Why students engage in cyber-cheating through a collective movement: A case of deviance and collusion
暂无分享,去创建一个
Paul Benjamin Lowry | Nitin Agarwal | Rolf T. Wigand | Rachida Parks | Therese L. Williams | N. Agarwal | R. Wigand | P. Lowry | Rachida Parks | T. Williams | Nitin Agarwal
[1] Babak Sohrabi,et al. Effects of Personality and Information Technology on Plagiarism: An Iranian Perspective , 2011 .
[2] Christa S. C. Asterhan,et al. Teenage peer-to-peer knowledge sharing through social network sites in secondary schools , 2017, Comput. Educ..
[3] Andrew T. Fiore,et al. Serious social media: On the use of social media for improving students' adjustment to college , 2012, Internet High. Educ..
[4] K. Eisenhardt. Building theories from case study research , 1989, STUDI ORGANIZZATIVI.
[5] Elizabeth Cauffman,et al. It's Wrong, But Everybody Does It: Academic Dishonesty among High School and College Students , 2002 .
[6] A. Edmondson,et al. METHODOLOGICAL FIT IN MANAGEMENT FIELD RESEARCH. , 2007 .
[7] M. Lim. Clicks, Cabs, and Coffee Houses: Social Media and Oppositional Movements in Egypt, 2004–2011 , 2012 .
[8] M. Lynne Markus,et al. Industry-Wide Information Systems Standardization as Collective Action: The Case of the U.S. Residential Mortgage Industry , 2006, MIS Q..
[9] Karla R. Hamlen. Academic dishonesty and video game play: Is new media use changing conceptions of cheating? , 2012, Comput. Educ..
[10] Mark de Reuver,et al. Collective action for mobile payment platforms: A case study on collaboration issues between banks and telecom operators , 2015, Electron. Commer. Res. Appl..
[11] Nitin Agarwal,et al. Raising and Rising Voices in Social Media , 2012, Bus. Inf. Syst. Eng..
[12] Monica D. Hernandez. Academic Dishonesty Using Social Media: A Comparative Study of College Students from Canada and China , 2015 .
[13] Paul Benjamin Lowry,et al. Examining the intended and unintended consequences of organisational privacy safeguards , 2016, Eur. J. Inf. Syst..
[14] Andrea Everard,et al. Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..
[15] Glen E. Kreiner,et al. Where is the “Me” Among the “We”? Identity Work and the Search for Optimal Balance , 2006 .
[16] Peter Twining,et al. Some guidance on conducting and reporting qualitative studies , 2017, Comput. Educ..
[17] Paul Benjamin Lowry,et al. A New Approach to the Problem of Access Policy Violations: Increasing Perceptions of Accountability through the User Interface , 2015 .
[18] A. Strauss,et al. Basics of Qualitative Research , 1992 .
[19] R. Coase. The Nature of the Firm , 1937 .
[20] J. V. Maanen,et al. The Fact of Fiction in Organizational Ethnography. , 1979 .
[21] M. Crotty. The Foundations of Social Research: Meaning and Perspective in the Research Process , 1998 .
[22] John Trushell,et al. ICT facilitated access to information and undergraduates' cheating behaviours , 2013, Comput. Educ..
[23] Michael D. Myers,et al. A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems , 1999, MIS Q..
[24] Wanda J. Orlikowski,et al. Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..
[25] E. Guba,et al. Competing paradigms in qualitative research. , 1994 .
[26] Paul Benjamin Lowry,et al. Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations , 2015, MIS Q..
[27] Geoff Walsham,et al. Interpretive case studies in IS research: nature and method , 1995 .
[28] Anselm L. Strauss,et al. Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .
[29] Cathy Owens Swift,et al. An Examination of the Relationship Between Academic Dishonesty and Workplace Dishonesty: A Multicampus Investigation , 2001 .
[30] Lucas D. Introna,et al. Cultural Values, Plagiarism, and Fairness: When Plagiarism Gets in the Way of Learning , 2005 .
[31] Yavuz Akbulut,et al. Exploring the types and reasons of Internet-triggered academic dishonesty among Turkish undergraduate students: Development of Internet-Triggered Academic Dishonesty Scale (ITADS) , 2008, Comput. Educ..
[32] Bryan Lee Miller,et al. Learning to E-Cheat: A Criminological Test of Internet Facilitated Academic Cheating , 2013 .
[33] Michael F. Young,et al. Digital plagiarism: An experimental study of the effect of instructional goals and copy-and-paste affordance , 2015, Comput. Educ..
[34] Marie-Claude Boudreau,et al. Think Individually, Act Collectively: Studying the Dynamics of a Technologically Enabled Civic Movement , 2013, ICIS.
[35] Rubén Comas-Forgas,et al. Academic Plagiarism: Explanatory Factors from Students’ Perspective , 2010 .
[36] Nickolas A. Jordan,et al. Integrating Social Media into the Classroom Curriculum , 2013 .
[37] Xiaolan Fu,et al. Effects of culture, social presence, and group composition on trust in technology‐supported decision‐making groups , 2010, Inf. Syst. J..
[38] Chien Chou,et al. Why do they become potential cyber-plagiarizers? Exploring the alternative thinking of copy-and-paste youth in Taiwan , 2015, Comput. Educ..
[39] Michael I. Barrett,et al. Information Infrastructure Development and Governance as Collective Action , 2015, Inf. Syst. Res..
[40] Elizabeth Armstrong,et al. Culture, Power, and Institutions: A Multi-Institutional Politics Approach to Social Movements* , 2008 .
[41] G. Marwell,et al. The critical mass in collective action , 1993 .
[42] Wanda J. Orlikowski,et al. CASE Tools as Organizational Change: Investigating Incremental and Radical Changes in Systems Development , 1993, MIS Q..
[43] Barry Turner,et al. THE USE OF GROUNDED THEORY FOR THE QUALITATIVE ANALYSIS OF ORGANIZATIONAL BEHAVIOUR , 1983 .
[44] L. Treviño,et al. Academic Dishonesty: Honor Codes and Other Contextual Influences , 1993 .