메뉴 건너뛰기




Volumn 1, Issue 2, 2003, Pages 152-190

Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives

Author keywords

[No Author keywords available]

Indexed keywords


EID: 2942642938     PISSN: None     EISSN: 14777487     Source Type: Journal    
DOI: 10.24908/ss.v1i2.3351     Document Type: Article
Times cited : (79)

References (58)
  • 1
    • 85029671236 scopus 로고
    • Stories of Mistrust and Manipulation: the Electronic Monitoring of the American Workforce. Cleveland, OH: 9 to 5/WWEF
    • 9 to 5/Working Women Education Fund (1990) Stories of Mistrust and Manipulation: the Electronic Monitoring of the American Workforce. Cleveland, OH: 9 to 5/WWEF.
    • (1990)
  • 2
    • 77956839363 scopus 로고
    • Inequity in social exchange
    • In L. Berkowitz (ed.), New York: Academic Press
    • Adams, J.S. (1965) Inequity in social exchange. In L. Berkowitz (ed.) Advances in Experimental Social Psychology (Vol. 2). New York: Academic Press.
    • (1965) Advances in Experimental Social Psychology , vol.2
    • Adams, J.S.1
  • 3
    • 0032067442 scopus 로고    scopus 로고
    • Ethical issues in electronic performance monitoring: A consideration of deontological and teleological perspectives
    • Alder, G.S. (1998) Ethical issues in electronic performance monitoring: a consideration of deontological and teleological perspectives. Journal of Business Ethics, 17: 729-743.
    • (1998) Journal of Business Ethics , vol.17 , pp. 729-743
    • Alder, G.S.1
  • 4
    • 0000564549 scopus 로고    scopus 로고
    • Electronic performance monitoring: An organizational justice and concertive control perspective
    • Alder, G.S., and P.K. Tompkins, (1997) Electronic performance monitoring: an organizational justice and concertive control perspective. Management Communication Quarterly, 10: 259-288.
    • (1997) Management Communication Quarterly , vol.10 , pp. 259-288
    • Alder, G.S.1    Tompkins, P.K.2
  • 6
    • 84965906323 scopus 로고
    • Privacy: A conceptual analysis
    • Altman, I. (1976) Privacy: a conceptual analysis. Environment and Behavior, 8: 7-29.
    • (1976) Environment and Behavior , vol.8 , pp. 7-29
    • Altman, I.1
  • 7
    • 0000798862 scopus 로고
    • Strategic self-presentation: An overview
    • M. J. Cody and M. L. McLaughlin (eds.), Clevedon, U.K.: Multilingual Matters
    • Arkin, R.M. and J.A. Shepperd, (1989). Strategic self-presentation: an overview. In M. J. Cody and M. L. McLaughlin (eds.) The Psychology of Tactical Communication. Clevedon, U.K.: Multilingual Matters, 175-193.
    • (1989) The Psychology of Tactical Communication , pp. 175-193
    • Arkin, R.M.1    Shepperd, J.A.2
  • 8
    • 3142781073 scopus 로고    scopus 로고
    • Elements of Surveillance: a new framework and future directions
    • Ball, K. (2003 forthcoming) Elements of Surveillance: a new framework and future directions. Information Communication and Society, 5(4).
    • Information Communication and Society , vol.5 , Issue.4
    • Ball, K.1
  • 12
    • 0003038086 scopus 로고
    • Exchange relations and exchange networks: Recent developments in social exchange theory
    • In J. Berger and M. Zelditch, (eds.), Stanford, CA: Stanford University Press
    • Cook, K.S., L.D. Molm, and T. Yamagishi (1993) Exchange relations and exchange networks: recent developments in social exchange theory. In J. Berger and M. Zelditch, (eds.), Theoretical Research Programs: Studies in the Growth of Theory. Stanford, CA: Stanford University Press. 296-322.
    • (1993) Theoretical Research Programs: Studies in the Growth of Theory , pp. 296-322
    • Cook, K.S.1    Molm, L.D.2    Yamagishi, T.3
  • 13
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis, F.D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13: 319-339.
    • (1989) MIS Quarterly , vol.13 , pp. 319-339
    • Davis, F.D.1
  • 14
    • 85029693540 scopus 로고    scopus 로고
    • Do we expect too much of open-street CCTV?
    • Ditton, J. (2000) Do we expect too much of open-street CCTV? CCTV Today, 7(1): 20-24.
    • (2000) CCTV Today , vol.7 , Issue.1 , pp. 20-24
    • Ditton, J.1
  • 15
    • 0003171707 scopus 로고
    • Exchange theory part I: A psychological basis for social exchange
    • In J. Berger, M. Zeldich Jr., and B. Anderson (eds.), Boston: Houghton-Mifflin
    • Emerson, R.M. (1972) Exchange theory part I: a psychological basis for social exchange. In J. Berger, M. Zeldich Jr., and B. Anderson (eds.), Sociological Theories in Progress (v. 2). Boston: Houghton-Mifflin.
    • (1972) Sociological Theories in Progress (V. 2)
    • Emerson, R.M.1
  • 16
    • 85029719893 scopus 로고    scopus 로고
    • Sources and Consequences of Workplace Pressure: Increasing the Risk of Unethical and Illegal Business Practices. Belmont, MA: EOA
    • Ethics Officer Association (1997) Sources and Consequences of Workplace Pressure: Increasing the Risk of Unethical and Illegal Business Practices. Belmont, MA: EOA.
    • (1997)
  • 17
    • 84981434536 scopus 로고
    • A critical evaluation of Altman’s definition of privacy as a dialectical process
    • Foddy, W.H. (1984) A critical evaluation of Altman’s definition of privacy as a dialectical process. Journal for the Theory of Social Behavior, 14: 297-307.
    • (1984) Journal for the Theory of Social Behavior , vol.14 , pp. 297-307
    • Foddy, W.H.1
  • 18
    • 0001661241 scopus 로고
    • A formal theory of social power
    • French, J.R.P. (1956) A formal theory of social power. Psychological Review, 63: 181-194
    • (1956) Psychological Review , vol.63 , pp. 181-194
    • French, J.R.P.1
  • 19
    • 0001774868 scopus 로고
    • Bases of social power
    • In D. Cartwright (ed.), Ann Arbor, MI: University of Michigan
    • French, J.R.P. and B. Raven (1959) Bases of social power. In D. Cartwright (ed.) Studies in Social Power. Ann Arbor, MI: University of Michigan, 150-167.
    • (1959) Studies in Social Power , pp. 150-167
    • French, J.R.P.1    Raven, B.2
  • 20
    • 84857277409 scopus 로고
    • The nature of privacy
    • Garrett, R. (1974) The nature of privacy. Philosophy Today, 89: 421-472.
    • (1974) Philosophy Today , vol.89 , pp. 421-472
    • Garrett, R.1
  • 21
    • 84923486508 scopus 로고
    • Privacy and the limits of law
    • Gavison, R. (1980) Privacy and the limits of law. Yale Law Journal, 89: 421-471.
    • (1980) Yale Law Journal , vol.89 , pp. 421-471
    • Gavison, R.1
  • 22
    • 0242478463 scopus 로고    scopus 로고
    • Internet addiction: Is it just this month’s hand-wringer for worrywarts, or a genuine problem?
    • Greene, R.W. (1998) Internet addiction: is it just this month’s hand-wringer for worrywarts, or a genuine problem? Computerworld, 32(September): 78-79.
    • (1998) Computerworld , vol.32 , pp. 78-79
    • Greene, R.W.1
  • 23
    • 0011531178 scopus 로고    scopus 로고
    • Web-based training yields maximum returns
    • Greengard, S. (1999) Web-based training yields maximum returns. Workforce, 78(2): 95-96.
    • (1999) Workforce , vol.78 , Issue.2 , pp. 95-96
    • Greengard, S.1
  • 24
    • 85029726561 scopus 로고    scopus 로고
    • Pithy answers to important questions: Just what can employers do when it comes to monitoring their employees’ cyber activity?
    • September: 1
    • Grossman, M. (1998) Pithy answers to important questions: just what can employers do when it comes to monitoring their employees’ cyber activity? The Connecticut Law Tribune, 7 September: 1.
    • (1998) The Connecticut Law Tribune , vol.7
    • Grossman, M.1
  • 26
    • 77949663256 scopus 로고    scopus 로고
    • Keeping the Firm’s Network Safe Requires More Than Passwords
    • December: 5
    • Hale, R. (1998) Keeping the Firm’s Network Safe Requires More Than Passwords. New York Law Journal, 28 December: 5.
    • (1998) New York Law Journal , vol.28
    • Hale, R.1
  • 27
    • 84876627790 scopus 로고    scopus 로고
    • Video surveillance presents HR challenges
    • Hatch, D. D. and J.E. Hall (1997). Video surveillance presents HR challenges. Workforce, 76(8): 67.
    • (1997) Workforce , vol.76 , Issue.8 , pp. 67
    • Hatch, D.D.1    Hall, J.E.2
  • 28
    • 0031304419 scopus 로고    scopus 로고
    • Beyond pleasure and pain
    • Higgins, E.T. (1997) Beyond pleasure and pain. American Psychologist, 52(12): 1280-1300.
    • (1997) American Psychologist , vol.52 , Issue.12 , pp. 1280-1300
    • Higgins, E.T.1
  • 29
    • 77956773952 scopus 로고    scopus 로고
    • Promotion and prevention: Regulatory focus as a motivational principle
    • Higgins, E.T. (1998) Promotion and prevention: regulatory focus as a motivational principle. Advances in Experimental Social Psychology, 30: 1-16.
    • (1998) Advances in Experimental Social Psychology , vol.30 , pp. 1-16
    • Higgins, E.T.1
  • 31
    • 85029675865 scopus 로고
    • Workers’ privacy. Part 2: Monitoring and surveillance in the workplace. Geneva: ILO
    • International Labour Office (1993) Workers’ privacy. Part 2: Monitoring and surveillance in the workplace. Geneva: ILO.
    • (1993)
  • 35
    • 4243620095 scopus 로고    scopus 로고
    • Generational development of data protection in Europe
    • In P.E. Agre and M. Rotenberg (eds.), Cambridge, MA: MIT Press
    • Mayer-Schönberger, V. (1999) Generational development of data protection in Europe. In P.E. Agre and M. Rotenberg (eds.) Technology and privacy: The New Landscape. Cambridge, MA: MIT Press. 219-241.
    • (1999) Technology and Privacy: The New Landscape , pp. 219-241
    • Mayer-Schönberger, V.1
  • 36
    • 84928832134 scopus 로고
    • Affect and social exchange: Satisfaction in power dependence relations
    • Molm, L.D. (1991) Affect and social exchange: satisfaction in power dependence relations. American Sociological Review, 56(4): 475-493.
    • (1991) American Sociological Review , vol.56 , Issue.4 , pp. 475-493
    • Molm, L.D.1
  • 37
    • 84937311283 scopus 로고
    • Dependence and risk: Transforming the structure of social exchange
    • Molm, L.D. (1994) Dependence and risk: transforming the structure of social exchange. Social Psychology Quarterly, 57: 163-176.
    • (1994) Social Psychology Quarterly , vol.57 , pp. 163-176
    • Molm, L.D.1
  • 40
    • 84990563923 scopus 로고
    • Communication boundary management: A theoretical model of managing disclosure of private information between marital couples
    • Petronio, S. (1991) Communication boundary management: a theoretical model of managing disclosure of private information between marital couples. Communication Theory, 1: 311-335.
    • (1991) Communication Theory , vol.1 , pp. 311-335
    • Petronio, S.1
  • 41
    • 0002504430 scopus 로고    scopus 로고
    • The virtues (And vices) of virtual colleagues
    • Ross-Flanigan, N. (1998) The virtues (and vices) of virtual colleagues. MIT Technology Review, 101(2): 52-59.
    • (1998) MIT Technology Review , vol.101 , Issue.2 , pp. 52-59
    • Ross-Flanigan, N.1
  • 45
    • 85029697108 scopus 로고
    • Privacy in the Workplace Survey Report. Alexandria, VA: SHRM
    • Society for Human Resource Management (1991) Privacy in the Workplace Survey Report. Alexandria, VA: SHRM.
    • (1991)
  • 46
    • 0010039423 scopus 로고    scopus 로고
    • Validity and related issues in web-based hiring
    • Stanton, J.M. (1998) Validity and related issues in web-based hiring. The Industrial-Organizational Psychologist, 36(3): 69-77.
    • (1998) The Industrial-Organizational Psychologist , vol.36 , Issue.3 , pp. 69-77
    • Stanton, J.M.1
  • 47
    • 33744775216 scopus 로고    scopus 로고
    • Information technology and privacy: A boundary management perspective
    • In S. Clarke, E. Coakes, G. Hunter, and A. Wenn (eds.), London: Idea Group
    • Stanton, J.M. (2002) Information technology and privacy: a boundary management perspective. In S. Clarke, E. Coakes, G. Hunter, and A. Wenn (eds.) Socio-Technical and Human Cognition Elements of Information Systems, London: Idea Group, 79-103.
    • (2002) Socio-Technical and Human Cognition Elements of Information Systems , pp. 79-103
    • Stanton, J.M.1
  • 48
    • 0034229860 scopus 로고    scopus 로고
    • Electronic monitoring in their own words: An exploratory study of employees’ experiences with new types of surveillance
    • Stanton, J.M., and E.M. Weiss (2000) Electronic monitoring in their own words: an exploratory study of employees’ experiences with new types of surveillance. Computers in Human Behavior, 16: 423-440.
    • (2000) Computers in Human Behavior , vol.16 , pp. 423-440
    • Stanton, J.M.1    Weiss, E.M.2
  • 49
    • 84986021390 scopus 로고    scopus 로고
    • Technology and personnel data: Cont rasting the concerns of human resource managers and employees
    • Stanton, J.M., and E.M. Weiss (In Press) Technology and personnel data: Cont rasting the concerns of human resource managers and employees. Behaviour and Information Technology.
    • Behaviour and Information Technology
    • Stanton, J.M.1    Weiss, E.M.2
  • 50
    • 85029676017 scopus 로고    scopus 로고
    • Seeing and hearing evil
    • Steptoe and Johnson (1999) Seeing and hearing evil, West Virginia Employment Law Letter, 4(1).
    • (1999) West Virginia Employment Law Letter , vol.4 , Issue.1
  • 51
    • 0000322208 scopus 로고
    • Privacy in organizations: Theoretical issues, research findings and protection mechanisms
    • Stone, E.F., and D.L. Stone (1990) Privacy in organizations: theoretical issues, research findings and protection mechanisms. Research in Personnel and Human Resources Management, 8: 349-411.
    • (1990) Research in Personnel and Human Resources Management , vol.8 , pp. 349-411
    • Stone, E.F.1    Stone, D.L.2
  • 52
    • 0040687958 scopus 로고
    • Individual privacy and computer-based human resource information systems
    • Taylor, G.S. and J.S. Davis (1989) Individual privacy and computer-based human resource information systems. Journal of Business Ethics, 8: 569-576.
    • (1989) Journal of Business Ethics , vol.8 , pp. 569-576
    • Taylor, G.S.1    Davis, J.S.2
  • 54
    • 0242376581 scopus 로고
    • Health-care reform warrants HRIS updates
    • Thurston, R.J. and J.R. Jones (1994) Health-care reform warrants HRIS updates. Personnel Journal, 73(5): 42-46.
    • (1994) Personnel Journal , vol.73 , Issue.5 , pp. 42-46
    • Thurston, R.J.1    Jones, J.R.2
  • 56
    • 0032399422 scopus 로고    scopus 로고
    • Managers as initiators of trust: An exchange relationship framework for understanding managerial trustworthy behavior
    • Whitener, E.M, S.E. Brodt, M.A Korsgaard and J.M. Werner (1998) Managers as initiators of trust: an exchange relationship framework for understanding managerial trustworthy behavior. Academy of Management Review, 23: 513-530.
    • (1998) Academy of Management Review , vol.23 , pp. 513-530
    • Whitener, E.M.1    Brodt, S.E.2    Korsgaard, M.A.3    Werner, J.M.4
  • 58
    • 85029710568 scopus 로고    scopus 로고
    • Designing and implementing culturally-sensitive IT applications: The interaction of culture values and privacy Issues in the Middle East
    • Zakaria, N., J.M. Stanton and S. Sarkar-Barney, (Accepted for Publication) Designing and implementing culturally-sensitive IT applications: the interaction of culture values and privacy Issues in the Middle East. Information Technology and People.
    • Information Technology and People
    • Zakaria, N.1    Stanton, J.M.2    Sarkar-Barney, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.