Bringing cyber loafers back on the right track
暂无分享,去创建一个
[1] J. George. Extrinsic and Intrinsic Origins of Perceived Social Loafing in Organizations , 1992 .
[2] W. E. Scott,et al. EFFECTS OF CONTINGENT AND NONCONTINGENT REWARD ON THE RELATIONSHIP BETWEEN SATISFACTION AND TASK PERFORMANCE , 1971 .
[3] Hiroshi Ono,et al. The Efects of Physical Deviance upon Face-to-Face Interaction , 1966 .
[4] Niels Ole Pors. Misbehaviour in the public library: Internet use, filters and difficult people , 2001 .
[5] Gareth R. Jones. Task Visibility, Free Riding, and Shirking: Explaining the Effect of Structure and Technology on Employee Behavior , 1984 .
[6] James Gaskin. Internet Acceptable Usage Policies , 2003 .
[7] Qinyu Liao,et al. Workplace Management and Employee Misuse: Does Punishment Matter? , 2009, J. Comput. Inf. Syst..
[8] Srikanth Beldona,et al. Cyberslacking!: A Liability Issue for Wired Workplaces , 2001 .
[9] Peter R. Monge,et al. Measuring Proximity in Human Organization , 1980 .
[10] D. Galletta,et al. An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .
[11] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[12] J. Sinacore. Multiple regression: Testing and interpreting interactions , 1993 .
[13] K. Zellars,et al. Abusive supervision and subordinates' organizational citizenship behavior. , 2002, The Journal of applied psychology.
[14] Robert Charles Tucker,et al. The Politics of Leadership , 1984, The Logic of Professionalism.
[15] R. Liden,et al. Understanding Social Loafing: The Role of Justice Perceptions and Exchange Relationships , 2003 .
[16] A. Friedman. Responsible Autonomy Versus Direct Control Over the Labour Process , 1977 .
[17] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[18] Detmar W. Straub,et al. Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..
[19] Christine A. Henle,et al. Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory , 2009, Comput. Hum. Behav..
[20] Dirk D. Steiner,et al. Factors affecting supervisors' use of disciplinary actions following poor performance , 1994 .
[21] H. Kelman. Compliance, identification, and internalization three processes of attitude change , 1958 .
[22] Gary P. Latham,et al. Effects of goal setting and supervision on worker behavior in an industrial situation. , 1973 .
[23] Jintae Lee,et al. A holistic model of computer abuse within organizations , 2002, Inf. Manag. Comput. Secur..
[24] Herbert C. Kelman,et al. Crimes of Obedience , 1990 .
[25] Jeffrey M. Stanton,et al. Traditional and Electronic Monitoring from an Organizational Justice Perspective , 2000 .
[26] Richard A. Davis,et al. Lost in Cyberspace: The Web @ Work , 2002, Cyberpsychology Behav. Soc. Netw..
[27] Dinesh A. Mirchandani,et al. Reducing Internet Abuse in the Workplace , 2003 .
[28] Janice C. Sipior,et al. A Strategic Response to the Broad Spectrum of Internet Abuse , 2002 .
[29] I. Lundberg,et al. Work control, work demands, and work social support in relation to alcoholism among young men. , 1998, Alcoholism, clinical and experimental research.
[30] Kimberly Young,et al. Internet Abuse in the Workplace: New Trends in Risk Management , 2004, Cyberpsychology Behav. Soc. Netw..
[31] Peter R. Monge,et al. The Dynamics of Organizational Proximity , 1985 .
[32] B. Bass. Bass & Stogdill's handbook of leadership: Theory, research, and managerial applications, 3rd ed. , 1990 .
[33] Dennis Longley,et al. Information security management and modelling , 1999, Inf. Manag. Comput. Secur..
[34] Hock-Hai Teo,et al. An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..
[35] Hsiu-Fen Lin,et al. Examination of cognitive absorption influencing the intention to use a virtual community , 2009, Behav. Inf. Technol..
[36] Nathan Bennett,et al. Employee Reactions to Electronic Control Systems , 1994 .
[37] Dinesh A. Mirchandani. A Deterrence Theory Perspective on Personal Web Usage , 2004 .
[38] G. Stoney Alder,et al. Employee Reactions to Internet Monitoring: The Moderating Role of Ethical Orientation , 2008 .
[39] Christopher J. Meyer,et al. How does organizational justice affect performance, withdrawal, and counterproductive behavior? , 2005 .
[40] R. Bennett,et al. Social Status and Aggressiveness as Moderators of the Relationship Between Interactional Justice and Workplace Deviance , 2004 .
[41] Monica J. Favia,et al. Reactions to unjust dismissal and third-party dispute resolution: A justice framework , 1992 .
[42] R. Cialdini. Influence: Science and Practice , 1984 .
[43] Paul E. Spector. Perceived Control by Employees: A Meta-Analysis of Studies Concerning Autonomy and Participation at Work , 1986 .
[44] Vivien K. G. Lim,et al. Cyberloafing at the workplace: gain or drain on work? , 2012, Behav. Inf. Technol..
[45] Robert L. Hamblin,et al. STRUCTURAL FACTORS AND INDIVIDUAL NEEDS IN GROUP BEHAVIOR , 1959 .
[46] Tom R. Tyler,et al. Can Businesses Effectively Regulate Employee Conduct? The Antecedents of Rule Following in Work Settings , 2005 .
[47] Morgan W. McCall,et al. Stogdill's Handbook of Leadership , 1982 .
[48] Jennifer A. Chatman,et al. Organizational commitment and psychological attachment: The effects of compliance, identification, and internalization on prosocial behavior. , 1986 .
[49] Audra D. Hovorka‐Mead,et al. WATCHING THE DETECTIVES: SEASONAL STUDENT EMPLOYEE REACTIONS TO ELECTRONIC MONITORING WITH AND WITHOUT ADVANCE NOTIFICATION , 2002 .
[50] Anita L. Blanchard,et al. Correlates of different forms of cyberloafing: The role of norms and external locus of control , 2008, Comput. Hum. Behav..
[51] Jane M. Howell. Two faces of charisma: Socialized and personalized leadership in organizations. , 1988 .
[52] H. P. Sims,et al. Just and Unjust Punishment: Influences on Subordinate Performance and Citizenship , 1994 .
[53] Bruce J. Avolio,et al. Individual attributes and leadership style: predicting the use of punishment and its effects , 1998 .
[54] Clarence Schrag,et al. Leadership Among Prison Inmates , 1954 .
[55] Pablo Zoghbi Manrique de Lara,et al. Fear in organizations: Does intimidation by formal punishment mediate the relationship between interactional justice and workplace internet deviance? , 2006 .
[56] James E. Gaskin,et al. Internet Acceptable Usage Policies: Writing and Implementation , 1998, Inf. Syst. Manag..
[57] Margaret M. Blair,et al. Trust, Trustworthiness, and the Behavioral Foundations of Corporate Law , 2001 .
[58] D. Messick,et al. Sanctioning Systems, Decision Frames, and Cooperation , 1999 .
[59] Sang M. Lee,et al. An integrative model of computer abuse based on social control and general deterrence theories , 2004, Inf. Manag..
[60] S. Milgram. Obedience to Authority: An Experimental View , 1975 .
[61] Likoebe M. Maruping,et al. Managing team interpersonal processes through technology: a task-technology fit perspective. , 2004, The Journal of applied psychology.
[62] Jacob Cohen,et al. Applied multiple regression/correlation analysis for the behavioral sciences , 1979 .
[63] Katelyn Y. A. McKenna,et al. Employee job attitudes and organizational characteristics as predictors of cyberloafing , 2011, Comput. Hum. Behav..
[64] Pablo Zoghbi Manrique de Lara,et al. Internet Research , 2022 .