1 |
Gadlin, H. (1991). Careful maneuvers: Mediating sexual harassment. Negotiation Journal, 7, 139.
DOI
|
2 |
Lynch, A. (2007). Expanding the definition of provocative dress: An examination of female flashing behavior on a college campus. Clothing and Textiles Research Journal, 25(2), 184-201.
DOI
|
3 |
Majchrzak, A., Faraj, S., Kane, G. C., & Azad, B. (2013). The contradictory influence of social media affordances on online communal knowledge sharing. Journal of Computer-Mediated Communication, 19(1), 38-55.
DOI
|
4 |
Nowatzki, J., & Morry, M. M. (2009). Women's intentions regarding, and acceptance of, self-sexualizing behavior. Psychology of Women Quarterly, 33(1), 95-107.
DOI
|
5 |
O'Hare, E., & O'Donohue, W. (1998). Sexual harassment: Identifying risk factors. Archives of Sexual Behavior, 27, 561-580.
DOI
|
6 |
Rhoa, H., & Yub, I. (2011). The impact of information technology threat avoidance factors on avoidance behavior of user. Retrieved from https://pdfs.semanticscholar.org/a9e9/31b792c403f49a91a1dbdfdfbc34b92f1d8c.pdf
|
7 |
Rosenstock, I. M., Strecher, V. J., & Becker, M. H. (1994). The health behavior model and HIV risk behavior change. In R. J. DiClemente & J. L. Peterson (Eds.), Preventing AIDS: Theories and methods of behavioral interventions (pp. 5-24). New York, NY: Plenum Press.
|
8 |
Vitak, J., & Kim, J. (2014, February). "You Can't Block People Offline" examining how Facebook's affordances shape the disclosure process. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 461-474).
|
9 |
Lee, Y., & Larsen, K. R. (2009). Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems, 18(2), 177-187.
DOI
|
10 |
Herring, S. C. (2003). Gender and power in on-line communication. The Handbook of Language and Gender, 202-228.
|
11 |
Liang, H., & Xue, Y. L. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 1.
DOI
|
12 |
Couraud, J. R. (2014). Risk perception in online communities. Doctoral dissertation, Utah State University. Retrieved from http://digitalcommons.usu.edu/etd/3898/
|
13 |
Act on the protection of children and youth against sex offenses, Article 25-2(1).
|
14 |
Benavides-Espinoza, C., & Cunningham, G. B. (2010). Bystanders' reactions to sexual harassment. Sex Roles, 63(3-4), 201-213.
DOI
|
15 |
Thacker, R. A., & Ferris, G. R. (1991). Understanding sexual harassment in the workplace: The influence of power and politics within the dyadic interaction of harasser and target. Human Resource Management Review, 1(1), 23-37.
DOI
|
16 |
Van Royen, K., Poels, K., & Vandebosch, H. (2016). Harmonizing freedom and protection: Adolescents' voices on automatic monitoring of social networking sites. Children and Youth Services Review, 64, 35-41.
DOI
|
17 |
Nova, F. F., Rifat, M. R., Saha, P., Ahmed, S. I., & Guha, S. (2019, January). Online sexual harassment over anonymous social media In Bangladesh. In Proceedings of the Tenth International Conference on Information and Communication Technologies and Development, 1-12.
|
18 |
Berson, I. R. (2003). Grooming cybervictims: The psychosocial effects of online exploitation for youth. Journal of School Violence, 2(1), 5-18.
DOI
|
19 |
Chen, D. Q., & Liang, H. (2019). Wishful thinking and IT threat avoidance: An extension to the technology threat avoidance theory. IEEE Transactions on Engineering Management, 66(4), 552-567.
DOI
|
20 |
Chan, T. K., Cheung, C. M., & Wong, R. Y. (2019). Cyberbullying on social networking sites: The crime opportunity and affordance perspectives. Journal of Management Information Systems, 36(2), 574-609.
DOI
|
21 |
Jain, S., & Agrawal, S. (2020). Perceived vulnerability of cyberbullying on social networking sites: Effects of security measures, addiction and self-disclosure. Indian Growth and Development Review.
|
22 |
Gibson, J. J. (1977). The theory of affordances. Hilldale, USA, 1(2), 67-82.
|
23 |
Gruber, J. E., & Bjorn, L. (1986). Women's responses to sexual harassment: An analysis of sociocultural, organizational, and personal resource models. Social Science Quarterly, 67(4), 814.
|
24 |
Gwartney-Gibbs, P. A., & Lach, D. H. (1992). Sociological explanations for failure to seek sexual harassment remedies. Mediation Quarterly, 9(4), 365-374.
DOI
|
25 |
Liss, M., Erchull, M. J., & Ramsey, L. R. (2011). Empowering or oppressing? Development and exploration of the enjoyment of sexualization scale. Personality and Social Psychology Bulletin, 37(1), 55-68.
DOI
|
26 |
Pearce, K. E., & Vitak, J. (2016). Performing honor online: The affordances of social media for surveillance and impression management in an honor culture. New Media & Society, 18(11), 2595-2612.
DOI
|
27 |
Fitzgerald, L. F., Hulin, C. L., & Drasgow, F. (1994). The antecedents and consequences of sexual harassment in organizations: An integrated model. In G. P. Keita & J. J. Hurrell, Jr. (Eds.), Job stress in a changing workforce: Investigating gender, diversity, and family issues (pp. 55-73). American Psychological Association.
|
28 |
Ward, L. M., Seabrook, R. C., Grower, P., Giaccardi, S., & Lippman, J. R. (2018). Sexual object or sexual subject? Media use, self-sexualization, and sexual agency among undergraduate women. Psychology of Women Quarterly, 42(1), 29-43.
DOI
|
29 |
Scarduzio, J. A., Sheff, S. E., & Smith, M. (2018). Coping and sexual harassment: How victims cope across multiple settings. Archives of Sexual Behavior, 47(2), 327-340.
DOI
|
30 |
Van Royen, K., Poels, K., Daelemans, W., & Vandebosch, H. (2015). Automatic monitoring of cyberbullying on social networking sites: From technological feasibility to desirability. Telematics and Informatics, 32(1), 89-97.
DOI
|
31 |
Xue, Y., Liang, H., Mbarika, V., Hauser, R., Schwager, P., & Getahun, M. K. (2015). Investigating the resistance to telemedicine in Ethiopia. International Journal of Medical Informatics, 84(8), 537-547
DOI
|
32 |
Asante-Offei, K. O., & Yaokumah, W. (2021). Cyber-identity theft and Fintech services: Technology threat avoidance perspective. Journal of Information Technology Research, 14(3), 1-19.
DOI
|
33 |
Bae, J. K. (2017). The structural relationships among information security threat factors and information protection behavior of the FinTech services: Focus on theoretical perspectives of technology threat avoidance and health protective behaviors. Journal of Information Systems, 26(3), 313-337.
DOI
|
34 |
Kim, S., & Kim, J. (2016). A study on factors influencing privacy decision making on the internet: Focus on dual-calculus model. Journal of Information Systems, 25(3), 197-215.
DOI
|
35 |
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A Phishing threat avoidance perspective. Computers in Human Behavior, 38, 304-312.
DOI
|
36 |
Carpenter, D., Young, D. K., Barrett, P., & McLeod, A. J. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44.
|
37 |
Choi, D., & DeLong, M. (2019). Defining female self sexualization for the twenty-first century. Sexuality & Culture, 23(4), 1350-1371.
DOI
|
38 |
Davern, M., Shaft, T., & Te'eni, D. (2012). Cognition matters: Enduring questions in cognitive IS research. Journal of the Association for Information Systems, 13(4), 273-314.
DOI
|
39 |
Gruber, J. E. (1989). How women handle sexual harassment: A literature review. Sociology and Social Research, 74(1), 3-9.
|
40 |
Gillam, A. R., & Waite, A. M. (2021). Gender differences in predictors of technology threat avoidance. Information & Computer Security, 29(3), 393-412.
DOI
|
41 |
Gumbus, A., & Meglich, P. (2013). Abusive online conduct: Discrimination and harassment in cyberspace. Journal of Management Policy and Practice, 14(5), 47-56.
|
42 |
Gutek, B. A., & Koss, M. P. (1993). Changed women and changed organizations: Consequences of and coping with sexual harassment. Journal of Vocational Behavior, 42(1), 28-48.
DOI
|
43 |
Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2-24.
DOI
|
44 |
Karahanna, E., Xu, S. X., Xu, Y., & Zhang, N. A. (2018). The needs-affordances-features perspective for the use of social media. MIS Quarterly, 42(3), 737-756.
DOI
|
45 |
Knapp, D. E., Faley, R. H., Ekeberg, S. E., & Dubois, C. L. (1997). Determinants of target responses to sexual harassment: A conceptual framework. Academy of Management Review, 22(3), 687-729.
DOI
|
46 |
Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71-90.
DOI
|
47 |
Fitzgerald, L. F., & Shullman, S. L. (1993). Sexual harassment: A research analysis and agenda for the 1990s. Journal of Vocational Behavior, 42(1), 5-27.
DOI
|
48 |
Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18(3), 382-388.
DOI
|