Browse Definitions :
Definition

social loafing

Social loafing is a reduction of individual effort that tends to occur when people work in groups. Although people vary in their tendency to take responsibility, most assume that others on a team will do the bulk of the work. Furthermore, the more "others" there are in a group, the less the individual members feel they must take responsibility for the given tasks.

Overcoming these issues can be difficult, not least because social loafing is often unconscious: team members typically tend to believe that they’re working to capacity. Social loafing is one of two main factors behind the Ringelmann effect, which describes a reduction in group efficiency that occurs as the size of a work group increases. The other factor is the decrease in efficiency created by ineffective coordination of efforts and tasks among individual team members.

Project management experts recommend a number of tactics to prevent social loafing:

  • Make individual efforts detectable and quantifiable, through measures such as reporting.
  • Encourage competition among team members.
  • If possible, break the work into separate tasks that specific individuals are responsible for. 
  • Emphasize the importance of each person’s effort.
  • Establish clear goals and monitor progress toward them.
  • Decrease team sizes.
This was last updated in January 2019

Continue Reading About social loafing

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close