{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T04:21:22Z","timestamp":1724991682505},"reference-count":44,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2012,9,1]],"date-time":"2012-09-01T00:00:00Z","timestamp":1346457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1016\/j.chb.2012.05.014","type":"journal-article","created":{"date-parts":[[2012,6,4]],"date-time":"2012-06-04T21:24:46Z","timestamp":1338845086000},"page":"1947-1953","source":"Crossref","is-referenced-by-count":70,"title":["The Five Factor Model of personality and employees\u2019 excessive use of technology"],"prefix":"10.1016","volume":"28","author":[{"suffix":"V","given":"John E.","family":"Buckner","sequence":"first","affiliation":[]},{"given":"Christopher M.","family":"Castille","sequence":"additional","affiliation":[]},{"given":"Tilman L.","family":"Sheets","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.chb.2012.05.014_b0005","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1089\/109493102753770507","article-title":"On the Internet no one knows I\u2019m an introvert: Extroversion, neuroticism, and Internet addiction","volume":"5","author":"Amichai-Hamburger","year":"2002","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0010","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1016\/j.chb.2004.09.002","article-title":"Individual differences in Internet usage motives","volume":"5","author":"Amiel","year":"2004","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0020","unstructured":"AMTA (2005). Australian mobile telecommunications association, what you need to know to get the bullies off your back. ."},{"key":"10.1016\/j.chb.2012.05.014_b0015","unstructured":"AMTA (2011). Australian mobile telecommunications association, annual report. ."},{"key":"10.1016\/j.chb.2012.05.014_b0025","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1744-6570.1991.tb00688.x","article-title":"The big five personality dimensions and job performance: A meta-analysis","volume":"44","author":"Barrick","year":"1991","journal-title":"Personnel Psychology"},{"key":"10.1016\/j.chb.2012.05.014_b0030","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1089\/cpb.2005.8.39","article-title":"Psychological predictors of problem mobile phone use","volume":"8","author":"Bianchi","year":"2005","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0035","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.chb.2007.01.019","article-title":"Personality and self reported mobile phone use","volume":"24","author":"Butt","year":"2008","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0040","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.chb.2003.12.001","article-title":"Unintended consequences of emerging communication technologies: Instant messaging in the workplace","volume":"21","author":"Cameron","year":"2005","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0045","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1089\/cpb.2004.7.559","article-title":"Shyness and locus of control as predictors of Internet addiction and Internet use","volume":"7","author":"Chak","year":"2004","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0050","series-title":"Txtng: The Gr8t Db8","first-page":"87","article-title":"Who texts?","author":"Crystal","year":"2009"},{"key":"10.1016\/j.chb.2012.05.014_b0055","unstructured":"Crystal, D. (2009). David crystal on it\u2019s only a theory S01E02 (video file). ."},{"key":"10.1016\/j.chb.2012.05.014_b0060","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1089\/109493102760275581","article-title":"Validation of a new scale for measuring problematic Internet use: Implications for pre-employment screening","volume":"5","author":"Davis","year":"2002","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0065","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1037\/1040-3590.18.2.192","article-title":"The mini-IPIP scales: Tiny-yet-effective measures of the Big Five factors of personality","volume":"18","author":"Donnellan","year":"2006","journal-title":"Psychological Assessment"},{"key":"10.1016\/j.chb.2012.05.014_b0070","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1089\/109493104322820101","article-title":"Internet use, social skills, and adjustment","volume":"7","author":"Engelberg","year":"2004","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0075","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1089\/109493100316067","article-title":"Does Internet and computer \u201caddiction\u201d exist? Some case study evidence","volume":"3","author":"Griffiths","year":"2000","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0080","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1080\/14659890500114359","article-title":"A \u2018components\u2019 model of addiction within a psychosocial framework","volume":"10","author":"Griffiths","year":"2005","journal-title":"Journal of Substance Use"},{"key":"10.1016\/j.chb.2012.05.014_b0085","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/S0747-5632(00)00017-0","article-title":"The relationship between extraversion and neuroticism and the different uses of the Internet","volume":"16","author":"Hamburger","year":"2000","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0090","first-page":"34","article-title":"Excessive Internet use: The role of personality, loneliness and social support networks in Internet addiction","volume":"5","author":"Hardie","year":"2007","journal-title":"Australian Journal of Emerging Technologies and Society"},{"key":"10.1016\/j.chb.2012.05.014_b0095","unstructured":"Harris Interactive (2006). IT decision-makers survey results. Websense, Inc. ."},{"key":"10.1016\/j.chb.2012.05.014_b0100","series-title":"Encyclopedia of industrial\u2013organizational psychology","first-page":"146","article-title":"Cyberloafing at work","author":"Henle","year":"2007"},{"key":"10.1016\/j.chb.2012.05.014_b0105","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1080\/01972240290108186","article-title":"Searching for safety online: Managing \u201ctrolling\u201d in a feminist forum","volume":"18","author":"Herring","year":"2002","journal-title":"The Information Society"},{"key":"10.1016\/j.chb.2012.05.014_b0110","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/S0747-5632(02)00016-X","article-title":"Uses of the Internet and their relationships with individual differences in personality","volume":"19","author":"Hills","year":"2003","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0115","series-title":"Handbook of personality: Theory and research","first-page":"114","article-title":"Paradigm shift to the integrative Big Five trait taxonomy: History, measurement, and conceptual issues","author":"John","year":"2008"},{"key":"10.1016\/j.chb.2012.05.014_b0130","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1089\/cpb.2007.9992","article-title":"Factors predictive for incidence and remission of Internet addiction in young adolescents: A prospective study","volume":"4","author":"Ko","year":"2007","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0125","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1111\/1540-4560.00248","article-title":"Internet paradox revisited","volume":"58","author":"Kraut","year":"2002","journal-title":"Journal of Social Issues"},{"key":"10.1016\/j.chb.2012.05.014_b0120","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1037\/0003-066X.53.9.1017","article-title":"Internet paradox: A social technology that reduces social involvement and psychological well-being?","volume":"53","author":"Kraut","year":"1998","journal-title":"American Psychologist"},{"key":"10.1016\/j.chb.2012.05.014_b0135","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.chb.2004.06.001","article-title":"An investigation of Big Five and narrow personality traits in relation to Internet usage","volume":"22","author":"Landers","year":"2006","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0140","doi-asserted-by":"crossref","first-page":"1702","DOI":"10.1016\/j.chb.2011.02.009","article-title":"Internet and mobile phone text-messaging dependency: Factor structure and correlation with dysphoric mood among Japanese adults","volume":"27","author":"Lu","year":"2011","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0145","series-title":"Handbook of personality: Theory and research","first-page":"182","article-title":"The five-factor theory of personality","author":"McCrae","year":"2008"},{"key":"10.1016\/j.chb.2012.05.014_b0150","doi-asserted-by":"crossref","first-page":"809","DOI":"10.2307\/25148821","article-title":"Dispositional factors in Internet use: Personality versus cognitive style","volume":"31","author":"McElroy","year":"2007","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.chb.2012.05.014_b0155","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1111\/1540-4560.00247","article-title":"Can you see the \u201creal me\u201d? Activation and expression of the \u201cTrue Self\u201d on the Internet","volume":"58","author":"McKenna","year":"2002","journal-title":"Journal of Social Issues"},{"key":"10.1016\/j.chb.2012.05.014_b0160","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1089\/cpb.2007.0170","article-title":"Extraversion, impulsivity, and online group membership as predictors of problematic Internet use","volume":"12","author":"Mottram","year":"2009","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0165","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1089\/cpb.2007.0140","article-title":"Problematic usage among highly-engaged players of massively multiplayer online role playing games","volume":"11","author":"Peters","year":"2008","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0170","series-title":"The Internet and workplace transformation","first-page":"41","article-title":"The psychology of Internet use and misuse","author":"Phillips","year":"2006"},{"key":"10.1016\/j.chb.2012.05.014_b0175","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: A critical review of the literature and recommended remedies","volume":"88","author":"Podaskoff","year":"2003","journal-title":"Journal of Applied Psychology"},{"key":"10.1016\/j.chb.2012.05.014_b0180","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1089\/cpb.2007.9943","article-title":"Development of a scale to measure problem use of short message service: The SMS problem use diagnostic questionnaire","volume":"10","author":"Rutland","year":"2007","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0185","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1037\/0033-2909.124.2.262","article-title":"The validity and utility of selection methods in personnel psychology: Practical and theoretical implications of 85 years of research findings","volume":"124","author":"Schmidt","year":"1998","journal-title":"Psychological Bulletin"},{"key":"10.1016\/j.chb.2012.05.014_b0190","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1089\/cyber.2009.0462","article-title":"Internet self-efficacy, the need for cognition, and sensation seeking as predictors of problematic use of the Internet","volume":"14","author":"Shi","year":"2011","journal-title":"CyberPsychology, Behavior, and Social Networking"},{"key":"10.1016\/j.chb.2012.05.014_b0195","doi-asserted-by":"crossref","first-page":"391","DOI":"10.2224\/sbp.2001.29.4.391","article-title":"Understanding differences in web usage: The role of need for cognition and the Five Factor Model of personality","volume":"29","author":"Tuten","year":"2001","journal-title":"Social Behavior and Personality"},{"key":"10.1016\/j.chb.2012.05.014_b0200","doi-asserted-by":"crossref","first-page":"1526","DOI":"10.1016\/j.chb.2010.05.020","article-title":"Perceived stress, sensation seeking, and college students\u2019 abuse of the Internet","volume":"26","author":"Velezmoro","year":"2010","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0205","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1089\/cyber.2009.0094","article-title":"Psychological predictors of young adults\u2019 use of social networking sites","volume":"13","author":"Wilson","year":"2010","journal-title":"CyberPsychology, Behavior, and Social Networking"},{"key":"10.1016\/j.chb.2012.05.014_b0210","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1177\/0002764204270278","article-title":"Internet addiction: A new clinical phenomenon and its consequences","volume":"48","author":"Young","year":"2004","journal-title":"American Behavioral Scientist"},{"key":"10.1016\/j.chb.2012.05.014_b0215","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.1016\/j.chb.2010.04.025","article-title":"Policies and procedures to manage employee Internet abuse","volume":"26","author":"Young","year":"2010","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2012.05.014_b0220","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1089\/109493104322820174","article-title":"Internet abuse in the workplace: New trends in risk management","volume":"7","author":"Young","year":"2004","journal-title":"CyberPsychology & Behavior"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563212001422?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563212001422?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T10:35:01Z","timestamp":1561804501000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563212001422"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2012,9]]}},"alternative-id":["S0747563212001422"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2012.05.014","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2012,9]]}}}