References
- Ramayah, T., Chin, L. G. and Ahmad, N. H., Internet piracy among business students: An application of triandis model, International Journal of Business and Management Science, 2008, Vol. 1, No. 1, pp. 85-95.
- Lim, V. K. G., Understanding adherence to breast self-examination in older women, Journal of Organizational Behavior, 2002, Vol. 23, pp. 675-694. https://doi.org/10.1002/job.161
- Conlin, M., Workers, surf at your own risk, Business Week, 2000, pp. 105-106.
- Blanchard, A. L. and Henle, C. A., Correlates of different forms of cyberloafing: The role of norms and external locus of control, Computers in Human Behavior, 2008, vol. 24, No. 3, pp. 1067-1084. https://doi.org/10.1016/j.chb.2007.03.008
- Ehrlich, I., Crime, punishment, and the market for offenses, Journal of Economics Perspectives, 1996, vol. 10, No. 1, pp. 43-67. https://doi.org/10.1257/jep.10.1.43
- Fishbein, M. and Ajzen, I., Belief, attitude, intention, and behavior: an introduction to theory and research, Reading, M.A. Addison-Wesley. 1975.
- Ajzen, I. and Beck, L. Predicting dishonest actions using the theory of planned behavior, Journal of Research in Personality, 1991, vol. 25, No. 3, pp. 258-301.
- Lee, S. M. and Yoo, S., An integrative model of computer abuse based on social control and general deterrence theories, Information and Management, 2004, vol. 41, No. 6, pp. 707-718. https://doi.org/10.1016/j.im.2003.08.008
- Ehrlich, I., Crime, punishment, and the market for offenses, Journal of Economics Perspectives, 1996, Vol. 10, No. 1, pp. 43-67. https://doi.org/10.1257/jep.10.1.43
- Straub, D., Effective IS security: an empirical study, Information Systems Research, 1990, vol. 1, VNo. 3, pp. 255-276. https://doi.org/10.1287/isre.1.3.255
- Henle, C. A. and Blanchard, A. L., The interaction of work stressors and organizational sanctions on cyberloafing, Journal of Managerial Issues, 2008, vol. 20, No. 3, pp. 383-400.
- Liao, Q., X. Luo, A. Gurung, and Li, L., Workplace management and employee misuse: does punishment matter?, Journal of Computer Information Systems, 2009, vol. 50, No. 2, pp. 49-59.
- Hill, G. D. and Atkinson, M. P., Gender, familial control and delinquency, Criminology, 1988, vol. 26, No. 1, pp. 127-149. https://doi.org/10.1111/j.1745-9125.1988.tb00835.x
- Triandis, H. C., Values, attitudes, and interpersonal behaviour, in Howe, H. and M. Page,(1979), Nebraska symposium on motivation: Beliefs, attitudes and values, Lincoln, University of Nebraska Press, 1980, pp. 195-259.
- Thompson, R. L., Higgins, C. H. and Howell, J. M. Towards a conceptual model of utilization, MIS Quarterly, 1991, vol. 15, No. 1, pp. 125-143. https://doi.org/10.2307/249443
- Stevens, B., The ethics of the US business executive, Journal of Business Ethics, 2004, vol. 54, pp. 163-171. https://doi.org/10.1007/s10551-004-9464-9
- Steiner, I. D., Group process and productivity, New York: Academic Press. 1972.
- Longley, J. and Pruitt, D. C., Groupthink: A critique of Janis' theory, in Wheeler, L.(Eds.), Review of Personality and Social Psychology, 1990, pp. 74-93.
- Gottfredson, M. R, and Hirschi, T., A general theory of crime. Stanford, C.A.: Stanford University Press. 1990.
- Arneklev, B. J., Grasmick, H. G. Tittle, C. R. and Bursik, R. J., Low self-control and imprudent behavior, Journal of Quantitative Criminology, 1993, vol. 9, pp. 225-247. https://doi.org/10.1007/BF01064461
- Howard, J. A. and Woodside, A. G., Personal value affecting consumer psychology, in Pitts, R. E. and A. G. Woodside(Eds.), Lexington, D. C., Heath and Company. 1984.
- Rokeach, M., The nature of human values, New York: Free Press. 1973.
- Govindarajan, V. and Fisher, J., Strategy, control systems, and resource sharing: effects on business-unit performance, Academy of Management Journal, pp. 259-285.
- Workman, M. and Gathegi, J., Punishment and ethics deterrents: A study of insider security contravention, Journal of the American Society for Information Science and Technology, 2006, vol. 58, No. 2, pp. 212-222. https://doi.org/10.1002/asi.20474
- Thaler, R. H., Mental accounting and consumer choice, Marketing Service, 1985, vol. 4, No. 3, pp. 199-214.