Information technology and privacy: a boundary management perspective
暂无分享,去创建一个
[1] S. Petronio. Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples , 1991 .
[2] Wayne D. Hoyer,et al. Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .
[3] Dianna L. Stone,et al. A multiple stakeholder model of privacy in organizations , 1998 .
[4] R. Lewicki,et al. Trust And Distrust: New Relationships and Realities , 1998 .
[5] R. H. Moorman,et al. A meta‐analytic review and empirical test of the potential confounding effects of social desirability response sets in organizational behaviour research , 1992 .
[6] Elizabeth M. Weiss,et al. Electronic monitoring in their own words: an exploratory study of employees' experiences with new types of surveillance , 2000 .
[7] Jeffrey M. Stanton,et al. Traditional and Electronic Monitoring from an Organizational Justice Perspective , 2000 .
[8] Burke T. Ward,et al. Ethical Management of Employee E-Mail Privacy , 1998, Inf. Syst. Manag..
[9] V. E. Cangelosi,et al. Effects of open versus closed physical environment on employee perception and attitude , 1988 .
[10] Elizabeth Wolfe Morrison,et al. Impression Management in the Feedback-Seeking Process: A Literaturereview and Research Agenda , 1991 .
[11] Judee K. Burgoon,et al. Status and privacy restoring communication in the workplace , 1992 .
[12] G. Leventhal. What Should Be Done with Equity Theory? New Approaches to the Study of Fairness in Social Relationships. , 1976 .
[13] Sandra Petronio,et al. Privacy binds in family interactions: The case of parental privacy invasion. , 1994 .
[14] N. Feather,et al. From values to actions: Recent applications of the expectancy-value model , 1988 .
[15] Hal G. Gueutal,et al. A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .
[16] James O. Benedict,et al. The Relationships between Privacy and Different Components of Job Satisfaction , 1992 .
[17] N. Feather. Values, valences, and choice: The influences of values on the perceived attractiveness and choice of alternatives. , 1995 .
[18] R. Bies. Interactional justice : communication criteria of fairness , 1986 .
[19] Erik R. Eddy,et al. THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES , 1999 .
[20] Robert A. Giacalone,et al. Applied Impression Management: How Image-Making Affects Managerial Decisions , 1991 .
[21] B. Kahin,et al. Borders in Cyberspace: Information Policy and the Global Information Infrastructure , 1996 .
[22] K. Miller,et al. Intrinsic Motivation and Self-Determination in Human Behavior , 1975, Perspectives in Social Psychology.
[23] Fred A. Mael,et al. ‘Don't ask—Please tell’: Selection privacy from two perspectives , 1999 .
[24] R. Bies,et al. The predicament of injustice: The management of moral outrage. , 1987 .
[25] G. Stoney Alder,et al. Electronic Performance Monitoring , 1997 .
[26] Paul E. Spector. Behavior in organizations as a function of employee's locus of control. , 1982 .
[27] David B. Greenberger,et al. Development and Application of a Model of Personal Control in Organizations , 1986 .
[28] W. Kirchner,et al. A note on the effect of privacy in taking typing tests. , 1966, The Journal of applied psychology.
[29] Paul D. Tolchinsky,et al. A Survey of Employee Perceptions of Information Privacy in Organizations , 1982 .
[30] J. Greenberg,et al. The social side of fairness: Interpersonal and informational classes of organizational justice. , 1993 .
[31] R. H. Willis,et al. Social Exchange: Advances In Theory And Research , 1981 .
[32] G. Alder. Ethical Issues in Electronic Performance Monitoring: A Consideration of Deontological and Teleological Perspectives , 1998 .
[33] Laura B. Pincus,et al. THE DISPARITY BETWEEN PUBLIC AND PRIVATE SECTOR EMPLOYEE PRIVACY PROTECTIONS: A CALL FOR LEGITIMATE PRIVACY RIGHTS FOR PRIVATE SECTOR WORKERS , 1995 .
[34] Dianna L. Stone,et al. Effects of missing application-blank information on personnel selection decisions: Do privacy protection strategies bias the outcome? , 1987 .
[35] I. Altman. Privacy: A Conceptual Analysis. , 1976 .