888.678.7282    Get SUPPORT

Strata Information Technology Blog

Giving Your Employees Too Much Time Can Also Hurt Productivity

Giving Your Employees Too Much Time Can Also Hurt Productivity

“Half the time men think they are talking business, they are wasting time.” - E.W. Howe

Do you know how much time is wasted in your business? Despite the appearance your employees may have of busy productivity, a study from the Harvard Business School strongly suggests otherwise. How is this possible, and how can it be fixed? Let’s find out.

Brace yourself…
According to this study, employers lose $100 billion each year to time that employees spend idle in the office. This came as a surprise to the researchers, Professor Teresa Amabile and Professor Andrew Brodsky, who expected a significant loss to idle time, but did not expect such a large sum to be lost to idle time.

For clarification, in this case, idle time is time during which an employee is ready and available to work, but something is preventing them from being productive. Causes of this kind of idle time can range from poor task allocation, built-in access capacity to protect against a sudden uptick in work, to simple equipment management and availability.

As a part of their research, Amabile and Brodsky ran a series of experiments to test the effects of being idle. Having their subjects copy over sentences (including typos) with no access to the Internet or phones, they discovered that the participants would draw out their task to fit the time they had to spend to avoid just idly sitting there. However, if the participants were able to surf the Internet once their task was completed, their task was completed much more quickly, without any more errors than the other trial indicated. Going slower didn’t lead to any fewer errors, either - the same tasks just took longer. The researchers called this tendency to slow down the “deadtime effect,” contrasting the “deadline effect” that causes an increase in productivity as a deadline approaches.

Fighting This
Based on their research, Amabile and Brodsky came to the conclusion that some strategic “leisure” time (like the time that could be spent surfing the Internet in their trials) could help prevent the negative influence that idle time could bring to a workplace. By promoting transparency and basing the evaluation of their employees on outcomes, managers could allow employees to take some leisure time... and still benefit from it themselves.

In addition to increasing the productivity of their employees by adding a bit of incentive, management could be given a better idea of how long a task should take. As a result, they could more efficiently allocate and schedule their employees’ time, allowing the employees to accomplish more throughout their day without sacrificing the quality of the end result.

How have you improved productivity in the workspace? Let us know in the comments, and take a second to subscribe to our blog!

Tip of the Week: Outlook’s Tools
Cloud System Security Can Be Tricky


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 16 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Managed IT Services Privacy Cloud Network Security Malware Internet Cybersecurity Hackers Tech Term User Tips Backup Communications Ransomware Outsourced IT IT Support VoIP Microsoft Software Productivity Business Management Efficiency Smartphones Productivity Alert Passwords Browser Data Recovery Google Network Data Backup Social Media Business Hardware Windows 10 Email Data Communication IT Services Small Business Cloud Computing Users Save Money Hosted Solutions Smartphone Mobile Device Holiday Phishing Microsoft Office App Bandwidth Twitter Miscellaneous Saving Money Vulnerability Internet of Things Business Continuity Access Control Apps Android Data Breach Collaboration Workplace Tips Excel Cybercrime Blockchain Office 365 Government Company Culture Innovation Politics Patch Management Wireless Settings Mobile Device Management Compliance Law Enforcement Wi-Fi Applications Networking Computer Workers Employer-Employee Relationship Remote Monitoring Scam BDR Personal Information BYOD Vendor Management Automation Website SaaS Computers Remote Monitoring and Management Windows Spam Mobile Devices Managed IT Service Chrome Antivirus Dark Web Managing Stress Entertainment Facebook Virus Recovery Information Word Maintenance Password Virtual Assistant Education Retail Connectivity Marketing How To Office Yahoo HP Mobility Net Neutrality CrashOverride Data loss Microsoft Office 365 Telephone System WannaCry Profitability Sales Medical IT Streaming Media Travel Disaster Recovery WiFi Gaming Console Proactive IT Physical Security Hard Drives Technology Tips VoIPSavings Hybrid Cloud DDoS Analytics Document Management Database Training Router Content Filtering Staff Authentication RAM HIPAA Eliminating Downtime Tablet Scalability Phone System GDPR Downloads Upgrade Live Streaming Telephone Systems Data Protection Dark Data Video Games Google Maps Files Avoiding Downtime Backup and Disaster Recovery Update Cables Remote Support Hard Drive IaaS Paperless Office Tactics Security Cameras Gmail Worker Websites Authorization Microsoft Teams Information Technology e-waste Wireless Internet Knowledge Credit Cards Artificial Intelligence Storage Trends WhatsApp Wireless Charging Cortana Television Remote Control Unified Threat Management Staffing IT budget PowerPoint Smart Technology SSD Technology Efficiently Voice over Internet Protocol Processors HaaS Printer Server Digital Internet Explorer Managed Service Provider Cost Management Printer Two-factor Authentication Biometrics disposal Help Desk Comparison Managed IT Gadget Error A.I. Lead Generation Botnet VPN IT Management Regulation Sports Emergency Telephony Hiring/Firing Employer Employee Relationship Business Intelligence Inventory Outlook Apple Cleaning Printers Edge Threat Dongle Troubleshooting Tech Support Battery Leadership Data Management Access Spyware Value Certification Safety Multi-Factor Security Specifications Encryption Current Events Shortcut Touchscreen Movies News Email Management Tech Terms Reporting The Internet of Things Licensing Voice over IP Automobile Managed Service Amazon iPhone Computer Care Synergy Plug-In VoIPMyths Bring Your Own Device Gadgets Budget Competition Conferencing Unified Communications Customer Relationship Management Operating System IP Address Autocorrect Network Attached Storage Big Data eCommerce Virtualization Paper Telecommuting Hosted Solution Search Scheduling Customer Service Environment Mobile Office Server Management Online Shopping Server Emoji Ink Domains Millennials Copy Instagram Windows 10 Google Drive Money VoIP Samsung File Sharing Public Speaking IT Support Paste Wearables Presentation User Tip Quick Tips Lithium-ion battery Machine Learning Spam Blocking User Security Managed IT Services Augmented Reality Healthcare Wireless Technology 5G Tip of the week G Suite Fun Telecommute IBM Hacker Business Technology Mobile Security Laptop Printing Remote Computing

Newsletter Sign Up