Hollinger, R. (1991). Neutralizing in the workplace: an
empirical analysis of property theft and production
deviance. Deviant Behavior: An Interdisciplinary
Journal, 12, 169–202. https://doi.org/10.1080/01
639625.1991.9967872
Hu, Q., Xu, Z., Dinev, T., & Ling, H. (2011). Does
deterrence work in reducing information security
policy abuse by employees?. Communications of the
ACM, 54(6), 54-60. https://doi.org/10.1145/19531
22.1953142
Huma, Z., Hussain, S., Thurasamy, R., & Malik, M. I.
(2017). Determinants of cyberloafing: a comparative
study of a public and private sector organization.
Internet Research, 27(1), 97-117.
http://dx.doi.org/10.1108/IntR-12-2014-0317
Huseman, R. C., Hatfield, J. D., & Miles, E. W. (1987). A
new perspective on equity theory: The equity
sensitivity construct. Academy of Management
Review, 12(2), 222-234. https://psycnet.apa.org/doi/
10.2307/258531
Ivarsson, L., & Larsson, P. (2011). Personal internet usage
at work: A source of recovery. Journal of Workplace
Rights, 16(1), 63-811. http://dx.doi.org/
10.2190/WR.16.1.e
Kanfer, R., & Heggestad, E. D. (1997). Motivational traits
and skills: A person-centered approach to work
motivation. Research in Organizational Behavior, 19,
1-56. https://www.researchgate.net/publication/
285237369_Motivational_Traits_and_Skills_A_Perso
n-Centered_Approach_to_Work_Motivation.
Kidwell, R. E., Jr., & Martin, C. L. (2005). Managing
Organizational Deviance. SAGE Publications.
Kim S. J., & Byrne, S. (2011), Conceptualizing personal
web usage in work contexts: A preliminary framework.
Computers in Human Behavior, 27 (6), 2271-2283.
https://doi.org/10.1016/j.chb.2011.07.006.
Kim, K., Triana, M. D. C., Chung, K., & Oh, N. (2015).
When do employees cyberloaf? An interactionist
perspective examining personality, justice, and
empowerment. Human Resource Management, 55(6),
1041-1058. https://doi.org/10.1002/hrm.21699
Koay, K. Y., Soh, P. C. H., & Chew, K. W. (2017).
Antecedents and consequences of cyberloafing:
Evidence from the Malaysian ICT industry. First
Monday, 22(3). https://doi.org/10.5210/fm.v22i3.7
302.
Koay, K. Y. (2018). Workplace ostracism and
cyberloafing: A moderated-mediation model. Internet
Research, 28(3), 1122-1141.
http://dx.doi.org/10.1108/IntR-07-2017-0268
Kreiner, G. E. (2006). Consequences of work-home
segmentation or integration: A person-environment fit
perspective. Journal of Organizational Behavior, 27,
485–507. http://dx.doi.org/10.1002/job.386
Lavoie, J. A. A., & Phchyl, T. A. (2001). Cyberslacking
and the procrastination superhighway: A web-survey
of online procrastination, attitudes and emotion. Social
Science and Computer Review, 19(4), 431-444.
https://doi.org/10.1177%2F089443930101900 403
Lazarus, R. S., & Folkman, S. (1984). Stress, Appraisal,
and Coping. Springer.
Leasure, P., & Zhang, G. (2018). “That’s how they taught
us to do it”: Learned deviance and inadequate
deterrents in retail banking. Deviant Behavior, 39(5),
603-616. https://doi.org/10.1080/01639625.2017.12
86179
Li, H., Zhang, J., & Sarathy, R. (2010). Understanding
compliance with internet use policy from the
perspective of rational choice theory. Decision
Support Systems, 48, 635-645.
http://dx.doi.org/10.1016/j.dss.2009.12.005
Li, S. M., & Chung, T. M. (2016). Internet function and
internet addictive behavior. Computers in Human
Behavior, 22(6), 1067-1071. doi:10.1016/j.chb.20
04.03.030.
Liberman, B., Seidman, G., McKenna, K., & Buffardi, L.
(2011. Employee job attitudes and organizational
characteristics as predictors of cyberloafing.
Computers in Human Behaviour, 27(6), 2192-2199.
http://dx.doi.org/10.1016/j.chb.2011.06.015
Lim, V. K. G. (2002). The IT way of loafing on the job:
Cyberloafing, neutralizing and organizational justice.
Journal of Organizational Behavior, 23, 675-694.
https://doi.org/10.1002/job.161
Lim, V. K. G., & Teo, T. S. H. (2005). Prevalence,
perceived seriousness, justification and regulation of
cyberloafing in Singapore: An exploratory study.
Information & Management, 42(8), 1081-1093.
http://dx.doi.org/10.1016/j.im.2004.12.002
Lim, V. K. G., & Chen, D. J. Q. (2012). Cyberloafing at
the workplace: Gain or drain on work?. Behavior &
Information Technology, 31(4), 343–353.
https://doi.org/10.1080/01449290903353054
Lim, V. K. G., Teo, T. S. H., & Loo, G. L. (2002). How do
I loaf here? Let me count the ways. Communications
of the ACM, 45 (1), 66-70.
http://dx.doi.org/10.1145/502269.502300
Lukman, A., & Masood, A. (2020). Enterprise social
media and cyber-slacking: An integrated perspective.
International Journal of Human-Computer
Interaction, 36(15), 1426-1436. https://doi.org/
10.1080/10447318.2020.1752475
Luthans, F. (2002). The need for and meaning of positif
organizational behavior. Journal of Organizational
Behavior, 23(6), 695-706. https://doi.org/10.1002/
job.165
Mastrangelo, P., Everton, W., & Jolton, J, A. (2006).
Personal use of work computers: distraction versus
destruction. Cyber Psychology and Behaviour, 9(6),
730-741. https://doi.org/10.1089/cpb.2006.9.730
Mazidi, A. K., Rahimnia, F., Mortazavi, S., & Lagzian, M.
(2020). Cyberloafing in public sector of developing
countries: Job embeddedness as a context. Personnel
Review, Vol. ahead-of-print, No. ahead-of-print.
https://doi.org/10.1108/PR-01-2020- 0026
Moody, G. D., & Siponen, M. (2013). Using the theory of
interpersonal behavior to explain non-work- related
personal use of the Internet at work. Information &