Why Employees Do Non-Work-Related Computing: An Investigation of Factors Affecting NWRC in a Workplace
暂无分享,去创建一个
[1] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[2] James G. Phillips,et al. Potential determinants of heavier internet usage , 2000, Int. J. Hum. Comput. Stud..
[3] Jeffrey M. Stanton,et al. Reactions to Employee Performance Monitoring: Framework, Review, and Research Directions , 2000 .
[4] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[5] Leonard M. Jessup,et al. Does electronic monitoring of employee internet usage work? , 2002, CACM.
[6] Jeffrey M. Stanton,et al. Company profile of the frequent internet user , 2002, CACM.
[7] Detmar W. Straub,et al. Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..
[8] Detmar W. Straub,et al. Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..
[9] Gary Dessler. Management fundamentals: Modern principles & practices , 1982 .
[10] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[11] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[12] P. Sheeran,et al. Implementation Intentions and the Theory of Planned Behavior , 1997, Personality & social psychology bulletin.
[13] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[14] Keng Siau,et al. Acceptable internet use policy , 2002, CACM.
[15] J. Nunnally. Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .
[16] H C Triandis,et al. Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[17] France Bélanger,et al. Abuse or learning? , 2002, CACM.
[18] Oscar M. Palos. From the editor , 1970, DATB.
[19] Ibrahim M. Al-Jabri,et al. Software copyright infringements: an exploratory study of the effects of individual and peer beliefs , 1997 .
[20] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[21] J. Hair. Multivariate data analysis , 1972 .
[22] Stephen Hinde,et al. Recent security surveys , 1998, Comput. Secur..
[23] M. Conner,et al. Extending the Theory of Planned Behavior: A Review and Avenues for Further Research , 1998 .
[24] Thompson S. H. Teo,et al. Intrinsic and extrinsic motivation in Internet usage , 1999 .
[25] James Backhouse,et al. Managing computer crime: a research outlook , 1995, Comput. Secur..
[26] Claire A. Simmers. Aligning internet usage with business priorities , 2002, CACM.
[27] D. Galletta,et al. An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .
[28] W. F. Skinner,et al. A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .
[29] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[30] David Mason. Managing Web Usage in the Workplace: A Social, Ethical and Legal Perspective , 2003 .
[31] I. Ajzen. The theory of planned behavior , 1991 .
[32] Moez Limayem,et al. Force of Habit and Information Systems Usage: Theory and Initial Validation , 2003, J. Assoc. Inf. Syst..
[33] Janice C. Sipior,et al. The dark side of employee email , 1999, CACM.
[34] Jo Ann Oravec. Constructive approaches to internet recreation in the workplace , 2002, CACM.
[35] Nathan Bennett,et al. The Role of Justice Judgments in Explaining the Relationship between Job Satisfaction and Organizational Commitment , 1996 .
[36] Jatinder N. D. Gupta,et al. Improving Workers' Productivity and Reducing Internet Abuse , 2004, J. Comput. Inf. Syst..
[37] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[38] Paul Gray,et al. Junk Computing - Is it Bad for an Organization? , 1996, Inf. Syst. Manag..
[39] Kai H. Lim,et al. Why Employees Do Non-Work-Related Computing: An Exploratory Investigation through Multiple Theoretical Perspectives , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[40] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .
[41] Donn B. Parker,et al. Fighting computer crime - a new framework for protecting information , 1998 .
[42] A. Adam. Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .
[43] B. Verplanken,et al. Habit, information acquisition, and the process of making travel mode choices , 1997 .
[44] H W Jordan,et al. On crime and punishment. , 1990, Journal of the National Medical Association.
[45] L. Cronbach. Coefficient alpha and the internal structure of tests , 1951 .
[46] Jintae Lee,et al. A holistic model of computer abuse within organizations , 2002, Inf. Manag. Comput. Secur..
[47] Thompson S. H. Teo,et al. How do I loaf here? let me count the ways , 2002, CACM.
[48] William H. Friedman. Is the Answer to Internet Addiction Internet Interdiction , 2000 .
[49] Murugan Anandarajan. INTERNET ABUSE IN THE WORKPLACE , 2002 .
[50] Wendy Wood,et al. Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. , 1998 .