Skip to main content

赶紧给你老板看看--上网闲逛有助提高工作效率

别再为上班时间上网闲逛羞愧啦──有研究称这样会提高工作效率呢。

根据一项新研究,上网闲逛真的可以让困乏的员工精神振奋、工作效率提高,而且比起其他诸如打私人电话、发短信和邮件效果都好,比起一直埋头苦干更是好多了。

这项研究名为“工作时间上网闲逛的心理影响”(Impact of Cyberloafing on Psychological Engagement),研究人员是新加坡国立大学(National University of Singapore)的唐·陈(Don J.Q. Chen)和薇薇安·林(Vivien K.G Lim)。该报告近期在美国德克萨斯州圣安东尼奥(San Antonio)举行的管理学学会(Academy of Management)年会上被宣读,该学会是一个由管理学学者组成的社团。

研究人员做了两项调研。在第一项调研中,他们将96名管理学本科生分成三组──一个参照组,一个“休息”组和一个上网闲逛组。所有人都被要求在20分钟内在一篇范文里划出尽可能多的字母“e”。接下来10分钟里,参照组被安排去做另一项简单的任务;休息组除了上网闲逛想做什么都可以;第三组的人则上网闲逛。接下来,所有参与者再花10分钟找出更多的字母“e”。

研究人员发现,在最后10分钟内,上网闲逛组比起另外两组工作效率更高,而且出现精神疲倦和厌烦情绪的比例更小,参与的热情也更高。

报告中称,“上网闲逛对于恢复活力起到了重要的作用。”比起来,发私人邮件则尤其容易让员工分心。

第二项调研有191名成人参与,结果与第一项调研类似。

为什么上网闲逛能比回封朋友的邮件更能让人恢复活力呢?林博士在一封邮件中写道,上网闲逛的时候,人们“通常会选择去看自己喜欢的网站──就像去喝杯咖啡或是吃点零食一样。这样的休息让人身心愉快,活力得以恢复。”她补充说,然而,员工并不能控制自己会收到什么样的邮件,读邮件和回邮件“比起上网闲逛要求你付出更多的精力,因为你得留意邮件里写了什么。”

由于上网闲逛能提高工作效率,因此两位研究者建议雇主不要对下属的上网活动要求太过苛刻。他们建议允许员工有节制地上网看看自己喜欢的东西,“因为这样对员工的工作效率会产生积极的作用,”不过对员工处理私人邮件则要加以限制。

Rachel Emma Silverman

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...