-
1
-
-
34548842796
-
Behavioral factors affecting Internet abuse in the workplace-an empirical investigation
-
Washington, D.C, December 10-11
-
Case, C.J. & Young, K.S. (2002a). Behavioral factors affecting Internet abuse in the workplace-an empirical investigation. Proceedings of the Third Annual Workshop on HCI Research in MIS, Washington, D.C., December 10-11, 2004.
-
(2002)
Proceedings of the Third Annual Workshop on HCI Research in MIS
-
-
Case, C.J.1
Young, K.S.2
-
2
-
-
34548864429
-
Employee internet use policy: An examination, of perceived effectiveness
-
Fort Lauderdale, FL, October 5
-
Case, C.J. & Young, K.S. (2002b). Employee internet use policy: an examination, of perceived effectiveness. Proceedings of the International Association for Computer Information Systems, Fort Lauderdale, FL., October 5, 2002.
-
(2002)
Proceedings of the International Association for Computer Information Systems
-
-
Case, C.J.1
Young, K.S.2
-
3
-
-
34548861259
-
-
Internet abuse in the workplace. Retrieved June 1, 2003 from
-
Davis, R.A. (2001). Cyberslacking: Internet abuse in the workplace. Retrieved June 1, 2003 from http://www.internetaddiction.ca/cyberslacking.htm.
-
(2001)
Cyberslacking
-
-
Davis, R.A.1
-
4
-
-
34548840857
-
-
Egley, A. H. (1987). Differences in Social Behavior: A Social-Role Interpretation. Earlbaum, Hinsdale, N.T.
-
Egley, A. H. (1987). Differences in Social Behavior: A Social-Role Interpretation. Earlbaum, Hinsdale, N.T.
-
-
-
-
5
-
-
28744432953
-
-
Sigma Two Group , Retrieved March 12, 2007 from
-
Sigma Two Group (2003) Geert Hofstede Cultural Dimensons. Retrieved March 12, 2007 from http://www.geert-hofstede.com/.
-
(2003)
Geert Hofstede Cultural Dimensons
-
-
-
7
-
-
0003506109
-
-
Sixth Ed. Upper Saddle River, NJ: Prentice Hall
-
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate Data Analysis Sixth Ed. Upper Saddle River, NJ: Prentice Hall.
-
(2006)
Multivariate Data Analysis
-
-
Hair, J.F.1
Black, W.C.2
Babin, B.J.3
Anderson, R.E.4
Tatham, R.L.5
-
8
-
-
84972591418
-
Social Loafing: Research Findings, Implications, and Future Directions
-
Karau, S. J. & Williams, K. D. (1995) Social Loafing: Research Findings, Implications, and Future Directions. Current Directions in Psychological Science, Vol. 4, No. 5, pp.134-140.
-
(1995)
Current Directions in Psychological Science
, vol.4
, Issue.5
, pp. 134-140
-
-
Karau, S.J.1
Williams, K.D.2
-
9
-
-
0036064934
-
-
Lee, J. & Lee Y.(2002). A. holistic model of computer abuse within organizations. Information Management & Computer Security, 10, No. 2, pp. 57-63.
-
Lee, J. & Lee Y.(2002). A. holistic model of computer abuse within organizations. Information Management & Computer Security, Vol. 10, No. 2, pp. 57-63.
-
-
-
-
11
-
-
33749071356
-
Using the technology acceptance model to explain how attitudes determine Internet usage: The role of perceived, access barriers and demographics
-
Porter, C. E. & Donthu, N. (2006). Using the technology acceptance model to explain how attitudes determine Internet usage: The role of perceived, access barriers and demographics. Journal of Business Research, Vol. 59, No. 9, pp. 999-1007.
-
(2006)
Journal of Business Research
, vol.59
, Issue.9
, pp. 999-1007
-
-
Porter, C.E.1
Donthu, N.2
-
12
-
-
0000470917
-
Cluster analysis in marketing research: Review and suggestions for application
-
Punj, G. & Stewart D. (1983). Cluster analysis in marketing research: Review and suggestions for application. Journal of Marketing Research, Vol. 20, pp. 134-148.
-
(1983)
Journal of Marketing Research
, vol.20
, pp. 134-148
-
-
Punj, G.1
Stewart, D.2
-
13
-
-
0242537133
-
Web addict or happy employee: Company profile of the frequent internet user
-
Stanton, J. M. (2002). Web addict or happy employee: company profile of the frequent internet user. Communications of the ACM, Vol. 45, No. 1, pp. 55-59.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 55-59
-
-
Stanton, J.M.1
-
15
-
-
0344755343
-
Does electronic monitoring of employee Internet usage work?
-
Urbaczewski, A. & L. M. Jessup (2002). Does electronic monitoring of employee Internet usage work? Communications of the ACM, Vol. 45, No. 1, pp. 80-83.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 80-83
-
-
Urbaczewski, A.1
Jessup, L.M.2
-
16
-
-
34548838046
-
-
Whitty, M. T. (2002). Big brother in Australia: privacy and surveillance of the internet in the Australian workplace. Paper presented at the Internet Research 3.0: Net/Work/Theory. Maastricht, the Netherlands, Oct. 13-16.
-
Whitty, M. T. (2002). Big brother in Australia: privacy and surveillance of the internet in the Australian workplace. Paper presented at the Internet Research 3.0: Net/Work/Theory. Maastricht, the Netherlands, Oct. 13-16.
-
-
-
-
17
-
-
27644497676
-
New rules in the workplace: Applying object-relations theory to explain problem. Internet and email behaviour in the workplace
-
Whitty M. T. & A. N. Carr (2006). New rules in the workplace: Applying object-relations theory to explain problem. Internet and email behaviour in the workplace. Computers in Human Behavior, Vol. 22, pp. 235-250.
-
(2006)
Computers in Human Behavior
, vol.22
, pp. 235-250
-
-
Whitty, M.T.1
Carr, A.N.2
|