1 |
Ramayah, T., Chin, L. G. and Ahmad, N. H., Internet piracy among business students: An application of triandis model, International Journal of Business and Management Science, 2008, Vol. 1, No. 1, pp. 85-95.
|
2 |
Lim, V. K. G., Understanding adherence to breast self-examination in older women, Journal of Organizational Behavior, 2002, Vol. 23, pp. 675-694.
DOI
ScienceOn
|
3 |
Conlin, M., Workers, surf at your own risk, Business Week, 2000, pp. 105-106.
|
4 |
Blanchard, A. L. and Henle, C. A., Correlates of different forms of cyberloafing: The role of norms and external locus of control, Computers in Human Behavior, 2008, vol. 24, No. 3, pp. 1067-1084.
DOI
ScienceOn
|
5 |
Ehrlich, I., Crime, punishment, and the market for offenses, Journal of Economics Perspectives, 1996, vol. 10, No. 1, pp. 43-67.
DOI
ScienceOn
|
6 |
Fishbein, M. and Ajzen, I., Belief, attitude, intention, and behavior: an introduction to theory and research, Reading, M.A. Addison-Wesley. 1975.
|
7 |
Ajzen, I. and Beck, L. Predicting dishonest actions using the theory of planned behavior, Journal of Research in Personality, 1991, vol. 25, No. 3, pp. 258-301.
|
8 |
Lee, S. M. and Yoo, S., An integrative model of computer abuse based on social control and general deterrence theories, Information and Management, 2004, vol. 41, No. 6, pp. 707-718.
DOI
ScienceOn
|
9 |
Ehrlich, I., Crime, punishment, and the market for offenses, Journal of Economics Perspectives, 1996, Vol. 10, No. 1, pp. 43-67.
DOI
ScienceOn
|
10 |
Straub, D., Effective IS security: an empirical study, Information Systems Research, 1990, vol. 1, VNo. 3, pp. 255-276.
DOI
|
11 |
Henle, C. A. and Blanchard, A. L., The interaction of work stressors and organizational sanctions on cyberloafing, Journal of Managerial Issues, 2008, vol. 20, No. 3, pp. 383-400.
|
12 |
Liao, Q., X. Luo, A. Gurung, and Li, L., Workplace management and employee misuse: does punishment matter?, Journal of Computer Information Systems, 2009, vol. 50, No. 2, pp. 49-59.
|
13 |
Hill, G. D. and Atkinson, M. P., Gender, familial control and delinquency, Criminology, 1988, vol. 26, No. 1, pp. 127-149.
DOI
|
14 |
Triandis, H. C., Values, attitudes, and interpersonal behaviour, in Howe, H. and M. Page,(1979), Nebraska symposium on motivation: Beliefs, attitudes and values, Lincoln, University of Nebraska Press, 1980, pp. 195-259.
|
15 |
Thompson, R. L., Higgins, C. H. and Howell, J. M. Towards a conceptual model of utilization, MIS Quarterly, 1991, vol. 15, No. 1, pp. 125-143.
DOI
ScienceOn
|
16 |
Stevens, B., The ethics of the US business executive, Journal of Business Ethics, 2004, vol. 54, pp. 163-171.
DOI
|
17 |
Steiner, I. D., Group process and productivity, New York: Academic Press. 1972.
|
18 |
Longley, J. and Pruitt, D. C., Groupthink: A critique of Janis' theory, in Wheeler, L.(Eds.), Review of Personality and Social Psychology, 1990, pp. 74-93.
|
19 |
Gottfredson, M. R, and Hirschi, T., A general theory of crime. Stanford, C.A.: Stanford University Press. 1990.
|
20 |
Arneklev, B. J., Grasmick, H. G. Tittle, C. R. and Bursik, R. J., Low self-control and imprudent behavior, Journal of Quantitative Criminology, 1993, vol. 9, pp. 225-247.
DOI
|
21 |
Workman, M. and Gathegi, J., Punishment and ethics deterrents: A study of insider security contravention, Journal of the American Society for Information Science and Technology, 2006, vol. 58, No. 2, pp. 212-222.
DOI
|
22 |
Howard, J. A. and Woodside, A. G., Personal value affecting consumer psychology, in Pitts, R. E. and A. G. Woodside(Eds.), Lexington, D. C., Heath and Company. 1984.
|
23 |
Rokeach, M., The nature of human values, New York: Free Press. 1973.
|
24 |
Govindarajan, V. and Fisher, J., Strategy, control systems, and resource sharing: effects on business-unit performance, Academy of Management Journal, pp. 259-285.
|
25 |
Thaler, R. H., Mental accounting and consumer choice, Marketing Service, 1985, vol. 4, No. 3, pp. 199-214.
|