1. Anandarajan, M., Igbaria, M., & Anakwe, U. P. (2002). IT acceptance in a lessdeveloped country: A motivational factor perspective. International Journal of Information Management, 22(1), 47-65. [Google Scholar] [
DOI:10.1016/S0268-4012(01)00040-8]
2. Andreassen, C. S., Torsheim, T., & Pallesen, S. (2014). Predictors of use of social network sites at work - A specific type of cyberloafing. Journal of Computer-Mediated Communication, 19(4), 906-921. [Google Scholar] [
DOI:10.1111/jcc4.12085]
3. Askew, K., Buckner, J. E., Taing, M. U., Ilie, A., Bauer, J. A., & Coovert, M. D. (2014). Explaining cyberloafing: The role of the theory of planned behavior. Computers in Human Behavior, 36, 510-519. [Google Scholar] [
DOI:10.1016/j.chb.2014.04.006]
4. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787-2805. [Google Scholar] [
DOI:10.1016/j.comnet.2010.05.010]
5. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211. [Google Scholar] [
DOI:10.1016/0749-5978(91)90020-T]
6. Barlow, J., Bean, L., & Hott, D. D. (2003). Employee ?spy? software: Should you use it? Journal of Corporate Accounting & Finance, 14(4), 7-12. [Google Scholar] [
DOI:10.1002/jcaf.10162]
7. Belk, R. (2014). Digital consumption and the extended self. Journal of Marketing Management, 30(11-12), 1101-1118. [Google Scholar] [
DOI:10.1080/0267257X.2014.939217]
8. Bequai, A. (1998). Balancing legal concerns over crime and security in cyberspace. Computers & Security, 17(4), 293-298. [Google Scholar] [
DOI:10.1016/S0167-4048(98)80008-4]
9. Blanchard, A. L., & Henle, C. A. (2008). Correlates of different forms of cyberloafing: The role of norms and external locus of control. Computers in Human Behavior, 24(3), 1067-1084. [Google Scholar] [
DOI:10.1016/j.chb.2007.03.008]
10. Blau, G., Yang, Y., & Ward-Cook, K. (2006). Testing a measure of cyberloafing. Journal of Allied Health, 35(1), 9-17. [Google Scholar]
11. Bock, G.-W., Park, S. C., & Zhang, Y. (2010). Why employees do non-work-related computing in the workplace. Journal of Computer Information Systems, 50(3). [Google Scholar]
12. Carmeli, A., Sternberg, A., & Elizur, D. (2008). Organizational culture, creative behavior, and information and communication technology (ICT) usage: A facet analysis. Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 11(2), 175-180. [Google Scholar] [
DOI:10.1089/cpb.2007.0037]
13. Cinar, O., Karciooglu, F. (2015). The relationship between cyber loafing and organizational citizenship behavior: A survey study in Erzurum/Turkey. 11th International Strategic Management Conference. Michigan Retirement Research Center Research. [Google Scholar] [
DOI:10.1016/j.sbspro.2015.10.114]
14. Chen, J. V., Ross, W. H., & Yang, H.-H. (2011). Personality and motivational factors predicting internet abuse at work. Cyberpsychology: Journal of Psychosocial Research on Cyberspace., 5(1). [Google Scholar]
15. Chou, C., Condron, L., & Belland, J. (2005). A Review of the Research on Internet Addiction. Educational Psychology Review, 17(4), 363-388. [Google Scholar] [
DOI:10.1007/s10648-005-8138-1]
16. Davis, R. a., Flett, G. L., & Besser, A. (2002). Validation of a new scale for measuring problematic internet use: Implications for pre-employment screening. Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 5(4), 331-345. [Google Scholar] [
DOI:10.1089/109493102760275581]
17. De Lara, P. Z. M., & Rodríguez, T. F. E. (2007). Organizational anomie as moderator of the relationship between an unfavorable attitudinal environment and citizenship behavior (OCB): An empirical study among university administration and services personnel. Personnel Review, 36(6), 843-866. [Google Scholar] [
DOI:10.1108/00483480710822391]
18. Eddy, E. R., D'Abate, C, P., Thurston Jr, T, W. (2010). Explaining Engagement in Personal Activities on Company Time. Personnel Review, Vol. 39, No. 3, 1-15. [Google Scholar] [
DOI:10.1108/00483481011064181]
19. Elwell, J. S. (2014). The transmediated self: Life between the digital and the analog. Convergence: The International Journal of Research into New Media Technologies., 20(2), 233-249. [Google Scholar] [
DOI:10.1177/1354856513501423]
20. Everton, W. J., Mastrangelo, P. M., & Jolton, J. A. (2005). Personality correlates of employees' personal use of work computers. CyberPsychology & Behavior, 8(2), 143-153. [Google Scholar] [
DOI:10.1089/cpb.2005.8.143]
21. Galperin, B. L., & Burke, R. J. (2006). Uncovering the relationship between workaholism and workplace destructive and constructive deviance: An exploratory study. The International Journal of Human Resource Management, 17(2), 331-347. [Google Scholar] [
DOI:10.1080/09585190500404853]
22. García-Morales, V. J., Jiménez-Barrionuevo, M. M., & Gutiérrez-Gutiérrez, L. (2012). Transformational leadership influence on organizational performance through organizational learning and innovation. Journal of Business Research, 65(7), 1040-1050. [Google Scholar] [
DOI:10.1016/j.jbusres.2011.03.005]
23. Garrett, R. K., & Danziger, J. N. (2008). On cyberslacking: Workplace status and personal internet use at work. Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 11(3), 287-292. [Google Scholar] [
DOI:10.1089/cpb.2007.0146]
24. Gholipour, A., Bamdad, M. (2012). Typology of the values of individuals and its relation to Internet web browsing. The first national congress of cybercrime and emerging social harm. (In Persian). [Google Scholar]
25. Hartijasti, Y., & Fathonah, N. (2014). Cyberloafing Across Generation X and Y in Indonesia. Journal of Information Technology Applications & Management, 21(1), 1-16. [Google Scholar]
26. Henle, C. A., & Blanchard, A. L. (2008). The interaction of work stressors and organizational sanctions on cyberloafing. Journal of Managerial Issues, 20(3), 383-400. [Google Scholar] [
DOI:10.1037/t13460-000]
27. Henle, C. A., Kohut, G., & Booth, R. (2009). Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: An empirical test of justice theory. Computers in Human Behavior, 25(4), 902-910. [Google Scholar] [
DOI:10.1016/j.chb.2009.03.005]
28. König, C. J., & Caner de la Guardia, M. E. (2014). Exploring the positive side of personal internet use at work: Does it help in managing the border between work and nonwork? Computers in Human Behavior, 30, 355-360. [Google Scholar] [
DOI:10.1016/j.chb.2013.09.021]
29. Liberman, B., Seidman, G., McKenna, K. Y. a., & Buffardi, L. E. (2011). Employee job attitudes and organizational characteristics as predictors of cyberloafing. Computers in Human Behavior, 27(6), 2192-2199. [Google Scholar] [
DOI:10.1016/j.chb.2011.06.015]
30. Lim, V. K. G. (2002). The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675-694 (April). [Google Scholar] [
DOI:10.1002/job.161]
31. Lim, V. K. G., & Teo, T. S. H. (2005). Prevalence, perceived seriousness, justification and regulation of cyberloafing in Singapore. Information & Management, 42(8), 1081-1093. [Google Scholar] [
DOI:10.1016/j.im.2004.12.002]
32. Mahatanankoon, P., Anandarajan, M., & Igbaria, M. (2004). Development of a measure of personal web usage in the workplace. Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 7(1), 93-104. [Google Scholar] [
DOI:10.1089/109493104322820165]
33. Martin, L. E., Brock, M. E., Buckley, M. R., & Ketchen, D. J. (2010). Time banditry: Examining the purloining of time in organizations. Human Resource Management Review, 20(1), 26-34. [Google Scholar] [
DOI:10.1016/j.hrmr.2009.03.013]
34. Mastrangelo, P. M., Everton, W., & Jolton, J. a. (2006). Personal use of work computers: Distraction versus destruction. Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society, 9(6), 730-741. [Google Scholar] [
DOI:10.1089/cpb.2006.9.730]
35. Mousavi Arfa, M, H., Rouhani, S. (2013). Study the causes and consequences of cyberlofing. Media and Culture. Third Year, No. 1, 135-157. (In Persian). [Google Scholar]
36. Pelling, E. L., & White, K. M. (2009). The theory of planned behavior applied to young people's use of social networking web sites. CyberPsychology & Behavior, 12(6), 755-759. [Google Scholar] [
DOI:10.1089/cpb.2009.0109]
37. Restubog, S. L. D., Garcia, P. R. J. M., Toledano, L. S., Amarnani, R. K., Tolentino, L. R., & Tang, R. L. (2011). Yielding to (cyber)-temptation: Exploring the buffering role of self-control in the relationship between organizational justice and cyberloafing behavior in the workplace. Journal of Research in Personality, 45(2), 247-251. [Google Scholar] [
DOI:10.1016/j.jrp.2011.01.006]
38. Saleem, H., Beaudry, A., & Croteau, A.-M. (2011). Antecedents of computer selfefficacy: A study of the role of personality traits and gender. Computers in Human Behavior, 27(5), 1922-1936. [Google Scholar] [
DOI:10.1016/j.chb.2011.04.017]
39. Seymour, L., & Nadasen, K. (2007). Web access for IT staff: A developing world perspective on web abuse. The Electronic Library, 25(5), 543-557. [Google Scholar] [
DOI:10.1108/02640470710829532]
40. Ugrin, J. C., & Michael Pearson, J. (2013). The effects of sanctions and stigmas on cyberloafing. Computers in Human Behavior, 29(3), 812-820. [Google Scholar] [
DOI:10.1016/j.chb.2012.11.005]
41. Vitak, J., Crouse, J., & LaRose, R. (2011). Personal Internet use at work: Understanding cyberslacking. Computers in Human Behavior, 27(5), 1751-1759. [Google Scholar] [
DOI:10.1016/j.chb.2011.03.002]
42. Weatherbee, T. G. (2010). Counterproductive use of technology at work: Information & communications technologies and cyberdeviancy. Human Resource Management Review, 20(1), 35-44. [Google Scholar] [
DOI:10.1016/j.hrmr.2009.03.012]
43. Yellowlees, P. M., & Marks, S. (2007). Problematic internet use or internet addiction? Computers in Human Behavior, 23(3), 1447-1453. [Google Scholar] [
DOI:10.1016/j.chb.2005.05.004]
44. Zoghbi-Manrique-de-Lara, P. (2009). Inequity, conflict, and compliance dilemma as causes of cyberloafing. International Journal of Conflict Management, 20(2), 188-201. [Google Scholar] [
DOI:10.1108/10444060910949630]
45. Zoghbi-Manrique-de-Lara, P. (2011). Reconsidering the boundaries of the cyberloafing activity: The case of a university. Behaviour & Information Technology, 31(5), 469-479. [Google Scholar] [
DOI:10.1080/0144929X.2010.549511]
46. Zoghbi-Manrique-de-Lara, P., & Olivares-Mesa, A. (2010). Bringing cyber loafers back on the right track. Industrial Management & Data Systems, 110(7), 1038-1053. [Google Scholar] [
DOI:10.1108/02635571011069095]
47. Zoghbi Manrique de Lara, P., Verano Tacoronte, D., & Ting Ding, J. (2006). Do current anti-cyberloafing disciplinary practices have a replica in research findings? Internet Research, 16(4), 450-467. [Google Scholar] [
DOI:10.1108/10662240610690052]