It Consumerization and compliant Use: do Policies Matter?
暂无分享,去创建一个
[1] Andrea Back,et al. Shadow it – A View from Behind the Curtain , 2014, Comput. Secur..
[2] Jonas Repschläger,et al. The Blurring Boundaries Of Work-Related And Personal Media Use: A Grounded Theory Study On The Employee's Perspective , 2013, ECIS.
[3] O. Williamson. Transaction-Cost Economics: The Governance of Contractual Relations , 1979, The Journal of Law and Economics.
[4] Christopher Rentrop,et al. On the Emergence of Shadow IT - a Transaction Cost-Based Approach , 2014, ECIS.
[5] Jung P. Shim,et al. Current Status, Issues, and Future of Bring Your Own Device (BYOD) , 2014, Commun. Assoc. Inf. Syst..
[6] Alexander Benlian,et al. The Dual Role of IS Specificity in Governing Software as a Service , 2012, ICIS.
[7] J. Thibaut,et al. Procedural Justice: A Psychological Analysis , 1976 .
[8] Gerold Mikula,et al. Justice and Social Interaction: Experimental and Theoretical Contributions, from Psychological Research , 1980 .
[9] Robert W. Covert,et al. Designing and Constructing Instruments for Social Research and Evaluation , 2007 .
[10] Björn Niehaves,et al. AIS Electronic , 2017 .
[11] R. Bennett,et al. Development of a measure of workplace deviance. , 2000, The Journal of applied psychology.
[12] Christine Nadel,et al. Case Study Research Design And Methods , 2016 .
[13] R. Folger,et al. Effects of Procedural and Distributive Justice on Reactions to Pay Raise Decisions , 1989 .
[14] Walter Brenner,et al. European Conference on Information Systems ( ECIS ) 5-15-2012 EXPLORING THE SHADOWS : IT GOVERNANCE APPROACHES TO USER-DRIVEN INNOVATION , 2012 .
[15] N. Denzin. The research act: A theoretical introduction to sociological methods , 1977 .
[16] Laurie Giddens,et al. It ’ s My Tool , I Know How to Use It : A Theory of the Impact of BYOD on Device Competence and Job Satisfaction Research-in-Progress , 2014 .
[17] J. Colquitt. On the dimensionality of organizational justice: a construct validation of a measure. , 2001, The Journal of applied psychology.
[18] Philip E. T. Lewis,et al. Research Methods for Business Students , 2006 .
[19] R. Mauborgne,et al. Procedural justice, strategic decision making, and the knowledge economy , 1998 .
[20] Susan Greener,et al. Business Research Methods , 2008 .
[21] Joan V. Robinson,et al. The Nature of the Firm , 2004 .
[22] Carl J. Dahlman. The Problem of Externality , 1979, The Journal of Law and Economics.
[23] Jennifer E. Moyer. Managing Mobile Devices in Hospitals: A Literature Review of BYOD Policies and Usage , 2013 .
[24] Carol T. Kulik,et al. Individual and corporate dispute resolution: Using procedural fairness as a decision heuristic. , 1993 .
[25] J. Greenberg,et al. The social side of fairness: Interpersonal and informational classes of organizational justice. , 1993 .
[26] Viswanath Venkatesh,et al. Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems , 2013, MIS Q..
[27] Jennifer Caroline Greene,et al. Mixed Methods in Social Inquiry , 2007 .
[28] B. McCarthy. NEW ECONOMICS OF SOCIOLOGICAL CRIMINOLOGY , 2002 .
[29] Mo Adam Mahmood,et al. Employees' Behavior towards IS Security Policy Compliance , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[30] Bella Lise Galperin. Determinants of deviance in the workplace : an empirical examination in Canada and Mexico , 2002 .
[31] Anat Hovav,et al. Employees' Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory , 2014, ECIS.
[32] Sandy Behrens,et al. Shadow systems: the good, the bad and the ugly , 2009, CACM.
[33] Björn Niehaves,et al. Dual Use of Mobile IT and Work-to-Life Conflict in the Context of IT Consumerization , 2014, ICIS.
[34] Jeffrey M. Stanton,et al. Analysis of end user security behaviors , 2005, Comput. Secur..
[35] Jan Marco Leimeister,et al. Consumerization - IT Innovations from the Consumer Market as a Challenge for Corporate IT , 2012, Bus. Inf. Syst. Eng..
[36] Brian Tokuyoshi. The security implications of BYOD , 2013, Netw. Secur..
[37] W. Firestone,et al. Multisite Qualitative Policy Research: Optimizing Description and Generalizability , 1983 .
[38] Bill Morrow,et al. BYOD security challenges: control and protect your most sensitive data , 2012, Netw. Secur..
[39] Michael D. Myers,et al. The qualitative interview in IS research: Examining the craft , 2007, Inf. Organ..
[40] Tom R. Tyler,et al. Why People Cooperate: The Role of Social Motivations , 2010 .
[41] K. Eisenhardt. Building theories from case study research , 1989, STUDI ORGANIZZATIVI.
[42] D. Schweiger,et al. Building Commitment, Attachment, and Trust in Strategic Decision-Making Teams: The Role of Procedural Justice , 1995 .
[43] Aurélie Leclercq-Vandelannoitte,et al. Managing BYOD: how do organizations incorporate user-driven IT innovations? , 2015, Inf. Technol. People.