Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-45l2p Total loading time: 0 Render date: 2024-04-27T03:59:52.170Z Has data issue: false hasContentIssue false

20 - A Review and Extension of Cyber-Deviance Literature

Why It Likely Persists

from Part V - Technology in Motivation and Performance

Published online by Cambridge University Press:  18 February 2019

Richard N. Landers
Affiliation:
University of Minnesota
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aghaz, A. & Sheikh, A. (2016). Cyberloafing and job burnout: An investigation in the knowledge intensive sector. Computers in Human Behavior, 62, 5160.CrossRefGoogle Scholar
Aime, M. D., Calandriello, G., & Lioy, A. (2007). Dependability in wireless networks: Can we rely on WiFi?. IEEE Security & Privacy, 5(1).CrossRefGoogle Scholar
Ajzen, I. (1991). The theory of planned behavior. Organizational behavior and human decision processes, 50(2), 179211.CrossRefGoogle Scholar
Ak, S., Ozdemir, Y., & Kuzucu, Y. (2015). Cybervictimization and cyberbullying: The mediating role of anger, Don’t anger me! Computers in Human Behavior, 49, 437443.CrossRefGoogle Scholar
Akbulut, Y., Donmez, O., & Durson, O. (2017). Cyberloafing and social desirability bias among students and employees. Computers in Human Behavior, 72, 8795.CrossRefGoogle Scholar
AldhizerIII, G. R. (2008). The insider threat: automated identity and access controls can help organizations mitigate risks to important data. Internal Auditor, 65(2), 7173.Google Scholar
Alonzo, M. & Aiken, M. (2004). Flaming in electronic communication. Decision Support Systems, 36(3), 205213.CrossRefGoogle Scholar
Alshuaibi, A. S., Subrananiam, C., & Shamsudin, F. M. (2014). The mediating role of job satisfaction on the relationship between HR practices and cyberdeviance. Journal of Marketing and Management, 5(1), 105119.Google Scholar
Amsel, A. (1992). Frustration theory – many years later. Psychological Bulletin, 112(3), 396399.CrossRefGoogle ScholarPubMed
Anandarajan, M., Devine, P., & Simmers, C.A. (2004). Chapter IV: A multidimensional scaling approach to personal Web usage in the workplace, in Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management (pp. 6179). Hershey, PA: Idea Group Publishing.CrossRefGoogle Scholar
Andreassen, C. S., Torsheim, T., & Pallesen, S. (2014). Predictors of use of social network sites at work – a specific type of cyberloafing. Journal of Computer-Mediated Communication, 19, 906921.CrossRefGoogle Scholar
Askew, K., Buckner, J. E., Taing, M. U., Ilie, A., Bauer, J. A., & Coovert, M. D. (2014). Explaining cyberloafing: The role of the theory of planned behavior. Computers in Human Behavior, 36, 510519.CrossRefGoogle Scholar
Bandura, A. (1989). Human agency in social cognitive theory. American Psychologist, 44(9), 11751184.CrossRefGoogle ScholarPubMed
Barlett, C.P., Prot, S., Anderson, C.A., & Gentile, D.A. (2017). An empirical examination of the strength differential hypothesis in cyberbullying behavior. Psychology of Violence, 7(1), 2232.CrossRefGoogle Scholar
Barling, J. (1996). Prediction, experience, and consequences of violence. In Vandenbos, G. R., & Bulatao, E. Q. (Eds.), Violence on the job: Identifying risks and developing solutions. Washington, DC: American Psychological Association.Google Scholar
Barlow, J., Bean, L., & Hott, D.D. (2003). Employee “spy” software: Should you use it? Journal of Corporate Accounting & Finance, 14(4), 712.CrossRefGoogle Scholar
Barnes, S. & Biros, D. (2007). An exploratory analysis of computer mediated communications on cyberstalking severity. The Journal of Digital Forensics, Security and Law, 2(3), 727.Google Scholar
Baturay, M. H. & Toker, C. (2015). An investigation of the impact of demographics on cyberloafing from an educational setting angle. Computers in Human Behavior, 50, 358366.CrossRefGoogle Scholar
Belanger, F. & Van Slyke, C. (2002). Abuse or learning? Communications of the ACM, 45(1), 6465.CrossRefGoogle Scholar
Benbasat, I. & Zmud, R.W. (2003). The identity crisis within the IS discipline: Defining and communicating the discipline’s core properties. MIS Quarterly, 27(2), 183194.CrossRefGoogle Scholar
Biber, J.K., Doverspike, D., Baznik, D., Cober, A., & Ritter, B.A. (2002). Sexual harassment in online communications: effects of gender and discourse medium. Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 5(1), 3342.CrossRefGoogle ScholarPubMed
Bissett, A. & Shipton, G. (2000). Some human dimensions of computer virus creation and infection. International Journal of Human-Computer Studies, 52(5), 899913.CrossRefGoogle Scholar
Blanchard, A. L. & Henle, C. A. (2008). Correlates of different forms of cyberloafing: The role of norms and external locus of control. Computers in Human Behavior, 24(3), 10671084.CrossRefGoogle Scholar
Blau, G., Yang, Y., & Ward-Cook, K. (2006). Testing a measure of cyberloafing. Journal of Allied Health, 35(1), 917.Google ScholarPubMed
Burn-Thornton, K. & Burman, T. (2012). The use of data mining to indicate virtual (email) bullying. 2012 Third Global Congress on Intelligent Systems, November 2012, 253256.CrossRefGoogle Scholar
Bushman, B. J., Bonacci, A. M., Pedersen, W. C., Vasquez, E. A., & Miller, N. (2005). Chewing on it can chew you up: Effects of rumination on triggered displaced aggression. Journal of Personality and Social Psychology, 88, 969983.CrossRefGoogle ScholarPubMed
Byron, K. (2008). Carrying too heavy a load? The communication and miscommunication of emotion by email. Academy of Management Review, 33(2), 309327.CrossRefGoogle Scholar
Caplan, S. E. (2007). Relations among loneliness, social anxiety, and problematic internet use. CyberPsychology & Behavior, 10(2), 234242.CrossRefGoogle ScholarPubMed
Carlson, J. R. & Zmud, R. W. (1999), Channel expansion theory and the experiential nature of media richness perceptions, Academy of Management Journal, 42, 153170.CrossRefGoogle Scholar
Case, C. & Young, K. (2001). A preliminary investigation of employee internet misuse, Issues in Information Systems, 1, 4349.Google Scholar
Chalykoff, J. & Kochan, T. A. (1989). Computer-aided monitoring: Its influence on employee job satisfaction and turnover. Personnel Psychology, 42, 807834.CrossRefGoogle Scholar
Chambers, R. A. & Potenza, M. N. (2003). Neurodevelopment, impulsivity, and adolescent gambling. Journal of Gambling Studies, 19(1), 5384.CrossRefGoogle ScholarPubMed
Chen, D. J. Q. & Lim, V. K. G. (August, 2011). Impact of cyberloafing on psychological engagement. Paper presented at the Annual Meeting of Academy of Management, San Antoni, TX.Google Scholar
Christian, M. S. & Ellis, A. P. (2011). Examining the effects of sleep deprivation on workplace deviance: A self-regulatory perspective. Academy of Management Journal, 54(5), 913934.CrossRefGoogle Scholar
Churchman, P. (2003). Technology abusing the Net – How to curb work surfers with surfing there’s always the risk of getting dumped – a lesson worth heeding as the incidence of workplace internet abuse increases and both companies and employees pay the cost. New Zealand Management, 46–7. Retrieved June 3, 2017 from https://management.co.nz/article/technology-abusing-net-how-curb-work-surfers.Google Scholar
Civiello, C. L. (1999). Cyberspace, trusted insiders, and organizational threat. The Psychologist-Manager Journal, 3(2), 149166.CrossRefGoogle Scholar
Cole, T. J. (2002). PC use at home and for union organizing: New challenges in the wired workplace. Employment Relations Today, 29(1), 7378.CrossRefGoogle Scholar
Connelly, C. E., Zweig, D., Webster, J., & Trougakos, J. P. (2012). Knowledge hiding in organizations. Journal of Organizational Behavior, 33(1), 6488.CrossRefGoogle Scholar
Coyne, I., Farley, S., Axtell, C., Sprigg, C., Best, L., & Kwok, O. (2017). Understanding the relationship between experiencing workplace cyberbullying, employee mental strain and job satisfaction: A disempowerment approach. The International Journal of Human Resource Management, 28(7), 945972.CrossRefGoogle Scholar
Daft, R. L., Lengel, R. H., & Trevino, L. K. (1987). Message equivocality, media selection, and manager performance: Implications for information systems. MIS Quarterly, 11(3), 355366.CrossRefGoogle Scholar
Darby, M. R. & Karni, E. (1973). Free competition and the optimal amount of fraud. The Journal of Law and Economics, 16(1), 6788.CrossRefGoogle Scholar
Davis, H. E. & Braun, R. L. (2004). Computer fraud: Analyzing perpetrators and methods. The CPA Journal, 74(7), 5659.Google Scholar
D’Cruz, P. & Noronha, E. (2013). Navigating the extended reach: Target experiences of cyberbullying at work. Information and Organization, 23(4), 324343.CrossRefGoogle Scholar
de Lara, P. Z. M. (2007). Relationship between organizational justice and cyber-loafing in the workplace: Has “anomia” a say in the matter? CyberPsychology & Behavior, 10(3), 464470.CrossRefGoogle ScholarPubMed
de Lara, P. Z. M., Tacoronte, D. V., & Ding, J-M. T. (2006). Do current anti-cyberloafing disciplinary practices have a replica in research findings?: A study of the effects of coercive strategies on workplace Internet misuse. Internet Research, 16(4), 450467.CrossRefGoogle Scholar
DeSanctis, G. & Poole, M.S. (1994). Capturing the complexity in advanced technology use: Adaptive structuration theory. Organization Science, 5(2), 121147.CrossRefGoogle Scholar
Dollard, J., Miller, N. E., Doob, L. W., Mowrer, O. H., & Sear, R. R. (1939). Frustration and aggression. New Haven, CT: Yale University Press.CrossRefGoogle Scholar
Dooley, J., Pyzalski, J., & Cross, D. (2009). Cyberbullying versus face-to-face bullying: A theoretical and conceptual review. Zeitschrift fur Psychologie – Journal of Psychology, 217(4), 182188.CrossRefGoogle Scholar
Douglas, D. M. (2016). Doxing: a conceptual analysis. Ethics and Information Technology, 18(3), 199210.CrossRefGoogle Scholar
Farley, S., Coyne, I.J., Sprigg, C.A., Axtell, C., & Subramanian, G. (2015). Exploring the Impact of Workplace Cyberbullying on Trainee Doctors. https://dspace.lboro.ac.uk/2134/20812.Google Scholar
Faucher, C., Jackson, M., & Cassidy, W. (2015). Governing cyberbullying at the university level. The Canadian Journal of Higher Education, 45(1), 102121.CrossRefGoogle Scholar
Fleury, D. (2016). Precarious employment in Canada: An overview of the situation. HillNotes Research and Analysis from Canada’s Library of Parliament, January 26, 2017. Retrieved December 18, 2017, from https://hillnotes.ca/2016/01/27/precarious-employment-in-canada-an-overview-of-the-situation/.Google Scholar
Fishbein, M. & Ajzen, I. (1975). Belief, attitude, intention, and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley.Google Scholar
Fontein, D. (2017). How to write a social media policy for your company. Hootsuite, February 23, 2017. Retrieved May 23, 2017 from https://blog.hootsuite.com/social-media-policy-for-employees/.Google Scholar
Ford, D. P. (2003). TAM Research: A Theoretical Critique & Call for Debate. Presentation at Administrative Sciences Association of Canada 2003 Conference, Halifax, NS, June 2003.Google Scholar
Ford, D. P. (2013). Virtual harassment: Media characteristics’ role in psychological health. Journal of Managerial Psychology, 28(4), 408428.CrossRefGoogle Scholar
Ford, D. P. (2015). The relevance of media characteristics for targets’ experience of workplace aggression. Platform paper presented at Work, Stress and Health Conference, May 6–9,2015, Atlanta, GA.Google Scholar
Ford, D. P. & Clarke, H. M. (2017). Testing the impact of media characteristics for virtual workplace aggression: Four experiments. Poster presentation at Canadian Psychological Association Conference, Toronto, ON, June 8–10, 2017.Google Scholar
Francis, L., Holmvall, C. M., & O’Brien, L. E. (2015). The influence of workload and civility of treatment on the perpetration of email incivility. Computers in Human Behavior, 46, 191201.CrossRefGoogle Scholar
Gardner, D., O’Driscoll, M., Cooper-Thomas, H. D., Roche, M., Bentley, T., Catley, B., Teo, S. T. T., & Trenberth, L. (2016). Predictors of workplace bullying and cyber-bullying in New Zealand. International Journal of Environmental Research & Public Health, 13(5), 114.CrossRefGoogle ScholarPubMed
Garrett, R. K. & Danziger, J. N. (2008). On cyberslacking: Workplace status and personal internet use at work. CyberPsychology & Behavior, 11(3), 287292.CrossRefGoogle ScholarPubMed
Giménez Gualdo, A. M., Hunter, S. C., Durkin, K., Arnaiz, P., & Maquilón, J. J. (2015). The emotional impact of cyberbullying: Differences in perceptions and experiences as a function of role. Computers & Education, 82, 228235.CrossRefGoogle Scholar
Giumetti, G. W., McKibben, E. S., Hatfield, A. L., Schroeder, A. N., & Kowalski, R. M. (2012). Cyber incivility @ work: The new age of interpersonal deviance. Cyberpsychology Behavior and Social Networking, 15(3), 148154.CrossRefGoogle ScholarPubMed
Glassman, J., Prosch, M., & Shao, B. B. M. (2015). To monitor or not to monitor: Effectiveness of a cyberloafing countermeasure. Information & Management, 52(2), 170182.CrossRefGoogle Scholar
Goffee, R. & Jones, G. (1996). What holds the modern company together? Harvard Business Review, 74(6), 133148.Google Scholar
Greengard, S. (2000). The high cost of cyberslacking. Workforce, 79(12), 2224.Google Scholar
Harris, L. (2008). Staffer fired after bad-mouthing colleagues, management in blog. Canadian HR Reporter (September 8, 2008), 18. Retrieved September 29, 2018, from www.hrreporter.com/article/6313-staffer-fired-after-bad-mouthing-colleagues-manage/.Google Scholar
Hegarty, W. H. & Sims, H. P. (1978). Some determinants of unethical decision behavior: An experiment. Journal of Applied Psychology, 63(4), 451457.CrossRefGoogle Scholar
Hemsley, J. & Mason, R. M. (2013). Knowledge and knowledge management in the social media age. Journal of Organizational Computing and Electronic Commerce, 23(1–2), 138167.CrossRefGoogle Scholar
Henle, C. A. & Blanchard, A. L. (2008). The interaction of work stressors and organizational sanctions on cyberloafing. Journal of Managerial Issues, 20, 383400.Google Scholar
Henle, C. A. & Kedharnath, U. (2012). Cyberloafing in the Workplace 560. In Yan, Z. (Eds.), Encyclopedia of Cyber Behavior. USA: IGI Global.Google Scholar
Hershcovis, M. S. (2011). Incivility, social undermining, bullying … Oh My! A call to reconcile constructs within workplace aggression research. Journal of Organizational Behavior, 32, 499519.CrossRefGoogle Scholar
Higgins, G. E. & Wolfe, S. E. (2008). Digital piracy: An examination of three measurements of self-control. Deviant Behavior, 29, 440460.CrossRefGoogle Scholar
Hobfoll, S. E. (1998). Stress, culture, and community. New York, NY, Plenum Press.CrossRefGoogle Scholar
Hofstede, G. (1991). Cultures and organizations: Software of the mind. New York, NY: McGraw-Hill.Google Scholar
Jin, A. T. B., Ling, D. N. C., & Goh, A. (2004). Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 37(11), 22452255.CrossRefGoogle Scholar
Johnson, M. (2011). Workforce deviance and the business case for employee engagement. The Journal for Quality and Participation, 34(2), 11.Google Scholar
Johnson, P. R. & Indvik, J. (2003). The organizational benefits of reducing cyberslacking in the workplace. Allied Academies International Conference Proceedings; Arden, 8(2), 5359.Google Scholar
Kaplan, H. B. (1975). Self-attitudes and deviant behavior. Pacific Palisades, CA: Coodyear.Google Scholar
Kiesler, S. (1986). The hidden messages in computer networks. Harvard Business Review, 64(1), 4648.Google Scholar
Klotz, A. C. & Buckley, M. R. (2013). A historical perspective of counterproductive work behavior targeting the organization. Journal of Management History, 19(1), 114132.CrossRefGoogle Scholar
Koay, K. Y., Soh, P. C. H., & Chew, K. W. (2017). Antecedents and consequences of cyberloafing: Evidence from the Malaysian ICT Industry. First Monday, 22(3). Retrieved June 16, 2017, from http://firstmonday.org/ojs/index.php/fm/article/view/7302/5968.CrossRefGoogle Scholar
Krishnan, S. (2016). Electronic warfare: A personality model of cyber incivility. Computers in Human Behavior, 64, 537546.CrossRefGoogle Scholar
Kruglanski, A. W. (2001). “That vision thing”: The state of theory in social and personality psychology at the end of the new millennium. Journal of Personality and Social Psychology, 80(6), 871875.CrossRefGoogle Scholar
Larson, S. (June 19, 2017). Data of almost 200 million voters leaked online by GOP analytics firm. Retrieved from http://money.cnn.com/2017/06/19/technology/voter-data-leaked-online-gop/index.html.Google Scholar
Lawrence, T. B. & Robinson, S. L. (2007). Ain’t misbehavin: Workplace deviance as organizational resistance. Journal of Management, 33(3), 378394.CrossRefGoogle Scholar
Lee, E. B. (2017). Cyberbullying. Journal of Black Studies, 48(1), 5773.CrossRefGoogle Scholar
Lee., R. T. & Brotheridge, C. M. (2006). When prey turns predatory: Workplace bullying as a predictor of counteraggression/bullying, coping, and well-being. European Journal of Work and Organizational Psychology, 15(3), 352377.CrossRefGoogle Scholar
Leventhal, G. S. (1980). What should be done with equity theory? In Gergen, K. J., Greenberg, M. S., & Willis, R. H. (Eds.) Social Exchange (pp. 2755). Boston. MA: Springer.CrossRefGoogle Scholar
Liberman, B., Seidman, G., McKenna, K. Y. A., & Buffardi, L. E. (2011). Employee job attitudes and organizational characteristics as predictors of cyberloafing. Computers in Human Behavior, 27, 21922199.CrossRefGoogle Scholar
Lim, V. K. G. (2002). The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(4), 675694.CrossRefGoogle Scholar
Lim, V. K. G. & Chen, D. J. (2012). Cyberloafing at the workplace: Gain or drain on work? Behavior and Information Technology, 31, 343353.CrossRefGoogle Scholar
Lim, V. K.G. & Teo, T.S.H. (2009). Mind your E-manners: Impact of cyber incivility on employees’ work attitude and behavior. Information & Management, 46(8), 419425.CrossRefGoogle Scholar
Maas, A., Cadinu, M., Guarnieri, G., &, Grasselli, A. (2003). Sexual harassment under social identity threat: The computer harassment paradigm. Journal of Personality and Social Psychology, 85(5), 853870.CrossRefGoogle Scholar
Machackova, H. & Pfetsch, J. (2016). Bystanders’ responses to offline bullying and cyberbullying: The role of empathy and normative beliefs about aggression. Scandinavian Journal of Psychology, 57(2), 169176.CrossRefGoogle ScholarPubMed
MacKinnon, C. A. (1979). Sexual harassment of working women: A case of sex discrimination (No. 19). New Haven, CT: Yale University Press.Google Scholar
Mahatanankoon, P., Anandarajan, M., & Igbaria, M. (2004). Development of a measure of personal Web usage in the workplace. CyberPsychology & Behavior, 7(1), 93104.CrossRefGoogle ScholarPubMed
Malhotra, Y. & Galletta, D. (2005) A multidimensional commitment model of volitional systems adoption and usage behavior. Journal of Management Information. Systems, 22(1), 117151.CrossRefGoogle Scholar
Mastrangelo, P. M., Everton, W. J., & Jolton, J. A. (2003). Deviant computer use at work: from bad to worse. Systems, Man and Cybernetics, IEEE International Conference, Washington, DC, USA.CrossRefGoogle Scholar
Mastrangelo, P. M., Everton, W., & Jolton, J.A. (2006). Personal use of work computers: Distraction versus destruction. CyberPsychology & Behavior, 9(6), 730741.CrossRefGoogle ScholarPubMed
McGuire, W. J. (1974). Psychological motives and communication gratification. In Blumler, J. G. & Katz, E. (Eds.), The uses of mass communications: Current perspectives on gratifications research (pp. 167196). Beverly Hills, CA: Sage._Google Scholar
Michailova, S. & Husted, K. (2003). Knowledge-sharing hostility in Russian firms. California Management Review, 45(3), 5977.CrossRefGoogle Scholar
Mills, J. E., Hu, B., Beldona, S., & Clay, J. (2001). Cyberslacking! A liability issue for wired workplaces. Cornell Hotel and Restaurant Administration Quarterly, 2(5), 3447.CrossRefGoogle Scholar
Mirchandani, D. & Motwani, J. (2003). Reducing internet abuse in the workplace. SAM Advanced Management Journal, 68(1), 2228.Google Scholar
Moody, G. D. & Siponen, M. (2013). Using the theory of interpersonal behavior to explain non-work related personal use of the Internet at work. Information & Management, 50, 322335.CrossRefGoogle Scholar
New York Times. (2008). NC school employee fired over Facebook posting. New York Times Company. Retrieved April 27, 2017, from https://search.proquest.com/docview/370252926?accountid=12378.Google Scholar
Nocentini, A., Calmaestra, J., Schultze-Krumbholz, A., Scheithauer, H., Ortega, R., & Menesini, E. (2010). Cyberbullying: Labels, behaviours and definition in three European countries, Australian Journal of Guidance and Counselling, 20(2), 129142.CrossRefGoogle Scholar
Oluwole, D. A. (2009). Spirituality, gender and age factors in cybergossip among Nigerian adolescents. Cyberpsychology & Behavior, 12(3), 323326.CrossRefGoogle ScholarPubMed
O’Neill, T. A., Hambley, L. A., & Bercovich, A. (2014). Prediction of cyberslacking when employees are working away from the office. Computers in Human Behavior, 34, 291298.CrossRefGoogle Scholar
Ophoff, J., Machaka, T., & Stander, A. (2015). Exploring the impact of cyber incivility in the workplace. In Proceedings of Information Science & IT Education Conference (InSITE) (pp. 443–504).CrossRefGoogle Scholar
Oreskovik, A. (2017). A senior engineer at Google wrote a controversial diversity manifesto and employees are furious. Business Insider, August 5. Retrieved December 4, 2017, from www.businessinsider.com/google-engineer-anti-diversity-manifesto-causes-uproar-2017–8.Google Scholar
O’Sullivan, D. (2017). The RNC files: Inside the largest US voter data leak. UpGuard, July 19. Retrieved June 20, 2017, from www.upguard.com/breaches/the-rnc-files.Google Scholar
Park, Y., Fritz, C., & Jex, S. M. (2015). Daily cyber incivility and distress the moderating roles of resources at work and home. Journal of Management, 44(7), 25352557, 0149206315576796.CrossRefGoogle Scholar
Pee, L. G., Woon, I. M. Y., & Kankanhalli, A. (2008). Explaining non-work-related computing in the workplace: A comparison of alternative models. Information & Management, 45(2), 120130.CrossRefGoogle Scholar
Peluchette, J. V., Karl., K., Wood, C., & Williams, J. (2015). Cyberbullying victimization: Do victims’ personality and risky social network behaviors contribute to the problem? Computers in Human Behavior, 52, 424435.CrossRefGoogle Scholar
Pfeffer, J. (1992). Managing with Power: Politics and Influence in Organizations. Boston, MA: Harvard Business Press.Google Scholar
Pittaro, M. L. (2007). Cyber stalking: An analysis of online harassment and intimidation. International Journal of Cyber Criminology, 1(2), 180197.Google Scholar
Porter, M. E. (1985). Competitive Advantage. New York, NY: Free Press.Google Scholar
Privitera, C. & Campbell, M. A. (2009). Cyberbullying: The new face of workplace bullying? Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 12(4), 395400.CrossRefGoogle ScholarPubMed
Raskin, R., Novacek, J., & Hogan, R. (1991). Narcissistic self-esteem management. Journal of Personality and Social Psychology, 60(6), 911.CrossRefGoogle Scholar
Reio, T. G. Jr., (2011). Supervisor and coworker incivility: Testing the work frustration-aggression model. Advances in Developing Human Resources, 13(1), 5468.CrossRefGoogle Scholar
Restubog, S. L. D., Garcia, P. R. J. M., Toledano, L. S., Amarnani, R. K., Tolentino, L. R., & Tang, R. L. (2011). Yielding to (cyber)-temptation: Exploring the buffering role of self-control in the relationship between organizational justice and cyber-loafing behavior in the workplace. Journal of Research in Personality, 45, 247251.CrossRefGoogle Scholar
Roberts, J. A. & David, M. E. (2017). Put down your phone and listen to me: How boss phubbing undermines the psychological conditions necessary for employee engagement. Computers in Human Behavior, 75, 206217.CrossRefGoogle Scholar
Roberts, J. A. & Wasieleski, D. M. (2012). Moral reasoning in computer-based task environments: Exploring the interplay between cognitive and technological factors on individuals’ propensity to break rules. Journal of Business Ethics, 110, 355376.CrossRefGoogle Scholar
Robinson, S. L. & Bennett, R. J. (1995). A typology of deviant workplace behaviors: A multidimensional scaling study. Academy of Management Journal, 38(2), 555572.CrossRefGoogle Scholar
Rogers, M., Smoak, N. D., & Liu, J. (2006). Self-reported deviant computer behavior: A Big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior, 27(3), 245268.CrossRefGoogle Scholar
Rosse, J. G. & Hulin, C. L. (1985). Adaptation to work: An analysis of employee health, withdrawal, and change. Organizational Behavior and Human Decision Processes, 36(3), 324347.CrossRefGoogle Scholar
Salin, D. (2003a). Bullying and organisational politics in competitive and rapidly changing work environments. International Journal of Management and Decision Making, 4(1), 3546.CrossRefGoogle Scholar
Salin, D. (2003b). Ways of explaining workplace bullying: A review of enabling, motivating and precipitating structures and processes in the work environment. Human Relations, 56(10), 12131232.CrossRefGoogle Scholar
Scheier, R. (2001). Watching the watcher. Computer World, 35(34), 3637.Google Scholar
Shamsudin, F. M., Subramaniam, C., & Alshuaibi, A. S. (2012). The effect of HR practices, leadership style on cyberdeviance: The mediating role of organizational commitment. Journal of Marketing and Management, 3(1), 2248.Google Scholar
Sharma, S. K. & Gupta, J. N. D. (2003). Improving workers’ productivity and reducing Internet abuse. Journal of Computer Information Systems, 44(2), 7478.Google Scholar
Sheikh, A., Atashgah, M. S., & Adibzadegan, M. (2015). The antecedents of cyber-loafing: A case study in an Iranian copper industry. Computers in Human Behavior, 51, 172179.CrossRefGoogle Scholar
Shelton, A. K. & Skalski, P. (2014). Blinded by the light: Illuminating the dark side of social network use through content analysis. Computers in Human Behavior, 33, 339348.CrossRefGoogle Scholar
Sipior, J. C. & Ward, B. T. (2002). A strategic response to the broad spectrum of Internet abuse. Information Systems Management, 19(4), 7179.CrossRefGoogle Scholar
Skarlicki, D. P., van Jaarsveld, D. D., & Walker, D. D. (2008). Getting even for customer mistreatment: The role of moral identity in the relationship between customer interpersonal injustice and employee sabotage. Journal of Applied Psychology, 93(6), 13351347.CrossRefGoogle ScholarPubMed
Skinner, B. F. (1953). Science and Human Behavior. New York, NY: MacMillanGoogle Scholar
Spector, P. E. & Fox, S. (2010). Counterproductive work behavior and organizational citizenship behavior: Are they opposite forms of active behavior? Applied Psychology: An International Review, 59(1), 2139.CrossRefGoogle Scholar
Stewart, F. (2000). Internet acceptable use policies: navigating the management, legal, and technical issues. Information Systems Security, 9, 4653.CrossRefGoogle Scholar
Sticca, F. & Perren, S. (2013). Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying. Journal of Youth and Adolescence, 42(5), 739750.CrossRefGoogle ScholarPubMed
Sturgeon, A. (1996). Telework: Threats, risks and solutions. Information Management & Computer Security, 4(2), 2738.CrossRefGoogle Scholar
Tajfel, H. (1982). Social psychology of intergroup relations. Annual Review of Psychology, 33(1), 139.CrossRefGoogle Scholar
Thornton, D., Gunningham, N. A., & Kagan, R. A. (2005). General deterrence and corporate environmental behavior. Law & Policy, 27(2), 262288.CrossRefGoogle Scholar
Urbaczewski, A. & Jessup, L.M. (2002). Does electronic monitoring of employee Internet usage work? Communications of the ACM, 45(1), 8083.CrossRefGoogle Scholar
Urgin, J. C. & Pearson, J. M. (2013). The effects of sanctions and stigmas on cyberloafing. Computers in Human Behavior, 29, 812820.Google Scholar
Väyrynen, K., Hekkala, R., & Liias, T. (2013). Knowledge protection challenges of social media encountered by organizations. Journal of Organizational Computing and Electronic Commerce, 23(1–2), 3455.CrossRefGoogle Scholar
Vigoda-Gadot, E. & Drory, A. (Eds.). (2006). Handbook of Organizational Politics. Cheltenham, UK: Edward Elgar Publishing.CrossRefGoogle Scholar
Vitak, J., Crouse, J., & LaRose, R. (2011). Personal Internet use at work: Understanding cyberslacking. 2009 Fifth International Conference on Intelligent Computing, 27(5), 17511759.Google Scholar
Wagner, D. T., Barnes, C. M., Lim, V. K. G., & Ferris, D. L. (2012). Lost sleep and cyberloafing: Evidence from the laboratory and a daylight saving time quasi-experiment. Journal of Applied Psychology, 97(5), 10681076.CrossRefGoogle Scholar
Weatherbee, T. G. (2007). Cyberaggression in the workplace: Construct development, operationalization, and measurement, Sobey’s School of Business, Saint Mary’s University, Halifax, NS.Google Scholar
Weatherbee, T. G. (2010). Counterproductive use of technology at work: Information & communication technologies and cyberdeviancy. Human Resource Management Review, 20(1), 3544.CrossRefGoogle Scholar
Weatherbee, T. G. & Kelloway, E. K. (2006). A case of cyberdeviancy: Cyberaggression in the workplace. In Kelloway, E. K., Barling, J., & Hurrell, J. J. (Eds.), Handbook of workplace violence (pp. 445487). Thousand Oaks, CA: Sage Publications.CrossRefGoogle Scholar
Wilkowski, B. M. & Robinson, M. D. (2008). The cognitive basis of trait anger and reactive aggression: An integrative analysis. Personality and Social Psychology Review, 12(1), 321.CrossRefGoogle ScholarPubMed
Wolfgang, M. F. (1957). Victim precipitated criminal homicide, Journal of Criminal Law and Criminology, 48(1), 111.Google Scholar
Workman, M. (2010). A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives. Computers & Security, 29(8), 831839.CrossRefGoogle Scholar
Workman, M. (2012). Rash impulsivity, vengefulness, virtual-self and amplification of ethical relativism on cyber-smearing against corporations. Computers in Human Behavior, 28(1), 217225.CrossRefGoogle Scholar
Zapf, D. & Gross, C. (2001). Conflict escalation and coping with workplace bullying: A replication and extension. European Journal of Work and Organizational Psychology, 10(4), 497522.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×