<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychol.</journal-id>
<journal-title>Frontiers in Psychology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychol.</abbrev-journal-title>
<issn pub-type="epub">1664-1078</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyg.2025.1647669</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Psychology</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Classroom injustice and university students&#x2019; cyberloafing: the mediating role of neutralization techniques</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Han</surname> <given-names>Zhiyong</given-names></name>
<uri xlink:href="http://loop.frontiersin.org/people/699015/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/validation/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Yang</surname> <given-names>Zhiyong</given-names></name>
<uri xlink:href="http://loop.frontiersin.org/people/3094167/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/investigation/"/>
<role content-type="https://credit.niso.org/contributor-roles/software/"/>
<role content-type="https://credit.niso.org/contributor-roles/validation/"/>
<role content-type="https://credit.niso.org/contributor-roles/visualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Huang</surname> <given-names>Ziwei</given-names></name>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/3101628/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/funding-acquisition/"/>
<role content-type="https://credit.niso.org/contributor-roles/project-administration/"/>
<role content-type="https://credit.niso.org/contributor-roles/resources/"/>
<role content-type="https://credit.niso.org/contributor-roles/supervision/"/>
<role content-type="https://credit.niso.org/contributor-roles/validation/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
</contrib-group>
<aff><institution>School of Business Administration, Anhui University of Finance and Economics</institution>, <addr-line>Bengbu</addr-line>, <country>China</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1642528/overview">Gisela Steins</ext-link>, University of Duisburg-Essen, Germany</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2882131/overview">Marc Richter</ext-link>, Universidade Estadual do Rio Grande do Sul, Brazil</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3109540/overview">Polat Yucekaya</ext-link>, Canakkale Onsekiz Mart University, T&#x00FC;rkiye</p></fn>
<corresp id="c001">&#x002A;Correspondence: Ziwei Huang, <email>120160017@aufe.edu.cn</email></corresp>
</author-notes>
<pub-date pub-type="epub">
<day>29</day>
<month>08</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="collection">
<year>2025</year>
</pub-date>
<volume>16</volume>
<elocation-id>1647669</elocation-id>
<history>
<date date-type="received">
<day>16</day>
<month>06</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>18</day>
<month>08</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2025 Han, Yang and Huang.</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Han, Yang and Huang</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract>
<sec>
<title>Introduction</title>
<p>Cyberloafing in the classroom has been linked to adverse educational outcomes, undermining students&#x2019; learning and frustrating instructors. From a neutralization perspective, students may justify deviant acts when they perceive injustice. This study examined how perceived classroom justice relates to students&#x2019; intention to cyberloaf and tested the mediating roles of two neutralization techniques: condemning the condemners and appealing to higher loyalties.</p>
</sec>
<sec>
<title>Methods</title>
<p>We conducted a questionnaire study with 310 university students recruited from multiple universities in the central and eastern regions of China. Measures assessed perceived classroom justice, intention to cyberloaf, and the neutralization techniques of condemning the condemners and appealing to higher loyalties. We tested a mediation model linking classroom justice to cyberloafing intention through these neutralization techniques.</p>
</sec>
<sec>
<title>Results</title>
<p>Perceived classroom justice was negatively associated with students&#x2019; intention to cyberloaf. Classroom justice also negatively predicted condemning the condemners and appealing to higher loyalties. Furthermore, both neutralization techniques mediated the relationship between classroom justice and intention to cyberloaf.</p>
</sec>
<sec>
<title>Discussion</title>
<p>Findings suggest that higher levels of classroom justice may deter students&#x2019; cyberloafing partly by weakening justificatory neutralizations. These results highlight the importance of enhancing classroom justice to reduce cyberloafing behaviors. Educators are encouraged to adopt strategies that strengthen perceptions of fairness in classroom practices.</p>
</sec>
</abstract>
<kwd-group>
<kwd>classroom justice</kwd>
<kwd>cyberloafing</kwd>
<kwd>neutralization</kwd>
<kwd>condemnation of condemners</kwd>
<kwd>appeal to higher loyalties</kwd>
</kwd-group>
<counts>
<fig-count count="1"/>
<table-count count="4"/>
<equation-count count="0"/>
<ref-count count="78"/>
<page-count count="14"/>
<word-count count="11919"/>
</counts>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Educational Psychology</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec id="S1" sec-type="intro">
<title>1 Introduction</title>
<p>The concept of cyberloafing was first introduced in the workplace as a voluntary use of an organization&#x2019;s Internet resources by employees for non-work-related activities during official working hours (<xref ref-type="bibr" rid="B40">Lim, 2002</xref>). However, in an increasingly digitalized world, the Internet is no longer an exclusive tool for workplace employees for a long time, and it has become commonplace for students to engage in learning in the classroom using connected devices such as smartphones or laptops (<xref ref-type="bibr" rid="B58">Ragan et al., 2014</xref>). Furthermore, the phenomenon of cyberloafing has also become prevalent in the field of education. A significant proportion of students (more than 60%) have been observed to utilize their Internet devices during class, studying, or writing assignments to engage in activities unrelated to the subject matter, including browsing web messages, replying to messages, playing online games, watching online videos and web novels, and so on (<xref ref-type="bibr" rid="B21">Cutino and Nees, 2017</xref>; <xref ref-type="bibr" rid="B50">Miheli&#x00E8; et al., 2022</xref>). Established studies have demonstrated the detrimental impact of students&#x2019; cyberloafing behaviors on educational environments, including negative effects on students&#x2019; academic performance (<xref ref-type="bibr" rid="B73">Wu et al., 2018</xref>), sense of meaning in life (<xref ref-type="bibr" rid="B38">Li et al., 2022</xref>), attitudes toward learning and engagement (<xref ref-type="bibr" rid="B27">Heflin et al., 2017</xref>), and the finding that cyberloafing is significantly associated with academic procrastination among students (<xref ref-type="bibr" rid="B42">Margaretha et al., 2022</xref>). From the workplace to the field of education, from employees to students, the phenomenon of cyberloafing is no longer confined to the domain of higher education. As electronic devices proliferate in primary and secondary school classrooms, will these children, who are not yet adults and lack self-control, be able to recognize the dangers of cyberloafing and control their behavior? In light of the potential dangers of cyberloafing, it is essential to explore empirical studies that influence students&#x2019; intention to engage in this behavior.</p>
<p>However, existing studies have concentrated on employees&#x2019; cyberloafing behavior in the workplace, with limited research in the field of education (<xref ref-type="bibr" rid="B3">Alyahya and Alqahtani, 2022</xref>). <xref ref-type="bibr" rid="B20">Coskun and Gokcearslan (2019)</xref> reviewed 28 studies on cyberloafing in education in 2019 and found that there has been a gradual increase in scholarly articles on cyberloafing in the field of education in recent years. <xref ref-type="bibr" rid="B20">Coskun and Gokcearslan (2019)</xref> identified a extensive scope for future research on cyberloafing in the field of education. Furthermore, the majority of studies have concentrated on individual characteristics or outcome variables. The most frequently investigated variables are gender, grade level and Internet experience. In contrast, relatively few studies have focused on the motivation of cyberloafing behavior. These studies have found a few factors that can predictive of students&#x2019; cyberloafing behaviors or intentions to engage in such activities. These include consumerism (<xref ref-type="bibr" rid="B63">Sharma, 2020</xref>), escapism (<xref ref-type="bibr" rid="B49">Metin-Orta and Demirutku, 2022</xref>), and attitudes and habits (<xref ref-type="bibr" rid="B66">Soh et al., 2018</xref>). These findings provide a useful reference point for further research.</p>
<p>This study introduces classroom justice perceptions as a possible predictor variable, motivated by two considerations. Firstly, current research indicates that students&#x2019; perceived classroom justice is related to student variables such as motivation, classroom engagement, and enthusiasm for the subject matter. Conversely, students&#x2019; perceptions of classroom injustice can lead to negative emotions such as anger and resistance, as well as negative behaviors including negative learning, retaliation, and verbal aggression against the teacher, which may include cyberloafing, which is viewed as withdrawn behavior (<xref ref-type="bibr" rid="B16">Chory-Assad and Paulsel, 2004</xref>; <xref ref-type="bibr" rid="B22">Estaji and Zhaleh, 2022</xref>). Secondly, it should be noted that the perception of fairness has been demonstrated to act as an antecedent variable in predicting employees&#x2019; intention to engage in cyberloafing in the workplace. It can be posited that employees may engage in cyberloafing when they perceive organizational injustices in the context of their assignments, procedures, and interactions. This leads us to hypothesize that perceptions of fairness may similarly serve as a predictor of students&#x2019; intention to engage in cyberloafing in the classroom.</p>
<p>This research introduces two neutralization techniques to explain the mechanisms by which classroom justice influences students&#x2019; intention to cyberloaf. These are condemnation of the condemner and appeal to higher loyalties. Neutralization techniques are methods of justifying deviations or violations, demonstrating that the deviant behavior is acceptable (<xref ref-type="bibr" rid="B41">Lowry et al., 2016</xref>). The condemnation of the condemner is a form of neutralization whereby the individual who has committed the violation directs their attention toward the accuser. By directing attention away from their own deviant behavior and toward the teacher or classroom rules, students are able to shift the focus away from their own actions and toward those of the other person, making it easier to ignore their own faults (<xref ref-type="bibr" rid="B46">Matza and Sykes, 1957</xref>). The appeal to higher loyalties posited that the deviant behavior was undertaken in pursuit of a higher ideal. Students believe that they respond to their friends&#x2019; messages in class for the purpose of maintaining friendships, or play with their cell phones in class to avoid boredom. They consider these online loafing activities to be more important to them than listening to class (<xref ref-type="bibr" rid="B63">Sharma, 2020</xref>). The utilization of rationalization techniques enables students to justify the use of their connected devices in the classroom for activities unrelated to the content of the course.</p>
<p>In conclusion, our study constructed a model with classroom justice as the antecedent variable and two neutralization techniques (condemnation of condemners and appeal to higher loyalties) as the mediator variables to explain students&#x2019; intention to cyberloaf in the classroom, aiming to clarify whether students&#x2019; perception of classroom justice can influence their intention to cyberloaf and the mechanism of the effect. It is hoped that this study will be useful to educators in increasing attention to classroom fairness to reduce students&#x2019; cyberloafing behavior.</p>
</sec>
<sec id="S2">
<title>2 Literature review and hypothesis development</title>
<sec id="S2.SS1">
<title>2.1 Theoretical framework</title>
<p>This study constructs a theoretical model based on neutralization theory to explain how perceptions of classroom justice influence university students&#x2019; cyberloafing behaviors through neutralization techniques. Neutralization theory explains how individuals use cognitive reframing to justify deviant behaviors, thereby reducing moral burden (<xref ref-type="bibr" rid="B33">Kaptein and van Helvoort, 2019</xref>). The theory posits that individuals are not inherently lacking in moral constraints; rather, they temporarily suspend such constraints through a series of &#x201C;neutralization techniques,&#x201D; making transgressive behaviors acceptable in specific contexts (<xref ref-type="bibr" rid="B19">Connolly et al., 2025</xref>). In educational settings, when students perceive a lack of classroom justice, they are motivated to employ various neutralization techniques to rationalize their negative learning behaviors (such as cyberloafing). Specifically, the theoretical logic of this study follows the following pathway: first, classroom justice, as an important characteristic of the learning environment, directly affects students&#x2019; learning motivation and behavioral choices. When students perceive distributive injustice, procedural injustice, or interactional injustice, they experience frustration and dissatisfaction; this perception of injustice constitutes the situational condition that activates neutralization techniques. Second, from the perspective of neutralization theory, perceived injustice prompts students to initiate cognitive defense mechanisms, namely employing neutralization techniques such as condemnation of condemners and appeal to higher loyalties to find legitimate justifications for their deviant behaviors. The application of these neutralization techniques reduces students&#x2019; moral concerns about cyberloafing behaviors, thereby increasing their willingness to engage in cyberloafing during class.</p>
<p>Therefore, neutralization techniques played a significant mediating role between classroom justice perception and cyberloafing intention, constituting a theoretical transmission pathway from classroom justice perception to cyberloafing intention via neutralization techniques. This model not only extends the application of neutralization theory in educational contexts but also provides a new theoretical perspective for understanding university students&#x2019; classroom deviant behaviors in the digital age. The following section will systematically review related literature from three aspects and propose research hypotheses based on this foundation. <xref ref-type="fig" rid="F1">Figure 1</xref> presents the conceptual research model.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption><p>The conceptual research model.</p></caption>
<alt-text>Flowchart illustrating the relationship between &#x201C;Classroom justice,&#x201D; &#x201C;Condemnation of condemners,&#x201D; &#x201C;Appeal to higher loyalties,&#x201D; and &#x201C;Intention to cyberloaf.&#x201D; Arrows indicate that both &#x201C;Condemnation of condemners&#x201D; and &#x201C;Appeal to higher loyalties&#x201D; are intermediaries between &#x201C;Classroom justice&#x201D; and &#x201C;Intention to cyberloaf.&#x201D;</alt-text>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fpsyg-16-1647669-g001.tif"/>
</fig>
</sec>
<sec id="S2.SS2">
<title>2.2 Classroom justice and the intention to cyberloaf</title>
<p><xref ref-type="bibr" rid="B15">Chory-Assad (2002)</xref> defined classroom justice as the perception of fairness in the outcomes or processes that occur in an instructional setting (<xref ref-type="bibr" rid="B15">Chory-Assad, 2002</xref>). He initially categorized classroom justice into two dimensions: distributive justice and procedural justice. In subsequent research, he introduced the dimension of interactional justice, by which time the concept of classroom justice was relatively well developed. With regard to the interpretation of these three dimensions, distributive justice refers to perceptions of the fairness of the outcomes distributed in an educational setting (e.g., grades, teacher attention), procedural justice refers to the fairness of the processes used to assign grades (<xref ref-type="bibr" rid="B16">Chory-Assad and Paulsel, 2004</xref>). Interactional justice is defined as the perceived fairness of the teacher&#x2019;s interpersonal treatment of students when performing a process or assigning an outcome (<xref ref-type="bibr" rid="B13">Chory, 2007</xref>). Classroom injustice is a pervasive phenomenon, with numerous students reporting that they have experienced unfair treatment from teachers in the classroom. Research indicates that students suffer from almost three times as much procedural injustice as the other two forms of injustice (<xref ref-type="bibr" rid="B29">Horan et al., 2010</xref>; <xref ref-type="bibr" rid="B74">Yan, 2021</xref>). Students&#x2019; perceptions of classroom justice affect their subsequent behaviors and emotions, and have been shown to correlate with a multitude of student variables, including students&#x2019; academic performance, willingness to speak up, classroom participation, and teacher-student relationships. As early as <xref ref-type="bibr" rid="B15">Chory-Assad (2002)</xref> demonstrated that classroom justice influenced students&#x2019; motivation to succeed in the course, course affective learning, and aggression toward the teacher. Furthermore, Chory found that procedural justice negatively predicted retaliatory and deceptive behaviors (<xref ref-type="bibr" rid="B15">Chory-Assad, 2002</xref>, 2004). The study conducted by <xref ref-type="bibr" rid="B17">&#x010C;iuladien&#x0117; and Ra&#x010D;elyt&#x0117; (2016)</xref> demonstrated a correlation between students&#x2019; perceptions of unfairness in classroom environments and the manifestation of negative behaviors, including fighting, dishonesty, anger, and struggles. In a recent study, <xref ref-type="bibr" rid="B12">Chory (2023)</xref> reported that college students&#x2019; perceptions of fairness were related to antisocial classroom behaviors. A substantial body of research has shown that unfairness in the classroom is significantly associated with students&#x2019; negative behaviors and emotions. Consequently, it can be posited that classroom justice predicts cyberloafing activities, which also serve as negative behaviors.</p>
<p>Our suggestion that classroom justice relates to intention to cyberloaf is not without empirical support. In organizational contexts, perceptions of fairness have been demonstrated to be an effective predictor of employees&#x2019; cyberloafing behavior (<xref ref-type="bibr" rid="B31">Jandaghi et al., 2015</xref>). When employees employ a technique of ledger metaphors to justify subsequent cyberloafing in the context of perceived organizational injustice (<xref ref-type="bibr" rid="B40">Lim, 2002</xref>). Subsequent research has also demonstrated a close relationship between perceptions of justice and cyberloafing (<xref ref-type="bibr" rid="B61">Samadi-Miarkolaei and Samadi-Miarkolaei, 2020</xref>). When this result was considered in the context of educational, the <xref ref-type="bibr" rid="B75">Y&#x0131;lmaz and Yurdug&#x00FC;l (2018)</xref> study found that organizational policies and positive organizational equity management in the classroom positively affect the classroom environment, which reduces cyberloafing. Nevertheless, <xref ref-type="bibr" rid="B75">Y&#x0131;lmaz and Yurdug&#x00FC;l (2018)</xref> concentrated on the psychosocial environment, and further in-depth discussion is required regarding the predictive mechanism of classroom equity as a separate variable on students&#x2019; cyberloafing behavior.</p>
<p>Furthermore, equity theory posits that individuals confronted with an unjust situation are driven to take action to rectify the imbalance, with these actions including reducing personal inputs to levels commensurate with the rewards received or attempting to evoke a similar sense of resentment in those responsible for the injustice (<xref ref-type="bibr" rid="B67">Sprecher, 1986</xref>; <xref ref-type="bibr" rid="B68">Sprecher and Felmlee, 1992</xref>). Building on this theoretical foundation, we propose that when students perceive that the effort they put into the course is not rewarded with a corresponding grade or that their behaviors and ideas are not respected by the instructor, feelings of injustice emerge, which in turn can lead to negative feelings of anger and resistance to the instructor (<xref ref-type="bibr" rid="B22">Estaji and Zhaleh, 2022</xref>). This further enhances students&#x2019; willingness to engage in cyberloafing activities. Students express their dissatisfaction by engaging in cyberloafing activities that are unrelated to the course content, thereby resisting the injustice that exists in the classroom. It is therefore proposed that the following hypothesis be tested:</p>
<disp-quote>
<p>H1: Classroom justice is negatively related to students&#x2019; intention to cyberloaf.</p>
</disp-quote>
</sec>
<sec id="S2.SS3">
<title>2.3 Classroom justice and two neutralization techniques</title>
<p><xref ref-type="bibr" rid="B46">Matza and Sykes (1957)</xref> proposed that juvenile crime is the result of a neutralization technique, which allows individuals to justify their deviant or criminal behavior. In particular, when adolescents engage in behavior that violates societal rules, they tend to experience shame and self-blame. This shame inhibits most deviance. In order to alleviate this negativity, they convince themselves that they have not done anything wrong through the use of words that allow them to engage in criminal behavior with a sense of peace of mind. &#x201C;I did not cause any harm,&#x201D; &#x201C;I did not act for my own benefit,&#x201D; &#x201C;It is not my responsibility.&#x201D; By invoking these excuses, individuals are able to justify their behavior in a manner that is contrary to the values and societal norms that they espouse. This enables them to preserve their self-image and avoid self-blame and the blame of others for deviant behavior. <xref ref-type="bibr" rid="B46">Matza and Sykes (1957)</xref> categorize such &#x201C;neutralization&#x201D; into five distinct categories: denial of responsibility, denial of injury, denial of victimization, condemnation of the condemner, and appeal to higher loyalties. In subsequent studies, scholars have further developed the neutralization technique by proposing the metaphor of the ledger (<xref ref-type="bibr" rid="B34">Klockars, 1974</xref>) and the defense of necessity (<xref ref-type="bibr" rid="B51">Minor, 1981</xref>), among other techniques. Sykes posits that the utilization of this &#x201C;rationalization technique&#x201D; is evidence-based. Given that social norms are malleable, perpetrators can circumvent social sanctions if they are able to provide a rationale for their actions that is deemed acceptable by the public. For instance, the killing of an enemy during wartime is permitted by public perception, and justifications such as the killing of minors, the insane, or in self-defense are also provided for in the law. It is unfortunate that the majority of transgressions are not acceptable to the law and society for their own narrow reasons. Neutralization techniques are a common feature of criminological studies. <xref ref-type="bibr" rid="B54">Murphy and Dacin (2011)</xref>, in their investigation into the prevention of fraud, found that those who engage in fraudulent behavior employ neutralization techniques to avoid or minimize the negative consequences of their actions. Similarly, In their research on the psychology of tax evaders and welfare fraudsters, Marriott and Lai found that neutralization theory was widely used by both types of offenders to excuse their illegal behaviors (<xref ref-type="bibr" rid="B43">Marriott and Lai, 2023</xref>). A number of other studies have also identified the use of neutralization techniques in relation to deviant behaviors. These include the subculture of right-wing violence (<xref ref-type="bibr" rid="B18">Colvin and Pisoiu, 2021</xref>), white-collar crime (<xref ref-type="bibr" rid="B47">McGrath, 2021</xref>), and workplace cyber-abuse (<xref ref-type="bibr" rid="B71">van Baak et al., 2023</xref>).</p>
<p>It is inevitable that while neutralization theory is widely supported as a framework for understanding violations, it remains deficient in some respects (<xref ref-type="bibr" rid="B44">Maruna and Copes, 2005</xref>). McLean K points out that there is no discussion in <xref ref-type="bibr" rid="B46">Matza and Sykes&#x2019;s (1957)</xref> study of how or why neutralization occurs, and that the mechanisms by which individuals engage in neutralization techniques are ambiguous. He further suggests that perceptions of procedural injustices may be one of the sources of neutralization (<xref ref-type="bibr" rid="B48">McLean and Wolfe, 2016</xref>). Accordingly, this study broadens its scope to encompass the perception of fairness as a potential factor influencing the efficacy of neutralization techniques.</p>
<p>Previous research has provided a foundation for the construction of a relationship between perceptions of classroom justice and neutralization techniques. In his 1964 refinement of Sykes&#x2019;s theory of neutralization, Matza observed that whenever a sense of injustice is prevalent, the moral restraints of the law are loosened, allowing neutralization techniques to take advantage of the situation. This suggests that perceptions of injustice are the forerunners of neutralization techniques (<xref ref-type="bibr" rid="B45">Matza, 2018</xref>). Further studies have demonstrated a correlation between procedural justice and neutralization techniques. These studies have indicated that perceptions of procedural injustice can lead to a relaxation of moral constraints, and that individuals are more likely to adopt neutralization techniques as a result (<xref ref-type="bibr" rid="B48">McLean and Wolfe, 2016</xref>; <xref ref-type="bibr" rid="B37">Lazarus et al., 2025</xref>). The aforementioned studies confirm that there is indeed a link between fairness perceptions and neutralization techniques. However, following a search and organization of the literature, no empirical studies have been found that examine how students&#x2019; perceptions of fairness affect their use of neutralization techniques in an educational setting. Consequently, the present study sought to establish a link between perceptions of classroom justice and the use of neutralization techniques.</p>
<p>The perceptions of students regarding justice can influence the utilization of the condemnation of condemners&#x2019; technique. The condemnation of condemners is a process whereby a person who has committed a transgressive act subsequently attacks the target (either a person or an object) who has blamed them (<xref ref-type="bibr" rid="B9">Byers et al., 1999</xref>). <xref ref-type="bibr" rid="B46">Matza and Sykes (1957)</xref> note that by attacking others, perpetrators divert attention away from their own transgressive behavior to the motives and actions of those opposing their actions, making it easier for them to overlook their own faults. In classroom contexts, the specific manifestations of students using the condemnation of condemners technique to justify their cyberloafing behaviors include: when caught using mobile phones during class, students might say &#x201C;The teacher&#x2019;s lecture is too boring, just reading from PPT slides, of course I need to find something else to do&#x201D; (questioning the teacher&#x2019;s teaching competence); &#x201C;This teacher obviously favors good students and doesn&#x2019;t care about ordinary students like us, why should I listen attentively&#x201D; (questioning the teacher&#x2019;s fairness) (<xref ref-type="bibr" rid="B12">Chory, 2023</xref>). Students will find reasons to excuse their own transgressive behavior, such as complaining about a teacher&#x2019;s poor teaching methods or poor classroom organization (<xref ref-type="bibr" rid="B2">Alexander and Opsal, 2021</xref>; <xref ref-type="bibr" rid="B72">Walsh et al., 2021</xref>). The perception of unfairness provides another good excuse for students to condemn their teachers for the purpose of transferring blame. Students who perceive that they have been treated unfairly exhibit more hostility and aggression toward their teachers, and an increase in retaliatory and deceptive behaviors (<xref ref-type="bibr" rid="B14">Chory et al., 2017</xref>). They are reluctant to interact or talk in class and exhibit negative classroom emotions (<xref ref-type="bibr" rid="B30">Horan et al., 2012</xref>). Furthermore, research indicates that students&#x2019; consumerist tendencies result in them consistently identifying areas of dissatisfaction with their educators (<xref ref-type="bibr" rid="B63">Sharma, 2020</xref>). Since teachers serve as authority figures in the classroom system, their competence, character, and care largely determine the level of classroom justice (<xref ref-type="bibr" rid="B13">Chory, 2007</xref>). When students perceive that they are treated unfairly in the classroom, such as through unfair grading, unfair rewards and punishments, or unequal teaching resources, they will direct their frustration toward the teacher, developing resentment toward him or her. Students&#x2019; perceptions of injustice in the classroom elicit emotional and behavioral responses, the most overt of which are manifestations of anger and dissent. The perception of unfair treatment by the teacher leads to a decline in the teacher&#x2019;s authority and respect among students. This, in turn, results in students denouncing the teacher&#x2019;s unfairness to themselves, their classmates, and even the next students. Consequently, we put forth the following hypothesis:</p>
<disp-quote>
<p>H2: Classroom justice is negatively related to the condemnation of condemners.</p>
</disp-quote>
<p>Another manifestation of students&#x2019; perceptions of classroom justice is the appeal to higher loyalties. This refers to individuals justifying their deviance behavior by claiming that it is in pursuit of higher levels of value and meaning (<xref ref-type="bibr" rid="B39">Li and Cheng, 2013</xref>). The core of this technique lies in that individuals do not deny that their behavior may have violated certain rules, but claim that such behavior stems from loyalty to more important values or goals (<xref ref-type="bibr" rid="B2">Alexander and Opsal, 2021</xref>). Sykes notes that offenders are caught in a dilemma, having to choose between special needs and breaking the rules. They do not deny that their behavior violates the rules of mainstream society; however, they believe that it is justified to break the rules for a more meaningful purpose, such as for friendship (<xref ref-type="bibr" rid="B46">Matza and Sykes, 1957</xref>). A similar phenomenon can be observed in the classroom setting, when browsing web pages or using social media during class, students might justify their behavior by saying &#x201C;I&#x2019;m searching for the latest materials related to this course; online information is more timely than textbooks&#x201D; (claiming to pursue more current knowledge); &#x201C;I&#x2019;m preparing for upcoming job hunting; submitting resumes is more helpful for my future than listening to these theoretical courses&#x201D; (emphasizing loyalty to personal development) (<xref ref-type="bibr" rid="B17">&#x010C;iuladien&#x0117; and Ra&#x010D;elyt&#x0117;, 2016</xref>; <xref ref-type="bibr" rid="B12">Chory, 2023</xref>). Students believe that they are now engaging in activities in the classroom that are not related to course content, such as completing assignments for other courses, responding to messages from instructors or friends, or even taking breaks, is more important than listening to lectures. Consequently, students are compelled to choose between their allegiance to the classroom and their engagement with non-classroom activities. Contemporary students exhibit a stronger claim to equality and justice in the classroom than their predecessors. They feel that they can choose to participate or withdraw from the classroom based on how they feel (<xref ref-type="bibr" rid="B55">Pathan et al., 2017</xref>). For students who perceive injustice in the classroom, the value of the classroom and the authority of the teacher are diminished, and compliance with classroom rules appears to become less important. The fostering of such feelings of injustice encourages students to cease demonstrating loyalty to the classroom, thereby shifting the balance of loyalty toward activities that are not directly related to the classroom. Consequently, we put forth the following hypothesis:</p>
<disp-quote>
<p>H3: Classroom justice is negatively related to appeal to higher loyalties.</p>
</disp-quote>
</sec>
<sec id="S2.SS4">
<title>2.4 Two neutralization techniques as mediators</title>
<p>The term &#x201C;classroom cyberloafing&#x201D; refers to the online deviant behavior of students who use the Internet and mobile devices in the classroom to engage in activities unrelated to the learning content, such as browsing entertainment news, watching online videos or sending messages in the classroom (<xref ref-type="bibr" rid="B32">Kalayc&#x0131;, 2010</xref>). A number of studies have demonstrated that students&#x2019; engagement in cyberloafing in the classroom has a detrimental impact on education. This not only reduces students&#x2019; classroom engagement but also has a negative effect on teachers&#x2019; enthusiasm and effectiveness (<xref ref-type="bibr" rid="B24">Gerow et al., 2010</xref>). Upon realizing the potential dangers of cyberloafing, scholars began to rely on various theories in order to identify factors that could explain cyberloafing from multiple perspectives. For instance, Gerow, employing a field theory approach that considers both external and internal forces, identified that social norms (beliefs about rules), cognitive absorption (the state of being deeply engaged with online technology in the classroom), and multitasking (the ability to perform multiple tasks simultaneously) all have an impact on students&#x2019; intentions to engage in cyberloafing (<xref ref-type="bibr" rid="B24">Gerow et al., 2010</xref>). <xref ref-type="bibr" rid="B69">Taneja et al. (2015)</xref> also investigated the potential influence of various factors on students&#x2019; intentions to utilize connected devices in the classroom. These include consumerism, escapism, attention deficit, cyberloafing anxiety, and distraction from others&#x2019; cyberloafing behaviors (<xref ref-type="bibr" rid="B69">Taneja et al., 2015</xref>). Furthermore, scholars have employed the theoretical lens of the theory of planned behavior to demonstrate that both habit and intention are significantly associated with cyberloafing behavior (<xref ref-type="bibr" rid="B66">Soh et al., 2018</xref>). The investigation into student cyberloafing is ongoing, and the application of neutralization techniques offers a distinctive approach to furthering the research. The neutralization technique places greater emphasis on the human heart and considers student cyberloafing within the broader context of criminal behavior, in order to gain insight into the perceived &#x201C;freedom&#x201D; of students.</p>
<p>Neutralization techniques can be a significant predictor of intention to engage in cyberloafing. In organizational contexts, when individuals perceive that the remuneration they receive is not commensurate with the quantity of work they perform, they utilize a form of ledger-like neutralization technique to justify their subsequent cyberloafing behavior (<xref ref-type="bibr" rid="B40">Lim, 2002</xref>). Some studies have demonstrated that employees utilize a multitude of neutralization techniques to justify their cyberloafing behavior in the workplace (<xref ref-type="bibr" rid="B7">Batabyal and Bhal, 2020</xref>). The explanatory role of neutralization theory is equally applicable in the field of education. Sharma examined the impact of neutralization techniques and consumerism on students&#x2019; intention to cyberloaf in the classroom, which is one of the few studies to apply neutralization theory to students&#x2019; cyberloafing (<xref ref-type="bibr" rid="B63">Sharma, 2020</xref>). Nevertheless, the mechanism of action of neutralization techniques as a pathway to explore the relationship between classroom justice and intention to cyberloaf has not yet been studied.</p>
<p>The present study proposes that classroom justice negatively predicts students&#x2019; intention to engage in cyberloafing through condemnation of condemners. This is based on the following reasons. Firstly, students&#x2019; perceptions of classroom injustice can result in dissent and dissatisfaction with the teacher, which in turn can positively affect the condemnation of condemners technique. Secondly, it is our contention that the condemnation of condemners will result in an increase in students&#x2019; willingness to engage in cyberloafing. Individuals have an innate desire to present a positive image of themselves, and most offenders are able to recognize that their behavior is wrong, creating a conflict between the need to maintain an image and transgressive behavior (<xref ref-type="bibr" rid="B46">Matza and Sykes, 1957</xref>; <xref ref-type="bibr" rid="B60">Robinson and Kraatz, 1998</xref>). Thus, by denouncing the denouncers, a solution to this internal conflict can be found. In particular, by criticizing or complaining about their teachers, students are able to deflect the blame and attention away from themselves, thereby reducing the shame and guilt they feel as a result of engaging in cyberloafing behavior. Students who engage in cyberloafing may attribute their actions to unreasonable classroom rules or instructional content that fails to engage them, despite the time they are investing in the activity. Therefore, it is not appropriate to hold students responsible for engaging in cyberloafing, which is the responsibility of the teacher and the school. Previous research has also confirmed the significant positive predictive effect of condemnation of condemners&#x2019; technique on the intention to cyberloaf (<xref ref-type="bibr" rid="B39">Li and Cheng, 2013</xref>; <xref ref-type="bibr" rid="B25">G&#x00FC;ger&#x00E7;in, 2020</xref>). As a result, we argue that students who feel injustice in the classroom have no qualms about engaging in cyberloafing by shifting the blame and fault to others through the condemnation condemner technique. Therefore, we propose:</p>
<disp-quote>
<p>H4: Condemnation of the condemners mediates the negative relationship between classroom justice and intention to cyberloaf.</p>
</disp-quote>
<p>The appeal to higher loyalties plays a similar role. The perception of injustice has a detrimental effect on the teacher-student relationship, as well as the authority of classroom rules and the teacher, resulting in a decline in classroom loyalty and an increase in students&#x2019; intention to engage in cyberloafing. Individuals are always evaluating the advantages and disadvantages of a given situation and tend to select the course of action that will yield the greatest benefit (<xref ref-type="bibr" rid="B28">Homans, 1961</xref>). Students who engage in behaviors unrelated to the content of the class claim that their cyberloafing behavior is driven by the pursuit of higher expectations, the desire to recover from the experience, the avoidance of boredom, or the need to fall asleep in class. The experience of injustice made the classroom less meaningful and demonstrated a lack of loyalty to the classroom. Research indicates that students who exhibit a lack of loyalty to the classroom are more likely to engage in cyberloafing (<xref ref-type="bibr" rid="B63">Sharma, 2020</xref>). Students with less loyalty to the classroom are more likely than students with more loyalty to the classroom to engage in behaviors that violate classroom rules, such as responding to a friend&#x2019;s message or completing other coursework during class. Furthermore, cyberloafing can be conceptualized as a form of withdrawal behavior, reflecting an individual&#x2019;s attempts to cope with dissatisfaction and perceived injustice (<xref ref-type="bibr" rid="B4">Askew, 2012</xref>; <xref ref-type="bibr" rid="B5">Askew et al., 2014</xref>). Consequently, we posit that injustice prompts a decline in classroom loyalty, prompting students to seek out alternative sources of attachment and increasing their likelihood of engaging in cyberloafing. Consequently, we put forth the following hypothesis:</p>
<disp-quote>
<p>H5: Appeal to higher loyalties mediates the negative relationship between classroom justice and intention to cyberloaf.</p>
</disp-quote>
</sec>
</sec>
<sec id="S3">
<title>3 Research methods</title>
<sec id="S3.SS1">
<title>3.1 Sample and method</title>
<p>Prior to commencing the data collection process, the questionnaire underwent a preliminary testing phase with 20 undergraduate students. As the questionnaire was translated from a mature foreign questionnaire, it was necessary to make minor modifications to the word order and wording of some items in order to avoid comprehension bias. These modifications were based on the comments and feedback from the 20 respondents after they had completed the questionnaire.</p>
<p>This study employed a two-stage survey design with stratified sampling methodology to investigate 310 university students from various universities in the central and eastern regions of China between March and May 2024. Considering that regional differences, university types, and academic backgrounds might influence students&#x2019; perceptions of classroom justice and online usage behaviors, we conducted systematic sampling through the user pool of &#x201C;Credamo,&#x201D; a professional online survey platform. This platform represents one of China&#x2019;s largest professional online survey platforms, covering students from universities across multiple regions and levels nationwide, thereby providing an excellent sampling framework for this research. In terms of sampling design, we primarily focused on higher education institutions in East China and Central China regions, including both key universities and regular university institutions of different tiers. The sample encompassed major disciplinary categories such as economics and management, liberal arts and philosophy, and science and engineering, as well as students from freshman to senior years and graduate students at various levels, ensuring sample diversity and representativeness. The specific sampling procedure consisted of three stages. First, screening criteria were established within the platform&#x2019;s user pool, including active university student status, age range of 18&#x2013;25 years, and residence in target regions, initially screening approximately 550 potential participants who met these requirements. Second, to ensure reasonable sample structure, we established quotas for various strata, including gender proportion, uniform distribution across different academic categories, and relatively balanced representation across grade levels. Finally, survey invitations were randomly distributed among qualified users following a first-come-first-served principle until the predetermined sample size was achieved. Participants completed the questionnaire online and received compensation of 2 RMB. Throughout this process, strict quality control measures were implemented, including IP address restrictions to prevent duplicate responses, response time monitoring, attention check items, and detection of consistent response patterns to eliminate obviously careless responses. Through this systematic sampling procedure, the final sample successfully achieved the expected diversity requirements in terms of regional distribution, institutional types, academic composition, and grade level distribution. This study collected data in two stages, in accordance with the recommendations set forth by <xref ref-type="bibr" rid="B56">Podsakoff et al. (2003)</xref>. In the initial phase, data pertaining to demographic characteristics, perceptions of classroom justice, and two mediating variables were collected. The intention to engage in cyberloafing was measured one month apart in the second stage. In the initial phase, 366 questionnaires were distributed, and 331 valid responses were obtained, representing a 90.44% recovery rate. In the subsequent phase, 331 questionnaires were distributed, and 310 valid responses were collected, resulting in a 93.66% recovery rate. The aforementioned invalid responses were discarded due to the questionnaires being too brief to be completed or due to inconsistency in the responses or the absence of some responses.</p>
<p>A total of 310 valid questionnaires were obtained for the test of this study, of which 109 (35.2%) were males and 201 (64.8%) were females. The students who participated in the questionnaires were from different majors, including Economics and Management (34.5%), Literature, History, and Philosophy (22.3%), Science and Technology (36.1%), and Others (7.1%). The respondents had different levels of education, with approximately 85% of respondents studying at the undergraduate level and approximately 15% at the graduate level.</p>
</sec>
<sec id="S3.SS2">
<title>3.2 Measurement tools</title>
<p>The online questionnaire comprised four sections: the Classroom Justice Scale, the Neutralization Technology Scale, the Intention to Cyberloaf Scale, and demographic information. Students were asked to rate the items in the aforementioned questionnaire based on their true feelings. Responses to all variables were categorized on a five-point scale from strongly disagree (1) to strongly agree (5). The specific sources and content of each scale are listed below:</p>
<sec id="S3.SS2.SSS1">
<title>3.2.1 Classroom justice</title>
<p>The measures of classroom justice comprise the distributive and procedural justice scales developed by <xref ref-type="bibr" rid="B16">Chory-Assad and Paulsel (2004)</xref> and the interactive justice scale developed by <xref ref-type="bibr" rid="B13">Chory (2007)</xref>. The items were related to students&#x2019; perceptions of fairness in earning grades in the course, perceptions of fairness in evaluating instructor placement and course policies in the classroom, and perceptions of fairness in instructor-student interpersonal interactions. A total of 30 items were measured, including the following: &#x201C;The way the instructor grades course grades,&#x201D; and &#x201C;The way the instructor treats students.&#x201D; Cronbach&#x2019;s alpha for the scale was &#x03B1; = 0.90.</p>
</sec>
<sec id="S3.SS2.SSS2">
<title>3.2.2 Two neutralization techniques</title>
<p>A maturation scale adapted by <xref ref-type="bibr" rid="B63">Sharma (2020)</xref> was employed to assess the two neutralization techniques of Condemnation of Condemners and Appeal to Higher Loyalties. Each of the two concepts was measured with three items, for example, &#x201C;If the course policy is too strict, then it is not wrong to use the internet/smartphone/computer in violation of the course policy,&#x201D; and &#x201C;If you complete the tasks assigned by the instructor, then using the internet/smartphone/computer in the classroom is acceptable.&#x201D; Cronbach&#x2019;s alpha for these two scales was &#x03B1; = 0.80 and &#x03B1; = 0.86.</p>
</sec>
<sec id="S3.SS2.SSS3">
<title>3.2.3 Intention to cyberloaf</title>
<p>The scale developed by <xref ref-type="bibr" rid="B69">Taneja et al. (2015)</xref> was employed to assess students&#x2019; intentions to engage in cyberloafing, which was also measured with three items, such as &#x201C;I plan to use the Internet/mobile phone for non-classroom related activities in future classes.&#x201D; Cronbach&#x2019;s alpha for the scale was &#x03B1; = 0.89.</p>
</sec>
<sec id="S3.SS2.SSS4">
<title>3.2.4 Control variables</title>
<p>It has been demonstrated by previous research that demographic variables, such as gender and grade level, influence students&#x2019; cyberloafing behavior (<xref ref-type="bibr" rid="B23">Fallows, 2005</xref>; <xref ref-type="bibr" rid="B8">Baturay and Toker, 2015</xref>; <xref ref-type="bibr" rid="B35">Knight, 2017</xref>). For instance, <xref ref-type="bibr" rid="B8">Baturay&#x2019;s and Toker (2015)</xref> study revealed that male students exhibited a greater tendency to engage in cyberloafing than their female counterparts. Similarly, grade level was found to have an impact on online cyberloafing, with students in higher grades being more experienced and aware of classroom styles than those in lower grades, who demonstrated more intention to cyberloaf. Consequently, this study employed the gender variable, the grade level variable, and the education level as control variables.</p>
</sec>
</sec>
</sec>
<sec id="S4">
<title>4 Data analysis and results</title>
<sec id="S4.SS1">
<title>4.1 Common method bias test</title>
<p>As all questions in this questionnaire were completed by subjects at the same time by self-report, which may lead to changes in the dependent variable that are derived from the same measurements rather than the effect of the independent variable. To test for common method bias, Harman&#x2019;s single factor test was used (<xref ref-type="bibr" rid="B56">Podsakoff et al., 2003</xref>). We entered all questions into an unrotated principal component factor analysis and the results showed that factors with eigenvalues greater than 1 were extracted and the maximum factor variance explained was 21.48% (less than 40%). Therefore, we can conclude that there is no significant common method bias in this study and its effect on the final measures is minimal.</p>
</sec>
<sec id="S4.SS2">
<title>4.2 Confirmatory factor analysis</title>
<p>Before validating the structural model, we need to evaluate the measurement model. The evaluation of the measurement model includes reliability, structural validity, convergent validity and discriminant validity, and in this study, these criteria were examined using SPSS 26.0 and AMOS software. As shown in <xref ref-type="table" rid="T1">Table 1</xref>, Cronbach&#x2019;s alpha (&#x03B1;), composite reliability (CR), average variance extracted (AVE), maximum shared variance (MSV) and square root of AVE values are presented. An acceptable Cronbach alpha index (&#x03B1; &#x003E; 0.70) was obtained for all variables in this study, indicating that the scale expressed a satisfactory level of reliability. For structural validity, the goodness of fit indices [&#x03C7;<sup>2</sup> (310) = 98.915, &#x03C7;<sup>2</sup>/df = 2.061, IFI = 0.973, TLI = 0.963, CFI = 0.973, RMSEA = 0.059] were within reasonable limits, supporting the plausibility of the hypothesized model. Secondly, discriminant validity was examined by comparing the magnitude of the square root of AVE with the correlation coefficients between the variables. The values of the square root of AVE for the four variables were greater than their correlation coefficients and MSV &#x003C; AVE, indicating that the discriminant validity of the scale was good. Finally, we examined whether the composite reliability (CR &#x003E; 0.7) and average variance extracted (AVE &#x003E; 0.5) were within reasonable intervals, and the factor loadings of each question item were greater than 0.5, indicating that the convergent validity was ideal, as shown in <xref ref-type="table" rid="T1">Table 1</xref>.</p>
<table-wrap position="float" id="T1">
<label>TABLE 1</label>
<caption><p>Reliability and validity.</p></caption>
<table cellspacing="5" cellpadding="5" frame="box" rules="all">
<thead>
<tr>
<td valign="top" align="center">Construct</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">&#x03B1;</td>
<td valign="top" align="center">CR</td>
<td valign="top" align="center">AVE</td>
<td valign="top" align="center">MSV</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="center">1. Classroom justice</td>
<td valign="top" align="center"><bold>0.744</bold></td>
<td/>
<td/>
<td/>
<td valign="top" align="center">0.902</td>
<td valign="top" align="center">0.781</td>
<td valign="top" align="center">0.553</td>
<td valign="top" align="center">0.105</td>
</tr>
<tr>
<td valign="top" align="center">2. Condemnation of condemners</td>
<td valign="top" align="center">&#x2212;0.190</td>
<td valign="top" align="center"><bold>0.758</bold></td>
<td/>
<td/>
<td valign="top" align="center">0.799</td>
<td valign="top" align="center">0.801</td>
<td valign="top" align="center">0.574</td>
<td valign="top" align="center">0.497</td>
</tr>
<tr>
<td valign="top" align="center">3. Appeal to higher loyalties</td>
<td valign="top" align="center">&#x2212;0.222</td>
<td valign="top" align="center">0.705</td>
<td valign="top" align="center"><bold>0.819</bold></td>
<td/>
<td valign="top" align="center">0.857</td>
<td valign="top" align="center">0.859</td>
<td valign="top" align="center">0.671</td>
<td valign="top" align="center">0.516</td>
</tr>
<tr>
<td valign="top" align="center">4. Intention to cyberloaf</td>
<td valign="top" align="center">&#x2212;0.324</td>
<td valign="top" align="center">0.563</td>
<td valign="top" align="center">0.718</td>
<td valign="top" align="center"><bold>0.858</bold></td>
<td valign="top" align="center">0.892</td>
<td valign="top" align="center">0.894</td>
<td valign="top" align="center">0.737</td>
<td valign="top" align="center">0.516</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p><italic>N</italic> = 310; MSV, maximum shared variance; Bolded values on the diagonals of columns 2&#x2013;5 are the square root values of AVE.</p></fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="S4.SS3">
<title>4.3 Correlation analysis</title>
<p>The means and correlations of the variables are presented in <xref ref-type="table" rid="T2">Table 2</xref>. The correlation analysis results show that classroom justice exhibits a weak negative correlation with condemnation of condemners (<italic>r</italic> = &#x2212;0.143, <italic>p</italic> &#x003C; 0.05) and with appeal to higher loyalties (<italic>r</italic> = &#x2212;0.174, <italic>p</italic> &#x003C; 0.01), and a moderate negative correlation with cyberloafing (<italic>r</italic> = &#x2212;0.278, <italic>p</italic> &#x003C; 0.01). These negative correlations indicate that the higher students&#x2019; perception of classroom justice, the lower their tendency to use neutralization techniques and engage in cyberloafing. Notably, the two neutralization techniques show a moderate positive correlation (<italic>r</italic> = 0.594, <italic>p</italic> &#x003C; 0.01), suggesting that students tend to use multiple neutralization techniques simultaneously. Condemnation of condemners exhibits a moderate positive correlation with cyberloafing (<italic>r</italic> = 0.485, <italic>p</italic> &#x003C; 0.01), while appeal to higher loyalties shows a strong positive correlation with cyberloafing (<italic>r</italic> = 0.626, <italic>p</italic> &#x003C; 0.01), indicating that the use of neutralization techniques is closely related to cyberloafing intentions, with appeal to higher loyalties showing a stronger association with cyberloafing. These correlational relationships provide preliminary support for our research hypotheses and establish the foundation for subsequent regression analysis and mediation effect testing.</p>
<table-wrap position="float" id="T2">
<label>TABLE 2</label>
<caption><p>Means and correlations.</p></caption>
<table cellspacing="5" cellpadding="5" frame="box" rules="all">
<thead>
<tr>
<td valign="top" align="center">Construct</td>
<td valign="top" align="center">Means</td>
<td valign="top" align="center">SD</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">3</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="center">1. Classroom justice</td>
<td valign="top" align="center">3.93</td>
<td valign="top" align="center">0.42</td>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="center">2. Condemnation of condemners</td>
<td valign="top" align="center">2.55</td>
<td valign="top" align="center">0.88</td>
<td valign="top" align="center">&#x2212;0.143<xref ref-type="table-fn" rid="t2fns1">&#x002A;</xref></td>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="center">3. Appeal to higher loyalties</td>
<td valign="top" align="center">3.44</td>
<td valign="top" align="center">0.96</td>
<td valign="top" align="center">&#x2212;0.174<xref ref-type="table-fn" rid="t2fns1">&#x002A;&#x002A;</xref></td>
<td valign="top" align="center">0.594<xref ref-type="table-fn" rid="t2fns1">&#x002A;&#x002A;</xref></td>
<td/>
</tr>
<tr>
<td valign="top" align="center">4. Intention to cyberloaf</td>
<td valign="top" align="center">2.99</td>
<td valign="top" align="center">1.05</td>
<td valign="top" align="center">&#x2212;0.278<xref ref-type="table-fn" rid="t2fns1">&#x002A;&#x002A;</xref></td>
<td valign="top" align="center">0.485<xref ref-type="table-fn" rid="t2fns1">&#x002A;&#x002A;</xref></td>
<td valign="top" align="center">0.626<xref ref-type="table-fn" rid="t2fns1">&#x002A;&#x002A;</xref></td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="t2fns1"><p><italic>N</italic> = 310, &#x002A;&#x002A;<italic>p</italic> &#x003C; 0.01,&#x002A;<italic>p</italic> &#x003C; 0.05.</p></fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="S4.SS4">
<title>4.4 Testing of hypotheses</title>
<p>In this study, <xref ref-type="bibr" rid="B26">Hayes&#x2019; (2013)</xref> SPSS Extended Macro-process Model 4 (a simple mediation model) was used to test the mediating role of condemnation of condemners and appeal to higher loyalties in the relationship between classroom justice and intention to cyberloaf, and the other hypotheses mentioned above were tested by regression analysis. The results of the tests are shown in <xref ref-type="table" rid="T3">Table 3</xref>: as can be seen from the results of the tests of Models 2 and 3, students&#x2019; perceptions of classroom justice are significant predictors of condemnation of condemners (&#x03B2; = &#x2212;0.130, <italic>p</italic> &#x003C; 0.05) and appeal to higher loyalties (&#x03B2; = &#x2212;0.153, <italic>p</italic> &#x003C; 0.01); therefore, Hypotheses 2 and 3 are verified. Classroom justice was a significant predictor of intention to cyberloaf (&#x03B2; = &#x2212;0.255, <italic>p</italic> &#x003C; 0.01) and the value of the direct effect of perceived classroom justice on intention to cyberloaf was &#x2212;0.39 (SE = 0.11, 95% IC [&#x2212;0.6, &#x2212;0.18]) (<xref ref-type="table" rid="T4">Table 4</xref>), which is a significant direct effect; Hypothesis 1 was verified. In addition, from the test results of Model 5, it can be seen that condemnation of condemners (&#x03B2; = 0.162, <italic>p</italic> &#x003C; 0.01) and appeal to higher loyalties (&#x03B2; = 0.491, <italic>p</italic> &#x003C; 0.01) are also significant predictors of the intention to cyberloaf.</p>
<table-wrap position="float" id="T3">
<label>TABLE 3</label>
<caption><p>Regression results.</p></caption>
<table cellspacing="5" cellpadding="5" frame="box" rules="all">
<thead>
<tr>
<td valign="top" align="center">Construct</td>
<td valign="top" align="left" colspan="2">Condemnation of condemners</td>
<td valign="top" align="center">Appeal to higher loyalties</td>
<td valign="top" align="left" colspan="2">Intention to cyberloaf</td>
</tr>
<tr>
<td valign="top" align="center"></td>
<td valign="top" align="center">Model 1</td>
<td valign="top" align="center">Model 2</td>
<td valign="top" align="center">Model 3</td>
<td valign="top" align="center">Model 4</td>
<td valign="top" align="center">Model 5</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="center">Gender</td>
<td valign="top" align="center">0.137</td>
<td valign="top" align="center">0.063</td>
<td valign="top" align="center">0.112</td>
<td valign="top" align="center">0.101</td>
<td valign="top" align="center">0.036</td>
</tr>
<tr>
<td valign="top" align="center">Educational level</td>
<td valign="top" align="center">&#x2212;0.06</td>
<td valign="top" align="center">&#x2212;0.007</td>
<td valign="top" align="center">&#x2212;0.125</td>
<td valign="top" align="center">&#x2212;0.055</td>
<td valign="top" align="center">0.007</td>
</tr>
<tr>
<td valign="top" align="center">Major</td>
<td valign="top" align="center">&#x2212;0.149</td>
<td valign="top" align="center">&#x2212;0.053</td>
<td valign="top" align="center">&#x2212;0.076</td>
<td valign="top" align="center">&#x2212;0.136</td>
<td valign="top" align="center">&#x2212;0.09</td>
</tr>
<tr>
<td valign="top" align="center">Classroom justice</td>
<td/>
<td valign="top" align="center">&#x2212;0.130<xref ref-type="table-fn" rid="t3fns1">&#x002A;</xref></td>
<td valign="top" align="center">&#x2212;0.153<xref ref-type="table-fn" rid="t3fns1">&#x002A;&#x002A;</xref></td>
<td valign="top" align="center">&#x2212;0.255<xref ref-type="table-fn" rid="t3fns1">&#x002A;&#x002A;</xref></td>
<td valign="top" align="center">&#x2212;0.158<xref ref-type="table-fn" rid="t3fns1">&#x002A;&#x002A;</xref></td>
</tr>
<tr>
<td valign="top" align="center">Condemnation of condemners</td>
<td/>
<td/>
<td/>
<td/>
<td valign="top" align="center">0.162<xref ref-type="table-fn" rid="t3fns1">&#x002A;&#x002A;</xref></td>
</tr>
<tr>
<td valign="top" align="center">Appeal to higher loyalties</td>
<td/>
<td/>
<td/>
<td/>
<td valign="top" align="center">0.491<xref ref-type="table-fn" rid="t3fns1">&#x002A;&#x002A;</xref></td>
</tr>
<tr>
<td valign="top" align="center">R<sup>2</sup></td>
<td valign="top" align="center">0.045</td>
<td valign="top" align="center">0.028</td>
<td valign="top" align="center">0.038</td>
<td valign="top" align="center">0.109</td>
<td valign="top" align="center">0.449</td>
</tr>
<tr>
<td valign="top" align="center">&#x25B3;R<sup>2</sup></td>
<td valign="top" align="center">0.045</td>
<td valign="top" align="center">0.017</td>
<td valign="top" align="center">0.038</td>
<td valign="top" align="center">0.063</td>
<td valign="top" align="center">0.149</td>
</tr>
<tr>
<td valign="top" align="center">F</td>
<td valign="top" align="center">4.859<xref ref-type="table-fn" rid="t3fns1">&#x002A;&#x002A;</xref></td>
<td valign="top" align="center">2.164<xref ref-type="table-fn" rid="t3fns1">&#x002A;</xref></td>
<td valign="top" align="center">4.952<xref ref-type="table-fn" rid="t3fns1">&#x002A;&#x002A;</xref></td>
<td valign="top" align="center">9.304<xref ref-type="table-fn" rid="t3fns1">&#x002A;&#x002A;</xref></td>
<td valign="top" align="center">41.226<xref ref-type="table-fn" rid="t3fns1">&#x002A;&#x002A;</xref></td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="t3fns1"><p><italic>N</italic> = 310, &#x002A;&#x002A;<italic>p</italic> &#x003C; 0.01,&#x002A;<italic>p</italic> &#x003C; 0.05.</p></fn>
</table-wrap-foot>
</table-wrap>
<table-wrap position="float" id="T4">
<label>TABLE 4</label>
<caption><p>Direct and indirect effects and 95% confidence intervals.</p></caption>
<table cellspacing="5" cellpadding="5" frame="box" rules="all">
<thead>
<tr>
<td valign="top" align="center">Effect</td>
<td valign="top" align="center">B</td>
<td valign="top" align="center">SE</td>
<td valign="top" align="center"><italic>t</italic>-value</td>
<td valign="top" align="center">LL</td>
<td valign="top" align="center">UL</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left" colspan="6"><bold>Direct effect</bold></td>
</tr>
<tr>
<td valign="top" align="left">Classroom justice&#x2192;intention to cyberloaf</td>
<td valign="top" align="center">&#x2212;0.39</td>
<td valign="top" align="center">0.11</td>
<td valign="top" align="center">&#x2212;3.6</td>
<td valign="top" align="center">&#x2212;0.60</td>
<td valign="top" align="center">&#x2212;0.18</td>
</tr>
<tr>
<td valign="top" align="left" colspan="6"><bold>Indirect effects</bold></td>
</tr>
<tr>
<td valign="top" align="left">Classroom justice&#x2192;condemnation of condemners&#x2192;intention to cyberloaf</td>
<td valign="top" align="center">&#x2212;0.05</td>
<td valign="top" align="center">0.03</td>
<td/>
<td valign="top" align="center">&#x2212;0.13</td>
<td valign="top" align="center">&#x2212;0.002</td>
</tr>
<tr>
<td valign="top" align="left">Classroom justice&#x2192;appeal to higher loyalties&#x2192;intention to cyberloaf</td>
<td valign="top" align="center">&#x2212;0.19</td>
<td valign="top" align="center">0.07</td>
<td/>
<td valign="top" align="center">&#x2212;0.33</td>
<td valign="top" align="center">&#x2212;0.06</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p><italic>N</italic> = 310; B, unstandardized regression coefficients; SE, standard error; Bootstrap sample size = 5,000; LL, lower limit; UL, upper limit.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>Bootstrap was used to further test the mediating effects of the two neutralization techniques, and classroom justice had a significant indirect effect on students&#x2019; intention to cyberloaf through condemnation of condemners (<italic>B</italic> = &#x2212;0.05, LLCI = &#x2212;0.13, ULCI = &#x2212;0.002), LLCI (Lower Level Confidence Interval) represents the lower bound of the confidence interval, while ULCI (Upper Level Confidence Interval) represents the upper bound of the confidence interval. Since the 95% confidence interval does not contain 0 (ranging from &#x2212;0.13 to &#x2212;0.002, all negative values), this indicates that the indirect mediation effect of condemnation of condemners is statistically significant, providing support for Hypothesis 4. Classroom justice had a significant indirect effect on students&#x2019; intention to cyberloaf by appealing to higher loyalties (<italic>B</italic> = &#x2212;0.19, LLCI = &#x2212;0.33, ULCI = &#x2212;0.06). Similarly, since the confidence interval [&#x2212;0.33, &#x2212;0.06] does not contain 0, this indicates that the indirect mediation effect of appeal to higher loyalties is statistically significant, providing support for Hypothesis 5.</p>
</sec>
</sec>
<sec id="S5" sec-type="discussion">
<title>5 Discussion</title>
<p>Does students&#x2019; perceived classroom justice predict their intention to engage in cyberloafing in the classroom? Existing research provides some theoretical basis for addressing this question. On the one hand, the current study confirms that organizational justice, also a fairness variable, significantly predicts employees&#x2019; intentions to engage in cyberloafing in the workplace; on the other hand, the fact that classroom justice are significantly associated with deviant behaviors is also validated. Based on the neutralization theory, this study introduces two neutralization techniques, condemnation of condemners and appeal to higher loyalties, as mediating variables to explore the effects of classroom justice on the intention to engage in cyberloafing and the mechanisms involved by sampling college and university students from different regions of China. The results of the study show that, first, we found that students&#x2019; perceived classroom justice was negatively related to their intention to cyberloaf (&#x03B2; = &#x2212;0.255, <italic>p</italic> &#x003C; 0.01), and this moderate effect holds important practical managerial value. This effect size indicates that, compared to technological restrictions or punitive measures, enhancing classroom justice represents a highly cost-effective strategy for reducing student cyberloafing. For educators, this means that by establishing transparent grading criteria and ensuring equal opportunities for classroom participation, student cyberloafing behaviors can be significantly reduced. This finding is consistent with conclusions from previous theoretical research, when students perceive themselves to be treated fairly, they are more likely to follow school rules and regulations (<xref ref-type="bibr" rid="B59">Rasooli et al., 2022</xref>). However, a not insignificant number of students report that they have experienced unfair treatment by their teachers (<xref ref-type="bibr" rid="B65">Smith and Gorard, 2012</xref>), and these students are more likely to engage in deviant behaviors (<xref ref-type="bibr" rid="B52">Morris, 2010</xref>), which may include cyberloafing. Students seek to restore justice by engaging in cyberloafing behaviors in the classroom that are unrelated to the content in order to retaliate or boycott their teachers.</p>
<p>Second, our study found that students&#x2019; perceived classroom justice was negatively correlated with both condemnation the condemners and appeal to higher loyalties. Notably, the effect of classroom justice on appeal to higher loyalties (&#x03B2; = &#x2212;0.153) is slightly stronger than its effect on condemnation of condemners (&#x03B2; = &#x2212;0.130), with a higher level of significance. This suggests that when students face classroom injustice, they are more inclined to rationalize their behavior by seeking &#x201C;more valuable&#x201D; alternative activities rather than directly condemning teachers. Teachers are in control of the classroom and student-teacher conflicts are also originally common (<xref ref-type="bibr" rid="B17">&#x010C;iuladien&#x0117; and Ra&#x010D;elyt&#x0117;, 2016</xref>). When students perceive that they are treated unfairly by their teachers, they naturally make the teacher the object of their condemnation, they blame, resist and even attack the teacher (<xref ref-type="bibr" rid="B16">Chory-Assad and Paulsel, 2004</xref>). Students perceive that they are not being respected by their teachers and they are equally justified in ceasing to be loyal to teachers. Their loss of interest in classroom content motivates them to do things they find more meaningful, including responding to messages or completing assignments for other courses, which they see as more important than listening to lectures (<xref ref-type="bibr" rid="B78">Zito and McQuillan, 2010</xref>). We further confirmed that neutralization techniques are positively associated with students&#x2019; intention to cyberloaf, a result that remains largely consistent with the findings of most studies.</p>
<p>Finally, our study shows that students&#x2019; perceived classroom justice influences their intention to cyberloaf through two paths: condemnation of condemners and appeal to higher loyalties. More importantly, we found that the two mediation pathways confirmed by our research demonstrate different effect magnitudes, with the indirect effect of the appeal to higher loyalties pathway (<italic>B</italic> = &#x2212;0.19) being nearly four times stronger than that of the condemnation of condemners pathway (<italic>B</italic> = &#x2212;0.05), providing prioritized guidance for tiered interventions. Based on the stronger mediation effect of appeal to higher loyalties, priority should be given to enhancing the attractiveness of courses and classroom activities, including improving the intrinsic value of courses, creating immersive learning experiences, and helping students establish personalized learning goals. Based on the smaller but significant mediation effect of condemnation of condemners, this should be treated as a supplementary strategy. From the perspective of theoretical mechanisms, neutralizing technology is an excellent factor in explaining students&#x2019; use of the Internet in the classroom for activities unrelated to classroom content. Students&#x2019; perceived unfairness in the classroom served as a good precondition for students to use neutralization techniques to justify their cyberloafing behavior. When teachers are unfair in assigning grades, rewards, or punishments, students are likely to invoke neutralization techniques to justify the infractions they subsequently engage in. The ability of the neutralization technique to alleviate their feelings of guilt led students to develop a higher willingness to cyberloaf. Some student comments support these judgments, &#x201C;Teachers give pretty much higher grades to all students, in order to gain general student approval and goodwill. The effort and seriousness you show in such a class is useless, and there is little difference in your final grades between you who actively answer questions and the students who are absent and leave early or who surf the net on their cell phones in class.&#x201D; &#x201C;It&#x2019;s just not fair that some courses have outdated content that the teacher will just read from a PowerPoint, while I have to spend all my time and energy to take in this outdated knowledge.&#x201D; Students neutralize this sense of injustice by denouncing the teacher or engaging in something they find more meaningful than listening to a lecture, causing them to show a greater intention to cyberloaf.</p>
<sec id="S5.SS1">
<title>5.1 Theoretical contributions</title>
<p>First, the outstanding theoretical contribution of this study is the introduction of classroom justice variables to explain students&#x2019; intention to cyberloaf, expanding the research on factors influencing intention to engage in cyberloaf behaviors under the domain of education. Fairness is one of the important variables in explaining transgressions, and people&#x2019;s perception of unfairness is closely linked to anger, revenge, etc (<xref ref-type="bibr" rid="B53">Muhammad et al., 2024</xref>). <xref ref-type="bibr" rid="B40">Lim (2002)</xref> achieved good results by using employees&#x2019; perceived fairness in the organization as an antecedent variable to explain employees&#x2019; cyberloafing behavior in the workplace. In addition, existing research has confirmed that the link between perceived unfairness and transgressive behavior holds true for students as well (<xref ref-type="bibr" rid="B12">Chory, 2023</xref>). However, there is little research on the link between classroom justice and intention to cyberloaf, and our study is expected to make a contribution in this regard. The results of this study enrich the research on factors influencing students&#x2019; cyberloafing behaviors in classroom settings and help promote a more comprehensive picture of cyberloafing research.</p>
<p>Second, the theoretical contribution of this study lies in applying neutralization theory to examine the relationship between classroom justice and cyberloafing, expanding the application scope of neutralization theory in educational contexts. Since <xref ref-type="bibr" rid="B46">Matza and Sykes (1957)</xref> proposed neutralization theory, it has primarily been applied to explain traditional criminological domains such as juvenile delinquency and white-collar crime. Although scholars have recently extended it to organizational behavior and applied it to explain students&#x2019; deviant behaviors and cyberloafing, research specifically examining classroom justice as an antecedent variable to explore its impact on cyberloafing through neutralization techniques remains relatively limited (<xref ref-type="bibr" rid="B63">Sharma, 2020</xref>; <xref ref-type="bibr" rid="B1">Ainsworth et al., 2024</xref>). Our study further deepens theoretical exploration in this field based on existing foundations, validates the applicability and explanatory power of neutralization theory in educational environments, and demonstrates the theory&#x2019;s universal value beyond traditional criminological domains. The innovative significance of this cross-disciplinary theoretical expansion manifests in three levels: expansion of theoretical boundaries&#x2014;proving that neutralization techniques apply not only to major deviant behaviors but also to minor deviant behaviors in educational contexts; enrichment of conceptual connotations&#x2014;discovering unique manifestations of neutralization techniques in educational contexts, such as students redefining learning value through &#x201C;appeal to higher loyalties&#x201D; and questioning educational authority through &#x201C;condemnation of condemners&#x201D;; deepening of theoretical mechanisms&#x2014;revealing differentiated operational patterns of neutralization techniques in educational contexts, where the mediation effect of appeal to higher loyalties is significantly stronger than that of condemnation of condemners, indicating that students are more inclined to handle perceived injustice by reconstructing behavioral meaning rather than direct confrontation.</p>
<p>Moreover, the core theoretical contribution of this study lies in constructing a complete explanatory framework wherein classroom justice influences cyberloafing via neutralization techniques. On one hand, we introduced classroom justice into cyberloafing research and confirmed the significant negative predictive effect of classroom justice on students&#x2019; cyberloafing intentions. On the other hand, we discovered that classroom injustice provides cognitive foundations for students to activate neutralization techniques and validated the crucial mediating role of neutralization techniques in this process. This contrasts sharply with previous cyberloafing research that primarily focused on conservation of resources theory and theory of planned behavior, providing a novel theoretical perspective for understanding the social psychological mechanisms of cyberloafing (<xref ref-type="bibr" rid="B10">Chavan et al., 2022</xref>; <xref ref-type="bibr" rid="B76">Zhou et al., 2023</xref>). Particularly noteworthy is our discovery of unique operational patterns of neutralization techniques in educational contexts&#x2014;&#x201C;appeal to higher loyalties&#x201D; responds more strongly to classroom justice than &#x201C;condemnation of condemners,&#x201D; with its mediation effect being nearly four times stronger than the latter. This indicates that students process perceived injustice more through redefining behavioral value rather than directly attacking authority, providing new theoretical insights for the differentiated application of neutralization theory across different contexts.</p>
</sec>
<sec id="S5.SS2">
<title>5.2 Practical implications</title>
<p>This research provides some insights for educational practitioners to understand the causes of student cyberloafing and to take some precautions. We recommend that teachers adopt specific measures to enhance classroom justice. In terms of distributive justice, teachers should establish transparent grading criteria by clearly explaining to students at the beginning of the course the specific weightings and grading details for class participation, assignments, midterm exams, and final exams. They should ensure equal participation opportunities by establishing a rotation speaking system, combining random calling with voluntary hand-raising to avoid always having the same students answer questions, while implementing anonymous grading for important assignments and exams to reduce the influence of subjective bias. In terms of procedural justice, teachers can jointly establish classroom rules with students by organizing discussions at the beginning of the semester, allowing students to participate in formulating rules regarding classroom discipline, assignment submission, and leave policies. They should establish transparent decision-making mechanisms by providing advance notice and soliciting student opinions for major instructional adjustments, and develop clear disciplinary procedures to ensure consistency in handling processes. In terms of interactional justice, teachers should improve their communication approaches by adopting &#x201C;behavior-oriented&#x201D; expressions rather than &#x201C;personality-oriented&#x201D; attacks when providing criticism, establish fixed teacher-student communication time by setting weekly office hours to accept student consultations and feedback, and provide timely and specific positive feedback for student progress (<xref ref-type="bibr" rid="B6">Baniasadi et al., 2023</xref>). Even though it is difficult for teachers to ensure complete fairness in the classroom, making students feel that their teachers value fairness in the classroom through these initiatives alone can work extremely well (<xref ref-type="bibr" rid="B70">Tierney, 2014</xref>).</p>
<p>Furthermore, this study&#x2019;s findings regarding the mechanisms of neutralization techniques help teachers understand the cognitive processes underlying students&#x2019; cyberloafing behaviors. To address the &#x201C;condemnation of condemners&#x201D; technique, teachers can build positive teacher-student relationships by frequently using students&#x2019; names in classroom interactions, implement fair reward and punishment systems by applying uniform standards for handling disciplinary violations and providing timely praise for excellent performance, and establish appeal channels for students regarding instructional management decisions to ensure students have legitimate avenues for expressing dissatisfaction. To address the &#x201C;appeal to higher loyalties&#x201D; technique, teachers should enhance teaching quality by adopting highly interactive teaching methods such as case-based instruction and flipped classrooms to increase classroom attractiveness, and design meaningful learning tasks by connecting course content with students&#x2019; future career development and current social issues. It is worth mentioning that there are always some students who can find one or the other thing to criticize and complain about the classroom and they want to force the teacher to relax the classroom supervision so that they can do whatever they want in the classroom (<xref ref-type="bibr" rid="B63">Sharma, 2020</xref>). In this regard, they expect teachers to stick to their duties and coercive measures and harsh punishments are not a bad remedy (<xref ref-type="bibr" rid="B36">Kwahk et al., 2018</xref>).</p>
</sec>
<sec id="S5.SS3">
<title>5.3 Limitations and future research</title>
<p>It is necessary for us to elaborate on some limitations of this study. First, the development of neutralization theory has extended to dozens of neutralization techniques, and it is difficult to test all of them in our current study due to the content overlap and complexity that exists between different neutralization techniques, as well as the large size of the project. Future research should screen out more neutralization techniques that might work and test these neutralizations one at a time. Second, in terms of data collection, although our study collected samples at two points in time, our measures of students&#x2019; perceived classroom justice and intention to cyberloaf relied on students&#x2019; self-reports rather than actual observation. Our questionnaire was anonymous, but students may have underestimated their intention to cyberloaf and their perceptions of injustice for ethical reasons. We suggest that it is necessary for future studies to add teachers&#x2019; assessment of students&#x2019; cyberloafing behavior to the questionnaire, and to further test the findings through experimental methods. In addition, the samples we collected were mainly from students in some universities in East Central China, and the sample size was limited; we encourage researchers to collect more data from schools in different regions for the study.</p>
<p>For future research, we offer some directions for reference based on this research. First, as elaborated above, there are a variety of neutralization techniques, and neutralization techniques such as denial of responsibility, metaphors of ledgers, and denial of harm have all been found to be associated with cyberloafing (<xref ref-type="bibr" rid="B11">Cheng et al., 2014</xref>; <xref ref-type="bibr" rid="B63">Sharma, 2020</xref>). Future research could extend the structure of the present model to test the role that more neutralizing techniques play between classroom justice and intention to cyberloaf, and analyze the reasons why they do or do not play a role. In addition, individual factors such as self-efficacy, responsibility, and achievement orientation have been found to moderate the relationship between self-control and cyberloafing, and these factors may have the same qualities that enhance or inhibit the relationship between classroom justice and cyberloafing intentions (<xref ref-type="bibr" rid="B57">Prasad et al., 2010</xref>; <xref ref-type="bibr" rid="B77">Zhou et al., 2021</xref>). Existing studies have shown that neutralization techniques are significantly associated with cyberloafing, except for classroom justice, habituation, addiction, social support, and interference with peers&#x2019; cyberloafing behavior, which significantly predict students&#x2019; cyberloafing behavior (<xref ref-type="bibr" rid="B62">Sevin&#x00E7; and Dogusoy, 2022</xref>; <xref ref-type="bibr" rid="B64">She et al., 2025</xref>). Scholars can examine whether the mediating role played by neutralization techniques between these antecedent variables and cyberloafing holds true.</p>
</sec>
</sec>
<sec id="S6" sec-type="conclusion">
<title>6 Conclusion</title>
<p>This study sought to determine whether students&#x2019; perceived classroom justice can have an impact on their intention to cyberloaf in the classroom, as well as the mediating pathways involved, with the aim of providing new perspectives on strategies to curb students&#x2019; cyberloafing in the classroom. The results suggest that classroom justice is negatively related to students&#x2019; intention to cyberloaf.; two neutralization techniques, condemning the condemned and appealing to higher loyalties, play a mediating role between classroom justice and intention to cyberloaf. Thus, students&#x2019; intention to cyberloaf can be reduced by improving classroom justice. Educators can use the questions in Chory&#x2019;s Classroom Justice Scale to focus on justice in terms of distribution, procedure, and interaction. In addition, by focusing on whether classroom benefits are commensurate with the time and effort students put into the classroom, and by improving the quality of content so that students feel they are getting &#x201C;value for money,&#x201D; they can demonstrate greater loyalty to the classroom.</p>
</sec>
</body>
<back>
<sec id="S7" sec-type="data-availability">
<title>Data availability statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec id="S8" sec-type="author-contributions">
<title>Author contributions</title>
<p>ZHa: Conceptualization, Data curation, Formal analysis, Methodology, Validation, Writing &#x2013; original draft. ZY: Conceptualization, Investigation, Software, Validation, Visualization, Writing &#x2013; review &#x0026; editing. ZHu: Funding acquisition, Project administration, Resources, Supervision, Validation, Writing &#x2013; review &#x0026; editing.</p>
</sec>
<sec id="S9" sec-type="funding-information">
<title>Funding</title>
<p>The authors declare that no financial support was received for the research and/or publication of this article.</p>
</sec>
<ack><p>We thank all the staff who participated in this study.</p>
</ack>
<sec id="S10" sec-type="COI-statement">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec id="S11" sec-type="ai-statement">
<title>Generative AI statement</title>
<p>The authors declare that no Generative AI was used in the creation of this manuscript.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec id="S12" sec-type="disclaimer">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ainsworth</surname> <given-names>C.</given-names></name> <name><surname>Chernoff</surname> <given-names>W. A.</given-names></name> <name><surname>Chae</surname> <given-names>Y. J.</given-names></name> <name><surname>Bisciglia</surname> <given-names>M.</given-names></name></person-group> (<year>2024</year>). <article-title>Examining academic dishonesty in online group chats through the lenses of strain and neutralization theories.</article-title> <source><italic>Deviant Behav.</italic></source> <volume>45</volume> <fpage>361</fpage>&#x2013;<lpage>376</lpage>. <pub-id pub-id-type="doi">10.1080/01639625.2023.2248337</pub-id></citation></ref>
<ref id="B2"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Alexander</surname> <given-names>K.</given-names></name> <name><surname>Opsal</surname> <given-names>T.</given-names></name></person-group> (<year>2021</year>). <article-title>&#x201C;That&#x2019;s Just What You Do&#x201D;: Applying the techniques of neutralization to college hazing.</article-title> <source><italic>Deviant Behav.</italic></source> <volume>42</volume> <fpage>1295</fpage>&#x2013;<lpage>1312</lpage>. <pub-id pub-id-type="doi">10.1080/01639625.2020.1738649</pub-id></citation></ref>
<ref id="B3"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Alyahya</surname> <given-names>S.</given-names></name> <name><surname>Alqahtani</surname> <given-names>A.</given-names></name></person-group> (<year>2022</year>). <article-title>Cyberloafing in educational settings: A systematic literature review.</article-title> <source><italic>Int. J. Interact. Mobile Technol.</italic></source> <volume>16</volume> <fpage>113</fpage>&#x2013;<lpage>141</lpage>. <pub-id pub-id-type="doi">10.3991/ijim.v16i16.32285</pub-id></citation></ref>
<ref id="B4"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Askew</surname> <given-names>K.</given-names></name></person-group> (<year>2012</year>). <source><italic>The Relationship between Cyberloafing and Task Performance and an Examination of the Theory of Planned Behavior as a Model of Cyberloafing.</italic></source> <publisher-loc>Tampa, FL</publisher-loc>: <publisher-name>University of South Florida</publisher-name>.</citation></ref>
<ref id="B5"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Askew</surname> <given-names>K.</given-names></name> <name><surname>Buckner</surname> <given-names>J. E.</given-names></name> <name><surname>Taing</surname> <given-names>M. U.</given-names></name> <name><surname>Ilie</surname> <given-names>A.</given-names></name> <name><surname>Bauer</surname> <given-names>J. A.</given-names></name> <name><surname>Coovert</surname> <given-names>M. D.</given-names></name></person-group> (<year>2014</year>). <article-title>Explaining cyberloafing: The role of the theory of planned behavior.</article-title> <source><italic>Comput. Hum. Behav.</italic></source> <volume>36</volume> <fpage>510</fpage>&#x2013;<lpage>519</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2014.04.006</pub-id></citation></ref>
<ref id="B6"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Baniasadi</surname> <given-names>A.</given-names></name> <name><surname>Salehi</surname> <given-names>K.</given-names></name> <name><surname>Khodaie</surname> <given-names>E.</given-names></name> <name><surname>Noaparast</surname> <given-names>K. B.</given-names></name> <name><surname>Izanloo</surname> <given-names>B.</given-names></name></person-group> (<year>2023</year>). <article-title>Fairness in classroom assessment: A systematic review.</article-title> <source><italic>Asia-Pac. Educ. Res.</italic></source> <volume>32</volume> <fpage>91</fpage>&#x2013;<lpage>109</lpage>. <pub-id pub-id-type="doi">10.1007/s40299-021-00636-z</pub-id></citation></ref>
<ref id="B7"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Batabyal</surname> <given-names>S. K.</given-names></name> <name><surname>Bhal</surname> <given-names>K. T.</given-names></name></person-group> (<year>2020</year>). <article-title>Traditional cyberloafing, mobile cyberloafing and personal mobile-internet loafing in business organizations: Exploring cognitive ethical logics.</article-title> <source><italic>J. Informat. Commun. Ethics Soc.</italic></source> <volume>18</volume> <fpage>631</fpage>&#x2013;<lpage>647</lpage>. <pub-id pub-id-type="doi">10.1108/JICES-07-2019-0081</pub-id></citation></ref>
<ref id="B8"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Baturay</surname> <given-names>M. H.</given-names></name> <name><surname>Toker</surname> <given-names>S.</given-names></name></person-group> (<year>2015</year>). <article-title>An investigation of the impact of demographics on cyberloafing from an educational setting angle.</article-title> <source><italic>Comput. Hum. Behav.</italic></source> <volume>50</volume> <fpage>358</fpage>&#x2013;<lpage>366</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2015.03.081</pub-id></citation></ref>
<ref id="B9"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Byers</surname> <given-names>B.</given-names></name> <name><surname>Crider</surname> <given-names>B. W.</given-names></name> <name><surname>Biggers</surname> <given-names>G. K.</given-names></name></person-group> (<year>1999</year>). <article-title>Bias crime motivation: A study of hate crime and offender neutralization techniques used against the Amish.</article-title> <source><italic>J. Contemp. Crim. Just.</italic></source> <volume>15</volume> <fpage>78</fpage>&#x2013;<lpage>96</lpage>. <pub-id pub-id-type="doi">10.1177/1043986299015001006</pub-id></citation></ref>
<ref id="B10"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chavan</surname> <given-names>M.</given-names></name> <name><surname>Galperin</surname> <given-names>B. L.</given-names></name> <name><surname>Ostle</surname> <given-names>A.</given-names></name> <name><surname>Behl</surname> <given-names>A.</given-names></name></person-group> (<year>2022</year>). <article-title>Millennial&#x2019;s perception on cyberloafing: Workplace deviance or cultural norm?</article-title> <source><italic>Behav. Informat. Technol.</italic></source> <volume>41</volume> <fpage>2860</fpage>&#x2013;<lpage>2877</lpage>. <pub-id pub-id-type="doi">10.1080/0144929x.2021.1956588</pub-id></citation></ref>
<ref id="B11"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cheng</surname> <given-names>L.</given-names></name> <name><surname>Li</surname> <given-names>W.</given-names></name> <name><surname>Zhai</surname> <given-names>Q.</given-names></name> <name><surname>Smyth</surname> <given-names>R.</given-names></name></person-group> (<year>2014</year>). <article-title>Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory.</article-title> <source><italic>Comput. Hum. Behav.</italic></source> <volume>38</volume> <fpage>220</fpage>&#x2013;<lpage>228</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2014.05.043</pub-id></citation></ref>
<ref id="B12"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chory</surname> <given-names>R.</given-names></name></person-group> (<year>2023</year>). <article-title>Fairness matters in higher education: Student classroom justice perceptions and behavioral responses.</article-title> <source><italic>Editor. Univ. Polit. Val&#x00E8;ncia</italic></source> <fpage>385</fpage>&#x2013;<lpage>392</lpage>. <pub-id pub-id-type="doi">10.4995/HEAd23.2023.16315</pub-id> <pub-id pub-id-type="pmid">39834465</pub-id></citation></ref>
<ref id="B13"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chory</surname> <given-names>R. M.</given-names></name></person-group> (<year>2007</year>). <article-title>Enhancing student perceptions of fairness: The relationship between instructor credibility and classroom justice.</article-title> <source><italic>Commun. Educ.</italic></source> <volume>56</volume> <fpage>89</fpage>&#x2013;<lpage>105</lpage>. <pub-id pub-id-type="doi">10.1080/03634520600994300</pub-id></citation></ref>
<ref id="B14"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chory</surname> <given-names>R. M.</given-names></name> <name><surname>Horan</surname> <given-names>S. M.</given-names></name> <name><surname>Houser</surname> <given-names>M. L.</given-names></name></person-group> (<year>2017</year>). <article-title>Justice in the higher education classroom: Students&#x2019; perceptions of unfairness and responses to instructors.</article-title> <source><italic>Innovat. High. Educ.</italic></source> <volume>42</volume> <fpage>321</fpage>&#x2013;<lpage>336</lpage>. <pub-id pub-id-type="doi">10.1007/s10755-017-9388-9</pub-id></citation></ref>
<ref id="B15"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chory-Assad</surname> <given-names>R. M.</given-names></name></person-group> (<year>2002</year>). <article-title>Classroom justice: Perceptions of fairness as a predictor of student motivation, learning, and aggression.</article-title> <source><italic>Commun. Q.</italic></source> <volume>50</volume> <fpage>58</fpage>&#x2013;<lpage>77</lpage>. <pub-id pub-id-type="doi">10.1080/01463370209385646</pub-id></citation></ref>
<ref id="B16"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chory-Assad</surname> <given-names>R. M.</given-names></name> <name><surname>Paulsel</surname> <given-names>M. L.</given-names></name></person-group> (<year>2004</year>). <article-title>Classroom justice: Student aggression and resistance as reactions to perceived unfairness.</article-title> <source><italic>Commun. Educ.</italic></source> <volume>53</volume> <fpage>253</fpage>&#x2013;<lpage>273</lpage>. <pub-id pub-id-type="doi">10.1080/0363452042000265189</pub-id></citation></ref>
<ref id="B17"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>&#x010C;iuladien&#x0117;</surname> <given-names>G.</given-names></name> <name><surname>Ra&#x010D;elyt&#x0117;</surname> <given-names>D.</given-names></name></person-group> (<year>2016</year>). <article-title>Perceived unfairness in teacher-student conflict situations: Students&#x2019; point of view.</article-title> <source><italic>Pol. J. Appl. Psychol.</italic></source> <volume>14</volume> <fpage>49</fpage>&#x2013;<lpage>66</lpage>. <pub-id pub-id-type="doi">10.1515/pjap-2015-0049</pub-id></citation></ref>
<ref id="B18"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Colvin</surname> <given-names>S.</given-names></name> <name><surname>Pisoiu</surname> <given-names>D.</given-names></name></person-group> (<year>2021</year>). &#x201C;<article-title>When being bad is good? Bringing neutralization theory to subcultural narratives of right-wing violence</article-title>,&#x201D; in <source><italic>Narrative, Political Violence and Social Change</italic></source>, <role>eds</role> <person-group person-group-type="editor"><name><surname>Da Silva</surname> <given-names>R.</given-names></name> <name><surname>Graef</surname> <given-names>J.</given-names></name> <name><surname>Lemay-H&#x00E9;bert</surname> <given-names>N.</given-names></name></person-group> (<publisher-loc>London</publisher-loc>: <publisher-name>Routledge</publisher-name>), <fpage>69</fpage>&#x2013;<lpage>84</lpage>.</citation></ref>
<ref id="B19"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Connolly</surname> <given-names>L. Y.</given-names></name> <name><surname>Borrion</surname> <given-names>H.</given-names></name> <name><surname>Arief</surname> <given-names>B.</given-names></name></person-group> (<year>2025</year>). <article-title>Ransomware crime through the lens of neutralisation theory.</article-title> <source><italic>Eur. J. Criminol.</italic></source> <volume>22</volume> <fpage>534</fpage>&#x2013;<lpage>556</lpage>. <pub-id pub-id-type="doi">10.1177/14773708251320464</pub-id></citation></ref>
<ref id="B20"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Coskun</surname> <given-names>T. K.</given-names></name> <name><surname>Gokcearslan</surname> <given-names>S.</given-names></name></person-group> (<year>2019</year>). <article-title>Examination of cyberloafing studies in education: A content analysis.</article-title> <source><italic>World J. Educ. Technol.</italic></source> <volume>11</volume> <fpage>94</fpage>&#x2013;<lpage>103</lpage>. <pub-id pub-id-type="doi">10.18844/WJET.V11I1.4017</pub-id></citation></ref>
<ref id="B21"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cutino</surname> <given-names>C. M.</given-names></name> <name><surname>Nees</surname> <given-names>M. A.</given-names></name></person-group> (<year>2017</year>). <article-title>Restricting mobile phone access during homework increases attainment of study goals.</article-title> <source><italic>Mobile Media Commun.</italic></source> <volume>5</volume> <fpage>63</fpage>&#x2013;<lpage>79</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2021.106835</pub-id></citation></ref>
<ref id="B22"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Estaji</surname> <given-names>M.</given-names></name> <name><surname>Zhaleh</surname> <given-names>K.</given-names></name></person-group> (<year>2022</year>). <article-title>The enactment of classroom justice through explicit instruction: Deciphering the changes in English as a Foreign Language Teachers&#x2019; perceptions and practices.</article-title> <source><italic>Front. Psychol.</italic></source> <volume>13</volume>:<fpage>821763</fpage>. <pub-id pub-id-type="doi">10.3389/fpsyg.2022.821763</pub-id> <pub-id pub-id-type="pmid">35250759</pub-id></citation></ref>
<ref id="B23"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fallows</surname> <given-names>D.</given-names></name></person-group> (<year>2005</year>). <source><italic>How Women and Men use the Internet.</italic></source> <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>Pew Research Center</publisher-name></citation></ref>
<ref id="B24"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gerow</surname> <given-names>J. E.</given-names></name> <name><surname>Galluch</surname> <given-names>P. S.</given-names></name> <name><surname>Thatcher</surname> <given-names>J. B.</given-names></name></person-group> (<year>2010</year>). <article-title>To slack or not to slack: Internet usage in the classroom.</article-title> <source><italic>J. Informat. Technol. Theory Appl.</italic></source> <volume>11</volume>:<fpage>2</fpage></citation></ref>
<ref id="B25"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>G&#x00FC;ger&#x00E7;in</surname> <given-names>U.</given-names></name></person-group> (<year>2020</year>). <article-title>Does techno-stress justify cyberslacking? An empirical study based on the neutralisation theory.</article-title> <source><italic>Behav. Inform. Technol.</italic></source> <volume>39</volume> <fpage>824</fpage>&#x2013;<lpage>836</lpage>. <pub-id pub-id-type="doi">10.1080/0144929x.2019.1617350</pub-id></citation></ref>
<ref id="B26"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hayes</surname> <given-names>A. F.</given-names></name></person-group> (<year>2013</year>). <source><italic>Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach</italic></source>. <publisher-name>Guilford Press</publisher-name>: <publisher-loc>New York, NY</publisher-loc>.</citation></ref>
<ref id="B27"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Heflin</surname> <given-names>H.</given-names></name> <name><surname>Shewmaker</surname> <given-names>J.</given-names></name> <name><surname>Nguyen</surname> <given-names>J.</given-names></name></person-group> (<year>2017</year>). <article-title>Impact of mobile technology on student attitudes, engagement, and learning.</article-title> <source><italic>Comput. Educ.</italic></source> <volume>107</volume> <fpage>91</fpage>&#x2013;<lpage>99</lpage>. <pub-id pub-id-type="doi">10.1016/j.compedu.2017.01.006</pub-id></citation></ref>
<ref id="B28"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Homans</surname> <given-names>G. C.</given-names></name></person-group> (<year>1961</year>). <article-title>The humanities and the social sciences.</article-title> <source><italic>Am. Behav. Sci.</italic></source> <volume>4</volume> <fpage>3</fpage>&#x2013;<lpage>6</lpage>. <pub-id pub-id-type="doi">10.1057/s41599-024-02684-4</pub-id></citation></ref>
<ref id="B29"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Horan</surname> <given-names>S. M.</given-names></name> <name><surname>Chory</surname> <given-names>R. M.</given-names></name> <name><surname>Goodboy</surname> <given-names>A. K.</given-names></name></person-group> (<year>2010</year>). <article-title>Understanding students&#x2019; classroom justice experiences and responses.</article-title> <source><italic>Commun. Educ.</italic></source> <volume>59</volume> <fpage>453</fpage>&#x2013;<lpage>474</lpage>. <pub-id pub-id-type="doi">10.1080/03634523.2010.487282</pub-id></citation></ref>
<ref id="B30"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Horan</surname> <given-names>S. M.</given-names></name> <name><surname>Martin</surname> <given-names>M. M.</given-names></name> <name><surname>Weber</surname> <given-names>K.</given-names></name></person-group> (<year>2012</year>). <article-title>Understanding emotional response theory: The role of instructor power and justice messages.</article-title> <source><italic>Commun. Q.</italic></source> <volume>60</volume> <fpage>210</fpage>&#x2013;<lpage>233</lpage>. <pub-id pub-id-type="doi">10.1080/01463373.2012.669323</pub-id></citation></ref>
<ref id="B31"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jandaghi</surname> <given-names>G.</given-names></name> <name><surname>Alvani</surname> <given-names>S. M.</given-names></name> <name><surname>Zarei Matin</surname> <given-names>H.</given-names></name> <name><surname>Fakheri Kozekanan</surname> <given-names>S.</given-names></name></person-group> (<year>2015</year>). <article-title>Cyberloafing management in organizations.</article-title> <source><italic>Iran. J. Manage. Stud.</italic></source> <volume>8</volume> <fpage>335</fpage>&#x2013;<lpage>349</lpage>. <pub-id pub-id-type="doi">10.22059/IJMS.2015.52634</pub-id></citation></ref>
<ref id="B32"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kalayc&#x0131;</surname> <given-names>E.</given-names></name></person-group> (<year>2010</year>). <source><italic>The Investigation of Relationship between Cyberloafing and Self-Regulated Learning Strategies among Undergraduate Students.</italic></source> <publisher-loc>Ankara</publisher-loc>: <publisher-name>Hacettepe University</publisher-name>. <pub-id pub-id-type="doi">10.1016/j.sbspro.2013.06.114</pub-id></citation></ref>
<ref id="B33"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kaptein</surname> <given-names>M.</given-names></name> <name><surname>van Helvoort</surname> <given-names>M.</given-names></name></person-group> (<year>2019</year>). <article-title>A model of neutralization techniques.</article-title> <source><italic>Deviant Behav.</italic></source> <volume>40</volume> <fpage>1260</fpage>&#x2013;<lpage>1285</lpage>. <pub-id pub-id-type="doi">10.1080/01639625.2018.1491696</pub-id></citation></ref>
<ref id="B34"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Klockars</surname> <given-names>C. B.</given-names></name></person-group> (<year>1974</year>). <source><italic>The Professional Fence.</italic></source> <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Free Press</publisher-name>, <fpage>7899</fpage>&#x2013;<lpage>7899</lpage>.</citation></ref>
<ref id="B35"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Knight</surname> <given-names>R. M.</given-names></name></person-group> (<year>2017</year>). <source><italic>Academic Cyberloafing: a Study of Perceptual and behavioral Differences on in-Class Cyberloafing among Undergraduate Students.</italic></source> <publisher-loc>Greenville, NC</publisher-loc>: <publisher-name>East Carolina University</publisher-name>.</citation></ref>
<ref id="B36"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kwahk</surname> <given-names>K. Y.</given-names></name> <name><surname>Ahn</surname> <given-names>H.</given-names></name> <name><surname>Ryu</surname> <given-names>Y. U.</given-names></name></person-group> (<year>2018</year>). <article-title>Understanding mandatory IS use behavior: How outcome expectations affect conative IS use.</article-title> <source><italic>Int. J. Informat. Manage.</italic></source> <volume>38</volume> <fpage>64</fpage>&#x2013;<lpage>76</lpage>. <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2017.07.001</pub-id></citation></ref>
<ref id="B37"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lazarus</surname> <given-names>S.</given-names></name> <name><surname>Hughes</surname> <given-names>M.</given-names></name> <name><surname>Button</surname> <given-names>M.</given-names></name> <name><surname>Garba</surname> <given-names>K. H.</given-names></name></person-group> (<year>2025</year>). <article-title>Fraud as legitimate retribution for colonial injustice: Neutralization techniques in interviews with police and online Romance Fraud Offenders.</article-title> <source><italic>Deviant Behav.</italic></source> <pub-id pub-id-type="doi">10.1080/01639625.2024.2446328</pub-id></citation></ref>
<ref id="B38"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>Q.</given-names></name> <name><surname>Xia</surname> <given-names>B.</given-names></name> <name><surname>Zhang</surname> <given-names>H.</given-names></name> <name><surname>Wang</surname> <given-names>W.</given-names></name></person-group> (<year>2022</year>). <article-title>College students&#x2019; cyberloafing and the sense of meaning of life: The mediating role of state anxiety and the moderating role of psychological flexibility.</article-title> <source><italic>Front. Public Health</italic></source> <volume>10</volume>:<fpage>905699</fpage>. <pub-id pub-id-type="doi">10.3389/fpubh.2022.905699</pub-id> <pub-id pub-id-type="pmid">35958850</pub-id></citation></ref>
<ref id="B39"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>W.</given-names></name> <name><surname>Cheng</surname> <given-names>L.</given-names></name></person-group> (<year>2013</year>). &#x201C;<article-title>Effects of neutralization techniques and rational choice theory on internet abuse in the workplace</article-title>,&#x201D;in <source><italic>Proceedings of the Pacific Asia Conference on Information Systems</italic></source>, <publisher-loc>Jeju Island</publisher-loc>.</citation></ref>
<ref id="B40"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lim</surname> <given-names>V. K.</given-names></name></person-group> (<year>2002</year>). <article-title>The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice.</article-title> <source><italic>J. Organ. Behav.</italic></source> <volume>23</volume> <fpage>675</fpage>&#x2013;<lpage>694</lpage>. <pub-id pub-id-type="doi">10.1002/job.161</pub-id></citation></ref>
<ref id="B41"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lowry</surname> <given-names>P. B.</given-names></name> <name><surname>Zhang</surname> <given-names>J.</given-names></name> <name><surname>Wang</surname> <given-names>C.</given-names></name> <name><surname>Siponen</surname> <given-names>M.</given-names></name></person-group> (<year>2016</year>). <article-title>Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model.</article-title> <source><italic>Informat. Syst. Res.</italic></source> <volume>27</volume> <fpage>962</fpage>&#x2013;<lpage>986</lpage>. <pub-id pub-id-type="doi">10.1287/isre.2016.0671</pub-id> <pub-id pub-id-type="pmid">19642375</pub-id></citation></ref>
<ref id="B42"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Margaretha</surname> <given-names>M.</given-names></name> <name><surname>Saragih</surname> <given-names>S.</given-names></name> <name><surname>Mariana</surname> <given-names>A.</given-names></name> <name><surname>Simatupang</surname> <given-names>K. M.</given-names></name></person-group> (<year>2022</year>). <article-title>Academic procrastination and cyberloafing behavior: A case study of students in Indonesia.</article-title> <source><italic>Cypriot J. Educ. Sci.</italic></source> <volume>17</volume> <fpage>752</fpage>&#x2013;<lpage>764</lpage>. <pub-id pub-id-type="doi">10.18844/cjes.v17i3.6904</pub-id></citation></ref>
<ref id="B43"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Marriott</surname> <given-names>L.</given-names></name> <name><surname>Lai</surname> <given-names>J. C.</given-names></name></person-group> (<year>2023</year>). <article-title>Tax evasion and benefit fraud: A study of the use of techniques of neutralization.</article-title> <source><italic>Deviant Behav.</italic></source> <volume>44</volume> <fpage>1264</fpage>&#x2013;<lpage>1285</lpage>. <pub-id pub-id-type="doi">10.1080/01639625.2023.2179442</pub-id></citation></ref>
<ref id="B44"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Maruna</surname> <given-names>S.</given-names></name> <name><surname>Copes</surname> <given-names>H.</given-names></name></person-group> (<year>2005</year>). <article-title>What have we learned from five decades of neutralization research?</article-title> <source><italic>Crime Just.</italic></source> <volume>32</volume> <fpage>221</fpage>&#x2013;<lpage>320</lpage>. <pub-id pub-id-type="doi">10.1086/655355</pub-id></citation></ref>
<ref id="B45"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Matza</surname> <given-names>D.</given-names></name></person-group> (<year>2018</year>). <source><italic>Delinquency and Drift.</italic></source> <publisher-loc>London</publisher-loc>: <publisher-name>Routledge</publisher-name>.</citation></ref>
<ref id="B46"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Matza</surname> <given-names>D.</given-names></name> <name><surname>Sykes</surname> <given-names>G.</given-names></name></person-group> (<year>1957</year>). <article-title>Techniques of neutralization: A theory of delinquency.</article-title> <source><italic>Am. Sociol. Rev.</italic></source> <volume>22</volume> <fpage>664</fpage>&#x2013;<lpage>670</lpage>. <pub-id pub-id-type="doi">10.2307/2089195</pub-id></citation></ref>
<ref id="B47"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>McGrath</surname> <given-names>J.</given-names></name></person-group> (<year>2021</year>). <article-title>Self-deception as a technique of neutralisation: An analysis of the subjective account of a white-collar criminal.</article-title> <source><italic>Crime Law Soc. Change</italic></source> <volume>75</volume> <fpage>415</fpage>&#x2013;<lpage>432</lpage>. <pub-id pub-id-type="doi">10.1007/s10611-021-09933-6</pub-id></citation></ref>
<ref id="B48"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>McLean</surname> <given-names>K.</given-names></name> <name><surname>Wolfe</surname> <given-names>S. E.</given-names></name></person-group> (<year>2016</year>). <article-title>A sense of injustice loosens the moral bind of law: Specifying the links between procedural injustice, neutralizations, and offending.</article-title> <source><italic>Crim. Justice Behav.</italic></source> <volume>43</volume> <fpage>27</fpage>&#x2013;<lpage>44</lpage>. <pub-id pub-id-type="doi">10.1177/0093854815609655</pub-id></citation></ref>
<ref id="B49"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Metin-Orta</surname> <given-names>I.</given-names></name> <name><surname>Demirutku</surname> <given-names>K.</given-names></name></person-group> (<year>2022</year>). <article-title>Cyberloafing behaviors among university students and its relation to Hedonistic-Stimulation value orientation, cyberloafing attitudes, and time spent on the Internet.</article-title> <source><italic>Curr. Psychol.</italic></source> <volume>41</volume> <fpage>4271</fpage>&#x2013;<lpage>4282</lpage>. <pub-id pub-id-type="doi">10.1007/s12144-020-00932-9</pub-id></citation></ref>
<ref id="B50"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Miheli&#x00E8;</surname> <given-names>K. K.</given-names></name> <name><surname>Lim</surname> <given-names>V. K. G.</given-names></name> <name><surname>Culiberg</surname> <given-names>B.</given-names></name></person-group> (<year>2022</year>). <article-title>Cyberloafing among Gen Z students: The role of norms, moral disengagement, multitasking self-efficacy, and psychological outcomes.</article-title> <source><italic>Eur. J. Psychol. Educ.</italic></source> <volume>38</volume> <fpage>567</fpage>&#x2013;<lpage>585</lpage>. <pub-id pub-id-type="doi">10.1007/s10212-022-00617-w</pub-id></citation></ref>
<ref id="B51"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Minor</surname> <given-names>W. W.</given-names></name></person-group> (<year>1981</year>). <article-title>Techniques of neutralization: A reconceptualization and empirical examination.</article-title> <source><italic>J. Res. Crime Delinquency</italic></source> <volume>18</volume> <fpage>295</fpage>&#x2013;<lpage>318</lpage>. <pub-id pub-id-type="doi">10.1177/002242788101800206</pub-id></citation></ref>
<ref id="B52"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Morris</surname> <given-names>M.</given-names></name></person-group> (<year>2010</year>). &#x201C;<article-title>Examining the effects of students&#x2019;perceptions of classroom justice on their emotional responses in the classroom</article-title>,&#x201D; in <source><italic>Proceedings of the INTED2010</italic></source>, (<publisher-loc>Spain</publisher-loc>: <publisher-name>IATED</publisher-name>), <fpage>3503</fpage>&#x2013;<lpage>3508</lpage>.</citation></ref>
<ref id="B53"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Muhammad</surname> <given-names>H.</given-names></name> <name><surname>Ahmad</surname> <given-names>S.</given-names></name> <name><surname>Arzeen</surname> <given-names>S.</given-names></name></person-group> (<year>2024</year>). <article-title>Injustice and violence: A test of the revenge model.</article-title> <source><italic>Curr. Psychol.</italic></source> <volume>43</volume> <fpage>7899</fpage>&#x2013;<lpage>7912</lpage>. <pub-id pub-id-type="doi">10.1007/s12144-023-04852-2</pub-id></citation></ref>
<ref id="B54"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Murphy</surname> <given-names>P. R.</given-names></name> <name><surname>Dacin</surname> <given-names>M. T.</given-names></name></person-group> (<year>2011</year>). <article-title>Psychological pathways to fraud: Understanding and preventing fraud in organizations.</article-title> <source><italic>J. Bus. Ethics</italic></source> <volume>101</volume> <fpage>601</fpage>&#x2013;<lpage>618</lpage>. <pub-id pub-id-type="doi">10.1007/s10551-011-0741-0</pub-id></citation></ref>
<ref id="B55"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pathan</surname> <given-names>S.</given-names></name> <name><surname>Mahesar</surname> <given-names>H.</given-names></name> <name><surname>Shah</surname> <given-names>S.</given-names></name></person-group> (<year>2017</year>). <article-title>The impact of student consumerism metaphor on higher education students: A critical review of literature.</article-title> <source><italic>Grassroots</italic></source> <volume>51</volume> <fpage>1</fpage>&#x2013;<lpage>13</lpage>.</citation></ref>
<ref id="B56"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Podsakoff</surname> <given-names>P. M.</given-names></name> <name><surname>MacKenzie</surname> <given-names>S. B.</given-names></name> <name><surname>Lee</surname> <given-names>J. Y.</given-names></name> <name><surname>Podsakoff</surname> <given-names>N. P.</given-names></name></person-group> (<year>2003</year>). <article-title>Common method biases in behavioral research: A critical review of the literature and recommended remedies.</article-title> <source><italic>J. Appl. Psychol.</italic></source> <volume>88</volume>:<fpage>879</fpage>. <pub-id pub-id-type="doi">10.1037/0021-9010.88.5.879</pub-id> <pub-id pub-id-type="pmid">14516251</pub-id></citation></ref>
<ref id="B57"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Prasad</surname> <given-names>S.</given-names></name> <name><surname>Lim</surname> <given-names>V. K.</given-names></name> <name><surname>Chen</surname> <given-names>D. J.</given-names></name></person-group> (<year>2010</year>). &#x201C;<article-title>Self-regulation, individual characteristics and cyberloafing</article-title>,&#x201D; in <source><italic>Proceedings of the Pacific Asia Conference on Information Systems, PACIS 2010</italic></source>, (<publisher-loc>Taipei</publisher-loc>).</citation></ref>
<ref id="B58"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ragan</surname> <given-names>E. D.</given-names></name> <name><surname>Jennings</surname> <given-names>S. R.</given-names></name> <name><surname>Massey</surname> <given-names>J. D.</given-names></name> <name><surname>Doolittle</surname> <given-names>P. E.</given-names></name></person-group> (<year>2014</year>). <article-title>Unregulated use of laptops over time in large lecture classes.</article-title> <source><italic>Comput. Educ.</italic></source> <volume>78</volume> <fpage>78</fpage>&#x2013;<lpage>86</lpage>. <pub-id pub-id-type="doi">10.1016/j.compedu.2014.05.002</pub-id></citation></ref>
<ref id="B59"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rasooli</surname> <given-names>A.</given-names></name> <name><surname>Rasegh</surname> <given-names>A.</given-names></name> <name><surname>Zandi</surname> <given-names>H.</given-names></name> <name><surname>Firoozi</surname> <given-names>T.</given-names></name></person-group> (<year>2022</year>). <article-title>Teachers&#x2019; conceptions of fairness in classroom assessment: An empirical study.</article-title> <source><italic>J. Teach. Educ.</italic></source> <pub-id pub-id-type="doi">10.1177/00224871221130742</pub-id></citation></ref>
<ref id="B60"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Robinson</surname> <given-names>S. L.</given-names></name> <name><surname>Kraatz</surname> <given-names>M. S.</given-names></name></person-group> (<year>1998</year>). &#x201C;<article-title>Constructing the reality of normative behavior: The use of neutralization strategies by organizational deviants</article-title>,&#x201D; in <source><italic>Dysfunctional behavior in Organizations: Violent and Deviant Behavior</italic></source>, <role>eds</role> <person-group person-group-type="editor"><name><surname>Griffin</surname> <given-names>R. W.</given-names></name> <name><surname>O&#x2019;Leary-Kelly</surname> <given-names>A.</given-names></name> <name><surname>Judith</surname> <given-names>M.</given-names></name></person-group> (<publisher-loc>Amsterdam</publisher-loc>: <publisher-name>Elsevier Science</publisher-name>), <fpage>203</fpage>&#x2013;<lpage>220</lpage>.</citation></ref>
<ref id="B61"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Samadi-Miarkolaei</surname> <given-names>H.</given-names></name> <name><surname>Samadi-Miarkolaei</surname> <given-names>H.</given-names></name></person-group> (<year>2020</year>). <article-title>The exploration of the organizational justice level and its relation with cyberloafing with a study in the healthcare and treatment network.</article-title> <source><italic>Iran-J-Ergon</italic></source> <volume>8</volume>:<fpage>13</fpage>. <pub-id pub-id-type="doi">10.30699/jergon.8.3.13</pub-id></citation></ref>
<ref id="B62"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sevin&#x00E7;</surname> <given-names>M.</given-names></name> <name><surname>Dogusoy</surname> <given-names>B.</given-names></name></person-group> (<year>2022</year>). <article-title>Exploring the relationship between secondary school students&#x2019; smartphone addiction, cognitive absorption, and cyber loafing activities.</article-title> <source><italic>Participatory Educ. Res.</italic></source> <volume>9</volume> <fpage>414</fpage>&#x2013;<lpage>429</lpage>. <pub-id pub-id-type="doi">10.17275/per.22.121.9.5</pub-id></citation></ref>
<ref id="B63"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sharma</surname> <given-names>S.</given-names></name></person-group> (<year>2020</year>). <article-title>I want it my way: Using consumerism and neutralization theory to understand students&#x2019; cyberslacking behavior.</article-title> <source><italic>Int. J. Informat. Manage.</italic></source> <volume>53</volume>:<fpage>102131</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2020.102131</pub-id></citation></ref>
<ref id="B64"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>She</surname> <given-names>Z. L.</given-names></name> <name><surname>Li</surname> <given-names>Q.</given-names></name> <name><surname>Ma</surname> <given-names>L.</given-names></name></person-group> (<year>2025</year>). <article-title>Witnessing cyberloafing: A daily diary study of observers&#x2019; reactions to cyberloafers.</article-title> <source><italic>J. Bus. Ethics</italic></source> <pub-id pub-id-type="doi">10.1007/s10551-025-05933-x</pub-id></citation></ref>
<ref id="B65"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Smith</surname> <given-names>E.</given-names></name> <name><surname>Gorard</surname> <given-names>S.</given-names></name></person-group> (<year>2012</year>). <article-title>&#x2018;Teachers are kind to those who have good marks&#x2019;: A study of Japanese young people&#x2019;s views of fairness and equity in school.</article-title> <source><italic>Compare</italic></source> <volume>42</volume> <fpage>27</fpage>&#x2013;<lpage>46</lpage>. <pub-id pub-id-type="doi">10.1080/03057925.2011.629073</pub-id></citation></ref>
<ref id="B66"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Soh</surname> <given-names>P. C. H.</given-names></name> <name><surname>Koay</surname> <given-names>K. Y.</given-names></name> <name><surname>Lim</surname> <given-names>V. K.</given-names></name></person-group> (<year>2018</year>). <article-title>Understanding cyberloafing by students through the lens of an extended theory of planned behavior.</article-title> <source><italic>First Monday</italic></source> <volume>23</volume>. <pub-id pub-id-type="doi">10.5210/fm.v23i6.7837</pub-id></citation></ref>
<ref id="B67"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sprecher</surname> <given-names>S.</given-names></name></person-group> (<year>1986</year>). <article-title>The relation between inequity and emotions in close relationships.</article-title> <source><italic>Soc. Psychol. Q.</italic></source> <volume>49</volume> <fpage>309</fpage>&#x2013;<lpage>321</lpage>. <pub-id pub-id-type="doi">10.2307/2786770</pub-id></citation></ref>
<ref id="B68"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sprecher</surname> <given-names>S.</given-names></name> <name><surname>Felmlee</surname> <given-names>D.</given-names></name></person-group> (<year>1992</year>). <article-title>The influence of parents and friends on the quality and stability of romantic relationships: A three-wave longitudinal investigation.</article-title> <source><italic>J. Marriage Family</italic></source> <volume>54</volume> <fpage>888</fpage>&#x2013;<lpage>900</lpage>. <pub-id pub-id-type="doi">10.2307/353170</pub-id></citation></ref>
<ref id="B69"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Taneja</surname> <given-names>A.</given-names></name> <name><surname>Fiore</surname> <given-names>V.</given-names></name> <name><surname>Fischer</surname> <given-names>B.</given-names></name></person-group> (<year>2015</year>). <article-title>Cyber-slacking in the classroom: Potential for digital distraction in the new age.</article-title> <source><italic>Comput. Educ.</italic></source> <volume>82</volume> <fpage>141</fpage>&#x2013;<lpage>151</lpage>. <pub-id pub-id-type="doi">10.1016/j.compedu.2014.11.009</pub-id></citation></ref>
<ref id="B70"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tierney</surname> <given-names>R. D.</given-names></name></person-group> (<year>2014</year>). <article-title>Fairness as a multifaceted quality in classroom assessment.</article-title> <source><italic>Stud. Educ. Eval.</italic></source> <volume>43</volume> <fpage>55</fpage>&#x2013;<lpage>69</lpage>. <pub-id pub-id-type="doi">10.1016/j.stueduc.2013.12.003</pub-id></citation></ref>
<ref id="B71"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>van Baak</surname> <given-names>C.</given-names></name> <name><surname>Maher</surname> <given-names>C. A.</given-names></name> <name><surname>Protas</surname> <given-names>M. E.</given-names></name> <name><surname>Hayes</surname> <given-names>B. E.</given-names></name></person-group> (<year>2023</year>). <article-title>Victims and perpetrators of cyber harassment: The role of power and control and the use of techniques of neutralization.</article-title> <source><italic>Deviant Behav.</italic></source> <volume>44</volume> <fpage>690</fpage>&#x2013;<lpage>707</lpage>. <pub-id pub-id-type="doi">10.1080/01639625.2022.2088317</pub-id></citation></ref>
<ref id="B72"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Walsh</surname> <given-names>L. L.</given-names></name> <name><surname>Lichti</surname> <given-names>D. A.</given-names></name> <name><surname>Zambrano-Varghese</surname> <given-names>C. M.</given-names></name> <name><surname>Borgaonkar</surname> <given-names>A. D.</given-names></name> <name><surname>Sodhi</surname> <given-names>J. S.</given-names></name> <name><surname>Moon</surname> <given-names>S.</given-names></name><etal/></person-group> (<year>2021</year>). <article-title>Why and how science students in the United States think their peers cheat more frequently online: Perspectives during the COVID-19 pandemic.</article-title> <source><italic>Int. J. Educ. Integr.</italic></source> <volume>17</volume>:<fpage>23</fpage>. <pub-id pub-id-type="doi">10.1007/s40979-021-00089-3</pub-id></citation></ref>
<ref id="B73"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>J.</given-names></name> <name><surname>Mei</surname> <given-names>W.</given-names></name> <name><surname>Ugrin</surname> <given-names>J. C.</given-names></name></person-group> (<year>2018</year>). <article-title>Student cyberloafing in and out of the classroom in China and the relationship with student performance.</article-title> <source><italic>Cyberpsychol. Behav. Soc. Network.</italic></source> <volume>21</volume> <fpage>199</fpage>&#x2013;<lpage>204</lpage>. <pub-id pub-id-type="doi">10.1089/cyber.2017.0397</pub-id> <pub-id pub-id-type="pmid">29485288</pub-id></citation></ref>
<ref id="B74"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yan</surname> <given-names>P.</given-names></name></person-group> (<year>2021</year>). <article-title>Chinese EFL students&#x2019; perceptions of classroom justice: The impact of teachers&#x2019; caring and immediacy.</article-title> <source><italic>Front. Psychol.</italic></source> <volume>12</volume>:<fpage>767008</fpage>. <pub-id pub-id-type="doi">10.3389/fpsyg.2021.767008</pub-id> <pub-id pub-id-type="pmid">34744945</pub-id></citation></ref>
<ref id="B75"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Y&#x0131;lmaz</surname> <given-names>R.</given-names></name> <name><surname>Yurdug&#x00FC;l</surname> <given-names>H.</given-names></name></person-group> (<year>2018</year>). <article-title>Cyberloafing in IT classrooms: Exploring the role of the psycho-social environment in the classroom, attitude to computers and computing courses, motivation and learning strategies.</article-title> <source><italic>J. Comput. High. Educ.</italic></source> <volume>30</volume> <fpage>530</fpage>&#x2013;<lpage>552</lpage>. <pub-id pub-id-type="doi">10.1007/s12528-018-9184-2</pub-id></citation></ref>
<ref id="B76"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhou</surname> <given-names>B. P.</given-names></name> <name><surname>Li</surname> <given-names>Y.</given-names></name> <name><surname>Hai</surname> <given-names>M.</given-names></name> <name><surname>Wang</surname> <given-names>W.</given-names></name> <name><surname>Niu</surname> <given-names>B. Y.</given-names></name></person-group> (<year>2023</year>). <article-title>Challenge-hindrance stressors and cyberloafing: A perspective of resource conservation versus resource acquisition.</article-title> <source><italic>Curr. Psychol.</italic></source> <volume>42</volume> <fpage>1172</fpage>&#x2013;<lpage>1181</lpage>. <pub-id pub-id-type="doi">10.1007/s12144-021-01505-0</pub-id></citation></ref>
<ref id="B77"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhou</surname> <given-names>B. P.</given-names></name> <name><surname>Li</surname> <given-names>Y.</given-names></name> <name><surname>Tang</surname> <given-names>Y.</given-names></name> <name><surname>Cao</surname> <given-names>W. T.</given-names></name></person-group> (<year>2021</year>). <article-title>An experience-sampling study on academic stressors and cyberloafing in college students: The moderating role of trait self-control.</article-title> <source><italic>Front. Psychol.</italic></source> <volume>12</volume>:<fpage>514252</fpage>. <pub-id pub-id-type="doi">10.3389/fpsyg.2021.514252</pub-id> <pub-id pub-id-type="pmid">34326788</pub-id></citation></ref>
<ref id="B78"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zito</surname> <given-names>N. A.</given-names></name> <name><surname>McQuillan</surname> <given-names>P. J.</given-names></name></person-group> (<year>2010</year>). <article-title>&#x201C;It&#x2019;s Not My Fault&#x201D;: Using neutralization theory to understand cheating by middle school students.</article-title> <source><italic>Curr. Issues Educ.</italic></source> <volume>13</volume> <pub-id pub-id-type="doi">10.1016/j.techfore.2018.06.032</pub-id></citation></ref>
</ref-list>
</back>
</article>