Why do I take deviant disclosure behavior on internet platforms? An explanation based on the neutralization theory
暂无分享,去创建一个
Kai Li | Cheng Zhou | Xiaofei Zhang | Xiaofei Zhang | Kai Li | Cheng Zhou
[1] James C. McElroy,et al. The influence of personality on Facebook usage, wall postings, and regret , 2012, Comput. Hum. Behav..
[2] Terry S. Overton,et al. Estimating Nonresponse Bias in Mail Surveys , 1977 .
[3] Chunxiao Yin,et al. Reposting negative information on microblogs: Do personality traits matter? , 2020, Inf. Process. Manag..
[4] Ching-I Teng,et al. Voluntary sharing and mandatory provision: Private information disclosure on social networking sites , 2020, Inf. Process. Manag..
[5] Girish N. Punj. Consumer intentions to falsify personal information online: unethical or justifiable? , 2017 .
[6] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[7] H. Raghav Rao,et al. Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing , 2013, Decis. Support Syst..
[8] PERSONALITY FACTORS AS PREDICTOR OF WORKPLACE DEVIANT BEHAVIOR AMONG CIVIL SERVANTS , 2017 .
[9] Merrill Warkentin,et al. Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives , 2018, Inf. Syst. J..
[10] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[11] Markus Salo,et al. Social media overload, exhaustion, and use discontinuance: Examining the effects of information overload, system feature overload, and social overload , 2020, Inf. Process. Manag..
[12] Detmar W. Straub,et al. Common Beliefs and Reality About PLS , 2014 .
[13] Weina Qu,et al. Personality expression in Chinese language use , 2017, International journal of psychology : Journal international de psychologie.
[14] Sumeet Gupta,et al. Disclosure Intention of Location-Related Information in Location-Based Social Network Services , 2012, Int. J. Electron. Commer..
[15] L. Pulkkinen,et al. Extraversion and Neuroticism as antecedents of emotion regulation and dysregulation in adulthood , 2001 .
[16] Tommy K. H. Chan,et al. Cyberbullying on Social Networking Sites: The Crime Opportunity and Affordance Perspectives , 2019, J. Manag. Inf. Syst..
[17] Dorothy E. Leidner,et al. From improper to acceptable: How perpetrators neutralize workplace bullying behaviors in the cyber world , 2018, Inf. Manag..
[18] Mikko T. Siponen,et al. New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs , 2012, Inf. Manag..
[19] Eleanor T. Loiacono-Mello. Self-Disclosure Behavior on Social Networking Web Sites , 2014, Int. J. Electron. Commer..
[20] Birgit Renzl,et al. Personality traits and knowledge sharing , 2008 .
[21] Tawfiq Alashoor,et al. Familiarity with Big Data, Privacy Concerns, and Self-disclosure Accuracy in Social Networking Websites: An APCO Model , 2017, Commun. Assoc. Inf. Syst..
[22] Sung S. Kim,et al. Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..
[23] Zhangxi Lin,et al. An empirical analysis of users' privacy disclosure behaviors on social network sites , 2015, Inf. Manag..
[24] Hock-Hai Teo,et al. Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012, Inf. Syst. Res..
[25] R. Bies,et al. Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .
[26] R. A. Dodder,et al. techniques of neutralization used by deer poachers in the western united states: a research note , 1999 .
[27] Merrill Warkentin,et al. How do you feel about your friends? Understanding situational envy in online social networks , 2017, Inf. Manag..
[28] Dimitrios Buhalis,et al. National park visitors' car-use intention: A norm-neutralization model , 2018, Tourism Management.
[29] D. Ones,et al. Interpersonal deviance, organizational deviance, and their common correlates: a review and meta-analysis. , 2007, The Journal of applied psychology.
[30] Lars Penke,et al. Motivational individual reaction norms underlying the Five-Factor model of personality: First steps towards a theory-based conceptual framework , 2008 .
[31] Samuel D. Gosling,et al. Manifestations of Personality in Online Social Networks: Self-Reported Facebook-Related Behaviors and Observable Profile Information , 2011, Cyberpsychology Behav. Soc. Netw..
[32] S. Safin,et al. The Relationship of Big Five Personality Traits on Counterproductive Work Behaviour among Hotel Employees: An Exploratory Study , 2013 .
[33] T. Priest,et al. TECHNIQUES OF NEUTRALIZATION: YOUNG ADULT MARIJUANA SMOKERS , 1970 .
[34] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[35] S. Vitell. A Case for Consumer Social Responsibility (CnSR): Including a Selected Review of Consumer Ethics/Social Responsibility Research , 2015 .
[36] Francis Bloch,et al. Taxation and Privacy Protection on Internet Platforms , 2016 .
[37] David Gefen,et al. Do context and personality matter? Trust and privacy concerns in disclosing private information online , 2016, Inf. Manag..
[38] Richard N. Landers,et al. An investigation of Big Five and narrow personality traits in relation to Internet usage , 2006, Comput. Hum. Behav..
[39] Vivien K. G. Lim,et al. Moderating Effects of Extroversion and Neuroticism on Sleep Deprivation and Cyberloafing , 2010, PACIS.
[40] E. Chang,et al. Dispositional optimism and primary and secondary appraisal of a stressor: Controlling for confounding influences and relations to coping and psychological and physical adjustment. , 1998 .
[41] F. Mukhametzyanova,et al. Interrelation of Social and Psychological Adaptation and Tendency to Deviant Behavior of Students , 2014 .
[42] Seyed Hossein Siadat,et al. How social influence and personality affect users' social network fatigue and discontinuance behavior , 2018, Aslib J. Inf. Manag..
[43] Dennis E. Garrett,et al. Issues management and organizational accounts: An analysis of corporate responses to accusations of unethical business practices , 1989 .
[44] Miriam Liss,et al. Extraversion, neuroticism, attachment style and fear of missing out as predictors of social media use and addiction , 2017 .
[45] Zulkarnain Lubis,et al. Personality Traits and Counterproductive Work Behavior: Moderator Effect of Perceived Organizational Support , 2016 .
[46] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .
[47] W. W. Minor,et al. Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .
[48] D. Straub,et al. Editor's comments: a critical look at the use of PLS-SEM in MIS quarterly , 2012 .
[49] Yunhwan Kim,et al. Using computer vision techniques on Instagram to link users' personalities and genders to the features of their photos: An exploratory study , 2018, Inf. Process. Manag..
[50] C. Carver,et al. Personality and coping. , 2020, Annual review of psychology.
[51] Kyung-shick Choi,et al. Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory , 2017, Comput. Hum. Behav..
[52] Donald L. Mccabe. The Influence of Situational Ethics on Cheating Among College Students , 1992 .
[53] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[54] Mo B. Khan,et al. The underlying mechanism between perceived organizational injustice and deviant workplace behaviors: Moderating role of personality traits , 2019, Asia Pacific Management Review.
[55] Mustafa Eskisu,et al. An investigation of the relationship between Facebook usage, Big Five, self-esteem and narcissism , 2017, Comput. Hum. Behav..
[56] Qing Hu,et al. Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..
[57] Saonee Sarker,et al. Understanding factors affecting users' social networking site continuance: A gender difference perspective , 2017, Inf. Manag..
[58] P. Bentler,et al. Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .
[59] Kyung Kyu Kim,et al. Information and communication technology overload and social networking service fatigue: A stress perspective , 2016, Comput. Hum. Behav..
[60] Jörg Henseler,et al. Consistent and asymptotically normal PLS estimators for linear structural equations , 2014 .
[61] Munmun De Choudhury,et al. Gender and Cross-Cultural Differences in Social Media Disclosures of Mental Illness , 2017, CSCW.
[62] A.-Reum Jung,et al. The influence of perceived ad relevance on social media advertising: An empirical examination of a mediating role of privacy concern , 2017, Comput. Hum. Behav..
[63] Janet Sternberg,et al. Managing deviant behavior in online communities , 2006, CHI EA '06.
[64] V. M. Lun,et al. Elaborating on the effect of culture on the relations of extraversion and neuroticism to life satisfaction , 2019, Personality and Individual Differences.
[65] Sonia Livingstone,et al. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..
[66] Michael B. Blankenship,et al. examining the role of differential association and techniques of neutralization in explaining corporate crime , 2005 .
[67] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[68] Yair Amichai-Hamburger,et al. Social network use and personality , 2010, Comput. Hum. Behav..
[69] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .
[70] Andrea Back,et al. A new perspective on neutralization and deterrence: Predicting shadow IT usage , 2017, Inf. Manag..
[71] Ken Kwong-Kay Wong,et al. Partial Least Squares Structural Equation Modeling (PLS-SEM) Techniques Using SmartPLS , 2013 .
[72] Daniel Heller,et al. Five-factor model of personality and job satisfaction: a meta-analysis. , 2002, The Journal of applied psychology.
[73] Mathupayas Thongmak. ETHICS, NEUTRALIZATION, AND DIGITAL PIRACY , 2017 .
[74] Detmar W. Straub,et al. Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures , 2020, Inf. Manag..
[75] Ivan-Damir Anic,et al. The determinants and effects of online privacy concerns in the context of e-commerce , 2019, Electron. Commer. Res. Appl..
[76] Stefano Taddei,et al. Privacy, trust and control: Which relationships with online self-disclosure? , 2013, Comput. Hum. Behav..
[77] Xiaolei Diao,et al. A sentiment-aware deep learning approach for personality detection from text , 2021, Inf. Process. Manag..
[78] G. Knežević,et al. Does Eysenck's personality model capture psychosis-proneness? A systematic review and meta-analysis , 2019, Personality and Individual Differences.
[79] L. A. Witt,et al. The Interactive Effects of Extraversion and Conscientiousness on Performance , 2002 .
[80] Wenli Li,et al. Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory , 2014, Comput. Hum. Behav..
[81] Shwadhin Sharma,et al. I want it my way: Using consumerism and neutralization theory to understand students' cyberslacking behavior , 2020, Int. J. Inf. Manag..
[82] R. McCrae,et al. An introduction to the five-factor model and its applications. , 1992, Journal of personality.
[83] Hong Zhang,et al. The impacts of technological environments and co-creation experiences on customer participation , 2015, Inf. Manag..
[84] Claudia Wilhelm. Investigating Neutralization Strategies in Digital Piracy: The Role of Content Preferences and Social Norms , 2020 .
[85] H. Jeff Smith,et al. Falsifying and withholding: exploring individuals' contextual privacy-related decision-making , 2019, Inf. Manag..
[86] Jian Mou,et al. Social media fatigue -Technological antecedents and the moderating roles of personality traits: The case of WeChat , 2019, Comput. Hum. Behav..
[87] Hatice Yildiz Durak,et al. Examination of the Relationship between Cyberbullying and Cyber Victimization , 2020, Journal of Child and Family Studies.
[88] Li Wang,et al. NEUROTICISM, EXTRAVERSION, EMOTION REGULATION, NEGATIVE AFFECT AND POSITIVE AFFECT: THE MEDIATING ROLES OF REAPPRAISAL AND SUPPRESSION , 2009 .
[89] Geoffrey S. Hubona,et al. Using PLS path modeling in new technology research: updated guidelines , 2016, Ind. Manag. Data Syst..
[90] R. Krueger,et al. Genetic and environmental structure of adjectives describing the domains of the Big Five Model of personality: A nationwide US twin study , 2004 .
[91] Paul Benjamin Lowry,et al. Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..
[92] Robert F. Easley,et al. Research Note - How Does Personality Matter? Relating the Five-Factor Model to Technology Acceptance and Use , 2008, Inf. Syst. Res..
[93] Pei-Lee Teh,et al. Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization , 2019, Inf. Manag..
[94] Merrill Warkentin,et al. Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..
[95] Kuanchin Chen,et al. Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques , 2004, J. Comput. Inf. Syst..
[96] Izak Benbasat,et al. Research Note - Why Following Friends Can Hurt You: An Exploratory Investigation of the Effects of Envy on Social Networking Sites among College-Age Users , 2015, Inf. Syst. Res..
[97] C. Fornell,et al. Evaluating Structural Equation Models with Unobservable Variables and Measurement Error , 1981 .
[98] Grant Blank,et al. A New Privacy Paradox: Young People and Privacy on Social Network Sites , 2014 .
[99] Jun Yao,et al. To disclose or to falsify: The effects of cognitive trust and affective trust on customer cooperation in contact tracing , 2021, International journal of hospitality management.
[100] Umair Akram,et al. Why people need privacy? The role of privacy fatigue in app users' intention to disclose privacy: based on personality traits , 2020, J. Enterp. Inf. Manag..
[101] Norman A. Johnson,et al. Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..
[102] H. E. Tinsley,et al. Uses of factor analysis in counseling psychology research. , 1987 .
[103] Chijioke Dike Uba,et al. Understanding engagement and disengagement from pro-environmental behaviour: the role of neutralization and affirmation techniques in maintaining persistence in and desistance from car use , 2016 .
[104] Erik Cambria,et al. Deep Learning-Based Document Modeling for Personality Detection from Text , 2017, IEEE Intelligent Systems.