Browse Definitions :
Definition

goldbricking

Contributor(s): Ivy Wigmore

Goldbricking is wasting time on the job. 

In an office environment, employees typically waste time on the Internet, a variation of goldbricking known as cyberslacking or cyberloafing. The growing prevalence of computer-related jobs, faster Internet speeds and social networking have all contributed to the growth of cyberslacking, which is estimated to cost businesses multiple billions of dollars per year. Approaches to reducing cyberslacking and improving productivity include limiting Internet access, having employees agree to acceptable use policies (AUP) and establishing results-only work environments (ROWE). 

On the other hand, some people claim that a certain amount of cyberslacking actually increases productivity because it provides employees with a break from mundane work, to which they can subsequently return in a refreshed state of mind. 

The term goldbricking originates from a saying of the late 19th century, "sell (someone) a gold brick," meaning to swindle them. In 1879, N. D. Clark, president of the First National Bank of Ravenna, Ohio, was sold a 52-pound brick, purported by the miner selling it to be gold. Clark had a corner of the brick sawed off and, since it appeared to be gold, advanced the miner $10,000. He also demanded that the seller accompanies him by train to Chicago with the brick for the balance. In Chicago, however, Clark found that the miner had disembarked en route. The brick was found to be gold only on the corners. 

The modern sense of goldbricking as loafing became popular in the United States Army in the mid-20th century and has since expanded into the general population. Goldbricking became more widely used in 2013 when Yahoo CEO Marissa Mayer banned telecommuting because remote employees were not logging into the corporate network frequently enough. 

See also: Hawthorne effect

This was last updated in July 2014

Continue Reading About goldbricking

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close