Mobile information systems and organisational control: beyond the panopticon metaphor?

[1]  Luca Vogt The Mode Of Information , 2016 .

[2]  Melissa Mazmanian Avoiding the Trap of Constant Connectivity: When Congruent Frames Allow for Heterogeneous Practices , 2013 .

[3]  Ellie Harmon,et al.  Stories of the Smartphone in everyday discourse: conflict, tension & instability , 2013, CHI.

[4]  JoAnne Yates,et al.  The Autonomy Paradox: The Implications of Mobile Email Devices for Knowledge Professionals , 2013, Organ. Sci..

[5]  Alan D. Schrift,et al.  Discipline and Punish , 2013 .

[6]  Aurélie Leclercq-Vandelannoitte,et al.  Beyond Panoptic Enclosures? On the Spatiotemporal Dimension of Organizational Control as Induced by Mobile Information Systems , 2013 .

[7]  Andrea Carugati,et al.  On the Dimensions of Technological Control , 2012 .

[8]  Alexandra Michel,et al.  Transcending Socialization , 2011 .

[9]  A. Doyle Revisiting the synopticon: Reconsidering Mathiesen’s ‘The Viewer Society’ in the age of Web 2.0 , 2011 .

[10]  Stephen R. Barley,et al.  E-mail as a Source and Symbol of Stress , 2011, Organ. Sci..

[11]  Yves Gendron,et al.  Beyond panopticism: On the ramifications of surveillance in a contemporary professional setting , 2011 .

[12]  Daniel E. Martinez Beyond disciplinary enclosures: Management control in the society of control , 2011 .

[13]  Martin De Saulles,et al.  The portable panopticon: morality and mobile technologies , 2011, J. Inf. Commun. Ethics Soc..

[14]  Donald Hislop,et al.  Mobile phones during work and non-work time: A case study of mobile, non-managerial workers , 2011, Inf. Organ..

[15]  Gilbert Caluya The post-panoptic society? Reassessing Foucault in surveillance studies , 2010 .

[16]  Izak Benbasat,et al.  Information about information: a taxonomy of views , 2010 .

[17]  John Roberts,et al.  No-one is perfect: the limits of transparency and an ethic for ‘intelligent’ accountability , 2009 .

[18]  D. Lyon Surveillance Studies: An Overview , 2007 .

[19]  Melissa Mazmanian,et al.  UBIQUITOUS EMAIL: INDIVIDUAL EXPERIENCES AND ORGANIZATIONAL CONSEQUENCES OF BLACKBERRY USE. , 2006 .

[20]  Ojelanki K. Ngwenyama,et al.  Contextual influences on user satisfaction with mobile computing: findings from two healthcare organizations , 2006, Eur. J. Inf. Syst..

[21]  Wendy L. Cukier,et al.  Is mobile email functional or dysfunctional? Two perspectives on mobile email usage , 2006, Eur. J. Inf. Syst..

[22]  Carsten Sørensen,et al.  The dynamics of control and mobile computing in distributed activities , 2006, Eur. J. Inf. Syst..

[23]  Athanasia Pouloudi,et al.  Enacting new temporal boundaries: the role of mobile phones , 2006, Eur. J. Inf. Syst..

[24]  Iris A. Junglas,et al.  Introduction to the special issue on mobile user behaviour , 2006, Eur. J. Inf. Syst..

[25]  Geoff Walsham,et al.  Doing interpretive research , 2006, Eur. J. Inf. Syst..

[26]  Sirkka L. Jarvenpaa,et al.  Managing the Paradoxes of Mobile Technology , 2005, Inf. Syst. Manag..

[27]  Jannis Kallinikos,et al.  The order of technology: Complexity and control in a connected world , 2005, Inf. Organ..

[28]  Daniel Robey,et al.  Human agency in a wireless world: Patterns of technology use in nomadic computing environments , 2005, Inf. Organ..

[29]  Rikard Lindgren,et al.  Multi-contextuality in ubiquitous computing: Investigating the car case through action research , 2005, Inf. Organ..

[30]  Diane M. Strong,et al.  Panoptic empowerment and reflective conformity in enterprise systems-enabled organizations , 2005, Inf. Organ..

[31]  JoAnne Yates,et al.  CrackBerries: The Social Implications of Ubiquitous Wireless E-Mail Devices , 2005, Designing Ubiquitous Information Environments.

[32]  John Weckert Electronic monitoring in the workplace: controversies and solutions , 2004 .

[33]  P. Zarifian Contrôle des engagements et productivité sociale , 2004 .

[34]  L. Willcocks,et al.  Social theory and philosophy for information systems , 2004 .

[35]  Mats Alvesson,et al.  Cages in Tandem: Management Control, Social Identity, and Identification in a Knowledge-Intensive Firm , 2004 .

[36]  Steve Sawyer,et al.  Surfing the Next Wave: Design and Implementation Challenges of Ubiquitous Computing , 2004, Commun. Assoc. Inf. Syst..

[37]  M. Arnold,et al.  On the phenomenology of technology: the "Janus-faces" of mobile phones , 2003, Inf. Organ..

[38]  Upkar Varshney Mobile and Wireless Information Systems: Applications, Networks, and Research Problems , 2003, Commun. Assoc. Inf. Syst..

[39]  Kalle Lyytinen,et al.  Research Commentary: The Next Wave of Nomadic Computing , 2002, Inf. Syst. Res..

[40]  David Lyon,et al.  Surveillance Studies: understanding visibility, mobility and the phenetic fix. , 2002 .

[41]  C. Sørensen,et al.  Mobility: an extended perspective , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[42]  M. Alvesson,et al.  Identity regulation as organizational control: Producing the appropriate individual , 2002 .

[43]  Sia Siew Kien,et al.  Enterprise resource planning (ERP) systems as a technology of power: empowerment or panoptic control? , 2002, DATB.

[44]  Günter Reiter,et al.  Call for papers Special issue on , 2001 .

[45]  R. Ericson,et al.  The surveillant assemblage. , 2000, The British journal of sociology.

[46]  Lain Munro,et al.  Non-Disciplinary Power and the Network Society , 2000 .

[47]  Geoff Walsham,et al.  Competing Interpretations of Computer-Supported Cooperative Work in Organizational Contexts , 2000 .

[48]  Geoff Walsham,et al.  Competing interpretations of computer supported co-operative work. , 2000 .

[49]  Richard Baskerville,et al.  Investigating Information Systems with Action Research , 1999, Commun. Assoc. Inf. Syst..

[50]  William K. McHenry,et al.  The Russian's federation's Y2K policy: too little, too late? , 1999 .

[51]  G. Sewell The discipline of teams: The control of team-based industrial work through electronic and peer surveillance. , 1998 .

[52]  John M. Jermier Introduction: Critical Perspectives on Organizational Control. , 1998 .

[53]  S. Deetz Discursive Formations, Strategized Subordination and Self-Surveillance , 1998 .

[54]  Jeremy Bentham,et al.  The Panopticon Writings , 1995 .

[55]  Robert G. Eccles,et al.  Improving the Corporate Disclosure Process , 1995 .

[56]  Juliet Webster,et al.  Networks of collaboration or conflict? Electronic data interchange and power in the supply chain , 1995, J. Strateg. Inf. Syst..

[57]  A. Michael Huberman,et al.  An expanded sourcebook qualitative data analysis , 1994 .

[58]  David Lyon,et al.  An Electronic Panopticon? A Sociological Critique of Surveillance Theory , 1993 .

[59]  Barbara Townley,et al.  FOUCAULT, POWER/KNOWLEDGE, AND ITS RELEVANCE FOR HUMAN RESOURCE MANAGEMENT , 1993 .

[60]  G. Sewell,et al.  `Someone to Watch Over Me': Surveillance, Discipline and the Just-in-Time Labour Process , 1992 .

[61]  A. Stinchcombe Information and Organizations , 2019 .

[62]  M. Poster The Mode of Information: Poststructuralism and Social Context , 1990 .

[63]  A. Debons,et al.  The control revolution: Technological and economic origins of the information society , 1990, J. Am. Soc. Inf. Sci..

[64]  Shoshana Zuboff,et al.  Of Mice and Managers@@@In the Age of the Smart Machine: The Future of Work and Power , 1992 .

[65]  M. Foucault The Subject and Power , 1982, Critical Inquiry.

[66]  R. D'amico Discipline and Punish: The Birth of the Prison , 1978, Telos.

[67]  M. Foucault,et al.  Discipline and Punish: The Birth of the Prison. , 1978 .

[68]  M. Foucault Discipline and Punish, Panopticism , 1977 .

[69]  Michael Weir A Thousand Plateaus , 2022 .

[70]  The same applies to differentiating the nature of the many types of risks in outsourcing contracts , 2010 .