From improper to acceptable: How perpetrators neutralize workplace bullying behaviors in the cyber world

[1]  J. Scisco Cyberbullying in the Workplace , 2019, Cyberbullying in Schools, Workplaces, and Romantic Relationships.

[2]  Robin M. Kowalski,et al.  Bullying and cyberbullying in adulthood and the workplace , 2018, The Journal of social psychology.

[3]  Nicholas Brody,et al.  Cyberbullying: Topics, strategies, and sex differences , 2017, Comput. Hum. Behav..

[4]  Jordana N. Navarro,et al.  One step forward, two steps back: Cyberbullying within social networking sites , 2017, Security Journal.

[5]  Sara Erreygers,et al.  Letting off steam online: a longitudinal analysis of the Emotion Reaction model of workplace cyberbullying , 2017 .

[6]  Carolyn Axtell,et al.  Understanding the relationship between experiencing workplace cyberbullying, employee mental strain and job satisfaction: a dysempowerment approach , 2017 .

[7]  Paul Benjamin Lowry,et al.  Using the Control Balance Theory to Explain Social Media Deviance , 2017, HICSS.

[8]  Chuang Wang,et al.  Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model , 2016, Inf. Syst. Res..

[9]  C. Axtell,et al.  Design, development and validation of a workplace cyberbullying measure, the WCM , 2016 .

[10]  Magdalena Obermaier,et al.  Bystanding or standing by? How the number of bystanders affects the intention to intervene in cyberbullying , 2016, New Media Soc..

[11]  Maree Roche,et al.  Predictors of Workplace Bullying and Cyber-Bullying in New Zealand , 2016, International journal of environmental research and public health.

[12]  Robin L. Wakefield,et al.  Friend or Foe: Cyberbullying in Social Network Sites , 2016, DATB.

[13]  Heidi Vandebosch,et al.  An Investigation of Short-Term Longitudinal Associations Between Social Anxiety and Victimization and Perpetration of Traditional Bullying and Cyberbullying , 2015, Journal of Youth and Adolescence.

[14]  Christopher P. Barlett,et al.  Predicting Cyberbullying From Anonymity. , 2014 .

[15]  Michael J. Boulton,et al.  A Comparison of Preservice Teachers’ Responses to Cyber Versus Traditional Bullying Scenarios , 2014 .

[16]  Karolien Poels,et al.  Cyberbullying on social network sites. An experimental study into bystanders' behavioural intentions to help the victim or reinforce the bully , 2014, Comput. Hum. Behav..

[17]  D. Leidner,et al.  Workplace Cyberbullying: The Antecedents and Consequences , 2014 .

[18]  K. Poels,et al.  Online perspective-taking as an intervention tool against cyberbullying. , 2014, Studies in health technology and informatics.

[19]  M. Siponen,et al.  Understanding and Predicting Cyberstalking in Social Media: Integrating Theoretical Perspectives on Shame, Neutralization, Self-Control, Rational Choice, and Social Learning , 2013, ICIS 2013.

[20]  Sara Branch,et al.  Workplace Bullying, Mobbing and General Harassment: A Review , 2013 .

[21]  M. Jackson,et al.  Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice , 2013 .

[22]  Heng Xu,et al.  Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts , 2013, Eur. J. Inf. Syst..

[23]  Marc Ziegele,et al.  Blaming the Victim: The Effects of Extraversion and Information Disclosure on Guilt Attributions in Cyberbullying , 2013, Cyberpsychology Behav. Soc. Netw..

[24]  Marko Sarstedt,et al.  Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .

[25]  Kevin C. Runions Toward a Conceptual Model of Motive and Self-Control in Cyber-Aggression: Rage, Revenge, Reward, and Recreation , 2013, Journal of youth and adolescence.

[26]  T. Little,et al.  Individual and Contextual Predictors of Cyberbullying: The Influence of Children’s Provictim Attitudes and Teachers’ Ability to Intervene , 2013, Journal of Youth and Adolescence.

[27]  S. Perren,et al.  Is Cyberbullying Worse than Traditional Bullying? Examining the Differential Roles of Medium, Publicity, and Anonymity for the Perceived Severity of Bullying , 2012, Journal of Youth and Adolescence.

[28]  Wenli Li,et al.  Effects of Neutralization Techniques and Rational Choice Theory on Internet Abuse in the Workplace , 2013, PACIS.

[29]  Maria Assunta Zanetti,et al.  Morally Disengaged and Unempathic: Do Cyberbullies Fit These Definitions? An Exploratory Study , 2012, Cyberpsychology Behav. Soc. Netw..

[30]  Azy Barak,et al.  Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition , 2012, Comput. Hum. Behav..

[31]  D. Straub,et al.  Editor's comments: a critical look at the use of PLS-SEM in MIS quarterly , 2012 .

[32]  Thomas Gregory,et al.  Neutralization and Whistleblowing: An empirical examination , 2012, AMCIS.

[33]  Lesya M. Hassall,et al.  An Examination of a Theory of Embodied Social Presence in Virtual Worlds , 2011, Decis. Sci..

[34]  M. Sandy Hershcovis,et al.  “Incivility, social undermining, bullying…oh my!”: A call to reconcile constructs within workplace aggression research , 2011 .

[35]  S. Bauman Cyberbullying in a Rural Intermediate School: An Exploratory Study , 2010 .

[36]  E. Menesini,et al.  Cyberbullying: Labels, Behaviours and Definition in Three European Countries , 2010, Australian Journal of Guidance and Counselling.

[37]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[38]  Yajiong Xue,et al.  Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..

[39]  H. Hoel,et al.  Workplace bullying, industrial relations and the challenge for management in Britain and Sweden , 2010 .

[40]  Mikko T. Siponen,et al.  New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[41]  Robert Slonje,et al.  Cyberbullying: the nature and extent of a new kind of bullying, in and out of school , 2010 .

[42]  Ronald T. Cenfetelli,et al.  Interpretation of Formative Measurement in Information Systems Research , 2009, MIS Q..

[43]  F. Mishna,et al.  Ongoing and Online: Children and youth's perceptions of cyber bullying , 2009 .

[44]  Marilyn Anne Campbell,et al.  Cyberbullying: The New Face of Workplace Bullying? , 2009, Cyberpsychology Behav. Soc. Netw..

[45]  Hans De Witte,et al.  A qualitative study on the development of workplace bullying: Towards a three way model , 2009 .

[46]  D. Cross,et al.  Cyberbullying Versus Face-to-Face Bullying A Theoretical and Conceptual Review , 2009 .

[47]  Denise Salin,et al.  The prevention of workplace bullying as a question of human resource management: measures adopted and underlying organizational factors , 2008 .

[48]  Sue Bennett,et al.  The 'digital natives' debate: A critical review of the evidence , 2008, Br. J. Educ. Technol..

[49]  Peter K. Smith,et al.  Cyberbullying: its nature and impact in secondary school pupils. , 2008, Journal of child psychology and psychiatry, and allied disciplines.

[50]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[51]  Kimberly M. Christopherson The positive and negative implications of anonymity in Internet social interactions: "On the Internet, Nobody Knows You're a Dog" , 2007, Comput. Hum. Behav..

[52]  C. Pietersen Interpersonal bullying behaviours in the workplace , 2007 .

[53]  Wayne A. Hochwarter,et al.  Coping with abusive supervision: The neutralizing effects of ingratiation and positive affect on negative employee outcomes , 2007 .

[54]  Juliana Raskauskas,et al.  Involvement in traditional and electronic bullying among adolescents. , 2007, Developmental psychology.

[55]  Qing Hu,et al.  Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..

[56]  A. Joinson Disinhibition and the Internet , 2007 .

[57]  Eun-Ju Lee,et al.  When and How Does Depersonalization Increase Conformity to Group Norms in Computer-Mediated Communication? , 2006, Commun. Res..

[58]  Brian J. Taylor,et al.  Factorial Surveys: Using Vignettes to Study Professional Judgement , 2005 .

[59]  Volkan Topalli,et al.  WHEN BEING GOOD IS BAD: AN EXPANSION OF NEUTRALIZATION THEORY* , 2005 .

[60]  S. Smoyak,et al.  Perceptions of Cyberstalking Among College Students , 2005 .

[61]  Cheryl Burke Jarvis,et al.  The problem of measurement model misspecification in behavioral and organizational research and some recommended solutions. , 2005, The Journal of applied psychology.

[62]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[63]  D. Gefen,et al.  Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .

[64]  John Suler,et al.  The Online Disinhibition Effect , 2004, Cyberpsychology Behav. Soc. Netw..

[65]  Ned Kock,et al.  Trust and leadership in virtual teamwork: A media naturalness perspective , 2004 .

[66]  M. Sheehan,et al.  Perceptions of Upwards Bullying: An Interview Study , 2004 .

[67]  Paul F. Cromwell,et al.  the devil made me do it: use of neutralizations by shoplifters , 2003 .

[68]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[69]  Cheryl Burke Jarvis,et al.  A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .

[70]  P. Peretti-Watel Neutralization theory and the denial of risk: some evidence from cannabis use among French adolescents. , 2003, The British journal of sociology.

[71]  Wa Wijnand IJsselsteijn,et al.  Staying in touch : social presence and connectedness through synchronous and asynchonous communication media , 2003 .

[72]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[73]  Bernard C. Y. Tan,et al.  Group Polarization and Computer-Mediated Communication: Effects of Communication Cues, Social Presence, and Anonymity , 2002, Inf. Syst. Res..

[74]  Deann K. Gauthier professional lapses: occupational deviance and neutralization techniques in veterinary medical practice , 2001 .

[75]  R. A. Dodder,et al.  techniques of neutralization used by deer poachers in the western united states: a research note , 1999 .

[76]  Stuart Henry,et al.  Degrees of Deviance: Student Accounts of Their Deviant Behavior , 1999 .

[77]  Alan R. Dennis,et al.  Testing Media Richness Theory in the New Media: The Effects of Cues, Feedback, and Task Equivocality , 1998, Inf. Syst. Res..

[78]  John Suler,et al.  The Bad Boys of Cyberspace: Deviant Behavior in a Multimedia Chat Community , 1998, Cyberpsychology Behav. Soc. Netw..

[79]  Robert S. Baron,et al.  The eyes have it : Minority influence in face-to-face and computer-mediated group discussion , 1997 .

[80]  Susan J. Harrington,et al.  The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..

[81]  R. Paternoster,et al.  Sanction threats and appeals to morality : Testing a rational choice model of corporate crime , 1996 .

[82]  C. Gunawardena Social Presence Theory and Implications for Interaction and Collaborative Learning in Computer Conferences , 1995 .

[83]  B. Wellman,et al.  Social Impacts of Electronic Mail in Organizations: A Review of the Research Literature , 1995 .

[84]  Robert Agnew,et al.  THE TECHNIQUES OF NEUTRALIZATION AND VIOLENCE , 1994 .

[85]  M. Lynne Markus,et al.  Finding a happy medium: explaining the negative effects of electronic communication on social life at work , 1994, TOIS.

[86]  Sally S. Simpson,et al.  A rational choice theory of corporate crime. , 1993 .

[87]  James Weber,et al.  Scenarios in Business Ethics Research: Review, Critical Assessment, and Recommendations , 1992, Business Ethics Quarterly.

[88]  R. Bachman,et al.  The Rationality of Sexual Offending: Testing a Deterrence/Rational Choice Conception of Sexual Assault , 1992 .

[89]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[90]  Russell Spears,et al.  Computer-Mediated Communication, De-Individuation and Group Decision-Making , 1991, Int. J. Man Mach. Stud..

[91]  Herbert H. Clark,et al.  Grounding in communication , 1991, Perspectives on socially shared cognition.

[92]  Detmar W. Straub,et al.  Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..

[93]  Lee Sproull,et al.  Reducing social context cues: electronic mail in organizational communication , 1986 .

[94]  Richard L. Daft,et al.  Organizational information requirements, media richness and structural design , 1986 .

[95]  Quint C. Thurman,et al.  Neutralization and Tax Evasion: How Effective Would a Moral Appeal Be in Improving Compliance to Tax Laws? , 1984 .

[96]  W. W. Minor,et al.  Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .

[97]  B. Latané The psychology of social impact. , 1981 .

[98]  P. Cook Research in Criminal Deterrence: Laying the Groundwork for the Second Decade , 1980, Crime and Justice.

[99]  James R. Rest Development in Judging Moral Issues , 1979 .

[100]  T. Cook,et al.  Quasi-experimentation: Design & analysis issues for field settings , 1979 .

[101]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[102]  John Short,et al.  The social psychology of telecommunications , 1976 .

[103]  Carl B. Klockars The Professional Fence , 1975 .

[104]  T. Priest,et al.  TECHNIQUES OF NEUTRALIZATION: YOUNG ADULT MARIJUANA SMOKERS , 1970 .

[105]  David Matza Delinquency and Drift , 1966 .

[106]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .