Towards Understanding an Employee's Retention Behavior: Antecedents and Implications for E-mail Governance
暂无分享,去创建一个
[1] Deborah K. Barreau. Context as a factor in personal information management systems , 1995 .
[2] Carol V. Brown,et al. Designing data governance , 2010, CACM.
[3] Elizabeth Lomas. Information governance: information security and access within a UK context , 2010 .
[4] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[5] Robert W. Zmud,et al. Behavioral Intention Formation in Knowledge Sharing: Examining the Roles of Extrinsic Motivators, Social-Psychological Factors, and Organizational Climate , 2005, MIS Q..
[6] Schubert Foo,et al. Management of emails as official records in Singapore: a case study. , 2005 .
[7] Cheryl Burke Jarvis,et al. A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .
[8] STEVE WHITTAKER,et al. The character, value, and management of personal paper archives , 2001, TCHI.
[9] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[10] M. Conner,et al. Extending the Theory of Planned Behavior: A Review and Avenues for Further Research , 1998 .
[11] John C. Ruhnka,et al. Using ESI discovery teams to manage electronic data discovery , 2010, Commun. ACM.
[12] A. Tversky,et al. Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .
[13] Eirik Albrechtsen,et al. The long term effects of information security e-learning on organizational learning , 2011, Inf. Manag. Comput. Secur..
[14] Anne Morris,et al. The problem of information overload in business organisations: a review of the literature , 2000, Int. J. Inf. Manag..
[15] Steve Whittaker,et al. Personal information management: From information consumption to curation , 2011, Annu. Rev. Inf. Sci. Technol..
[16] W. W. Peterson,et al. The theory of signal detectability , 1954, Trans. IRE Prof. Group Inf. Theory.
[17] Gerhard Knolmayer,et al. Email Governance: Are Companies in Financial Industries More Mature? , 2012, 2012 45th Hawaii International Conference on System Sciences.
[18] Catherine C. Marshall,et al. Saving and using encountered information: implications for electronic periodicals , 2005, CHI.
[19] J. Scott Armstrong,et al. Estimating nonresponse bias in mail surveys. , 1977 .
[20] Wynne W. Chin,et al. Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.
[21] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[22] F. Bookstein,et al. Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory: , 1982 .
[23] M. Fishbein. A Reasoned Action Approach to Health Promotion , 2008, Medical decision making : an international journal of the Society for Medical Decision Making.
[24] M. Angela Sasse,et al. "Stuff goes into the computer and doesn't come out": a cross-tool study of personal information management , 2004, CHI.
[25] Jacek Gwizdka,et al. Email task management styles: the cleaners and the keepers , 2004, CHI EA '04.
[26] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[27] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[28] Deborah Compeau,et al. The Effects of Self-Regulated Learning Processes on E-Learning Outcomes in Organizational Settings , 2012, J. Manag. Inf. Syst..
[29] R. Bagozzi,et al. On the evaluation of structural equation models , 1988 .
[30] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[31] Jay F. Nunamaker,et al. Can e-learning replace classroom learning? , 2004, CACM.
[32] William J. Qualls,et al. Organizational Climate and Decision Framing An Integrated Approach to Analyzing Industrial Buying Decisions , 1989 .
[33] Christopher K. Hsee,et al. Cross-National Differences in Risk Preference and Lay Predictions , 1999 .
[34] Gilbert A. Churchill. A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .
[35] I. Ajzen. Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. , 2002 .
[36] Ale Smidts,et al. Assessing the Construct Validity of Risk Attitude , 2000 .
[37] Ian Smith,et al. Taking email to task: the design and evaluation of a task management centered email tool , 2003, CHI '03.
[38] Edward Cutrell,et al. It's not that important: demoting personal information of low subjective importance using GrayArea , 2009, CHI.
[39] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[40] E. Weber,et al. A Domain-Specific Risk-Attitude Scale: Measuring Risk Perceptions and Risk Behaviors , 2002 .
[41] A. J. Bernheim Brush,et al. Revisiting Whittaker & Sidner's "email overload" ten years later , 2006, CSCW '06.
[42] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[43] M. Wallach,et al. Risk Taking: A Study in Cognition and Personality , 1965 .
[44] I. Ajzen. The theory of planned behavior , 1991 .
[45] Jason L. Snyder. E-Mail Privacy in the Workplace , 2010 .
[46] Carol Saunders,et al. PLS: A Silver Bullet? , 2006 .
[47] Mikko T. Siponen,et al. A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..
[48] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[49] Harry Bruce,et al. Personal anticipated information need , 2005, Inf. Res..
[50] Qing Hu,et al. Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..
[51] T. D. Wilson,et al. Information overload: implications for healthcare services , 2001 .
[52] Guy H. Gessner,et al. Holistic Compliance with Sarbanes-Oxley , 2004, Commun. Assoc. Inf. Syst..
[53] Nancy Flynn. The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company's E-Mail, Blogs, Social Networking, and Other Electronic Communication Tools , 2009 .
[54] Janice C. Sipior,et al. A Framework for Employee E-mail Privacy Within the United States , 2009 .
[55] François-Xavier Paré. The Many Facets of Document Importance: A Case Study of Office Workers , 2013 .
[56] A. Tversky,et al. Rational choice and the framing of decisions , 1990 .
[57] D. Straub,et al. Editor's comments: a critical look at the use of PLS-SEM in MIS quarterly , 2012 .
[58] Deborah K. Barreau. The persistence of behavior and form in the organization of personal information , 2008 .
[59] I. Ajzen,et al. The Influence of Attitudes on Behavior , 2005 .
[60] William Lewis,et al. PLS, Small Sample Size, and Statistical Power in MIS Research , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[61] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[62] Thomas W. Jackson,et al. Theory-based model of factors affecting information overload , 2012, Int. J. Inf. Manag..
[63] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[64] Joseph G. Davis,et al. Aversion to Loss and Information Overload: An Experimental Investigation , 2009, ICIS.
[65] Dorothy E. Leidner,et al. Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict , 2006, MIS Q..
[66] Scott B. MacKenzie,et al. Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques , 2011, MIS Q..
[67] H. B. Mann,et al. On a Test of Whether one of Two Random Variables is Stochastically Larger than the Other , 1947 .
[68] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[69] A. Bandura. Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.
[70] Linda Volonino. Electronic Evidence and Computer Forensics , 2003, Commun. Assoc. Inf. Syst..
[71] Paul A. Pavlou,et al. Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior , 2006, MIS Q..
[72] E. Erdfelder,et al. Statistical power analyses using G*Power 3.1: Tests for correlation and regression analyses , 2009, Behavior research methods.
[73] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[74] Linda Volonino,et al. Managing the Lifecycle of Electronically Stored Information , 2007, Inf. Syst. Manag..
[75] Robert E. Kraut,et al. Email overload at work: an analysis of factors associated with email strain , 2006, IEEE Engineering Management Review.
[76] Victoria Bellotti,et al. E-mail as habitat: an exploration of embedded personal information management , 2001, INTR.
[77] Robert E. Kraut,et al. Understanding email use: predicting action on a message , 2005, CHI.
[78] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[79] William E. Jones,et al. Context in information behavior research , 2007 .
[80] Janice C. Sipior,et al. Recognizing the Impact of E-Discovery Amendments on Electronic Records Management , 2009, Inf. Syst. Manag..
[81] Aslib,et al. Meeting Managers' Information Needs , 1998 .
[82] Alain Pinsonneault,et al. Survey Research Methodology in Management Information Systems: An Assessment , 1993, J. Manag. Inf. Syst..
[83] Candace L. Sidner,et al. Email overload: exploring personal information management of email , 1996, CHI.
[84] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[85] Janet Vertesi,et al. To have and to hold: exploring the personal archive , 2006, CHI.
[86] William Jones,et al. Finders, keepers? The present and future perfect in support of personal information management , 2004, First Monday.
[87] Detmar W. Straub,et al. Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..