Browse Definitions :
Definition

goldbricking

Goldbricking is wasting time on the job. 

In an office environment, employees typically waste time on the Internet, a variation of goldbricking known as cyberslacking or cyberloafing. The growing prevalence of computer-related jobs, faster Internet speeds and social networking have all contributed to the growth of cyberslacking, which is estimated to cost businesses multiple billions of dollars per year. Approaches to reducing cyberslacking and improving productivity include limiting Internet access, having employees agree to acceptable use policies (AUP) and establishing results-only work environments (ROWE). 

On the other hand, some people claim that a certain amount of cyberslacking actually increases productivity because it provides employees with a break from mundane work, to which they can subsequently return in a refreshed state of mind. 

The term goldbricking originates from a saying of the late 19th century, "sell (someone) a gold brick," meaning to swindle them. In 1879, N. D. Clark, president of the First National Bank of Ravenna, Ohio, was sold a 52-pound brick, purported by the miner selling it to be gold. Clark had a corner of the brick sawed off and, since it appeared to be gold, advanced the miner $10,000. He also demanded that the seller accompanies him by train to Chicago with the brick for the balance. In Chicago, however, Clark found that the miner had disembarked en route. The brick was found to be gold only on the corners. 

The modern sense of goldbricking as loafing became popular in the United States Army in the mid-20th century and has since expanded into the general population. Goldbricking became more widely used in 2013 when Yahoo CEO Marissa Mayer banned telecommuting because remote employees were not logging into the corporate network frequently enough. 

See also: Hawthorne effect

This was last updated in July 2014

Continue Reading About goldbricking

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close