Using IT Design to Prevent Cyberbullying
暂无分享,去创建一个
Paul Benjamin Lowry | Gregory Moody | Sutirtha Chatterjee | P. Lowry | Sutirtha Chatterjee | Gregory Moody
[1] Joseph S. Valacich,et al. The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use , 2015, J. Manag. Inf. Syst..
[2] S. Bauman,et al. Principles of cyberbullying research: definitions, measures, and methodology , 2013 .
[3] Wanda J. Orlikowski,et al. Entanglements in Practice: Performing Anonymity Through Social Media , 2014, MIS Q..
[4] Jennifer Gibbs,et al. Social media as a catalyst for online deliberation? Exploring the affordances of Facebook and YouTube for political expression , 2013, Comput. Hum. Behav..
[5] Sabine Matook,et al. Are You Feeling Lonely? The Impact of Relationship Characteristics and Online Social Network Features on Loneliness , 2015, J. Manag. Inf. Syst..
[6] D. Espelage,et al. What Can Be Done About School Bullying? , 2010 .
[7] Fintan Culwin,et al. Supporting social awareness in collaborative e-learning , 2012, Br. J. Educ. Technol..
[8] Neil A. Morgan,et al. The impact of product market strategy-organizational culture fit on business performance , 2011 .
[9] Varun Grover,et al. The Information Systems Field: Making a Case for Maturity and Contribution , 2012, J. Assoc. Inf. Syst..
[10] C. R. Tittle,et al. Continuing the Discussion of Control Balance , 1999 .
[11] D. Ausubel,et al. Relationships between shame and guilt in the socializing process. , 1955, Psychological review.
[12] Bruno S. Silvestre,et al. Social Media? Get Serious! Understanding the Functional Building Blocks of Social Media , 2011 .
[13] Panagiotis G. Ipeirotis,et al. Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.
[14] Robert E. Crossler,et al. I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks , 2014, J. Inf. Syst..
[15] Sheri A Bauman,et al. New Directions in Cyberbullying Research , 2015 .
[16] D. Gefen,et al. Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .
[17] Marcia J. Simmering,et al. A Tale of Three Perspectives , 2009 .
[18] Milena M. Head,et al. Exploring human images in website design: a multi-method approach , 2009 .
[19] Andy Adler,et al. Evaluating and implementing a collaborative office document system , 2006, Interact. Comput..
[20] Cliff Lampe,et al. The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..
[21] N. Venkatraman,et al. The Concept of Fit in Strategy Research: Towards Verbal and Statistical Correspondence , 2018 .
[22] Mark Levine,et al. Deindividuation, power relations between groups and the expression of social identity: The effects of visibility to the out‐group , 1994 .
[23] T. Postmes,et al. Social Influence in Computer-Mediated Communication: The Effects of Anonymity on Group Behavior , 2001 .
[24] A. Hovav,et al. Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures , 2009 .
[25] Alex R. Piquero,et al. Applying Tittle’s control balance theory to police deviance , 2001 .
[26] Ersilia Menesini,et al. The Measurement of Cyberbullying: Dimensional Structure and Relative Item Severity and Discrimination , 2011, Cyberpsychology Behav. Soc. Netw..
[27] Teena Willoughby,et al. Technology and violence: Conceptual issues raised by the rapidly changing social environment , 2013 .
[28] J. Cadeaux,et al. Alternative forms of fit in distribution flexibility strategies , 2012 .
[29] Sandra L. Calvert,et al. College students' social networking experiences on Facebook , 2009 .
[30] Yong Lu,et al. Harnessing the Power of Self-Organization in an Online Community During Organizational Crisis , 2014, MIS Q..
[31] Rajeev Sharma,et al. Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research , 2009 .
[32] Kimberly M. Christopherson. The positive and negative implications of anonymity in Internet social interactions: "On the Internet, Nobody Knows You're a Dog" , 2007, Comput. Hum. Behav..
[33] Marilyn Anne Campbell,et al. Cyberbullying: The New Face of Workplace Bullying? , 2009, Cyberpsychology Behav. Soc. Netw..
[34] Richard T. Watson,et al. Social Loafing in Technology-Supported Teams , 2008, Computer Supported Cooperative Work (CSCW).
[35] Yajiong Xue,et al. The Road to Business-IT Alignment: A Case Study of Two Chinese Companies , 2011, Commun. Assoc. Inf. Syst..
[36] Alex R. Piquero,et al. AN EMPIRICAL TEST OF TITTLE'S CONTROL BALANCE THEORY* , 1999 .
[37] Caroline Lang,et al. Just untag it: Exploring the management of undesirable Facebook photos , 2015, Comput. Hum. Behav..
[38] Alex R. Piquero,et al. Extending Tittle's Control Balance Theory to Account for Victimization , 2003 .
[39] D. Matsumoto,et al. The Cambridge Dictionary of Psychology , 2009 .
[40] Martin Schader,et al. Workers' Task Choice in Crowdsourcing and Human Computation Markets , 2012, ICIS.
[41] Lara Khansa,et al. To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls , 2017, J. Manag. Inf. Syst..
[42] Jason Bennett Thatcher,et al. Conceptualizing models using multidimensional constructs: a review and guidelines for their use , 2012, Eur. J. Inf. Syst..
[43] Sheldene K. Simola,et al. Understanding Moral Courage Through a Feminist and Developmental Ethic of Care , 2015 .
[44] Sonja Utz,et al. It Is All About Being Popular: The Effects of Need for Popularity on Social Network Site Use , 2012, Cyberpsychology Behav. Soc. Netw..
[45] Gérard P. Cachon,et al. Perspective: Complexity Theory and Organization Science , 1999, Organization Science.
[46] T. Postmes,et al. Breaching or Building Social Boundaries? , 1998 .
[47] S. Fiske,et al. Controlling other people. The impact of power on stereotyping. , 1993, The American psychologist.
[48] Babak Rahimi. The Agonistic Social Media: Cyberspace in the Formation of Dissent and Consolidation of State Power in Postelection Iran , 2011 .
[49] Jack Rivituso,et al. Cyberbullying Victimization among College Students: An Interpretive Phenomenological Analysis , 2014, J. Inf. Syst. Educ..
[50] Paul Benjamin Lowry,et al. Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It , 2014, IEEE Transactions on Professional Communication.
[51] Tom L. Roberts,et al. Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors , 2013, MIS Q..
[52] Alex R. Piquero,et al. Control balance and exploitative corporate crime , 2006 .
[53] Gerald C. Kane,et al. What's Different about Social Media Networks? A Framework and Research Agenda , 2014, MIS Q..
[54] Matt R. Nobles,et al. Assessing Stalking Behaviors in a Control Balance Theory Framework , 2013 .
[55] Marko M. Skoric,et al. Facebook bullying: An extension of battles in school , 2013, Comput. Hum. Behav..
[56] J. Grimes,et al. Promoting transparency and accountability through ICTs, social media, and collaborative e‐government , 2012 .
[57] Katherine S. Williams. Using Tittle's control balance theory to understand computer crime and deviance , 2008 .
[58] Alex R. Piquero,et al. Applying Rasch modeling to the validity of a control balance scale , 2001 .
[59] Jennifer D. Shapka,et al. Cyber-Aggression and Victimization and Social Information Processing: Integrating the Medium and the Message , 2013 .
[60] Robert E. Crossler,et al. Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption , 2013, ICIS.
[61] Qing Hu,et al. Does deterrence work in reducing information security policy abuse by employees? , 2011, Commun. ACM.
[62] Robert Steinbauer,et al. Ethical Leadership and Followers’ Moral Judgment: The Role of Followers’ Perceived Accountability and Self-leadership , 2014 .
[63] Anna Cinzia Squicciarini,et al. Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks , 2011, Computer.
[64] R. Gregory Dunaway,et al. An Application of Control Balance Theory to Incarcerated Sex Offenders , 1998 .
[65] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[66] David A. Nadler,et al. A model for diagnosing organizational behavior , 1980 .
[67] Paul Benjamin Lowry,et al. Using Accountability to Reduce Access Policy Violations in Information Systems , 2013, J. Manag. Inf. Syst..
[68] Thompson S. H. Teo,et al. Knowledge portals in Chinese consulting firms: a task–technology fit perspective , 2008, Eur. J. Inf. Syst..
[69] Lourdes Villardón-Gallego,et al. Cyberbullying in adolescents: Modalities and aggressors' profile , 2010, Comput. Hum. Behav..
[70] Lisa Wallander. 25 years of factorial surveys in sociology: A review , 2009 .
[71] Michael Arntfield,et al. Towards a Cybervictimology: Cyberbullying, Routine Activities Theory, and the Anti-Sociality of Social Media , 2015 .
[72] Bernard C. Y. Tan,et al. Group Polarization and Computer-Mediated Communication: Effects of Communication Cues, Social Presence, and Anonymity , 2002, Inf. Syst. Res..
[73] J. Rosenzweig,et al. General systems theory: applications for organization and management. , 1972, The Journal of nursing administration.
[74] Dawn L. Rothe,et al. Toward a Criminology of International Criminal Law: An Integrated Theory of International Criminal Violations , 2009 .
[75] Andrew M. Hardin,et al. Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation , 2015, J. Manag. Inf. Syst..
[76] Gary Klein,et al. Resolving Difference Score Issues in Information Systems Research , 2009, MIS Q..
[77] Robert Slonje,et al. The nature of cyberbullying, and strategies for prevention , 2013, Comput. Hum. Behav..
[78] Russell A. Sabella,et al. Cyberbullying myths and realities , 2013, Comput. Hum. Behav..
[79] Paul Benjamin Lowry,et al. Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations , 2015, MIS Q..
[80] Brian K. Payne,et al. Expanding the Boundaries of Criminal Justice: Emphasizing the “S” in the Criminal Justice Sciences through Interdisciplinary Efforts , 2016 .
[81] P. Cuijpers,et al. Supportive Accountability: A Model for Providing Human Support to Enhance Adherence to eHealth Interventions , 2011, Journal of medical Internet research.
[82] Jennifer L. Bevan,et al. Negative emotional and cognitive responses to being unfriended on Facebook: An exploratory study , 2012, Comput. Hum. Behav..
[83] Viswanath Venkatesh,et al. E XPECTATION D ISCONFIRMATION AND T ECHNOLOGY A DOPTION : P OLYNOMIAL M ODELING AND R ESPONSE S URFACE A NALYSIS 1 , 2010 .
[84] Siddharth Suri,et al. Conducting behavioral research on Amazon’s Mechanical Turk , 2010, Behavior research methods.
[85] Stefan Harrendorf,et al. How Can Criminology Contribute to an Explanation of International Crimes , 2014 .
[86] Andrea Everard,et al. Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..
[87] Elias Aboujaoude,et al. Cyberbullying: Review of an Old Problem Gone Viral. , 2015, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[88] Henry Lieberman,et al. Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying , 2012, TIIS.
[89] Paul Benjamin Lowry,et al. A New Approach to the Problem of Access Policy Violations: Increasing Perceptions of Accountability through the User Interface , 2015 .
[90] Michelle L. Kelley,et al. Predictors of cyberbullying perpetration among college students: An application of the Theory of Reasoned Action , 2014, Comput. Hum. Behav..
[91] Theodore R. Curry. Integrating Motivating and Constraining Forces in Deviance Causation: A Test of Causal Chain Hypotheses in Control Balance Theory , 2005 .
[92] Tobias Greitemeyer,et al. Facebook's emotional consequences: Why Facebook causes a decrease in mood and why people still use it , 2014, Comput. Hum. Behav..
[93] Larry D. Rosen,et al. Is Facebook creating "iDisorders"? The link between clinical symptoms of psychiatric disorders and technology use, attitudes and anxiety , 2013, Comput. Hum. Behav..
[94] Charles R. Tittle,et al. Control Balance: Toward A General Theory Of Deviance , 1995 .
[95] Robin M. Kowalski,et al. Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. , 2014, Psychological bulletin.
[96] P. Wood,et al. Offending Patterns, Control Balance, and Affective Rewards among Convicted Sex Offenders , 2015 .
[97] Alan Borning,et al. Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.
[98] Mark A. Fuller,et al. A Deontological Approach to Designing Ethical Collaboration , 2009, J. Assoc. Inf. Syst..
[99] Inmaculada Beltrán-Martín,et al. Human Resource Flexibility as a Mediating Variable Between High Performance Work Systems and Performance , 2008 .
[100] Rolph E. Anderson,et al. Multivariate Data Analysis (7th ed. , 2009 .
[101] I. Coyne,et al. Bullying in different contexts: Commonalities, differences and the role of theory , 2009 .
[102] Geoffrey C. Bowker,et al. Values in design , 2011, Commun. ACM.
[103] David G. Rand,et al. The online laboratory: conducting experiments in a real labor market , 2010, ArXiv.
[104] Robert S. Tokunaga,et al. Following you home from school: A critical review and synthesis of research on cyberbullying victimization , 2010, Comput. Hum. Behav..
[105] Justin W. Patchin,et al. Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .
[106] Chuang Wang,et al. Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model , 2016, Inf. Syst. Res..
[107] K. Mason. Cyberbullying: A preliminary assessment for school personnel , 2008 .
[108] Robert E. Crossler,et al. Implications of Monitoring Mechanisms on Bring Your Own Device Adoption , 2017, J. Comput. Inf. Syst..
[109] Russell B. Clayton,et al. Cheating, Breakup, and Divorce: Is Facebook Use to Blame? , 2013, Cyberpsychology Behav. Soc. Netw..
[110] D. Espelage,et al. Theories of cyberbullying , 2012 .
[111] Kathleen E. McKone-Sweet,et al. Improving Performance through an Integrated Manufacturing Program , 2006 .
[112] Matt R. Nobles,et al. Protection Against Pursuit: A Conceptual and Empirical Comparison of Cyberstalking and Stalking Victimization Among a National Sample , 2014 .
[113] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[114] Tom L. Roberts,et al. Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust , 2015, Inf. Syst. J..
[115] M ChristophersonKimberly. The positive and negative implications of anonymity in Internet social interactions , 2007 .
[116] Tom L. Roberts,et al. Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..
[117] Ben O'Loughlin,et al. Social Media Analysis and Public Opinion: The 2010 UK General Election , 2015, J. Comput. Mediat. Commun..
[118] Gregory A. Bigley,et al. Effects of organizational and professional identification on the relationship between administrators' social influence and professional employees' adoption of new work behavior. , 2009, The Journal of applied psychology.
[119] David A. Butz,et al. Power, Risk, and the Status Quo , 2007, Personality & social psychology bulletin.
[120] Matt Vogel,et al. Beyond Traditional Interaction: Exploring the functional form of the exposure-offending association across online network size , 2015 .
[121] P. Tetlock,et al. Accounting for the effects of accountability. , 1999, Psychological bulletin.
[122] Ivan Dimitrijevic,et al. Relationship between internet use and depression: Focus on physiological mood oscillations, social networking and online addictive behavior , 2015, Comput. Hum. Behav..
[123] Charles R. Tittle. Thoughts Stimulated by Braithwaite's Analysis of Control Balance Theory , 1997 .
[124] Ulla K. Bunz,et al. The rules of virtual groups: Trust, liking, and performance in computer-mediated communication , 2005 .
[125] George W. Burruss,et al. SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD , 2010 .
[126] B. Spears,et al. Emerging Methodological Strategies to Address Cyberbullying: Online Social Marketing and Young People as Co-Researchers , 2013 .
[127] Jay F. Nunamaker,et al. A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..
[128] F. Dehue. Cyberbullying Research: New Perspectives and Alternative Methodologies. Introduction to the Special Issue , 2013 .
[129] Justin W. Patchin,et al. Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying , 2008 .
[130] Soumya Ray,et al. What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model , 2017, J. Manag. Inf. Syst..
[131] Tadao Ichikawa,et al. A Digital Photography Framework Supporting Social Interaction and Affective Awareness , 1999, HUC.
[132] Tejaswini Herath,et al. A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..
[133] James Y. L. Thong,et al. Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..
[134] Wendy Nelson Espeland,et al. The Discipline of Rankings: Tight Coupling and Organizational Change , 2009 .
[135] M. Jackson,et al. Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice , 2013 .
[136] Wayne F. Velicer,et al. Item format and the structure of the buss‐durkee hostility inventory , 1985 .
[137] Dennis F. Galletta,et al. The Drivers in the Use of Online Whistle-Blowing Reporting Systems , 2013, J. Manag. Inf. Syst..
[138] Marilyn A. Campbell. How research findings can inform legislation and school policy on cyberbullying. , 2013 .
[139] Andrew Schwarz,et al. Examining the Impact and Detection of the "Urban Legend" of Common Method Bias , 2017, DATB.
[140] Charles R. Tittle,et al. Refining control balance theory , 2004 .
[141] Premilla D'Cruz,et al. The interface between technology and customer cyberbullying: Evidence from India , 2014, Inf. Organ..
[142] Matthew Hickman, Alex Piquero. exploring the relationships between gender, control balance, and deviance , 2001 .
[143] Sheri A Bauman,et al. This Issue: Theories of Bullying and Cyberbullying , 2014 .
[144] Suprateek Sarker,et al. How "Sociotechnical" is our IS Research? An Assessment and Possible Ways Forward , 2013, ICIS.
[145] Dwight D. Frink,et al. An accountability account: A review and synthesis of the theoretical and empirical research on felt accountability , 2017 .
[146] Alain Pinsonneault,et al. Anonymity in Group Support Systems Research: A New Conceptualization, Measure, and Contingency Framework , 1997, J. Manag. Inf. Syst..
[147] B. R. Schlenker,et al. The triangle model of responsibility. , 1994, Psychological review.
[148] Alex R. Piquero,et al. Studying the reach of deterrence: Can deterrence theory help explain police misconduct? , 2004 .
[149] Panagiotis G. Ipeirotis. Analyzing the Amazon Mechanical Turk marketplace , 2010, XRDS.
[150] G. Jasso. Factorial Survey Methods for Studying Beliefs and Judgments , 2006 .
[151] H. Marsh,et al. Application of confirmatory factor analysis to the study of self-concept: First- and higher order factor models and their invariance across groups. , 1985 .
[152] Justin W. Patchin,et al. Bullies Move Beyond the Schoolyard , 2006 .
[153] Paul Benjamin Lowry,et al. "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels , 2016, J. Strateg. Inf. Syst..
[154] Alex R. Piquero,et al. Anticipated shaming and criminal offending , 2010 .
[155] Dianne Cyr,et al. The role of social presence in establishing loyalty in e-Service environments , 2007, Interact. Comput..
[156] Andy Hochstetler,et al. An exploratory assessment of tittle's control balance theory: Results from the national youth survey , 2002 .
[157] Winter A. Mason,et al. Internet research in psychology. , 2015, Annual review of psychology.
[158] Gregory D. Saxton,et al. Information, Community, and Action: How Nonprofit Organizations Use Social Media , 2011, J. Comput. Mediat. Commun..
[159] Ryad Titah,et al. Nonlinearities Between Attitude and Subjective Norms in Information Technology Acceptance: A Negative Synergy? , 2009, MIS Q..
[160] A. Falanga,et al. Summary and Conclusions , 2009, Pathophysiology of Haemostasis and Thrombosis.
[161] Paul Benjamin Lowry,et al. The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks , 2017, J. Manag. Inf. Syst..
[162] Mohamed Khalifa,et al. Design for Social Presence in Online Communities: a Multi-Dimensional Approach , 2009, PACIS.
[163] Esther Shein,et al. Ephemeral data , 2013, CACM.
[164] Peter H. Rossi,et al. Measuring social judgments : the factorial survey approach , 1983 .
[165] Christopher B. Davison,et al. The Dangers of Cyberbullying , 2014 .
[166] Paul Benjamin Lowry,et al. Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..
[167] Helmut Krcmar,et al. Tweeting to Feel Connected: A Model for Social Connectedness in Online Social Networks , 2013, Int. J. Hum. Comput. Interact..
[168] Susan V. Scott,et al. Reconfiguring relations of accountability: Materialization of social media in the travel sector , 2011 .
[169] Robert Slonje,et al. Processes of cyberbullying, and feelings of remorse by bullies: A pilot study , 2012 .
[170] Roman Beck,et al. Knowledge Exchange and Symbolic Action in Social Media-Enabled Electronic Networks of Practice: A Multilevel Perspective on Knowledge Seekers and Contributors , 2014, MIS Q..
[171] Eric T. G. Wang,et al. Factors affecting information systems planning effectiveness: organizational contexts and planning systems dimensions , 2003, Inf. Manag..
[172] Matt R. Nobles,et al. A Multi-Theoretical Framework to Assess Gendered Stalking Victimization: The Utility of Self-Control, Social Learning, and Control Balance Theories , 2016 .
[173] Ning Nan,et al. Capturing Bottom-Up Information Technology Use Processes: A Complex Adaptive Systems Model , 2011, MIS Q..
[174] Sonja Utz,et al. The Role of Social Network Sites in Romantic Relationships: Effects on Jealousy and Relationship Happiness , 2011, J. Comput. Mediat. Commun..
[175] Anandhi S. Bharadwaj,et al. A Resource-Based Perspective on Information Technology Capability and Firm Performance: An Empirical Investigation , 2000, MIS Q..