-
C.
Fornell,
D.
Larcker
(1981)
Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics:
Journal of Marketing Research, 18
-
Chun-Yan
Zhang,
Gee-Woo
Bock
(2006)
Why Employees Do Non-Work-Related Computing: An Investigation of Factors Affecting NWRC in a Workplace
-
Gefen,
Rigdon,
Straub
(2011)
Editor's Comments: An Update and Extension to SEM Guidelines for Administrative and Social Science Research
Management Information Systems Quarterly, 35
-
Andrew
Urbaczewski,
L.
Jessup
(2002)
Does electronic monitoring of employee internet usage work?
Commun. ACM, 45
-
Thurasamy
Ramayah
(2010)
Personal web usage and work inefficiency
Business Strategy Series, 11
-
Shancang
Li,
Lida
Xu,
Shanshan
Zhao
(2015)
The internet of things: a survey
Information Systems Frontiers, 17
-
Dysfunctional workplace behaviour
The Sage Handbook of Organizational Behavior, 1
-
D.
Gefen,
Edward
Rigdon,
D.
Straub
(2011)
An Update and Extension to SEM Guidelines for Admnistrative and Social Science Research
Management Information Systems Quarterly, 35
-
N.
Islam,
R.
Anand,
T.
Jaeger,
J.
Rao
(1997)
A Flexible Security System for Using Internet Content
IEEE Softw., 14
-
10.4018/978-1-59140-148-3.ch002
-
J.
George
(2004)
The theory of planned behavior and Internet purchasing
Internet Res., 14
-
Personality as a predictor of workplace internet use
-
L.
Fong,
R.
Law
(2013)
A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)
European Journal of Tourism Research, 6
-
J.
D'Arcy,
A.
Hovav
(2007)
Deterring internal information systems misuse
Commun. ACM, 50
-
V.
Lim,
Thompson
Teo
(2005)
Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore: An exploratory study
Inf. Manag., 42
-
J.
Stanton
(2002)
Company profile of the frequent internet user
Commun. ACM, 45
-
T.
Betts,
Andrew
Setterstrom,
J.
Pearson,
S.
Totty
(2014)
Explaining Cyberloafing through a Theoretical Integration of Theory of Interpersonal Behavior and Theory of Organizational Justice
J. Organ. End User Comput., 26
-
Shancang
Li,
Lida
Xu,
Xinheng
Wang
(2013)
Compressed Sensing Signal and Data Acquisition in Wireless Sensor Networks and Internet of Things
IEEE Transactions on Industrial Informatics, 9
-
Elisa
Bortolani,
G.
Favretto
(2009)
Organizational Aspects of Cyberloafing
-
C.
Andreassen,
T.
Torsheim,
S.
Pallesen
(2014)
Predictors of Use of Social Network Sites at Work - A Specific Type of Cyberloafing
J. Comput. Mediat. Commun., 19
-
W.
Block
(2011)
Cyberslacking, Business Ethics and Managerial Economics
Journal of Business Ethics, 33
-
Irene
Woon,
L.
Pee
(2004)
Behavioral Factors Affecting Internet Abuse in the Workplace – An Empirical Investigation
-
S.
Sharma,
J.
Gupta
(2004)
Improving Workers' Productivity and Reducing Internet Abuse
Journal of Computer Information Systems, 44
-
V.
Lim,
Thompson
Teo,
Geok
Loo
(2002)
How do I loaf here? let me count the ways
Commun. ACM, 45
-
Hairong
Yan,
Li
Xu,
Z.
Bi,
Zhibo
Pang,
Jie
Zhang,
Yong
Chen
(2015)
An emerging technology – wearable wireless sensor networks with applications in human health condition monitoring
, 2
-
M.
Eastin,
Carroll
Glynn,
R.
Griffiths
(2007)
Psychology of Communication Technology Use in the Workplace
Cyberpsychology & behavior : the impact of the Internet, multimedia and virtual reality on behavior and society, 10 3
-
Claire
Simmers
(2002)
Aligning internet usage with business priorities
Commun. ACM, 45
-
L.
Pee,
Irene
Woon,
A.
Kankanhalli
(2008)
Explaining non-work-related computing in the workplace: A comparison of alternative models
Inf. Manag., 45
-
M.
Griffiths
(2010)
Internet abuse and internet addiction in the workplace
Journal of Workplace Learning, 22
-
F.
Yilmaz,
Ramazan
Yılmaz,
H.
Öztürk,
Baris
Sezer,
Tugra
Karademir
(2015)
Cyberloafing as a barrier to the successful integration of information and communication technologies into teaching and learning environments
Comput. Hum. Behav., 45
-
Lynette
Armstrong,
J.
Phillips,
L.
Saling
(2000)
Potential determinants of heavier internet usage
Int. J. Hum. Comput. Stud., 53
-
A.
Peace,
D.
Galletta,
J.
Thong
(2003)
Software Piracy in the Workplace: A Model and Empirical Test
-
Jo
Oravec
(2002)
Constructive approaches to internet recreation in the workplace
Commun. ACM, 45
-
Meltem
Baturay,
Sacip
Toker
(2015)
An investigation of the impact of demographics on cyberloafing from an educational setting angle
Comput. Hum. Behav., 50
-
Jakob
Branger,
Zhibo
Pang
(2015)
From automated home to sustainable, healthy and manufacturing home: a new story enabled by the Internet-of-Things and Industry 4.0
, 2
-
Ruth
Guthrie,
P.
Gray
(1996)
Junk Computing - Is it Bad for an Organization?
Inf. Syst. Manag., 13
-
B.
Verplanken,
S.
Orbell
(2003)
Reflections on past behavior: A self-report index of habit strength
Journal of Applied Social Psychology, 33
-
M.
Conner,
C.
Armitage
(1998)
Extending the Theory of Planned Behavior: A Review and Avenues for Further Research
Journal of Applied Social Psychology, 28
-
Internet surfing
Industry Week, 249
-
M.
Jamali,
Hatra
Voghouei,
N.
Nor
(2015)
Information technology and survival of SMEs: an emprical study on Malaysian manufacturing sector
Information Technology and Management, 16
-
Waiman
Cheung,
M.
Chang,
V.
Lai
(2000)
Prediction of Internet and World Wide Web usage at work: a test of an extended Triandis model
Decis. Support Syst., 30
-
C.
Fornell,
D.
Larcker
(1981)
Evaluating structural equation models with unobservable variables and measurement error.
Journal of Marketing Research, 18
-
An update and extension to SEM guidelines for administrative and social science research
MIS Quarterly, 35
-
Edward
Rigdon,
C.
Ringle,
M.
Sarstedt
(2010)
Structural modeling of heterogeneous data with partial least squares
, 7
-
O.
Lee,
Kai
Lim,
W.
Wong
(2005)
Why Employees Do Non-Work-Related Computing: An Exploratory Investigation through Multiple Theoretical Perspectives
Proceedings of the 38th Annual Hawaii International Conference on System Sciences
-
W.
Reinartz,
M.
Haenlein,
J.
Henseler
(2009)
An Empirical Comparison of the Efficacy of Covariance-Based and Variance-Based SEM
International Journal of Research in Marketing, 26
-
L.
Atzori,
A.
Iera,
G.
Morabito
(2010)
The Internet of Things: A survey
Comput. Networks, 54
-
Kevin
Askew,
John
Buckner,
Meng
Taing,
A.
Ilie,
J.
Bauer,
M.
Coovert
(2014)
Explaining cyberloafing: The role of the theory of planned behavior
Comput. Hum. Behav., 36
-
P.
Lara,
Domingo
Tacoronte,
Jyh-Ming
Ding
(2006)
Do current anti-cyberloafing disciplinary practices have a replica in research findings?: A study of the effects of coercive strategies on workplace Internet misuse
Internet Res., 16
-
H.
Jamaluddin,
Z.
Ahmad,
Mazni
Alias,
Maimun
Simun
(2015)
Personal Internet use: The use of personal mobile devices at the workplace
Procedia - Social and Behavioral Sciences, 172
-
I.
Akman,
A.
Mishra
(2010)
Predictive Effect of Gender and Sector Differences on Internet Usage Among Employees
The Engineering Economics, 21
-
Lisa
Seymour,
K.
Nadasen
(2007)
Web access for IT staff: a developing world perspective on web abuse
Electron. Libr., 25
-
Yeolib
Kim,
Jae-Seon
Jeong
(2015)
Personality predictors for the use of multiple internet functions
Internet Res., 25
-
B.
Liberman,
Gwendolyn
Seidman,
Katelyn
McKenna,
Laura
Buffardi
(2011)
Employee job attitudes and organizational characteristics as predictors of cyberloafing
Comput. Hum. Behav., 27
-
K.
Siau,
F.
Nah,
Limei
Teng
(2002)
Acceptable internet use policy
Commun. ACM, 45
-
Wenan
Tan,
Wenan
Tan,
Senbo
Chen,
Jingxian
Li,
Lingxia
Li,
Tong
Wang,
Xiaoming
Hu
(2014)
A Trust Evaluation Model for E-Learning Systems
Systems Research and Behavioral Science, 31
-
V.
Lim,
Don
Chen
(2012)
Cyberloafing at the workplace: gain or drain on work?
Behaviour & Information Technology, 31
-
S.
Slater
(1995)
Issues in conducting marketing strategy research
Journal of Strategic Marketing, 3
-
Lida
Xu,
Wu
He,
Shancang
Li
(2014)
Internet of Things in Industries: A Survey
IEEE Transactions on Industrial Informatics, 10
-
F.
Rahimnia,
A.
Mazidi
(2015)
Functions of control mechanisms in mitigating workplace loafing; evidence from an Islamic society
Comput. Hum. Behav., 48
-
J.
Henseler,
C.
Ringle,
R.
Sinkovics
(2009)
The Use of Partial Least Squares Path Modeling in International Marketing
-
M.
Chang,
Waiman
Cheung
(2001)
Determinants of the intention to use Internet/WWW at work: a confirmatory study
Inf. Manag., 39
-
A.
Whitmore,
Anurag
Agarwal,
Lida
Xu
(2015)
The Internet of Things—A survey of topics and trends
Information Systems Frontiers, 17
-
A.
Taneja,
Vincent
Fiore,
Briana
Fischer
(2015)
Cyber-slacking in the classroom: Potential for digital distraction in the new age
Comput. Educ., 82
-
Manish
Gupta,
R.
Narain
(2015)
A fuzzy ANP based approach in the selection of the best E-Business strategy and to assess the impact of E-Procurement on organizational performance
Information Technology and Management, 16
-
V.
Lim
(2002)
The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice
Journal of Organizational Behavior, 23
-
Jessica
Vitak,
Julia
Waddell,
R.
LaRose
(2011)
Personal Internet use at work: Understanding cyberslacking
Comput. Hum. Behav., 27
-
Hongming
Cai,
Lida
Xu,
Boyi
Xu,
C.
Xie,
S.
Qin,
Lihong
Jiang
(2014)
IoT-Based Configurable Information Service Platform for Product Lifecycle Management
IEEE Transactions on Industrial Informatics, 10
-
Slaven
Brumec
(2008)
PREDICTING THE INTENTION TO USE INTERNET – A COMPARATIVE STUDY
Journal of information and organizational sciences, 30
-
M.
Anandarajan
(2002)
Profiling Web Usage in the Workplace: A Behavior-Based Artificial Intelligence Approach
Journal of Management Information Systems, 19
-
Jennifer
Lavoie,
T.
Pychyl
(2001)
Cyberslacking and the Procrastination Superhighway
Social Science Computer Review, 19
-
D.
Galletta,
P.
Polak
(2003)
An Empirical Investigation of Antecedents of Internet Abuse in the Workplace
-
Geng
Yang,
Li
Xie,
M.
Mäntysalo,
Xiaolin
Zhou,
Zhibo
Pang,
Lida
Xu,
S.
Kao-Walter,
Qiang
Chen,
Li-Rong
Zheng
(2014)
A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor, and Intelligent Medicine Box
IEEE Transactions on Industrial Informatics, 10
-
Chloris
Jiang
(2014)
Internet addiction among young people in China: Internet connectedness, online gaming and academic performance decrement
Internet Res., 24
-
Gregory
Moody,
M.
Siponen
(2013)
Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work
Inf. Manag., 50
-
K.
Young,
Carl
Case
(2004)
Internet Abuse in the Workplace: New Trends in Risk Management
Cyberpsychology & behavior : the impact of the Internet, multimedia and virtual reality on behavior and society, 7 1
-
Determinants of adverse usage of information systems assets: a study of antecedents of IS emploit in organizations
-
I.
Akman,
A.
Mishra
(2009)
Ethical behavior issues in software use: An analysis of public and private sectors
Comput. Hum. Behav., 25
-
Anita
Blanchard,
Christine
Henle
(2008)
Correlates of different forms of cyberloafing: The role of norms and external locus of control
Comput. Hum. Behav., 24
-
Cornelius
König,
Mariette
Guardia
(2014)
Exploring the positive side of personal internet use at work: Does it help in managing the border between work and nonwork?
Comput. Hum. Behav., 30