Determinants of cyberloafing: a comparative study of a public and private sector organization
暂无分享,去创建一个
Thurasamy Ramayah | Saddam Hussain | Zill-e-Huma | Muhammad Imran Malik | M. I. Malik | Saddam Hussain | Zill-e-Huma | Thurasamy Ramayah
[1] M. Conner,et al. Extending the Theory of Planned Behavior: A Review and Avenues for Further Research , 1998 .
[2] Nor Ghani Mohd Nor,et al. Information technology and survival of SMEs: an emprical study on Malaysian manufacturing sector , 2015, Inf. Technol. Manag..
[3] James G. Phillips,et al. Potential determinants of heavier internet usage , 2000, Int. J. Hum. Comput. Stud..
[4] Yong Chen,et al. An emerging technology – wearable wireless sensor networks with applications in human health condition monitoring , 2015 .
[5] Chloris Qiaolei Jiang. Internet addiction among young people in China: Internet connectedness, online gaming and academic performance decrement , 2014, Internet Res..
[6] David F. Larcker,et al. Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .
[7] Murugan Anandarajan,et al. Profiling Web Usage in the Workplace: A Behavior-Based Artificial Intelligence Approach , 2002, J. Manag. Inf. Syst..
[8] Sacip Toker,et al. An investigation of the impact of demographics on cyberloafing from an educational setting angle , 2015, Comput. Hum. Behav..
[9] Vincent S. Lai,et al. Prediction of Internet and World Wide Web usage at work: a test of an extended Triandis model , 2000, Decis. Support Syst..
[10] Straub,et al. Editor's Comments: An Update and Extension to SEM Guidelines for Administrative and Social Science Research , 2011 .
[11] Senbo Chen,et al. A Trust Evaluation Model for E-Learning Systems , 2014 .
[12] M. Griffiths. Internet abuse and internet addiction in the workplace , 2010 .
[13] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[14] Paul Gray,et al. Junk Computing - Is it Bad for an Organization? , 1996, Inf. Syst. Manag..
[15] Jo Ann Oravec. Constructive approaches to internet recreation in the workplace , 2002, CACM.
[16] Mikko T. Siponen,et al. Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work , 2013, Inf. Manag..
[17] Kimberly Young,et al. Internet Abuse in the Workplace: New Trends in Risk Management , 2004, Cyberpsychology Behav. Soc. Netw..
[18] L. G. Pee,et al. Explaining non-work-related computing in the workplace: A comparison of alternative models , 2008, Inf. Manag..
[19] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[20] Anurag Agarwal,et al. The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.
[21] Stanley F. Slater,et al. Issues in conducting marketing strategy research , 1995 .
[22] T. Ramayah,et al. Personal web usage and work inefficiency , 2010 .
[23] Kai H. Lim,et al. Why Employees Do Non-Work-Related Computing: An Exploratory Investigation through Multiple Theoretical Perspectives , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[24] Keng Siau,et al. Acceptable internet use policy , 2002, CACM.
[25] Tugra Karademir,et al. Cyberloafing as a barrier to the successful integration of information and communication technologies into teaching and learning environments , 2015, Comput. Hum. Behav..
[26] Robert LaRose,et al. Personal Internet use at work: Understanding cyberslacking , 2011, Comput. Hum. Behav..
[27] Thompson S. H. Teo,et al. How do I loaf here? let me count the ways , 2002, CACM.
[28] Jakob Branger,et al. From automated home to sustainable, healthy and manufacturing home: a new story enabled by the Internet-of-Things and Industry 4.0 , 2015 .
[29] Alok Mishra,et al. Predictive Effect of Gender and Sector Differences on Internet Usage Among Employees , 2010 .
[30] Qiang Chen,et al. A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor, and Intelligent Medicine Box , 2014, IEEE Transactions on Industrial Informatics.
[31] Marko Sarstedt,et al. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .
[32] W. Reinartz,et al. An Empirical Comparison of the Efficacy of Covariance-Based and Variance-Based SEM , 2009 .
[33] G. Favretto,et al. Organizational Aspects of Cyberloafing , 2009 .
[34] Icek Ajzen,et al. From Intentions to Actions: A Theory of Planned Behavior , 1985 .
[35] A. Taneja. Determinants Of Adverse Usage Of Information Systems Assets: A Study Of Antecedents Of IS Exploit In Organizations , 2007 .
[36] B. Verplanken,et al. Reflections on past behavior: A self-report index of habit strength , 2003 .
[37] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .
[38] Katelyn Y. A. McKenna,et al. Employee job attitudes and organizational characteristics as predictors of cyberloafing , 2011, Comput. Hum. Behav..
[39] Rudolf R. Sinkovics,et al. The Use of Partial Least Squares Path Modeling in International Marketing , 2009 .
[40] W. Block. Cyberslacking, Business Ethics and Managerial Economics , 2011 .
[41] Fariborz Rahimnia,et al. Functions of control mechanisms in mitigating workplace loafing; evidence from an Islamic society , 2015, Comput. Hum. Behav..
[42] Pablo Zoghbi Manrique de Lara,et al. Internet Research , 2022 .
[43] Trent Jaeger,et al. A Flexible Security System for Using Internet Content , 1997, IEEE Softw..
[44] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[45] Marko Sarstedt,et al. Structural modeling of heterogeneous data with partial least squares , 2010 .
[46] Gregory Moody,et al. A multi-theoretical perspective on IS security behaviors , 2011 .
[47] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[48] John Michael Pearson,et al. Explaining Cyberloafing through a Theoretical Integration of Theory of Interpersonal Behavior and Theory of Organizational Justice , 2014, J. Organ. End User Comput..
[49] L. G. Pee,et al. Behavioral Factors Affecting Internet Abuse in the Workplace – An Empirical Investigation , 2004 .
[50] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[51] Alok Mishra,et al. Ethical behavior issues in software use: An analysis of public and private sectors , 2009, Comput. Hum. Behav..
[52] Murugan Anandarajan,et al. Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management , 2003 .
[53] Jeffrey M. Stanton,et al. Company profile of the frequent internet user , 2002, CACM.
[54] Joey F. George,et al. The theory of planned behavior and Internet purchasing , 2004, Internet Res..
[55] Aakash Taneja,et al. Cyber-slacking in the classroom: Potential for digital distraction in the new age , 2015, Comput. Educ..
[56] Matthew S. Eastin,et al. Psychology of Communication Technology Use in the Workplace , 2007, Cyberpsychology Behav. Soc. Netw..
[57] Cornelius J. König,et al. Exploring the positive side of personal internet use at work: Does it help in managing the border between work and nonwork? , 2014, Comput. Hum. Behav..
[58] Lida Xu,et al. Compressed Sensing Signal and Data Acquisition in Wireless Sensor Networks and Internet of Things , 2013, IEEE Transactions on Industrial Informatics.
[59] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[60] Slaven Brumec. PREDICTING THE INTENTION TO USE INTERNET – A COMPARATIVE STUDY , 2008 .
[61] Zauwiyah Ahmad,et al. Personal Internet use: The use of personal mobile devices at the workplace , 2015 .
[62] H C Triandis,et al. Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[63] Anita L. Blanchard,et al. Correlates of different forms of cyberloafing: The role of norms and external locus of control , 2008, Comput. Hum. Behav..
[64] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[65] Gee-Woo Bock,et al. Why Employees Do Non-Work-Related Computing: An Investigation of Factors Affecting NWRC in a Workplace , 2006, PACIS.
[66] Anat Hovav,et al. Deterring internal information systems misuse , 2007, CACM.
[67] Thompson S. H. Teo,et al. Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study , 2005, Inf. Manag..
[68] Jatinder N. D. Gupta,et al. Improving Workers' Productivity and Reducing Internet Abuse , 2004, J. Comput. Inf. Syst..
[69] Ståle Pallesen,et al. Predictors of Use of Social Network Sites at Work - A Specific Type of Cyberloafing , 2014, J. Comput. Mediat. Commun..
[70] Waiman Cheung,et al. Determinants of the intention to use Internet/WWW at work: a confirmatory study , 2001, Inf. Manag..
[71] Claire A. Simmers. Aligning internet usage with business priorities , 2002, CACM.
[72] Meng U. Taing,et al. Explaining cyberloafing: The role of the theory of planned behavior , 2014, Comput. Hum. Behav..
[73] Yeolib Kim,et al. Personality predictors for the use of multiple internet functions , 2015, Internet Res..
[74] Lisa Seymour,et al. Web access for IT staff: a developing world perspective on web abuse , 2007, Electron. Libr..
[75] Sandra L. Robinson,et al. Dysfunctional Workplace Behavior , 2008 .
[76] Vivien K. G. Lim,et al. Cyberloafing at the workplace: gain or drain on work? , 2012, Behav. Inf. Technol..
[77] Hongming Cai,et al. IoT-Based Configurable Information Service Platform for Product Lifecycle Management , 2014, IEEE Transactions on Industrial Informatics.
[78] Leonard M. Jessup,et al. Does electronic monitoring of employee internet usage work? , 2002, CACM.
[79] Manish Gupta,et al. A fuzzy ANP based approach in the selection of the best E-Business strategy and to assess the impact of E-Procurement on organizational performance , 2014, Information Technology and Management.
[80] D. Galletta,et al. An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .