From improper to acceptable: How perpetrators neutralize workplace bullying behaviors in the cyber world
暂无分享,去创建一个
[1] J. Scisco. Cyberbullying in the Workplace , 2019, Cyberbullying in Schools, Workplaces, and Romantic Relationships.
[2] Robin M. Kowalski,et al. Bullying and cyberbullying in adulthood and the workplace , 2018, The Journal of social psychology.
[3] Nicholas Brody,et al. Cyberbullying: Topics, strategies, and sex differences , 2017, Comput. Hum. Behav..
[4] Jordana N. Navarro,et al. One step forward, two steps back: Cyberbullying within social networking sites , 2017, Security Journal.
[5] Sara Erreygers,et al. Letting off steam online: a longitudinal analysis of the Emotion Reaction model of workplace cyberbullying , 2017 .
[6] Carolyn Axtell,et al. Understanding the relationship between experiencing workplace cyberbullying, employee mental strain and job satisfaction: a dysempowerment approach , 2017 .
[7] Paul Benjamin Lowry,et al. Using the Control Balance Theory to Explain Social Media Deviance , 2017, HICSS.
[8] Chuang Wang,et al. Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model , 2016, Inf. Syst. Res..
[9] C. Axtell,et al. Design, development and validation of a workplace cyberbullying measure, the WCM , 2016 .
[10] Magdalena Obermaier,et al. Bystanding or standing by? How the number of bystanders affects the intention to intervene in cyberbullying , 2016, New Media Soc..
[11] Maree Roche,et al. Predictors of Workplace Bullying and Cyber-Bullying in New Zealand , 2016, International journal of environmental research and public health.
[12] Robin L. Wakefield,et al. Friend or Foe: Cyberbullying in Social Network Sites , 2016, DATB.
[13] Heidi Vandebosch,et al. An Investigation of Short-Term Longitudinal Associations Between Social Anxiety and Victimization and Perpetration of Traditional Bullying and Cyberbullying , 2015, Journal of Youth and Adolescence.
[14] Christopher P. Barlett,et al. Predicting Cyberbullying From Anonymity. , 2014 .
[15] Michael J. Boulton,et al. A Comparison of Preservice Teachers’ Responses to Cyber Versus Traditional Bullying Scenarios , 2014 .
[16] Karolien Poels,et al. Cyberbullying on social network sites. An experimental study into bystanders' behavioural intentions to help the victim or reinforce the bully , 2014, Comput. Hum. Behav..
[17] D. Leidner,et al. Workplace Cyberbullying: The Antecedents and Consequences , 2014 .
[18] K. Poels,et al. Online perspective-taking as an intervention tool against cyberbullying. , 2014, Studies in health technology and informatics.
[19] M. Siponen,et al. Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning , 2013, ICIS 2013.
[20] Sara Branch,et al. Workplace Bullying, Mobbing and General Harassment: A Review , 2013 .
[21] M. Jackson,et al. Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice , 2013 .
[22] Heng Xu,et al. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..
[23] Marc Ziegele,et al. Blaming the Victim: The Effects of Extraversion and Information Disclosure on Guilt Attributions in Cyberbullying , 2013, Cyberpsychology Behav. Soc. Netw..
[24] Marko Sarstedt,et al. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .
[25] Kevin C. Runions. Toward a Conceptual Model of Motive and Self-Control in Cyber-Aggression: Rage, Revenge, Reward, and Recreation , 2013, Journal of youth and adolescence.
[26] T. Little,et al. Individual and Contextual Predictors of Cyberbullying: The Influence of Children’s Provictim Attitudes and Teachers’ Ability to Intervene , 2013, Journal of Youth and Adolescence.
[27] S. Perren,et al. Is Cyberbullying Worse than Traditional Bullying? Examining the Differential Roles of Medium, Publicity, and Anonymity for the Perceived Severity of Bullying , 2012, Journal of Youth and Adolescence.
[28] Wenli Li,et al. Effects of Neutralization Techniques and Rational Choice Theory on Internet Abuse in the Workplace , 2013, PACIS.
[29] Maria Assunta Zanetti,et al. Morally Disengaged and Unempathic: Do Cyberbullies Fit These Definitions? An Exploratory Study , 2012, Cyberpsychology Behav. Soc. Netw..
[30] Azy Barak,et al. Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition , 2012, Comput. Hum. Behav..
[31] D. Straub,et al. Editor's comments: a critical look at the use of PLS-SEM in MIS quarterly , 2012 .
[32] Thomas Gregory,et al. Neutralization and Whistleblowing: An empirical examination , 2012, AMCIS.
[33] Lesya M. Hassall,et al. An Examination of a Theory of Embodied Social Presence in Virtual Worlds , 2011, Decis. Sci..
[34] M. Sandy Hershcovis,et al. “Incivility, social undermining, bullying…oh my!”: A call to reconcile constructs within workplace aggression research , 2011 .
[35] S. Bauman. Cyberbullying in a Rural Intermediate School: An Exploratory Study , 2010 .
[36] E. Menesini,et al. Cyberbullying: Labels, Behaviours and Definition in Three European Countries , 2010, Australian Journal of Guidance and Counselling.
[37] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[38] Yajiong Xue,et al. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..
[39] H. Hoel,et al. Workplace bullying, industrial relations and the challenge for management in Britain and Sweden , 2010 .
[40] Mikko T. Siponen,et al. New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[41] Robert Slonje,et al. Cyberbullying: the nature and extent of a new kind of bullying, in and out of school , 2010 .
[42] Ronald T. Cenfetelli,et al. Interpretation of Formative Measurement in Information Systems Research , 2009, MIS Q..
[43] F. Mishna,et al. Ongoing and Online: Children and youth's perceptions of cyber bullying , 2009 .
[44] Marilyn Anne Campbell,et al. Cyberbullying: The New Face of Workplace Bullying? , 2009, Cyberpsychology Behav. Soc. Netw..
[45] Hans De Witte,et al. A qualitative study on the development of workplace bullying: Towards a three way model , 2009 .
[46] D. Cross,et al. Cyberbullying Versus Face-to-Face Bullying A Theoretical and Conceptual Review , 2009 .
[47] Denise Salin,et al. The prevention of workplace bullying as a question of human resource management: measures adopted and underlying organizational factors , 2008 .
[48] Sue Bennett,et al. The 'digital natives' debate: A critical review of the evidence , 2008, Br. J. Educ. Technol..
[49] Peter K. Smith,et al. Cyberbullying: its nature and impact in secondary school pupils. , 2008, Journal of child psychology and psychiatry, and allied disciplines.
[50] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[51] Kimberly M. Christopherson. The positive and negative implications of anonymity in Internet social interactions: "On the Internet, Nobody Knows You're a Dog" , 2007, Comput. Hum. Behav..
[52] C. Pietersen. Interpersonal bullying behaviours in the workplace , 2007 .
[53] Wayne A. Hochwarter,et al. Coping with abusive supervision: The neutralizing effects of ingratiation and positive affect on negative employee outcomes , 2007 .
[54] Juliana Raskauskas,et al. Involvement in traditional and electronic bullying among adolescents. , 2007, Developmental psychology.
[55] Qing Hu,et al. Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..
[56] A. Joinson. Disinhibition and the Internet , 2007 .
[57] Eun-Ju Lee,et al. When and How Does Depersonalization Increase Conformity to Group Norms in Computer-Mediated Communication? , 2006, Commun. Res..
[58] Brian J. Taylor,et al. Factorial Surveys: Using Vignettes to Study Professional Judgement , 2005 .
[59] Volkan Topalli,et al. WHEN BEING GOOD IS BAD: AN EXPANSION OF NEUTRALIZATION THEORY* , 2005 .
[60] S. Smoyak,et al. Perceptions of Cyberstalking Among College Students , 2005 .
[61] Cheryl Burke Jarvis,et al. The problem of measurement model misspecification in behavioral and organizational research and some recommended solutions. , 2005, The Journal of applied psychology.
[62] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[63] D. Gefen,et al. Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .
[64] John Suler,et al. The Online Disinhibition Effect , 2004, Cyberpsychology Behav. Soc. Netw..
[65] Ned Kock,et al. Trust and leadership in virtual teamwork: A media naturalness perspective , 2004 .
[66] M. Sheehan,et al. Perceptions of Upwards Bullying: An Interview Study , 2004 .
[67] Paul F. Cromwell,et al. the devil made me do it: use of neutralizations by shoplifters , 2003 .
[68] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[69] Cheryl Burke Jarvis,et al. A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .
[70] P. Peretti-Watel. Neutralization theory and the denial of risk: some evidence from cannabis use among French adolescents. , 2003, The British journal of sociology.
[71] Wa Wijnand IJsselsteijn,et al. Staying in touch : social presence and connectedness through synchronous and asynchonous communication media , 2003 .
[72] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[73] Bernard C. Y. Tan,et al. Group Polarization and Computer-Mediated Communication: Effects of Communication Cues, Social Presence, and Anonymity , 2002, Inf. Syst. Res..
[74] Deann K. Gauthier. professional lapses: occupational deviance and neutralization techniques in veterinary medical practice , 2001 .
[75] R. A. Dodder,et al. techniques of neutralization used by deer poachers in the western united states: a research note , 1999 .
[76] Stuart Henry,et al. Degrees of Deviance: Student Accounts of Their Deviant Behavior , 1999 .
[77] Alan R. Dennis,et al. Testing Media Richness Theory in the New Media: The Effects of Cues, Feedback, and Task Equivocality , 1998, Inf. Syst. Res..
[78] John Suler,et al. The Bad Boys of Cyberspace: Deviant Behavior in a Multimedia Chat Community , 1998, Cyberpsychology Behav. Soc. Netw..
[79] Robert S. Baron,et al. The eyes have it : Minority influence in face-to-face and computer-mediated group discussion , 1997 .
[80] Susan J. Harrington,et al. The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..
[81] R. Paternoster,et al. Sanction threats and appeals to morality : Testing a rational choice model of corporate crime , 1996 .
[82] C. Gunawardena. Social Presence Theory and Implications for Interaction and Collaborative Learning in Computer Conferences , 1995 .
[83] B. Wellman,et al. Social Impacts of Electronic Mail in Organizations: A Review of the Research Literature , 1995 .
[84] Robert Agnew,et al. THE TECHNIQUES OF NEUTRALIZATION AND VIOLENCE , 1994 .
[85] M. Lynne Markus,et al. Finding a happy medium: explaining the negative effects of electronic communication on social life at work , 1994, TOIS.
[86] Sally S. Simpson,et al. A rational choice theory of corporate crime. , 1993 .
[87] James Weber,et al. Scenarios in Business Ethics Research: Review, Critical Assessment, and Recommendations , 1992, Business Ethics Quarterly.
[88] R. Bachman,et al. The Rationality of Sexual Offending: Testing a Deterrence/Rational Choice Conception of Sexual Assault , 1992 .
[89] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[90] Russell Spears,et al. Computer-Mediated Communication, De-Individuation and Group Decision-Making , 1991, Int. J. Man Mach. Stud..
[91] Herbert H. Clark,et al. Grounding in communication , 1991, Perspectives on socially shared cognition.
[92] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[93] Lee Sproull,et al. Reducing social context cues: electronic mail in organizational communication , 1986 .
[94] Richard L. Daft,et al. Organizational information requirements, media richness and structural design , 1986 .
[95] Quint C. Thurman,et al. Neutralization and Tax Evasion: How Effective Would a Moral Appeal Be in Improving Compliance to Tax Laws? , 1984 .
[96] W. W. Minor,et al. Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .
[97] B. Latané. The psychology of social impact. , 1981 .
[98] P. Cook. Research in Criminal Deterrence: Laying the Groundwork for the Second Decade , 1980, Crime and Justice.
[99] James R. Rest. Development in Judging Moral Issues , 1979 .
[100] T. Cook,et al. Quasi-experimentation: Design & analysis issues for field settings , 1979 .
[101] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[102] John Short,et al. The social psychology of telecommunications , 1976 .
[103] Carl B. Klockars. The Professional Fence , 1975 .
[104] T. Priest,et al. TECHNIQUES OF NEUTRALIZATION: YOUNG ADULT MARIJUANA SMOKERS , 1970 .
[105] David Matza. Delinquency and Drift , 1966 .
[106] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .