Information privacy, gender differences, and intrinsic motivation in the workplace
暂无分享,去创建一个
Jing Ma | Xiaogang Chen | Jiafei Jin | Patricia Fosh | Xiaogang Chen | Jing Ma | Jiafei Jin | P. Fosh
[1] Regina Connolly,et al. Dataveillance: Employee Monitoring & Information Privacy Concerns in the Workplace , 2012, J. Inf. Technol. Res..
[2] Forbes Gibb,et al. International Journal of Information Management , 2022 .
[3] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[4] A. Eagly,et al. Are leader stereotypes masculine? A meta-analysis of three research paradigms. , 2011, Psychological bulletin.
[5] Kennon M. Sheldon,et al. Introduction: The Struggle for Happiness and Autonomy in Cultural and Personal Contexts: An Overview , 2011 .
[6] Yong Lu,et al. Information exchange in virtual communities under extreme disaster conditions , 2011, Decis. Support Syst..
[7] Chang-Wook Jeung,et al. Investigating the influences of core self‐evaluations, job autonomy, and intrinsic motivation on in‐role job performance , 2010 .
[8] Radostina K. Purvanova,et al. Gender differences in burnout: A meta-analysis , 2010 .
[9] M. Rothstein. Is Deidentification Sufficient to Protect Health Privacy in Research? , 2010, The American journal of bioethics : AJOB.
[10] D. Cole,et al. Privacy Functions and Wilderness Recreation: Use Density and Length of Stay Effects on Experience , 2010 .
[11] K. M. Bartol,et al. Linking Empowering Leadership and Employee Creativity: The Influence of Psychological Empowerment, Intrinsic Motivation, and Creative Process Engagement , 2010 .
[12] Christopher P. Niemiec,et al. Self‐Determination Theory and the Relation of Autonomy to Self‐Regulatory Processes and Personality Development , 2010 .
[13] Wynne W. Chin,et al. An Introduction to a Permutation Based Procedure for Multi-Group PLS Analysis: Results of Tests of Differences on Simulated Data and a Cross Cultural Analysis of the Sourcing of Information System Services Between Germany and the USA , 2010 .
[14] Jörg Henseler,et al. PLS-MGA: A Non-Parametric Approach to Partial Least Squares-based Multi-Group Analysis , 2010, GfKl.
[15] William P. Smith,et al. Monitoring Employee E-mails: Is There Any Room for Privacy? , 2009 .
[16] Stefan Weiss,et al. Privacy threat model for data portability in social network applications , 2009, Int. J. Inf. Manag..
[17] Brent A. Scott,et al. PROCEDURAL JUSTICE, INTERACTIONAL JUSTICE, AND TASK PERFORMANCE: THE MEDIATING ROLE OF INTRINSIC MOTIVATION , 2009 .
[18] Eun G. Park,et al. Canadian government agencies develop e-mail management policies , 2008, Int. J. Inf. Manag..
[19] Rachel McLean,et al. International Journal of Information Management the Panoptic Gaze: Analysing the Interaction between Enterprise Resource Planning Technology and Organisational Culture , 2022 .
[20] Frederick Lah. Are IP Addresses "Personally Identifiable Information"? , 2008 .
[21] Nilesh Saraf,et al. IS Application Capabilities and Relational Value in Interfirm Partnerships , 2007, Inf. Syst. Res..
[22] Scott C. D'Urso,et al. Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations , 2006 .
[23] Laurence Ashworth,et al. Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns , 2006 .
[24] Bradley J. Alge,et al. Information privacy in organizations: empowering creative and extrarole performance. , 2006, The Journal of applied psychology.
[25] S. Schwartz,et al. Sex differences in value priorities: cross-cultural and multimethod studies. , 2005, Journal of personality and social psychology.
[26] C. Judd,et al. When moderation is mediated and mediation is moderated. , 2005, Journal of personality and social psychology.
[27] C. Higgins,et al. Are Gender Differences in Basic Human Values a Generational Phenomenon? , 2005 .
[28] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[29] P. Flood,et al. Gender and Employee Attitudes: The Role of Organizational Justice Perceptions , 2004 .
[30] L. F. Barrett,et al. THE ROLE OF AFFECTIVE EXPERIENCE IN WORK MOTIVATION. , 2004, Academy of management review. Academy of Management.
[31] Melanie Wilson,et al. A conceptual framework for studying gender in information systems research , 2004, J. Inf. Technol..
[32] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[33] N. Feather. Value Correlates of Ambivalent Attitudes toward Gender Relations , 2004, Personality & social psychology bulletin.
[34] L. J. Williams,et al. Recent Advances in Causal Modeling Methods for Organizational and Management Research , 2003 .
[35] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[36] Traci Carte,et al. In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..
[37] A. Rustichini,et al. Performance in Competitive Environments: Gender Differences , 2003 .
[38] D. D. Uyl. AUTONOMOUS AUTONOMY: SPINOZA ON AUTONOMY, PERFECTIONISM, AND POLITICS , 2003, Social Philosophy and Policy.
[39] A. Westin. Social and Political Dimensions of Privacy , 2003 .
[40] Dianna L. Stone,et al. Personnel Selection Procedures and Invasion of Privacy , 2003 .
[41] Anastasios Gounaris,et al. Data Base Management Systems (DBMSs): Meeting the requirements of the EU data protection legislation , 2003, Int. J. Inf. Manag..
[42] J. Webster,et al. Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .
[43] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[44] Kai Lung Hui,et al. Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.
[45] S. Schwartz,et al. Extending the Cross-Cultural Validity of the Theory of Basic Human Values with a Different Method of Measurement , 2001 .
[46] Mark Vandenbosch,et al. Research Report: Richness Versus Parsimony in Modeling Technology Adoption Decisions - Understanding Merchant Adoption of a Smart Card-Based Payment System , 2001, Inf. Syst. Res..
[47] R. Vallerand,et al. On the Assessment of Situational Intrinsic and Extrinsic Motivation: The Situational Motivation Scale (SIMS) , 2000 .
[48] K. Sheehan,et al. Dimensions of Privacy Concern among Online Consumers , 2000 .
[49] Sandra J. Milberg,et al. Information Privacy: Corporate Management and National Regulation , 2000 .
[50] E. Deci,et al. Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. , 2000, The American psychologist.
[51] Simon C. K. Wong,et al. The impact of demographic factors on Hong Kong hotel employees’ choice of job‐related motivators , 1999 .
[52] Erik R. Eddy,et al. THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES , 1999 .
[53] Marylène Gagné,et al. Proximal Job Characteristics, Feelings of Empowerment, and Intrinsic Motivation: A Multidimensional Model , 1997 .
[54] D. M. Pedersen. PSYCHOLOGICAL FUNCTIONS OF PRIVACY , 1997 .
[55] H. Jeff Smith,et al. Values, personal information privacy, and regulatory approaches , 1995, CACM.
[56] H. J. Smith,et al. Managing Privacy: Information Technology and Corporate America , 1994 .
[57] R. Bies. Privacy and procedural justice in organizations , 1993 .
[58] Jan-Bernd Lohmöller,et al. Latent Variable Path Modeling with Partial Least Squares , 1989 .
[59] D. Stone,et al. Individuals' attitudes toward organizational drug testing policies and practices. , 1989, The Journal of applied psychology.
[60] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[61] Edward L. Deci,et al. Intrinsic Motivation and Self-Determination in Human Behavior , 1975, Perspectives in Social Psychology.
[62] Paul D. Tolchinsky,et al. A Survey of Employee Perceptions of Information Privacy in Organizations , 1982 .
[63] Paul D. Tolchinsky,et al. Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .
[64] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[65] J. Harackiewicz. The effects of reward contingency and performance feedback on intrinsic motivation. , 1979 .
[66] G. Leventhal. What Should Be Done with Equity Theory? New Approaches to the Study of Fairness in Social Relationships. , 1976 .
[67] I. Altman. A Conceptual Analysis , 1976 .
[68] I. Altman. Privacy: A Conceptual Analysis. , 1976 .
[69] E. Shinar. Sexual Stereotypes of Occupations , 1975 .
[70] M. Rokeach. The Nature Of Human Values , 1974 .
[71] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[72] R. May. Man's Search for Himself , 1953 .