SEARCH

SEARCH BY CITATION

References

  • Ajzen, I. (2001). Nature and operation of attitudes. Annual Review of Psychology, 52, 2758.
  • Ajzen, I., & Fishbein, M. (1977). Attitude-behavior relations: A theoretical analysis and review of empirical research. Psychological Bulletin, 84(5), 888918.
  • Allen, A. (2000). Gender and privacy in cyberspace. Stanford Law Review, 52(5), 11751200.
  • Baird, C.L., Bensko, N.L., Bell, P.A., Viney, W., & Woody, W.D. (1995). Gender influences on perceptions of hostile environment SH. Psychological Reports, 77, 7982.
  • Barak, A. (2005). SH on the internet. Social Science Computer Review, 23(1), 7792.
  • Bell, V., & de La Rue, D. (1995). Gender harassment on the Internet [Electronic version]. Retrieved July 21, 2008, http://www.gsu.edu/˜lawppw/lawand.papers/harass.html.
  • Berdahl, J. L. (2007). Harassment based on sex: Protecting social status in the context of gender hierarchy. Academy of Management Review, 22, 641658.
  • Biber, J. K. Doverspike, D., Baznik, D., Cober, A. B., & Ritter, B. A. (2002). SH in online communications. CyberPsychology and Behavior, 5, 3342.
  • Citron, D.K. (2009). Law's expressive value in combating cyber gender harassment. Michigan Law Review, 108, 3, 373415.
  • Cooper, A., Safir, M.P, Rosenmann, A. (2006). A preliminary look at online sexual activities at the office. CyberPsychology and Behavior, 9(1), 2229.
  • Dall'Ara, E., & Maass, A. (1999). Studying SH in the laboratory. Sex Roles, 41, 681704.
  • Dougherty, T., Turban, D., Olson, D., Dwyer, P. & LaPreze, M. (1996). Factors affecting perceptions of workplace SH. Journal of Organizational Behavior, 17, 489501.
  • Equal Employment Opportunity Commission. (1984). Discrimination because of sex under Title VII of the CRA of 1964, 29 CFR 1609.1. Federal Register 45, 2502425025.
  • Fitzgerald, L. F., Drasgow, F., Hulin, C. L., Gelfand, M. J., & Magley, V. J. (1997). Antecedents and consequences of SH in organizations. Journal of Applied Psychology, 82, 578589.
  • Fitzgerald, L. F., Gelfand, M. J., & Drasgow, F. (1995a). Measuring SH: Theoretical and psychometric advances. Basic and Applied Social Psychology, 17, 425427.
  • Fitzgerald, L.F., & Hesson-McInnis, M. (1989). The dimensions of SH. Journal of Vocational Behavior, 35, 309326.
  • Fitzgerald, L.F., & Ormerod, A.J. (1991). Perceptions of SH. Psychology of Women Quarterly, 15, 281294.
  • Fitzgerald, L.F., & Shullman, S.L. (1993). SH: A research analysis and agenda for the 1990s. Journal of Vocational Behavior, 42, 527.
  • Fitzgerald, L. F., Swan, S., & Fischer, K. (1995b). Why didn't she just report him? Journal of Social Issues, 51, 117138.
  • Gelfand, M.J., Fitzgerald, L.F., & Drasgow, F. (1995). The structure of SH. Journal of Vocational Behavior, 32, 152175.
  • Glover, R. (2002). Privacy in the workplace. Metropolitan Corporate Counsel, 10(6).
  • Gohann, S., & Thacker, R. (1996). Emotional and psychological consequences of SH a descriptive study. Journal of Psychology, 130, 429441.
  • Guadagno, R.E., Muscanell, N.L., Okdie, B.M., Burk, N.M., & Ward, T.B. (2011). Even in virtual environments women shop and men build. Computers in Human Behavior, 27(1), 304308.
  • Gutek, B., Morasch, B., & Kohen, A. (1983). Interpreting social-sexual behavior in a work setting. Journal of Vocational Behavior, 22, 3048.
  • Gutek, B.A. (1985). Sex and the workplace. San Francisco: Jossey-Bass Publishers.
  • Hadler, D., & Jaishankar, K. (2008). Cybercrimes against women in India: Problems, perspectives, and solutions. TMC Academic Journal, 3(1), 4862.
  • Herring, S. (1994). Gender differences in computer mediated communication: Bringing familiar baggage to the new frontier. Paper presented at the meeting of the American Library Association, Miami, FL.
  • Herrmann, A. F. (2007). “People get emotional about their money:” Performing masculinity in a financial discussion board. Journal of CMC, 12(2), 499522.
  • Hinkin, T.R. (1995). A review of scale development practices in the study of organizations. Journal of Management, 21(5), 967988.
  • Huffaker, D.A., & Calvert, S.L. (2005). Gender, identity, and language use in teenage blogs. Journal of CMC, 10(2).
  • Hurt, L.E., Wiener, R.L., Russell, B.L., & Mannen, R.K. (1999). Gender differences in evaluating social-sexual conduct in the workplace. Behav. Sci. & the Law 17, 413433.
  • Kendall, L. (2000). “Oh no! I'm a nerd!” Hegemonic masculinity on an online forum. Gender and Society, 14, 256274.
  • Keyton, J., & Rhodes, S.C. (1999). Organizational SH: translating research into application. Journal of Applied Communication Research, 27, 158173.
  • Kramarae, C. (1995). A backstage critique of virtual reality. In S. Jones (Ed.), CyberSociety: CMC and Community. Thousands Oaks, CA: Sage Publications.
  • Krings F., & Facchin, S. (2009). Organizational justice and men's LSH: The moderating role of sexism and personality. Journal of Applied Psychology, 94(2), 501510.
  • MacKinnon, R. (1997). Virtual rape. Journal of CMC, 2, 4, 0.
  • Maier, F. (1995). Cyberspace: The next gender gap. Upside, 7, 88.
  • McCormick, N., & Leonard, J. (1996). Gender and sexuality in the cyberspace frontier. Women & Therapy, 19, 109119.
  • McGerty, L. (2000). Gendered subjectivities and domestic use of the Internet. CyberPsychology and Behavior, 3(5), 895899.
  • Mills, J.E., Clay, J.M., & Mortensen, M. (2000). Managing e-mail liability. Hotel and Restaurant Administration Quarterly, 10, 6471.
  • Miner-Rubino, K., & Cortina, L. M. (2007). Beyond targets: Consequences of vicarious exposure to misogyny at work. Journal of Applied Psychology, 92, 12541269.
  • Nelson, C.G., Halpert, J.A., & Cellar, D.F. (2007). Organizational responses for preventing and stopping SH. Sex Roles, 56 (11-12), 811822.
  • Newmeyer, F. J. (1988). Extension and implications of linguistic theory. In Newmeyer, F. J. (Ed.), Linguistic theory, p.114. NY, NY: Cambridge University Press.
  • Nunnally, J.C. (1976). Psychometric theory, 2nd Edition. NY: McGraw Hill.
  • O'Connell, C.E., & Korabik, K. (2000). The relationship of personal vulnerability, work context, perpetuator status, and type of harassment to outcomes. Journal of Voc. Beh., 56, 299329.
  • Porter, W.G. & Griffaton, M.C. (2003). Monitoring the electronic workplace. International Association of Defense Counsel Journal [Electronic version]. Retrieved August, 2008, http://home.millsaps.edu/fiserhl/.
  • Pryor, J. B., Giedd, J. L., & Williams, K. B. (1995). A social psychological model for predicting SH. Journal of Social Issues, 51, 6984.
  • Pryor, J. B., & Whalen, N. J. (1997). Characteristics of harassers and the social circumstances under which SH occurs. In W. O'Donohue (Ed.), SH: Theory, research, and treatment (pp. 129151). Needham Heights, MA: Allyn & Bacon.
  • Ritter, B.A., & Doverspike, D. (April, 2002). The changing nature of SH. Presented at the Society for Industrial/Organizational Psychology Conference, Toronto, ON.
  • Rodino, M. (1997). Breaking out of binaries. Journal of CMC, 3(3).
  • Rotundo, M., Nguyen, D., & Sackett, P.R. (2001). A meta-analytic review of gender differences in perceptions of SH. Journal of Applied Psychology, 86, 914922.
  • Sardar, Z. (1999). Cyberspace as the darker side of the west. Futures, 27 (7), 777794.
  • Shea, V. (1995, August 21). Not afraid to flame. Computerworld, 29, 8182.
  • Siegal, J., Dubrovsky, V., Kiesler, S., & McGuire, T. W. (1986). Group processes in CMC. Organizational Behavior and Human Decision Processes, 37, 157187.
  • Soukup, C. (1999). The gendered interactional patterns of computer-mediated chatrooms. Information Society, 15(3), 169176.
  • Stone, A.R. (1993). Violation and virtuality [Electronic version]. Retrieved March 18, 2002, from The University of Texas Web site: http://www.en.utexas.edu/˜slatin/opera
  • Sullivan, A. (1999). The innernet. Forbes, 10(4), 157158.
  • Summers, R.J. (1996). The effect of harasser performance status and compliant tolerance on reactions to a complaint of SH. Journal of Vocational Behavior, 49, 5367.
  • Sussman, N.M., & Tyson, D.H. (2000). Gender differences in computer-mediated interactions. Computers in Human Behavior, 16, 381394.
  • Swink, D. & Cameron, E. (2004). Employee use of Internet. The Academy of Legal Studies in Business Journal of Employment and Labor Law, 10(1).
  • Taylor, H.J., Kramarae, C., & Ebben, M. (Eds.). (1993). Women, information technology, and scholarship. Urbana, IL: University of Illinois Centers for Advanced Study.
  • Valetk, H.A. (2002). Cyberstalking: Navigating a maze of laws. New York Law Journal [Electronic version]. Retrieved March 13, 2007, www.valetk.com/pdf/cyberstalking.pdf
  • Welsh, S. (1999). Gender and SH. Annual Review of Sociology, 25,169190.
  • Willness, C. R., Steel, P., & Lee, K. (2007). A meta-analysis of the antecedents and consequences of workplace SH. Personnel Psychology, 60, 127162.