메뉴 건너뛰기




Volumn 29, Issue 8, 2010, Pages 831-839

A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives

Author keywords

Corporate cyber harassment; Counterproductive behavior; Professional cyber bullying; Psychological motives; Social media attacks

Indexed keywords

COUNTERPRODUCTIVE BEHAVIOR; CYBER-HARASSMENT; PROFESSIONAL CYBER BULLYING; PSYCHOLOGICAL MOTIVES; SOCIAL MEDIA;

EID: 78449304032     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2010.09.003     Document Type: Article
Times cited : (16)

References (64)
  • 1
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and rationality in individual decision making
    • A. Acquisti, and J. Grossklags Privacy and rationality in individual decision making IEEE Security and Privacy 3 2005 26 33
    • (2005) IEEE Security and Privacy , vol.3 , pp. 26-33
    • Acquisti, A.1    Grossklags, J.2
  • 2
    • 0035999319 scopus 로고    scopus 로고
    • Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior
    • I. Ajzen Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior Journal of Applied Social Psychology 32 2002 665 683
    • (2002) Journal of Applied Social Psychology , vol.32 , pp. 665-683
    • Ajzen, I.1
  • 4
    • 0005402295 scopus 로고
    • The self-system in reciprocal determinism
    • A. Bandura The self-system in reciprocal determinism American Psychologist 33 1978 344 358
    • (1978) American Psychologist , vol.33 , pp. 344-358
    • Bandura, A.1
  • 5
    • 0005959905 scopus 로고    scopus 로고
    • Development of affective organizational commitment: A cross-sectional examination of change with tenure
    • K. Beck, and C. Wilson Development of affective organizational commitment: a cross-sectional examination of change with tenure Journal of Vocational Behavior 56 2000 114 136
    • (2000) Journal of Vocational Behavior , vol.56 , pp. 114-136
    • Beck, K.1    Wilson, C.2
  • 6
    • 28844460781 scopus 로고
    • Predicting dishonest actions using the theory of planned behavior
    • L. Beck, and I. Ajzen Predicting dishonest actions using the theory of planned behavior Journal of Research in Personality 25 1991 285 301
    • (1991) Journal of Research in Personality , vol.25 , pp. 285-301
    • Beck, L.1    Ajzen, I.2
  • 9
    • 84995184159 scopus 로고
    • The effect of interaction anticipation and experience as a victim of aggressive behavior
    • M.H. Bond, and D.G. Dutton The effect of interaction anticipation and experience as a victim of aggressive behavior Journal of Personality 43 1975 515 527
    • (1975) Journal of Personality , vol.43 , pp. 515-527
    • Bond, M.H.1    Dutton, D.G.2
  • 10
    • 0036936855 scopus 로고    scopus 로고
    • College students' Internet use, relationship formation, and personality correlates
    • K. Bonebrake College students' Internet use, relationship formation, and personality correlates Cyber Psychology and Behavior 5 2002 551 557
    • (2002) Cyber Psychology and Behavior , vol.5 , pp. 551-557
    • Bonebrake, K.1
  • 11
    • 78449277282 scopus 로고    scopus 로고
    • Cybercrime and the US criminal justice system
    • S.W. Brenner Cybercrime and the US criminal justice system H. Bidgoli, The handbook of technology management 2009 John Wiley & Sons NY 693 716
    • (2009) The Handbook of Technology Management , pp. 693-716
    • Brenner, S.W.1
  • 12
    • 0033248015 scopus 로고    scopus 로고
    • Stand by your (exploitive) man: Codependency and responses to performance feedback
    • C.T. Burris Stand by your (exploitive) man: codependency and responses to performance feedback Journal of Social and Clinical Psychology 18 1999 277 298
    • (1999) Journal of Social and Clinical Psychology , vol.18 , pp. 277-298
    • Burris, C.T.1
  • 15
    • 77955266424 scopus 로고    scopus 로고
    • Dealing with cybersmear: How to protect your organization from online defamation
    • N.B. Casarez Dealing with cybersmear: how to protect your organization from online defamation Public Relations Quarterly 47 2002 40 45
    • (2002) Public Relations Quarterly , vol.47 , pp. 40-45
    • Casarez, N.B.1
  • 16
    • 4243109031 scopus 로고
    • On the use, usefulness, and ease of use of structural equation modeling in MIS research: A note of caution
    • W.W. Chin, and P.A. Todd On the use, usefulness, and ease of use of structural equation modeling in MIS research: A note of caution MIS Quarterly 19 1995 237 246
    • (1995) MIS Quarterly , vol.19 , pp. 237-246
    • Chin, W.W.1    Todd, P.A.2
  • 19
    • 84920463623 scopus 로고
    • Domains and facets: Hierarchical personality assessment using the revised NEO personality inventory
    • P.T. Costa Jr., and R.R. McCrae Domains and facets: hierarchical personality assessment using the revised NEO personality inventory Journal of Personality Assessment 64 1995 21 50
    • (1995) Journal of Personality Assessment , vol.64 , pp. 21-50
    • Costa Jr., P.T.1    McCrae, R.R.2
  • 21
    • 2442520432 scopus 로고    scopus 로고
    • Perceptions and experience of workplace bullying in five different work populations
    • J. Dawn, H. Cowie, and K. Ananiadou Perceptions and experience of workplace bullying in five different work populations Aggressive Behavior 29 2003 489 496
    • (2003) Aggressive Behavior , vol.29 , pp. 489-496
    • Dawn, J.1    Cowie, H.2    Ananiadou, K.3
  • 25
    • 0038445381 scopus 로고    scopus 로고
    • Life beyond the screen: Embodiment and identity through the Internet
    • M. Hardey Life beyond the screen: embodiment and identity through the Internet Sociological Review 50 2002 570 585
    • (2002) Sociological Review , vol.50 , pp. 570-585
    • Hardey, M.1
  • 27
    • 78449295769 scopus 로고    scopus 로고
    • Legal, social, and ethical issues of the Internet
    • K.E. Himma Legal, social, and ethical issues of the Internet H. Bidgoli, The handbook of technology management 2010 John Wiley & Sons NY 753 775
    • (2010) The Handbook of Technology Management , pp. 753-775
    • Himma, K.E.1
  • 30
    • 85047686536 scopus 로고    scopus 로고
    • Relationship of personality to performance motivation: A meta-analytic review
    • T.A. Judge, and R. Ilies Relationship of personality to performance motivation: a meta-analytic review Journal of Applied Psychology 87 2002 797 807
    • (2002) Journal of Applied Psychology , vol.87 , pp. 797-807
    • Judge, T.A.1    Ilies, R.2
  • 31
    • 78449268915 scopus 로고    scopus 로고
    • Does privacy exist in the age of social networking?
    • M. Kadrich Does privacy exist in the age of social networking? ISSA Journal 8 2010 18 21
    • (2010) ISSA Journal , vol.8 , pp. 18-21
    • Kadrich, M.1
  • 32
    • 39749188622 scopus 로고    scopus 로고
    • Disruptive technologies and the evolution of the law
    • R. Keck Disruptive technologies and the evolution of the law Legal Briefs 23 2005 22 49
    • (2005) Legal Briefs , vol.23 , pp. 22-49
    • Keck, R.1
  • 35
    • 0001145313 scopus 로고
    • The claim to moral adequacy of a highest stage of moral judgment
    • L. Kohlberg The claim to moral adequacy of a highest stage of moral judgment Journal of Philosophy 70 1973 630 646
    • (1973) Journal of Philosophy , vol.70 , pp. 630-646
    • Kohlberg, L.1
  • 36
    • 67649887157 scopus 로고    scopus 로고
    • Do policies on bullying make a difference? Contrasting strategy regimes within higher education in Australia and Croatia
    • D. Krestelica, and L. Barratt-Pugh Do policies on bullying make a difference? Contrasting strategy regimes within higher education in Australia and Croatia International Journal of Management and Decision Making 10 2009 303 320
    • (2009) International Journal of Management and Decision Making , vol.10 , pp. 303-320
    • Krestelica, D.1    Barratt-Pugh, L.2
  • 37
    • 78449295273 scopus 로고    scopus 로고
    • Anti-employer blogging: Employee breach of the duty of loyalty and the procedure for allowing discovery of a bloggers identity before service of process is effected
    • K. Lee Anti-employer blogging: employee breach of the duty of loyalty and the procedure for allowing discovery of a bloggers identity before service of process is effected Duke Law & Technology Review 2 2006 157 170
    • (2006) Duke Law & Technology Review , vol.2 , pp. 157-170
    • Lee, K.1
  • 39
    • 18544388728 scopus 로고    scopus 로고
    • Sticks and stones and words that harm: Liability vs. responsibility, section 230 and defamatory speech in cyberspace
    • T.A. Lipinski, E.A. Buchanan, and J.J. Britz Sticks and stones and words that harm: liability vs. responsibility, section 230 and defamatory speech in cyberspace Ethics and Information Technology 4 2002 143 158
    • (2002) Ethics and Information Technology , vol.4 , pp. 143-158
    • Lipinski, T.A.1    Buchanan, E.A.2    Britz, J.J.3
  • 43
    • 0033137340 scopus 로고    scopus 로고
    • Team effectiveness: Beyond skills and cognitive ability
    • G.A. Neuman, and J. Wright Team effectiveness: beyond skills and cognitive ability Journal of Applied Psychology 84 1999 379 389
    • (1999) Journal of Applied Psychology , vol.84 , pp. 379-389
    • Neuman, G.A.1    Wright, J.2
  • 45
    • 0032014981 scopus 로고    scopus 로고
    • On self-aggrandizement and anger: A temporal analysis of narcissism and affective reactions to success and failure
    • F. Rhodewalt, and C.C. Morf On self-aggrandizement and anger: a temporal analysis of narcissism and affective reactions to success and failure Journal of Personality and Social Psychology 74 1998 672 685
    • (1998) Journal of Personality and Social Psychology , vol.74 , pp. 672-685
    • Rhodewalt, F.1    Morf, C.C.2
  • 46
    • 58149423116 scopus 로고
    • The necessary and sufficient conditions of therapeutic personality change
    • C.R. Rogers The necessary and sufficient conditions of therapeutic personality change Journal of Consulting Psychology 21 1957 95 103
    • (1957) Journal of Consulting Psychology , vol.21 , pp. 95-103
    • Rogers, C.R.1
  • 49
    • 0000644781 scopus 로고
    • Are theories of learning necessary?
    • B.F. Skinner Are theories of learning necessary? Psychological Review 57 1960 193 216
    • (1960) Psychological Review , vol.57 , pp. 193-216
    • Skinner, B.F.1
  • 51
    • 0002814246 scopus 로고
    • Social psychology of intergroup relations
    • H. Tajfel Social psychology of intergroup relations Annual Review of Psychology 33 1982 1 39
    • (1982) Annual Review of Psychology , vol.33 , pp. 1-39
    • Tajfel, H.1
  • 53
    • 0043059167 scopus 로고
    • Legal socialization: Strategies for an ethical legality
    • J.L. Tapp, and F.J. Levine Legal socialization: strategies for an ethical legality Stanford Law Review 27 1974 1 72
    • (1974) Stanford Law Review , vol.27 , pp. 1-72
    • Tapp, J.L.1    Levine, F.J.2
  • 54
    • 75349113939 scopus 로고    scopus 로고
    • Hate speech online: Restricted or protected? A comparison of regulations in the United States and Germany
    • Y.A. Timofeeva Hate speech online: restricted or protected? A comparison of regulations in the United States and Germany Journal of Transnational Law & Policy 12 2002 253 286
    • (2002) Journal of Transnational Law & Policy , vol.12 , pp. 253-286
    • Timofeeva, Y.A.1
  • 56
    • 0038130991 scopus 로고    scopus 로고
    • Cyber-flirting: Playing at love on the Internet
    • M.T. Whitty Cyber-flirting: playing at love on the Internet Theory and Psychology 13 2003 339 357
    • (2003) Theory and Psychology , vol.13 , pp. 339-357
    • Whitty, M.T.1
  • 57
    • 45849136358 scopus 로고    scopus 로고
    • Liberating or debilitating? An examination of romantic relationships, sexual relationships and friendships on the net
    • M.T. Whitty Liberating or debilitating? An examination of romantic relationships, sexual relationships and friendships on the net Computers in Human Behavior 24 2008 1837 1850
    • (2008) Computers in Human Behavior , vol.24 , pp. 1837-1850
    • Whitty, M.T.1
  • 58
    • 0034764414 scopus 로고    scopus 로고
    • Age/sex/location: Uncovering the social cues in the development of online relationships
    • M. Whitty, and J. Gavin Age/sex/location: uncovering the social cues in the development of online relationships Cyber Psychology and Behavior 4 2001 623 630
    • (2001) Cyber Psychology and Behavior , vol.4 , pp. 623-630
    • Whitty, M.1    Gavin, J.2
  • 59
    • 0037320325 scopus 로고    scopus 로고
    • Escaping or connecting? Characteristics of youth who form close online relationships
    • J. Wolak, K.J. Mitchell, and D. Finkelhor Escaping or connecting? Characteristics of youth who form close online relationships Journal of Adolescence 26 2003 105 119
    • (2003) Journal of Adolescence , vol.26 , pp. 105-119
    • Wolak, J.1    Mitchell, K.J.2    Finkelhor, D.3
  • 60
    • 78449304162 scopus 로고    scopus 로고
    • Virtual communities and imaginary friends - Affiliation and affection from afar: The keynote speech
    • Stowe, VT
    • Workman M. Virtual communities and imaginary friends - affiliation and affection from afar: the keynote speech. In: Annual Conference on Technology and Innovation, CTI'06, vol. 1. Stowe, VT; 2006. p. 2-12.
    • (2006) Annual Conference on Technology and Innovation, CTI'06 , vol.1 , pp. 2-12
    • Workman, M.1
  • 61
    • 84995871700 scopus 로고    scopus 로고
    • Gaining access with social engineering: An empirical study of the threat
    • M. Workman Gaining access with social engineering: an empirical study of the threat Information Systems Security Journal 16 2007 315 331
    • (2007) Information Systems Security Journal , vol.16 , pp. 315-331
    • Workman, M.1
  • 62
    • 60049086497 scopus 로고    scopus 로고
    • A test of interventions for security threats from social engineering
    • M. Workman A test of interventions for security threats from social engineering Information Management & Computer Security 16 2008 463 483
    • (2008) Information Management & Computer Security , vol.16 , pp. 463-483
    • Workman, M.1
  • 63
    • 39749142244 scopus 로고    scopus 로고
    • Wise-crackers: Cognitive and social factors that contribute to information security contravention
    • M. Workman Wise-crackers: cognitive and social factors that contribute to information security contravention Journal of the American Society for Information Science and Technology 59 2008 662 674
    • (2008) Journal of the American Society for Information Science and Technology , vol.59 , pp. 662-674
    • Workman, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.