@incollection{, 6F206CB750970FC500FEFD49602D7A4C , author={{AdelowoOluremi} and {Adeoye AdetolaAtinuke} and {National Open University of Nigeria}}, journal={{Global Journal of Management and Business Research}}, journal={{GJMBR}}2249-45880975-585310.34257/GJMBR, address={Cambridge, United States}, publisher={Global Journals Organisation}15111729 } @incollection{b0, , title={{E-mail Monitoring in the Workplace: The Good, the Bad and the Ugly}} , author={{ HAdams } and { SMScheuing } and { S AFeeley }} , journal={{Defense Counsel Journal}} 67 1 , year={2000} } @book{b1, , title={{An Investigation of the Use of ICT in the Nigerian Construction Industry}} , author={{ AOAdebayo }} , year={2007. January 24. 2011} , note={Retrieved} } @incollection{b2, , title={{Factor Analytic Approach to Internet Usage in South Western Nigeria}} , author={{ BAlese } and { SOwoyemi }} , journal={{Journal of Information Technology Impact}} 4 3 , year={2004} } @book{b3, , title={{An introduction to research methods in statistics in education and social sciences}} , author={{ AAli } and { DIDenga }} , year={1989} , address={Calabar, Nigeria} , note={Rapid Education publisher} } @book{b4, , title={{Can corporate security, privacy coexist?}} , author={{ BJAlge }} , year={2001. June 30. 2011} } @incollection{b5, , title={{Adoption Assessment of Internet Usage amongst Undergraduates in Nigeria Universities-A Case Study Approach}} , author={{ OMAwoleye } and { WOSiyanbola } and { FOOladipo }} , journal={{Journal of Technology Management and Innovation}} 3 001 , year={2008} JOTMI Research Group , note={Santiago Chile.} } @incollection{b6, , title={{Survey of Internet Access Management in Public}} , journal={{American Library Association}} , year={2005} } @book{b7, , title={{}} , author={{ Libraries }} , year={December 13 2010} } @book{b8, , title={{E-business or Bust: The Impact of the Internet/Net Effects, Sales and Marketing Management}} , author={{ Anonymous }} , year={2000} 15 } @incollection{b9, , title={{Internet Abuse is on the Increase}} , author={{ Anonymous }} , journal={{Management Services}} 45 6 3 , year={2001. 2001} } @book{b10, , title={{The Secret Agents of Fortune}} , author={{ JBus }} , year={1998. June 12. 2011} , note={Retrieved} } @book{b11, , title={{Methods and Extent of Employer Use of Electronic Monitoring and Surveillance, Employee Privacy Law Retrieved}} , author={{ LHCamille }} , year={2002. June 12. 2011} } @incollection{b12, , title={{Electronic Monitoring in the Workplace: A Review and Discussion about Future Trends. The workplace}} , author={{ WCaroll }} , journal={{Review}} 4 , year={2007. January 12. 2011} } @book{b13, , title={{Sampling techniques}} , author={{ WGCochran }} , year={1987} , publisher={Wiley Eastern Limited} 268 } @book{b14, , title={{Essentials of research design and methodology}} , author={{ DDavid } and { FDavid } and { GMarczyk }} , year={2005} , publisher={John Wiley & Sons Inc} 18 , address={New Jersey} } @book{b15, , title={{Cybers lacking: Internet abuse in the workplace}} , author={{ RADavies }} , year={2001. July 20. 2011} } @incollection{b16, , title={{Internet Abuse: A Survey of South African Companies}} , author={{ LDancaster }} , journal={{ILJ}} 22 862 , year={2001} } @book{b17, , title={{Internet filtering and how it affects security, efficiency and thriving in Norwegian Companies. Msc Thesis published with Royal Institute of Technology (KTH)}} , author={{ JDeisz }} , year={2005. 2010} , address={Stockholm} , note={Retrieved 13 December} } @incollection{b18, , title={{Developing an employee centred electronic monitoring system}} , author={{ KBDetienne } and { NTAbbott }} , journal={{Journal of Systems Management}} 44 8 12 , year={1993} } @book{b19, , author={{ MBElise }} , title={{Competing Interests in the Post 9-11 Workplace: The New Line Between Privacy and Safety, 1317 Practicing L. Inst./Corp}} , year={2002} 303 } @incollection{b20, , title={{Pharmacy Students Perception of the Application of Learning Management System in Patient-Oriented pharmacy Education: University of Benin Experience}} , author={{ POErah } and { EADairo }} , journal={{International Journal of Health Research}} 1 2 , year={2008. June 2008} } @book{b21, , title={{Monitoring Employee Communications. The Cyber law Encyclopedia}} , author={{ Forrester Research } and { Inc }} , year={2007. September, 23. November 5, 2000 Retrieved February 12. 2011. 2002. January 06. 2011} , publisher={Gahtan, A} , note={Fox News (2000) Employers Crack Down on Internet Abuse} } @book{b22, , title={{}} , author={{ Gfi Webmonitor }} , year={2005. December 11. 2010} } @incollection{b23, , title={{Does Internet and computer ''addiction'' exist? Some case study evidence}} , author={{ MGriffiths }} , journal={{Cyberpsychology and Behavior}} 3 2 , year={2000} } @book{b24, , title={{International Data Corporation (IDC) (2004) Worldwide Leader in Web Filtering Expands into Web}} , author={{ Ibm }} , year={2004. 2004. January 24. 2011. January 17. 2011} , note={Global Business Security Index} } @incollection{b25, , title={{Banking on computers}} , author={{ PJason }} , journal={{African Business}} 219 , year={1997} } @book{b26, , title={{The Naked Employee: How Technology Is Compromising Workplace Privacy}} , author={{ FSLane }} , year={2003. 2003} , publisher={American Management Association} , address={New York} , note={Print} } @incollection{b27, , title={{Information Technology and Its Impact on Productivity: Firmlevel Evidence from Government and Private Data Sources 1977-1993}} , author={{ BLehr } and { FLichtenberg }} , journal={{Canadian Journal of Economics}} 32 2 , year={2000} } @incollection{b28, , title={{The gratifications of pager use: sociability, information-seeking, entertainment, utility, and fashion and status}} , author={{ LLeung } and { RWei }} , journal={{Telematics and Informatics}} 15 1 , year={1999} } @incollection{b29, , title={{Who are the mobile phone have-nots?}} , author={{ LLeung } and { RWei }} , journal={{New Media & Society}} 1 2 , year={1999} } @incollection{b30, , title={{More than just talk on the move: Uses and gratifications of the cellular phone}} , author={{ LLeung } and { RWei }} , journal={{Journalism and Mass Communication Quarterly}} 77 2 , year={2000} } @incollection{b31, , title={{College student motives for chatting on ICQ}} , author={{ LLeung }} , journal={{New Media and Society}} 3 4 , year={2001} } @incollection{b32, , title={{Loneliness, self-disclosure, and ICQ (''I Seek You'') use}} , author={{ LLeung }} , journal={{Cyber Psychology & Behavior}} 5 3 , year={2002} } @incollection{b33, , title={{The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice}} , author={{ ELim } and { GVivien }} , journal={{Journal of Organizational Behavior}} 23 , year={2002} , publisher={Wiley InterScience} } @book{b34, , title={{The Effect of Trust on Personal Web Usage in the Workplace. A guide to Effective Human Resources Management. Information Science Publishing, USA}} , author={{ SKLippert }} , year={2004. 2004, pp 178-200 Retrieved on 05 December, 2010} } @book{b35, , title={{The City of Ibadan}} , author={{ PLyold }} , year={1967} , publisher={Cambridge University Press} } @incollection{b36, , title={{Employee Study Cites Rampant Internet Abuse}} , author={{ CMarsan }} , journal={{Network World}} 17 38 , year={2000} } @incollection{b37, , title={{Evaluation of the Impact of Information Communication Technology on Banking Efficiency Using the Transcendental Logarithmic Production function and Camel Rating}} , author={{ ISMadueme }} , journal={{International Journal of Engineering Science and Technology}} 2 1 , year={2010} } @incollection{b38, , title={{}} , journal={{Net Monitoring Survey}} 805 211 , year={2000. 2000} } @incollection{b39, , title={{ICT Infrastructure: An Essential Foundation for Implementing the WSIS Process in Nigeria}} , author={{ ENdukwe }} , booktitle={{Nigeria Annual National Conference}} , year={2005} 28 } @incollection{b40, , title={{The Internet as a source of reproductive health information among adolescent girls in an urban city in Nigeria}} , author={{ WENwagwu }} , journal={{BioMed Central Public Health}} 7 2 , year={2007} } @incollection{b41, , title={{Information And Communication Technology Use By Reproductive Health Workers In Nigeria: State Of The Art, Issues, and Challenges}} , author={{ WMOlatokun } and { OCAdeboyejo }} , journal={{An Interdisciplinary Journal on Humans in ICT Environments}} 5 2 , year={2009. November 2009. January 26. 2011} } @incollection{b42, , title={{Use of Internet for Health Information amongst Medical Practitioners in a Nigerian Community}} , author={{ COOmolase } and { COIhemedu } and { TOOgunleye } and { BOOmolase }} , journal={{TAF Preventive Medicine Bulletin}} 9 2 , year={2010. 2010} } @incollection{b43, , title={{More Promising E-Governance Strides in Nigeria}} , author={{ EOrhuozee }} , journal={{PC World West Africa}} , year={2002. August} IT Media Group } @incollection{b44, , title={{Nigeria Moves Forward with E-Banking}} , author={{ EOtokhine }} , journal={{PC World West Africa}} , year={2002. January} IT Media Group } @book{b45, , title={{E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect your Company and its Assets}} , author={{ MROverly }} , year={1999} , publisher={AMA} , address={NY} } @incollection{b46, , title={{Predictors of Internet use}} , author={{ ZPapacharissi } and { AMRubin }} , journal={{Journal of Broadcasting & Electronic Media}} 44 2 , year={2000} } @incollection{b47, , title={{E-Mail, Electronic Monitoring, and Employee Privacy}} , author={{ EHPaul } and { CMIbrahim }} , journal={{International Journal of Engineering Science and Technology}} 23 2 , year={1996} } @book{b48, , title={{Social Psychological Determinants of Mobile Communication Technology Use and Adoption: A Comparison of three Models to Explain and Predict Mobile Communication Technology Behavior (Thesis)}} , author={{ OPeters }} , year={2007} University of Twente } @book{b49, , title={{Privacy Rights Clearing House web site}} , year={January 23. 2011} , note={Retrieved} } @book{b50, , author={{ PRaposa } and { BMujtaba }} , title={{The Ethics of Employee Monitoring: What You Need to Know. Business, Trust and Responsibility Conference}} , year={2003} } @incollection{b51, , title={{Secure filtering overview}} , booktitle={{Secure Computing}} , year={2004. January 26. 2011} , note={Retrieved} } @book{b52, , title={{Monitoring Software. PC Magazine}} , author={{ LSeltzer }} , year={2000. 2000} 20 } @book{b53, , title={{Privacy Foundation web site, Retrieved}} , author={{ ASchulman }} , year={2000. January 23. 2011} } @incollection{b54, , title={{Companies Take Steps to Combat Internet Abuse}} , author={{ DSilva }} , journal={{Puget Sound Business Journal}} 22 23 , year={2001. 2001} } @book{b55, , title={{Convergence or Divergence? Web Usage in the Workplace in Nigeria, Malaysia and the United States. Personal Wed Usage in Workplace: A guide to Effective Human Resources Management}} , author={{ CASimmers } and { MAnandarajan }} , year={2004. 2004. 200 Retrieved on 05 December, 2010} , publisher={Information Science Publishing} , address={USA} } @incollection{b56, , title={{Managing employee Internet abuse}} , author={{ MASingh }} , journal={{South African journal of Information management}} 6 3 , year={2004. September 2004} } @incollection{b57, , title={{Technology and Privacy Use}} , booktitle={{Society of Human Resource Managers}} , year={2002. June 23. 2011} } @incollection{b58, , title={{Computer Monitoring: Benefits and Pitfalls Facing Management}} , author={{ SSonny }} , journal={{Information & Management}} 39 , year={2002} } @book{b59, , title={{Snoop at Your Peril. PC Magazine}} , author={{ Sr }} , year={2000. 2000} 19 86 } @incollection{b60, , title={{Does Successful Investment in Information Technology Solve the Productivity Paradox?}} , author={{ TStratopoulos } and { BDehning }} , journal={{Information & Management}} 38 2 , year={2000. 2000} } @book{b61, , title={{Web Monitoring and Filtering Programs Promote Productivity PC-Week}} , author={{ KBSullivan }} , year={1996. 1996} 13 } @book{b62, , title={{Beware: Employee Monitoring Is On The Rise. Informationweek}} , author={{ SSwanson }} , year={2001. 2001} } @book{b63, , title={{IT sikkerhet -Trender og utvikling i}} , author={{ Telenor }} , year={2004. 2004. 2010} , note={Retrieved on December 24} } @book{b64, , title={{The Central Intelligence Agency (CIA) 2000 World Factbook}} , year={2000. January 24. 2011} , note={Retrieved} } @incollection{b65, , title={{Here come the giants}} , author={{ JThompson }} , journal={{African Business}} 190 2 42 , year={1994} } @book{b66, , title={{United Nations Publication(2007) Internet Use For Business Development: An Introductory Set Of Training Modules For Policymakers}} , year={2007} , address={Bangkok} } @book{b67, , title={{Monitoring Strategies for Internet Technologies. Personal Web Usage in Workplace: A guide to Effective Human Resources Management. Information Science Publishing, USA}} , author={{ AUrbaczewski }} , year={2000. 2004, pp 178-200 Retrieved on 05 December, 2010} } @incollection{b68, , title={{What Your Workers Are Really Up To}} , author={{ KVanscoy }} , journal={{Smartbusinessmag.com}} 15 9 , year={2001. 2001} } @book{b69, , title={{Breaching Trust: An Analysis of Surveillance and Security Practices on China's TOM-Skype Platform, Information Warfare Monitor/ONI Asia}} , author={{ NVilleneuve }} , year={2008. June 30. 2011} } @book{b70, , author={{ PWallace }} , title={{The Internet in the Workplace: How new technology is Transforming Work}} USA Retrieved on , publisher={Cambridge University Press} , year={2004. January 31. 2011} } @book{b71, , title={{Homepage of Websense Internet filtering company}} , author={{ Websense }} , year={2005. January 25. 2011} } @incollection{b72, , title={{The Adoption and Use of Mobile Phone in Rural China: A Case Study of Hubei}} , author={{ LWei } and { MZhang }} , journal={{China. Telematics and Informatics}} 25 , year={2008} } @incollection{b73, , title={{A Question of Ethics}} , author={{ CWilder }} , journal={{Informationweek.com}} , year={2001. 2001} } @incollection{b74, , title={{}} , journal={{World Internet Users. InternetWorldStats.com}} , year={2010. December 18. 2010} } @incollection{b75, , title={{Employee Internet abuse: risk management strategies and their Effectiveness}} , author={{ KSYoung } and { CJCase }} , booktitle={{Proceedings of the American Society of Business and Behavioral Sciences}} the American Society of Business and Behavioral SciencesLas Vegas , year={2003. February 21, 2003} } @book{b76, , title={{Use and Misuse of the Internet in the Malaysian Workplace: Preliminary Findings from an Exploratory Study IAMOT}} , author={{ RamayahTYulihasri } and { JNorzalila } and { IAmlus }} , year={2006. 2006} } @book{b77, , title={{Eds) The Shaping of Power, Rights and Rules in CyberSpace}} , author={{ EZuckerman } and { RDeibert } and { JPalfrey } and { RRohozinski } and { JZittrain }} , year={2010} , publisher={MIT press} , note={Intermediary Censorship in Access controlled} }