The Blurring Boundaries Of Work-Related And Personal Media Use: A Grounded Theory Study On The Employee's Perspective
暂无分享,去创建一个
Jonas Repschläger | Rüdiger Zarnekow | Till J. Winkler | Paul R. Schalow | Jonas Repschläger | Rüdiger Zarnekow
[1] Dinesh A. Mirchandani,et al. Reducing Internet Abuse in the Workplace , 2003 .
[2] A. Strauss. Basics Of Qualitative Research , 1992 .
[3] Blake Ives,et al. IT Consumerization: When Gadgets Turn Into Enterprise IT Tools , 2012, MIS Q. Executive.
[4] Blake E. Ashforth,et al. All in a Day'S Work: Boundaries and Micro Role Transitions , 2000 .
[5] Anselm L. Strauss,et al. Basics of qualitative research : techniques and procedures for developing grounded theory , 1998 .
[6] Magid Igbaria,et al. Development of a Measure of Personal Web Usage in the Workplace , 2004, Cyberpsychology Behav. Soc. Netw..
[7] Joseph C. Ugrin,et al. Exploring Internet Abuse in the Workplace: How Can We Maximize Deterrence Efforts? , 2008 .
[8] Andreas Antonius Béla Györy,et al. Bewusster Einsatz von Schatten-IT: Sicherheit & Innovationsförderung , 2011 .
[9] Kimberly Young,et al. Internet Abuse in the Workplace: New Trends in Risk Management , 2004, Cyberpsychology Behav. Soc. Netw..
[10] Zoonky Lee,et al. Pluralistic Ignorance in the Personal Use of the Internet and System Monitoring , 2005, AMCIS.
[11] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[12] Noelle Chesley. Blurring Boundaries? Linking Technology Use, Spillover, Individual Distress, and Family Satisfaction , 2005 .
[13] France Bélanger,et al. Abuse or learning? , 2002, CACM.
[14] Gee-Woo Bock,et al. Why Employees Do Non-Work-Related Computing: An Investigation of Factors Affecting NWRC in a Workplace , 2006, PACIS.
[15] Gee-Woo Bock,et al. Non-work related computing (NWRC) , 2009, CACM.
[16] Cathy Urquhart,et al. Putting the ‘theory’ back into grounded theory: guidelines for grounded theory studies in information systems , 2009, Inf. Syst. J..
[17] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[18] Yajiong Xue,et al. Punishment, Justice, and Compliance in Mandatory IT Settings , 2011, Inf. Syst. Res..
[19] Pamela Jordan. Basics of qualitative research: Grounded theory procedures and techniques , 1994 .
[20] Gary Klein,et al. Using Deterrence to Mitigate Employee Internet Abuse , 2012, 2012 45th Hawaii International Conference on System Sciences.
[21] Anita L. Blanchard,et al. The Interaction of Work Stressors and Organizational Sanctions on Cyberloafing , 2008 .
[22] Huimin Zhao,et al. A text mining approach to Internet abuse detection , 2008, Inf. Syst. E Bus. Manag..
[23] Qing Hu,et al. Does deterrence work in reducing information security policy abuse by employees? , 2011, Commun. ACM.
[24] Jintae Lee,et al. A holistic model of computer abuse within organizations , 2002, Inf. Manag. Comput. Secur..
[25] Walter Brenner,et al. European Conference on Information Systems ( ECIS ) 5-15-2012 EXPLORING THE SHADOWS : IT GOVERNANCE APPROACHES TO USER-DRIVEN INNOVATION , 2012 .
[26] Catherine E. Connelly,et al. Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model , 2011, J. Manag. Inf. Syst..
[27] A. Stinchcombe. Information and Organizations , 2019 .
[28] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[29] D. Galletta,et al. An Empirical Investigation of Antecedents of Internet Abuse in the Workplace , 2003 .
[30] Michael D. Myers,et al. The qualitative interview in IS research: Examining the craft , 2007, Inf. Organ..
[31] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[32] Vivien K. G. Lim,et al. Cyberloafing, Neutralization, And Organizational Citizenship Behavior , 2011, PACIS.
[33] Hock-Hai Teo,et al. An Experimental Study of the Factors Influencing Non-Work Related Use of IT Resources at Workplace , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[34] James N. Danziger,et al. On Cyberslacking: Workplace Status and Personal Internet Use at Work , 2008, Cyberpsychology Behav. Soc. Netw..
[35] Oliver Günther,et al. The Impact of Software as a Service on IS Authority - A Contingency Perspective , 2011, ICIS.
[36] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[37] M. Griffiths. Internet abuse in the workplace: Issues and concerns for employers and employment counselors , 2003 .
[38] Nancy B. Kurland,et al. A review of telework research: findings, new directions, and lessons for the study of modern work , 2002 .
[39] Paul Schalow. Private Kommunikationsressourcen und -interessen im betrieblichen Umfeld , 2012 .
[40] I. Ajzen. The theory of planned behavior , 1991 .