Leonard N. Ezeh, Chukwuemeka E. Etodike, Emmanuel N. Chukwura


This study examined abusive supervision and organizational cynicism as predictors of cyber-loafing among federal civil service employees in Anambra State, Nigeria. Three hundred and twenty-nine (329) public sector employees served as participants in the study. The participants were 147 males and 182 females. The age of the participants ranged from 27 to 53 years, with a mean age of 39yrs and standard deviation of 1.42yrs. The participants were selected through cluster and simple random sampling technique. Being a cross-sectional survey studies, correlation design and multiple regression analysis were used as the appropriate design and statistical tool to analyze the data obtained from the field study respectively. The result confirmed that abusive supervision significantly predicted cyber-loafing among federal civil servants in Nigeria at α = .51, p < .05 (n=229). Also organizational cynicism significantly predicted cyber-loafing among federal civil servants at α = .63, p < .05 (n=229). It is recommended that organizational leader-member exchange be improved to checkmate abusive supervision while increasing fairness and equity in the organization.   


Article visualizations:

Hit counter



abusive supervision, waste management workers, organizational cynicism, counterproductive workplace behaviour

Full Text:



Abraham, R. (2000). Organizational Cynicism: Bases and Consequences. Genetic, Social, and General Psychology Monographs, 126(3), 269-292.

Beugre, C. D., & Kim, D. (2006). Cyberloafing: Vice or virtue? Emerging Trends and Challenges in Information Technology Management, 1-2, 62-69

Dean, J. W., Brandes, P., & Dharwadkar, R. (1998). Organizational cynicism. Academy of Management Review, 23, 341-352.

Ikechukwu-Ifudui, V., & Myers, J. (2015). Trust and cynicism at work: impacts on employee engagement and psychological well-being in the Nigerian banking sector.

Kelly, L. Z., & Bennett, J. T. (2002). Abusive supervision and subordinates’ organizational citizenship behaviour. Journal of Applied Psychology, 87(6), 1068-1076.

Liberman, B., Seidman, G., McKenna, K. Y. A., & Buffardi, L. E. (2011). Employee job attitudes and organizational characteristics as predictors of cyberloafing. Computers in Human Behavior, 27(6), 2192-2199.

Lim, V., & Chen, D. (2012). Cyberloafing at the workplace: gain or drain on work? Behaviour & Information Technology, 31(4), 343-353.

Mark, G. M. (2008). Stress models: A review and suggested new direction. Mark. indd 1

Mary, B. M. (2012). A trickle-down model of abusive supervision. Personnel Psychology, 65, 325-357.

Messarra, L. C., Karkoulian, S., & McCarthy, R. (2011). To restrict or not to restrict personal internet usage on the job. Education, Business and Society: Contemporary Middle Eastern Issues, 4(4), 253-266.

Nair, P., & Kamalanabhan, J. (2010). The Impact of Cynicism on Ethical Intentions of Indian Managers: The moderating Role of Seniority. Journal of International Business Ethics, 3(1), 4-29.

Nathan, B. O., William, R., & Mary, L. S. (2010).Consent to retaliation: A civil recourse theory of contractual liability. Social Science Research Network.

Ozler E. Derya, & Atalay G. Ceren. (2011). A research to determine the relationship between organizational cynicism and burnout levels of employees in health sector. Business and Management Review, 1(4), 26-38.

Smollan, R. K. (2012). Emotional responses to the injustice of organizational change: A qualitative study. Emotion in Organisations, 8, 175-202.

Ugrin, J. C., & Pearson, J. M. (2013). The effects of sanctions and stigmas on cyberloafing. Computers in Human Behavior, 29, 812-820.

Wagner, D. T., Barnes, C. M., Lim, V. G., & Ferris, D. L. (2012). Lost sleep and cyberloafing: Evidence from the laboratory and a daylight saving time quasi-experiment. Journal of Applied Psychology, 97(5), 1068-1076.

Wang, W., Mao, J., Wu, W., & Liu, J. (2012). Abusive supervision and workplace deviance: The mediating role of interactional justice and the moderating role of power distance. Asia Pacific Journal of Human Resources, 50(1), 43-60.

Young, K.S. (2010). Policies and procedures to manage employee Internet abuse. Computers in Human Behaviour, 21, 11-15.

Young, K.S., Pistner, M., O’Mare, J., & Buchanan, J. (1999). Cyber Disorders: The mental health concern for the new millennium. CyberPsychology & Behaviour, 2(5), 475-479. 73

Zhang, Y. (2005). Age, gender, and Internet attitudes among employees in the business world. Computers in Human Behaviour, 21, 1-10.

Zoghbi-Manrique-de-Lara, P. (2012). Reconsidering the boundaries of cyberloafing activity: The case of a university. Behaviour & Information Technology, 31(5), 469-479.

DOI: http://dx.doi.org/10.46827/ejhrms.v0i0.319


  • There are currently no refbacks.

Copyright (c) 2018 European Journal of Human Resource Management Studies

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

The research works published in this journal are free to be accessed. They can be shared (copied and redistributed in any medium or format) and\or adapted (remixed, transformed, and built upon the material for any purpose, commercially and\or not commercially) under the following terms: attribution (appropriate credit must be given indicating original authors, research work name and publication name mentioning if changes were made) and without adding additional restrictions (without restricting others from doing anything the actual license permits). Authors retain the full copyright of their published research works and cannot revoke these freedoms as long as the license terms are followed.

Copyright © 2017-2023. European Journal Of Human Resource Management Studies (ISSN 2601-1972) is a registered trademark. All rights reserved.

This journal is a serial publication uniquely identified by an International Standard Serial Number (ISSN) serial number certificate issued by Romanian National Library. All the research works are uniquely identified by a CrossRef DOI digital object identifier supplied by indexing and repository platforms. All the research works published on this journal are meeting the Open Access Publishing requirements and standards formulated by Budapest Open Access Initiative (2002), the Bethesda Statement on Open Access Publishing (2003) and  Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities (2003) and can be freely accessed, shared, modified, distributed and used in educational, commercial and non-commercial purposes under a Creative Commons Attribution 4.0 International License. Copyrights of the published research works are retained by authors.


Hit counter