References

1. Novosel v. Nationwide Insurance Company. (1983). United States Court of appeals, Third Circuit 721 F.2d 894.

2. Sovereign, K. L. (1994). Personnel law. Englewood Cliffs, NJ: Prentice-Hall.

3. Martinko, M. J., Gundlach, M. J. & Douglas, S. C. (2002). Toward an integrative theory of counterproductive workplace behavior: A causal reasoning perspective. International Journal of Selection and Assessment, 10, 36–50.

4. Beadle, J. (2020). The legal briefing. A newsletter from the law firm of Spira, Beadle & McGarrell. Palm Bay, Florida.

5. Van Zant, K. (1991). HR law. Atlanta, GA: Gerber-Alley Press.

6. Fischer, S. F. (2010). International cyberlaw. In H. Bidgoli (Ed.). The handbook of technology management (pp. 717–726). Hoboken, NJ: John Wiley & Sons.

7. Jenkins, J. A. (2011). The American courts. Boston: Jones & Bartlett Learning.

8. Ball, K., & Webster, F. (2003). The intensification of surveillance: Crime, terrorism and warfare in the information era. London, UK: Pluto Press.

9. Grama, J. L. (2011). Legal issues in information security. Boston, MA: Jones & Bartlett Learning.

10. Thomas, T. (2004). Network security: First step. Indianapolis, IN: Cisco Press.

11. Harvey, C (2007). The boss has new technology to spy on you. Datamation, April, 1–5.

12. Fairweather, B. N. (1999). Surveillance in employment: The case of teleworking. Journal of Business Ethics, 22, 39–49.

13. Ballad, B., Ballad, T., & Banks, E. K. (2011). Access control, authentication, and public key infrastructure. Boston, MA: Jones & Bartlett Learning.

14. D’Urso, S. C. (2006). Who’s watching us at work? Toward a structural-perceptual model of electronic monitoring and surveillance in organizations. Communication Theory, 16, 281–303.

15. Lee, S., & Kleiner, B. H. (2003). Electronic surveillance in the workplace. Management Research News, 26, 72–81.

16. Workman, M., Bommer, W., & Straub, D. (2009). The amplification effects of procedural justice with a threat control model of information systems security. Journal of Behavior and Information Technology, 28, 563–575.

17. Workman, M., & Gathegi, J. (2007). Punishment and ethics deterrents: A comparative study of insider security contravention. Journal of American Society for Information Science and Technology, 58, 318–342.

18. People v. Zelinski, 155 Cal.Rptr. 575 (1979).

19. Swink, D. R. (2001). Telecommuter law: A new frontier in legal liability, American Business Law Journal, 38, 857.

20. Tonsing, M. (1999). Welcome to the digital danger zone: Say hello to the virtual workforce of the next millennium, 46 (July) Federal Lawyer 19.

21. Knudsen, K. H. (2010) Cyber law. In H. Bidgoli (Ed.) The handbook of technology management, (pp. 704–716). NY: John Wiley & Sons.

22. Open Security Foundation (2010). AvMed Health Plans security breach: Lost or stolen laptops. http://datalossdb.org/incidents.

23. Rosen, J. (2000). The unwanted gaze: The destruction of privacy in America. NY: Random House.

24. Himma, K E. (2010). Legal, social, and ethical issues of the Internet. In H. Bidgoli (Ed.) The handbook of technology management (pp. 753–775). NY: John Wiley & Sons.

25. Commonwealth v. Brion, 652 A.2d 287, 289 (Pa. 1994).

26. Monitoring Employee E-Mail And Internet Usage: Avoiding The Omniscient Electronic Sweatshop: Insights From Europe 2005.7. University of Pennsylvania Journal of Labor and Employment Law 829.

27. Nichols, Donald H. (2000), Window peeping in the workplace: A look into employee privacy in a technological era, 27 Wm Mitchell L. Rev 1587.

28. Northwest Airlines v. Local 2000 Civ. No. 00-08 (D. Minn. Jan. 4, 2000).

29. Ortega v. O’Connor, 480 U.S. 709 (1987).

30. Bandura, A. (1986). Social foundations of thought and action. Englewood Cliffs, NJ: Prentice-Hall.

31. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.

32. Arkes, H. R., & Garske, J. P. (1982). Psychological theories of motivation. Monterey, CA: Brooks/Cole.

33. Skinner, B. F. (1960). Are theories of learning necessary? Psychological Review, 57, 193–216.

34. Neuringer, A. (2002). Operant variability: Evidence, functions, and theory. Psychonomic Bulletin & Review, 9, 672–705.

35. Schifreen, R. (2006). Defeating the hacker. NY: John Wiley & Sons.

36. Lipinski, T. A., Buchanan, E. A., & Britz, J. J. (2002). Sticks and stones and words that harm: Liability vs. responsibility, section 230 and defamatory speech in cyberspace. Ethics and Information Technology, 4, 143–158.

37. Solomon, M. G., & Chapple, M. (2005). Information security illuminated. Boston, MA: Jones & Bartlett Learning.

38. Bresz, F. P. (2004). People – Often the weakest link in security, but one of the best places to start. Journal of Health Care Compliance, Jul-Aug, 57–60.

39. Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of IS017799. Computers & Security, 24, 472–484.

40. Ryan, J.J.C.H. (2007). Plagiarism, education, and information security, IEEE Security & Privacy, 5, 62–65.

41. Sherif, J. S., Ayers, R. & Dearmond, T. G. (2003). Intrusion detection: The art and the practice. Information Management and Computer Security, 11, 175–186.

42. Workman, M., Bommer, W. H., & Straub, D. (2008). Security lapses and the omission of information security measures: An empirical test of the threat control model, Journal of Computers in Human Behavior, 24, 2799–2816.

43. Ruighaver, A. B., Maynard, S. B., & Chang, S. (2007). Organisational security culture: Extending the end-user perspective. Computers & Security, 26(1), 56–62. ISSN 0167-4048, https://doi.org/10.1016/j.cose.2006.10.008.

44. Post, V. G., & Kagan, A. (2007). Evaluating information security tradeoffs: Restricting access can interfere with user tasks, Computers & Security, 26(3), 229–237. ISSN 0167-4048, https://doi.org/10.1016/j.cose.2006.10.004.

45. Burns T. , & Stalker G. M. (1961). The management of innovation. London: Tavistock.

46. Kramer, J. (2010). Non-compete agreements: Are they enforceable?—It depends! US Business, 4, 82–87.

47. Bragdon, C. R. (2008). Transportation security. Amsterdam: Elsevier/Butterworth Press.

48. Grothmann T. & Reusswig F.i.D. (2004). People at risk of flooding: why some residents take precautionary action while others do not. Natural Hazards, 38, 101–120.

49. Van Zant, K. (1991). HR law. Atlanta, GA: Gerber-Alley Press.

50. Kabay, M. (2000). Social psychology and infosec. The Risks Digest, 15, 1–6.

51. Kankanhalli, A. T., Tan, B. C. Y., & Wei, K.-K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23, 139–154.

52. Calluzzo, V J., & Cante, C J. (2004). Ethics in information technology and software use. Journal of Business Ethics, 51, 301-312.

53. Honeynet Team. (2004). The honeynet project: Know your enemy. New York: Addison-Wesley.

54. Workman, M. (2019). Antecedents of social media activism: An analytical study of sentiment and action. Behavior & Information Technology Journal, 11(3), 22–34.

55. Rogers, C. R. (1957). The necessary and sufficient conditions of therapeutic personality change. Journal of Consulting Psychology, 21, 95–103.

56. Skinner, B. F. (1960). Are theories of learning necessary? Psychological Review, 57, 193–216.

57. Ajzen, I. (2002). Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. Journal of Applied Social Psychology, 32, 665–683.

58. Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making, IEEE Security and Privacy, 3, 26–33.

59. Costa, P. T., Jr., & McCrae, R. R. (1995). Domains and facets: Hierarchical personality assessment using the revised NEO personality inventory. Journal of Personality Assessment, 64, 21–50.

60. Judge, T. A., & Ilies, R. (2002). Relationship of personality to performance motivation: A meta-analytic review. Journal of Applied Psychology, 87, 797–807.

61. Whitty, M. T. (2008). Liberating or debilitating? An examination of romantic relationships, sexual relationships and friendships on the net. Computers in Human Behavior, 24, 1837–1850.

62. Tapp, J.L., & Kohlberg, L. (1977) Developing senses of law and legal justice. In J.L. Tapp & F.J. Levine (Eds.), Law, justice, and the individual in society: Psychlogical and legal issues (pp. 96-97). New York: Holt, Rinehart & Winston.

63. Ford, B. (2009, July). Don’t feed the trolls. Waverider Computer Connection, 7–11.

64. Beck, K., & Wilson, C. (2001). Have we studied, should we study, and can we study the development of commitment? Methodological issues and the developmental study of work-related commitment. Human Resource Management Review, 11, 257−278.

65. Beck, L., & Ajzen, I. (1991). Predicting dishonest actions using the theory of planned behaviour. Journal of Research in Personality, 25, 285–301.

66. Ivancevich, J. M., Konopaske, R., & Matteson, M. T. (2008). Organizational behavior and management. Boston: McGraw-Hill.

67. Whitty, M. T. (2008). Liberating or debilitating? An examination of romantic relationships, sexual relationships and friendships on the net. Computers in Human Behavior, 24, 1837–1850.

68. Millon, T., & Grossman, S. (2007). Overcoming resistant personality disorders: A personalized psychotherapy. New York: Wiley.

69. Clark, M. S., & Waddell, B. (1985). Perceptions of exploitation in communal and exchange relationships. Journal of Social and Personal Relationships, 2(4), 403–418.

70. Workman, M., & Gathegi, J. (2007). Punishment and ethics deterrents: A comparative study of insider security contravention. Journal of American Society for Information Science and Technology, 58, 318–342.

71. Straub, D. W., & Nance, W. D. (1990). Discovering and disciplining computer abuse in organizations: A field study. MIS Quarterly, 14, 45–62.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.223.21.5