3Conlin M. Workers, surf at your own risk[ J]. BusinessWeek, 2000,3685: 105-106.
4Urbaczewski A, Jessup L M. Does electronic monitoringof employee internet usage work [ J]. Communications ofthe ACM, 2002, 45: 80-83.
5Lim V K G. The IT way of loafing on the job: cyber-loafing, neutralizing and organizational justice[ J]. Jour-nal of Organizational Behavior, 2002,23(5) : 675-694.
6Blau P M. Exchange and power in social life[ M]. NewYork: Wiley, 1964.
7Everton W J, Mastrangelo P M, Jolton J A. Personalitycorrelates of employees, personal use of work computer[ J].Cyber Psychology & Behavior, 2005 , 8(2) ; 143-153.
8Bosworth S, Kabay M. Computer security handbook[M]. New York : John Wiley & Sons Inc, 2000.
9Whitman M. In defense of the realm : understandingthreats to information security [ J]. International Journalof Information Management, 2004,24: 3-4.
10Henle C A, Blanchard A L. The interaction of work stres-sors and organizational sanctions on cyber-loafing [ J].Journal of Managerial Issues, 2008,20(3) : 383-396.