An empirical evaluation of key factors contributing to internet abuse in the workplace
暂无分享,去创建一个
[1] John Francis Kros,et al. An assessment of supply chain managers' trust in online auctions , 2010, Ind. Manag. Data Syst..
[2] S. Sharma,et al. Key factors that hinder SMEs in succeeding in today's knowledge-based economy , 2005 .
[3] J. Gackenbach. Psychology and the Internet : intrapersonal, interpersonal, and transpersonal implications , 1998 .
[4] William M. Fitzpatrick,et al. Competitive intelligence, corporate security and the virtual organization , 2003 .
[5] Young B. Choi,et al. A quantification model using P3P in privacy control for telecommunications service management , 2005, Int. J. Serv. Stand..
[6] Peter M. Bentler,et al. Practical Issues in Structural Modeling , 1987 .
[7] Timothy Paul Cronan,et al. Have you met your organization's computer usage policy? , 2005, Ind. Manag. Data Syst..
[8] Magid Igbaria,et al. Development of a Measure of Personal Web Usage in the Workplace , 2004, Cyberpsychology Behav. Soc. Netw..
[9] Dc Washington. Diagnostic and Statistical Manual of Mental Disorders, 4th Ed. , 1994 .
[10] Jeffrey M. Stanton,et al. Company profile of the frequent internet user , 2002, CACM.
[11] Thomas F. Stafford,et al. Determining Uses and Gratifications for the Internet , 2004, Decis. Sci..
[12] T. Hirschi. Causes of Delinquency. , 1970, British medical journal.
[13] Janice C. Sipior,et al. A Strategic Response to the Broad Spectrum of Internet Abuse , 2002 .
[14] Kimberly Young,et al. Employee Internet Management: Current Business Practices and Outcomes , 2002, Cyberpsychology Behav. Soc. Netw..
[15] Richard G. Netemeyer,et al. Price Perceptions and Consumer Shopping Behavior: A Field Study , 1993 .
[16] E. Katz,et al. The Uses of Mass Communications: Current Perspectives on Gratifications Research. Sage Annual Reviews of Communication Research Volume III. , 1975 .
[17] M. Griffiths. Internet abuse in the workplace: Issues and concerns for employers and employment counselors , 2003 .
[18] Atul Gupta,et al. Information systems security issues and decisions for small businesses: An empirical examination , 2005, Inf. Manag. Comput. Security.
[19] Chin-Chung Tsai,et al. Sensation seeking and internet dependence of Taiwanese high school adolescents , 2000, Comput. Hum. Behav..
[20] Kimberly Young,et al. The Relationship Between Depression and Internet Addiction , 1998, Cyberpsychology Behav. Soc. Netw..
[21] Michael L. Frank,et al. Gambling and pathological gambling among university students. , 1991, Addictive behaviors.
[22] James G. Phillips,et al. Potential determinants of heavier internet usage , 2000, Int. J. Hum. Comput. Stud..
[23] Janice E. J. Woodrow,et al. Locus of control and student teacher computer attitudes , 1990 .
[24] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[25] Stephan Arndt,et al. Secretarial attitudes towards word processors as a function of familiarity and locus of control , 1983 .
[26] Paul Gray,et al. Junk Computing - Is it Bad for an Organization? , 1996, Inf. Syst. Manag..
[27] M. H. Bala Subrahmanya. Small-scale industries in India in the globalisation era: performance and prospects , 2005 .
[28] Louis Leung,et al. Shyness and Locus of Control as Predictors of Internet Addiction and Internet Use , 2004, Cyberpsychology Behav. Soc. Netw..
[29] Robert LaRose,et al. Internet Gratifications and Internet Addiction: On the Uses and Abuses of New Media , 2004, Cyberpsychology Behav. Soc. Netw..
[30] Yu Qiu-mei,et al. Causes and Implications of Disinhibited Behaviors on the Internet , 2007 .
[31] Magid Igbaria,et al. The Information Society: An International , 2003 .
[32] J. R. Aiello,et al. The effects of electronic performance monitoring on stress: Locus of control as a moderator variable , 1996 .
[33] Richard A. Davis,et al. Lost in Cyberspace: The Web @ Work , 2002, Cyberpsychology Behav. Soc. Netw..
[34] Mark Taylor,et al. The legal aspects of corporate computer usage policies , 2010, Comput. Law Secur. Rev..
[35] Blythe Suezann Harrell,et al. Uses and gratifications of the internet , 2000 .
[36] D. Greenfeld,et al. Virtual Addiction: Help for Netheads, Cyberfreaks, and Those Who Love Them , 1999 .
[37] Jeremy Phillips. The Enemy Within , 2003 .
[38] Kimberly Young,et al. Internet Abuse in the Workplace: New Trends in Risk Management , 2004, Cyberpsychology Behav. Soc. Netw..
[39] Cesare Lombroso,et al. Crime, its causes and remedies , 1911 .
[40] Betty A. Kleen,et al. Exploring Internet Addiction: Demographic Characteristics and Stereotypes of Heavy Internet Users , 2003, J. Comput. Inf. Syst..
[41] Huimin Zhao,et al. Commercial Internet filters: Perils and opportunities , 2010, Decis. Support Syst..
[42] M. Griffiths. Internet addiction: Does it really exist? , 1998 .
[43] K. Young. Caught in the Net: How to Recognize the Signs of Internet Addiction--and a Winning Strategy for Recovery , 1998 .
[44] Farley Stewart,et al. Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues , 2000, Inf. Secur. J. A Glob. Perspect..
[45] Yaobin Lu,et al. Internet inequality: The relationship between high school students' Internet use in different locations and their Internet self-efficacy , 2010, Comput. Educ..
[46] H. Bosma,et al. Coping and self-concept in adolescence , 1990 .
[47] M. Coovert,et al. Locus of Control as a Predictor of Users' Attitude toward Computers , 1980 .
[48] T. Wong,et al. Key factors for small and medium enterprises in Taiwan to successfully implement information systems , 2005 .
[49] John Coleman. Coping and self-concept in adolescence , 1991 .
[50] Morris Rosenberg,et al. SELF-ESTEEM AND CONCERN WITH PUBLIC AFFAIRS , 1962 .
[51] E. Rogers,et al. Research methods and the new media , 1988 .
[52] Chien Chou,et al. Internet addiction, usage, gratification, and pleasure experience: the Taiwan college students' case , 2000, Comput. Educ..
[53] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[54] Magid Igbaria,et al. Explaining production deviant use of the internet technology in the workplace: an integrated model , 2002 .
[55] A. Rubin. Media uses and effects: A uses-and-gratifications perspective. , 1994 .
[56] Keng Siau,et al. Acceptable internet use policy , 2002, CACM.
[57] Nathaniel Branden,et al. Self-Esteem At Work , 1998 .
[58] K. Young. Internet addiction: evaluation and treatment , 1999, BMJ.
[59] J. Rotter. Generalized expectancies for internal versus external control of reinforcement. , 1966, Psychological monographs.
[60] Mark D. Griffiths,et al. Does Internet and Computer "Addiction" Exist? Some Case Study Evidence , 2000, Cyberpsychology Behav. Soc. Netw..
[61] William H. Ross,et al. Adapting different media types to trust development in the supply chain , 2007 .
[62] Vallabh Sambamurthy,et al. Shaping UP for E-Commerce: Institutional Enablers of the Organizational Assimliation of Web Technologies , 2002, MIS Q..
[63] K. Young,et al. Psychology of Computer Use: XL. Addictive Use of the Internet: A Case That Breaks the Stereotype , 1996, Psychological reports.