References

  • Aboujaoude, E; Savage, M.W.; Starcevic, V; and Salame, W.O. Cyberbullying: Review of an old problem gone viral. Journal of Adolescent Health, 57, 1 (2015), 10–18.
  • Adler, A; Nash, J.C.; and Noël, S. Evaluating and implementing a collaborative office document system. Interacting with Computers, 18, 4 (2006), 665–682.
  • Anderson, P. Perspective: Complexity theory and organization science. Organization Science, 10, 3 (1999), 216–232.
  • Anstead, N., and O’Loughlin, B. Social media analysis and public opinion: The 2010 UK general election. Journal of Computer-Mediated Communication, 20, 2 (2015), 204–220.
  • Arntfield, M. Toward a cybervictimology: Cyberbullying, routine activities theory, and the anti-sociality of social media. Canadian Journal of Communication, 40, 3 (2015), 371–388.
  • Ausubel, D.P. Relationships between shame and guilt in the socializing process. Psychological Review, 62, 5 (1955), 378–390.
  • Banjanin, N.; Banjanin, N.; Dimitrijevic, I.; and Pantic, I. Relationship between Internet use and depression: Focus on physiological mood oscillations, social networking and online addictive behavior. Computers in Human Behavior, 43 (February 2015), 308–312.
  • Bauman, S., and Bellmore, A. New directions in cyberbullying research. Journal of School Violence, 14, 1 (2015), 1–10.
  • Bauman, S.; Cross, D.; and Walker, J. Principles of Cyberbullying Research: Definitions, Measures, and Methodology. New York, NY: Routledge, 2013.
  • Bauman, S., and Yoon, J. This issue: Theories of bullying and cyberbullying. Theory Into Practice, 53, 4 (2014), 253–256.
  • Beck, R.; Pahlke, I.; and Seebach, C. Knowledge exchange and symbolic action in social media-enabled electronic networks of practice: A multilevel perspective on knowledge seekers and contributors. MIS Quarterly, 38, 4 (2014), 1245–1270.
  • Beltrán-Martín, I.; Roca-Puig, V.; Escrig-Tena, A.; and Bou-Llusar, J.C. Human resource flexibility as a mediating variable between high performance work systems and performance. Journal of Management, 34, 5 (2008), 1009–1044.
  • Bertot, J.C.; Jaeger, P.T.; and Grimes, J.M. Promoting transparency and accountability through ICTs, social media, and collaborative e-government. Transforming Government: People, Process and Policy, 6, 1 (2012), 78–91.
  • Bevan, J.L.; Pfyl, J.; and Barclay, B. Negative emotional and cognitive responses to being unfriended on Facebook: An exploratory study. Computers in Human Behavior, 28, 4 (2012), 1458–1464.
  • Bharadwaj, A.S. A resource-based perspective on information technology capability and firm performance: An empirical investigation. MIS Quarterly, 24, 1 (2000), 169–196.
  • Brewer, M.B., and Pickett, C.L. The social self and group identification. The Social Self: Cognitive, Interpersonal and Intergroup Perspectives, 4 (2014), 255–272.
  • Calvete, E.; Orue, I.; Estévez, A.; Villardón, L.; and Padilla, P. Cyberbullying in adolescents: Modalities and aggressors’ profile. Computers in Human Behavior, 26, 5 (2010), 1128–1135.
  • Campbell, M.A. How research findings can inform legislation and school policy on cyberbullying. In S. Bauman, D. Cross, and J. Walker (eds.), Principles of Cyberbullying Research, Definitions, Measures, and Methodology. New York, NY: Routledge, 2013, pp. 290–303.
  • Cassidy, W.; Faucher, C.; and Jackson, M. Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice. School Psychology International, 34, 6 (2013), 575–612.
  • Chatterjee, S.; Moody, G.; Lowry, P.B.; Chakraborty, S.; and Hardin, A. Strategic relevance of organizational virtues enabled by information technology in organizational innovation. Journal of Management Information Systems, 32, 3 (2015), 158–196.
  • Chatterjee, S.; Sarker, S.; and Fuller, M. A deontological approach to designing ethical collaboration. Journal of the Association for Information Systems, 10, 3 (2009), 138–169.
  • Chatterjee, S.; Sarker, S.; and Valacich, J.S. The behavioral roots of IS security: Exploring key factors of unethical IT use. Journal of Management Information Systems, 31, 4 (2015), 49–87.
  • Christopherson, K.M. The positive and negative implications of anonymity in Internet social interactions: “On the Internet, nobody knows you’re a dog.” Computers in Human Behavior, 23, 6 (2007), 3038–3056.
  • Clayton, R.B.; Nagurney, A.; and Smith, J.R. Cheating, breakup, and divorce: Is Facebook use to blame? Cyberpsychology, Behavior, and Social Networking, 16, 10 (2013), 717–720.
  • Cross, D.; Bauman, S.; and Walker, J. Summary and conclusions. In D. Cross, S. Bauman, and J. Walker (eds.), Principles of Cyberbullying Research: Definitions, Measures, and Methodology. New York, NY: Routledge, 2013, pp. 337–353.
  • Cua, K.O.; McKone-Sweet, K.E.; and Schroeder, R.G. Improving performance through an integrated manufacturing program. Quality Management Journal, 13, 3 (2006), 45–60.
  • Curry, T.R. Integrating motivating and constraining forces in deviance causation: A test of causal chain hypotheses in control balance theory. Deviant Behavior, 26, 6 (2005), 571–599.
  • Cyr, D.; Hassanein, K.; Head, M.; and Ivanov, A. The role of social presence in establishing loyalty in e-service environments. Interacting with Computers, 19, 1 (2007), 43–56.
  • Cyr, D.; Head, M.; Larios, H.; and Pan, B. Exploring human images in website design: A multi-method approach. MIS Quarterly, 33, 3 (2009), 539–566.
  • D’Arcy, J., and Herath, T. A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20, 6 (2011), 643–658.
  • D’Cruz, P., and Noronha, E. The interface between technology and customer cyberbullying: Evidence from India. Information and Organization, 24, 3 (2014), 176–193.
  • D’Arcy, J., and Hovav, A. Does one size fit all? Examining the differential effects of IS security countermeasures. Journal of Business Ethics, 89, 1 (2009), 59–71.
  • Davison, C.B., and Stein, C.H. The dangers of cyberbullying. North American Journal of Psychology, 16, 3 (2014), 595–606.
  • Dehue, F. Cyberbullying research: New perspectives and alternative methodologies. Introduction to the special issue. Journal of Community and Applied Social Psychology, 23, 1 (2013), 1–6.
  • DeLisi, M., and Hochstetler, A. An exploratory assessment of Tittle’s control balance theory: Results from the National Youth Survey. Justice Professional, 15, 3 (2002), 261–272.
  • Dinakar, K.; Jones, B.; Havasi, C.; Lieberman, H.; and Picard, R. Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems, 2, 3 (2012), article 18.
  • Doane, A.N.; Pearson, M.R.; and Kelley, M.L. Predictors of cyberbullying perpetration among college students: An application of the theory of reasoned action. Computers in Human Behavior, 36 (2014), 154–162.
  • Ellison, N.B.; Steinfield, C.; and Lampe, C. The benefits of Facebook “friends”: Social capital and college students’ use of online social network sites. Journal of Computer‐Mediated Communication, 12, 4 (2007), 1143–1168.
  • Espelage, D.L.; Rao, M.A.; and Craven, R.G. Theories of cyberbullying. In S. Bauman, D. Cross, and J. Walker (eds.), Principles of Cyberbullying Research: Definitions, Measures, and Methodology. New York, NY: Routledge, 2013, pp. 78–97.
  • Espinoza, G., and Juvonen, J. Methods used in cyberbullying research. In S. Bauman, D. Cross, and J. Walker (eds.), Principles of Cyberbullying Research, Definitions, Measures, and Methodology. New York, NY: Routledge, 2013, pp. 142–154.
  • Fiske, S.T. Controlling other people: The impact of power on stereotyping. American Psychologist, 48, 6 (1993), 621–628.
  • Fox, K.A.; Nobles, M.R.; and Fisher, B.S. A multi-theoretical framework to assess gendered stalking victimization: The utility of self-control, social learning, and control balance theories. Justice Quarterly, 33, 2 (2014), 1–29.
  • Friedman, B.; Kahn, P.H. Jr.; Borning, A.; and Huldtgren, A. Value sensitive design and information systems. In N. Doorn, D. Schuurbiers, I. Van de Poel, and M. Gorman (eds.), Early Engagement and New Technologies: Opening up the Laboratory. New York, NY: Springer, 2013, pp. 55–95.
  • Gefen, D., and Straub, D.W. Consumer trust in B2C e-Commerce and the importance of social presence: Experiments in e-products and e-services. Omega, 32, 6 (2004), 407–424.
  • Gosling, S.D., and Mason, W. Internet research in psychology. Annual Review of Psychology, 66 (2015), 877–902.
  • Grover, V. The information systems field: Making a case for maturity and contribution. Journal of the Association for Information Systems, 13, 4 (2012), 254–272.
  • Hair, J.F. Jr.; Black, W.C.; Babin, B.J.; and Anderson, R.E. Multivariate Data Analysis, 7th ed. New York, NY: Prentice Hall, 2006.
  • Hall, A.T.; Frink, D.D.; and Buckley, M.R. An accountability account: A review and synthesis of the theoretical and empirical research on felt accountability. Journal of Organizational Behavior, 38, 2 (2015), 204–224.
  • Halpern, D., and Gibbs, J. Social media as a catalyst for online deliberation? Exploring the affordances of Facebook and YouTube for political expression. Computers in Human Behavior, 29, 3 (2013), 1159–1168.
  • Harrendorf, S. How can criminology contribute to an explanation of international crimes? Journal of International Criminal Justice, 12, 2 (2014), 231–252.
  • Hickman, M., and Piquero, A.R. Exploring the relationships between gender, control balance, and deviance. Deviant Behavior, 22, 4 (2001), 323–351.
  • Hickman, M.J.; Piquero, A.R.; Lawton, B.A.; and Greene, J.R. Applying Tittle’s control balance theory to police deviance. Policing, 24, 4 (2001), 497–520.
  • Hinduja, S., and Patchin, J.W. Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29, 2 (2008), 129–156.
  • Hinduja, S., and Patchin, J.W. Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying. Thousand Oaks, CA: Corwin Press, 2014.
  • Holt, T.J.; Burruss, G.W.; and Bossler, A.M. Social learning and cyber-deviance: Examining the importance of a full social learning model in the virtual world. Journal of Crime and Justice, 33, 2 (2010), 31–61.
  • Hong, W., and Thong, J.Y. Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly, 37, 1 (2013), 275–298.
  • Horton, J.J.; Rand, D.G.; and Zeckhauser, R.J. The online laboratory: Conducting experiments in a real labor market. Experimental Economics, 14, 3 (2011), 399–425.
  • James, T.L.; Lowry, P.B.; Wallace, L.; and Warkentin, M. The effect of belongingness on obsessive-compulsive disorder in the use of online social networks. Journal of Management Information Systems, 34, 2 (2017), 560–596.
  • Jasso, G. Factorial survey methods for studying beliefs and judgments. Sociological Methods and Research, 34, 3 (2006), 334–423.
  • Kane, G.C.; Alavi, M.; Labianca, G.; and Borgatti, S.P. What’s different about social media networks? A framework and research agenda. MIS Quarterly, 38, 1 (2014), 275–304.
  • Kast, F.E., and Rosenzweig, J.E. General systems theory: Applications for organization and management. Academy of Management Journal, 15, 4 (1972), 447–465.
  • Keith, M.J.; Thompson, S.C.; Hale, J.; Lowry, P.B.; and Greer, C. Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior. International Journal of Human–Computer Studies, 71, 12 (2013), 1163–1173.
  • Khansa, L.; Kuem, J.; Siponen, M.; and Kim, S.S. To cyberloaf or not to cyberloaf: The impact of the announcement of formal organizational controls. Journal of Management Information Systems, 34, 1 (2017), 141–176.
  • Kietzmann, J.H.; Hermkens, K.; McCarthy, I.P.; and Silvestre, B.S. Social media? Get serious! Understanding the functional building blocks of social media. Business Horizons, 54, 3 (2011), 241–251.
  • Klein, G.; Jiang, J.J.; and Cheney, P. Resolving difference score issues in information systems research. MIS Quarterly, 33, 4 (2009), 811–826.
  • Knobel, C., and Bowker, G.C. Values in design. Communications of the ACM, 54, 7 (2011), 26–28.
  • Kowalski, R.M.; Giumetti, G.W.; Schroeder, A.N.; and Lattanner, M.R. Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140, 4 (2014), 1073–1137.
  • Kuem, J.; Ray, S.; Siponen, M.; and Kim, S.S. What leads to prosocial behaviors on social networking services: A tripartite model. Journal of Management Information Systems, 34, 1 (2017), 40–70.
  • Kwan, G.C.E., and Skoric, M.M. Facebook bullying: An extension of battles in school. Computers in Human Behavior, 29, 1 (2013), 16–25.
  • Lambropoulos, N.; Faulkner, X.; and Culwin, F. Supporting social awareness in collaborative e-learning. British Journal of Educational Technology, 43, 2 (2012), 295–306.
  • Lang, C., and Barton, H. Just untag it: Exploring the management of undesirable Facebook photos. Computers in Human Behavior, 43 (2015), 147–155.
  • Lee, J.; Crossler, R.; and Warkentin, M. Implications of monitoring mechanisms on bring your own device (BYOD) adoption. Journal of Computer Information Systems, 57, 4 (2017), 309–318.
  • Lerner, J.S., and Tetlock, P.E. Accounting for the effects of accountability. Psychological Bulletin, 125, 2 (1999), 255–275.
  • Liechti, O., and Ichikawa, T. A digital photography framework supporting social interaction and affective awareness. In G. Goos, J. Hartmanis, and J. van Leeuwen (eds.), Handheld and Ubiquitous Computing. Berlin Heidelberg, Germany: Springer, 1999, pp. 186–192.
  • Lovejoy, K., and Saxton, G.D. Information, community, and action: How nonprofit organizations use social media. Journal of Computer‐Mediated Communication, 17, 3 (2012), 337–353.
  • Lowry, P.B.; Cao, J.; and Everard, A. Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27, 4 (2011), 163–200.
  • Lowry, P.B.; D’Arcy, J.; Hammer, B.; and Moody, G.D. “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. Journal of Strategic Information Systems, 25, 3 (2016), 232–240.
  • Lowry, P.B., and Gaskin, J. Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: When to choose it and how to use it. IEEE Transactions on Professional Communication, 57, 2 (2014), 123–146.
  • Lowry, P.B.; Moody, G.D.; Galletta, D.F.; and Vance, A. The drivers in the use of online whistle-blowing reporting systems. Journal of Management Information Systems, 30, 1 (2013), 153–190.
  • Lowry, P.B.; Posey, C.; Bennett, R.J.; and Roberts, T.L. Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust. Information Systems Journal, 25, 3 (2015), 193–230.
  • Lowry, P.B.; Zhang, J.; Wang, C.; and Siponen, M. Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning (SSSL) model. Information Systems Research, 27, 4 (2016), 962–986.
  • Maner, J.K.; Gailliot, M.T.; Butz, D.A.; and Peruche, B.M. Power, risk, and the status quo: Does power promote riskier or more conservative decision making? Personality and Social Psychology Bulletin, 33, 4 (2007), 451–462.
  • Marsh, H.W., and Hocevar, D. Application of confirmatory factor analysis to the study of self-concept: First- and higher-order factor models and their invariance across groups. Psychological Bulletin, 97, 3 (1985), 562–582.
  • Mason, K.L. Cyberbullying: A preliminary assessment for school personnel. Psychology in the Schools, 45, 4 (2008), 323–348.
  • Mason, W., and Suri, S. Conducting behavioral research on Amazon’s Mechanical Turk. Behavior Research Methods, 44, 1 (2012), 1–23.
  • Matook, S.; Cummings, J.; and Bala, H. Are you feeling lonely? The impact of relationship characteristics and online social network features on loneliness. Journal of Management Information Systems, 31, 4 (2015), 278–310.
  • McCuddy, T., and Vogel, M. Beyond traditional interaction: Exploring the functional form of the exposure-offending association across online network size. Journal of Criminal Justice, 43, 2 (2015), 89–98.
  • Menesini, E.; Nocentini, A.; and Calussi, P. The measurement of cyberbullying: Dimensional structure and relative item severity and discrimination. Cyberpsychology, Behavior, and Social Networking, 14, 5 (2011), 267–274.
  • Mohr, D.; Cuijpers, P.; and Lehman, K. Supportive accountability: A model for providing human support to enhance adherence to eHealth interventions. Journal of Medical Internet Research, 13, 1 (2011), e30.
  • Monks, C.P.; Smith, P.K.; Naylor, P.; Barter, C.; Ireland, J.L.; and Coyne, I. Bullying in different contexts: Commonalities, differences and the role of theory. Aggression and Violent Behavior, 14, 2 (2009), 146–156.
  • Nadler, D.A., and Tushman, M.L. A model for diagnosing organizational behavior. Organizational Dynamics, 9, 2 (1980), 35–51.
  • Nan, N. Capturing bottom-up information technology use processes: A complex adaptive systems model. MIS Quarterly, 35, 2 (2011), 505–532.
  • Nan, N., and Lu, Y. Harnessing the power of self-organization in an online community during organizational crisis. MIS Quarterly, 38, 4 (2014), 1135–1157.
  • Nobles, M.R., and Fox, K.A. Assessing stalking behaviors in a control balance theory framework. Criminal Justice and Behavior, 40, 7 (2013), 737–762.
  • Nobles, M.R.; Reyns, B.W.; Fox, K.A.; and Fisher, B.S. Protection against pursuit: A conceptual and empirical comparison of cyberstalking and stalking victimization among a national sample. Justice Quarterly, 31, 6 (2012), 986–1014.
  • Paolacci, G.; Chandler, J.; and Ipeirotis, P.G. Running experiments on Amazon Mechanical Turk. Judgment and Decision Making, 5, 5 (2010), 411–419.
  • Patchin, J.W., and Hinduja, S. Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4, 2 (2006), 148–169.
  • Pempek, T.A.; Yermolayeva, Y.A.; and Calvert, S.L. College students’ social networking experiences on Facebook. Journal of Applied Developmental Psychology, 30, 3 (2009), 227–238.
  • Pinsonneault, A., and Heppel, N. Anonymity in group support systems research: A new conceptualization, measure, and contingency framework. Journal of Management Information Systems, 14, 3 (1998), 89–108.
  • Piquero, A.R., and Hickman, M. An empirical test of Tittle’s control balance theory. Criminology, 37, 2 (1999), 319–342.
  • Piquero, A.R., and Hickman, M. Extending Tittle’s control balance theory to account for victimization. Criminal Justice and Behavior, 30, 3 (2003), 282–301.
  • Piquero, A.R.; MacIntosh, R.; and Hickman, M. Applying Rasch modeling to the validity of a control balance scale. Journal of Criminal Justice, 29, 6 (2001), 493–505.
  • Piquero, N.L., and Piquero, A.R. Control balance and exploitative corporate crime. Criminology, 44, 2 (2006), 397–430.
  • Podsakoff, P.M.; MacKenzie, S.B.; Lee, J.Y.; and Podsakoff, N.P. Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 5 (2003), 879–903.
  • Pogarsky, G., and Piquero, A.R. Studying the reach of deterrence: Can deterrence theory help explain police misconduct? Journal of Criminal Justice, 32, 4 (2004), 371–386.
  • Polites, G.L.; Roberts, N.; and Thatcher, J. Conceptualizing models using multidimensional constructs: A review and guidelines for their use. European Journal of Information Systems, 21, 1 (2012), 22–48.
  • Posey, C.; Lowry, P.B.; Roberts, T.L.; and Ellis, S. Proposing the online community self-disclosure model: The case of working professionals in France and the UK who use online communities. European Journal of Information Systems, 19, 2 (2010), 181–195.
  • Posey, C.; Roberts, T.L.; Lowry, P.B.; Bennett, R.J.; and Courtney, J. Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors. MIS Quarterly, 37, 4 (2013), 1189–1210.
  • Postmes, T.; Spears, R.; and Lea, M. Breaching or building social boundaries? SIDE-effects of computer-mediated communication. Communication Research, 25, 6 (1998), 689–715.
  • Postmes, T.; Spears, R.; Sakhel, K.; and De Groot, D. Social influence in computer-mediated communication: The effects of anonymity on group behavior. Personality and Social Psychology Bulletin, 27, 10 (2001), 1243–1254.
  • Privitera, C., and Campbell, M.A. Cyberbullying: The new face of workplace bullying? CyberPsychology and Behavior, 12, 4 (2009), 395–400.
  • Rahimi, B. The agonistic social media: Cyberspace in the formation of dissent and consolidation of state power in postelection Iran. Communication Review, 14, 3 (2011), 158–178.
  • Rebellon, C.J.; Piquero, N.L.; Piquero, A.R.; and Tibbetts, S.G. Anticipated shaming and criminal offending. Journal of Criminal Justice, 38, 5 (2010), 988–997.
  • Reicher, S., and Levine, M. Deindividuation, power relations between groups and the expression of social identity: The effects of visibility to the out‐group. British Journal of Social Psychology, 33, 2 (1994), 145–163.
  • Richardson, H.A.; Simmering, M.J.; and Sturman, M.C. A tale of three perspectives: Examining post hoc statistical techniques for detection and correction of common method variance. Organizational Research Methods, 12, 4 (2009), 762–800.
  • Riedl, C.; Köbler, F.; Goswami, S.; and Krcmar, H. Tweeting to feel connected: A model for social connectedness in online social networks. International Journal of Human–Computer Interaction, 29, 10 (2013), 670–687.
  • Rivituso, J. Cyberbullying victimization among college students: An interpretive phenomenological analysis. Journal of Information Systems Education, 25, 1 (2014), 71–75.
  • Rosen, L.D.; Whaling, K.; Rab, S.; Carrier, L.M.; and Cheever, N.A. Is Facebook creating “iDisorders”? The link between clinical symptoms of psychiatric disorders and technology use, attitudes and anxiety. Computers in Human Behavior, 29, 3 (2013), 1243–1254.
  • Rothe, D.L., and Mullins, C.W. Toward a criminology of international criminal law: An integrated theory of international criminal violations. International Journal of Comparative and Applied Criminal Justice, 33, 1 (2009), 97–118.
  • Runions, K.; Shapka, J.D.; Dooley, J.; and Modecki, K. Cyber-aggression and victimization and social information processing: Integrating the medium and the message. Psychology of Violence, 3, 1 (2013), 9–26.
  • Sabella, R.A.; Patchin, J.W.; and Hinduja, S. Cyberbullying myths and realities. Computers in Human Behavior, 29, 6 (2013), 2703–2711.
  • Sagioglou, C., and Greitemeyer, T. Facebook’s emotional consequences: Why Facebook causes a decrease in mood and why people still use it. Computers in Human Behavior, 35, (2014), 359–363.
  • Sauder, M., and Espeland, W.N. The discipline of rankings: Tight coupling and organizational change. American Sociological Review, 74, 1 (2009), 63–82.
  • Schlenker, B.R.; Britt, T.W.; Pennington, J.; Murphy, R.; and Doherty, K. The triangle model of responsibility. Psychological Review, 101, 4 (1994), 632–652.
  • Schulze, T.; Krug, S.; and Schader, M. Workers’ task choice in crowdsourcing and human computation markets. Presented at 2012 International Conference on Information Systems (ICIS 2012), Orlando, FL, December 16–19, 2012.
  • Schwarz, A.; Rizzuto, T.; Carraher-Wolverton, C.; Roldán, J.L.; and Barrera-Barrera, R. Examining the impact and detection of the “urban legend” of common method bias. Database for Advances in Information Systems, 48, 1 (2017), 93–119.
  • Scott, S.V., and Orlikowski, W.J. Reconfiguring relations of accountability: Materialization of social media in the travel sector. Accounting, Organizations and Society, 37, 1 (2012), 26–40.
  • Scott, S.V., and Orlikowski, W.J. Entaglements in practice: Performing anonymity through social media. MIS Quarterly, 38, 3 (2014), 873–893.
  • Sharma, R.; Yetton, P.; and Crawford, J. Estimating the effect of common method variance: The method–method pair technique with an illustration from TAM research. MIS Quarterly, 33, 3 (2009), 473–490.
  • Shein, E. Ephemeral data. Communications of the ACM, 56, 9 (2013), 20–22.
  • Shen, K.N., and Khalifa, M. Design for social presence in online communities: A multidimensional approach. AIS Transactions on Human-Computer Interaction, 1, 2 (2009), 33–54.
  • Sia, C.-L.; Tan, B.C.Y.; and Wei, K.-K. Group polarization and computer-mediated communication: Effects of communication cues, social presence, and anonymity. Information Systems Research, 13, 1 (2002), 70–90.
  • Simola, S. Understanding moral courage through a feminist and developmental ethic of care. Journal of Business Ethics, 130, 1 (2015), 29–44.
  • Siponen, M., and Vance, A. Neutralization: New insights into the problem of employee systems security policy violations. MIS Quarterly, 34, 3 (2010), 487–502.
  • Slonje, R.; Smith, P.K.; and Frisén, A. Processes of cyberbullying, and feelings of remorse by bullies: A pilot study. European Journal of Developmental Psychology, 9, 2 (2012), 244–259.
  • Slonje, R.; Smith, P.K.; and Frisén, A. The nature of cyberbullying, and strategies for prevention. Computers in Human Behavior, 29, 1 (2013), 26–32.
  • Spears, B.A., and Zeederberg, M. Emerging methodological strategies to address cyberbullying: Online social marketing and young people as co-researchers. In S. Bauman, D. Cross, and J. Walker (eds.), Principles of Cyberbullying Research, Definitions, Measures, and Methodology. New York, NY: Routledge, 2013, pp. 196–209.
  • Squicciarini, A.; Mont, M.C.; and Rajasekaran, S.D. Using modeling and simulation to evaluate enterprises’ risk exposure to social networks. Computer, 44, 1 (2010), 66–73.
  • Steinbauer, R.; Renn, R.W.; Taylor, R.R.; and Njoroge, P.K. Ethical leadership and followers’ moral judgment: The role of followers’ perceived accountability and self-leadership. Journal of Business Ethics, 120, 3 (2014), 381–392.
  • Sugarman, D.B., and Willoughby, T. Technology and violence: Conceptual issues raised by the rapidly changing social environment. Psychology of Violence, 3, 1 (2013), 1–8.
  • Suleiman, J., and Watson, R.T. Social loafing in technology-supported teams. Computer Supported Cooperative Work, 17, 4 (2008), 291–309.
  • Swearer, S.M.; Espelage, D.L.; Vaillancourt, T.; and Hymel, S. What can be done about school bullying? Linking research to educational practice. Educational Researcher, 39, 1 (2010), 38–47.
  • Tadmor, C., and Tetlock, P.E. Accountability. In D. Matsumoto (ed.), The Cambridge Dictionary of Psychology. Cambridge, UK: Cambridge University Press, 2009, p. 8.
  • Teo, T.S., and Men, B. Knowledge portals in Chinese consulting firms: A task–technology fit perspective. European Journal of Information Systems, 17, 6 (2008), 557–574.
  • Titah, R., and Barki, H. Nonlinearities between attitude and subjective norms in information technology acceptance: A negative synergy? MIS Quarterly, 33, 4 (2009), 827–844.
  • Tittle, C.R. Control Balance: Toward a General Theory of Deviance. Boulder, CO: Westview Press, 1995.
  • Tittle, C.R. Thoughts stimulated by Braithwaite’s analysis of control balance theory. Theoretical Criminology, 1, 1 (1997), 99–110.
  • Tittle, C.R. Continuing the discussion of control balance. Theoretical Criminology, 3, 3 (1999), 344–352.
  • Tittle, C.R. Refining control balance theory. Theoretical Criminology, 8, 4 (2004), 395–428.
  • Tokunaga, R.S. Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26, 3 (2010), 277–287.
  • Trinkle, B.S.; Crossler, R.E.; and Warkentin, M. I’m game, are you? Reducing real-world security threats by managing employee activity in online social networks. Journal of Information Systems, 28, 2 (2014), 307–327.
  • Utz, S., and Beukeboom, C.J. The role of social network sites in romantic relationships: Effects on jealousy and relationship happiness. Journal of Computer-Mediated Communication, 16, 4 (2011), 511–527.
  • Utz, S.; Tanis, M.; and Vermeulen, I. It is all about being popular: The effects of need for popularity on social network site use. Cyberpsychology, Behavior, and Social Networking, 15, 1 (2012), 37–42.
  • Vance, A.; Lowry, P.B.; and Eggett, D. Using accountability to reduce access policy violations in information systems. Journal of Management Information Systems, 29, 4 (2013), 263–290.
  • Vance, A.; Lowry, P.B.; and Eggett, D.L. A new approach to the problem of access policy violations: Increasing perceptions of accountability through the user interface. MIS Quarterly, 39, 2 (2015), 345–366.
  • Venkatesh, V., and Goyal, S. Expectation disconfirmation and technology adoption: Polynomial modeling and response surface analysis. MIS Quarterly, 34, 2 (2010), 281–303.
  • Venkatraman, N. The concept of fit in strategy research: Toward verbal and statistical correspondence. Academy of Management Review, 14, 3 (1989), 423–444.
  • Walker, J.; Craven, R.G.; and Tokunaga, R.S. Introduction. In S. Bauman, D. Cross, and J. Walker (eds.), Principles of Cyberbullying Research: Definitions, Measures, and Methodology. New York, NY: Routledge, 2013, pp. 32–34.
  • Wallander, L. 25 years of factorial surveys in sociology: A review. Social Science Research, 38, 3 (2009), 505–520.
  • Walther, J.B., and Bunz, U. The rules of virtual groups: Trust, liking, and performance in computer‐mediated communication. Journal of Communication, 55, 4 (2005), 828–846.
  • Wang, E.T., and Tai, J.C. Factors affecting information systems planning effectiveness: organizational contexts and planning systems dimensions. Information and Management, 40, 4 (2003), 287–303.
  • Wang, N.; Xue, Y.; Liang, H.; and Ge, S. The road to business-IT alignment: A case study of two Chinese companies. Communications of the Association for Information Systems, 28, 1 (2011), 415–436.
  • Williams, K.S. Using Tittle’s control balance theory to understand computer crime and deviance. International Review of Law Computers and Technology, 22, 1–2 (2008), 145–155.
  • Wood, P.B., and Dunaway, R.G. An application of control balance theory to incarcerated sex offenders. Journal of the Oklahoma Criminal Justice Research Consortium, 4, 1 (1997), 1–12.
  • Wood, P.B.; Wilson, J.A.; and Thorne, D.P. Offending patterns, control balance, and affective rewards among convicted sex offenders. Deviant Behavior, 36, 5 (2015), 368–387.
  • Yarbrough, L.; Morgan, N.A.; and Vorhies, D.W. The impact of product market strategy-organizational culture fit on business performance. Journal of the Academy of Marketing Science, 39, 4 (2011), 555–573.
  • Yu, K.; Cadeaux, J.; and Song, H. Alternative forms of fit in distribution flexibility strategies. International Journal of Operations and Production Management, 32, 10 (2012), 1199–1227.
  • Zhou, L.; Burgoon, J.K.; Twitchell, D.P.; Qin, T.; and Nunamaker Jr., J.F. A comparison of classification methods for predicting deception in computer-mediated communication. Journal of Management Information Systems, 20, 4 (2004), 139–166.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.