An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism
暂无分享,去创建一个
Paul Benjamin Lowry | Sutirtha Chatterjee | Tailai Wu | Jun Zhang | Gregory D. Moody | Chuang Wang | P. Lowry | Sutirtha Chatterjee | Gregory Moody | Tailai Wu | Chuang Wang | Jun Zhang
[1] Gillian R. Hayes,et al. Acceptable Use of Technology in Schools: Risks, Policies, and Promises , 2010, IEEE Pervasive Computing.
[2] Michael D. Reisig,et al. LOW SELF‐CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION* , 2008 .
[3] Catherine D. Marcum,et al. Music Piracy and Neutralization: A Preliminary Trajectory Analysis from Short-Term Longitudinal Data , 2008 .
[4] T. Postmes,et al. Social Influence in Computer-Mediated Communication: The Effects of Anonymity on Group Behavior , 2001 .
[5] Wesley G. Jennings,et al. Examining the Influence of Delinquent Peer Association on the Stability of Self-Control in Late Childhood and Early Adolescence: Toward an Integrated Theoretical Model , 2013 .
[6] Paul Benjamin Lowry,et al. Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It , 2014, IEEE Transactions on Professional Communication.
[7] Andrea Everard,et al. Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..
[8] Elias Aboujaoude,et al. Cyberbullying: Review of an Old Problem Gone Viral. , 2015, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[9] Bodo B. Schlegelmilch,et al. How Techniques of Neutralization Legitimize Norm- and Attitude-Inconsistent Consumer Behavior , 2013, Journal of Business Ethics.
[10] D. Whetten. What Constitutes a Theoretical Contribution , 1989 .
[11] T. Holt,et al. The Effect of Self-Control on Victimization in the Cyberworld , 2010 .
[12] R. Clarke,et al. Explaining High-Risk Concentrations of Crime in the City , 2014 .
[13] Graham Farrell,et al. Police performance measurement: an annotated bibliography , 2015 .
[14] Wanda J. Orlikowski,et al. Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..
[15] Rajeev Sharma,et al. Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research , 2009 .
[16] T. Pratt,et al. THE EMPIRICAL STATUS OF GOTTFREDSON AND HIRSCHI'S GENERAL THEORY OF CRIME: A META‐ANALYSIS , 2000 .
[17] Paul A. Pavlou,et al. Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role , 2005, Inf. Syst. Res..
[18] A. Brink,et al. Affective Experiences with Sex and Sexual Satisfaction among Dutch Adolescents: the Consequences of Online and Offline Communication about Sexuality with Friends , 2014 .
[19] Sarah J Beal,et al. The Role of Emotional Reactivity, Self-regulation, and Puberty in Adolescents' Prosocial Behaviors. , 2012, Social development.
[20] Mark Capper,et al. Exploiting the web for education: An anonymous asynchronous role simulation , 1999 .
[21] Peter Fleming,et al. From Borrowing to Blending: Rethinking the Processes of Organizational Theory Building , 2011 .
[22] Danielle M. Reynald,et al. Toward the Adaptation of Routine Activity and Lifestyle Exposure Theories to Account for Cyber Abuse Victimization , 2016 .
[23] Harold G. Grasmick,et al. Testing the Core Empirical Implications of Gottfredson and Hirschi's General Theory of Crime , 1993 .
[24] Paul Benjamin Lowry,et al. Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations , 2015, MIS Q..
[25] Christopher J. Sullivan,et al. Investigating the Functional Form of the Self-control–Delinquency Relationship in a Sample of Serious Young Offenders , 2014 .
[26] David A. Makin,et al. Does Social Learning Theory Condition the Effects of Low Self-Control on College Students' Software Piracy? , 2004 .
[27] Christopher J. Schreck. Criminal victimization and low self-control: An extension and test of a general theory of crime , 1999 .
[28] Qing Li,et al. New bottle but old wine: A research of cyberbullying in schools , 2007, Comput. Hum. Behav..
[29] Paul Benjamin Lowry,et al. Using IT Design to Prevent Cyberbullying , 2017, J. Manag. Inf. Syst..
[30] T. Postmes,et al. Breaching or Building Social Boundaries? , 1998 .
[31] George E. Higgins,et al. Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software , 2006 .
[32] Sandra Wills,et al. Reusability of Online Role Play: Learning Objects or Learning Designs? , 2009 .
[33] R. Bachman. Explaining Criminals and Crime: Essays in Contemporary Criminological Theory , 2000 .
[34] B. Spears,et al. Emerging Methodological Strategies to Address Cyberbullying: Online Social Marketing and Young People as Co-Researchers , 2013 .
[35] Ronald L. Akers,et al. The Social Learning Theory of Crime and Deviance , 2009 .
[36] Suzanne Rivard,et al. Editor's comments: the ions of theory construction , 2014 .
[37] James J. Gross,et al. Getting Our Act Together: Toward a General Model of Self-Control , 2010 .
[38] M. Huss,et al. The Assessment of Cyberstalking: An Expanded Examination Including Social Networking, Attachment, Jealousy, and Anger in Relation to Violence and Abuse , 2013, Violence and Victims.
[39] R. Wortley,et al. Everyday atrocities: does internal (domestic) sex trafficking of British children satisfy the expectations of opportunity theories of crime? , 2015 .
[40] Travis C. Pratt,et al. “Can’t Stop, Won’t Stop”: Self-Control, Risky Lifestyles, and Repeat Victimization , 2014 .
[41] John Suler,et al. The Online Disinhibition Effect , 2004, Cyberpsychology Behav. Soc. Netw..
[42] John F. Rockart,et al. Editor’s comments , 2005, MIS Q. Executive.
[43] Toni M. Somers,et al. The Impact of ERP Implementation on Business Process Outcomes: A Factor-Based Study , 2007, J. Manag. Inf. Syst..
[44] V. Grover,et al. An assessment of survey research in POM: from constructs to theory , 1998 .
[45] Ronald L. Akers,et al. Rational Choice, Deterrence, and Social Learning Theory in Criminology: The Path Not Taken , 1990 .
[46] Marcia J. Simmering,et al. A Tale of Three Perspectives , 2009 .
[47] George E. Higgins,et al. Low Self-Control and Social Learning in Understanding Students' Intentions to Pirate Movies in the United States , 2007 .
[48] Wesley G. Jennings,et al. Assessing the Overlap in Dating Violence Perpetration and Victimization among South Korean College Students: The Influence of Social Learning and Self-Control , 2011 .
[49] Dennis F. Galletta,et al. The Drivers in the Use of Online Whistle-Blowing Reporting Systems , 2013, J. Manag. Inf. Syst..
[50] A. Bandura,et al. Social Cognitive Theory of Organizational Management , 1989 .
[51] D. Wayne Osgood,et al. A reappraisal of the overlap of violent offenders and victims. , 2008 .
[52] Richard T. Watson,et al. Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..
[53] Alex R. Piquero,et al. Individual Propensities and Rational Decision-Making: Recent Findings and Promising Approaches: Stephen G. Tibbetts and Chris L. Gibson , 2001 .
[54] Sam Ransbotham,et al. Choice and Chance: A Conceptual Model of Paths to Information Security Compromise , 2009, Inf. Syst. Res..
[55] Sarah Koon-Magnin,et al. Cyber Stalking and Cyber Harassment Legislation in the United States: A Qualitative Analysis , 2013 .
[56] Elizabeth E. Umphress,et al. When Employees Do Bad Things for Good Reasons: Examining Unethical Pro-Organizational Behaviors , 2011, Organ. Sci..
[57] Xianggui Qu,et al. Multivariate Data Analysis , 2007, Technometrics.
[58] Tamara D. Madensen,et al. The Empirical Status of Social Learning Theory: A Meta‐Analysis , 2010 .
[59] Jenessa Malin,et al. Adolescent self-control and music and movie piracy , 2009, Comput. Hum. Behav..
[60] Kenneth C. Land,et al. Multilevel Criminal Opportunity , 2012 .
[61] G. Larry Mays,et al. Social Learning Theory, Self-Reported Delinquency, and Youth Gangs , 1994 .
[62] Stephen W. Baron,et al. Self-Control, Social Consequences, and Criminal Behavior: Street Youth and the General Theory of Crime , 2003 .
[63] Joseph S. Valacich,et al. The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use , 2015, J. Manag. Inf. Syst..
[64] L. Lanza-Kaduce,et al. Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.
[65] Eric A. Storch,et al. Has Cyber Technology Produced a New Group of Peer Aggressors? , 2011, Cyberpsychology Behav. Soc. Netw..
[66] Andreas Ritter,et al. Structural Equations With Latent Variables , 2016 .
[67] Barbara M. Byrne,et al. Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .
[68] Kevin M. Beaver,et al. An Investigation of Genetic and Environmental Influences Across the Distribution of Self-Control , 2017 .
[69] Ronald L. Akers,et al. A Longitudinal Test of Social Learning Theory: Adolescent Smoking , 1996 .
[70] Dennis F. Galletta,et al. It’s complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis , 2017, Eur. J. Inf. Syst..
[71] Huiwen Lian,et al. When does self-esteem relate to deviant behavior? The role of contingencies of self-worth. , 2009, The Journal of applied psychology.
[72] Qing Li,et al. Bullying in the new playground: Research into cyberbullying and cyber victimisation , 2007 .
[73] Velmer S. Burton,et al. THE SOCIAL CONSEQUENCES OF SELF-CONTROL: TESTING THE GENERAL THEORY OF CRIME* , 1997 .
[74] Gurpreet Dhillon,et al. A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research , 2014, Inf. Syst. Res..
[75] Alok Gupta,et al. Special Section Introduction - Ubiquitous IT and Digital Vulnerabilities , 2016, Inf. Syst. Res..
[76] R. Akers. Self-control as a general theory of crime , 1991 .
[77] Daniel P. Mears,et al. Self-Control Theory and Nonlinear Effects on Offending , 2013 .
[78] Chien Chou,et al. An analysis of multiple factors of cyberbullying among junior high school students in Taiwan , 2010, Comput. Hum. Behav..
[79] Scott H. Decker,et al. Criminal and Routine Activities in Online Settings: Gangs, Offenders, and the Internet , 2015 .
[80] Pamela Wilcox,et al. The Oxford Handbook of Criminological Theory , 2012 .
[81] Sheri A Bauman,et al. This Issue: Theories of Bullying and Cyberbullying , 2014 .
[82] Adam M. Bossler,et al. The General Theory of Crime and Computer Hacking: Low Self-control Hackers? , 2011 .
[83] H. Marsh,et al. Application of confirmatory factor analysis to the study of self-concept: First- and higher order factor models and their invariance across groups. , 1985 .
[84] Paul Benjamin Lowry,et al. "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels , 2016, J. Strateg. Inf. Syst..
[85] Dana E. Putnam,et al. Initiation and Maintenance of Online Sexual Compulsivity: Implications for Assessment and Treatment , 2000, Cyberpsychology Behav. Soc. Netw..
[86] Tolga Aricak,et al. Cyberbullying among Turkish Adolescents , 2008, Cyberpsychology Behav. Soc. Netw..
[87] Qing Li. Cyberbullying in Schools , 2006 .
[88] Ryad Titah,et al. Nonlinearities Between Attitude and Subjective Norms in Information Technology Acceptance: A Negative Synergy? , 2009, MIS Q..
[89] S. Thompson. Social Learning Theory , 2008 .
[90] Qing Hu,et al. Does deterrence work in reducing information security policy abuse by employees? , 2011, Commun. ACM.
[91] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[92] George E. Higgins. Gender Differences in Software Piracy: The Mediating Roles of Self-Control Theory and Social Learning Theory , 2006 .
[93] P. Bentler,et al. Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .
[94] Herman T. Tavani,et al. Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace , 2000, CSOC.
[95] Maria L. Kraimer,et al. A Social Capital Theory of Career Success , 2001 .
[96] Kevin G. Corley,et al. Building theory about theory building: What constitutes a theoretical contribution? Academy of Management Review, , . , 2011 .
[97] Yvonne Neudorf,et al. A General Theory Of Crime , 2016 .
[98] Paul Benjamin Lowry,et al. Using Accountability to Reduce Access Policy Violations in Information Systems , 2013, J. Manag. Inf. Syst..
[99] Michael Roach,et al. Founder or Joiner? The Role of Preferences and Context in Shaping Different Entrepreneurial Interests , 2015, Manag. Sci..
[100] Lieven Pauwels,et al. Differential Online Exposure to Extremist Content and Political Violence: Testing the Relative Strength of Social Learning and Competing Perspectives , 2016 .
[101] Tom L. Roberts,et al. Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors , 2013, MIS Q..
[102] Dennis F. Galletta,et al. What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors , 2015, MIS Q..
[103] Sonja Utz,et al. The Role of Social Network Sites in Romantic Relationships: Effects on Jealousy and Relationship Happiness , 2011, J. Comput. Mediat. Commun..
[104] T. Postmes,et al. Deindividuation and antinormative behavior: A meta-analysis. , 1998 .
[105] Tejaswini Herath,et al. A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..
[106] Richard P. Bagozzi,et al. The Role of Signaling Identity in the Adoption of Personal Technologies , 2014, J. Assoc. Inf. Syst..
[107] Grazyna Kochanska,et al. Effortful Control: Factor Structure and Relation to Externalizing and Internalizing Behaviors , 2002, Journal of abnormal child psychology.
[108] Anthony R. Beech,et al. Identifying Sexual Grooming Themes Used by Internet Sex Offenders , 2013 .
[109] V. Braithwaite,et al. Forgiveness, Reconciliation, and Shame: Three Key Variables in Reducing School Bullying , 2006 .
[110] W. Ouchi. A Conceptual Framework for the Design of Organizational Control Mechanisms , 1979 .
[111] Chu Hsiang Chang,et al. To Aggregate or Not to Aggregate: Steps for Developing and Validating Higher-Order Multidimensional Constructs , 2011 .
[112] Chuang Wang,et al. Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model , 2016, Inf. Syst. Res..
[113] Peter K. Smith,et al. Cyberbullying Definition Among Adolescents: A Comparison Across Six European Countries , 2012, Cyberpsychology Behav. Soc. Netw..
[114] D. Espelage,et al. Theories of cyberbullying , 2012 .
[115] Philip Bobko,et al. Self-efficacy beliefs: Comparison of five measures. , 1994 .
[116] E. Gregory,et al. Psychodemographic Factors Predicting Internet Fraud Tendency among Youths in Southwestern, Nigeria , 2015 .
[117] L. Harris,et al. Online consumer misbehaviour: an application of neutralization theory , 2009 .
[118] Ron Weber,et al. Evaluating and Developing Theories in the Information Systems Discipline , 2012, J. Assoc. Inf. Syst..
[119] M. Polakowski,et al. Linking self- and social control with deviance: Illuminating the structure underlying a general theory of crime and its relation to deviant activity , 1994 .
[120] Andrew D. Henderson,et al. Top Management Team Coordination Needs and the CEO Pay Gap: A Competitive Test of Economic and Behavioral Views , 2001 .
[121] K. Vohs,et al. Do conscious thoughts cause behavior? , 2011, Annual review of psychology.
[122] Eleanor Mattern,et al. From cyberbullying to well‐being: A narrative‐based participatory approach to values‐oriented design for social media , 2015, J. Assoc. Inf. Sci. Technol..
[123] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[124] Robert L. Akers,et al. A Differential Association-Reinforcement Theory of Criminal Behavior , 1966 .
[125] George E. Higgins,et al. Digital Piracy: Assessing the Contributions of an Integrated Self‐Control Theory and Social Learning Theory Using Structural Equation Modeling , 2006 .
[126] S. Bauman,et al. Principles of cyberbullying research: definitions, measures, and methodology , 2013 .
[127] Nancy P. Rothbard,et al. Getting Closer at the Company Party: Integration Experiences, Racial Dissimilarity, and Workplace Relationships , 2013, Organ. Sci..
[128] Rex B. Kline,et al. Principles and Practice of Structural Equation Modeling , 1998 .
[129] Yajiong Xue,et al. Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..
[130] Arik Ragowsky,et al. Establishing Trust in Electronic Commerce Through Online Word of Mouth: An Examination Across Genders , 2008, J. Manag. Inf. Syst..
[131] Blake Ives,et al. Trust and the Unintended Effects of Behavior Control in Virtual Teams , 2003, MIS Q..
[132] R. Cialdini. Influence: Science and Practice , 1984 .