Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work
暂无分享,去创建一个
[1] W. F. Skinner,et al. A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .
[2] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[3] L. G. Pee,et al. Behavioral Factors Affecting Internet Abuse in the Workplace – An Empirical Investigation , 2004 .
[4] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[5] G. Godin,et al. A comparison of the Fishbein and Ajzen and the Triandis attitudinal models for the prediction of exercise intention and behavior , 1988, Journal of Behavioral Medicine.
[6] Detmar W. Straub,et al. Diffusing the Internet in the Arab world: the role of social norms and technological culturation , 2003, IEEE Trans. Engineering Management.
[7] Claire A. Simmers. Aligning internet usage with business priorities , 2002, CACM.
[8] Blair H. Sheppard,et al. THEORY OF REASONED ACTION , 2014 .
[9] Leonard M. Jessup,et al. Does electronic monitoring of employee internet usage work? , 2002, CACM.
[10] Sang M. Lee,et al. An integrative model of computer abuse based on social control and general deterrence theories , 2004, Inf. Manag..
[11] Paul Benjamin Lowry,et al. The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups , 2009, J. Manag. Inf. Syst..
[12] Mikko T. Siponen,et al. Overcoming the insider: reducing employee computer crime through Situational Crime Prevention , 2009, CACM.
[13] Jo Ann Oravec. Constructive approaches to internet recreation in the workplace , 2002, CACM.
[14] H. Marsh,et al. Application of confirmatory factor analysis to the study of self-concept: First- and higher order factor models and their invariance across groups. , 1985 .
[15] B. Verplanken,et al. Reflections on past behavior: A self-report index of habit strength , 2003 .
[16] P. Schmidt,et al. Incentives, Morality, Or Habit? Predicting Students’ Car Use for University Routes With the Models of Ajzen, Schwartz, and Triandis , 2003 .
[17] J. Turner. Social categorization and the self-concept: A social cognitive theory of group behavior. , 2010 .
[18] Robert J. Vandenberg,et al. 12 Structural Equation Modeling in Management Research: A Guide for Improved Analysis , 2009 .
[19] Robert I. Sutton,et al. Employee Positive Emotion and Favorable Outcomes at the Workplace , 1994 .
[20] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[21] Lisa L. Miller. The Perils of Federalism: Race, Poverty, and the Politics of Crime Control , 2008 .
[22] I. Ajzen,et al. Attitude-behavior relations: A theoretical analysis and review of empirical research. , 1977 .
[23] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[24] Vincent S. Lai,et al. Prediction of Internet and World Wide Web usage at work: a test of an extended Triandis model , 2000, Decis. Support Syst..
[25] Peter Schmidt,et al. , Schwartz , and Triandis Incentives , Morality , Or Habit ? , 2003 .
[26] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[27] A. Caetano,et al. Exploring the effects of intragroup conflict and past performance feedback on team effectiveness , 2005 .
[28] C. N. Cofer,et al. Motivation: Theory and research. , 1964 .
[29] Keven G. Ruby,et al. The Insider Threat to Information Systems , 2022 .
[30] J. Gibbs. Crime, punishment, and deterrence , 1975 .
[31] Salvatore T. March,et al. Information Systems Research , 2004, IFIP International Federation for Information Processing.
[32] B. Verplanken,et al. Habit, attitude, and planned behaviour : is habit an empty construct or an interesting case of goal-directed automaticity? , 1999 .
[33] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[34] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[35] Robert L. Akers,et al. A Differential Association-Reinforcement Theory of Criminal Behavior , 1966 .
[36] Moez Limayem,et al. The Role of Habit in Information Systems Continuance: Examining the Evolving Relationship Between Intention and Usage , 2005, ICIS.
[37] L. G. Pee,et al. Explaining non-work-related computing in the workplace: A comparison of alternative models , 2008, Inf. Manag..
[38] Anita L. Blanchard,et al. The Interaction of Work Stressors and Organizational Sanctions on Cyberloafing , 2008 .
[39] Pablo Zoghbi Manrique De Lara. Relationship between Organizational Justice and Cyberloafing in the Workplace: Has "Anomia" a Say in the Matter? , 2007, Cyberpsychology Behav. Soc. Netw..
[40] H. Winklhofer,et al. Index Construction with Formative Indicators: An Alternative to Scale Development , 2001 .
[41] Izak Benbasat,et al. Quo vadis TAM? , 2007, J. Assoc. Inf. Syst..
[42] Sandra L. Robinson,et al. Feedback seeking in groups: A theoretical perspective. , 1993 .
[43] Anita L. Blanchard,et al. Correlates of different forms of cyberloafing: The role of norms and external locus of control , 2008, Comput. Hum. Behav..
[44] Duane T. Wegener,et al. Attitude change: Multiple roles for persuasion variables. , 1998 .
[45] R. Rosenfeld. Belief , 2012, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.
[46] Anat Hovav,et al. Deterring internal information systems misuse , 2007, CACM.
[47] Murugan Anandarajan,et al. Perceptions of Personal Web Usage in the Workplace: AQ-Methodology Approach , 2006, Cyberpsychology Behav. Soc. Netw..
[48] Эшфорт Блейк,et al. Social identity theory and the organization , 2012 .
[49] Lisa Seymour,et al. Web access for IT staff: a developing world perspective on web abuse , 2007, Electron. Libr..
[50] P. Hartel. Overcoming the insider: reducing employee computer crime through situational crime prevention: Willison R., Siponen M. Communications of the ACM 52(9): 133-137, 2009 , 2009 .
[51] B. Malle,et al. How People Explain Behavior: A New Theoretical Framework , 1999, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.
[52] Y. Braunstein,et al. Information management , 1996 .
[53] Raymond R. Panko,et al. Monitoring for pornography and sexual harassment , 2002, CACM.
[54] Keng Siau,et al. Acceptable internet use policy , 2002, CACM.
[55] J. A. Smiley,et al. Incentives , 2019, Handbook of Research Methods and Applications in Experimental Economics.
[56] Marie-Pierre Gagnon,et al. An adaptation of the theory of interpersonal behaviour to the study of telemedicine adoption by physicians , 2003, Int. J. Medical Informatics.
[57] B. Verplanken,et al. Predicting behavior from actions in the past : repeated decision making or a matter of habit? , 1998 .
[58] D. Galletta,et al. An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .
[59] Icek Ajzen,et al. From Intentions to Actions: A Theory of Planned Behavior , 1985 .
[60] I. Ajzen,et al. Choice of Travel Mode in the Theory of Planned Behavior: The Roles of Past Behavior, Habit, and Reasoned Action , 2003 .
[61] Rolph E. Anderson,et al. Multivariate Data Analysis (7th ed. , 2009 .
[62] Varun Grover,et al. The Role of System Trust in Business-to-Consumer Transactions , 2003, J. Manag. Inf. Syst..
[63] J. Christopher Westland,et al. Lower bounds on sample size in structural equation modeling , 2010, Electron. Commer. Res. Appl..
[64] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[65] I. Ajzen,et al. A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action , 1992 .
[66] Paul A. Pavlou,et al. Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..
[67] Thompson S. H. Teo,et al. How do I loaf here? let me count the ways , 2002, CACM.
[68] H. Aarts,et al. Physical exercise habit: on the conceptualization and formation of habitual health behaviours. , 1997, Health education research.
[69] Waiman Cheung,et al. Determinants of the intention to use Internet/WWW at work: a confirmatory study , 2001, Inf. Manag..
[70] Richard D. Johnson,et al. The Evolving Nature of the Computer Self-Efficacy Construct: An Empirical Investigation of Measurement Construction, Validity, Reliability and Stability Over Time , 2007, J. Assoc. Inf. Syst..
[71] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[72] Ian Kelly,et al. Crime , 1874, Hall's journal of health.
[73] W. Ouchi,et al. Organizational Control: Two Functions. , 1975 .
[74] L. Lanza-Kaduce,et al. Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.
[75] Murugan Anandarajan,et al. Profiling Web Usage in the Workplace: A Behavior-Based Artificial Intelligence Approach , 2002, J. Manag. Inf. Syst..
[76] B. Verplanken,et al. Habit, information acquisition, and the process of making travel mode choices , 1997 .
[77] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[78] A. Bandura. Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.
[79] Jeffrey M. Stanton,et al. Company profile of the frequent internet user , 2002, CACM.
[80] Luigi Leone,et al. A comparison of three models of attitude-behavior relationships in the studying behavior domain , 1999 .