Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange perspectives.
暂无分享,去创建一个
[1] Andrew Clement,et al. Considering privacy in the development of multi-media communications , 1993, Computer Supported Cooperative Work.
[2] Dianna L. Stone,et al. Personnel Selection Procedures and Invasion of Privacy , 2003 .
[3] Norhayati Zakaria,et al. Designing and implementing culturally-sensitive IT applications: The interaction of culture values and privacy issues in the Middle East , 2003, Inf. Technol. People.
[4] Jeffrey M. Stanton,et al. Information technology and privacy: a boundary management perspective , 2003 .
[5] Kirstie Ball,et al. Surveillance Society: Monitoring Everyday Life , 2001 .
[6] Joel Brockner,et al. Regulatory Focus Theory: Implications for the Study of Emotions at Work , 2001 .
[7] R. Ericson,et al. The surveillant assemblage. , 2000, The British journal of sociology.
[8] R. Sabatelli. The Social Psychology of Groups , 2000 .
[9] Elizabeth M. Weiss,et al. Electronic monitoring in their own words: an exploratory study of employees' experiences with new types of surveillance , 2000 .
[10] Virginia W. Kupritz. PRIVACY IN THE WORK PLACE: THE IMPACT OF BUILDING DESIGN , 1998 .
[11] David Preston,et al. Business ethics and privacy in the workplace , 1998, CSOC.
[12] Gary T. Marx,et al. An Ethics For The New Surveillance , 1998, Inf. Soc..
[13] Jon M. Werner,et al. Managers as Initiators of Trust: An Exchange Relationship Framework for Understanding Managerial Trustworthy Behavior , 1998 .
[14] Amanda E. Mujica,et al. Sources and Consequences of Workplace Pressure: Increasing the Risk of Unethical and Illegal Business Practices , 1998 .
[15] G. Alder. Ethical Issues in Electronic Performance Monitoring: A Consideration of Deontological and Teleological Perspectives , 1998 .
[16] Rob Kling,et al. Human centered systems in the perspective of organizational and social informatics , 1998, CSOC.
[17] P. Agre,et al. Technology and privacy: The new landscape , 1998 .
[18] E. Higgins. Promotion and Prevention: Regulatory Focus as A Motivational Principle , 1998 .
[19] Nancy Ross-Flanigan. THE VIRTUES (AND VICES) OF VIRTUAL COLLEAGUES , 1998 .
[20] Burke T. Ward,et al. Ethical Management of Employee E-Mail Privacy , 1998, Inf. Syst. Manag..
[21] Erik R. Eddy,et al. THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES , 1999 .
[22] E. Higgins,et al. Beyond pleasure and pain. , 1997, The American psychologist.
[23] Chun-Yen Chang. Using computer simulation to manage the crowding problem in parks: a study , 1997 .
[24] D. M. Pedersen. PSYCHOLOGICAL FUNCTIONS OF PRIVACY , 1997 .
[25] G. Stoney Alder,et al. Electronic Performance Monitoring , 1997 .
[26] Viktor Mayer-Schönberger,et al. Generational development of data protection in Europe , 1997 .
[27] R. Kling. Computerization and Controversy , 1997 .
[28] Madison Powers,et al. A cognitive access definition of privacy , 1996 .
[29] Jeffrey M. Stanton,et al. Effects of electronic performance monitoring on personal control, task satisfaction, and task performance , 1996 .
[30] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[31] Gary T. Marx,et al. The Case of the Omniscient Organization , 1995, Computerization and Controversy, 2nd Ed..
[32] Ina Wagner. Confronting Ethical Issues of Systems Design in a Web of Social Relationships , 1996, Computerization and Controversy, 2nd Ed..
[33] Rob Kling,et al. Beyond Outlaws, Hackers, and Pirates: Ethical Issues in the Work of Information and Computer Science Professionals , 1995, Computerization and Controversy, 2nd Ed..
[34] Andrew Clement. Considering Privacy in the Development of Multimedia Communications , 1996, Computerization and Controversy, 2nd Ed..
[35] Janice C. Sipior,et al. The ethical and legal quandary of email privacy , 1995, CACM.
[36] H. Jeff Smith,et al. Values, personal information privacy, and regulatory approaches , 1995, CACM.
[37] Laura B. Pincus,et al. THE DISPARITY BETWEEN PUBLIC AND PRIVATE SECTOR EMPLOYEE PRIVACY PROTECTIONS: A CALL FOR LEGITIMATE PRIVACY RIGHTS FOR PRIVATE SECTOR WORKERS , 1995 .
[38] Jusanne M. Vest,et al. Factors Influencing Managerial Disclosure of AIDS Health Information to Coworkers , 1995 .
[39] Patricia Brierley Newell. Perspectives on privacy , 1995 .
[40] B. Tepper,et al. Does the Experience of Organizational Justice Mitigate the Invasion of Privacy Engendered by Random Drug Testing? An Empirical Investigation , 1995 .
[41] S. Hawk. The effects of computerized performance monitoring: An ethical perspective , 1994 .
[42] Linda D. Molm,et al. Dependence and risk: transforming the structure of social exchange , 1994 .
[43] J. Berger,et al. Theoretical Research Programs: Studies in the Growth of Theory , 1994 .
[44] R. Kraut. Predicting the use of technology: the case of telework , 1994 .
[45] Christopher A. Higgins,et al. Computerized performance monitors: are they costing you customers? , 1994 .
[46] Anita L. Vangelisti,et al. Family Secrets: Forms, Functions and Correlates , 1994 .
[47] A. Rüstemli,et al. Privacy Dimensions and Preferences Among Turkish Students , 1993 .
[48] Jeff Smith,et al. Privacy policies and practices: inside the organizational maze , 1993, CACM.
[49] B. Frey. Does Monitoring Increase Work Effort? The Rivalry with Trust and Loyalty , 1993 .
[50] Lainie Friedman Ross,et al. Privacy, Intimacy and Isolation , 1993 .
[51] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[52] Rob Kling,et al. Organizational Analysis in Computer Science , 1993, Inf. Soc..
[53] Russell Cropanzano,et al. Justice in the workplace: Approaching fairness in human resource management. , 1993 .
[54] J. Greenberg,et al. The social side of fairness: Interpersonal and informational classes of organizational justice. , 1993 .
[55] Judee K. Burgoon,et al. Status and privacy restoring communication in the workplace , 1992 .
[56] James O. Benedict,et al. The Relationships between Privacy and Different Components of Job Satisfaction , 1992 .
[57] A. Westin,et al. Two key factors that belong in a macroergonomic analysis of electronic monitoring: Employee perceptions of fairness and the climate of organizational trust or distrust. , 1992, Applied ergonomics.
[58] S. Petronio. Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples , 1991 .
[59] Linda D. Molm,et al. Affect and Social Exchange: Satisfaction in Power-Dependence Relations , 1991 .
[60] Richard Bugg,et al. Research note: Functions of privacy in Australian wilderness environments , 1991 .
[61] Margaret McLaughlin,et al. The psychology of tactical communication. , 1990 .
[62] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[63] G. S. Taylor,et al. Individual privacy and computer-based human resource information systems , 1989 .
[64] D. Stone,et al. Individuals' attitudes toward organizational drug testing policies and practices. , 1989, The Journal of applied psychology.
[65] J. Rubenfeld. The Right of Privacy , 1989 .
[66] William E. Hammitt,et al. Cognitive dimensions of wilderness privacy: a field test and further explanation. , 1989 .
[67] Pelle Ehn,et al. Work-oriented design of computer artifacts , 1989 .
[68] S Klitzman,et al. The impact of the physical environment on the psychological well-being of office workers. , 1989, Social science & medicine.
[69] J. W. DeCew,et al. Uneasy Access: Privacy for Women in a Free Society , 1988 .
[70] T. Tyler,et al. The Social Psychology of Procedural Justice , 1988 .
[71] J. Greenberg. Using diaries to promote procedural justice in performance appraisals , 1987 .
[72] Paul Attewell,et al. Big brother and the sweatshop: computer surveillance in the automated office , 1987 .
[73] Dianna L. Stone,et al. Effects of missing application-blank information on personnel selection decisions: Do privacy protection strategies bias the outcome? , 1987 .
[74] Warren Freedman. The right of privacy in the computer age , 1987 .
[75] Jerald Greenberg,et al. Determinants of Perceived Fairness of Performance Evaluations , 1986 .
[76] D. Stone. Relationship between Introversion/Extraversion, Values regarding Control over Information, and Perceptions of Invasion of Privacy , 1986 .
[77] J. Greenberg,et al. The Distributive Justice of Organizational Performance Evaluations , 1986 .
[78] P Adler,et al. Employee privacy: legal and research developments and implications for personnel administration. , 1985, Sloan management review.
[79] Paul Attewell,et al. Computing and organizations: what we know and what we don't know , 1984, CACM.
[80] William L. Prosser. Philosophical Dimensions of Privacy: Privacy [a legal analysis] , 1984 .
[81] W. Foddy. A Critical Evaluation of Altman's Definition of Privacy as a Dialectical Process , 1984 .
[82] Samuel D. Warren,et al. Philosophical Dimensions of Privacy: The right to privacy [the implicit made explicit] , 1984 .
[83] William E. Hammitt,et al. Functions of privacy in wilderness environments , 1984 .
[84] Hal G. Gueutal,et al. A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .
[85] Paul D. Tolchinsky,et al. A Survey of Employee Perceptions of Information Privacy in Organizations , 1982 .
[86] W. Hammitt. Cognitive Dimensions of Wilderness Solitude , 1982 .
[87] S. Birnbaum,et al. The politics of privacy: Planning for personal data systems as powerful technologies , 1982, Proceedings of the IEEE.
[88] D. Mcadam. The Politics of Privacy: Planning for Personal Data Systems as Powerful Technologies , 1981 .
[89] Paul D. Tolchinsky,et al. Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .
[90] I. Altman,et al. Dialectic Conceptions In Social Psychology: An Application To Social Penetration And Privacy Regulation , 1981 .
[91] Wayne D. Hoyer,et al. Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .
[92] O. Iwata. TERRITORIALITY ORIENTATION, PRIVACY ORIENTATION AND LOCUS OF CONTROL AS DETERMINANTS OF THE PERCEPTION OF CROWDING , 1980 .
[93] R. Gavison. Privacy and the Limits of Law , 1980 .
[94] Virginia E. Schein,et al. Individual Privacy and Personnel Psychology: The Need for a Broader Perspective , 1977 .
[95] F. M. Hoylman. THE EFFECT OF PERSONAL CONTROL AND INSTRUMENTAL VALUE ON THE EXPERIENCE OF INVASION OF PRIVACY. , 1976 .
[96] I. Altman. Privacy: A Conceptual Analysis. , 1976 .
[97] Louis Henkin,et al. Privacy and Autonomy , 1974 .
[98] R. Garrett. The Nature of Privacy , 1974 .
[99] N. J. Marshall. DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.
[100] B. Schwartz. The Social Psychology of Privacy , 1968, American Journal of Sociology.
[101] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[102] W. Kirchner,et al. A note on the effect of privacy in taking typing tests. , 1966, The Journal of applied psychology.
[103] H. Simon,et al. The shape of automation for men and management , 1965 .
[104] J. S. Adams,et al. Inequity In Social Exchange , 1965 .
[105] E. Goffman. Behavior in public places : notes on the social organization of gatherings , 1964 .
[106] P. Blau. Exchange and Power in Social Life , 1964 .
[107] Dorwin Cartwright,et al. Studies in Social Power. , 1960 .
[108] J. R. French,et al. The bases of social power. , 1959 .
[109] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[110] L. Strickland. Surveillance and trust1 , 1958 .
[111] G. C. Homans,et al. Social Behavior as Exchange , 1958, American Journal of Sociology.
[112] L. Strickland. Surveillance and trust. , 1958, Journal of personality.
[113] J. French,et al. A formal theory of social power. , 1956, Psychological review.
[114] Louis D. Brandeis,et al. The Right to Privacy , 1890 .