Explaining cyberloafing: The role of the theory of planned behavior
暂无分享,去创建一个
Meng U. Taing | Michael D. Coovert | Kevin Askew | John E. Buckner | Alex Ilie | Jeremy A. Bauer | M. Coovert | Kevin Askew | J. Bauer | A. Ilie
[1] H. Staats,et al. Explaining Proenvironmental Intention and Behavior by Personal Norms and the Theory of Planned Behavior1 , 1999 .
[2] Kieran Mathieson,et al. Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..
[3] Leland Wilkinson,et al. Statistical Methods in Psychology Journals Guidelines and Explanations , 2005 .
[4] H. Park,et al. Distinctiveness and Influence of Subjective Norms, Personal Descriptive and Injunctive Norms, and Societal Descriptive and Injunctive Norms on Behavioral Intent: A Case of Two Behaviors Critical to Organ Donation , 2007 .
[5] Derya Ergun Ozler,et al. CYBERLOAFING PHENOMENON IN ORGANIZATIONS: DETERMINANTS AND IMPACTS , 2012 .
[6] Ute Bültmann,et al. Behavioral Determinants as Predictors of Return to Work After Long-Term Sickness Absence: An Application of the Theory of Planned Behavior , 2009, Journal of Occupational Rehabilitation.
[7] I. Ajzen. The theory of planned behavior , 1991 .
[8] Christopher M. Barnes,et al. Lost sleep and cyberloafing: Evidence from the laboratory and a daylight saving time quasi-experiment. , 2012, The Journal of applied psychology.
[9] Heather H. Jia,et al. Relationships between the Big Five personality dimensions and cyberloafing behavior , 2008 .
[10] Christine A. Henle,et al. Stealing Time at Work: Attitudes, Social Pressure, and Perceived Control as Predictors of Time Theft , 2010 .
[11] Wendi J. Everton,et al. Personal Use of Work Computers: Distraction versus Destruction , 2006, Cyberpsychology Behav. Soc. Netw..
[12] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[13] Wendi J. Everton,et al. Personality Correlates of Employees' Personal Use of Work Computers , 2005, Cyberpsychology Behav. Soc. Netw..
[14] Thompson S. H. Teo,et al. Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study , 2005, Inf. Manag..
[15] Paul E. Spector,et al. The dimensionality of counterproductivity: Are all counterproductive behaviors created equal? , 2006 .
[16] Vivien K. G. Lim,et al. Self-Regulation, Individual Characteristics and Cyberloafing , 2010, PACIS.
[17] Patricia Wallace. The Internet in the Workplace: How New Technology Is Transforming Work , 2004 .
[18] Amiram D. Vinokur,et al. How did it work? An examination of the mechanisms through which an intervention for the unemployed promoted job-search behavior , 1992, American journal of community psychology.
[19] Anita L. Blanchard,et al. Correlates of different forms of cyberloafing: The role of norms and external locus of control , 2008, Comput. Hum. Behav..
[20] Farley Stewart,et al. Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues , 2000, Inf. Secur. J. A Glob. Perspect..
[21] I. Ajzen,et al. Knowledge and the Prediction of Behavior: The Role of Information Accuracy in the Theory of Planned Behavior , 2011 .
[22] Kimberly Young,et al. Employee Internet Management: Current Business Practices and Outcomes , 2002, Cyberpsychology Behav. Soc. Netw..
[23] Katelyn Y. A. McKenna,et al. Employee job attitudes and organizational characteristics as predictors of cyberloafing , 2011, Comput. Hum. Behav..
[24] Pablo Zoghbi Manrique de Lara,et al. Internet Research , 2022 .
[25] Christine A. Henle,et al. Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory , 2009, Comput. Hum. Behav..
[26] I. Ajzen. Attitudes, Personality and Behavior , 1988 .
[27] Tao Zhou,et al. Exploring Chinese users' acceptance of instant messaging using the theory of planned behavior, the technology acceptance model, and the flow theory , 2009, Comput. Hum. Behav..
[28] Icek Ajzen,et al. From Intentions to Actions: A Theory of Planned Behavior , 1985 .
[29] I. Ajzen,et al. Choice of Travel Mode in the Theory of Planned Behavior: The Roles of Past Behavior, Habit, and Reasoned Action , 2003 .
[30] S. Restubog,et al. Yielding to (cyber)-temptation: Exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace , 2011 .
[31] Antony Stephen Reid Manstead,et al. Predicting mothers' intentions to limit frequency of infants' sugar intake: Testing the theory of planned behavior , 1991 .
[32] Mark Conner,et al. Different perceptions of control: Applying an extended theory of planned behavior to legal and illegal drug use , 1999 .
[33] Harold P. Langford,et al. Perceptions of Internet Abuse, Liability, and Fair Use , 1997 .
[34] Carl A. Kallgren,et al. A focus theory of normative conduct: Recycling the concept of norms to reduce littering in public places. , 1990 .
[35] Katherine M. White,et al. The Theory of Planned Behavior Applied to Young People's Use of Social Networking Web Sites , 2009, Cyberpsychology Behav. Soc. Netw..
[36] Robert LaRose,et al. Personal Internet use at work: Understanding cyberslacking , 2011, Comput. Hum. Behav..
[37] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[38] I. Ajzen. Constructing a TpB Questionnaire: Conceptual and Methodological Considerations , 2002 .
[39] R. Baumeister,et al. Ego Depletion: A Resource Model of Volition, Self-Regulation, and Controlled Processing , 2000 .