3,627
Views
36
CrossRef citations to date
0
Altmetric

References

  • Addas, S.; and Pinsonneault, A. E-mail interruptions and individual performance: Is there a silver lining? MIS Quarterly, 42, 2 (2018), 381–405.
  • Ashforth, B.E.; Schinoff, B.S.; and Brickson, S.L. “My company is friendly,” “mine’s a rebel”: Anthropomorphism and shifting organizational identity from “what” to “who”. Academy of Management Review, (2018). https://journals.aom.org/doi/10.5465/amr.2016.0496.
  • Banerjee, D.; Cronan, T.P.; and Jones, T.W. Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22, 1 (1998), 31–60.
  • Barlow, J.; Warkentin, M.; Ormond, D.; and Dennis, A.R. Don’t even think about it! The effects of anti-neutralization, informational, and normative communication on information security compliance. Journal of the Association for Information Systems, 19, 8 (2018), Article 3.
  • Bennett, R.J.; Aquino, K.; Reed II, A.; and Thau, S. The normative nature of employee deviance and the impact of moral identity. In, Fox, S., and Spector, P.E., (eds.), Counterproductive work behavior: Investigation of actors and targets, Washington D.C.: APA Publishing, 2005, pp. 107–125.
  • Bennett, R.J.; and Robinson, S.L. Development of a measure of workplace deviance. Journal of Applied Psychology, 85, 3 (2000), 349–360.
  • Bennett, R.J.; and Robinson, S.L. The past, present, and future of workplace deviance research. In, Greenburg, J., (eds.), Organizational Behavior: The State of the Science, Mahwah, NJ: Lawrence Erlbaum, 2003, pp. 247–282.
  • Bhattacherjee, A.; Davis, C.J.; Connolly, A.J.; and Hikmet, N. User response to mandatory IT use: A coping theory perspective. European Journal of Information Systems, (2018). https://link.springer.com/article/10.1057/s41303-017-0047-0.
  • Blau, G.; Yang, Y.; and Ward-Cook, K. Testing a measure of cyberloafing. Journal of Allied Health, 35, 1 (2006), 9–17.
  • Chatman, J.A. Matching people and organizations: Selection and socialization in public accounting firms. Administrative Science Quarterly, 36, 3 (1991), 459–484.
  • Chatterjee, S.; Sarker, S.; and Valacich, J.S. The behavioral roots of information systems security: Exploring key factors related to unethical IT use. Journal of Management Information Systems, 31, 4 (2015), 49–87.
  • Connolly, T.; Jessup, L.M.; and Valacich, J.S. Effects of anonymity and evaluative tone on idea generation in computer-mediated groups. Management Science, 36, 6 (1990), 689–703.
  • Coxon, A.P.M.; and Davies, P. The User’s Guide to Multidimensional Scaling: With Special Reference to the MDS (X) Library of Computer Programs. London: Heinemann Educational Books, 1982.
  • D’Cruz, P.; Noronha, E.; and Lutgen-Sandvik, P. Power, subjectivity and context in workplace bullying, emotional abuse and harassment: Insights from postpositivism. Qualitative Research in Organizations and Management: An International Journal, 13, 1 (2018), 2–9.
  • Dalal, R.S. A meta-analysis of the relationship between organizational citizenship behavior and counterproductive work behavior. Journal of Applied Psychology, 90, 6 (2005), 1241–1255.
  • Dhillon, G.; and Moores, S. Computer crimes: Theorizing about the enemy within. Computers & Security, 20, 8 (2001), 715–723.
  • Doty, D.H.; and Glick, W.H. Typologies as a unique form of theory building: Toward improved understanding and modeling. The Academy of Management Review, 19, 2 (1994), 230–251.
  • Earl, M. Knowledge management strategies: Toward a taxonomy. Journal of Management Information Systems, 18, 1 (2001), 215–233.
  • Ellis, B.; and Calantone, R. Understanding competitive advantage through a strategic retail typology. Journal of Applied Business Research, 10, 2 (1994), 23–32.
  • Fiedler, K.D.; Grover, V.; and Teng, J.T.C. An empirically derived taxonomy of information technology structure and its relationship to organizational structure. Journal of Management Information Systems, 13, 1 (1996), 9–34.
  • Gregor, S. The nature of theory in information systems. MIS Quarterly, 30, 3 (2006), 611–642.
  • Guo, K.H.; Yuan, Y.; Archer, N.P.; and Connelly, C.E. Understanding nonmalicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems, 28, 2 (2011), 203–236.
  • Hagelskamp, C.; Hughes, D.; Yoshikawa, H.; and Chaudry, A. Negotiating motherhood and work: A typology of role identity associations among low-income, urban women. Community, Work & Family, 14, 3 (2011), 335–366.
  • Hanisch, K.A.; and Hulin, C.L. General attitudes and organizational withdrawal: An evaluation of a causal model. Journal of Vocational Behavior, 39, 1 (1991), 110–128.
  • Hanisch, K.A.; Hulin, C.L.; and Roznowski, M. The importance of individuals’ repertoires of behaviors: The scientific appropriateness of studying multiple behaviors and general attitudes. Journal of Organizational Behavior, 19, 5 (1998), 463–480.
  • Harrington, S.J. The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20, 3 (1996), 257–278.
  • He, J.; and Fallah, M.H. The typology of technology clusters and its evolution — evidence from the hi-tech industries. Technological Forecasting & Social Change, 78, 6 (2011), 945–952.
  • Huma, Z.-E.; Hussain, S.; Thurasamy, R.; and Malik, M.I. Determinants of cyberloafing: A comparative study of a public and private sector organization. Internet Research, 27, 1 (2017), 97–117.
  • Jarrett, H.M.; Bailie, M.W.; and Hagen, E. Prosecuting Computer Crimes. Office of Legal Education Executive Office for United States Attorneys, 2010.
  • Jensen, M.L.; Dinger, M.; Wright, R.T.; and Thatcher, J.B. Training to mitigate phishing attacks using mindfulness techniques. Journal of Management Information Systems, 34, 2 (2017), 597–626.
  • Katz, D.; and Kahn, R.L. The Social Psychology of Organizations. New York: Wiley, 1966.
  • Khansa, L.; Kuem, J.; Siponen, M.; and Kim, S.S. To cyberloaf or not to cyberloaf: The impact of the announcement of formal organizational controls. Journal of Management Information Systems, 34, 1 (2017), 141–176.
  • Kruskal, J.B.; and Wish, M. Multidimensional Scaling. Beverly Hills, London: Sage Publications, 1978.
  • Larsen, K.R.T. A taxonomy of antecedents of information systems success: Variable analysis studies. Journal of Management Information Systems, 20, 2 (2003), 169–246.
  • Liang, N.; Biros, D.P.; and Luse, A. An empirical validation of malicious insider characteristics. Journal of Management Information Systems, 33, 2 (2016), 361–392.
  • Lim, V.K.G. The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23, 5 (2002), 675–694.
  • Loch, K.D.; Carr, H.H.; and Warkentin, M.E. Threats to information systems: Today’s reality, yesterday’s understanding. MIS Quarterly, 16, 2 (1992), 173–186.
  • Lovelace. Cost of data breaches hits $4 million on average: IBM. Retreived from http://www.cnbc.com/2016/06/14/cost-of-data-breaches-hits-4-million-on-average-ibm.html. Accessed on 1 May, 2017.
  • Lowry, P.B.; Willison, R.; and Paternoster, R. A tale of two deterrents: Considering the role of absolute and restrictive deterrence to inspire new directions in behavioral and organizational security research. Journal of the Association for Information Systems, ( forthcoming).
  • Mandell, M.; and Steelman, T. Understanding what can be accomplished through interorganizational innovations the importance of typologies, context and management strategies. Public Management Review, 5, 2 (2003), 197–224.
  • Markus, M. Finding a happy medium: Explaining the negative effects of electronic communication on social life at work. ACM Transactions on Information Systems (TOIS), 12, 2 (1994), 119–149.
  • Mawritz, M.B.; Greenbaum, R.L.; Butts, M.M.; and Graham, K.A. I just can’t control myself: A self-regulation perspective on the abuse of deviant employees. Academy of Management Journal, 60, 4 (2017), 1482–1503.
  • Mayr, E. Principles of Systematic Zoology. New York: McGraw-Hill, 1969.
  • McKelvey, B. Organizational systematics: Taxonomic lessons from biology. Management Science, 24, 13 (1978), 1428–1440.
  • McKelvey, B. Organizational Systematics: Taxonomy, Evolution, Classification. Berkeley, CA: University of California Press, 1982.
  • McKinney, E.H.; and Yoos, C.J. Information about information: A taxonomy of views. MIS Quarterly, 34, 2 (2010), 329–344.
  • McKinney, J.C. Typification, typologies, and sociological theory. Social Forces, 48, 1 (1969), 1–12.
  • Miller, J.G.; and Roth, A.V. A taxonomy of manufacturing strategies. Management Science, 40, 3 (1994), 285–304.
  • Moody, G.D.; Siponen, M.; and Pahnila, S. Toward a unified model of information security policy compliance. MIS Quarterly, 42, 1 (2018), 285–311.
  • Moores, T.T., and Chang, J.C.-J. Ethical decision making in software piracy: Initial development and test of a four-component model. MIS Quarterly, 30, 1 (2006), 167–180.
  • Morgan, D.L. Focus groups as qualitative research. Thousand Oaks, Calif: Sage Publications, 1997.
  • O’Neill, T.A.; Hambley, L.A.; and Bercovich, A. Prediction of cyberslacking when employees are working away from the office. Computers in Human Behavior, 34(2014), 291–298.
  • Patrick, E. Employee Internet management: Now an HR issue. Retreived from https://www.shrm.org/hr-today/news/hr-magazine/pages/cms_006514.aspx. (accessed December 20, 2016).
  • Peace, A.G.; Galletta, D.F.; and James, Y.L.T. Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20, 1 (2003), 153–177.
  • Pearce, P.L.; and Amato, P.R. A taxonomy of helping: A multidimensional scaling analysis. Social Psychology Quarterly, 43, 4 (1980), 363–371.
  • Pillemer, J.; and Rothbard, N.P. Friends without benefits: Understanding the dark sides of workplace friendship. Academy of Management Review, 43, 4 (2018), 635–660.
  • Piotrowski, C. From workplace bullying to cyberbullying: The enigma of e-harassment in modern organizations. Organization Development Journal, 30, 4 (2012), 44–53.
  • PonemonInstitute. 2016 Cost of Data Breach Study: Canada. Traverse City, Michigan: Ponemon Institute LLC, 2016.
  • Posey, C.; Roberts, T.; Lowry, P.; Bennett, B.; and Courtney, J. Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors. MIS Quarterly, 37, 4 (2013), 1189–1210.
  • Prat, N.; Comyn-Wattiau, I.; and Akoka, J. A taxonomy of evaluation methods for information systems artifacts. Journal of Management Information Systems, 32, 3 (2015), 229–267.
  • Rest, J.R. The major components of morality. In W.M. Kurtines and J.L. Gewitz (eds.), Morality, Moral Behavior, and Moral Development, New York: Wiley, 1984, pp. 24–38.
  • Robert Jr, L.P.; and Sykes, T.A. Extending the concept of control beliefs: Integrating the role of advice networks. Information Systems Research, 28, 1 (2016), 84–96.
  • Robinson, S.L.; and Bennett, R.J. A typology of deviant workplace behaviors: A multidimensional scaling study. The Academy of Management Journal, 38, 2 (1995), 555–572.
  • Robinson, S.L.; and Bennett, R.J. Workplace deviance: It’s definition, it’s manifestations, and it’s causes. In R.J. Lewicki, B.H. Sheppard, and R.J. Bies (eds.), Research on Negotiation in Organizations, Greenwich, CT: JAI Press, 1997, pp. 3–27.
  • Sarker, S.; Ahuja, M.; and Sarker, S. Work–life conflict of globally distributed software development personnel: An empirical investigation using border theory. Information Systems Research, 29, 1 (2018), 103–126.
  • Shamsudin, F.M.; Subramaniam, C.; and Alshuaibi, A.S. The effect of HR practices, leadership style on cyberdeviance: The mediating role of organizational commitment. Journal of Marketing & Management, 3, 1 (2012), 22–48.
  • Sojer, M.; Alexy, O.; Kleinknecht, S.; and Henkel, J. Understanding the drivers of unethical programming behavior: The inappropriate reuse of internet-accessible code. Journal of Management Information Systems, 31, 3 (2014), 287–325.
  • Son, J.-Y.; and Kim, S.S. Internet users’ information privacy-protective responses: A taxonomy and a nomological model. MIS Quarterly, 32, 3 (2008), 503–529.
  • Sproull, L.; and Kiesler, S. Reducing social context cues: Electronic mail in organizational communication. Management Science, 32, 11 (1986), 1492–1512.
  • Straub, D.W.; Carlson, P.; and Jones, E. Deterring highly motivated computer abusers: A field experiment in computer security. In G.G. Gable and W.J. Caelli (eds.), IT security: The Need for International Cooperation, Amsterdam, Holland: North Holland Publishing, 1992, pp. 309–324.
  • Straub, D.W.; and Nance, W.D. Discovering and disciplining computer abuse in organizations: A field study. MIS Quarterly, 14, 1 (1990), 45–60.
  • Straub, D.W.; and Welke, R.J. Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22, 4 (1998), 441–469.
  • Sussman, S.W.; and Sproull, L. Straight talk: Delivering bad news through electronic communication. Information Systems Research, 10, 2 (1999), 150–166.
  • Sykes, T.A.; and Venkatesh, V. Explaining post-implementation employee system use and job performance: Impacts of the content and source of social network ties. MIS Quarterly, 4, 3 (2017), 917–936.
  • Tams, S.; Thatcher, J.B.; and Grover, V. Concentration, competence, confidence, and capture: An experimental study of age, interruption-based technostress, and task performance. Journal of the Association for Information Systems, 19, 9 (2018), Article 2.
  • Thompson, P. Some missing data patterns for multidimensional scaling. Applied Psychological Measurement, 77, 1 (1983), 45–55.
  • Thong, J.Y.; Venkatesh, V.; Xu, X.; Hong, S.J.; and Tam, K.Y. Consumer acceptance of personal information and communication technology services. IEEE Transactions on Engineering Management, 58, 4 (2011), 613–625.
  • U.S. Department of Justice. 2015 Internet Crime Report. Internet Crime Complaint Center, 2015. https://pdf.ic3.gov/2015_ic3report.pdf.
  • U.S. Department of Justice. Prosecuting computer crimes. Computer crime and intellectual property division. Washington DC: Office of the Legal Education, 2007.
  • Ulrich, D.; and McKelvey, B. General organizational classification: An empirical test using the united states and japanese electronics industries. Organization Science, 1, 1 (1990), 99–118.
  • van Dyne, L.; Cummings, L.L.; and McLean-Parks, J.M. Extra-role behaviors: In pursuit of construct and definitional clarity. In L.L. Cummings and B.M. Staw (eds.), Research in Organizational Behavior, Greenwich, CT: JAI Press, 1995, pp. 215–285.
  • Vance, A.; Lowry, P.B.; and Eggett, D. Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations. MIS Quarterly, 39, 2 (2015), 345–366.
  • Venkatesh, V.; Bala, H.; and Sambamurthy, V. Implementation of an information and communication technology in a developing country: A multimethod longitudinal study in a bank in India. Information Systems Research, 27, 3 (2016), 558–579.
  • Venkatesh, V.; Morris, M.G.; Davis, G.B.; and Davis, F.D. User acceptance of information technology: Toward a unified view. MIS Quarterly, 27, 3 (2003), 425–478.
  • Venkatesh, V.; Thong, J.Y.; and Xu, X. Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quarterly, 36, 1 (2012), 157–178.
  • Venkatesh, V.; Thong, J.Y.; and Xu, X. Unified theory of acceptance and use of technology: A synthesis and the road ahead. Journal of the Association for Information Systems, 17, 5 (2016), 328–376.
  • Vitak, J.; Crouse, J.; and LaRose, R. Personal Internet use at work: Understanding cyberslacking. Computers in Human Behavior, 27, 5 (2011), 1751-1759.
  • Weatherbee, T., and Kelloway, E.K. A case of cyberdeviance: Cyberaggression in the workplace. In E.K. Kelloway, J. Barling, and J.H. Hurrell (eds.), Handbook of Workplace Violence, Newbury Park, CA: Sage Publications, 2006, pp. 445–487.
  • Weatherbee, T.G. Counterproductive use of technology at work: Information & communications technologies and cyberdeviancy. Human Resource Management Review, 20, 1 (2010), 35–44.
  • Whitty, M.T.; and Carr, A.N. New rules in the workplace: Applying object-relations theory to explain problem internet and email behaviour in the workplace. Computers in Human Behavior, 22, 2 (2006), 235–250.
  • Willison, R.; and Warkentin, M. Beyond deterrence: An expanded view of employee computer abuse. MIS Quarterly, 37, 1 (2013), 1–20.
  • Xu, X.; Thong, J. Y.; and Venkatesh, V. Effects of ICT service innovation and complementary strategies on brand equity and customer loyalty in a consumer technology market. Information Systems Research, 25, 4 (2014), 710–729.
  • Xu, X.; Venkatesh, V.; Tam, K.Y.; and Hong, S.J. Model of migration and use of platforms: Role of hierarchy, current generation, and complementarities in consumer settings. Management Science, 56, 8 (2010), 1304–1323.
  • Yam, K.C.; Klotz, A.C.; He, W.; and Reynolds, S.J. From good soldiers to psychologically entitled: Examining when and why citizenship behavior leads to deviance. Academy of Management Journal, 60, 1 (2017), 373–396.
  • Yang, J.; and Diefendorff, J.M. The relations of daily counterproductive workplace behavior with emotions, situational antecedents, and personality moderators: A diary study in hong kong. Personnel Psychology, 62, 2 (2009), 259–295.
  • Zhang, X.; and Venkatesh, V. A nomological network of knowledge management system use: Antecedents and consequences. MIS Quarterly, 41, 4 (2017), 1275–1306.
  • Zhao, X.; Xue, L.; and Whinston, A.B. Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements. Journal of Management Information Systems, 30, 1 (2013), 123–152.