-
3
-
-
0031161643
-
Software copyright infringements: An exploratory study of the effects of individual and peer beliefs
-
PII S0305048396000539
-
Al-Jabri, I. & Abdul-Gader, A. (1997) "Software Copyright Infringements: An Exploratory Study of the Effects of Individual and Peer Beliefs" Omega, International Journal of Management Science Vol. 25, No. 3, pp. 335-344. (Pubitemid 127165570)
-
(1997)
Omega
, vol.25
, Issue.3
, pp. 335-344
-
-
Al-Jabri, I.M.1
Abdul-Gader, A.H.2
-
4
-
-
0010368159
-
Internet abuse in the workplace
-
Anandarajan, M.( 2002), "Internet abuse in the workplace," Communications of the ACM (45), pp. 53-54 (Pubitemid 135702388)
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 53-54
-
-
Anandarajan, M.1
-
6
-
-
0034294058
-
Potential determinants of higher Internet usage
-
Armstrong, L., Phillips, J. G., & Saling, L. L. "Potential determinants of higher Internet usage," International Journal of Human-Computer Studies, 53(4), 2000, pp. 537-550
-
(2000)
International Journal of Human-Computer Studies
, vol.53
, Issue.4
, pp. 537-550
-
-
Armstrong, L.1
Phillips, J.G.2
Saling, L.L.3
-
7
-
-
0001156375
-
Managing computer crime: A research outlook
-
Backhouse, J. & Dhillon, G. (1995), "Managing computer crime: a research outlook", Computes & Security, Vol. 14 No. 7, Pp. 645-51
-
(1995)
Computes & Security
, vol.14
, Issue.7
, pp. 645-51
-
-
Backhouse, J.1
Dhillon, G.2
-
9
-
-
0345806555
-
Abuse or learning?
-
Belanger, F. & Slyke, C.V. (2002), "Abuse or Learning?" Communications of the CM, Vol.45, No.1, pp. 64-65. (Pubitemid 135702390)
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 64-65
-
-
Belanger, F.1
Van Slyke, C.2
-
11
-
-
0002042337
-
Issues and opinion on structural equation modeling
-
Chin, W. W. "Issues and Opinion on Structural Equation Modeling" MIS Quarterly, Vol. 22, No. 1, 1998, pp. vii-xv
-
(1998)
MIS Quarterly
, vol.22
, Issue.1
-
-
Chin, W.W.1
-
12
-
-
33845945922
-
Coefficient alpha and the internal structure of tests
-
Conbach L.J. (1951) "Coefficient Alpha and the Internal Structure of Tests" Psychometrika, Vol. 16,pp. 297-334
-
(1951)
Psychometrika
, vol.16
, pp. 297-334
-
-
Conbach, L.J.1
-
13
-
-
0032327732
-
Extending the theory of planned behaviour: A review and avenues for future research
-
Conner, M. & Armitage, C.J. (1998). "Extending the Theory of Planned Behaviour: A review and avenues for future research", Journal of Applied Social Psychology, Vol. 28, pp. 1429-1464.
-
(1998)
Journal of Applied Social Psychology
, vol.28
, pp. 1429-1464
-
-
Conner, M.1
Armitage, C.J.2
-
14
-
-
3242808612
-
-
Computer Security Institute, CSI, San Francisco, CA
-
Computer Security Institute 2003 CSI/FBI Computer Crime and Security Survey, CSI, San Francisco, CA http://www.security.fsu.edu/docs/FBI2003.pdf
-
(2003)
CSI/FBI Computer Crime and Security Survey
-
-
-
15
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis, F.D. (1989), "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology", MIS Quarterly, 13(3), pp. 319-340
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.D.1
-
16
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
Fornell, C. & Larcker, V. F. (1981), "Evaluating structural equation models with unobservable variables and measurement error" Journal of Marketing Research, Vol. 18, pp. 39-5
-
(1981)
Journal of Marketing Research
, vol.18
, pp. 39-5
-
-
Fornell, C.1
Larcker, V.F.2
-
18
-
-
33749667570
-
An empirical investigation of antecedents of internet abuse in the workplace
-
Seattle, December 2003
-
Galletta, D. & Polak, P. (2003), "An Empirical Investigation of Antecedents of Internet Abuse in the Workplace," AIS SIG-HCI Workshop, Seattle, December 2003.
-
(2003)
AIS SIG-HCI Workshop
-
-
Galletta, D.1
Polak, P.2
-
20
-
-
80053512100
-
Task Technology Fit: A Critical (But Often Missing!) Construct in Models of Information Systems and Performance
-
D. Galletta (ed.)
-
Goodhue, D. (2005). Task Technology Fit: A Critical (But Often Missing!) Construct in Models of Information Systems and Performance. In D. Galletta (ed.), Human Computer
-
(2005)
Human Computer
-
-
Goodhue, D.1
-
22
-
-
0003504223
-
Junk computing: Is it bad for an organization?
-
Guthrie, R. & Gray p. (1996), "Junk Computing: Is it bad for an organization?" Information Systems Management, 13(1), pp. 23-28. (Pubitemid 126331767)
-
(1996)
Information Systems Management
, vol.13
, Issue.1
, pp. 23-28
-
-
Guthrie, R.1
Gray, P.2
-
24
-
-
0001094004
-
Information technology adoption across time: A cross sectional comparison of pre-adoption and postadoption beliefs
-
Karahanna, E., Straub D. W. & Chervancy N.L (1999), "Information Technology Adoption across time: A cross sectional comparison of pre-adoption and postadoption beliefs", MIS Quarterly, 23(2).PP183-213
-
(1999)
MIS Quarterly
, vol.23
, Issue.2
, pp. 183-213
-
-
Karahanna, E.1
Straub, D.W.2
Chervancy, N.L.3
-
25
-
-
0036064934
-
A holistic model of computer abuse within organizations
-
DOI 10.1108/09685220210424104
-
Lee,J., Lee Y (2002) ,"A holistic model of computer abuse within organization", Information management &computer Security, 10(2), pp. 57-63 (Pubitemid 34773227)
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.2-3
, pp. 57-63
-
-
Lee, J.1
Lee, Y.2
-
26
-
-
27544432825
-
Why employees do non-work-related computing: An exploratory investigation through multiple theoretical perspectives
-
Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Abstracts and CD-ROM of Full Papers
-
Lee, O.K.D., Lim, K.H. & Wong, W.M. (2005). "Why Employees Do Non-Work-Related Computing: An Exploratory Investigation through Multiple Theoretical Perspectives." In the proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05). Track 7 - Volume 07, pp. 185. (Pubitemid 41544143)
-
(2005)
Proceedings of the Annual Hawaii International Conference on System Sciences
, pp. 185
-
-
Lee, O.-K.D.1
Lim, K.H.2
Wong, W.M.3
-
27
-
-
0035539099
-
Cyber slacking and the procrastination superhighway: A web-based survey of online procrastination, attitudes, and emotion
-
Levoie J.A.A. & Pychyl, T.A. (2001) "Cyber slacking and the Procrastination Superhighway: A Web-Based Survey of Online Procrastination, Attitudes, and Emotion," Social Science Computer Review (19:4) pp 431-444.
-
(2001)
Social Science Computer Review
, vol.19
, Issue.4
, pp. 431-444
-
-
Levoie, J.A.A.1
Pychyl, T.A.2
-
28
-
-
0142123338
-
The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice
-
DOI 10.1002/job.161
-
Lim, V.K.G. (2002), "The IT Way of Loafing on The Job: Cyberloafing, Neutralizing and Organizational Justice," Journal of Organizational Behavior (23:5), pp 675-694. (Pubitemid 37282921)
-
(2002)
Journal of Organizational Behavior
, vol.23
, Issue.5
, pp. 675-694
-
-
Lim, V.K.G.1
-
29
-
-
12444325211
-
Force of habit and information system usage: Theory and initial validation
-
2003
-
Limayem M., Hirt S.G (2003), "Force of habit and information system usage: Theory and initial validation", Journal of the Association of Information Systems, 2003, 4, pp. 65-97
-
(2003)
Journal of the Association of Information Systems
, vol.4
, pp. 65-97
-
-
Limayem, M.1
Hirt, S.G.2
-
30
-
-
0142054225
-
How do I loaf here? Let me count the ways
-
Lim, V.K.G, Teo, T.S.H. & Loo, G.L. (2002), "How do I loaf here? Let me count the ways,",Communications of the ACM, Vol.45, No.1, January 2002, pp. 66-70. (Pubitemid 135702512)
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 66-70
-
-
Lim, V.K.G.1
Teo, T.S.H.2
Loo, G.L.3
-
31
-
-
0030545568
-
The role of justice judgments in explaining the relationship between job satisfaction and organization commitment
-
Martin, Christopher L, Bennett, Nathan (1996), "The Role of Justice Judgments in Explaining the Relationship between Job Satisfaction and Organization Commitment", Group & Organization Management, Vol.21, Issue. 1; pg. 84-95
-
(1996)
Group & Organization Management
, vol.21
, Issue.1
, pp. 84-95
-
-
Martin, C.L.1
Nathan, B.2
-
32
-
-
0005765070
-
From the editor
-
Meyer, J. (1995), "From the editor", Computer & Security, Vol. 14 No. 1, pp. 2-3
-
(1995)
Computer & Security
, vol.14
, Issue.1
, pp. 2-3
-
-
Meyer, J.1
-
33
-
-
73449149291
-
Development of an instrument to measure the perceptions of adopting an information technology innovation
-
Moore, G.C., Benbasat, I. (1991), "Development of an instrument to measure the perceptions of adopting an information technology innovation", Information Systems Research, Vol. 2, pp. 192-222
-
(1991)
Information Systems Research
, vol.2
, pp. 192-222
-
-
Moore, G.C.1
Benbasat, I.2
-
34
-
-
0003528130
-
-
2nd ed., McGraw-Hill Book Company, New York
-
Nunnally, J.C. (1978), "Psychometric Theory", 2nd ed., McGraw-Hill Book Company, New York.
-
(1978)
Psychometric Theory
-
-
Nunnally, J.C.1
-
35
-
-
0346437730
-
Constructive approaches to internet recreation in the workplace
-
Oravec, J.A. (2002), "Constructive Approaches to Internet Recreation in the Workplace", Communications of the ACM, Vol.45, No.1, pp. 60-63. (Pubitemid 135702389)
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 60-63
-
-
Oravec, J.A.1
-
36
-
-
0031500451
-
Implementation intentions and the theory of planned behavior
-
Orbell, S., Hodgkins, S., Sheeran, P. (1997), "Implementation intentions and the Theory of Planned Behavior", Personality and Social Psychology Bulletin, Vol. 23, No. 9, pp. 953-962
-
(1997)
Personality and Social Psychology Bulletin
, vol.23
, Issue.9
, pp. 953-962
-
-
Orbell, S.1
Hodgkins, S.2
Sheeran, P.3
-
37
-
-
0032385513
-
Habit and intention in everyday life: The multiple processes by which past behaviour predicts future behaviour
-
Ouellette, J. A., & Wood, W. (1998),"Habit and intention in everyday life: The multiple processes by which past behaviour predicts future behaviour", Psychological Bulletin, Vol. 124, pp. 54-74.
-
(1998)
Psychological Bulletin
, vol.124
, pp. 54-74
-
-
Ouellette, J.A.1
Wood, W.2
-
39
-
-
0142054224
-
Acceptable internet use policy
-
Siau, K., Nah, F.F.H. &Teng, L. (2002), "Acceptable Internet Use Policy", Communications of the ACM, Vol.45, No.1, pp. 75-79 (Pubitemid 135702392)
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 75-79
-
-
Siau, K.1
Nah, F.F.-H.2
Teng, L.3
-
40
-
-
0042406260
-
Aligning internet usage with business priorities
-
Simmers, C.A. (2002), ".Aligning Internet Usage with business priorities," Communications of the ACM, Vol.45, No.1, pp. 71-74. (Pubitemid 135702391)
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 71-74
-
-
Simmers, C.A.1
-
41
-
-
0042222911
-
The dark side of employee email
-
Sipior, J.C., Ward, B.T. (1999)," The dark side of employee email ", Communications of the ACM, Vol.42, No.7, pp. 88-95. (Pubitemid 129569612)
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 88-95
-
-
Sipior, J.C.1
Ward, B.T.2
-
42
-
-
1042300810
-
Improving workers' productivity and reducing Internet abuse
-
Sharma, S.K., Jatinder, N.D.G. (2003) "Improving worker's productivity and reducing Internet abuse," The Journal of Computer Information Systems (44:2), pp 74-78 (Pubitemid 38194186)
-
(2003)
Journal of Computer Information Systems
, vol.44
, Issue.2
, pp. 74-78
-
-
Sharma, S.K.1
Gupta, J.N.D.2
-
43
-
-
0030668250
-
A social learning theory analysis of computer crime among college students
-
DOI 10.1177/0022427897034004005
-
Skinner, W.F., Fream, A.M (1997), "A social learning theory analysis of computer abuse among college students", Journal of research in crime and delinquency, vol. 34 No. 4, pp495-518 (Pubitemid 27465108)
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, Issue.4
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
44
-
-
0034388339
-
Reactions to employee performance monitoring: Framework, review, and research directions
-
2000
-
Stanton, J. M. (2000), "Reactions to employee performance monitoring: framework, review, and research directions", Human Performance, 2000, 13(1), pp85-133.
-
(2000)
Human Performance
, vol.13
, Issue.1
, pp. 85-133
-
-
Stanton, J.M.1
-
45
-
-
0242537133
-
Company profile of the frequent internet user
-
Stanton, J.M. (2002), "Company Profile of the Frequent Internet User," Communications of the ACM, Vol.45, No.1, pp 55-59. (Pubitemid 135702511)
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 55-59
-
-
Stanton, J.M.1
-
46
-
-
0031628589
-
Recent security surveys
-
Stephen, H. (1998), "Recent Security Surveys," Computers and Security, vol. 17 (3), 207-210.
-
(1998)
Computers and Security
, vol.17
, Issue.3
, pp. 207-210
-
-
Stephen, H.1
-
47
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
Straub, D.W., Nance W.D. (1990), "Discovering and disciplining computer abuse in organizations: a field study", MIS Quarterly,14(1), pp. 45-62.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-62
-
-
Straub, D.W.1
Nance, W.D.2
-
48
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D.W., Welke R. J (1998), "Coping with Systems Risk: Security Planning Models for Management Decision Making", MIS Quarterly, 22(4), pp. 441-469
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
49
-
-
0001155759
-
Techniques of neutralization: A theory of delinquency
-
Sykes, G.M., Matza, D. (1957), "Techniques of neutralization: A theory of delinquency", American Sociological Review, Vol.22, No.6, pp. 664-670.
-
(1957)
American Sociological Review
, vol.22
, Issue.6
, pp. 664-670
-
-
Sykes, G.M.1
Matza, D.2
-
50
-
-
73549120882
-
Understanding information technology usage: A test of competing models
-
Taylor, S., Todd P.A (1995), "Understanding Information Technology Usage: A Test of Competing Models", Information Systems Research, 6(2), pp. 144-176 (Pubitemid 126102974)
-
(1995)
Information Systems Research
, vol.6
, Issue.2
, pp. 144-176
-
-
Taylor, S.1
Todd, P.A.2
-
51
-
-
0002687059
-
Intrinsic and extrinsic motivation in internet usage
-
Teo, T.S.H., Lim V.K.G., & Lai R.Y.C. (1999), "Intrinsic and Extrinsic Motivation in Internet Usage", Omega, International Journal of Management Science, vol. 27, pp. 25-37
-
(1999)
Omega, International Journal of Management Science
, vol.27
, pp. 25-37
-
-
Teo, T.S.H.1
Lim, V.K.G.2
Lai, R.Y.C.3
-
53
-
-
0019247002
-
Values, attitudes, and interpersonal behavior
-
University of Nebraska Press, Lincoln, NE
-
Triandis, Harry c. (1979), "Values, Attitudes, and Interpersonal Behavior," in Nebraska Symposium on Motivation, 1979: Beliefs, Attitudes, and Values, University of Nebraska Press, Lincoln, NE, 195-259
-
(1979)
Nebraska Symposium on Motivation, 1979: Beliefs, Attitudes, and Values
, pp. 195-259
-
-
Triandis, H.C.1
-
54
-
-
0344755343
-
Does electronic monitoring of employee internet usage work?
-
Urbaczewski, A.,Jessup L.M. (2002), "Does Electronic Monitoring of Employee Internet Usage Work?" Communications of the ACM, vol. 45(1), pp. 80-83 (Pubitemid 135702393)
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 80-83
-
-
Urbaczewski, A.1
Jessup, L.M.2
-
55
-
-
0002591087
-
Internet surfing
-
February 7, 2000
-
Verespej, M.A. (2000). "Internet surfing", Industry Week, Vol.249, No.3, February 7, 2000, pp.58-64.
-
(2000)
Industry Week
, vol.249
, Issue.3
, pp. 58-64
-
-
Verespej, M.A.1
-
57
-
-
0002591087
-
Internet surfing
-
February 7, 2000
-
Verespej, M.A. (2000). "Internet surfing", Industry Week, Vol.249, No.3, February 7, 2000, pp.58-64.
-
(2000)
Industry Week
, vol.249
, Issue.3
, pp. 58-64
-
-
Verespej, M.A.1
-
58
-
-
0031478184
-
Habit, information acquisition, and the process of making travel mode choices
-
Verplanken, B., Aarts, H., & van Knippenberg, A. (1997). "Habit, information acquisition, and the process of making travel mode choices", European Journal of Social Psychology, Vol. 27, pp. 539-560.
-
(1997)
European Journal of Social Psychology
, vol.27
, pp. 539-560
-
-
Verplanken, B.1
Aarts, H.2
Van Knippenberg, A.3
-
59
-
-
80053549909
-
-
Websense web @work 2005 survey http://www.websense.com/global/en/ PressRoom/PressReleases/PressReleaseDetail/?Release=050509928
-
Websense Web @Work 2005 Survey
-
-
|