC T U S, Pe rs on al ity tr ai ts , O cc up at io na l va ri ab le s Fa ct or an al ys is , R eg re ss io n T he in ve st ig at io n of fa ct or s th at p re di ct th e C yb er lo afi ng – – Y ilm az & Y ur du gu l (2 01 8) 60 7 Tu rk is h U nd er gr ad ua te St ud en ts (5 8% fe m al e) $, A ge R an ge 1 7– 26 Su rv ey C yb el oa fin g, Ps yc ho -s oc ia l pe rc ep tio n, A tti tu de s, M ot iv at io n, L ea rn in g st ra te gi es Fa ct or an al ys is , C or re la tio n, R eg re ss io n T he le ve l o f C yb er lo afi ng / re la tio ns hi p be tw ee n C yb er lo afi ng a nd ot he r v ar ia bl es – – So h, K oa , & L im (2 01 8) 28 3 M al ay si an U ni ve rs ity S tu de nt s (5 7% fe m al e) $ @ Su rv ey C yb er lo afi ng be ha vi ou r H ab it, In te nt io n, pr es cr ip tiv e no rm s, D es cr ip tiv e no rm s, P re ce vi ed be ha vi ou ra l c on tr ol , C la ss e ng ag em en t R eg re ss io n E xa m in at io n of s tu de nt s C yb er lo afi ng be ha vi ou r – – W u, M ei , & U gr in ( 20 18 ) 10 50 C hi ne s U nd er gr ad ua te st ud en ts (5 0% fe m al e) $@ Su rv ey A ca de m ic pe rf or m an ce In -c la ss , O ut -c la ss C yb er lo afi ng R eg re ss io n in -c la ss a nd o ut - cl as s C yb er lo afi ng – – A kb ul ut , D on m ez & D ur su n (2 01 7) 13 39 T ur ki sh St ud en ts ,3 75 H ig h Sc ho ol , 9 64 U ni ve rs ity St ud en ts 19 y ea rs @ Su rv ey C yb er lo afi ng b y ta yp es G en de r, So ci al de si ra bi lit y A no va , A nc ov a th e pr ev er la nc e of C yb er lo afi ng a nd so ci al d es ia bi lit y bi as – – A ra ba ci (2 01 7) 23 2 Tu rk is h U ni ve rs ity St ud en ts (4 4% fe m al e) $@ Su rv ey Pe rc ev ie d C yb er lo afi ng be ha vi ou r G en de r, gr ad e, de pa rt m en t, in te rn et us ag e sk ill s, in te rn et us ag e se ni or ity Fa ct or an al ys is In ve st ig at io n of th e st at es o f s ho w in g C yb er lo afi ng – – (C on tin ue d) iJIM ‒ Vol. 16, No. 16, 2022 137 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review A ut ho rs & Y ea r Sa m pl e R es ea rc h D es ig n V ar ia bl es St at is ti ca l A na ly si s St ud y F oc us M ed ia to r M od er at or D ep en de nt In de pe nd en t G ok ce ra rs la n, U lu yo & Sa hi n (2 01 8) 88 5 Tu rk is h U nd er gr ad ua te un iv er si ty S tu de nt s (5 9% fe m al e) $ @ Su rv ey Sm ar tp ho ne ad di ct io n/ So ci al s up po rt / St re ss C yb er lo afi ng / Sm ar tp ho ne ad di ct io n Fa ct or an al ys is , R eg re ss io n th e re la tio ns hi p be tw ee n sm ar tp ho ne ad di ct io n an d C yb er lo afi ng – – G ok ce ar sl an , M um cu , H as la m an & C ev ik , 2 01 6 58 9 Tu rk is h U ni ve rs ity St ud en ts (7 1% fe m al e) $ , A ge R an ge 1 9– 20 Su rv ey C yb er lo afi ng / G en er al se lf -e ffi ca cy Sm ar tp ho ne ad di ct io n/ C yb er lo afi ng C or re la tio n, re gr es si on th e ro le o f C yb er lo afi ng in s m ar tp ho ne ad di ct io n – – R an a, D w iv ed i, Sl ad e & L al (2 01 6) 21 ! U nd er gr ad ua te St ud en ts (3 3% fe m al e) $@ Su rv ey A tti tu de to cy be rs la ck in g, In te nt io n to cy be rs la ck in g A tti tu de , A pa th y, L ac k of a tte nt io n, an d Su bj ec tiv e no rm C or re la tio n fa ct or s im pa ct st ud en t c yb er - sl ac ki ng b eh av io r – – K es er H ., K av uk † K ., N um an og lu G . ( 20 16 ) 13 9 Tu rk is h U ni ve rs ity St ud en ts (6 0% F em al e) $ @ Su rv ey C yb er lo afi ng In te rn et ad di ct io n G en de r G ra de le ve l In te rn et u sa ge In te rn et a bi lit y C or re la tio n th e re la tio ns hi p be tw ee n te ac he r’ s ad di ct io n le ve l a nd C yb er lo afi ng – – A kb ul ut , D ur su n, D ön m ez & Şa hi n (2 01 5) Ph as es 1 33 T ur ki sh T ea ch er (7 2% fe m al e) 4 79 Tu rk is h G ra du at e St ud en ts (5 4% fe m al e) 63 T ur ki sh U nd er gr ad ua te St ud en ts (4 7% fe m al e) Ph as e 2 47 1 Tu rk is h U nd er gr ad ua te St ud en ts , ( 59 % Fe m al e) Ph as e 3, 7 3 St ud en ts (3 2 Fe m al e) $ @ Su rv ey C yp er lo afi ng Sh ar in g Sh op pi ng R ea l- tim e up da tin g A cc es si ng o nl in e co nt en t Fa ct or an al ys is Se ar ch fo r m ea su re s to in ve st ig at e sy be rl oa fin g – – Ta bl e A 1. P ri or li te ra tu re o n C yb er lo afi ng in e du ca tio na l s et tin gs (C on tin ue d) 138 http://www.i-jim.org Paper—Cyberloafing in Educational Settings: A Systematic Literature Review B at ur ay & To ke r ( 20 15 ) 28 2 Tu rk is h St ud en ts gr ad e 9– 12 (4 7% Fe m al e) $ @ Su rv ey C yp er lo afi ng Ty pe s G en de r G ra de In te rn et s ki lls In te rn et u sa ge In te rn et e xp er ie nc e C or re la tio n th e im pa ct o f de m og ra ph ic be ha vi or o n C yb er lo afi ng – – K ar ao ʇla n Y ilm az , Y ilm az , Ö zt ür k, S ez er & K ar ad em ir (2 01 5) 28 8 Tu rk is h U ni ve rs ity St ud en ts , ( 52 % Fe m al e) , $ , @ Su rv ey C yb er lo afi ng le ve l G en de r D ep ar tm en t L oc at io n D ai ly ti m e on th e in te rn et . Fa ct or an al ys is , A no va C yb er lo afi ng be ha vi or s of un iv er si ty s tu de nt s in c om pu te r l ab . – – Pa ge , ( 20 14 ) 11 0 U K te ac he rs , (6 4% F em al e) , $ , @ Q ua lit at iv e st ud y/ Ty pe o f P W U pe rs on al w eb us e re as on s D es cr ip tiv e ty pe a nd re as on s of PW U – – Ta ne ja , F io re , & F is ch er , (2 01 5) 26 7 A m er ic an ud er gr ad ua te s tu de nt s, (4 0% F em al e) , $ , @ Su rv ey In te nt io n to Sy be rs la ki ng A tti tu de S ub je ct iv e no rm D es cr ip tiv e no rm P er ce iv ed be ha vi or al c on tr ol R eg re ss io n th e fa ct or s in flu en ci ng s tu de nt s’ at tit ud e an d in te nt io ns to u se te ch no lo gy – – Y an & Y an g (2 01 4) 25 5 C hi ne se G ra du at e st ud en ts , ( 54 % Fe m al e, $ , @ Su rv ey Pr ev al en ce cy pe rl oa fin g G en de r A ge Tr ai t p ro cr as tin at io n In te rn et c om pu ls iv e us e R eg re ss io n Pe rs on al ch ar ac te ri st ic s an d Pr ev al en ce C yp er lo afi ng – – Y as ar & yu rd ug ul , (2 01 3) 21 5 Tu rk is h U ni ve rs ity E du ca tio n St ud en ts (4 8% F em al e) , $ , @ Su rv ey C yb er lo afi ng be ha vi or s an d C yb er lo afi ng ac tiv iti es D es cr ip tiv e C yb er lo afi ng be ha vi or s an d C yb er lo afi ng ac tiv iti es . – – M an ri qu e- D e- L ar a, (2 01 2) 27 0 Sp an is h U ni ve rs ity te ac he rs an d st ud en ts , ( Fe m al e 35 .4 % ), $, @ Su rv ey C yp er lo afi ng O rg an iz at io na l se rv ic e In te rp er so na l de vi an ce S ST S C or re la tio n cy pe rl oa fin g po te nt ia l o nl in e ch ar ac te ri st ic s. C yb er lo afi ng – (C on tin ue d) iJIM ‒ Vol. 16, No. 16, 2022 139 Paper—Cyberloafing in Educational Settings: A Systematic Literature Review A ut ho rs & Y ea r Sa m pl e R es ea rc h D es ig n V ar ia bl es St at is ti ca l A na ly si s St ud y F oc us M ed ia to r M od er at or D ep en de nt In de pe nd en t Pr as ad , L im , & C he n, (2 01 0) 12 8 Si ng ap or ea n un de rg ra du at e st ud en ts , ( 62 % Fe m al e) , $ , @ Su rv ey C yb er lo afi ng Se lf – ef fic ac y C on sc ie nt io us ne ss A ch ie ve m en t Se lf -R eg ul at io n C yb er lo afi ng R eg re ss io n, M od er at io n pe rs on al ity v ar ia bl es re la te d in te rn et u se . – in di vi du al ch ar ac te ri st ic s (s el f- ef fic ac y, co ns ci en tio us ne ss an d ac hi ev em en t or ie nt at io n) G er ow , G al lu ch , & T ha tc he r, (2 01 0) 65 4 A m er ic an U ni ve rs ity st ud en ts , $ , @ Su rv ey C yb er -s la ck in g E xt er na l f ac to rs , In te rn al fa ct or s R eg re ss io n, Fa ct or an al ys is W ha t c au se s st ud en ts to c yb er - sl ac k in th e cl as sr oo m ? – – M an ri qu e- D e- L ar a, (2 00 7) 27 0 Sp an is h un iv er si ty te ac he rs (3 5. 4% Fe m al e) , $ Su rv ey C yb er lo afi ng G en de r A ge W or k an om ia D is tr ib ut iv e ju st ic e Pr oc ed ur al ; j us tic e In te ra ct io na l j us tic e C or re la tio n, R eg re ss io n th e m od er at in g ro le of w or k an om ia in th e re la tio ns hi p be tw ee n em pl oy ee s' pe rc ep tio ns o f or ga ni za tio na l ju st ic e an d C yb er lo afi ng . – W or k an om ia D av is , F le tt, & B es se r, (2 00 2) 21 1 C an ad ia n un de rg ra du at e st ud en ts (5 1% Fe m al e) , M A ge =2 1. 73 Su rv ey Pr ob le m at ic in te rn et u se O SC d im en si on s M an ov a, Fa ct or an al ys is em pi ri ca lly b as ed pr ed ic ta bl e m od el o f pr ob le m at ic in te rn et us e. – – Ta bl e A 1. P ri or li te ra tu re o n C yb er lo afi ng in e du ca tio na l s et tin gs (C on tin ue d) 140 http://www.i-jim.org Paper—Cyberloafing in Educational Settings: A Systematic Literature Review 10 Authors Suzan Alyahya (PhD) is an Assistant Professor at Princess Nourah Graphic Design and Digital Media School, in Saudi Arabia. She completed the PhD degree in Visual Literacy/ Infographic at the University of Northern Colorado in 2014, and Master’s degree in Art education from King Saud University in 2005. In 1999, she joined the faculty of Art and Design at Princess Nourah University. Her research interests relate to information visualization, Infographics, eye tracking technology, instructional design and visual learning, and human computer interaction (email: smalyahya@pnu.edu.sa). Azizah Alqahtani (PhD) is an Assistant Professor in Cross-Cultural Psychology at Princess Nourah Psychology School, in Saudi Arabia. She completed the PhD degree in Psychology at the University of Plymouth in July 2018, and Master’s degree in Cross-Cultural Psychology from Brunel University in 2009. In 2011, she joined the faculty of Psychology at Princess Nourah University. Dr Alqahtani`s research focuses on the morality field and cyberpsychology across cultures (email: amalqahtani@pnu. edu.sa). Article submitted 2022-05-07. Resubmitted 2022-06-18. Final acceptance 2022-07-03. Final version published as submitted by the authors. iJIM ‒ Vol. 16, No. 16, 2022 141 mailto:smalyahya@pnu.edu.sa mailto:amalqahtani@pnu.edu.sa mailto:amalqahtani@pnu.edu.sa