Mobile information systems and organisational control: beyond the panopticon metaphor?
暂无分享,去创建一个
Henri Isaac | Michel Kalika | Aurélie Leclercq-Vandelannoitte | M. Kalika | Aurélie Leclercq-Vandelannoitte | Henri Isaac
[1] Luca Vogt. The Mode Of Information , 2016 .
[2] Melissa Mazmanian. Avoiding the Trap of Constant Connectivity: When Congruent Frames Allow for Heterogeneous Practices , 2013 .
[3] Ellie Harmon,et al. Stories of the Smartphone in everyday discourse: conflict, tension & instability , 2013, CHI.
[4] JoAnne Yates,et al. The Autonomy Paradox: The Implications of Mobile Email Devices for Knowledge Professionals , 2013, Organ. Sci..
[5] Alan D. Schrift,et al. Discipline and Punish , 2013 .
[6] Aurélie Leclercq-Vandelannoitte,et al. Beyond Panoptic Enclosures? On the Spatiotemporal Dimension of Organizational Control as Induced by Mobile Information Systems , 2013 .
[7] Andrea Carugati,et al. On the Dimensions of Technological Control , 2012 .
[8] Alexandra Michel,et al. Transcending Socialization , 2011 .
[9] A. Doyle. Revisiting the synopticon: Reconsidering Mathiesen’s ‘The Viewer Society’ in the age of Web 2.0 , 2011 .
[10] Stephen R. Barley,et al. E-mail as a Source and Symbol of Stress , 2011, Organ. Sci..
[11] Yves Gendron,et al. Beyond panopticism: On the ramifications of surveillance in a contemporary professional setting , 2011 .
[12] Daniel E. Martinez. Beyond disciplinary enclosures: Management control in the society of control , 2011 .
[13] Martin De Saulles,et al. The portable panopticon: morality and mobile technologies , 2011, J. Inf. Commun. Ethics Soc..
[14] Donald Hislop,et al. Mobile phones during work and non-work time: A case study of mobile, non-managerial workers , 2011, Inf. Organ..
[15] Gilbert Caluya. The post-panoptic society? Reassessing Foucault in surveillance studies , 2010 .
[16] Izak Benbasat,et al. Information about information: a taxonomy of views , 2010 .
[17] John Roberts,et al. No-one is perfect: the limits of transparency and an ethic for ‘intelligent’ accountability , 2009 .
[18] D. Lyon. Surveillance Studies: An Overview , 2007 .
[19] Melissa Mazmanian,et al. UBIQUITOUS EMAIL: INDIVIDUAL EXPERIENCES AND ORGANIZATIONAL CONSEQUENCES OF BLACKBERRY USE. , 2006 .
[20] Ojelanki K. Ngwenyama,et al. Contextual influences on user satisfaction with mobile computing: findings from two healthcare organizations , 2006, Eur. J. Inf. Syst..
[21] Wendy L. Cukier,et al. Is mobile email functional or dysfunctional? Two perspectives on mobile email usage , 2006, Eur. J. Inf. Syst..
[22] Carsten Sørensen,et al. The dynamics of control and mobile computing in distributed activities , 2006, Eur. J. Inf. Syst..
[23] Athanasia Pouloudi,et al. Enacting new temporal boundaries: the role of mobile phones , 2006, Eur. J. Inf. Syst..
[24] Iris A. Junglas,et al. Introduction to the special issue on mobile user behaviour , 2006, Eur. J. Inf. Syst..
[25] Geoff Walsham,et al. Doing interpretive research , 2006, Eur. J. Inf. Syst..
[26] Sirkka L. Jarvenpaa,et al. Managing the Paradoxes of Mobile Technology , 2005, Inf. Syst. Manag..
[27] Jannis Kallinikos,et al. The order of technology: Complexity and control in a connected world , 2005, Inf. Organ..
[28] Daniel Robey,et al. Human agency in a wireless world: Patterns of technology use in nomadic computing environments , 2005, Inf. Organ..
[29] Rikard Lindgren,et al. Multi-contextuality in ubiquitous computing: Investigating the car case through action research , 2005, Inf. Organ..
[30] Diane M. Strong,et al. Panoptic empowerment and reflective conformity in enterprise systems-enabled organizations , 2005, Inf. Organ..
[31] JoAnne Yates,et al. CrackBerries: The Social Implications of Ubiquitous Wireless E-Mail Devices , 2005, Designing Ubiquitous Information Environments.
[32] John Weckert. Electronic monitoring in the workplace: controversies and solutions , 2004 .
[33] P. Zarifian. Contrôle des engagements et productivité sociale , 2004 .
[34] L. Willcocks,et al. Social theory and philosophy for information systems , 2004 .
[35] Mats Alvesson,et al. Cages in Tandem: Management Control, Social Identity, and Identification in a Knowledge-Intensive Firm , 2004 .
[36] Steve Sawyer,et al. Surfing the Next Wave: Design and Implementation Challenges of Ubiquitous Computing , 2004, Commun. Assoc. Inf. Syst..
[37] M. Arnold,et al. On the phenomenology of technology: the "Janus-faces" of mobile phones , 2003, Inf. Organ..
[38] Upkar Varshney. Mobile and Wireless Information Systems: Applications, Networks, and Research Problems , 2003, Commun. Assoc. Inf. Syst..
[39] Kalle Lyytinen,et al. Research Commentary: The Next Wave of Nomadic Computing , 2002, Inf. Syst. Res..
[40] David Lyon,et al. Surveillance Studies: understanding visibility, mobility and the phenetic fix. , 2002 .
[41] C. Sørensen,et al. Mobility: an extended perspective , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[42] M. Alvesson,et al. Identity regulation as organizational control: Producing the appropriate individual , 2002 .
[43] Sia Siew Kien,et al. Enterprise resource planning (ERP) systems as a technology of power: empowerment or panoptic control? , 2002, DATB.
[44] Günter Reiter,et al. Call for papers Special issue on , 2001 .
[45] R. Ericson,et al. The surveillant assemblage. , 2000, The British journal of sociology.
[46] Lain Munro,et al. Non-Disciplinary Power and the Network Society , 2000 .
[47] Geoff Walsham,et al. Competing Interpretations of Computer-Supported Cooperative Work in Organizational Contexts , 2000 .
[48] Geoff Walsham,et al. Competing interpretations of computer supported co-operative work. , 2000 .
[49] Richard Baskerville,et al. Investigating Information Systems with Action Research , 1999, Commun. Assoc. Inf. Syst..
[50] William K. McHenry,et al. The Russian's federation's Y2K policy: too little, too late? , 1999 .
[51] G. Sewell. The discipline of teams: The control of team-based industrial work through electronic and peer surveillance. , 1998 .
[52] John M. Jermier. Introduction: Critical Perspectives on Organizational Control. , 1998 .
[53] S. Deetz. Discursive Formations, Strategized Subordination and Self-Surveillance , 1998 .
[54] Jeremy Bentham,et al. The Panopticon Writings , 1995 .
[55] Robert G. Eccles,et al. Improving the Corporate Disclosure Process , 1995 .
[56] Juliet Webster,et al. Networks of collaboration or conflict? Electronic data interchange and power in the supply chain , 1995, J. Strateg. Inf. Syst..
[57] A. Michael Huberman,et al. An expanded sourcebook qualitative data analysis , 1994 .
[58] David Lyon,et al. An Electronic Panopticon? A Sociological Critique of Surveillance Theory , 1993 .
[59] Barbara Townley,et al. FOUCAULT, POWER/KNOWLEDGE, AND ITS RELEVANCE FOR HUMAN RESOURCE MANAGEMENT , 1993 .
[60] G. Sewell,et al. `Someone to Watch Over Me': Surveillance, Discipline and the Just-in-Time Labour Process , 1992 .
[61] A. Stinchcombe. Information and Organizations , 2019 .
[62] M. Poster. The Mode of Information: Poststructuralism and Social Context , 1990 .
[63] A. Debons,et al. The control revolution: Technological and economic origins of the information society , 1990, J. Am. Soc. Inf. Sci..
[64] Shoshana Zuboff,et al. Of Mice and Managers@@@In the Age of the Smart Machine: The Future of Work and Power , 1992 .
[65] M. Foucault. The Subject and Power , 1982, Critical Inquiry.
[66] R. D'amico. Discipline and Punish: The Birth of the Prison , 1978, Telos.
[67] M. Foucault,et al. Discipline and Punish: The Birth of the Prison. , 1978 .
[68] M. Foucault. Discipline and Punish, Panopticism , 1977 .
[69] Michael Weir. A Thousand Plateaus , 2022 .
[70] The same applies to differentiating the nature of the many types of risks in outsourcing contracts , 2010 .