Why do I take deviant disclosure behavior on internet platforms? An explanation based on the neutralization theory

[1]  James C. McElroy,et al.  The influence of personality on Facebook usage, wall postings, and regret , 2012, Comput. Hum. Behav..

[2]  Terry S. Overton,et al.  Estimating Nonresponse Bias in Mail Surveys , 1977 .

[3]  Chunxiao Yin,et al.  Reposting negative information on microblogs: Do personality traits matter? , 2020, Inf. Process. Manag..

[4]  Ching-I Teng,et al.  Voluntary sharing and mandatory provision: Private information disclosure on social networking sites , 2020, Inf. Process. Manag..

[5]  Girish N. Punj Consumer intentions to falsify personal information online: unethical or justifiable? , 2017 .

[6]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[7]  H. Raghav Rao,et al.  Privacy preserving actions of older adults on social media: Exploring the behavior of opting out of information sharing , 2013, Decis. Support Syst..

[8]  PERSONALITY FACTORS AS PREDICTOR OF WORKPLACE DEVIANT BEHAVIOR AMONG CIVIL SERVANTS , 2017 .

[9]  Merrill Warkentin,et al.  Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives , 2018, Inf. Syst. J..

[10]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[11]  Markus Salo,et al.  Social media overload, exhaustion, and use discontinuance: Examining the effects of information overload, system feature overload, and social overload , 2020, Inf. Process. Manag..

[12]  Detmar W. Straub,et al.  Common Beliefs and Reality About PLS , 2014 .

[13]  Weina Qu,et al.  Personality expression in Chinese language use , 2017, International journal of psychology : Journal international de psychologie.

[14]  Sumeet Gupta,et al.  Disclosure Intention of Location-Related Information in Location-Based Social Network Services , 2012, Int. J. Electron. Commer..

[15]  L. Pulkkinen,et al.  Extraversion and Neuroticism as antecedents of emotion regulation and dysregulation in adulthood , 2001 .

[16]  Tommy K. H. Chan,et al.  Cyberbullying on Social Networking Sites: The Crime Opportunity and Affordance Perspectives , 2019, J. Manag. Inf. Syst..

[17]  Dorothy E. Leidner,et al.  From improper to acceptable: How perpetrators neutralize workplace bullying behaviors in the cyber world , 2018, Inf. Manag..

[18]  Mikko T. Siponen,et al.  New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs , 2012, Inf. Manag..

[19]  Eleanor T. Loiacono-Mello Self-Disclosure Behavior on Social Networking Web Sites , 2014, Int. J. Electron. Commer..

[20]  Birgit Renzl,et al.  Personality traits and knowledge sharing , 2008 .

[21]  Tawfiq Alashoor,et al.  Familiarity with Big Data, Privacy Concerns, and Self-disclosure Accuracy in Social Networking Websites: An APCO Model , 2017, Commun. Assoc. Inf. Syst..

[22]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[23]  Zhangxi Lin,et al.  An empirical analysis of users' privacy disclosure behaviors on social network sites , 2015, Inf. Manag..

[24]  Hock-Hai Teo,et al.  Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services , 2012, Inf. Syst. Res..

[25]  R. Bies,et al.  Consumer Privacy: Balancing Economic and Justice Considerations , 2003 .

[26]  R. A. Dodder,et al.  techniques of neutralization used by deer poachers in the western united states: a research note , 1999 .

[27]  Merrill Warkentin,et al.  How do you feel about your friends? Understanding situational envy in online social networks , 2017, Inf. Manag..

[28]  Dimitrios Buhalis,et al.  National park visitors' car-use intention: A norm-neutralization model , 2018, Tourism Management.

[29]  D. Ones,et al.  Interpersonal deviance, organizational deviance, and their common correlates: a review and meta-analysis. , 2007, The Journal of applied psychology.

[30]  Lars Penke,et al.  Motivational individual reaction norms underlying the Five-Factor model of personality: First steps towards a theory-based conceptual framework , 2008 .

[31]  Samuel D. Gosling,et al.  Manifestations of Personality in Online Social Networks: Self-Reported Facebook-Related Behaviors and Observable Profile Information , 2011, Cyberpsychology Behav. Soc. Netw..

[32]  S. Safin,et al.  The Relationship of Big Five Personality Traits on Counterproductive Work Behaviour among Hotel Employees: An Exploratory Study , 2013 .

[33]  T. Priest,et al.  TECHNIQUES OF NEUTRALIZATION: YOUNG ADULT MARIJUANA SMOKERS , 1970 .

[34]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[35]  S. Vitell A Case for Consumer Social Responsibility (CnSR): Including a Selected Review of Consumer Ethics/Social Responsibility Research , 2015 .

[36]  Francis Bloch,et al.  Taxation and Privacy Protection on Internet Platforms , 2016 .

[37]  David Gefen,et al.  Do context and personality matter? Trust and privacy concerns in disclosing private information online , 2016, Inf. Manag..

[38]  Richard N. Landers,et al.  An investigation of Big Five and narrow personality traits in relation to Internet usage , 2006, Comput. Hum. Behav..

[39]  Vivien K. G. Lim,et al.  Moderating Effects of Extroversion and Neuroticism on Sleep Deprivation and Cyberloafing , 2010, PACIS.

[40]  E. Chang,et al.  Dispositional optimism and primary and secondary appraisal of a stressor: Controlling for confounding influences and relations to coping and psychological and physical adjustment. , 1998 .

[41]  F. Mukhametzyanova,et al.  Interrelation of Social and Psychological Adaptation and Tendency to Deviant Behavior of Students , 2014 .

[42]  Seyed Hossein Siadat,et al.  How social influence and personality affect users' social network fatigue and discontinuance behavior , 2018, Aslib J. Inf. Manag..

[43]  Dennis E. Garrett,et al.  Issues management and organizational accounts: An analysis of corporate responses to accusations of unethical business practices , 1989 .

[44]  Miriam Liss,et al.  Extraversion, neuroticism, attachment style and fear of missing out as predictors of social media use and addiction , 2017 .

[45]  Zulkarnain Lubis,et al.  Personality Traits and Counterproductive Work Behavior: Moderator Effect of Perceived Organizational Support , 2016 .

[46]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .

[47]  W. W. Minor,et al.  Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .

[48]  D. Straub,et al.  Editor's comments: a critical look at the use of PLS-SEM in MIS quarterly , 2012 .

[49]  Yunhwan Kim,et al.  Using computer vision techniques on Instagram to link users' personalities and genders to the features of their photos: An exploratory study , 2018, Inf. Process. Manag..

[50]  C. Carver,et al.  Personality and coping. , 2020, Annual review of psychology.

[51]  Kyung-shick Choi,et al.  Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory , 2017, Comput. Hum. Behav..

[52]  Donald L. Mccabe The Influence of Situational Ethics on Cheating Among College Students , 1992 .

[53]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[54]  Mo B. Khan,et al.  The underlying mechanism between perceived organizational injustice and deviant workplace behaviors: Moderating role of personality traits , 2019, Asia Pacific Management Review.

[55]  Mustafa Eskisu,et al.  An investigation of the relationship between Facebook usage, Big Five, self-esteem and narcissism , 2017, Comput. Hum. Behav..

[56]  Qing Hu,et al.  Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..

[57]  Saonee Sarker,et al.  Understanding factors affecting users' social networking site continuance: A gender difference perspective , 2017, Inf. Manag..

[58]  P. Bentler,et al.  Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .

[59]  Kyung Kyu Kim,et al.  Information and communication technology overload and social networking service fatigue: A stress perspective , 2016, Comput. Hum. Behav..

[60]  Jörg Henseler,et al.  Consistent and asymptotically normal PLS estimators for linear structural equations , 2014 .

[61]  Munmun De Choudhury,et al.  Gender and Cross-Cultural Differences in Social Media Disclosures of Mental Illness , 2017, CSCW.

[62]  A.-Reum Jung,et al.  The influence of perceived ad relevance on social media advertising: An empirical examination of a mediating role of privacy concern , 2017, Comput. Hum. Behav..

[63]  Janet Sternberg,et al.  Managing deviant behavior in online communities , 2006, CHI EA '06.

[64]  V. M. Lun,et al.  Elaborating on the effect of culture on the relations of extraversion and neuroticism to life satisfaction , 2019, Personality and Individual Differences.

[65]  Sonia Livingstone,et al.  Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..

[66]  Michael B. Blankenship,et al.  examining the role of differential association and techniques of neutralization in explaining corporate crime , 2005 .

[67]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[68]  Yair Amichai-Hamburger,et al.  Social network use and personality , 2010, Comput. Hum. Behav..

[69]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[70]  Andrea Back,et al.  A new perspective on neutralization and deterrence: Predicting shadow IT usage , 2017, Inf. Manag..

[71]  Ken Kwong-Kay Wong,et al.  Partial Least Squares Structural Equation Modeling (PLS-SEM) Techniques Using SmartPLS , 2013 .

[72]  Daniel Heller,et al.  Five-factor model of personality and job satisfaction: a meta-analysis. , 2002, The Journal of applied psychology.

[73]  Mathupayas Thongmak ETHICS, NEUTRALIZATION, AND DIGITAL PIRACY , 2017 .

[74]  Detmar W. Straub,et al.  Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures , 2020, Inf. Manag..

[75]  Ivan-Damir Anic,et al.  The determinants and effects of online privacy concerns in the context of e-commerce , 2019, Electron. Commer. Res. Appl..

[76]  Stefano Taddei,et al.  Privacy, trust and control: Which relationships with online self-disclosure? , 2013, Comput. Hum. Behav..

[77]  Xiaolei Diao,et al.  A sentiment-aware deep learning approach for personality detection from text , 2021, Inf. Process. Manag..

[78]  G. Knežević,et al.  Does Eysenck's personality model capture psychosis-proneness? A systematic review and meta-analysis , 2019, Personality and Individual Differences.

[79]  L. A. Witt,et al.  The Interactive Effects of Extraversion and Conscientiousness on Performance , 2002 .

[80]  Wenli Li,et al.  Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory , 2014, Comput. Hum. Behav..

[81]  Shwadhin Sharma,et al.  I want it my way: Using consumerism and neutralization theory to understand students' cyberslacking behavior , 2020, Int. J. Inf. Manag..

[82]  R. McCrae,et al.  An introduction to the five-factor model and its applications. , 1992, Journal of personality.

[83]  Hong Zhang,et al.  The impacts of technological environments and co-creation experiences on customer participation , 2015, Inf. Manag..

[84]  Claudia Wilhelm Investigating Neutralization Strategies in Digital Piracy: The Role of Content Preferences and Social Norms , 2020 .

[85]  H. Jeff Smith,et al.  Falsifying and withholding: exploring individuals' contextual privacy-related decision-making , 2019, Inf. Manag..

[86]  Jian Mou,et al.  Social media fatigue -Technological antecedents and the moderating roles of personality traits: The case of WeChat , 2019, Comput. Hum. Behav..

[87]  Hatice Yildiz Durak,et al.  Examination of the Relationship between Cyberbullying and Cyber Victimization , 2020, Journal of Child and Family Studies.

[88]  Li Wang,et al.  NEUROTICISM, EXTRAVERSION, EMOTION REGULATION, NEGATIVE AFFECT AND POSITIVE AFFECT: THE MEDIATING ROLES OF REAPPRAISAL AND SUPPRESSION , 2009 .

[89]  Geoffrey S. Hubona,et al.  Using PLS path modeling in new technology research: updated guidelines , 2016, Ind. Manag. Data Syst..

[90]  R. Krueger,et al.  Genetic and environmental structure of adjectives describing the domains of the Big Five Model of personality: A nationwide US twin study , 2004 .

[91]  Paul Benjamin Lowry,et al.  Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..

[92]  Robert F. Easley,et al.  Research Note - How Does Personality Matter? Relating the Five-Factor Model to Technology Acceptance and Use , 2008, Inf. Syst. Res..

[93]  Pei-Lee Teh,et al.  Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization , 2019, Inf. Manag..

[94]  Merrill Warkentin,et al.  Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..

[95]  Kuanchin Chen,et al.  Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques , 2004, J. Comput. Inf. Syst..

[96]  Izak Benbasat,et al.  Research Note - Why Following Friends Can Hurt You: An Exploratory Investigation of the Effects of Envy on Social Networking Sites among College-Age Users , 2015, Inf. Syst. Res..

[97]  C. Fornell,et al.  Evaluating Structural Equation Models with Unobservable Variables and Measurement Error , 1981 .

[98]  Grant Blank,et al.  A New Privacy Paradox: Young People and Privacy on Social Network Sites , 2014 .

[99]  Jun Yao,et al.  To disclose or to falsify: The effects of cognitive trust and affective trust on customer cooperation in contact tracing , 2021, International journal of hospitality management.

[100]  Umair Akram,et al.  Why people need privacy? The role of privacy fatigue in app users' intention to disclose privacy: based on personality traits , 2020, J. Enterp. Inf. Manag..

[101]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[102]  H. E. Tinsley,et al.  Uses of factor analysis in counseling psychology research. , 1987 .

[103]  Chijioke Dike Uba,et al.  Understanding engagement and disengagement from pro-environmental behaviour: the role of neutralization and affirmation techniques in maintaining persistence in and desistance from car use , 2016 .

[104]  Erik Cambria,et al.  Deep Learning-Based Document Modeling for Personality Detection from Text , 2017, IEEE Intelligent Systems.