Aquino, K., Lewis, M. U., & Bradfield, M. (1999). Justice constructs, negative affectivity, and employee deviance: A proposed model and empirical test. Journal of Organizational Behavior, 20(7), 1073-1091. Anandarajan, M., & Simmers, C. A. (2004). Constructive and dysfunctional personal web usage in the workplace: mapping employee attitudes. In M. Anandarajan, & C. A. Simmers (Eds.), Personal web usage in the workplace: A guide to effective human resources management(pp. 1-27), Idea Group Inc. Blau, P. M. (1964). Exchange and power in social life. New York: Wiley. Blau, G., Yang, Y., & Ward-Cook, K. (2006). Testing a measure of cyberloafing. Journal of Allied Health, 35(1), 9-17. Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing: The role of norms and external locus of control. Computers in Human Behavior, 24(3), 1067-1084. van Doorn, O. (2011). Cyberloafing: A multi-dimensional construct placed in a theoretical framework. Master Thesis in Eindhoven University of Technology, The Netherlands. Friedman, W. H. (2000). Is the answer to internet addiction internet interdiction? In Proceedings of the 2000 Americas conference on information systems. Greenberg, J. (1998). The cognitive geometry of employee theft: Negotiating “the line” between taking and stealing. Monographs in Organizational Behavior and Industrial Relations, 23, 147-194. Guthrie, R., & Gray, P. (1996). Junk computing. Information Systems Management, 13(1), 23-28. Homans, G. C. (1973). Social behaviour: Its elementary forms. New York: Harcourt Brace Jovanovich. Henle, C., & Blanchard, A. (2008). The interaction of work stressors and organizational sanctions on cyberloafing. Journal of Managerial Issues, 20(3), 383-400. Henle, C. A., Kohut, G., & Booth, R. (2009). Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory. Computers in Human Behavior, 25(4), 902-910. Jia, H. H. (2008). Relationships between the big five personality dimensions and cyberloafing behavior. Unpublished Doctor thesis. Southern Illinois University. Kamin, A. (July 16, 1995). Cyber-loa?ng: Does employee time online add up to net losses? New York Daily News. Krishnan, S., Lim, V. K. G., & Teo, T. S. H. (2010). How does personality matter? Investigating the impact of big-five personality traits on cyberloafing. Proceedings of the International Conference on Information Systems, ICIS 2010, Saint Louis, Missouri, USA. de Lara, P. Z. M., Tacoronte, D. V., & Ding, J. M. T. (2006). Do current anti-cyberloafing disciplinary practices have a replica in research findings? A study of the effects of coercive strategies on workplace Internet misuse. Internet Research, 16(4), 450-467. Lee, O. K. D., Lim, K. H., & Wong, W. M. (2005). Why employees do non-work-related computing: An exploratory investigation through multiple theoretical perspectives. Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS′05) - Track 7. Lim, V. K. G. (2002). The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675-694. Lim, V. K. G., & Teo, T. S. H. (2005). Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study. Information & Management, 42(8), 1081-1093. Marron, K. (2000). Attack of the cyberslackers. The (London) Globe and Mail, January 20, p. T5. Morahan-Martin, J. (2001). Impact of internet abuse for college students. Learning and Teaching on the World Wide Web, 191-219. Prasad, S., Lim, V. K. G., & Chen, D. J. Q. (2010). Self-Regulation, individual characteristics and cyberloafing. PACIS Proceedings, 159. Robinson, S. L., & Bennett, R. J. (1995). A typology of deviant workplace behaviors: A multidimensional scaling study. The Academy of Management Journal, 38(2), 555-572. Robinson, S., & Kraatz, M. (1998). Constructing the reality of normative behavior: The use of neutralization strategies by organizational deviants. Monographs in Organizational Behavior and Industrial Relations, 23, 203-220. Thibaut, J. W., & Harold, H. K. (1959). The social psychology of groups. New York: John Wiley & Sons. Simmers, C. A., Anandarajan, M., & Dovidio, R. (2008). Investigation of the underlying structure of personal web usage in the workplace. Academy of Management Proceedings, 1-6. Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American sociological review, 22(6), 664-670. Whitty, M. T., & Carr, A. (2006). Cyberspace romance: The psychology of online relationships. Basingstoke, UK: Palgrave Macmillan. Zoghbi-Manrique-de-Lara, P. (2006). Fear in organizations: Does intimidation by formal punishment mediate the relationship between interactional justice and workplace internet deviance? Journal of Managerial Psychology, 21(6), 580-592. Zoghbi-Manrique-de-Lara, P. (2007). Relationship between organizational justice and cyberloafing in the workplace: Has anomia a say in the matter? CyberPsychology & Behavior, 10(3), 464-470. Zoghbi-Manrique-de-Lara, P., & Olivares-Mesa, A. (2010). Bringing cyber loafers back on the right track. Industrial Management & Data Systems, 110(7), 1038-1053. Zoghbi-Manrique-de-Lara, P., Tacoronte, D. V., & Ding, J. M. T. (2006). Do current anti-cyberloafing disciplinary practices have a replica in research findings? A study of the effects of coercive strategies on workplace internet misuse. Internet Research, 16(4), 450-467. |