4.6 Article

The Darth Side of Technology Use: An Inductively Derived Typology of Cyberdeviance

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

User response to mandatory IT use: a coping theory perspective

Anol Bhattacherjee et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2018)

Article Computer Science, Information Systems

TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE

Gregory D. Moody et al.

MIS QUARTERLY (2018)

Article Computer Science, Information Systems

E-MAIL INTERRUPTIONS AND INDIVIDUAL PERFORMANCE: IS THERE A SILVER LINING?

Shamel Addas et al.

MIS QUARTERLY (2018)

Article Information Science & Library Science

Work-Life Conflict of Globally Distributed Software Development Personnel: An Empirical Investigation Using Border Theory

Saonee Sarker et al.

INFORMATION SYSTEMS RESEARCH (2018)

Article Computer Science, Information Systems

Training to Mitigate Phishing Attacks Using Mindfulness Techniques

Matthew L. Jensen et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls

Lara Khansa et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

A Nomological Network of Knowledge Management System Use: Antecedents and Consequences

Xiaojun Zhang et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model

Son et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Information About Information: A Taxonomy of Views

McKinney et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Beyond Deterrence: An Expanded View of Employee Computer Abuse

Robert Willison et al.

MIS QUARTERLY (2017)

Article Business

I JUST CAN'T CONTROL MYSELF: A SELF-REGULATION PERSPECTIVE ON THE ABUSE OF DEVIANT EMPLOYEES

Mary B. Mawritz et al.

ACADEMY OF MANAGEMENT JOURNAL (2017)

Article Information Science & Library Science

Extending the Concept of Control Beliefs: Integrating the Role of Advice Networks

Lionel P. Robert et al.

INFORMATION SYSTEMS RESEARCH (2017)

Article Computer Science, Information Systems

An Empirical Validation of Malicious Insider Characteristics

Nan (Peter) Liang et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2016)

Article Computer Science, Information Systems

Unified Theory of Acceptance and Use of Technology: A Synthesis and the Road Ahead

Viswanath Venkatesh et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2016)

Article Information Science & Library Science

Implementation of an Information and Communication Technology in a Developing Country: A Multimethod Longitudinal Study in a Bank in India

Viswanath Venkatesh et al.

INFORMATION SYSTEMS RESEARCH (2016)

Article Computer Science, Information Systems

The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use

Sutirtha Chatterjee et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2015)

Article Computer Science, Information Systems

A Taxonomy of Evaluation Methods for Information Systems Artifacts

Nicolas Prat et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2015)

Article Computer Science, Information Systems

Understanding the Drivers of Unethical Programming Behavior: The Inappropriate Reuse of Internet-Accessible Code

Manuel Sojer et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2014)

Article Computer Science, Information Systems

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements

Xia Zhao et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2013)

Article Business

Consumer Acceptance of Personal Information and Communication Technology Services

James Y. L. Thong et al.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2011)

Article Computer Science, Information Systems

Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model

Ken H. Guo et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2011)

Article Psychology, Multidisciplinary

Personal Internet use at work: Understanding cyberslacking

Jessica Vitak et al.

COMPUTERS IN HUMAN BEHAVIOR (2011)

Article Business

The typology of technology clusters and its evolution - Evidence from the hi-tech industries

Jiang He et al.

TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE (2011)

Article Management

Counterproductive use of technology at work: Information & communications technologies and cyberdeviancy

Terrance G. Weatherbee

HUMAN RESOURCE MANAGEMENT REVIEW (2010)

Article Computer Science, Information Systems

User acceptance of information technology: Toward a unified view

V Venkatesh et al.

MIS QUARTERLY (2003)

Article Computer Science, Information Systems

A taxonomy of antecedents of information systems success: Variable analysis studies

KRT Larsen

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2003)

Article Computer Science, Information Systems

Computer crimes: theorizing about the enemy within

G Dhillon et al.

COMPUTERS & SECURITY (2001)

Article Psychology, Applied

Development of a measure of workplace deviance

RJ Bennett et al.

JOURNAL OF APPLIED PSYCHOLOGY (2000)