Announcement of formal controls as phase-shifting perceptions: their determinants and moderating role in the context of mobile loafing
暂无分享,去创建一个
Lara Khansa | Dong-Heon Kwak | Alan A. Brandyberry | Jaeung Lee | Xiao Ma | Saerom Lee | Alan Brandyberry | Dong-Heon Kwak | S. Lee | Xiao Ma | Jaeung Lee | L. Khansa
[1] L. Lanza-Kaduce,et al. Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.
[2] S. Chaiken. Heuristic versus systematic information processing and the use of source versus message cues in persuasion. , 1980 .
[3] P. Devine. Stereotypes and prejudice: Their automatic and controlled components. , 1989 .
[4] R. Hogarth,et al. Order effects in belief updating: The belief-adjustment model , 1992, Cognitive Psychology.
[5] E. Morrison,et al. Longitudinal study of the effects of information seeking on newcomer socialization , 1993 .
[6] R. Bennett,et al. A TYPOLOGY OF DEVIANT WORKPLACE BEHAVIORS: A MULTIDIMENSIONAL SCALING STUDY , 1995 .
[7] S. Sloman. The empirical case for two systems of reasoning. , 1996 .
[8] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[9] Eliot R. Smith,et al. Dual-Process Models in Social and Cognitive Psychology: Conceptual Integration and Links to Underlying Memory Systems , 2000 .
[10] Anol Bhattacherjee,et al. Understanding Information Systems Continuance: An Expectation-Confirmation Model , 2001, MIS Q..
[11] M. Lindell,et al. Accounting for common method variance in cross-sectional research designs. , 2001, The Journal of applied psychology.
[12] Jeffrey M. Stanton,et al. Company profile of the frequent internet user , 2002, CACM.
[13] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[14] Jo Ann Oravec. Constructive approaches to internet recreation in the workplace , 2002, CACM.
[15] D. Kahneman. A perspective on judgment and choice: mapping bounded rationality. , 2003, The American psychologist.
[16] D. Galletta,et al. An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .
[17] Anol Bhattacherjee,et al. Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test , 2004, MIS Q..
[18] F. Strack,et al. Reflective and Impulsive Determinants of Social Behavior , 2004, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.
[19] Thompson S. H. Teo,et al. Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study , 2005, Inf. Manag..
[20] Naresh K. Malhotra,et al. A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena , 2005, Manag. Sci..
[21] Murugan Anandarajan,et al. Developing Human Capital through Personal Web Use in the Workplace: Mapping Employee Perceptions , 2005, Commun. Assoc. Inf. Syst..
[22] Pablo Zoghbi Manrique de Lara,et al. Internet Research , 2022 .
[23] Naresh K. Malhotra,et al. Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..
[24] Anol Bhattacherjee,et al. Influence Processes for Information Technology Acceptance: An Elaboration Likelihood Model , 2006, MIS Q..
[25] F. Strack,et al. Reflective and Impulsive Determinants of Consumer Behavior , 2006 .
[26] S. Ashford,et al. Feedback-Seeking in Individual Adaptation: A Resource Perspective , 1986 .
[27] Moez Limayem,et al. How Habit Limits the Predictive Power of Intention: The Case of Information Systems Continuance , 2007, MIS Q..
[28] Zoonky Lee,et al. Understanding Personal Web Usage in Organizations , 2007, J. Organ. Comput. Electron. Commer..
[29] David A Harrison,et al. Do Peers Make the Place? Conceptual Synthesis and Meta-Analysis of Coworker Effects on Perceptions, Attitudes, OCBs, and Performance , 2008, The Journal of applied psychology.
[30] L. G. Pee,et al. Explaining non-work-related computing in the workplace: A comparison of alternative models , 2008, Inf. Manag..
[31] Anita L. Blanchard,et al. Correlates of different forms of cyberloafing: The role of norms and external locus of control , 2008, Comput. Hum. Behav..
[32] Jonathan Evans. Dual-processing accounts of reasoning, judgment, and social cognition. , 2008, Annual review of psychology.
[33] R. Wiers,et al. Impulsive versus reflective influences on health behavior: a theoretical framework and empirical review , 2008 .
[34] Pablo Zoghbi-Manrique-de-Lara,et al. Inequity, conflict, and compliance dilemma as causes of cyberloafing , 2009 .
[35] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[36] Ritu Agarwal,et al. Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..
[37] Yanchun Zhang,et al. Why Employees Do Non-Work-Related Computing in the Workplace , 2010, J. Comput. Inf. Syst..
[38] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[39] Katelyn Y. A. McKenna,et al. Employee job attitudes and organizational characteristics as predictors of cyberloafing , 2011, Comput. Hum. Behav..
[40] Robert LaRose,et al. Personal Internet use at work: Understanding cyberslacking , 2011, Comput. Hum. Behav..
[41] Yajiong Xue,et al. Ensuring Employees' IT Compliance: Carrot or Stick? , 2013, Inf. Syst. Res..
[42] Kuang-Wei Wen,et al. Organizations' Information Security Policy Compliance: Stick or Carrot Approach? , 2012, J. Manag. Inf. Syst..
[43] Mikko T. Siponen,et al. Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work , 2013, Inf. Manag..
[44] Paul Benjamin Lowry,et al. Using Accountability to Reduce Access Policy Violations in Information Systems , 2013, J. Manag. Inf. Syst..
[45] Dustin Ormond,et al. Don't make excuses! Discouraging neutralization to reduce IT policy violation , 2013, Comput. Secur..
[46] Yi Ding,et al. Am I "Pushed" to Loaf at Work? A Study of Push Notification Triggered Mobile-loafing , 2014, ICIS.
[47] Tejaswini Herath,et al. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..
[48] Bo Xiao,et al. Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding , 2015, Inf. Syst. Res..
[49] Paul Benjamin Lowry,et al. The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness , 2015, Inf. Syst. Res..
[50] Zauwiyah Ahmad,et al. Personal Internet use: The use of personal mobile devices at the workplace , 2015 .
[51] Dennis F. Galletta,et al. What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors , 2015, MIS Q..
[52] Sacip Toker,et al. An investigation of the impact of demographics on cyberloafing from an educational setting angle , 2015, Comput. Hum. Behav..
[53] Fred D. Davis,et al. Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual‐systems perspective , 2015, Inf. Syst. J..
[54] Paul Benjamin Lowry,et al. Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations Under Conditions of Strain and Excess , 2015, J. Assoc. Inf. Syst..
[55] Hamed Qahri Saremi,et al. Problematic Use of Social Networking Sites: Antecedents and Consequence from a Dual-System Theory Perspective , 2016, J. Manag. Inf. Syst..
[56] David P. Biros,et al. An Empirical Validation of Malicious Insider Characteristics , 2016, J. Manag. Inf. Syst..
[57] Ragnhildur Lilja Asgeirsdottir,et al. Balanced Inventory of Desirable Responding--Short Form , 2017 .
[58] Kyung-shick Choi,et al. Mobile Phone Technology and Online Sexual Harassment among Juveniles in South Korea: Effects of Self-control and Social Learning , 2017 .
[59] Lara Khansa,et al. To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls , 2017, J. Manag. Inf. Syst..
[60] Tessa Melkonian,et al. To Shift or Not to Shift? Determinants and Consequences of Phase Shifting on Justice Judgments , 2017 .
[61] Thurasamy Ramayah,et al. Determinants of cyberloafing: a comparative study of a public and private sector organization , 2017, Internet Res..
[62] Merrill Warkentin,et al. Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives , 2018, Inf. Syst. J..
[63] Jinnan Wu,et al. Student Cyberloafing In and Out of the Classroom in China and the Relationship with Student Performance , 2018, Cyberpsychology Behav. Soc. Netw..
[64] Xiao Ma,et al. Cross-Level Moderation of Team Cohesion in Individuals' Utilitarian and Hedonic Information Processing: Evidence in the Context of Team-Based Gamified Training , 2019, J. Assoc. Inf. Syst..
[65] Thurasamy Ramayah,et al. Workplace internet leisure and employees' productivity , 2019, Internet Res..
[66] Philipp Holtkamp,et al. Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research , 2019, J. Assoc. Inf. Syst..
[67] Xiao Ma,et al. Disrupting Unwanted Habits in Online Gambling Through Information Technology , 2019, J. Manag. Inf. Syst..
[68] Shwadhin Sharma,et al. I want it my way: Using consumerism and neutralization theory to understand students' cyberslacking behavior , 2020, Int. J. Inf. Manag..
[69] Yajun Zhang,et al. Are overqualified employees bad apples? A dual-pathway model of cyberloafing , 2019, Internet Res..
[70] Upasna A. Agarwal,et al. Abusive supervisors and employees who cyberloaf , 2020, Internet Res..
[71] Joseph C. Ugrin,et al. The bright and dark sides of social cyberloafing: Effects on employee mental health in China , 2020 .
[72] A. Tsohou,et al. Examining the side effects of organizational Internet monitoring on employees , 2020, Internet Res..
[73] Sauvik Kumar Batabyal,et al. Traditional cyberloafing, mobile cyberloafing and personal mobile-internet loafing in business organizations: Exploring cognitive ethical logics , 2020, J. Inf. Commun. Ethics Soc..
[74] P. Hensel,et al. Job Overload, Organizational Commitment, and Motivation as Antecedents of Cyberloafing: Evidence from Employee Monitoring Software , 2020, European Management Review.
[75] Kian Yeik Koay,et al. The effects of abusive supervision, emotional exhaustion and organizational commitment on cyberloafing: a moderated-mediation examination , 2020, Internet Res..
[76] Przemyslaw G. Hensel,et al. Curbing cyberloafing: studying general and specific deterrence effects with field evidence , 2020, Eur. J. Inf. Syst..