-
1
-
-
0010368159
-
Introduction Special Issue: Internet Abuse in the Workplace
-
Anandarajan, M., (2002) "Introduction Special Issue: Internet Abuse in the Workplace, " Communications of the ACM, 45, 1, 53-54.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 53-54
-
-
Anandarajan, M.1
-
2
-
-
77952944740
-
-
Information Science Publishing, Hershey, PA
-
Anandarajan, M. and Simmers, C.A. (Eds.), (2003) Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management, Information Science Publishing, Hershey, PA.
-
(2003)
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management
-
-
Anandarajan, M.1
Simmers, C.A.2
-
3
-
-
0036644509
-
Computer monitoring: Benefits and pitfalls facing management
-
Ariss, S.S., (2002) "Computer monitoring: Benefits and pitfalls facing management, " Information & Management, 39, 7, 553-558.
-
(2002)
Information & Management
, vol.39
, Issue.7
, pp. 553-558
-
-
Ariss, S.S.1
-
5
-
-
33645315790
-
Testing a Measure of Cyberloafing
-
Blau, G.; Yang, Y., and Ward-Cook, K., (2006) "Testing a Measure of Cyberloafing", Journal of Allied Health, 35, 1, 9-17.
-
(2006)
Journal of Allied Health
, vol.35
, Issue.1
, pp. 9-17
-
-
Blau, G.1
Yang, Y.2
Ward-Cook, K.3
-
6
-
-
38549167612
-
An empirical evaluation of key factors contributing to internet abuse in the workplace
-
Chen, J.V., Chen, C.C., Yang, H. (2008), "An empirical evaluation of key factors contributing to internet abuse in the workplace, " Industrial Management and Data Systems, 108, 1, 87-106.
-
(2008)
Industrial Management and Data Systems
, vol.108
, Issue.1
, pp. 87-106
-
-
Chen, J.V.1
Chen, C.C.2
Yang, H.3
-
7
-
-
33747755785
-
Fear in organizations: Does intimidation by formal punishment mediate the relationship between interactional justice and workplace internet deviance?
-
de Lara, P. Z. M., (2006) "Fear in organizations: Does intimidation by formal punishment mediate the relationship between interactional justice and workplace internet deviance?, " Journal of Managerial Psychology, 21, 6, 580-592.
-
(2006)
Journal of Managerial Psychology
, vol.21
, Issue.6
, pp. 580-592
-
-
de Lara, P.Z.M.1
-
8
-
-
0035528415
-
Measuring Students Attitudes Toward Educational Use of the Internet
-
Duggan, A., Hess, B., Morgan, D., Kim, S., and Wilson, K. (2001) "Measuring Students Attitudes Toward Educational Use of the Internet, " Journal of Educational Computing Research, 25, 3, 267-281.
-
(2001)
Journal of Educational Computing Research
, vol.25
, Issue.3
, pp. 267-281
-
-
Duggan, A.1
Hess, B.2
Morgan, D.3
Kim, S.4
Wilson, K.5
-
9
-
-
0000917858
-
The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
-
Harrington, S. J., (1996) "The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions, " MIS Quarterly, 20, 3, 257-278.
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.J.1
-
10
-
-
0036828584
-
Perceived Crime Seriousness: Consensus and Disparity
-
Kwan, Y.K., Chiu, L.L., Ip, W.C., and Kwan, P., (2002) "Perceived Crime Seriousness: Consensus and Disparity, " Journal of Criminal Justice, 30, 6, 623-632.
-
(2002)
Journal of Criminal Justice
, vol.30
, Issue.6
, pp. 623-632
-
-
Kwan, Y.K.1
Chiu, L.L.2
Ip, W.C.3
Kwan, P.4
-
11
-
-
0036064934
-
A holistic model of computer abuse within organizations
-
Lee, J., and Lee, Y., (2002) "A holistic model of computer abuse within organizations", Information Management & Computer Security, 10, 2/3, 57-63.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2-3
, pp. 57-63
-
-
Lee, J.1
Lee, Y.2
-
12
-
-
27544432825
-
Why Employees Do Non-Work-Related Computing: An Exploratory Investigation through Multiple Theoretical Perspectives
-
January 2005, Hawaii
-
Lee, O.-K.D. Lim, K.H. and Wong, W.M. (2005) "Why Employees Do Non-Work-Related Computing: An Exploratory Investigation through Multiple Theoretical Perspectives, " Proceedings of the 38th Annual Hawaii International Conference on System Sciences, January 2005, Hawaii.
-
(2005)
Proceedings of the 38th Annual Hawaii International Conference on System Sciences
-
-
Lee, O.-K.D.1
Lim, K.H.2
Wong, W.M.3
-
13
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
Lee, S.M., Lee, S. and Yoo, S., (2004) "An integrative model of computer abuse based on social control and general deterrence theories, " Information & Management, 41, 6, 707-718.
-
(2004)
Information & Management
, vol.41
, Issue.6
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.2
Yoo, S.3
-
14
-
-
0142123338
-
The IT way of loafing on the job: Cyberloafing, neutralizing and organizational Justice
-
Lim, V. K G, (2002) "The IT way of loafing on the job: Cyberloafing, neutralizing and organizational Justice, " Journal of Organizational Behavior, 23, 5, 675-694.
-
(2002)
Journal of Organizational Behavior
, vol.23
, Issue.5
, pp. 675-694
-
-
Lim, V.K.G.1
-
15
-
-
0142054225
-
How Do I Loaf Here? Let Me Count the Ways
-
Lim, V.K.G., Teo, T.S.H., and Loo, G.L., (2002) "How Do I Loaf Here? Let Me Count the Ways", Communications of the ACM, 45, 1, 66-70.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 66-70
-
-
Lim, V.K.G.1
Teo, T.S.H.2
Loo, G.L.3
-
17
-
-
8644250221
-
Reducing Internet abuse in the workplace
-
Mirchandani, D., and Motwani, J. (2003) "Reducing Internet abuse in the workplace", S.A.M. Advanced Management Journal, 68, 1, 22-26.
-
(2003)
S.A.M. Advanced Management Journal
, vol.68
, Issue.1
, pp. 22-26
-
-
Mirchandani, D.1
Motwani, J.2
-
18
-
-
0042406259
-
Monitoring for Pornography and Sexual Harassment
-
Panko, R. R., and Beh, H. G., (2002) "Monitoring for Pornography and Sexual Harassment, " Communications of the ACM, 45, 1, 84-87.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 84-87
-
-
Panko, R.R.1
Beh, H.G.2
-
19
-
-
40249114674
-
Explaining non-work-related computing in the workplace: A comparison of alternative models
-
Pee, L.G., Woon, I.M.Y., Kankanhalli, A., (2008), "Explaining non-work-related computing in the workplace: A comparison of alternative models, " Information & Management, 45, 2, 120-130.
-
(2008)
Information & Management
, vol.45
, Issue.2
, pp. 120-130
-
-
Pee, L.G.1
Woon, I.M.Y.2
Kankanhalli, A.3
-
20
-
-
85024281581
-
Perceived quality of compressed stereoscopic images: Effects of symmetric and asymmetric JPEG coding and camera separation
-
Seuntiens, P., Meesters, L., and Ijsselsteijn, W. (2006) "Perceived quality of compressed stereoscopic images: Effects of symmetric and asymmetric JPEG coding and camera separation, " ACM Transactions on Applied Perception, 3, 2, 95-109.
-
(2006)
ACM Transactions on Applied Perception
, vol.3
, Issue.2
, pp. 95-109
-
-
Seuntiens, P.1
Meesters, L.2
Ijsselsteijn, W.3
-
21
-
-
1042300810
-
Improving Workers' Productivity and Reducing Internet Abuse
-
Sharma, S. K and Gupta, J. N D, (2003) "Improving Workers' Productivity and Reducing Internet Abuse, " The Journal of Computer Information Systems, 44, 2, 74-78.
-
(2003)
The Journal of Computer Information Systems
, vol.44
, Issue.2
, pp. 74-78
-
-
Sharma, S.K.1
Gupta, J.N.D.2
-
22
-
-
0142054224
-
Acceptable Internet Use Policy
-
Siau, K., Nah, F. F.-H., and Teng, L., (2002) "Acceptable Internet Use Policy, " Communications of the ACM, 45, 1, 75-79.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 75-79
-
-
Siau, K.1
Nah, F.F.-H.2
Teng, L.3
-
23
-
-
0242537133
-
Company Profile of the Frequent Internet User
-
Stanton, J. M., (2002) "Company Profile of the Frequent Internet User, " Communications of the ACM, 45, 1, 55-59.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 55-59
-
-
Stanton, J.M.1
-
24
-
-
0000280419
-
Effective IS Security: An Empirical Study
-
Straub, D.W., (1990) "Effective IS Security: an Empirical Study, " Information Systems Research, 1, 3, 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
25
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D.W. and Welke, R.J., (1998) "Coping with systems risk: Security planning models for management decision making, " MIS Quarterly, 22, 4, 441-470.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-470
-
-
Straub, D.W.1
Welke, R.J.2
-
27
-
-
58149426837
-
A law of comparative judgment
-
Thurstone, L.L. (1927). "A law of comparative judgment. " Psychological Review, 34, 273-286.
-
(1927)
Psychological Review
, vol.34
, pp. 273-286
-
-
Thurstone, L.L.1
-
29
-
-
0344755343
-
Does Electronic Monitoring of Employee Internet Usage Work?
-
Urbaczewski, A. and Jessup, L.M., (2002) "Does Electronic Monitoring of Employee Internet Usage Work?" Communications of the ACM, 45, 1, 80-83.
-
(2002)
Communications of the ACM
, vol.45
, Issue.1
, pp. 80-83
-
-
Urbaczewski, A.1
Jessup, L.M.2
-
30
-
-
0002208388
-
The market orientation construct: Measurement and scaling issues
-
Wrenn, B. (1997) "The market orientation construct: Measurement and scaling issues, " Journal of Marketing Theory and Practice, 5, 3, 31-54.
-
(1997)
Journal of Marketing Theory and Practice
, vol.5
, Issue.3
, pp. 31-54
-
-
Wrenn, B.1
|