Mine or ours: email privacy expectations, employee attitudes, and perceived work environment characteristics
暂无分享,去创建一个
[1] Jeff Smith,et al. Privacy policies and practices: inside the organizational maze , 1993, CACM.
[2] J CulnanMary. How did they get my name , 1993 .
[3] M. Aiken,et al. Organizational Alienation: A Comparative Analysis , 1966 .
[4] V. Lim. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .
[5] C. Muhl. Workplace E-mail and Internet Use: Employees and Employers Beware. , 2003 .
[6] Clare M. Sproule. The effect of the USA Patriot Act on workplace privacy , 2002 .
[7] Henk Sol,et al. Proceedings of the 54th Hawaii International Conference on System Sciences , 1997, HICSS 2015.
[8] Fred D. Davis,et al. Motivating critical computer systems operators: job characteristics, controls, and relationships , 1997 .
[9] Kenneth A. Kovach,et al. The Balance Between Employee Privacy And Employer Interests , 2000 .
[10] Lee Sproull,et al. Reducing social context cues: electronic mail in organizational communication , 1986 .
[11] J. Rubenfeld. The Right of Privacy , 1989 .
[12] J. Hackman,et al. A New Strategy for Job Enrichment , 1975 .
[13] J. Cappel. A study of individuals' ethical beliefs and perceptions of electronic mail privacy , 1995 .
[14] K. B. DeTienne. Big brother is watching: computer monitoring and communication , 1994 .
[15] Laura P. Hartman. Ethics: The Rights and Wrongs of Workplace Snooping , 1998 .
[16] Brian H. Kleiner,et al. How organisations manage the issue of employee privacy today , 2003 .
[17] Joey F. George,et al. Computer-Based Monitoring: Common Perceptions and Empirical Results , 1996, MIS Q..
[18] Hall Adams,et al. E-Mail Monitoring in the Workplace: The Good, the Bad and the Ugly , 2000 .
[19] Bruce A. Reinig,et al. Managing user perceptions of email privacy , 1995, CACM.
[20] Richard T. Pascale,et al. The Paradox of “Corporate Culture”: Reconciling Ourselves to Socialization , 1985 .
[21] H C Triandis,et al. Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[22] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[23] Brian H. Kleiner,et al. How to monitor electronic mail to discover sexual harassment , 2000 .
[24] Marlene E. Turner,et al. The Organizational Behavior Reader , 1991 .
[25] Alan D. Smith,et al. E-Mail Workplace Privacy Issues in an Information-And Knowledge-Based Environment , 2001 .
[26] Magid Igbaria,et al. Development of a Measure of Personal Web Usage in the Workplace , 2004, Cyberpsychology Behav. Soc. Netw..
[27] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[28] Kirsten E. Martin,et al. Some Problems with Employee Monitoring , 2003 .
[29] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[30] Maggie Johnson,et al. Putting out the flames: the etiquette and law of e-mail , 1991 .
[31] G. Hofstede. Motivation, leadership, and organization: Do American theories apply abroad? , 1980 .
[32] L. Porter,et al. The Measurement of Organizational Commitment. , 1979 .
[33] John Weckert,et al. Privacy, the Workplace and the Internet , 1999, WebNet.
[34] Raymond A. Katzell,et al. Work motivation: Theory and practice. , 1990 .
[35] JoAnn Greco. PRIVACY WHOSE RIGHT IS IT ANYHOW , 2001 .
[36] J Willwerth,et al. "Hello? I'm home alone ..." Up to 10 million U.S. children are latchkey kids; hot lines are helping them battle fear and loneliness. , 1993, Time.