Using insights from email users to inform organisational email management policy
暂无分享,去创建一个
[1] Frank T. McAndrew. Can Gossip Be Good , 2008 .
[2] B. Babcock,et al. The Literary Use of Proverbs , 1977 .
[3] James Campbell Quick. Causes, Coping and Consequences of Stress at Work , 1989 .
[4] A. Vezza,et al. Applications of information networks , 1978, Proceedings of the IEEE.
[5] Eric M. Eisenberg,et al. Strategic Uses of Electronic Mail in Organisations , 1996 .
[6] Michael A. West,et al. Language In Education , 2007 .
[7] Eva Treneice Thorne. The politics of policy compliance : the World Bank and the social dimensions of development , 1998 .
[8] B. Malle,et al. Social dominance orientation: A personality variable predicting social and political attitudes. , 1994 .
[9] J. Evenden. Varieties of impulsivity , 1999, Psychopharmacology.
[10] E. Deci,et al. The "What" and "Why" of Goal Pursuits: Human Needs and the Self-Determination of Behavior , 2000 .
[11] Herta A. Murphy,et al. Effective Business Communications , 1972 .
[12] Michael Porte,et al. COMMUNICATION: A View from the Inside of Business , 1974 .
[13] J. Sherblom. Direction, Function, and Signature in Electronic Mail , 1988 .
[14] Mohan R. Limaye. Conceptual and Methodological Issues in Organizational Communication Research , 1992 .
[15] Rebecca E. Grinter,et al. Quality versus quantity: e-mail-centric task management and its relation with overload , 2005 .
[16] Karen Renaud,et al. The influence of self-esteem and locus of control on perceived email-related stress , 2007, Comput. Hum. Behav..
[17] Alan Dundes,et al. Proverbs and the Ethnography of Speaking Folklore1 , 1964 .
[18] C. Boehm,et al. The natural selection of altruistic traits , 1999, Human nature.
[19] Greg Barron,et al. Private e-mail requests and the diffusion of responsibility , 2002, Comput. Hum. Behav..
[20] David L. Hamilton. SOCIAL COGNITION: key readings , 2004 .
[21] Ronald W. Toseland,et al. An Introduction to Group Work Practice , 1984 .
[22] Donald N. Dedmon. A Comparison of University and Business Communication Practices , 1970 .
[23] Siobhan Chapman. Logic and Conversation , 2005 .
[24] B. van den Hooff,et al. Situational Influences on the Use of Communication Technologies , 2005 .
[25] P. Markey. Bystander intervention in computer-mediated communication , 2000 .
[26] Volker Sommer,et al. Kratze einen Altruisten. [Review of: Robin Dunbar (1998). Klatsch und Tratsch. Wie der Mensch zur Sprache fand. Munich: C. Bertelsmann. Original: Grooming, Gossip, and the Evolution of Language. London: Faber & Faber, 1996.] , 1997 .
[27] S. Wighton. One day at a time. , 1990, Nursing.
[28] Hans Kruuk,et al. Non-verbal Communication , 1973 .
[29] Paul Dourish,et al. Re-place-ing space: the roles of place and space in collaborative systems , 1996, CSCW '96.
[30] A. Avramides. Studies in the Way of Words , 1992 .
[31] Karen Renaud,et al. "You've Got E-Mail!" ... Shall I Deal With It Now? Electronic Mail From the Recipient's Perspective , 2006, Int. J. Hum. Comput. Interact..
[32] Francis T. McAndrew,et al. Who Do We Tell and Whom Do We Tell On? Gossip as a Strategy for Status Enhancement , 2007 .
[33] Robert J. Olney,et al. Executive Priorities for Effective Communication in an Information Society , 1986 .
[34] Tim O'Shea,et al. 'Flaming' in computer-mediated communication: Observations, explanations, implications. , 1992 .
[35] Roy F. Baumeister,et al. Narcissistic personality disorder , 2006 .
[36] Candace L. Sidner,et al. Email overload: exploring personal information management of email , 1996, CHI.
[37] Chris Kimble,et al. INFORMATION OVERLOAD AND ELECTRONIC MAIL: TAGGING MESSAGE CONTENT - A PARTIAL SOLUTION? , 2001 .
[38] B. Latané,et al. Group inhibition of bystander intervention in emergencies. , 1968, Journal of personality and social psychology.
[39] C. Lay,et al. At last, my research article on procrastination. , 1986 .
[40] Karen Renaud,et al. Having it all: how students combine traditional and digitally mediated communication , 2008 .
[41] D. Ariely,et al. Procrastination, Deadlines, and Performance: Self-Control by Precommitment , 2002, Psychological science.
[42] Annette N. Shelby,et al. Organizational, Business, Management, and Corporate Communication: An Analysis of Boundaries and Relationships , 1993 .
[43] A. Strauss. Basics Of Qualitative Research , 1992 .
[44] S. Macdonald,et al. Email Adoption, Diffusion, Use and Impact Within Small Firms: A Survey of UK Companies , 1998 .
[45] Jonathan Grudin,et al. Why CSCW Applications Fail: Problems in the Design and Evaluation of Organization of Organizational Interfaces. , 1988 .
[46] Ian Smith,et al. Quality Versus Quantity: E-Mail-Centric Task Management and Its Relation With Overload , 2005, Hum. Comput. Interact..
[47] D. C. Feldman,et al. The Development and Enforcement of Group Norms , 1984 .
[48] Ned Kock,et al. The Ape that Used E-Mail: Understanding E-Communication Behavior Through Evolution Theory , 2001, Commun. Assoc. Inf. Syst..
[49] George Kingsley Zipf,et al. Human behavior and the principle of least effort , 1949 .
[50] Philip Hunter. Email meets Enron to bring lawyers down on big corporations , 2007 .
[51] J. Burgoon,et al. Interpersonal Deception Theory , 1996 .
[52] M. Black,et al. The language of education , 1961 .
[53] R. Baumeister,et al. The nature and function of self-esteem: Sociometer theory , 2000 .
[54] Nava Pliskin,et al. The office tyrant - social control through e-mail , 1999, Inf. Technol. People.
[55] Karen Renaud,et al. FEATUREThink before you link: controlling ubiquitous availability , 2008, INTR.
[56] Mo Adam Mahmood,et al. Employees' Behavior towards IS Security Policy Compliance , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[57] S. Kiesler,et al. Group processes in computer-mediated communication☆ , 1986 .
[58] Stephen Mason. Email and compliance , 2005 .
[59] C. Erik Timmerman,et al. Relating Computer, Communication, and Computer-Mediated Communication Apprehensions to New Communication Technology Use in the Workplace , 2005, Commun. Res..
[60] Saadi Lahlou,et al. The impact of a threatening e‐mail reprimand on the recipient's blood pressure , 2005 .
[61] Bob Jickling,et al. Education for the Environment: a critique , 1998 .
[62] Larry R. Smeltzer,et al. The Relationship of Communication to Work Stress , 1987 .
[63] Herbert H. Clark,et al. Grounding in communication , 1991, Perspectives on socially shared cognition.
[64] C. V. Ford. Lies! Lies!! Lies!!!: The Psychology of Deceit , 1996 .
[65] John C. Tang,et al. When Can I Expect an Email Response? A Study of Rhythms in Email Usage , 2003, ECSCW.
[66] Monica T. Whitty,et al. New rules in the workplace: Applying object-relations theory to explain problem Internet and email behaviour in the workplace , 2006, Comput. Hum. Behav..
[67] James G. Phillips,et al. Decisional style and self-reported Email use in the workplace , 2007, Comput. Hum. Behav..
[68] W. O'donohue,et al. Practitioner's guide to evidence based psychotherapy , 2006 .
[69] Karianne Skovholt,et al. Email Copies in Workplace Interaction , 2006, J. Comput. Mediat. Commun..
[70] Susan Cohen,et al. Beyond slogans: lessons from Uganda's experience with ABC and HIV/AIDS. , 2004, Reproductive health matters.
[71] Geoffrey L. Cohen,et al. The Psychology of Self‐defense: Self‐Affirmation Theory , 2006 .
[72] C. W. Park,et al. Familiarity and Its Impact on Consumer Decision Biases and Heuristics , 1981 .
[73] J. Gimenez. Embedded business emails: Meeting new demands in international business communication , 2006 .
[74] Elske Ammenwerth,et al. Mobile information and communication tools in the hospital , 2000, Int. J. Medical Informatics.
[75] D. Over,et al. Studies in the Way of Words. , 1989 .
[76] Thomas Jackson,et al. Case study: evaluating the effect of email interruptions within the workplace , 2001 .
[77] T. Postmes,et al. The Formation of Group Norms in Computer-Mediated Communication , 2000 .
[78] Christine Porter,et al. Networking for Health: Health Professionals Using Email Discussion Forums for Development , 2004 .
[79] Mariana Valverde,et al. `One Day at a Time' and other Slogans for Everyday Life: The Ethical Practices of Alcoholics Anonymous , 1999 .
[80] Katrina M. Krause,et al. Use of email in a family practice setting: opportunities and challenges in patient- and physician-initiated communication , 2006, BMC medicine.
[81] Sue Boynton,et al. Non-verbal communication. , 2010, Journal of the Irish Dental Association.
[82] Joe K. Adams,et al. The Neglected Psychology of Cowardice , 1965 .
[83] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[84] Janet Fulk. Social construction of communication technology , 1993 .
[85] E. Coiera. When conversation is better than computation. , 2000, Journal of the American Medical Informatics Association : JAMIA.
[86] Ronald W. Toseland,et al. Introduction to Group Work Practice (with MyHelpingLab), An (5th Edition) , 2005 .
[87] Jane Webster,et al. Unintended consequences of emerging communication technologies: Instant Messaging in the workplace , 2005, Comput. Hum. Behav..
[88] C. Keating,et al. Human Dominance Signals: The Primate in Us , 1985 .
[89] Bojinka Bishop,et al. Theory and practice converge: a proposed set of corporate communication principles , 2006 .
[90] Kathy Buckner,et al. Using email for social and domestic purposes : effectiveness in fulfillment of interpersonal communication motives , 2003 .
[91] F. Heider. The psychology of interpersonal relations , 1958 .