메뉴 건너뛰기




Volumn 7, Issue , 2009, Pages 4865-4872

Measuring severity of internet abuse in the workplace: Creation of a thurstone scale

Author keywords

Internet abuse; Severity of abuse; Thurstone scale

Indexed keywords

SEVERITY OF ABUSE; THURSTONE SCALE;

EID: 84870385640     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (30)
  • 1
    • 0010368159 scopus 로고    scopus 로고
    • Introduction Special Issue: Internet Abuse in the Workplace
    • Anandarajan, M., (2002) "Introduction Special Issue: Internet Abuse in the Workplace, " Communications of the ACM, 45, 1, 53-54.
    • (2002) Communications of the ACM , vol.45 , Issue.1 , pp. 53-54
    • Anandarajan, M.1
  • 3
    • 0036644509 scopus 로고    scopus 로고
    • Computer monitoring: Benefits and pitfalls facing management
    • Ariss, S.S., (2002) "Computer monitoring: Benefits and pitfalls facing management, " Information & Management, 39, 7, 553-558.
    • (2002) Information & Management , vol.39 , Issue.7 , pp. 553-558
    • Ariss, S.S.1
  • 6
    • 38549167612 scopus 로고    scopus 로고
    • An empirical evaluation of key factors contributing to internet abuse in the workplace
    • Chen, J.V., Chen, C.C., Yang, H. (2008), "An empirical evaluation of key factors contributing to internet abuse in the workplace, " Industrial Management and Data Systems, 108, 1, 87-106.
    • (2008) Industrial Management and Data Systems , vol.108 , Issue.1 , pp. 87-106
    • Chen, J.V.1    Chen, C.C.2    Yang, H.3
  • 7
    • 33747755785 scopus 로고    scopus 로고
    • Fear in organizations: Does intimidation by formal punishment mediate the relationship between interactional justice and workplace internet deviance?
    • de Lara, P. Z. M., (2006) "Fear in organizations: Does intimidation by formal punishment mediate the relationship between interactional justice and workplace internet deviance?, " Journal of Managerial Psychology, 21, 6, 580-592.
    • (2006) Journal of Managerial Psychology , vol.21 , Issue.6 , pp. 580-592
    • de Lara, P.Z.M.1
  • 9
    • 0000917858 scopus 로고    scopus 로고
    • The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
    • Harrington, S. J., (1996) "The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions, " MIS Quarterly, 20, 3, 257-278.
    • (1996) MIS Quarterly , vol.20 , Issue.3 , pp. 257-278
    • Harrington, S.J.1
  • 10
    • 0036828584 scopus 로고    scopus 로고
    • Perceived Crime Seriousness: Consensus and Disparity
    • Kwan, Y.K., Chiu, L.L., Ip, W.C., and Kwan, P., (2002) "Perceived Crime Seriousness: Consensus and Disparity, " Journal of Criminal Justice, 30, 6, 623-632.
    • (2002) Journal of Criminal Justice , vol.30 , Issue.6 , pp. 623-632
    • Kwan, Y.K.1    Chiu, L.L.2    Ip, W.C.3    Kwan, P.4
  • 11
    • 0036064934 scopus 로고    scopus 로고
    • A holistic model of computer abuse within organizations
    • Lee, J., and Lee, Y., (2002) "A holistic model of computer abuse within organizations", Information Management & Computer Security, 10, 2/3, 57-63.
    • (2002) Information Management & Computer Security , vol.10 , Issue.2-3 , pp. 57-63
    • Lee, J.1    Lee, Y.2
  • 13
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • Lee, S.M., Lee, S. and Yoo, S., (2004) "An integrative model of computer abuse based on social control and general deterrence theories, " Information & Management, 41, 6, 707-718.
    • (2004) Information & Management , vol.41 , Issue.6 , pp. 707-718
    • Lee, S.M.1    Lee, S.2    Yoo, S.3
  • 14
    • 0142123338 scopus 로고    scopus 로고
    • The IT way of loafing on the job: Cyberloafing, neutralizing and organizational Justice
    • Lim, V. K G, (2002) "The IT way of loafing on the job: Cyberloafing, neutralizing and organizational Justice, " Journal of Organizational Behavior, 23, 5, 675-694.
    • (2002) Journal of Organizational Behavior , vol.23 , Issue.5 , pp. 675-694
    • Lim, V.K.G.1
  • 15
    • 0142054225 scopus 로고    scopus 로고
    • How Do I Loaf Here? Let Me Count the Ways
    • Lim, V.K.G., Teo, T.S.H., and Loo, G.L., (2002) "How Do I Loaf Here? Let Me Count the Ways", Communications of the ACM, 45, 1, 66-70.
    • (2002) Communications of the ACM , vol.45 , Issue.1 , pp. 66-70
    • Lim, V.K.G.1    Teo, T.S.H.2    Loo, G.L.3
  • 18
    • 0042406259 scopus 로고    scopus 로고
    • Monitoring for Pornography and Sexual Harassment
    • Panko, R. R., and Beh, H. G., (2002) "Monitoring for Pornography and Sexual Harassment, " Communications of the ACM, 45, 1, 84-87.
    • (2002) Communications of the ACM , vol.45 , Issue.1 , pp. 84-87
    • Panko, R.R.1    Beh, H.G.2
  • 19
    • 40249114674 scopus 로고    scopus 로고
    • Explaining non-work-related computing in the workplace: A comparison of alternative models
    • Pee, L.G., Woon, I.M.Y., Kankanhalli, A., (2008), "Explaining non-work-related computing in the workplace: A comparison of alternative models, " Information & Management, 45, 2, 120-130.
    • (2008) Information & Management , vol.45 , Issue.2 , pp. 120-130
    • Pee, L.G.1    Woon, I.M.Y.2    Kankanhalli, A.3
  • 20
    • 85024281581 scopus 로고    scopus 로고
    • Perceived quality of compressed stereoscopic images: Effects of symmetric and asymmetric JPEG coding and camera separation
    • Seuntiens, P., Meesters, L., and Ijsselsteijn, W. (2006) "Perceived quality of compressed stereoscopic images: Effects of symmetric and asymmetric JPEG coding and camera separation, " ACM Transactions on Applied Perception, 3, 2, 95-109.
    • (2006) ACM Transactions on Applied Perception , vol.3 , Issue.2 , pp. 95-109
    • Seuntiens, P.1    Meesters, L.2    Ijsselsteijn, W.3
  • 23
    • 0242537133 scopus 로고    scopus 로고
    • Company Profile of the Frequent Internet User
    • Stanton, J. M., (2002) "Company Profile of the Frequent Internet User, " Communications of the ACM, 45, 1, 55-59.
    • (2002) Communications of the ACM , vol.45 , Issue.1 , pp. 55-59
    • Stanton, J.M.1
  • 24
    • 0000280419 scopus 로고
    • Effective IS Security: An Empirical Study
    • Straub, D.W., (1990) "Effective IS Security: an Empirical Study, " Information Systems Research, 1, 3, 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 25
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D.W. and Welke, R.J., (1998) "Coping with systems risk: Security planning models for management decision making, " MIS Quarterly, 22, 4, 441-470.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-470
    • Straub, D.W.1    Welke, R.J.2
  • 27
    • 58149426837 scopus 로고
    • A law of comparative judgment
    • Thurstone, L.L. (1927). "A law of comparative judgment. " Psychological Review, 34, 273-286.
    • (1927) Psychological Review , vol.34 , pp. 273-286
    • Thurstone, L.L.1
  • 29
    • 0344755343 scopus 로고    scopus 로고
    • Does Electronic Monitoring of Employee Internet Usage Work?
    • Urbaczewski, A. and Jessup, L.M., (2002) "Does Electronic Monitoring of Employee Internet Usage Work?" Communications of the ACM, 45, 1, 80-83.
    • (2002) Communications of the ACM , vol.45 , Issue.1 , pp. 80-83
    • Urbaczewski, A.1    Jessup, L.M.2
  • 30
    • 0002208388 scopus 로고    scopus 로고
    • The market orientation construct: Measurement and scaling issues
    • Wrenn, B. (1997) "The market orientation construct: Measurement and scaling issues, " Journal of Marketing Theory and Practice, 5, 3, 31-54.
    • (1997) Journal of Marketing Theory and Practice , vol.5 , Issue.3 , pp. 31-54
    • Wrenn, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.