{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T06:19:53Z","timestamp":1762928393746,"version":"build-2065373602"},"reference-count":65,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Information Management"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1016\/j.ijinfomgt.2015.12.005","type":"journal-article","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T13:47:18Z","timestamp":1451915238000},"page":"309-321","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":26,"title":["Procedural justice to enhance compliance with non-work-related computing (NWRC) rules: Its determinants and interaction with privacy concerns"],"prefix":"10.1016","volume":"36","author":[{"given":"Jai-Yeol","family":"Son","sequence":"first","affiliation":[]},{"given":"Jongpil","family":"Park","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0005","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1037\/0021-9010.80.3.339","article-title":"Electronic performance monitoring and social context: impact on productivity and stress","volume":"80","author":"Aiello","year":"1995","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0010","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.obhdp.2005.03.003","article-title":"Feedback's influence on the perceived fairness of computer performance monitoring: an empirical investigation","volume":"97","author":"Alder","year":"2005","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0015","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1037\/0021-9010.86.4.797","article-title":"Effects of computer surveillance on perceptions of privacy and procedural justice","volume":"86","author":"Alge","year":"2001","journal-title":"Journal of Applied Psychology"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0020","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1177\/002224377701400320","article-title":"Estimating nonresponse bias in mail surveys","volume":"14","author":"Armstrong","year":"1977","journal-title":"Journal of Marketing Research"},{"key":"10.1016\/j.ijinfomgt.2015.12.005_bib0025","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/1059601195201004","article-title":"Peer performance appraisals: the impact of rater competence, rater location, and rating correctability on fairness perceptions","volume":"20","author":"Barclay","year":"1995","journal-title":"Group and Organization Management"},{"key":"10.1016\/j.ijinfomgt.2015.12.005_bib0030","series-title":"Research on negotiations in organizations","first-page":"43","article-title":"Interactional justice: communication criteria","author":"Bies","year":"1986"},{"key":"10.1016\/j.ijinfomgt.2015.12.005_bib0035","unstructured":"Blanding, M. (2011). Is web surfing distracting your workers? HBS Newsletter, May 04. Available at https:\/\/linproxy.fan.workers.dev:443\/http\/hbswk.hbs.edu\/item\/6657.html."},{"issue":"4","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0040","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1145\/1498765.1498799","article-title":"Non-work related computing (NWRC)","volume":"52","author":"Bock","year":"2009","journal-title":"Communication of the ACM"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0045","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1037\/0022-3514.75.2.394","article-title":"The moderating effect of self-esteem in reaction to voice: converging evidence from five studies","volume":"75","author":"Brockner","year":"1998","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0050","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","author":"Bulgurcu","year":"2010","journal-title":"MIS Quarterly"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0055","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1037\/0021-9010.86.3.386","article-title":"On the dimensionality of organizational justice: a construct validation of a measure","volume":"86","author":"Colquitt","year":"2001","journal-title":"Journal of Applied Psychology"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0060","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1006\/obhd.2001.2958","article-title":"The role of justice in organizations: a meta-analysis","volume":"86","author":"Cohen-Charash","year":"2001","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"10.1016\/j.ijinfomgt.2015.12.005_bib0065","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1002\/dir.4000090204","article-title":"Consumer awareness of name removal procedures: Implications for direct marketing","volume":"9","author":"Culnan","year":"1995","journal-title":"Journal of Direct Marketing"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0070","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1287\/isre.1070.0160","article-title":"User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach","volume":"20","author":"D'Arcy","year":"2009","journal-title":"Information Systems Research"},{"issue":"7","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0075","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1145\/341852.341877","article-title":"Information system security management in the new millennium","volume":"43","author":"Dhillon","year":"2000","journal-title":"Communications of the ACM"},{"issue":"6","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0080","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1037\/0022-3514.52.6.1148","article-title":"Procedural justice and participation in task selection: the role of control in mediating justice","volume":"52","author":"Earley","year":"1987","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0085","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1086\/260058","article-title":"Participation in illegitimate activities\u2014theoretical and empirical investigation","volume":"81","author":"Ehrlich","year":"1973","journal-title":"Journal of Political Economy"},{"year":"1998","series-title":"Organizational justice and human resource management","author":"Folger","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0090"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0095","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1287\/isre.1070.0123","article-title":"Statistical power in analyzing interaction effects-questioning the advantage of PLS with product indicators","volume":"18","author":"Goodhue","year":"2007","journal-title":"Information Systems Research"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0100","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1037\/0021-9010.71.2.340","article-title":"Determinants of perceived fairness of performance evaluations","volume":"71","author":"Greenberg","year":"1986","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0105","doi-asserted-by":"crossref","first-page":"9","DOI":"10.2307\/257990","article-title":"A taxonomy of organizational justice theories","volume":"12","author":"Greenberg","year":"1987","journal-title":"Academy of Management Review"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0110","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.chb.2009.03.005","article-title":"Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: an empirical test of justice theory","volume":"25","author":"Henle","year":"2009","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0115","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","article-title":"Protection motivation and deterrence: a framework for security policy compliance in organisations","volume":"18","author":"Herath","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0120","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","article-title":"Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness","volume":"47","author":"Herath","year":"2009","journal-title":"Decision Support Systems"},{"issue":"6","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0125","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/1953122.1953142","article-title":"Does deterrence work in reducing information security policy abuse by employees?","volume":"54","author":"Hu","year":"2011","journal-title":"Communications of the ACM"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0130","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1037\/0021-9010.91.4.841","article-title":"All in a day's work: how follower individual differences and justice perceptions predict OCB role definitions and behavior","volume":"91","author":"Kamdar","year":"2006","journal-title":"Journal of Applied Psychology"},{"issue":"5","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0135","doi-asserted-by":"crossref","first-page":"916","DOI":"10.1037\/0021-9010.87.5.916","article-title":"Survivor reactions to reorganization: antecedents and consequences of procedural, interpersonal, and informational justice","volume":"87","author":"Kernan","year":"2002","journal-title":"Journal of Applied Psychology"},{"issue":"5","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0140","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1037\/0021-9010.76.5.698","article-title":"Perceived fairness of employee drug testing as a predictor employee attitudes and job performance","volume":"76","author":"Konovsky","year":"1991","journal-title":"Journal of Applied Psychology"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0145","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1177\/014920630002600306","article-title":"Understanding procedural justice and its impact on business organizations","volume":"26","author":"Konovsky","year":"2000","journal-title":"Journal of Management"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0150","doi-asserted-by":"crossref","first-page":"41","DOI":"10.2753\/MIS0742-1222300202","article-title":"Health-care security strategies for data protection and regulatory compliance","volume":"30","author":"Kwon","year":"2013","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0155","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1089\/cpb.2006.9931","article-title":"Relationship between organizational justice and cyberloafing in the workplace: has anomia a say in the matter?","volume":"10","author":"De Lara","year":"2007","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.ijinfomgt.2015.12.005_bib0160","series-title":"Social exchange: advances in theory and research","article-title":"What should be done with equity theory?","author":"Leventhal","year":"1980"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0165","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1016\/j.dss.2009.12.005","article-title":"Understanding compliance with internet use policy from the perspective of rational choice theory","volume":"48","author":"Li","year":"2010","journal-title":"Decision Support Systems"},{"issue":"5","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0170","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1002\/job.161","article-title":"The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice","volume":"23","author":"Lim","year":"2002","journal-title":"Journal of Organizational Behavior"},{"year":"1988","series-title":"The social psychology of procedural justice","author":"Lind","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0175"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0180","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1037\/0021-9010.86.1.114","article-title":"Accounting for common method variance in cross-sectional research designs","volume":"86","author":"Lindell","year":"2001","journal-title":"Journal of Applied Psychology"},{"issue":"5","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0185","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1111\/isj.12043","article-title":"Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organizational information security policies","volume":"25","author":"Lowry","year":"2015","journal-title":"Information Systems Journal"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0190","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1111\/isj.12063","article-title":"Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust","volume":"25","author":"Lowry","year":"2015","journal-title":"Information Systems Journal"},{"year":"2013","series-title":"How much YouTube do employees really watch at work?","author":"Madrigal","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0195"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0200","doi-asserted-by":"crossref","first-page":"798","DOI":"10.1111\/j.1559-1816.2000.tb02824.x","article-title":"Enhancing procedural justice in local government budget and tax decision making","volume":"30","author":"Magner","year":"2000","journal-title":"Journal of Applied Social Psychology"},{"issue":"12","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0205","doi-asserted-by":"crossref","first-page":"1865","DOI":"10.1287\/mnsc.1060.0597","article-title":"Common method variance in is research: a comparison of alternative approaches and a reanalysis of past research","volume":"52","author":"Malhotra","year":"2006","journal-title":"Management Science"},{"key":"10.1016\/j.ijinfomgt.2015.12.005_bib0210","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.im.2013.04.005","article-title":"Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work","volume":"50","author":"Moddy","year":"2013","journal-title":"Information & Management"},{"issue":"8","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0215","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/1145287.1145290","article-title":"E-monitoring in the workplace: privacy, legistration, and surveillance software","volume":"49","author":"Nord","year":"2006","journal-title":"Communications of the ACM"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0220","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1086\/209204","article-title":"Compulsive buying\u2014a phenomenological exploration","volume":"16","author":"O'guinn","year":"1989","journal-title":"Journal of Consumer Research"},{"key":"10.1016\/j.ijinfomgt.2015.12.005_bib0225","unstructured":"Palmquist, M. (2013). An employer's guide to cyberloafing, Strategy+Business, September. Available at https:\/\/linproxy.fan.workers.dev:443\/http\/www.strategy-business.com\/blog\/An-Employers-Guide-to-Cyberloafing."},{"issue":"1","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0230","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/07421222.2003.11045759","article-title":"Software piracy in the workplace: a model and empirical test","volume":"20","author":"Peace","year":"2003","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0235","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.im.2008.01.004","article-title":"Explaining non-work-related computing in the workplace: a comparison of alternative models","volume":"45","author":"Pee","year":"2008","journal-title":"Information & Management"},{"issue":"4","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0240","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1177\/014920638601200408","article-title":"Self-reports in organizational research: problems and prospects","volume":"12","author":"Podsakoff","year":"1986","journal-title":"Journal of Management"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0245","first-page":"24","article-title":"When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse","volume":"7","author":"Posey","year":"2011","journal-title":"Journal of Information System Security"},{"year":"2005","series-title":"SmartPLS. 2.0.","author":"Ringle","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0250"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0255","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/502269.502302","article-title":"Acceptable internet use policy","volume":"45","author":"Siau","year":"2002","journal-title":"Communication of ACM"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0260","doi-asserted-by":"crossref","first-page":"487","DOI":"10.2307\/25750688","article-title":"Neutralization: new insights into the problem of employee information systems security policy violations","volume":"34","author":"Siponen","year":"2010","journal-title":"MIS Quarterly"},{"issue":"2","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0265","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: measuring individuals concerns about organizational practices","volume":"20","author":"Smith","year":"1996","journal-title":"MIS Quarterly"},{"issue":"7","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0270","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.im.2011.07.002","article-title":"Out of fear or desire? Toward a better understanding of employees' motivation to follow is security policies","volume":"48","author":"Son","year":"2011","journal-title":"Information & Management"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0275","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1023\/A:1007775020214","article-title":"Traditional and electronic monitoring from an organizational justice perspective","volume":"15","author":"Stanton","year":"2000","journal-title":"Journal of Business and Psychology"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0280","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/502269.502297","article-title":"Company profile of the frequent internet user","volume":"45","author":"Stanton","year":"2002","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.ijinfomgt.2015.12.005_bib0285","unstructured":"Strozniak, P. (2013). Cyber loafing drains productivity: study. Credit Union Times, February. Available at https:\/\/linproxy.fan.workers.dev:443\/http\/www.cutimes.com\/2013\/02\/12\/cyber-loafing-drains-productivity-study."},{"key":"10.1016\/j.ijinfomgt.2015.12.005_bib0290","unstructured":"Taylor, A. (2007). Gambling at work \u2018costs employers \u20ac300M a year.\u2019 Financial Times, January. Available at https:\/\/linproxy.fan.workers.dev:443\/http\/www.ft.com\/cms\/s\/0\/55009c0e-a43d-11db-bec4-0000779e2340.html#axzz3aYu8dFkC."},{"issue":"6","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0295","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.5465\/amj.2005.19573114","article-title":"Can businesses effectively regulate employee conduct? The antecedents of rule following in work settings","volume":"48","author":"Tyler","year":"2005","journal-title":"Academy of Management Journal"},{"issue":"3","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0300","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1002\/(SICI)1099-0992(199605)26:3<411::AID-EJSP766>3.0.CO;2-2","article-title":"The consistency rule and the voice effect: the influence of expectations on procedural fairness judgments and performance","volume":"26","author":"Van den Bos","year":"1996","journal-title":"European Journal of Social Psychology"},{"issue":"3-4","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0305","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","article-title":"Motivating IS security compliance: insights from habit and protection motivation theory","volume":"49","author":"Vance","year":"2012","journal-title":"Information & Management"},{"issue":"5","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0310","doi-asserted-by":"crossref","first-page":"1751","DOI":"10.1016\/j.chb.2011.03.002","article-title":"Personal internet use at work: understanding cyberslacking","volume":"27","author":"Vitak","year":"2011","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0315","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/BF02887828","article-title":"Perceived fairness of drug-testing policies: an application of Leventhal's principles of procedural justice","volume":"25","author":"Wagner","year":"2002","journal-title":"American Journal of Criminal Justice"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0320","doi-asserted-by":"crossref","first-page":"1","DOI":"10.25300\/MISQ\/2013\/37.1.01","article-title":"Beyond deterrence: an expanded view of employee computer abuse","volume":"37","author":"Willison","year":"2013","journal-title":"MIS Quarterly"},{"issue":"1","key":"10.1016\/j.ijinfomgt.2015.12.005_bib0325","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1089\/cpb.1998.1.25","article-title":"The relationship between depression and internet addiction","volume":"1","author":"Young","year":"1998","journal-title":"CyberPsychology & Behavior"}],"container-title":["International Journal of Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0268401215001322?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0268401215001322?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T20:05:14Z","timestamp":1759435514000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0268401215001322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":65,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["S0268401215001322"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.ijinfomgt.2015.12.005","relation":{},"ISSN":["0268-4012"],"issn-type":[{"type":"print","value":"0268-4012"}],"subject":[],"published":{"date-parts":[[2016,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Procedural justice to enhance compliance with non-work-related computing (NWRC) rules: Its determinants and interaction with privacy concerns","name":"articletitle","label":"Article Title"},{"value":"International Journal of Information Management","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.ijinfomgt.2015.12.005","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}