Announcement of Formal control as a phase-Shifting perception and its Moderating Role in the Context of Mobile-Loafing
暂无分享,去创建一个
Xiao Ma | Saerom Lee | Lara Khansa | Austin Kwak | Yuju Tu | S. Lee | Xiao Ma | L. Khansa | Austin Kwak | Y. Tu
[1] D. Paulhus. Measurement and control of response bias. , 1991 .
[2] Zauwiyah Ahmad,et al. Personal Internet use: The use of personal mobile devices at the workplace , 2015 .
[3] H C Triandis,et al. Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[4] John P. Robinson,et al. Measures Of Personality And Social Psychological Attitudes , 1991 .
[5] Philipp Holtkamp,et al. Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research , 2019, J. Assoc. Inf. Syst..
[6] Ronald L. Akers,et al. Deviant behavior;: A social learning approach , 1973 .
[7] L. Lanza-Kaduce,et al. Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.
[8] Tessa Melkonian,et al. To Shift or Not to Shift? Determinants and Consequences of Phase Shifting on Justice Judgments , 2017 .
[9] Yanchun Zhang,et al. Why Employees Do Non-Work-Related Computing in the Workplace , 2010, J. Comput. Inf. Syst..
[10] D. Galletta,et al. An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .
[11] Barbara M. Byrne,et al. Structural equation modeling with AMOS , 2010 .
[12] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[13] E. Lind. Fairness heuristic theory: Justice judgments as pivotal cognitions in organizational relations. , 2001 .
[14] Timothy D. Ritchie,et al. The Balanced Inventory of Desirable Responding Short Form (BIDR-16) , 2015 .
[15] David F. Larcker,et al. Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .
[16] J. Pfeffer,et al. A social information processing approach to job attitudes and task design. , 1978, Administrative science quarterly.
[17] Kuang-Wei Wen,et al. Organizations' Information Security Policy Compliance: Stick or Carrot Approach? , 2012, J. Manag. Inf. Syst..
[18] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[19] Lara Khansa,et al. To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls , 2017, J. Manag. Inf. Syst..
[20] Thompson S. H. Teo,et al. Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study , 2005, Inf. Manag..
[21] Anol Bhattacherjee,et al. Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..
[22] L. G. Pee,et al. Explaining non-work-related computing in the workplace: A comparison of alternative models , 2008, Inf. Manag..
[23] Ronald L. Akers,et al. A Longitudinal Test of Social Learning Theory: Adolescent Smoking , 1996 .
[24] Wendy Wood,et al. Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. , 1998 .
[25] Paul Benjamin Lowry,et al. Using Accountability to Reduce Access Policy Violations in Information Systems , 2013, J. Manag. Inf. Syst..
[26] Katelyn Y. A. McKenna,et al. Employee job attitudes and organizational characteristics as predictors of cyberloafing , 2011, Comput. Hum. Behav..
[27] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[28] I. Rosenstock,et al. Social Learning Theory and the Health Belief Model , 1988, Health education quarterly.
[29] Naresh K. Malhotra,et al. A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena , 2005, Manag. Sci..