References
- Anden, S. A., Kessler, S. R., Pindek, S., Kleinman, G., & Spector, P. E. (2019). Is cyberloafing more complex than we originally thought? Cyberloafing as a coping response to workplace aggression exposure. Computers in Human Behavior, 101, 124–130. https://doi.org/10.1016/j.chb.2019.07.013
- Bamberger, P. (2008). Beyond contextualization: Using context theories to narrow the micro-macro gap in management research. Academy of Management Journal, 51(5), 839–846. https://doi.org/10.5465/amj.2008.34789630
- Beard, K. W. (2005). Internet addiction: A review of current assessment techniques and potential assessment questions. Cyberpsychology & Behavior: The Impact Of The Internet, Multimedia And Virtual Reality On Behavior And Society, 8(1), 7–14. https://doi.org/10.1089/cpb.2005.8.7
- Beer, M., & Walton, A. E. (1987). Organization change and development. Annual Review of Psychology, 38(1), 339–367. https://doi.org/10.1146/annurev.ps.38.020187.002011
- Box, G., & Jenkins, G. (1976). Time series analysis: Forecasting and control. Holden-Day.
- Box, G., Jenkins, G., & Reinsel, G. (2008). Time series analysis: Forecasting and control. John Wiley & Sons.
- Bromley, P., & Powell, W. W. (2012). From smoke and mirrors to walking the talk: Decoupling in the contemporary world. Academy of Management Annals, 6(1), 483–530. https://doi.org/10.5465/19416520.2012.684462
- Busse, C., Kach, A. P., & Wagner, S. M. (2017). Boundary conditions: What they are, how to explore them, why we need them, and when to consider them. Organizational Research Methods, 20(4), 574–609. https://doi.org/10.1177/1094428116641191
- Byrne, P. A., Ma, T., Mann, R. E., & Elzohairy, Y. (2016). Evaluation of the general deterrence capacity of recently implemented (2009–2010) low and Zero BAC requirements for drivers in Ontario. Accident Analysis & Prevention, 88, 56–67. https://doi.org/10.1016/j.aap.2015.12.002
- Chen, C., & Liu, L.-M. (1993). Joint estimation of model parameters and outlier effects in time series. Journal of the American Statistical Association, 421, 284. https://doi.org/10.2307/2290724
- Chen, X., Wu, D., Chen, L., & Teng, J. K. L. (2018). Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables. Information & Management, 55(8), 1049–1060. https://doi.org/10.1016/j.im.2018.05.011
- Chen, Y., Ramamurthy, K., & Wen, K.-W. (2012). Organizations’ information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, 29(3), 157–188. https://doi.org/10.2753/MIS0742-1222290305
- Cheng, L., Li, W., Zhai, Q. G., & Smyth, R. (2014). Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory. Computers in Human Behavior, 38, 220–228. https://doi.org/10.1016/j.chb.2014.05.043
- Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39(Part B), 447–459. https://doi.org/10.1016/j.cose.2013.09.009
- Chiang, F. F. T., & Birtch, T. (2007). The transferability of management practices: Examining cross-national differences in reward preferences. Human Relations, 60(9), 1293–1330. https://doi.org/10.1177/0018726707082849
- Coker, B. L. S. (2013). Workplace internet leisure browsing. Human Performance, 26(2), 114–125. https://doi.org/10.1080/08959285.2013.765878
- Cooper, D. R., & Schindler, P. S. (2014). Business research methods. Irwin/McGraw-Hill.
- D’Arcy, J., & Devaraj, S. (2012). Employee misuse of information technology resources: testing a contemporary deterrence model. Decision Sciences, 43(6), 1091–1124. https://doi.org/10.1111/j.1540-5915.2012.00383.x
- D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79. https://doi.org/10.1287/isre.1070.0160
- Dalal, D. K., & Hakel, M. D. (2016). Experimental comparisons of methods for reducing deliberate distortions to self-report measures of sensitive constructs. Organizational Research Methods, 19(3), 475–505. https://doi.org/10.1177/1094428116639131
- Davison, R. M., & Martinsons, M. G. (2016). Context is king! Considering particularism in research design and reporting. Journal of Information Technology, 31(3), 241–249. https://doi.org/10.1057/jit.2015.19
- Dorfman, P. W., Howell, J. P., Hibino, S., Lee, J. K., Tate, U., & Bautista, A. (1997). Leadership in western and Asian countries: Commonalities and differences in effective leadership processes across cultures. Leadership Quarterly, 8(3), 233–274. https://doi.org/10.1016/S1048-9843(97)90003-5
- Du Caju, P., Gautier, E., Momferatou, D., & Ward-Warmedinger, M. E. (2008). Institutional features of wage bargaining in 23 European countries, the US and Japan, NBB Working Paper, No. 154. Brussels: National Bank of Belgium.
- Edelman, L. B. (1992). Legal ambiguity and symbolic structures: Organizational mediation of civil rights law. American Journal of Sociology, 97(6), 1531–1576. https://doi.org/10.1086/229939
- Elvik, R. (2016). Association between increase in fixed penalties and road safety outcomes: A meta-analysis. Accident Analysis & Prevention, 92, 202–210. https://doi.org/10.1016/j.aap.2016.03.028
- Epstein, D. A., Avrahami, D., & Biehl, J. T. (2016). Taking 5: Work-breaks, productivity, and opportunities for personal informatics for knowledge workers. Paper Presented at the Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. San Jose, California.
- Garrett, R. K., & Danziger, J. N. (2008). Disaffection or expected outcomes: Understanding personal Internet use during work. Journal of Computer-Mediated Communication, 13(4), 937–958. https://doi.org/10.1111/j.1083-6101.2008.00425.x
- George, G., Haas, M. R., & Pentland, A. (2014). Big data and management. Academy of Management Journal, 57(2), 321–326. https://doi.org/10.5465/amj.2014.4002
- Gibbs, J. P. (1975). Crime, punishment, and deterrence. Elsevier.
- Glassman, J., Prosch, M., & Shao, B. B. M. (2015). To monitor or not to monitor: Effectiveness of a cyberloafing countermeasure. Information & Management, 52(2), 170–182. https://doi.org/10.1016/j.im.2014.08.001
- Greenberg, J. (1987). The college sophomore as guinea pig: Setting the record straight. Academy of Management Review, 12(1), 157–159. https://doi.org/10.5465/amr.1987.4306516
- Guthrie, G. (2012). Basic research methods: An entry to social science research. Los Angeles: Sage.
- Hayter, S., Fashoyin, T., & Kochan, T. A. (2011). Review essay: Collective bargaining for the 21st century. Journal of Industrial Relations, 53(2), 225–247. https://doi.org/10.1177/0022185610397144
- Henle, C. A., & Blanchard, A. L. (2008). The interaction of work stressors and organizational sanctions on cyberloafing. Journal of Managerial Issues, 20(3), 383–400. Retrieved from https://www.jstor.org/stable/40604617
- Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106–125. https://doi.org/10.1057/ejis.2009.6
- Hofstede, G. H., Hofstede, G. J., & Minkov, M. (2010). Cultures and organizations: Software of the mind. McGraw-Hill.
- Hong, W., Chan, F. K. Y., Thong, J. Y. L., Chasalow, L. C., & Dhillon, G. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 25(1), 111–136. https://doi.org/10.1287/isre.2013.0501
- Hormes, J. M., Kearns, B., & Timko, C. A. (2014). Craving Facebook? Behavioral addiction to online social networking and its association with emotion regulation deficits. Addiction, 109(12), 2079–2088. https://doi.org/10.1111/add.12713
- Jebb, A. T., Tay, L., Wang, W., & Huang, Q. (2015). Time series analysis for psychological research: Examining and forecasting change. Frontiers In Psychology, 6(727), 1–24. https://doi.org/10.3389/fpsyg.2015.00727
- Johns, G. (2006). The essential impact of context on organizational behavior. Academy of Management Review, 31(2), 386. https://doi.org/10.5465/amr.2006.20208687
- Johns, G. (2017). Reflections on the 2016 decade award: Incorporating context in organizational research. Academy of Management Review, 42(4), 577–595. https://doi.org/10.5465/amr.2017.0044
- Johns, G. (2018). Advances in the treatment of context in organizational research. In F. Morgeson (Ed.), Annual review of organizational psychology and organizational behavior, Vol 5 (Vol. 5, pp. 21–46). Annual Reviews.
- Kankanhalli, A., Teo, -H.-H., Tan, B. C. Y., & Wei, -K.-K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23(2), 139. https://doi.org/10.1016/S0268-4012(02)00105-6
- Khansa, L., Kuem, J., Siponen, M., & Kim, S. S. (2017). To cyberloaf or not to cyberloaf: The impact of the announcement of formal organizational controls. Journal of Management Information Systems, 34(1), 141–176. https://doi.org/10.1080/07421222.2017.1297173
- Kim, S. D., Bologna, D. A., Furst-Holloway, S., Hollensbe, E. C., Masterson, S. S., & Sprinkle, T. (2014). Taking a break via technology? Triggers, nature, and effects of ”“Online”“ work breaks. Paper presented at the Academy of Management Proceedings. Philadelphia.
- Konig, C. J., & de la Guardia, M. E. C. (2014). Exploring the positive side of personal internet use at work: Does it help in managing the border between work and nonwork? Computers in Human Behavior, 30, 355–360. https://doi.org/10.1016/j.chb.2013.09.021
- Lawrence, T. B., & Suddaby, R. (2006). Institutions and institutional work. In S. R. Clegg, C. Hardy, T. B. Lawrence, & W. R. Nord (Eds.), Handbook of organization studies (pp. 215–254). Sage.
- Lee, C.-B., & Teske, R. H. C., Jr. (2015). Specific deterrence, community context, and drunk driving: An event history analysis.International Journal of Offender Therapy and Comparative Criminology, 59(3), 230–258. https://doi.org/10.1177/0306624X14554256
- Li, H., Zhang, J., & Sarathy, R. (2010). Understanding compliance with internet use policy from the perspective of rational choice theory. Decision Support Systems, 48(4), 635–645. https://doi.org/10.1016/j.dss.2009.12.005
- Lim, V. K. G. (2002). The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675–694. https://doi.org/10.1002/job.161
- Lim, V. K. G., & Chen, D. J. Q. (2012). Cyberloafing at the workplace: Gain or drain on work? Behaviour & Information Technology, 31(4), 343–353. https://doi.org/10.1080/01449290903353054
- Ljung, G. M., & Box, G. (1978). On a measure of lack of fit in time series models. Biometrika, 65(2), 297–303. https://doi.org/10.1093/biomet/65.2.297
- MacLean, T. L., & Behnam, M. (2010). The dangers of decoupling: The relationship between compliance programs, legitimacy perceptions, and institutionalized misconduct. Academy of Management Journal, 53(6), 1499–1520. https://doi.org/10.5465/amj.2010.57319198
- Markovits, Y., Boer, D., & van Dick, R. (2014). Economic crisis and the employee: The effects of economic crisis on employee job satisfaction, commitment, and self-regulation. European Management Journal, 32(3), 413–422. https://doi.org/10.1016/j.emj.2013.09.005
- McCleary, R., Hay, R. A., Jr., Meidinger, E. E., & McDowall, D. (1980). Applied time series analysis for the social sciences. Sage Publications.
- McGrath, J. E., & Brinberg, D. (1983). External validity and the research process: A comment on the calder/lynch dialogue. Journal of Consumer Research, 10(1), 115–124. https://doi.org/10.1086/208951
- Meyer, J. W., & Rowan, B. (1977). Institutionalized organizations: Formal structure as myth and ceremony. American Journal of Sociology, 83(2), 340–363. https://doi.org/10.1086/226550
- Moody, G. D., & Siponen, M. (2013). Using the theory of interpersonal behavior to explain non-work-related personal use of the internet at work. Information and Management, 50(6), 322–335. https://doi.org/10.1016/j.im.2013.04.005
- Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285–A222. https://doi.org/10.25300/MISQ/2018/13853
- Nagin, D. S., & Pogarsky, G. (2001). Integrating celerity, impulsivity, and extra-legal sanction threats into a model of general deterrence: Theory and evidence. Criminology, 39(4), 865–891. https://doi.org/10.1111/j.1745-9125.2001.tb00943.x
- Nalebuff, B. (1991). Rational deterrence in an imperfect world. World Politics, 43(3), 313. https://doi.org/10.2307/2010397
- Olmstead, K., Lampe, C., & Ellison, N. B. (2016). Social media and the workplace. https://www.pewresearch.org/internet/2016/06/22/social-media-and-the-workplace/
- Overbye, M. (2017). Deterrence by risk of detection? An inquiry into how elite athletes perceive the deterrent effect of the doping testing regime in their sport. Drugs: Education, Prevention and Policy, 24(2), 206–219. https://doi.org/10.1080/09687637.2016.1182119
- Paternoster, R. (1987). The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues. Justice Quarterly, 4(2), 173–217. https://doi.org/10.1080/07418828700089271
- Paternoster, R. (2010). How much do we really know about criminal deterrence? Journal of Criminal Law & Criminology, 100(3), 765–823. Retrieved from https://scholarlycommons.law.northwestern.edu/jclc/vol100/iss3/6
- Paternoster, R., & Piquero, A. (1995). Reconceptualizing deterrence: An empirical test of personal and vicarious experiences. Journal of Research in Crime and Delinquency, 32(3), 251–286. https://doi.org/10.1177/0022427895032003001
- Pierce, L., & Balasubramanian, P. (2015). Behavioral field evidence on psychological and social factors in dishonesty and misconduct. Current Opinion in Psychology, 6, 70–76. https://doi.org/10.1016/j.copsyc.2015.04.002
- Podsakoff, P. M., Bommer, W. H., Podsakoff, N. P., & MacKenzie, S. B. (2006). Relationships between leader reward and punishment behavior and subordinate attitudes, perceptions, and behaviors: A meta-analytic review of existing and new research. Organizational Behavior and Human Decision Processes, 99(2), 113–142. https://doi.org/10.1016/j.obhdp.2005.09.002
- Podsakoff, P. M., & Organ, D. W. (1986). Self-reports in organizational research: Problems and prospects. Journal of Management, 12(4), 531. https://doi.org/10.1177/014920638601200408
- Posey, C., Bennett, R. J., Roberts, T. L., & Lowry, P. B. (2011). When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse. Journal of Information System Security, 7(1), 24. Retrieved from http://www.jissec.org/Contents/V7/N1/V7N1-Posey.html
- Said, S. E., & Dickey, D. A. (1984). Testing for unit roots in autoregressive-moving average models of unknown order. Biometrika, 71(3), 599–607. https://doi.org/10.1093/biomet/71.3.599
- Shadish, W. R., Campbell, D. T., & Cook, T. D. (2001). Experimental and quasi-experimental designs for generalized causal inference. Houghton Mifflin.
- Shadish, W. R., & Cook, T. D. (2009). The renaissance of field experimentation in evaluating interventions. Annual Review of Psychology, 60(1), 607–629. https://doi.org/10.1146/annurev.psych.60.110707.163544
- Shepherd, M. M., & Mejias, R. J. (2016). Nontechnical deterrence effects of mild and severe internet use policy reminders in reducing employee internet abuse. International Journal of Human-Computer Interaction, 32(7), 557. https://doi.org/10.1080/10447318.2016.1183862
- Silic, M., Barlow, J. B., & Back, A. (2017). A new perspective on neutralization and deterrence: Predicting shadow IT usage. Information & Management, 54(8), 1023–1037. https://doi.org/10.1016/j.im.2017.02.007
- Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487–A412. https://doi.org/10.2307/25750688
- Stafford, M. C., & Warr, M. (1993). A reconceptualization of general and specific deterrence. Journal of Research in Crime and Delinquency, 30(2), 123–135. https://doi.org/10.1177/0022427893030002001
- Straub, D. W., Jr. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255. https://doi.org/10.1287/isre.1.3.255
- Tabachnick, B. G., & Fidell, L. S. (2007). Using multivariate statistics. Pearson/Allyn & Bacon.
- Tomlinson, K. D. (2016). An examination of deterrence theory: Where do we stand? Federal Probation, 80(3), 33–38.
- Ugrin, J. C., & Pearson, J. M. (2013). The effects of sanctions and stigmas on cyberloafing. Computers in Human Behavior, 29(3), 812–820. https://doi.org/10.1016/j.chb.2012.11.005
- Urbaczewski, A., & Jessup, L. M. (2002). Does electronic monitoring of employee internet usage work? Communications of the ACM, 45(1), 80–83. https://doi.org/10.1145/502269.502303
- Venn, D. (2009). Legislation, collective bargaining and enforcement. Directorate for Employment, Labour and Social Affairs. Retrieved from www.oecd.org/els/workingpapers
- Wagenaar, A. C., & Maldonado-Molina, M. M. (2007). Effects of drivers’ license suspension policies on alcohol-related crash involvement: Long-term follow-up in forty-six states. Alcoholism: Clinical and Experimental Research, 31(8), 1399–1406. https://doi.org/10.1111/j.1530-0277.2007.00441.x
- Wenzel, M. (2004). The social side of sanctions: Personal and social norms as moderators of deterrence. Law and Human Behavior, 28(5), 547. https://doi.org/10.1023/B:LAHU.0000046433.57588.71
- Williams, K. R., & Hawkins, R. (1986). Perceptual research on general deterrence: A critical review. Law & Society Review, 20(4), 545. https://doi.org/10.2307/3053466
- Wong, K. F. E., Feldman, G., & Cheng, C. (2017). Macroeconomics, turnover intention, and actual turnover behavior: A meta-analysis. Academy of Management Proceedings, 2017(1), 12951. https://doi.org/10.5465/AMBPP.2017.12951abstract
- Zaheer, S., Albert, S., & Zaheer, A. (1999). Time scales and organizational theory. Academy of Management Review, 24(4), 725–741. https://doi.org/10.5465/amr.1999.2553250
- Zakrzewski, C. (2016, March 13). The key to getting workers to stop wasting time online. The Wall Street Journal. https://www.wsj.com/articles/the-key-to-getting-workers-to-stop-wasting-time-online-1457921545