“…Bal & Kooij, 2011;Hess & Jepsen, 2009;Lub, Bal, Blomme, & Schalk, 2016;Nikolaou, Tomprou, & Vakola, 2007;Orvis, Dudley, & Cortina, 2008;Raja et al, 2004); and, various moderating and mediating mechanisms of PC breach effects (e.g. Deery, Iverson, & Walsh, 2006;Griep, Vantilborgh, Baillien, & Pepermans, 2016;Montes & Irving, 2008;Robinson, 1996;Turnley, Bolino, Lester, & Bloodgood, 2004). Research has identified and remedied various methodological shortcomings (e.g.…”