Towards Understanding an Employee's Retention Behavior: Antecedents and Implications for E-mail Governance

Despite the rise of social media in the business context, e-mail is still the pervasive and ubiquitous means of corporate communication documenting the majority of all business activities. Due to its decisive role in providing evidence in litigations or compliance audits, e-mail has gained the notion of a “smoking gun”. Thus, the effective retention and disposal of e-mails is of vital importance for firms in an effort to ensure compliance and reduce their litigation risks. This study investigates an employee’s e-mail retention behavior. Drawing on the theory of planned behavior and prospect theory, we derive a research model that identifies the antecedents of employees’ corporate e-mail retention behavior. The model is tested with data collected from 105 employees. While only 31% of the participants report the existence of retention policies, our results indicate that a combination of technological and socio-organizational measures is adequate to influence an employee’s retention behavior.

[1]  Deborah K. Barreau Context as a factor in personal information management systems , 1995 .

[2]  Carol V. Brown,et al.  Designing data governance , 2010, CACM.

[3]  Elizabeth Lomas Information governance: information security and access within a UK context , 2010 .

[4]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[5]  Robert W. Zmud,et al.  Behavioral Intention Formation in Knowledge Sharing: Examining the Roles of Extrinsic Motivators, Social-Psychological Factors, and Organizational Climate , 2005, MIS Q..

[6]  Schubert Foo,et al.  Management of emails as official records in Singapore: a case study. , 2005 .

[7]  Cheryl Burke Jarvis,et al.  A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .

[8]  STEVE WHITTAKER,et al.  The character, value, and management of personal paper archives , 2001, TCHI.

[9]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[10]  M. Conner,et al.  Extending the Theory of Planned Behavior: A Review and Avenues for Further Research , 1998 .

[11]  John C. Ruhnka,et al.  Using ESI discovery teams to manage electronic data discovery , 2010, Commun. ACM.

[12]  A. Tversky,et al.  Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .

[13]  Eirik Albrechtsen,et al.  The long term effects of information security e-learning on organizational learning , 2011, Inf. Manag. Comput. Secur..

[14]  Anne Morris,et al.  The problem of information overload in business organisations: a review of the literature , 2000, Int. J. Inf. Manag..

[15]  Steve Whittaker,et al.  Personal information management: From information consumption to curation , 2011, Annu. Rev. Inf. Sci. Technol..

[16]  W. W. Peterson,et al.  The theory of signal detectability , 1954, Trans. IRE Prof. Group Inf. Theory.

[17]  Gerhard Knolmayer,et al.  Email Governance: Are Companies in Financial Industries More Mature? , 2012, 2012 45th Hawaii International Conference on System Sciences.

[18]  Catherine C. Marshall,et al.  Saving and using encountered information: implications for electronic periodicals , 2005, CHI.

[19]  J. Scott Armstrong,et al.  Estimating nonresponse bias in mail surveys. , 1977 .

[20]  Wynne W. Chin,et al.  Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.

[21]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[22]  F. Bookstein,et al.  Two Structural Equation Models: LISREL and PLS Applied to Consumer Exit-Voice Theory: , 1982 .

[23]  M. Fishbein A Reasoned Action Approach to Health Promotion , 2008, Medical decision making : an international journal of the Society for Medical Decision Making.

[24]  M. Angela Sasse,et al.  "Stuff goes into the computer and doesn't come out": a cross-tool study of personal information management , 2004, CHI.

[25]  Jacek Gwizdka,et al.  Email task management styles: the cleaners and the keepers , 2004, CHI EA '04.

[26]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[27]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[28]  Deborah Compeau,et al.  The Effects of Self-Regulated Learning Processes on E-Learning Outcomes in Organizational Settings , 2012, J. Manag. Inf. Syst..

[29]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[30]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[31]  Jay F. Nunamaker,et al.  Can e-learning replace classroom learning? , 2004, CACM.

[32]  William J. Qualls,et al.  Organizational Climate and Decision Framing An Integrated Approach to Analyzing Industrial Buying Decisions , 1989 .

[33]  Christopher K. Hsee,et al.  Cross-National Differences in Risk Preference and Lay Predictions , 1999 .

[34]  Gilbert A. Churchill A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .

[35]  I. Ajzen Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. , 2002 .

[36]  Ale Smidts,et al.  Assessing the Construct Validity of Risk Attitude , 2000 .

[37]  Ian Smith,et al.  Taking email to task: the design and evaluation of a task management centered email tool , 2003, CHI '03.

[38]  Edward Cutrell,et al.  It's not that important: demoting personal information of low subjective importance using GrayArea , 2009, CHI.

[39]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[40]  E. Weber,et al.  A Domain-Specific Risk-Attitude Scale: Measuring Risk Perceptions and Risk Behaviors , 2002 .

[41]  A. J. Bernheim Brush,et al.  Revisiting Whittaker & Sidner's "email overload" ten years later , 2006, CSCW '06.

[42]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[43]  M. Wallach,et al.  Risk Taking: A Study in Cognition and Personality , 1965 .

[44]  I. Ajzen The theory of planned behavior , 1991 .

[45]  Jason L. Snyder E-Mail Privacy in the Workplace , 2010 .

[46]  Carol Saunders,et al.  PLS: A Silver Bullet? , 2006 .

[47]  Mikko T. Siponen,et al.  A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..

[48]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[49]  Harry Bruce,et al.  Personal anticipated information need , 2005, Inf. Res..

[50]  Qing Hu,et al.  Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management , 2007, MIS Q..

[51]  T. D. Wilson,et al.  Information overload: implications for healthcare services , 2001 .

[52]  Guy H. Gessner,et al.  Holistic Compliance with Sarbanes-Oxley , 2004, Commun. Assoc. Inf. Syst..

[53]  Nancy Flynn The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company's E-Mail, Blogs, Social Networking, and Other Electronic Communication Tools , 2009 .

[54]  Janice C. Sipior,et al.  A Framework for Employee E-mail Privacy Within the United States , 2009 .

[55]  François-Xavier Paré The Many Facets of Document Importance: A Case Study of Office Workers , 2013 .

[56]  A. Tversky,et al.  Rational choice and the framing of decisions , 1990 .

[57]  D. Straub,et al.  Editor's comments: a critical look at the use of PLS-SEM in MIS quarterly , 2012 .

[58]  Deborah K. Barreau The persistence of behavior and form in the organization of personal information , 2008 .

[59]  I. Ajzen,et al.  The Influence of Attitudes on Behavior , 2005 .

[60]  William Lewis,et al.  PLS, Small Sample Size, and Statistical Power in MIS Research , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[61]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[62]  Thomas W. Jackson,et al.  Theory-based model of factors affecting information overload , 2012, Int. J. Inf. Manag..

[63]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[64]  Joseph G. Davis,et al.  Aversion to Loss and Information Overload: An Experimental Investigation , 2009, ICIS.

[65]  Dorothy E. Leidner,et al.  Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict , 2006, MIS Q..

[66]  Scott B. MacKenzie,et al.  Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques , 2011, MIS Q..

[67]  H. B. Mann,et al.  On a Test of Whether one of Two Random Variables is Stochastically Larger than the Other , 1947 .

[68]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[69]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.

[70]  Linda Volonino Electronic Evidence and Computer Forensics , 2003, Commun. Assoc. Inf. Syst..

[71]  Paul A. Pavlou,et al.  Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior , 2006, MIS Q..

[72]  E. Erdfelder,et al.  Statistical power analyses using G*Power 3.1: Tests for correlation and regression analyses , 2009, Behavior research methods.

[73]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[74]  Linda Volonino,et al.  Managing the Lifecycle of Electronically Stored Information , 2007, Inf. Syst. Manag..

[75]  Robert E. Kraut,et al.  Email overload at work: an analysis of factors associated with email strain , 2006, IEEE Engineering Management Review.

[76]  Victoria Bellotti,et al.  E-mail as habitat: an exploration of embedded personal information management , 2001, INTR.

[77]  Robert E. Kraut,et al.  Understanding email use: predicting action on a message , 2005, CHI.

[78]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[79]  William E. Jones,et al.  Context in information behavior research , 2007 .

[80]  Janice C. Sipior,et al.  Recognizing the Impact of E-Discovery Amendments on Electronic Records Management , 2009, Inf. Syst. Manag..

[81]  Aslib,et al.  Meeting Managers' Information Needs , 1998 .

[82]  Alain Pinsonneault,et al.  Survey Research Methodology in Management Information Systems: An Assessment , 1993, J. Manag. Inf. Syst..

[83]  Candace L. Sidner,et al.  Email overload: exploring personal information management of email , 1996, CHI.

[84]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[85]  Janet Vertesi,et al.  To have and to hold: exploring the personal archive , 2006, CHI.

[86]  William Jones,et al.  Finders, keepers? The present and future perfect in support of personal information management , 2004, First Monday.

[87]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..