Hollinger,  R.  (1991).  Neutralizing  in  the  workplace:  an 
empirical  analysis  of  property  theft  and  production 
deviance.  Deviant Behavior: An Interdisciplinary 
Journal,  12,  169–202.  https://doi.org/10.1080/01 
639625.1991.9967872 
Hu,  Q.,  Xu,  Z.,  Dinev,  T.,  &  Ling,  H.  (2011).  Does 
deterrence  work  in  reducing  information  security 
policy  abuse  by  employees?.  Communications of the 
ACM,  54(6),  54-60.  https://doi.org/10.1145/19531 
22.1953142 
Huma,  Z.,  Hussain,  S.,  Thurasamy,  R.,  &  Malik,  M.  I. 
(2017).  Determinants  of  cyberloafing:  a  comparative 
study  of  a  public  and  private  sector  organization. 
Internet Research,  27(1),  97-117. 
http://dx.doi.org/10.1108/IntR-12-2014-0317  
Huseman, R. C., Hatfield, J. D., & Miles, E. W. (1987). A 
new  perspective  on  equity  theory:  The  equity 
sensitivity  construct.  Academy of Management 
Review,  12(2),  222-234.  https://psycnet.apa.org/doi/ 
10.2307/258531 
Ivarsson, L., & Larsson, P. (2011). Personal internet usage 
at work: A source of recovery. Journal of Workplace 
Rights,  16(1),  63-811.  http://dx.doi.org/ 
10.2190/WR.16.1.e  
Kanfer, R., & Heggestad, E. D. (1997). Motivational traits 
and  skills:  A  person-centered  approach  to  work 
motivation. Research in Organizational Behavior, 19, 
1-56.  https://www.researchgate.net/publication/ 
285237369_Motivational_Traits_and_Skills_A_Perso
n-Centered_Approach_to_Work_Motivation. 
Kidwell,  R.  E.,  Jr.,  &  Martin,  C.  L.  (2005).  Managing 
Organizational Deviance. SAGE Publications. 
Kim S.  J., &  Byrne,  S.  (2011),  Conceptualizing  personal 
web usage in work contexts: A preliminary framework. 
Computers in Human Behavior,  27  (6),  2271-2283. 
https://doi.org/10.1016/j.chb.2011.07.006.  
Kim, K., Triana, M. D. C., Chung, K., & Oh, N. (2015). 
When  do  employees  cyberloaf?  An  interactionist 
perspective  examining  personality,  justice,  and 
empowerment. Human Resource Management, 55(6), 
1041-1058. https://doi.org/10.1002/hrm.21699  
Koay,  K.  Y.,  Soh,  P.  C.  H.,  &  Chew,  K.  W.  (2017). 
Antecedents  and  consequences  of  cyberloafing: 
Evidence  from  the  Malaysian  ICT  industry.  First 
Monday,  22(3).  https://doi.org/10.5210/fm.v22i3.7 
302.  
Koay,  K.  Y.  (2018).  Workplace  ostracism  and 
cyberloafing: A  moderated-mediation  model.  Internet 
Research,  28(3),  1122-1141. 
http://dx.doi.org/10.1108/IntR-07-2017-0268  
Kreiner,  G.  E.  (2006).  Consequences  of  work-home 
segmentation or integration: A person-environment fit 
perspective.  Journal of Organizational Behavior,  27, 
485–507. http://dx.doi.org/10.1002/job.386 
Lavoie,  J.  A.  A., &  Phchyl, T. A.  (2001).  Cyberslacking 
and  the  procrastination  superhighway:  A  web-survey 
of online procrastination, attitudes and emotion. Social 
Science and Computer Review,  19(4),  431-444. 
https://doi.org/10.1177%2F089443930101900 403  
Lazarus,  R.  S.,  &  Folkman,  S.  (1984).  Stress, Appraisal, 
and Coping. Springer.  
Leasure, P., & Zhang, G. (2018). “That’s how they taught 
us  to  do  it”:  Learned  deviance  and  inadequate 
deterrents in  retail  banking.  Deviant Behavior, 39(5), 
603-616.  https://doi.org/10.1080/01639625.2017.12 
86179 
Li,  H.,  Zhang,  J.,  &  Sarathy,  R.  (2010).  Understanding 
compliance  with  internet  use  policy  from  the 
perspective  of  rational  choice  theory.  Decision 
Support Systems,  48,  635-645. 
http://dx.doi.org/10.1016/j.dss.2009.12.005 
Li, S.  M., &  Chung,  T.  M.  (2016).  Internet  function and 
internet  addictive  behavior.  Computers in Human 
Behavior,  22(6),  1067-1071.  doi:10.1016/j.chb.20 
04.03.030. 
Liberman, B., Seidman, G., McKenna, K., & Buffardi, L. 
(2011.  Employee  job  attitudes  and  organizational 
characteristics  as  predictors  of  cyberloafing. 
Computers in Human Behaviour,  27(6),  2192-2199. 
http://dx.doi.org/10.1016/j.chb.2011.06.015 
Lim, V.  K. G. (2002). The IT way of loafing on the job: 
Cyberloafing,  neutralizing  and  organizational  justice. 
Journal of Organizational Behavior,  23,  675-694. 
https://doi.org/10.1002/job.161 
Lim,  V.  K.  G.,  &  Teo,  T.  S.  H.  (2005).  Prevalence, 
perceived  seriousness,  justification  and  regulation  of 
cyberloafing  in  Singapore:  An  exploratory  study. 
Information & Management,  42(8),  1081-1093. 
http://dx.doi.org/10.1016/j.im.2004.12.002 
Lim, V.  K. G., & Chen, D. J. Q. (2012). Cyberloafing at 
the  workplace:  Gain  or  drain  on  work?.  Behavior & 
Information Technology,  31(4),  343–353. 
https://doi.org/10.1080/01449290903353054 
Lim, V. K. G., Teo, T. S. H., & Loo, G. L. (2002). How do 
I loaf here?  Let me count the ways. Communications 
of the ACM,  45  (1),  66-70. 
http://dx.doi.org/10.1145/502269.502300 
Lukman,  A.,  &  Masood,  A.  (2020).  Enterprise  social 
media  and  cyber-slacking: An  integrated  perspective.  
International Journal of Human-Computer 
Interaction,  36(15),  1426-1436.  https://doi.org/ 
10.1080/10447318.2020.1752475 
Luthans,  F.  (2002).  The  need  for  and  meaning  of  positif 
organizational  behavior.  Journal  of  Organizational 
Behavior,  23(6),  695-706.  https://doi.org/10.1002/ 
job.165 
Mastrangelo,  P.,  Everton,  W.,  &  Jolton,  J,  A.  (2006).  
Personal  use  of  work  computers:  distraction  versus 
destruction.  Cyber Psychology and Behaviour,  9(6), 
730-741. https://doi.org/10.1089/cpb.2006.9.730  
Mazidi, A. K., Rahimnia, F., Mortazavi, S., & Lagzian, M. 
(2020).  Cyberloafing  in  public  sector  of  developing 
countries:  Job embeddedness  as  a  context.  Personnel 
Review,  Vol.  ahead-of-print,  No.  ahead-of-print. 
https://doi.org/10.1108/PR-01-2020- 0026 
Moody, G. D., & Siponen, M. (2013). Using the theory of 
interpersonal  behavior  to  explain  non-work-  related 
personal  use  of  the  Internet  at  work.  Information &