References

  • Aboujaoude, E.; Savage, M.W.; Starcevic, V.; and Salame, W.O. Cyberbullying: Review of an old problem gone viral. Journal of Adolescent Health, 57, 1 (2015), 10–18.
  • Ahmed, E.; Harris, N.; and Braithwaite, V. Forgiveness, reconciliation, and shame: Three key variables in reducing school bullying. Journal of Social Issues, 62, 2 (2006), 347–370.
  • Akers, R.L. Rational choice, deterrence, and social learning theory in criminology: The path not taken. The Journal of Criminal Law and Criminology, 81, 3 (1990), 653–676.
  • Akers, R.L. Self-control as a general theory of crime. Journal of Quantitative Criminology, 7, 2 (1991), 201–211.
  • Akers, R.L. Social learning theory. In R. Paternoster, and R. Bachman (eds.), Explaining Criminals and Crime: Essays in Contemporary Criminological Theory. Los Angeles, CA: Roxbury, 2001, pp. 192–210.
  • Akers, R.L.; and Jennings, W.G. The social learning theory of crime and deviance. In M.D. Krohn, A.J. Lizotte, and G.P. Hall (eds.), Handbook on Crime and Deviance. New York, NY: Springer, 2009, pp. 103–120.
  • Akers, R.L.; Krohn, M.D.; Lanza-Kaduce, L.; and Radosevich, M. Social learning and deviant behavior: A specific test of a general theory. American Sociological Review, 44, 4 (1979), 636–655.
  • Akers, R.L.; and Lee, G. A longitudinal test of social learning theory: Adolescent smoking. Journal of Drug Issues, 26, 2 (1996), 317–343.
  • Arbore, A.; Soscia, I.; and Bagozzi, R.P. The role of signaling identity in the adoption of personal technologies. Journal of the Association for Information Systems, 15, 2 (2014), 86–110.
  • Aricak, T.; Siyahhan, S.; Uzunhasanoglu, A.; Saribeyoglu, S.; Ciplak, S.; Yilmaz, N.; and Memmedov, C. Cyberbullying among Turkish adolescents. CyberPsychology & Behavior, 11, 3 (2008), 253–261.
  • Awad, N.F.; and Ragowsky, A. Establishing trust in electronic commerce through online word of mouth: An examination across genders. Journal of Management Information Systems, 24, 4 (2008), 101–121.
  • Bandura, A. Social Learning Theory. Englewood Cliffs, NJ: Prentice-Hall, 1977.
  • Baron, S.W. Self-control, social consequences, and criminal behavior: Street youth and the general theory of crime. Journal of Research in Crime and Delinquency, 40, 4 (2003), 403–425.
  • Bauman, S.; and Yoon, J. This issue: Theories of bullying and cyberbullying. Theory Into Practice, 53, 4 (2014), 253–256.
  • Baumeister, R.F.; Masicampo, E.; and Vohs, K.D. Do conscious thoughts cause behavior? Annual Review of Psychology, 62, (2011), 331–361.
  • Bollen, K.A. Structural equations with latent variables. New York: John Wiley, 1989.
  • Boss, S.R.; Galletta, D.F.; Lowry, P.B.; Moody, G.D.; and Polak, P. What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39, 4 (2015), 837–864.
  • Bossler, A.M.; and Burruss, G.W. The general theory of crime and computer hacking: Low self-control hackers. In T.J. Holt, and B.H. Schell (eds.), Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. New York, NY: Information Science Reference, 2011, pp. 38–67.
  • Bossler, A.M.; and Holt, T.J. The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38, 3 (2010), 227–236.
  • Bowler, L.; Knobel, C.; and Mattern, E. From cyberbullying to well‐being: A narrative‐based participatory approach to values‐oriented design for social media. Journal of the Association for Information Science and Technology, 66, 6 (2015), 1274–1293.
  • Braga, A.A.; and Clarke, R.V. Explaining high-risk concentrations of crime in the city: Social disorganization, crime opportunities, and important next steps. Journal of Research in Crime and Delinquency, 51, 4 (2014), 480–498.
  • Brink, A. Affective experiences with sex and sexual satisfaction among Dutch adolescents: The consequences of online and offline communication about sexuality with friends. In Faculty of Social and Behavioural Sciences, Master: Utrecht University, 2014.
  • Burgess, R.L.; and Akers, R.L. A differential association-reinforcement theory of criminal behavior. Social Problems, 14, 2 (1966), 128–147.
  • Byrne, B.M. Structural equation modeling with EQS: Basic concepts, applications, and programming. Mahwah, NJ: Lawrence Erlbaum, 2006.
  • Carlo, G.; Crockett, L.J.; Wolff, J.M.; and Beal, S.J. The role of emotional reactivity, self-regulation, and puberty in adolescents’ prosocial behaviors. Social Development, 21, 4 (2012), 667–685.
  • Chatterjee, S.; Sarker, S.; and Valacich, J.S. The behavioral roots of information systems security: Exploring key factors related to unethical IT use. Journal of Management Information Systems, 31, 4 (2015), 49–87.
  • Cialdini, R.B. Influence: Science and Practice. Boston: MA: Pearson Education, Inc., 2009.
  • Cockbain, E.; and Wortley, R. Everyday atrocities: does internal (domestic) sex trafficking of British children satisfy the expectations of opportunity theories of crime? Crime Science, 4, 35 (2015), 1–12.
  • Corley, KG and Gioia, DA. Building theory about theory building: What constitutes a theoretical contribution? Academy of Management Review, 36, 1 (2011), 12–32.
  • Cramer, M.; and Hayes, G. Acceptable use of technology in schools: Risks, policies, and promises. IEEE Pervasive Computing, 9, 3 (2010), 37–44.
  • D’Arcy, J.; and Herath, T. A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20, 6 (2011), 643–658.
  • D’Arcy, J.; Hovav, A.; and Galletta, D. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20, 1 (2009), 79–98.
  • Dempsey, A.G.; Sulkowski, M.L.; Dempsey, J.; and Storch, E.A. Has cyber technology produced a new group of peer aggressors? CyberPsychology, Behavior & Social Networking, 14, 5 (2011), 297–302.
  • Dumas, T.L.; Phillips, K.W.; and Rothbard, N.P. Getting closer at the company party: Integration experiences, racial dissimilarity, and workplace relationships. Organization Science, 24, 5 (2013), 1377–1401.
  • Espelage, D.L.; Rao, M.A.; and Craven, R.G. Theories of cyberbullying. In S. Bauman (ed.), Principles of Cyberbullying Research: Definitions, Measures, and Methodology. New York, NY: Routledge, 2013, pp. 78–97.
  • Evans, T.D.; Cullen, F.T.; Burton, V.S.; Dunaway, R.G.; and Benson, M.L. The social consequences of self‐control: Testing the general theory of crime. Criminology, 35, 3 (1997), 475–504.
  • Ferris, D.L.; Brown, D.J.; Lian, H.; and Keeping, L.M. When does self-esteem relate to deviant behavior? The role of contingencies of self-worth. Journal of Applied Psychology, 94, 5 (2009), 1345–1353.
  • Freeman, M.A.; and Capper, J.M. Exploiting the web for education: An anonymous asynchronous role simulation. Australasian Journal of Educational Technology, 15, 1 (1999), 95–116.
  • Gottfredson, M.R.; and Hirschi, T. A General Theory of Crime. Stanford, CA: Stanford University Press, 1990.
  • Grasmick, H.G.; Tittle, C.R.; Bursik, R.J.; and Arneklev, B.J. Testing the core empirical implications of Gottfredson and Hirschi’s general theory of crime. Journal of Research in Crime and Delinquency, 30, 1 (1993), 5–29.
  • Gregory, E.E.; and Grace, A.A. Psychodemographic factors predicting Internet fraud tendency among youths in Southwestern, Nigeria. Journal of Educational and Social Research, 5, 2 (2015), 159–164.
  • Gruber, V.; and Schlegelmilch, B. How techniques of neutralization legitimize norm- and attitude-inconsistent consumer behavior. Journal of Business Ethics, 121, 1 (2013), 29–45.
  • Hair, J.F.; Tatham, R.L.; Anderson, R.E.; and Black, W. Multivariate data analysis. 6: Pearson Prentice Hall Upper Saddle River, NJ, 2006.
  • Harris, L.C.; and Dumas, A. Online consumer misbehaviour: An application of neutralization theory. Marketing Theory, 9, 4 (2009), 379–402.
  • Hazelwood, S.D.; and Koon-Magnin, S. Cyber stalking and cyber harassment legislation in the United States: A qualitative analysis. International Journal of Cyber Criminology, 7, 2 (2013), 155–168.
  • Henderson, A.D.; and Fredrickson, J.W. Top management team coordination needs and the CEO pay gap: A competitive test of economic and behavioral views. Academy of Management Journal, 44, 1 (2001), 96–117.
  • Higgins, G.E. Gender differences in software piracy: The mediating roles of self-control theory and social learning theory. Journal of Economic Crime Management, 4, 1 (2006), 1–30.
  • Higgins, G.E.; Fell, B.D.; and Wilson, A.L. Digital piracy: Assessing the contributions of an integrated self‐control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19, 1 (2006), 3–22.
  • Higgins, G.E.; Fell, B.D.; and Wilson, A.L. Low self-control and social learning in understanding students’ intentions to pirate movies in the United States. Social Science Computer Review, 25, 3 (2007), 339–357.
  • Higgins, G.E.; and Makin, D.A. Does social learning theory condition the effects of low self-control on college students’ software piracy. Journal of Economic Crime Management, 2, 2 (2004), 1–22.
  • Higgins, G.E.; and Wilson, A.L. Low self-control, moral beliefs, and social learning theory in university students’ intentions to pirate software. Security Journal, 19, 2 (2006), 75–92.
  • Higgins, G.E.; Wolfe, S.E.; and Marcum, C.D. Music piracy and neutralization: A preliminary trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, 2, 2 (2008), 324–336.
  • Holtfreter, K.; Reisig, M.D.; and Pratt, T.C. Low self-control, routine activities, and fraud victimization. Criminology, 46, 1 (2008), 189–220.
  • Hong, W.; Chan, F.K.; Thong, J.Y.; Chasalow, L.C.; and Dhillon, G. A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25, 1 (2013), 111–136.
  • Hu, L.T.; and Bentler, P.M. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6, 1 (1999), 1–55.
  • Hu, Q.; Xu, Z.; Dinev, T.; and Ling, H. Does deterrence work in reducing information security policy abuse by employees? Communications of the ACM, 54, 6 (2011), 54–60.
  • Huang, Y.-y.; and Chou, C. An analysis of multiple factors of cyberbullying among junior high school students in Taiwan. Computers in Human Behavior, 26, 6 (2010), 1581–1590.
  • Jennings, W.G.; Higgins, G.E.; Akers, R.L.; Khey, D.N.; and Dobrow, J. Examining the Influence of delinquent peer association on the stability of self-control in late childhood and early adolescence: Toward an integrated theoretical model. Deviant Behavior, 34, 5 (2013), 407–422.
  • Jennings, W.G.; Park, M.; Tomsich, E.A.; Gover, A.R.; and Akers, R.L. Assessing the overlap in dating violence perpetration and victimization among South Korean college students: The influence of social learning and self-control. American Journal of Criminal Justice, 36, 2 (2011), 188–206.
  • Johnson, R.E.; Rosen, C.C.; and Chang, C.-H. To aggregate or not to aggregate: Steps for developing and validating higher-order multidimensional constructs. Journal of Business and Psychology, 26, 3 (2011), 241–248.
  • Karimi, J.; Somers, T.M.; and Bhattacherjee, A. The impact of ERP implementation on business process outcomes: A factor-based study. Journal of Management Information Systems, 24, 1 (2007), 101–134.
  • Kline, R.B. Principles and practice of structural equation modeling. New York: Guilford Press, 2005.
  • Lee, C.; and Bobko, P. Self-efficacy beliefs: Comparison of five measures. Journal of Applied Psychology, 79, 3 (1994), 364–369.
  • Leung, K.; Friedman, R.; and Chen, C.C. Special issue on leveraging phenomenon-based research in China for theory advancement. Organizational Behavior and Human Decision Processes, 122, 2 (2013), 305–306.
  • Li, Q. Cyberbullying in schools: A research of gender differences. School Psychology International, 27, 2 (2006), 157–170.
  • Li, Q. Bullying in the new playground: Research into cyberbullying and cyber victimisation. Australasian Journal of Educational Technology, 23, 4 (2007), 435–454.
  • Li, Q. New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior, 23, 4 (2007), 1777-1791.
  • Liang, H.; and Xue, Y. Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33, 1 (2009), 71–90.
  • Lowry, P.B.; Cao, J.; and Everard, A. Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems, 27, 4 (2011), 163–200.
  • Lowry, P.B.; D’Arcy, J.; Hammer, B.; and Moody, G.D. Cargo Cult’ science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. Journal of Strategic Information Systems, 25, 3 (2016), 232–240.
  • Lowry, P.B.; and Gaskin, J. Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: When to choose it and how to use it. IEEE Transactions on Professional Communication, 57, 2 (2014), 123–146.
  • Lowry, P.B.; Moody, G.D.; and Chatterjee, S. Using IT design to prevent cyberbullying. Journal of Management Information Systems, 34, 3 (2017), 863–901.
  • Lowry, P.B.; Moody, G.D.; Galletta, D.F.; and Vance, A. The drivers in the use of online whistle-blowing reporting systems. Journal of Management Information Systems, 30, 1 (2013), 153–189.
  • Lowry, P.B.; Zhang, J.; Wang, C.L.; and Siponen, M. Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning (SSSL) model. Information Systems Research, 27, 4 (2016), 962–986.
  • Magen, E.; and Gross, J.J. Getting our act together: Toward a general model of self-control. In R. Hassin, K. Ochsner, and Y. Trope (eds.), Self Control in Society, Mind and Brain. Oxford, UK: Oxford University Press, 2010, pp. 335–353.
  • Malhotra, M.K.; and Grover, V. An assessment of survey research in POM: From constructs to theory. Journal of Operations Management, 16, 4 (1998), 407–425.
  • Malin, J.; and Fowers, B.J. Adolescent self-control and music and movie piracy. Computers in Human Behavior, 25, 3 (2009), 718–722.
  • Marsh, H.W.; and Hocevar, D. Application of confirmatory factor analysis to the study of self-concept: First- and higher order factor models and their invariance across groups. Psychological Bulletin, 97, 3 (1985), 562–582.
  • Mears, D.P.; Cochran, J.C.; and Beaver, K.M. Self-control theory and nonlinear effects on offending. Journal of Quantitative Criminology, 29, 3 (2013), 447–476.
  • Menesini, E.; Nocentini, A.; Palladino, B.E.; Frisén, A.; Berne, S.; Ortega-Ruiz, R.; Calmaestra, J.; Scheithauer, H.; Schultze-Krumbholz, A.; and Luik, P. Cyberbullying definition among adolescents: A comparison across six European countries. Cyberpsychology, Behavior, and Social Networking, 15, 9 (2012), 455–463.
  • Montaldo, C. Cyberstalking and Internet Harassment - Then and Now. 2018. ThoughtCo: ThoughtCo, 2017.
  • Moody, G.D.; Lowry, P.B.; and Galletta, D. It’s complicated: Explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis. European Journal of Information Systems, 26, 4 (2017), 379–413.
  • Murray, K.T.; and Kochanska, G. Effortful control: Factor structure and relation to externalizing and internalizing behaviors. Journal of Abnormal Child Psychology, 30, 5 (2002), 503–514.
  • Orlikowski, W.J.; and Iacono, C.S. Research commentary: Desperately seeking the “IT” in IT research—A call to theorizing the IT artifact. Information Systems Research, 12, 2 (2001), 121–134.
  • Oswick, C.; Fleming, P.; and Hanlon, G. From borrowing to blending: Rethinking the processes of organizational theory building. Academy of Management Review, 36, 2 (2011), 318–337.
  • Ouchi, W.G. A conceptual framework for the design of organizational control mechanisms. Readings in Accounting for Management Control. US: Springer, 1979, pp. 63–82.
  • Pauwels, L.; and Schils, N. Differential online exposure to extremist content and political violence: Testing the relative strength of social learning and competing perspectives. Terrorism and Political Violence, 28, 1 (2016), 1–29.
  • Pavlou, P.A.; and Gefen, D. Psychological contract violation in online marketplaces: Antecedents, consequences, and moderating role. Information Systems Research, 16, 4 (2005), 372–399.
  • Piccoli, G.; and Ives, B. Trust and the unintended effects of behavior control in virtual teams. MIS Quarterly, 27, 3 (2003), 365–395.
  • Polakowski, M. Linking self-and social control with deviance: Illuminating the structure underlying a general theory of crime and its relation to deviant activity. Journal of Quantitative Criminology, 10, 1 (1994), 41–78.
  • Posey, C.; Roberts, T.; Lowry, P.; Bennett, B.; and Courtney, J. Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors. MIS Quarterly, 37, 4 (2013), 1189–1210.
  • Postmes, T.; and Spears, R. Deindividuation and antinormative behavior: A meta-analysis. Psychological Bulletin, 123, 3 (1998), 238–259.
  • Postmes, T.; Spears, R.; and Lea, M. Breaching or building social boundaries? SIDE-effects of computer-mediated communication. Communication Research, 25, 6 (1998), 689–715.
  • Postmes, T.; Spears, R.; Sakhel, K.; and De Groot, D. Social influence in computer-mediated communication: The effects of anonymity on group behavior. Personality and Social Psychology Bulletin, 27, 10 (2001), 1243–1254.
  • Pratt, T.C.; and Cullen, F.T. The empirical status of Gottfredson and Hirschi’s general theory of crime: A meta‐analysis. Criminology, 38, 3 (2000), 931–964.
  • Pratt, T.C.; Cullen, F.T.; Sellers, C.S.; Thomas Winfree Jr, L.; Madensen, T.D.; Daigle, L.E.; Fearn, N.E.; and Gau, J.M. The empirical status of social learning theory: A meta‐analysis. Justice Quarterly, 27, 6 (2010), 765–802.
  • Putnam, D.E. Initiation and maintenance of online sexual compulsivity: Implications for assessment and treatment. CyberPsychology & Behavior, 3, 4 (2000), 553–563.
  • Pyrooz, D.C.; Decker, S.H.; and Moule Jr, R.K. Criminal and routine activities in online settings: Gangs, offenders, and the Internet. Justice Quarterly, 32, 3 (2015), 471–499.
  • Ransbotham, S.; Fichman, R.G.; Gopal, R.; and Gupta, A. Special section introduction—Ubiquitous IT and digital vulnerabilities. Information Systems Research, 27, 4 (2016), 834–847.
  • Ransbotham, S.; and Mitra, S. Choice and chance: A conceptual model of paths to information security compromise. Information Systems Research, 20, 1 (2009), 121–139.
  • Richardson, H.A.; Simmering, M.J.; and Sturman, M.C. A tale of three perspectives: Examining post hoc statistical techniques for detection and correction of common method variance. Organizational Research Methods, 12, 4 (2009), 762–800.
  • Rivard, S. Editor’s comments: The ions of theory construction. MIS Quarterly, 38, 2 (2014), iii–xiv.
  • Roach, M.; and Sauermann, H. Founder or joiner? The role of preferences and context in shaping different entrepreneurial interests. Management Science, 61, 9 (2015), 2160–2184.
  • Schreck, C.J. Criminal victimization and low self-control: An extension and test of a general theory of crime. Justice Quarterly, 16, 3 (1999), 633–654.
  • Schreck, C.J.; Stewart, E.A.; and Osgood, D.W. A reappraisal of the overlap of violent offenders and victims. Criminology, 46, 4 (2008), 871–906.
  • Schwartz, J.A.; Connolly, E.J.; Nedelec, J.L.; and Beaver, K.M. An investigation of genetic and environmental influences across the distribution of self-control. Criminal Justice and Behavior, 44, 9 (2017), 1163–1182.
  • Seibert, S.E.; Kraimer, M.L.; and Liden, R.C. A social capital theory of career success. Academy of Management Journal, 44, 2 (2001), 219–237.
  • Sharma, R.; Yetton, P.; and Crawford, J. Estimating the effect of common method variance: The method-method pair technique with an illustration from TAM research. MIS Quarterly, 33, 3 (2009), 473–490.
  • Siponen, M.; and Vance, A. Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34, 3 (2010), 487–502.
  • Spears, BA and Zeederberg, M. Emerging methodological strategies to address cyberbullying: Online social marketing and young people as co-researchers. In S. Bauman, D. Cross, and J. Walker (eds.), Principles of Cyberbullying Research, Definitions, Measures, and Methodology. New York, NY: Routledge, 2013, pp. 196–209.
  • Strawhun, J; Adams, N; and Huss, MT. The assessment of cyberstalking: An expanded examination including social networking, attachment, jealousy, and anger in relation to violence and abuse. Violence and Victims, 28, 4 (2013), 715–730.
  • Suler, J. The online disinhibition effect. CyberPsychology & Behavior, 7, 3 (2004), 321–326.
  • Sullivan, C.J.; and Loughran, T. Investigating the functional form of the self-control–delinquency relationship in a sample of serious young offenders. Journal of Quantitative Criminology, 30, 4 (2014), 709–730.
  • Tavani, HT. Defining the boundaries of computer crime: Piracy, break-ins, and sabotage in cyberspace. ACM SIGCAS Computers and Society, 30, 3 (2000), 3–9.
  • Tibbetts, SG and Gibson, CL. Individual propensities and rational decision-making: Recent findings and promising approaches. In A.R. Piquero, and S.G. Tibbetts (eds.), Rational Choice and Criminal Behavior Recent Research and Future Challenges. New York, NY: Routledge, 2002, pp. 3–24.
  • Titah, R.; and Barki, H. Nonlinearities between attitude and subjective norms in information technology acceptance: A negative synergy? MIS Quarterly, 33, 4 (2009), 827–844.
  • Triandis, H.C. Interpersonal Behavior. US: Brooks/Cole Publishing Company, 1977.
  • Turanovic, J.J.; and Pratt, T.C. “Can’t stop, won’t stop”: Self-control, risky lifestyles, and repeat victimization. Journal of Quantitative Criminology, 30, 1 (2014), 29–56.
  • Umphress, E.E.; and Bingham, J.B. When employees do bad things for good reasons: Examining unethical pro-organizational behaviors. Organization Science, 22, 3 (2011), 621–640.
  • Utz, S.; and Beukeboom, C.J. The role of social network sites in romantic relationships: Effects on jealousy and relationship happiness. Journal of Computer-Mediated Communication, 16, 4 (2011), 511–527.
  • Vakhitova, Z.I.; Reynald, D.M.; and Townsley, M. Toward the adaptation of routine activity and lifestyle exposure theories to account for cyber abuse victimization. Journal of Contemporary Criminal Justice, 32, 2 (2015), 169–188.
  • Vance, A.; Lowry, P.B.; and Eggett, D. Using accountability to reduce access policy violations in information systems. Journal of Management Information Systems, 29, 4 (2013), 263–290.
  • Vance, A.; Lowry, P.B.; and Eggett, D. Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations. MIS Quarterly, 39, 2 (2015), 345–366.
  • Walker, J.; Craven, R.G.; and Tokunaga, R.S. Introduction. In S. Bauman, D. Cross, and J. Walker (eds.), Principles of Cyberbullying Research: Definitions, Measures, and Methodology. New York, NY: Routledge, 2013, pp. 32–34.
  • Weber, R. Editor’s comments. MIS Quarterly, 27, 3 (2003), iii–xii.
  • Weber, R. Evaluating and developing theories in the information systems discipline. Journal of the Association for Information Systems, 13, 1 (2012), 1–30.
  • Webster, J.; and Watson, R.T. Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly, 26, 2 (2002), xiii–xxiii.
  • Whetten, D.A. What constitutes a theoretical contribution? Academy of Management Review, 14, 4 (1989), 490–495.
  • Wilcox, P.; Gialopsos, B.M.; and Land, K.C. Multilevel criminal opportunity. In F.T. Cullen, and P. Wilcox (eds.), The Oxford Handbook of Criminological Theory. Oxford, UK: Oxford University Press, 2013, pp. 579–606.
  • Williams, R.; Elliott, I.A.; and Beech, A.R. Identifying sexual grooming themes used by Internet sex offenders. Deviant Behavior, 34, 2 (2012), 135–152.
  • Wills, S.; and McDougall, A. Reusability of online role play: Learning objects or learning designs? In L. Lockyer, S. Bennett, S. Agostinho, and B. Harper (eds.), Handbook of Research on Learning Design and Learning Objects: Issues, Applications and Technologies. Hershey, PA: IGI Global, 2009, pp. 761–776.
  • Winfree, L.T.; Bäckström, T.V.; and Mays, G.L. Social learning theory, self-reported delinquency, and youth gangs: A new twist on a general theory of crime and delinquency. Youth & Society, 26, 2 (1994), 147–177.
  • Wood, R.; and Bandura, A. Social cognitive theory of organizational management. Academy of Management Review, 14, 3 (1989), 361–384.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.