-
1
-
-
85029671236
-
-
Stories of Mistrust and Manipulation: the Electronic Monitoring of the American Workforce. Cleveland, OH: 9 to 5/WWEF
-
9 to 5/Working Women Education Fund (1990) Stories of Mistrust and Manipulation: the Electronic Monitoring of the American Workforce. Cleveland, OH: 9 to 5/WWEF.
-
(1990)
-
-
-
2
-
-
77956839363
-
Inequity in social exchange
-
In L. Berkowitz (ed.), New York: Academic Press
-
Adams, J.S. (1965) Inequity in social exchange. In L. Berkowitz (ed.) Advances in Experimental Social Psychology (Vol. 2). New York: Academic Press.
-
(1965)
Advances in Experimental Social Psychology
, vol.2
-
-
Adams, J.S.1
-
3
-
-
0032067442
-
Ethical issues in electronic performance monitoring: A consideration of deontological and teleological perspectives
-
Alder, G.S. (1998) Ethical issues in electronic performance monitoring: a consideration of deontological and teleological perspectives. Journal of Business Ethics, 17: 729-743.
-
(1998)
Journal of Business Ethics
, vol.17
, pp. 729-743
-
-
Alder, G.S.1
-
4
-
-
0000564549
-
Electronic performance monitoring: An organizational justice and concertive control perspective
-
Alder, G.S., and P.K. Tompkins, (1997) Electronic performance monitoring: an organizational justice and concertive control perspective. Management Communication Quarterly, 10: 259-288.
-
(1997)
Management Communication Quarterly
, vol.10
, pp. 259-288
-
-
Alder, G.S.1
Tompkins, P.K.2
-
6
-
-
84965906323
-
Privacy: A conceptual analysis
-
Altman, I. (1976) Privacy: a conceptual analysis. Environment and Behavior, 8: 7-29.
-
(1976)
Environment and Behavior
, vol.8
, pp. 7-29
-
-
Altman, I.1
-
7
-
-
0000798862
-
Strategic self-presentation: An overview
-
M. J. Cody and M. L. McLaughlin (eds.), Clevedon, U.K.: Multilingual Matters
-
Arkin, R.M. and J.A. Shepperd, (1989). Strategic self-presentation: an overview. In M. J. Cody and M. L. McLaughlin (eds.) The Psychology of Tactical Communication. Clevedon, U.K.: Multilingual Matters, 175-193.
-
(1989)
The Psychology of Tactical Communication
, pp. 175-193
-
-
Arkin, R.M.1
Shepperd, J.A.2
-
8
-
-
3142781073
-
Elements of Surveillance: a new framework and future directions
-
Ball, K. (2003 forthcoming) Elements of Surveillance: a new framework and future directions. Information Communication and Society, 5(4).
-
Information Communication and Society
, vol.5
, Issue.4
-
-
Ball, K.1
-
12
-
-
0003038086
-
Exchange relations and exchange networks: Recent developments in social exchange theory
-
In J. Berger and M. Zelditch, (eds.), Stanford, CA: Stanford University Press
-
Cook, K.S., L.D. Molm, and T. Yamagishi (1993) Exchange relations and exchange networks: recent developments in social exchange theory. In J. Berger and M. Zelditch, (eds.), Theoretical Research Programs: Studies in the Growth of Theory. Stanford, CA: Stanford University Press. 296-322.
-
(1993)
Theoretical Research Programs: Studies in the Growth of Theory
, pp. 296-322
-
-
Cook, K.S.1
Molm, L.D.2
Yamagishi, T.3
-
13
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis, F.D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13: 319-339.
-
(1989)
MIS Quarterly
, vol.13
, pp. 319-339
-
-
Davis, F.D.1
-
14
-
-
85029693540
-
Do we expect too much of open-street CCTV?
-
Ditton, J. (2000) Do we expect too much of open-street CCTV? CCTV Today, 7(1): 20-24.
-
(2000)
CCTV Today
, vol.7
, Issue.1
, pp. 20-24
-
-
Ditton, J.1
-
15
-
-
0003171707
-
Exchange theory part I: A psychological basis for social exchange
-
In J. Berger, M. Zeldich Jr., and B. Anderson (eds.), Boston: Houghton-Mifflin
-
Emerson, R.M. (1972) Exchange theory part I: a psychological basis for social exchange. In J. Berger, M. Zeldich Jr., and B. Anderson (eds.), Sociological Theories in Progress (v. 2). Boston: Houghton-Mifflin.
-
(1972)
Sociological Theories in Progress (V. 2)
-
-
Emerson, R.M.1
-
16
-
-
85029719893
-
-
Sources and Consequences of Workplace Pressure: Increasing the Risk of Unethical and Illegal Business Practices. Belmont, MA: EOA
-
Ethics Officer Association (1997) Sources and Consequences of Workplace Pressure: Increasing the Risk of Unethical and Illegal Business Practices. Belmont, MA: EOA.
-
(1997)
-
-
-
17
-
-
84981434536
-
A critical evaluation of Altman’s definition of privacy as a dialectical process
-
Foddy, W.H. (1984) A critical evaluation of Altman’s definition of privacy as a dialectical process. Journal for the Theory of Social Behavior, 14: 297-307.
-
(1984)
Journal for the Theory of Social Behavior
, vol.14
, pp. 297-307
-
-
Foddy, W.H.1
-
18
-
-
0001661241
-
A formal theory of social power
-
French, J.R.P. (1956) A formal theory of social power. Psychological Review, 63: 181-194
-
(1956)
Psychological Review
, vol.63
, pp. 181-194
-
-
French, J.R.P.1
-
19
-
-
0001774868
-
Bases of social power
-
In D. Cartwright (ed.), Ann Arbor, MI: University of Michigan
-
French, J.R.P. and B. Raven (1959) Bases of social power. In D. Cartwright (ed.) Studies in Social Power. Ann Arbor, MI: University of Michigan, 150-167.
-
(1959)
Studies in Social Power
, pp. 150-167
-
-
French, J.R.P.1
Raven, B.2
-
20
-
-
84857277409
-
The nature of privacy
-
Garrett, R. (1974) The nature of privacy. Philosophy Today, 89: 421-472.
-
(1974)
Philosophy Today
, vol.89
, pp. 421-472
-
-
Garrett, R.1
-
21
-
-
84923486508
-
Privacy and the limits of law
-
Gavison, R. (1980) Privacy and the limits of law. Yale Law Journal, 89: 421-471.
-
(1980)
Yale Law Journal
, vol.89
, pp. 421-471
-
-
Gavison, R.1
-
22
-
-
0242478463
-
Internet addiction: Is it just this month’s hand-wringer for worrywarts, or a genuine problem?
-
Greene, R.W. (1998) Internet addiction: is it just this month’s hand-wringer for worrywarts, or a genuine problem? Computerworld, 32(September): 78-79.
-
(1998)
Computerworld
, vol.32
, pp. 78-79
-
-
Greene, R.W.1
-
23
-
-
0011531178
-
Web-based training yields maximum returns
-
Greengard, S. (1999) Web-based training yields maximum returns. Workforce, 78(2): 95-96.
-
(1999)
Workforce
, vol.78
, Issue.2
, pp. 95-96
-
-
Greengard, S.1
-
24
-
-
85029726561
-
Pithy answers to important questions: Just what can employers do when it comes to monitoring their employees’ cyber activity?
-
September: 1
-
Grossman, M. (1998) Pithy answers to important questions: just what can employers do when it comes to monitoring their employees’ cyber activity? The Connecticut Law Tribune, 7 September: 1.
-
(1998)
The Connecticut Law Tribune
, vol.7
-
-
Grossman, M.1
-
26
-
-
77949663256
-
Keeping the Firm’s Network Safe Requires More Than Passwords
-
December: 5
-
Hale, R. (1998) Keeping the Firm’s Network Safe Requires More Than Passwords. New York Law Journal, 28 December: 5.
-
(1998)
New York Law Journal
, vol.28
-
-
Hale, R.1
-
27
-
-
84876627790
-
Video surveillance presents HR challenges
-
Hatch, D. D. and J.E. Hall (1997). Video surveillance presents HR challenges. Workforce, 76(8): 67.
-
(1997)
Workforce
, vol.76
, Issue.8
, pp. 67
-
-
Hatch, D.D.1
Hall, J.E.2
-
28
-
-
0031304419
-
Beyond pleasure and pain
-
Higgins, E.T. (1997) Beyond pleasure and pain. American Psychologist, 52(12): 1280-1300.
-
(1997)
American Psychologist
, vol.52
, Issue.12
, pp. 1280-1300
-
-
Higgins, E.T.1
-
29
-
-
77956773952
-
Promotion and prevention: Regulatory focus as a motivational principle
-
Higgins, E.T. (1998) Promotion and prevention: regulatory focus as a motivational principle. Advances in Experimental Social Psychology, 30: 1-16.
-
(1998)
Advances in Experimental Social Psychology
, vol.30
, pp. 1-16
-
-
Higgins, E.T.1
-
31
-
-
85029675865
-
-
Workers’ privacy. Part 2: Monitoring and surveillance in the workplace. Geneva: ILO
-
International Labour Office (1993) Workers’ privacy. Part 2: Monitoring and surveillance in the workplace. Geneva: ILO.
-
(1993)
-
-
-
34
-
-
0003251302
-
-
Marx, G.T., J. Moderow, S. Zuboff, B. Howard, and K. Nussbaum (1990) The case of the omniscient organization. Harvard Business Review, 68(2):12-30.
-
(1990)
The Case of the Omniscient Organization. Harvard Business Review
, vol.68
, Issue.2
, pp. 12-30
-
-
Marx, G.T.1
Moderow, J.2
Zuboff, S.3
Howard, B.4
Nussbaum, K.5
-
35
-
-
4243620095
-
Generational development of data protection in Europe
-
In P.E. Agre and M. Rotenberg (eds.), Cambridge, MA: MIT Press
-
Mayer-Schönberger, V. (1999) Generational development of data protection in Europe. In P.E. Agre and M. Rotenberg (eds.) Technology and privacy: The New Landscape. Cambridge, MA: MIT Press. 219-241.
-
(1999)
Technology and Privacy: The New Landscape
, pp. 219-241
-
-
Mayer-Schönberger, V.1
-
36
-
-
84928832134
-
Affect and social exchange: Satisfaction in power dependence relations
-
Molm, L.D. (1991) Affect and social exchange: satisfaction in power dependence relations. American Sociological Review, 56(4): 475-493.
-
(1991)
American Sociological Review
, vol.56
, Issue.4
, pp. 475-493
-
-
Molm, L.D.1
-
37
-
-
84937311283
-
Dependence and risk: Transforming the structure of social exchange
-
Molm, L.D. (1994) Dependence and risk: transforming the structure of social exchange. Social Psychology Quarterly, 57: 163-176.
-
(1994)
Social Psychology Quarterly
, vol.57
, pp. 163-176
-
-
Molm, L.D.1
-
40
-
-
84990563923
-
Communication boundary management: A theoretical model of managing disclosure of private information between marital couples
-
Petronio, S. (1991) Communication boundary management: a theoretical model of managing disclosure of private information between marital couples. Communication Theory, 1: 311-335.
-
(1991)
Communication Theory
, vol.1
, pp. 311-335
-
-
Petronio, S.1
-
41
-
-
0002504430
-
The virtues (And vices) of virtual colleagues
-
Ross-Flanigan, N. (1998) The virtues (and vices) of virtual colleagues. MIT Technology Review, 101(2): 52-59.
-
(1998)
MIT Technology Review
, vol.101
, Issue.2
, pp. 52-59
-
-
Ross-Flanigan, N.1
-
45
-
-
85029697108
-
-
Privacy in the Workplace Survey Report. Alexandria, VA: SHRM
-
Society for Human Resource Management (1991) Privacy in the Workplace Survey Report. Alexandria, VA: SHRM.
-
(1991)
-
-
-
46
-
-
0010039423
-
Validity and related issues in web-based hiring
-
Stanton, J.M. (1998) Validity and related issues in web-based hiring. The Industrial-Organizational Psychologist, 36(3): 69-77.
-
(1998)
The Industrial-Organizational Psychologist
, vol.36
, Issue.3
, pp. 69-77
-
-
Stanton, J.M.1
-
47
-
-
33744775216
-
Information technology and privacy: A boundary management perspective
-
In S. Clarke, E. Coakes, G. Hunter, and A. Wenn (eds.), London: Idea Group
-
Stanton, J.M. (2002) Information technology and privacy: a boundary management perspective. In S. Clarke, E. Coakes, G. Hunter, and A. Wenn (eds.) Socio-Technical and Human Cognition Elements of Information Systems, London: Idea Group, 79-103.
-
(2002)
Socio-Technical and Human Cognition Elements of Information Systems
, pp. 79-103
-
-
Stanton, J.M.1
-
48
-
-
0034229860
-
Electronic monitoring in their own words: An exploratory study of employees’ experiences with new types of surveillance
-
Stanton, J.M., and E.M. Weiss (2000) Electronic monitoring in their own words: an exploratory study of employees’ experiences with new types of surveillance. Computers in Human Behavior, 16: 423-440.
-
(2000)
Computers in Human Behavior
, vol.16
, pp. 423-440
-
-
Stanton, J.M.1
Weiss, E.M.2
-
49
-
-
84986021390
-
Technology and personnel data: Cont rasting the concerns of human resource managers and employees
-
Stanton, J.M., and E.M. Weiss (In Press) Technology and personnel data: Cont rasting the concerns of human resource managers and employees. Behaviour and Information Technology.
-
Behaviour and Information Technology
-
-
Stanton, J.M.1
Weiss, E.M.2
-
50
-
-
85029676017
-
Seeing and hearing evil
-
Steptoe and Johnson (1999) Seeing and hearing evil, West Virginia Employment Law Letter, 4(1).
-
(1999)
West Virginia Employment Law Letter
, vol.4
, Issue.1
-
-
-
51
-
-
0000322208
-
Privacy in organizations: Theoretical issues, research findings and protection mechanisms
-
Stone, E.F., and D.L. Stone (1990) Privacy in organizations: theoretical issues, research findings and protection mechanisms. Research in Personnel and Human Resources Management, 8: 349-411.
-
(1990)
Research in Personnel and Human Resources Management
, vol.8
, pp. 349-411
-
-
Stone, E.F.1
Stone, D.L.2
-
52
-
-
0040687958
-
Individual privacy and computer-based human resource information systems
-
Taylor, G.S. and J.S. Davis (1989) Individual privacy and computer-based human resource information systems. Journal of Business Ethics, 8: 569-576.
-
(1989)
Journal of Business Ethics
, vol.8
, pp. 569-576
-
-
Taylor, G.S.1
Davis, J.S.2
-
54
-
-
0242376581
-
Health-care reform warrants HRIS updates
-
Thurston, R.J. and J.R. Jones (1994) Health-care reform warrants HRIS updates. Personnel Journal, 73(5): 42-46.
-
(1994)
Personnel Journal
, vol.73
, Issue.5
, pp. 42-46
-
-
Thurston, R.J.1
Jones, J.R.2
-
56
-
-
0032399422
-
Managers as initiators of trust: An exchange relationship framework for understanding managerial trustworthy behavior
-
Whitener, E.M, S.E. Brodt, M.A Korsgaard and J.M. Werner (1998) Managers as initiators of trust: an exchange relationship framework for understanding managerial trustworthy behavior. Academy of Management Review, 23: 513-530.
-
(1998)
Academy of Management Review
, vol.23
, pp. 513-530
-
-
Whitener, E.M.1
Brodt, S.E.2
Korsgaard, M.A.3
Werner, J.M.4
-
57
-
-
0001375953
-
A survey of the perceptions of information privacy in organizations
-
Woodman, R.W., D.C. Ganster, M.K. McCuddy, P.D. Tolchinsky, and H. Fromkin (1982) A survey of the perceptions of information privacy in organizations. Academy of Management Journal, 25: 647-663.
-
(1982)
Academy of Management Journal
, vol.25
, pp. 647-663
-
-
Woodman, R.W.1
Ganster, D.C.2
McCuddy, M.K.3
Tolchinsky, P.D.4
Fromkin, H.5
-
58
-
-
85029710568
-
Designing and implementing culturally-sensitive IT applications: The interaction of culture values and privacy Issues in the Middle East
-
Zakaria, N., J.M. Stanton and S. Sarkar-Barney, (Accepted for Publication) Designing and implementing culturally-sensitive IT applications: the interaction of culture values and privacy Issues in the Middle East. Information Technology and People.
-
Information Technology and People
-
-
Zakaria, N.1
Stanton, J.M.2
Sarkar-Barney, S.3
|