How perceptions of justice affect security attitudes: suggestions for practitioners and researchers
暂无分享,去创建一个
[1] Meng Hsiang Hsu,et al. An investigation of volitional control in information ethics , 2003, ICIS.
[2] Torin Monahan,et al. Surveillance and Security: Technological Politics and Power in Everyday Life , 2006 .
[3] Harold W. Goldstein,et al. The precursors and products of justice climates: Group leader antecedents and employee attitudinal consequences. , 2007 .
[4] Charles S. Taber,et al. Threat, Anxiety, and Support of Antiterrorism Policies , 2005 .
[5] N. Fairweather. Surveillance in Employment: The Case of Teleworking , 1999 .
[6] Hans J. Eysenck,et al. Creativity and personality: Word association, origence, and psychoticism , 1994 .
[7] J. Ivancevich,et al. Organizational behavior and management , 1985 .
[8] Brian H. Kleiner,et al. Electronic surveillance in the workplace , 2003 .
[9] J. S. Adams,et al. Inequity In Social Exchange , 1965 .
[10] L. Cranor,et al. Rethinking Rights and Regulations: Institutional Responses to New Communications Technologies , 2003 .
[11] Hao Zhao,et al. THE IMPACT OF PSYCHOLOGICAL CONTRACT BREACH ON WORK‐RELATED OUTCOMES: A META‐ANALYSIS , 2007 .
[12] Anja J E Dirkzwager,et al. The role of the media and media hypes in the aftermath of disasters. , 2005, Epidemiologic reviews.
[13] D. Gefen,et al. Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .
[14] Kim S. Cameron,et al. Developing management skills. , 1998, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[15] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[16] M. A. Sey,et al. Mobile Communication and Society: A Global Perspective (Information Revolution & Global Politics) , 2006 .
[17] M. Goldberg,et al. What to Convey in Antismoking Advertisements for Adolescents: The use of Protection Motivation Theory to Identify Effective Message Themes , 2003 .
[18] Roger Clarke,et al. Social Impacts of Transport Surveillance , 2006 .
[19] Joel Brockner,et al. Interactive Effects of Procedural Justice and Outcome Negativity on Victims and Survivors of Job Loss , 1994 .
[20] Priscilla M. Regan,et al. Surveillance and Mobilities. , 2002 .
[21] Scott C. D'Urso,et al. Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations , 2006 .
[22] Icek Ajzen,et al. From Intentions to Actions: A Theory of Planned Behavior , 1985 .
[23] J. Stevens. Applied Multivariate Statistics for the Social Sciences , 1986 .
[24] Michael Workman,et al. Fear Commerce: Inflationary Effects of Global Security Initiatives , 2008, Inf. Secur. J. A Glob. Perspect..
[25] Daniel J. Brass,et al. The Role of Instrumental and Expressive Social Ties in Employees' Perceptions of Organizational Justice , 2003, Organ. Sci..
[26] David Holman,et al. The Effects of Performance Monitoring on Emotional Labor and Well-Being in Call Centers , 2002 .
[27] John T. Scholz. Enforcement Policy and Corporate Misconduct: The Changing Perspective of Deterrence Theory , 1997 .
[28] Detmar W. Straub,et al. Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..
[29] Thomas M. Thomas,et al. Network security first-step , 2004 .
[30] Chris Argyris,et al. Understanding organizational behavior , 1961 .
[31] D. Davis,et al. Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America , 2004 .
[32] Neil Conway,et al. Understanding psychological contracts at work: A critical evaluation of theory and research , 2006 .
[33] Abdulrazzak Charbaji,et al. Individuality, willingness to take risk, and use of a personal e‐card: A Lebanese study , 2005 .
[34] Stefan Linnhoff,et al. The Emergence of Biometrics and Its Effect on Consumers , 2005 .
[35] Eirik Albrechtsen,et al. A qualitative study of users' view on information security , 2007, Comput. Secur..
[36] A. Bandura. Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.
[37] S. West,et al. Multiple Regression: Testing and Interpreting Interactions. , 1994 .
[38] A. D. De Lange,et al. Psychological contract breach and job attitudes: A meta-analysis of age as a moderator , 2008 .
[39] C. D. De Dreu,et al. Social motives and trust in integrative negotiation : The disruptive effects of punitive capability , 1998 .
[40] Eugene F. Stone,et al. Clarifying some controversial issues surrounding statistical procedures for detecting moderator variables: Empirical evidence and related matters. , 1989 .
[41] A. Bandura. The self system in reciprocal determinism. , 1978 .
[42] D. Dillman,et al. How to conduct your own survey , 1994 .
[43] K. Ball,et al. The Intensification of surveillance: crime, terrorism and warfare in the information era , 2003 .
[44] R. Rogers. Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .
[45] Charles Oppenheim,et al. Legal aspects of the web , 2005, Annu. Rev. Inf. Sci. Technol..
[46] B. Tabachnick,et al. Using Multivariate Statistics , 1983 .
[47] N. Noorderhaven,et al. When Does Trust Matter to Alliance Performance , 2006 .
[48] R. Ramanujam,et al. EMPLOYEE SILENCE ON CRITICAL WORK ISSUES: THE CROSS LEVEL EFFECTS OF PROCEDURAL JUSTICE CLIMATE , 2008 .
[49] John R. Aiello,et al. Computer‐Based Work Monitoring: Electronic Surveillance and Its Effects , 1993 .
[50] Rita Walczuch,et al. Psychological antecedents of institution-based consumer trust in e-retailing , 2004, Inf. Manag..
[51] R. W. Rogers,et al. Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. , 1987, Journal of personality and social psychology.
[52] Joy L. Hart,et al. Workplace Surveillance and Managing Privacy Boundaries , 2007 .
[53] Leigh Thompson,et al. Primacy Effects in Justice Judgments: Testing Predictions from Fairness Heuristic Theory. , 2001, Organizational behavior and human decision processes.
[54] Stuart J. Barnes,et al. Initial trust and online buyer behaviour , 2007, Ind. Manag. Data Syst..
[55] E. Eugene Schultz. A framework for understanding and predicting insider attacks , 2002, Comput. Secur..
[56] J. Braithwaite,et al. Global Business Regulation , 2001 .
[57] Rikke Frank Jørgensen,et al. Human Rights in the Global Information Society , 2006 .