|
參考文獻 中文部分 [1] 天下雜誌,2013,『服務業行業別排名』,天下雜誌-第522期 [2] 竺培梁譯,Kurt Lewin 著,2007,拓樸心理學原理,臺北市,飛鴻國際行銷股份有限公司。
英文部分
[1] Ahuja, M. K., & Thatcher, J. B. 2005. " Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use." MIS Quarterly, (29:3), pp. 427-459. [2] Ajzen, I. 1991. " The theory of planned behavior." Organizational Behavior and Human Decision Processes, (50:2), pp. 179-211. [3] Allen, N. J., & Meyer, J. P. 1990. " The measurement and antecedents of affective, continuance and normative commitment to the organization." Journal of Occupational Psychology, (63:1), pp. 1-18. [4] Anderson, C. L., & Agarwal, R. 2010. " Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions." MIS Quarterly, (34:3), pp. 613-643. [5] Angle, H. L., & Perry, J. L. 1981. " An empirical assessment of organizational commitment and organizational effectiveness." Administrative Science Quarterly, (26:1), pp. 1-14. [6] Aronson, D. W., Timothy, R. M., & Akert, 2010, Social Psychology. Prentice Hall, Upper Saddle River, NJ.2010 [7] Australian, G. 2012. Cyber Crime & Security Survey Report. Center for Internet Safety [8] Avey, J. B., Avolio, B. J., Crossley, C. D., & Luthans, F. 2009. " Psychological ownership: Theoretical extensions, measurement and relation to work outcomes." Journal of Organizational Behavior, (30:2), pp. 173-191. [9] Avey, J. B., Wernsing, T. S., & Palanski, M. E. 2012. " Exploring the process of ethical leadership: The mediating role of employee voice and psychological ownership." Journal of Business Ethics, (107:1), pp. 21-34. [10] Beaglehole, E., 1932, Property: A Study in Social Psychology. New York: Macmillan. [11] Becker, H. S. 1960. " Notes on the concept of commitment." American Journal of Sociology, (66:1), pp. 32-40. [12] Belk, R. W. 1988. " Possessions and the extended self." Journal of Consumer Research, (15:2), pp. 139-168. [13] Bernhard, F., & O''Driscoll, M. P. 2011. " Psychological ownership in small family-owned businesses: Leadership style and nonfamily-employees’ work attitudes and behaviors." Group & Organization Management, (36:3), pp. 345-384. [14] Bernstein, P., 1976, Workplace Democratization: Its Internal Dynamics: Kent, OH: Kent State University Press. [15] Bingham, J. B., Mitchell, B. W., Bishop, D. G., & Allen, N. J. 2013. " Working for a higher purpose: A theoretical framework for commitment to organization-sponsored causes." Human Resource Management Review, (23:2), pp. 174-189. [16] Bollen, K. A., & Stine, R. A. 1992. " Bootstrapping goodness-of-fit measures in structural equation models." Sociological Methods & Research, (21:2), pp. 205-229. [17] Bosak, J., Coetsee, W. J., & Cullinane, S.-J. 2013. " Safety climate dimensions as predictors for risk behavior." Accident Analysis & Prevention, (55:0), pp. 256-264. [18] Brown, R. B. 1996. " Organizational commitment: Clarifying the concept and simplifying the existing construct typology." Journal of Vocational Behavior, (49:3), pp. 230-251. [19] Brown, T. 1989. What will it take to win? Industry Week [20] Bulgurcu, B., Cavusoglu, H., & Benbasat, I. 2010. " Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness." MIS Quarterly, (34:3), pp. 523-548. [21] Burnes, B. 2004. " Kurt Lewin and the planned approach to change: A re‐appraisal." Journal of Management Studies, (41:6), pp. 977-1002. [22] C.M. Ringle, & S.Wende, A. W., 2005, SmartPLS 2.0(M3) beta. Hamburg [23] Campbell, J. P., 1971, Organizational Climate: Its Measurement and Relationship to Work Group Performance. Washington D.C: Paper presented at the Annual meeting of the American Psychological Association [24] Chan, M., Woon, I., & Kankanhalli, A. 2005. " Perceptions of information security in the workplace: Linking information security climate to compliant behavior." Journal of Information Privacy & Security, (1:3), pp. 18-41. [25] Chatterjee, D., Grewal, R., & Sambamurthy, V. 2002. " Shaping up for e-commerce: Institutional enablers of the organizational assimilation of web technologies." MIS Quarterly, (26:2), pp. 65-89. [26] Chen, Y., Ramamurthy, K. R., & Wen, K.-w. 2012. " Organizations'' information security policy compliance: Stick or carrot approach?." Journal of Management Information Systems, (29:3), pp. 157-188. [27] Chin, W. W., 1998, The Partial Least Squares Approach to Structural Equation Modeling. Lawrence Erlbaum Associates, New York [28] Clarke, S. 2006. " Safety climate in an automobile manufacturing plant:The effects of work environment, job communication and safety attitudes on accidents and unsafe behaviour." Personnel Review, (35:4), pp. 413-430. [29] Cooper, M. D., & Phillips, R. A. 2004. " Exploratory analysis of the safety climate and safety behavior relationship." Journal of Safety Research, (35:5), pp. 497-512. [30] Cullen, J. B., Victor, B., & Bronson, J. W. 1993. " The ethical climate questionnaire: An assessment of its development and validity." Psychological Reports, (73:2), pp. 667-674. [31] D''Arcy, J., Hovav, A., & Galletta, D. 2009. " User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach." Information Systems Research, (20:1), pp. 79-98. [32] Dirks, K. T., Cummings, L. L., & Pierce, J. L., 1996, Psychological Ownership in Organizations: Conditions Under Which Individuals Promote and Resist Change: Greenwich, CT: JAI Press [33] Dittmar, H., 1992, The Social Psychology of Material Possessions:To Have is to be. New York:St. Martin''s Press [34] Dov, Z. 2008. " Safety climate and beyond: A multi-level multi-climate framework." Safety Science, (46:3), pp. 376-387. [35] Elie-dit-cosaque, C., Pallud, J., & Kalika, M. 2012. " The Influence of Individual, contextual, and social factors on perceived behavioral control of information technology: A field theory approach." Journal of Management Information Systems, (28:3), pp. 201-234. [36] Erkmen, T., & Esen, E. 2012. " The mediating role of psychological ownership on the relationship between internal locus of control and organizational commitment." International Journal of Business and Management Studies, (4:2), pp. 171-185. [37] Ernst&Young. 2012. Building Trust - Information Security In a Borderless World [38] Etzioni, A. 1991. " The Socio-Economics of Property." Journal of social behavior and personality, (6:6), pp. 465-468. [39] Fornell, C., & Larcker, D. F. 1981. " Evaluating structural equation models with unobservable variables and measurement error." Journal of Marketing Research, (18:1), pp. 39-50. [40] Forrester, R. 2013. The Forrester Wave: Information Security Consulting Services. Forrester Research [41] Fugas, C. S., Silva, S. A., & Melia, J. L. 2012. " Another look at safety climate and safety behavior: Deepening the cognitive and social mediator mechanisms." Accident Analysis & Prevention, (45:0), pp. 468-477. [42] Furby, L. 1978. " Possession in humans: An exploratory study of its meaning and motivation." Social Behavior and Personality, (6:1), pp. 49-65. [43] Goel, S., & Chengalur-Smith, I. S. N. 2010. " Metrics for characterizing the form of security policies." The Journal of Strategic Information Systems, (19:4), pp. 281-295. [44] Goldenhar, L. M., Williams, L. J., & Swanson, N. G. 2003. " Modelling relationships between job stressors and injury and near-miss outcomes for construction labourers." Work & Stress, (17:3), pp. 218-240. [45] Goo, J., Yim, M.-S., & Kim, D. J., 2013 "A path way to successful management of individual intention to security compliance: A role of organizational security climate," Rochester, pp. 1-24. [46] Gormley, D. K., & Kennerly, S. 2010. " Influence of work role and perceptions of climate on faculty organizational commitment." Journal of Professional Nursing, (26:2), pp. 108-115. [47] Gouldner, A. W. 1960. " The norm of reciprocity: A preliminary statement." American Sociological Review, (25:2), pp. 161-178. [48] Griffin, M. A., & Neal, A. 2000. " Perceptions of safety at work: A framework for linking safety climate to safety performance, knowledge, and motivation." Journal of Occupational Health Psychology, (5:3), pp. 347-358. [49] Guo, K. H., Yuan, Y., Archer, N. P., & Connelly, C. E. 2011. " Understanding nonmalicious security violations in the workplace: A composite behavior model." Journal of Management Information Systems, (28:2), pp. 203-236. [50] Hair, J. F., Ringle, C. M., & Sarstedt, M. 2011. " PLS-SEM: Indeed a silver bullet." The Journal of Marketing Theory and Practice, (19:2), pp. 139-152. [51] Hall, E., 1966, Distances in Man: The Hidden Dimension. Garden City, New York: Double Day [52] Hayes, B. E., Perander, J., Smecko, T., & Trask, J. 1998. " Measuring perceptions of workplace safety: Development and validation of the work safety scale." Journal of Safety Research, (29:3), pp. 145-161. [53] Hazari, S., Hargrave, W., & Clenney, B. 2008. " An empirical investigation of factors influencing information security behavior." Journal of Information Privacy & Security, (4:4), pp. 3-20. [54] Herath, T., & Rao, H. R. 2009a. " Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness." Decision Support Systems, (47:2), pp. 154-165. [55] Herath, T., & Rao, H. R. 2009b. " Protection motivation and deterrence: A framework for security policy compliance in organisations." European Journal of Information Systems, (18:2), pp. 106-125. [56] Hernandez, M. 2012. " Toward an understanding of the psychology of stewardship." Academy of Management Review, (37:2), pp. 172-193. [57] Hofmann, D. A., & Stetzer, A. 1996. " A cross-level investigation of factors influencing unsafe behaviors and accidents." Personnel Psychology, (49:2), pp. 307-339. [58] Hu, Q., Dinev, T., Hart, P., & Cooke, D. 2012. " Managing employee compliance with information security policies: The critical role of top management and organizational culture." Decision Sciences, (43:4), pp. 615-659. [59] Ifinedo, P. 2012. " Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory." Computers & Security, (31:1), pp. 83-95. [60] Ifinedo, P. 2014. " Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition." Information & Management, (51:1), pp. 69-79. [61] Isaacs, S. 1933. Social development in young children:A study of beginnings [62] Jaros, S. J. 1997. " An assessment of Meyer and Allen''s (1991) three-component model of organizational commitment and turnover intentions." Journal of Vocational Behavior, (51:3), pp. 319-337. [63] Jaros, S. J., Jermier, J. M., Koehler, J. W., & Sincich, T. 1993. " Effects of continuance, affective, and moral commitment on the withdrawal process: An evaluation of eight structural equation models." Academy of Management Journal, (36:5), pp. 951-995. [64] Johnson, S. E. 2007. " The predictive validity of safety climate." Journal of Safety Research, (38:5), pp. 511-521. [65] Kasser, T., & Ryan, R. M. 1993. " A dark side of the American dream: Correlates of financial success as a central life aspiration." Journal of Personality and Social Psychology, (65:2), pp. 410-422. [66] Kline, L. W., & France, C. 1899. " The psychology of ownership." The Pedagogical Seminary, (6:4), pp. 421-470. [67] Knapp, K. J., Marshall, T. E., Rainer, R. K., & Ford, F. N. 2006. " Information security: Management''s effect on culture and policy." Information Management & Computer Security, (14:1), pp. 24-36. [68] Kumar, N., Scheer, L. K., & Steenkamp, I.-B. E. M. 1995. " The effects of perceived interdependence on dealer attitudes." Journal of Marketing Research, (32:3), pp. 348-356. [69] Leonard-Barton, D., & Deschamps, I. 1988. " Managerial influence in the implementation of new technology." Management Science, (34:10), pp. 1252-1265. [70] Lewin, K. 1939. " Field theory and experiment in social psychology: Concepts and methods." American Journal of Sociology, pp. 868-896. [71] Lewin, K., 1946, Behavior and Development as a Function of the Total Situation. Washington: DC: American Sociological Association [72] Lewin, K., 1997, Resolving Social Conflicts and Field Theory in Social Science. Washington DC: American Psychological Association [73] Li, D., Browne, G. J., & Chau, P. Y. K. 2006. " An empirical investigation of web site use using a commitment-based model." Decision Sciences, (37:3), pp. 427-444. [74] Li, H., Zhang, J., & Sarathy, R. 2010. " Understanding compliance with internet use policy from the perspective of rational choice theory." Decision Support Systems, (48:4), pp. 635-645. [75] Linn Van, D., & Pierce, J. L. 2004. " Psychological ownership and feelings of possession: Three field studies predicting employee attitudes and organizational citizenship behavior." Journal of Organizational Behavior, (25:4), pp. 439-459. [76] Locke, J., 1690, Two Treatises of Government. London, UK: Awnsham Churchill [77] Mathieu, J. E., & Zajac, D. M. 1990. " A review and meta-analysis of the antecedents, correlates, and consequences of organizational commitment." Psychological Bulletin, (108:2), pp. 171-194. [78] Mayer, R. C., & Schoorman, F. D. 1992. " Predicting participation and production outcomes through a two-dimensional model of organizational commitment." The Academy of Management Journal, (35:3), pp. 671-684. [79] Mayhew, M. G., Ashkanasy, N. M., Bramble, T., & Gardner, J. 2007. " A study of the antecedents and consequences of psychological ownership in organizational settings." The Journal of Social Psychology, (147:5), pp. 477-500. [80] McIntyre, N., Srivastava, A., & Fuller, J. A. 2009. " The relationship of locus of control and motives with psychological ownership in organizations." Journal of Managerial Issues, (21:3), pp. 383-401. [81] Meyer, J. P., & N.J., 1997, Commitment in the Workplace: Theory Research and Application. Thousand Oaks, CA: Sage [82] Meyer, J. P., & Allen, N. J. 1991. " A three-component conceptualization of organizational commitment." Human Resource Management Review, (1:1), pp. 61-89. [83] Meyer, J. P., & Herscovitch, L. 2001. " Commitment in the workplace: Toward a general model." Human Resource Management Review, (11:3), pp. 299-326. [84] Meyer, J. P., & Parfyonova, N. M. 2010. " Normative commitment in the workplace: A theoretical analysis and re-conceptualization." Human Resource Management Review, (20:4), pp. 283-294. [85] Morrow, S. L., McGonagle, A. K., Dove-Steinkamp, M. L., Walker Jr, C. T., Marmet, M., & Barnes-Farrell, J. L. 2010. " Relationships between psychological safety climate facets and safety behavior in the rail industry: A dominance analysis." Accident Analysis & Prevention, (42:5), pp. 1460-1467. [86] Mowday, R., Steers, R., & Porter, L. 1982. Employee-organizational linkages: The psychology of commitment, turnover and absenteeism [87] Mowday, R. T. 1998. " Reflections on the study and relevance of organizational commitment." Human Resource Management Review, (8:4), pp. 387-401. [88] Mowday, R. T., Steers, R. M., & Porter, L. W. 1979. " The measurement of organizational commitment." Journal of Vocational Behavior, (14:2), pp. 224-247. [89] Neal, A., & Griffin, M. A. 2006. " A study of the lagged relationships among safety climate, safety motivation, safety behavior, and accidents at the individual and group levels." Journal of Applied Psychology, (91:4), pp. 946-953. [90] Norris-Watts, C., & Levy, P. E. 2004. " The mediating role of affective commitment in the relation of the feedback environment to work outcomes." Journal of Vocational Behavior, (65:3), pp. 351-365. [91] Nunnally, J., 1978, Assessment of Reliability. McGraw-Hill: New York [92] O''Reilly, C. 2002. " The Wrong Kind of ''Ownership''," [Article]. Across the Board, (39:5), pp. 19-20. [93] O''Reilly, C. A., & Chatman, J. 1986. " Organizational commitment and psychological attachment: The effects of compliance, identification, and internalization on prosocial behavior." Journal of applied psychology, (71:3), pp. 492-499. [94] O’driscoll, M. P., Pierce, J. L., & Coghlan, A.-M. 2006. " The psychology of ownership work environment structure, organizational commitment, and citizenship behaviors." Group & Organization Management, (31:3), pp. 388-416. [95] Olzer, H., Yilmaz, A., & Ozler, A. 2008. " Psychological ownership: An empirical study on its antecedents and impacts upon organizational behaviors." Problems and Perspecfives in Management, (6:3), pp. 38-47. [96] Pahnila, S., Siponen, M., & Mahmood, A., 2007 "Employees'' behavior towards IS security policy compliance," Paper presented at the in Proceedings of the 40th Hawaii International Conference on System Sciences, Los Alamitos, CA: IEEE Computer Society Press, pp. 156-166. [97] Penley, L. E., & Gould, S. 1988. " Etzioni''s model of organizational involvement: A perspective for understanding commitment to organizations." Journal of Organizational Behavior, (9:1), pp. 43-59. [98] Pierce, J. L., Kostova, T., & Dirks, K. T. 2001. " Toward a theory of psychological ownership in organizations." Academy of Management Review, (26:2), pp. 298-310. [99] Pierce, J. L., Kostova, T., & Dirks, K. T. 2003. " The state of psychological ownership: Integrating and extending a century of research." Review of General Psychology, (7:1), pp. 84-107. [100] Pierce, J. L., O''Driscoll, M. P., & Coghlan, A.-M. 2004. " Work environment structure and psychological ownership: The mediating effects of control." The Journal of Social Psychology, (144:5), pp. 507-534. [101] Pierce, J. L., Rubenfeld, S. A., & Morgan, S. 1991. " Employee ownership: A conceptual model of process and effects." Academy of Management Review, (16:1), pp. 121-144. [102] Porteous, J. D. 1976. " Home: The territorial core." Geographical Review, (66:4), pp. 383-390. [103] Pousette, A., Larsson, S., & Torner, M. 2008. " Safety climate cross-validation, strength and prediction of safety behaviour." Safety Science, (46:3), pp. 398-404. [104] Purvis, R. L., Sambamurthy, V., & Zmud, R. W. 2001. " The assimilation of knowledge platforms in organizations: An empirical investigation." Organization Science, (12:2), pp. 117-135. [105] Randall, D. M. 1987. " Commitment and the organization: The organization man revisited." Academy of Management. The Academy of Management Review, (12:3), pp. 460-471. [106] Reichers, A. E., & Schneider, B., 1990, Organizational Climate and Culture:An Evolution of Constructs [107] Rochberg-Halton, E. W. 1980. Cultural signs and urban adaptation: The meaning of cherished household possessions. Dissertation Abstracts International [108] Rousseau, D. M. 1985. " Issues of level in organizational research: Multi-level and cross-level perspectives." Research in Organizational Behavior, (7:1), pp. 1-37. [109] Salancik, G. R., & Pfeffer, J. 1980. " Effects of ownership and performance on executive tenure in US corporations." Academy of Management Journal, (23:4), pp. 653-664. [110] Sands, J. 2002. Is employee ownership key to future success. Design Week [111] Sasse, M. A., Brostoff, S., & Weirich, D. 2001. " Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security." BT Technology Journal, (19:3), pp. 122-131. [112] Schwepker Jr, C. H. 2001. " Ethical climate''s relationship to job satisfaction, organizational commitment, and turnover intention in the salesforce." Journal of Business Research, (54:1), pp. 39-52. [113] Sieger, P., Bernhard, F., & Frey, U. 2011. " Affective commitment and job satisfaction among non-family employees: Investigating the roles of justice perceptions and psychological ownership." Journal of Family Business Strategy, (2:2), pp. 78-89. [114] Siponen, M., Adam Mahmood, M., & Pahnila, S. 2014. " Employees’ adherence to information security policies: An exploratory field study." Information & Management, (51:2), pp. 217-224. [115] Siponen, M., Pahnila, S., & Mahmood, A., 2006 "Factors influencing protection motivation and IS security policy compliance," Paper presented at the Innovations in Information Technology, pp. 1-5. [116] Siponen, M., Pahnila, S., & Mahmood, A., 2007, Employees’ adherence to information security policies: An empirical study: H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. von Solms, Boston: Springer [117] Siponen, M., Pahnila, S., & Mahmood, M. A. 2010. " Compliance with information security policies: An empirical investigation." Computer, (43:2), pp. 64-71. [118] Sommestad, T., Hallberg, J., Lundholm, K., & Bengtsson, J. 2014. " Variables influencing information security policy compliance: A systematic review of quantitative studies ". Information Management & Computer Security, (22:1), pp. 42-75. [119] Son, J.-Y. 2011. " Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies." Information & Management, (48:7), pp. 296-302. [120] Spiekermann, S., Korunovska, J., & Bauer, C. Psychology of ownership and asset defense: Why people value their personal information beyond privacy. Paper presented at the International Conference on Inforamtion Systems(ICIS 2012), Oriando Florida, USA. 2012. [121] Stanton, J. M., Stam, K. R., Guzman, I., & Caledra, C., 2003 "Examining the linkage between organizational commitment and information security," Paper presented at the In IEEE Systems, Man, and Cybernetics Conference Washington DC, USA, pp. 2501-2506. [122] Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. 2005. " Analysis of end user security behaviors." Computers & Security, (24:2), pp. 124-133. [123] Staw, B. M., & Boettger, R. D. 1990. " Task revision: A neglected form of work performance." Academy of Management Journal, (33:3), pp. 534. [124] Swailes, S. 2002. " Organizational commitment: A critique of the construct and measures." International Journal of Management Reviews, (4:2), pp. 155-178. [125] Symantec, & Ponemon, I. 2013. Cost of Data Breach Study: Global Analysis. Symantec & Ponemon Institute [126] Vance, A., Siponen, M., & Pahnila, S. 2012. " Motivating IS security compliance: Insights from habit and protection motivation theory." Information & Management, (49, pp. 190-198. [127] Vandewalle, D., Van Dyne, L., & Kostova, T. 1995. " Psychological ownership: An empirical examination of its consequences." Group & Organization Management, (20:2), pp. 210-226. [128] Venkatesh, V., & Bala, H. 2008. " Technology acceptance model 3 and a research agenda on interventions." Decision Sciences, (39:2), pp. 273-315. [129] Verizon, B. S. 2013. 2013 Data Breach Investigations Report. Verizon Business Systems [130] Vroom, C., & von Solms, R. 2004. " Towards information security behavioural compliance." Computers & Security, (23:3), pp. 191-198. [131] Wagner, S. H., Parker, C. P., & Christiansen, N. D. 2003. " Employees that think and act like owners: Effects of ownership beliefs and behaviors on organizational effectiveness." Personnel Psychology, (56:4), pp. 847-871. [132] Webb, T. L., & Sheeran, P. 2006. " Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence." Psychological Bulletin, (132:2), pp. 249-268. [133] Wiener, Y. 1982. " Commitment in organizations: A normative view." Academy of Management. The Academy of Management Review, (7:3), pp. 418-428. [134] Williams, L. J., & Anderson, S. E. 1991. " Job satisfaction and organizational commitment as predictors of organizational citizenship and in-role behaviors." Journal of Management, (17:3), pp. 601-617. [135] Wilpert, B., 1991 "Property, ownership, and participation: on the growing contradictions between legal and psychological concepts," Paper presented at the International handbook of participation in organizations: For the study of organizational democracy, co-operation, and self management, New York: Oxford University Press, pp. 149-164. [136] Wirth, O., & Sigurdsson, S. O. 2008. " When workplace safety depends on behavior change: Topics for behavioral safety research." Journal of Safety Research, (39:6), pp. 589-598. [137] Zin, S. M., & Ismail, F. 2012. " Employers’ behavioural safety compliance factors toward occupational, safety and health improvement in the construction industry." Procedia - Social and Behavioral Sciences, (36:0), pp. 742-751. [138] Zmud, R. W. 1979. " Individual differences and MIS success: A review of the empirical literature." Management Science, (25:10), pp. 966-979. [139] Zohar, D. 1980. " Safety climate in industrial organizations: Theoretical and applied implications." Journal of Applied Psychology, (65:1), pp. 96-102. [140] Zohar, D. 2010. " Thirty years of safety climate research: Reflections and future directions." Accident Analysis & Prevention, (42:5), pp. 1517-1522. [141] Zohar, D., Huang, Y.-h., Lee, J., & Robertson, M. 2014. " A mediation model linking dispatcher leadership and work ownership with safety climate as predictors of truck driver safety performance." Accident Analysis & Prevention, (62:0), pp. 17-25. [142] Zohar, D., & Luria, G. 2004. " Climate as a social-cognitive construction of supervisory safety practices: Scripts as proxy of behavior patterns." Journal of Applied Psychology, (89:2), pp. 322-333. [143] Zohar, D., & Luria, G. 2005. " A multilevel model of safety climate: Cross-level relationships between organization and group-level climates." Journal of Applied Psychology, (90:4), pp. 616-628.
|