Information privacy, gender differences, and intrinsic motivation in the workplace

[1]  Regina Connolly,et al.  Dataveillance: Employee Monitoring & Information Privacy Concerns in the Workplace , 2012, J. Inf. Technol. Res..

[2]  Forbes Gibb,et al.  International Journal of Information Management , 2022 .

[3]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[4]  A. Eagly,et al.  Are leader stereotypes masculine? A meta-analysis of three research paradigms. , 2011, Psychological bulletin.

[5]  Kennon M. Sheldon,et al.  Introduction: The Struggle for Happiness and Autonomy in Cultural and Personal Contexts: An Overview , 2011 .

[6]  Yong Lu,et al.  Information exchange in virtual communities under extreme disaster conditions , 2011, Decis. Support Syst..

[7]  Chang-Wook Jeung,et al.  Investigating the influences of core self‐evaluations, job autonomy, and intrinsic motivation on in‐role job performance , 2010 .

[8]  Radostina K. Purvanova,et al.  Gender differences in burnout: A meta-analysis , 2010 .

[9]  M. Rothstein Is Deidentification Sufficient to Protect Health Privacy in Research? , 2010, The American journal of bioethics : AJOB.

[10]  D. Cole,et al.  Privacy Functions and Wilderness Recreation: Use Density and Length of Stay Effects on Experience , 2010 .

[11]  K. M. Bartol,et al.  Linking Empowering Leadership and Employee Creativity: The Influence of Psychological Empowerment, Intrinsic Motivation, and Creative Process Engagement , 2010 .

[12]  Christopher P. Niemiec,et al.  Self‐Determination Theory and the Relation of Autonomy to Self‐Regulatory Processes and Personality Development , 2010 .

[13]  Wynne W. Chin,et al.  An Introduction to a Permutation Based Procedure for Multi-Group PLS Analysis: Results of Tests of Differences on Simulated Data and a Cross Cultural Analysis of the Sourcing of Information System Services Between Germany and the USA , 2010 .

[14]  Jörg Henseler,et al.  PLS-MGA: A Non-Parametric Approach to Partial Least Squares-based Multi-Group Analysis , 2010, GfKl.

[15]  William P. Smith,et al.  Monitoring Employee E-mails: Is There Any Room for Privacy? , 2009 .

[16]  Stefan Weiss,et al.  Privacy threat model for data portability in social network applications , 2009, Int. J. Inf. Manag..

[17]  Brent A. Scott,et al.  PROCEDURAL JUSTICE, INTERACTIONAL JUSTICE, AND TASK PERFORMANCE: THE MEDIATING ROLE OF INTRINSIC MOTIVATION , 2009 .

[18]  Eun G. Park,et al.  Canadian government agencies develop e-mail management policies , 2008, Int. J. Inf. Manag..

[19]  Rachel McLean,et al.  International Journal of Information Management the Panoptic Gaze: Analysing the Interaction between Enterprise Resource Planning Technology and Organisational Culture , 2022 .

[20]  Frederick Lah Are IP Addresses "Personally Identifiable Information"? , 2008 .

[21]  Nilesh Saraf,et al.  IS Application Capabilities and Relational Value in Interfirm Partnerships , 2007, Inf. Syst. Res..

[22]  Scott C. D'Urso,et al.  Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations , 2006 .

[23]  Laurence Ashworth,et al.  Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns , 2006 .

[24]  Bradley J. Alge,et al.  Information privacy in organizations: empowering creative and extrarole performance. , 2006, The Journal of applied psychology.

[25]  S. Schwartz,et al.  Sex differences in value priorities: cross-cultural and multimethod studies. , 2005, Journal of personality and social psychology.

[26]  C. Judd,et al.  When moderation is mediated and mediation is moderated. , 2005, Journal of personality and social psychology.

[27]  C. Higgins,et al.  Are Gender Differences in Basic Human Values a Generational Phenomenon? , 2005 .

[28]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[29]  P. Flood,et al.  Gender and Employee Attitudes: The Role of Organizational Justice Perceptions , 2004 .

[30]  L. F. Barrett,et al.  THE ROLE OF AFFECTIVE EXPERIENCE IN WORK MOTIVATION. , 2004, Academy of management review. Academy of Management.

[31]  Melanie Wilson,et al.  A conceptual framework for studying gender in information systems research , 2004, J. Inf. Technol..

[32]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[33]  N. Feather Value Correlates of Ambivalent Attitudes toward Gender Relations , 2004, Personality & social psychology bulletin.

[34]  L. J. Williams,et al.  Recent Advances in Causal Modeling Methods for Organizational and Management Research , 2003 .

[35]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[36]  Traci Carte,et al.  In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..

[37]  A. Rustichini,et al.  Performance in Competitive Environments: Gender Differences , 2003 .

[38]  D. D. Uyl AUTONOMOUS AUTONOMY: SPINOZA ON AUTONOMY, PERFECTIONISM, AND POLITICS , 2003, Social Philosophy and Policy.

[39]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[40]  Dianna L. Stone,et al.  Personnel Selection Procedures and Invasion of Privacy , 2003 .

[41]  Anastasios Gounaris,et al.  Data Base Management Systems (DBMSs): Meeting the requirements of the EU data protection legislation , 2003, Int. J. Inf. Manag..

[42]  J. Webster,et al.  Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .

[43]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[44]  Kai Lung Hui,et al.  Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.

[45]  S. Schwartz,et al.  Extending the Cross-Cultural Validity of the Theory of Basic Human Values with a Different Method of Measurement , 2001 .

[46]  Mark Vandenbosch,et al.  Research Report: Richness Versus Parsimony in Modeling Technology Adoption Decisions - Understanding Merchant Adoption of a Smart Card-Based Payment System , 2001, Inf. Syst. Res..

[47]  R. Vallerand,et al.  On the Assessment of Situational Intrinsic and Extrinsic Motivation: The Situational Motivation Scale (SIMS) , 2000 .

[48]  K. Sheehan,et al.  Dimensions of Privacy Concern among Online Consumers , 2000 .

[49]  Sandra J. Milberg,et al.  Information Privacy: Corporate Management and National Regulation , 2000 .

[50]  E. Deci,et al.  Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. , 2000, The American psychologist.

[51]  Simon C. K. Wong,et al.  The impact of demographic factors on Hong Kong hotel employees’ choice of job‐related motivators , 1999 .

[52]  Erik R. Eddy,et al.  THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES , 1999 .

[53]  Marylène Gagné,et al.  Proximal Job Characteristics, Feelings of Empowerment, and Intrinsic Motivation: A Multidimensional Model , 1997 .

[54]  D. M. Pedersen PSYCHOLOGICAL FUNCTIONS OF PRIVACY , 1997 .

[55]  H. Jeff Smith,et al.  Values, personal information privacy, and regulatory approaches , 1995, CACM.

[56]  H. J. Smith,et al.  Managing Privacy: Information Technology and Corporate America , 1994 .

[57]  R. Bies Privacy and procedural justice in organizations , 1993 .

[58]  Jan-Bernd Lohmöller,et al.  Latent Variable Path Modeling with Partial Least Squares , 1989 .

[59]  D. Stone,et al.  Individuals' attitudes toward organizational drug testing policies and practices. , 1989, The Journal of applied psychology.

[60]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[61]  Edward L. Deci,et al.  Intrinsic Motivation and Self-Determination in Human Behavior , 1975, Perspectives in Social Psychology.

[62]  Paul D. Tolchinsky,et al.  A Survey of Employee Perceptions of Information Privacy in Organizations , 1982 .

[63]  Paul D. Tolchinsky,et al.  Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .

[64]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[65]  J. Harackiewicz The effects of reward contingency and performance feedback on intrinsic motivation. , 1979 .

[66]  G. Leventhal What Should Be Done with Equity Theory? New Approaches to the Study of Fairness in Social Relationships. , 1976 .

[67]  I. Altman A Conceptual Analysis , 1976 .

[68]  I. Altman Privacy: A Conceptual Analysis. , 1976 .

[69]  E. Shinar Sexual Stereotypes of Occupations , 1975 .

[70]  M. Rokeach The Nature Of Human Values , 1974 .

[71]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[72]  R. May Man's Search for Himself , 1953 .