-
1
-
-
0000913978
-
Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage
-
Agarwal, R. and Karahanna, E. "Time flies when you're having fun: cognitive absorption and beliefs about information technology usage," MIS Quarterly (24:4), 2000, pp. 665-694.
-
(2000)
MIS Quarterly
, vol.24
, Issue.4
, pp. 665-694
-
-
Agarwal, R.1
Karahanna, E.2
-
2
-
-
0003878594
-
-
The Dorsey Press, Chicago
-
Ajzen, I. Attitude, Personality, and Behavior, The Dorsey Press, Chicago, 1988.
-
(1988)
Attitude, Personality, and Behavior
-
-
Ajzen, I.1
-
4
-
-
0010368159
-
Internet abuse in the workplace
-
Anandarajan, M. "Internet abuse in the workplace," Communications of the ACM (45:1), 2002, pp. 53-54.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 53-54
-
-
Anandarajan, M.1
-
5
-
-
0345806555
-
Abuse or learning?
-
Belanger, F. and Slyke, C.V. "Abuse or learning?," Communications of the ACM (45:1), 2002, pp. 64-65.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 64-65
-
-
Belanger, F.1
Slyke, C.V.2
-
7
-
-
0036667993
-
Employee Internet management: Current business practices and outcomes
-
Case, C.J. and Young, K.S. "Employee Internet management: current business practices and outcomes," CyberPsychology & Behavior (5:4), 2002, pp. 355-361.
-
(2002)
CyberPsychology & Behavior
, vol.5
, Issue.4
, pp. 355-361
-
-
Case, C.J.1
Young, K.S.2
-
8
-
-
29844441019
-
A review of the research on Internet addiction
-
Chou, C., Condron, L. and Belland, J.C. "A review of the research on Internet addiction," Educational Psychology Review (17:4), 2005, pp. 363-388.
-
(2005)
Educational Psychology Review
, vol.17
, Issue.4
, pp. 363-388
-
-
Chou, C.1
Condron, L.2
Belland, J.C.3
-
9
-
-
1042303238
-
Cleaning up your e-mail
-
Ferris, N. "Cleaning up your e-mail," Government Executive (32:6), 2000, pp. 95-96.
-
(2000)
Government Executive
, vol.32
, Issue.6
, pp. 95-96
-
-
Ferris, N.1
-
12
-
-
0005766289
-
Morality and computers: Attitudes and differences in moral judgments
-
Gattiker, U.E. and Kelley, H. "Morality and computers: attitudes and differences in moral judgments," Information Systems Research (10:3), 1999, pp. 233-254.
-
(1999)
Information Systems Research
, vol.10
, Issue.3
, pp. 233-254
-
-
Gattiker, U.E.1
Kelley, H.2
-
13
-
-
0036667996
-
Lost in cyberspace: The Web @ work
-
Greenfield, D.N. and Davis, R.A. "Lost in cyberspace: the Web @ work," CyberPsychology & Behavior (5:4), 2002, pp. 347-353.
-
(2002)
CyberPsychology & Behavior
, vol.5
, Issue.4
, pp. 347-353
-
-
Greenfield, D.N.1
Davis, R.A.2
-
14
-
-
6344229972
-
The role of pluralistic ignorance in perceptions of unethical behavior: An investigation of attorneys' and students' perceptions of ethical behavior
-
Halbesleben, J.B., Buckley, M.R. and Sauer, N.D. "The role of pluralistic ignorance in perceptions of unethical behavior: an investigation of attorneys' and students' perceptions of ethical behavior," Ethics & Behavior (14:1), 2004, pp. 17-30.
-
(2004)
Ethics & Behavior
, vol.14
, Issue.1
, pp. 17-30
-
-
Halbesleben, J.B.1
Buckley, M.R.2
Sauer, N.D.3
-
15
-
-
33747471098
-
Information systems ethics in the triad
-
Hilton, T., Oh, S.H. and Al-Lawati, H. "Information systems ethics in the triad," Journal of Computer Information Systems (46:4), 2006, pp. 78-102.
-
(2006)
Journal of Computer Information Systems
, vol.46
, Issue.4
, pp. 78-102
-
-
Hilton, T.1
Oh, S.H.2
Al-Lawati, H.3
-
16
-
-
44449171861
-
Social contextual influences on attitude-behavior correspondence, attitude change, and persuasion
-
Terry, D. J. and Hogg, M. A, Ed, Lawrence Erlbaum Associates, Mahwah, NJ
-
Hogg, M.A. and Terry, D.J. "Social contextual influences on attitude-behavior correspondence, attitude change, and persuasion," In Terry, D. J. and Hogg, M. A. (Ed.), Attitudes, Behavior, and Social Context: the Role of Norms and Group Membership, Lawrence Erlbaum Associates, Mahwah, NJ, 2000, pp. 1-9.
-
(2000)
Attitudes, Behavior, and Social Context: The Role of Norms and Group Membership
, pp. 1-9
-
-
Hogg, M.A.1
Terry, D.J.2
-
18
-
-
0000069381
-
Ethical decision making by individuals in organization: An issue-contingent model
-
Jones, T.M. "Ethical decision making by individuals in organization: an issue-contingent model," Academy of Management Review (16:2), 1991, pp. 366-395.
-
(1991)
Academy of Management Review
, vol.16
, Issue.2
, pp. 366-395
-
-
Jones, T.M.1
-
19
-
-
0003918617
-
-
Craftsman Press, Syracuse, NY
-
Katz, D. and Allport, F.H. Student attitudes: a report of the Syracuse University research study, Craftsman Press, Syracuse, NY, 1928.
-
(1928)
Student attitudes: A report of the Syracuse University research study
-
-
Katz, D.1
Allport, F.H.2
-
20
-
-
13844275774
-
Assessing & quantifying the loss of network intrusion
-
Kros, J.R., Foltz, C.B. and Metcalf, C.L. "Assessing & quantifying the loss of network intrusion," Journal of Computer Information Systems (45:2), 2004, pp. 36-43.
-
(2004)
Journal of Computer Information Systems
, vol.45
, Issue.2
, pp. 36-43
-
-
Kros, J.R.1
Foltz, C.B.2
Metcalf, C.L.3
-
21
-
-
0036064934
-
A holistic model of computer abuse within organizations
-
Lee, J. and Lee, Y. "A holistic model of computer abuse within organizations," Information Management & Computer Security (10:2), 2002, pp. 57-63.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2
, pp. 57-63
-
-
Lee, J.1
Lee, Y.2
-
22
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
Lee, S.M., Lee, S.G. and Yoo, S.J. "An integrative model of computer abuse based on social control and general deterrence theories," Information & Management (41:5), 2004, pp. 707-718.
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.G.2
Yoo, S.J.3
-
23
-
-
0142054225
-
How do I loaf here? let me count the ways
-
Lim, V.K.G., Teo, T.S.H. and Loo, G.L. "How do I loaf here? let me count the ways," Communications of the ACM (45:1), 2002, pp. 66-70.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 66-70
-
-
Lim, V.K.G.1
Teo, T.S.H.2
Loo, G.L.3
-
24
-
-
58149370018
-
Pluralistic ignorance: When similarity is interpreted as dissimilarity
-
Miller, D.T. and McFarland, C. "Pluralistic ignorance: when similarity is interpreted as dissimilarity " Journal of Personality & Social Psychology (53), 1987, pp. 298-305.
-
(1987)
Journal of Personality & Social Psychology
, vol.53
, pp. 298-305
-
-
Miller, D.T.1
McFarland, C.2
-
25
-
-
85190919962
-
When social comparison goes away: The case of pluralistic ignorance
-
Suls, J. and Will, T, Ed, Lawrence Erlbaum Associates, Hillsdale, NJ
-
Miller, D.T. and McFarland, C. "When social comparison goes away: the case of pluralistic ignorance," In Suls, J. and Will, T. (Ed.), Social Comparison: Contemporary Theory and Research, Lawrence Erlbaum Associates, Hillsdale, NJ, 1991, pp. 287-313.
-
(1991)
Social Comparison: Contemporary Theory and Research
, pp. 287-313
-
-
Miller, D.T.1
McFarland, C.2
-
26
-
-
0012133165
-
Pluralistic ignorance and inconsistency between private attitudes and public behaviors
-
Terry, D. J. and Hogg, M. A, Ed, Lawrence Erlbaum Associates, Mahwah, NJ
-
Miller, D.T., Monin, B. and Prentice, D.A. "Pluralistic ignorance and inconsistency between private attitudes and public behaviors," In Terry, D. J. and Hogg, M. A. (Ed.), Attitudes, Behavior, and Social context: The Role of Norms and Group Membership, Lawrence Erlbaum Associates, Mahwah, NJ, 2000, pp. 95-113.
-
(2000)
Attitudes, Behavior, and Social context: The Role of Norms and Group Membership
, pp. 95-113
-
-
Miller, D.T.1
Monin, B.2
Prentice, D.A.3
-
27
-
-
0036020377
-
Policies controlling use of computer-based resources in small businesses
-
Mitchell, R.B. and Jones, T. "Policies controlling use of computer-based resources in small businesses," Journal of Computer Information Systems (42:4), 2002, pp. 77-83.
-
(2002)
Journal of Computer Information Systems
, vol.42
, Issue.4
, pp. 77-83
-
-
Mitchell, R.B.1
Jones, T.2
-
28
-
-
13444261220
-
Internet abuse: Addiction? disorder? symptom? alternative explanations?
-
Morahan-Martin, J. "Internet abuse: addiction? disorder? symptom? alternative explanations?," Social Science Computer Review (23:1), 2005, pp. 39-48
-
(2005)
Social Science Computer Review
, vol.23
, Issue.1
, pp. 39-48
-
-
Morahan-Martin, J.1
-
30
-
-
0346437730
-
Constructive approaches to Internet recreation in the workplace
-
Oravec, J.A. "Constructive approaches to Internet recreation in the workplace," Communications of the ACM (45:1), 2002, pp. 60-63.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 60-63
-
-
Oravec, J.A.1
-
31
-
-
0042406259
-
Monitoring for pornography and sexual harassment
-
Panko, R.R. and Beh, H.G. "Monitoring for pornography and sexual harassment," Communications of the ACM (45:1), 2002, pp. 84-87.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 84-87
-
-
Panko, R.R.1
Beh, H.G.2
-
32
-
-
0027549978
-
Pluralistic ignorance and alcohol use on campus: Some consequences of misperceiving the social norm
-
Prentice, D.A. and Miller, D.T. "Pluralistic ignorance and alcohol use on campus: some consequences of misperceiving the social norm," Journal of Personality and Social Psychology (64:2), 1993, pp. 243-256.
-
(1993)
Journal of Personality and Social Psychology
, vol.64
, Issue.2
, pp. 243-256
-
-
Prentice, D.A.1
Miller, D.T.2
-
33
-
-
0001413422
-
Pluralistic ignorance and the perpetuation of social norms by unwitting actors
-
Prentice, D.A. and Miller, D.T. "Pluralistic ignorance and the perpetuation of social norms by unwitting actors," Advances in Experimental Social Psychology (28), 1996, pp. 161-209.
-
(1996)
Advances in Experimental Social Psychology
, vol.28
, pp. 161-209
-
-
Prentice, D.A.1
Miller, D.T.2
-
34
-
-
1042300810
-
Improving workers' productivity and reducing Internet abuse
-
Sharma, S.K. and Gupta, J.N.D. "Improving workers' productivity and reducing Internet abuse," Journal of Computer Information Systems (44:2), 2003-2004, pp. 74-78.
-
(2003)
Journal of Computer Information Systems
, vol.44
, Issue.2
, pp. 74-78
-
-
Sharma, S.K.1
Gupta, J.N.D.2
-
35
-
-
0142054224
-
Acceptable Internet use policy
-
Siau, K., Nah, F.F. and Teng, L. "Acceptable Internet use policy," Communications of the ACM (45:1), 2002, pp. 75-79.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 75-79
-
-
Siau, K.1
Nah, F.F.2
Teng, L.3
-
36
-
-
0042406260
-
Aligning Internet usage with business priorities
-
Simmers, C.A. "Aligning Internet usage with business priorities," Communications of the ACM (45:1), 2002, pp. 71-74.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 71-74
-
-
Simmers, C.A.1
-
37
-
-
0036735673
-
A Strategic response to the broad spectrum of Internet abuse
-
Sipior, J.C. and Ward, B.T. "A Strategic response to the broad spectrum of Internet abuse," Information Systems Management (19:4), 2002, pp. 71-79.
-
(2002)
Information Systems Management
, vol.19
, Issue.4
, pp. 71-79
-
-
Sipior, J.C.1
Ward, B.T.2
-
38
-
-
84935167315
-
Specifying specific deterrence: The influence of arrest on future criminal activity
-
Smith, D.A. and Gartin, P.R. "Specifying specific deterrence: the influence of arrest on future criminal activity," American Sociological Review (54:1), 1989, pp. 94-106.
-
(1989)
American Sociological Review
, vol.54
, Issue.1
, pp. 94-106
-
-
Smith, D.A.1
Gartin, P.R.2
-
39
-
-
0242537133
-
Company profile of the frequent Internet user
-
Stanton, J.M. "Company profile of the frequent Internet user," Communications of the ACM (45:1), 2002, pp. 55-59.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 55-59
-
-
Stanton, J.M.1
-
40
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
Straub, J.D.W. and Nance, W.D. "Discovering and disciplining computer abuse in organizations: a field study," MIS Quarterly (14:1), 1990, pp. 45-60.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, J.D.W.1
Nance, W.D.2
-
41
-
-
0344755343
-
Does electronic monitoring of employee Internet usage work?
-
Urbaczewski, A. and Jessup, L.M. "Does electronic monitoring of employee Internet usage work?," Communications of the ACM (45:1), 2002, pp. 80-83.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 80-83
-
-
Urbaczewski, A.1
Jessup, L.M.2
-
43
-
-
84876635587
-
-
last accessed: July 31, 2006, at
-
Websense "Protecting against complex Internet threats," 2005, last accessed: July 31, 2006, at: http://www.websense. com/docs/WhitePapers/ ProtectingAgainstComplexInternetThreats0405.pdf.
-
(2005)
Protecting against complex Internet threats
-
-
-
44
-
-
84876644856
-
Surfing the Web at work may be as addictive as cup of joe
-
at
-
Websense "Surfing the Web at work may be as addictive as cup of joe," Websense, Inc, 2005, last accessed: 7/15/2006, at: http://www.websense.com/global/en/PressRoom/PressReleases/PressReleaseDetail/? Release=050509928.
-
(2006)
Websense, Inc, 2005, last accessed
, pp. 7-15
-
-
-
45
-
-
0036282205
-
Improving attitude-behavior correspondence through exposure to normative support from a salient ingroup
-
White, K.M., Hogg, M.A. and Terry, D.J. "Improving attitude-behavior correspondence through exposure to normative support from a salient ingroup," Basic and Applied Social Psychology (24:2), 2002, pp. 91-103.
-
(2002)
Basic and Applied Social Psychology
, vol.24
, Issue.2
, pp. 91-103
-
-
White, K.M.1
Hogg, M.A.2
Terry, D.J.3
|