Dataveillance: Employee Monitoring & Information Privacy Concerns in the Workplace
暂无分享,去创建一个
[1] Domenic Sculli,et al. The role of trust, quality, value and risk in conducting e-business , 2002, Ind. Manag. Data Syst..
[2] A. Acquisti. Protecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments , 2002 .
[3] Jeretta Horn Nord,et al. E-monitoring in the workplace: privacy, legislation, and surveillance software , 2006, CACM.
[4] T. Tyler,et al. Procedural justice as a criterion in allocation decisions. , 1986 .
[5] Tomoji Kishi,et al. Formal verification and software product lines , 2006, CACM.
[6] Chen Wang,et al. Consumer privacy concerns about Internet marketing , 1998, CACM.
[7] Jeffrey M. Stanton,et al. Traditional and Electronic Monitoring from an Organizational Justice Perspective , 2000 .
[8] Dag Elgesem,et al. The structure of rights in Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data , 1999, Ethics and Information Technology.
[9] G. Stoney Alder,et al. Clarifying the effects of Internet monitoring on job attitudes: The mediating role of employee trust , 2006, Inf. Manag..
[10] William J. Doll,et al. The Collaborative Use of Information Technology: End-User Participation and Systems Success , 2001, Inf. Resour. Manag. J..
[11] Herman T. Tavani,et al. Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology , 2006 .
[12] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[13] M. Selmi. Privacy for the Working Class: Public Work and Private Lives , 2006 .
[14] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[15] Roger A. Clarke,et al. Information technology and dataveillance , 1988, CACM.
[16] Jeffrey M. Stanton,et al. Effects of electronic performance monitoring on personal control, task satisfaction, and task performance , 1996 .
[17] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[18] S. Margulis. On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .
[19] Timothy P. McGonigle,et al. A Meta-Analysis of the Relationship Between Procedural Justice and Distributive Justice: Implications for Justice Research , 2001 .
[20] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[21] Christine A. Henle. Predicting workplace deviance from the interaction between organizational justice and personality. , 2005 .
[22] France Bélanger,et al. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..
[23] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[24] Roger Clarke,et al. Internet privacy concerns confirm the case for intervention , 1999, CACM.
[25] Paul A. Pavlou,et al. Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..
[26] Lucas D. Introna. Privacy and the computer: why we need privacy in the information society , 1997 .
[27] Paul E. Spector,et al. The Role of Justice in Organizations: A Meta-Analysis , 2001 .
[28] Jeffrey M. Stanton,et al. Reactions to Employee Performance Monitoring: Framework, Review, and Research Directions , 2000 .
[29] Dana Schwieger,et al. Internet Usage Monitoring in the Workplace: Its Legal Challenges and Implementation Strategies , 2007, Inf. Syst. Manag..
[30] P. K. Kannan,et al. The customer economics of internet privacy , 2002 .
[31] K. W. Mossholder,et al. Relationships between Bases of Power and Work Reactions: The Mediational Role of Procedural Justice , 1998 .
[32] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[33] Scott C. D'Urso,et al. Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations , 2006 .
[34] Bob Godfrey. Electronic work monitoring: an ethical model , 2000 .
[35] R. Mason. Four ethical issues of the information age , 1986 .
[36] J. Webster,et al. Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .
[37] David Mason,et al. Advanced Topics in Information Resources Management , 2003 .
[38] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[39] Paul R. Prabhaker,et al. Who owns the online consumer , 2000 .
[40] Jessica Vitak,et al. Digital footprints: online identity management and search in the age of transparency , 2007 .
[41] D. Rousseau,et al. Violating the psychological contract: Not the exception but the norm , 1994 .