메뉴 건너뛰기




Volumn , Issue , 2013, Pages

The blurring boundaries of work-related and personal media use: A grounded theory study on the employee's perspective

Author keywords

Blurring of boundaries; Bring your own device; Conceptual model.; Consumerization of IT; Cyberloafing; Grounded Theory; Social Media

Indexed keywords

INFORMATION SYSTEMS;

EID: 84905833699     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (32)

References (48)
  • 1
    • 84905833236 scopus 로고    scopus 로고
    • Accenture, accessed 6/12/2012
    • Accenture (2012). Private Geräte am Arbeitsplatz: der Geist ist aus der Flasche. Available online at http://www.accenture.com/de-de/company/ newsroom-germany/Pages/private-gerate-arbeitsplatzgeist-aus-flasche.aspx, accessed 6/12/2012.
    • (2012) Private Geräte Am Arbeitsplatz: Der Geist Ist Aus der Flasche
  • 4
    • 84905833237 scopus 로고    scopus 로고
    • Bring your phone to work?
    • Andel, Tom (2011). Bring your phone to work? Material Handling & Logistics, 66 (12), p. 26.
    • (2011) Material Handling & Logistics , vol.66 , Issue.12 , pp. 26
    • Tom, A.1
  • 5
    • 0034339058 scopus 로고    scopus 로고
    • All in a day's work: Boundaries and micro role transitions
    • Ashforth, Blake E.; Kreiner, Glen E.; Fugate, Mel (2000). All in a day's work: boundaries and micro role transitions. Academy of Management Review, 25 (3), pp. 472-491.
    • (2000) Academy of Management Review , vol.25 , Issue.3 , pp. 472-491
    • Ashforth Blake, E.1    Kreiner Glen, E.2    Mel, F.3
  • 6
    • 0036246123 scopus 로고    scopus 로고
    • A review of telework research: Findings new directions, and lessons for the study of modern work
    • Bailey, Diane E.; Kurland, Nancy B. (2002). A review of telework research: findings, new directions, and lessons for the study of modern work. Journ. of Organizational Behavior, 23 (4), pp. 383-400.
    • (2002) Journ. of Organizational Behavior , vol.23 , Issue.4 , pp. 383-400
    • Bailey Diane, E.1    Kurland Nancy, B.2
  • 7
    • 0345806555 scopus 로고    scopus 로고
    • Abuse or learning?
    • Belanger, France; van Slyke, Craig (2002). Abuse or learning? Commun. ACM, 45 (1), pp. 64-65.
    • (2002) Commun ACM , vol.45 , Issue.1 , pp. 64-65
    • France, B.1    Van Slyke Craig2
  • 8
    • 65949110358 scopus 로고    scopus 로고
    • Non-work related computing (NWRC)
    • Bock, Gee-Woo; Ho, Swee Ling (2009). Non-work related computing (NWRC). Commun. ACM, 52 (4), pp. 124-128.
    • (2009) Commun ACM , vol.52 , Issue.4 , pp. 124-128
    • Gee-Woo, B.1    Swee Ling, H.2
  • 10
    • 84905833231 scopus 로고    scopus 로고
    • accessed 6/12/2012.
    • Burrus, Daniel (2012). How to embrace the consumerization of IT. Available online at http://www.cioupdate.com/cio-insights/how-to-embrace-the- consumerization-of-it.html, accessed 6/12/2012.
    • (2012) How to Embrace the Consumerization of IT
    • Daniel, B.1
  • 11
    • 84871810130 scopus 로고    scopus 로고
    • BYOD trend pressures corporate networks
    • Burt, Jeffrey (2011). BYOD trend pressures corporate networks. eWeek, 28 (14), p. 30.
    • (2011) EWeek , vol.28 , Issue.14 , pp. 30
    • Jeffrey, B.1
  • 12
    • 33646059951 scopus 로고    scopus 로고
    • Blurring boundaries? Linking technology use, spillover, individual distress, and family satisfaction
    • Chesley, Noelle (2005). Blurring boundaries? Linking technology use, spillover, individual distress, and family satisfaction. Journal of Marriage and Family, 67 (5), pp. 1237-1248.
    • (2005) Journal of Marriage and Family , vol.67 , Issue.5 , pp. 1237-1248
    • Noelle, C.1
  • 13
    • 50149089596 scopus 로고    scopus 로고
    • A text mining approach to Internet abuse detection
    • Chou, Chen-Huei; Sinha, Atish P.; Zhao, Huimin (2008). A text mining approach to Internet abuse detection. Inf Syst E-Bus Manage, 6 (4), pp. 419-439.
    • (2008) Inf Syst E-Bus Manage , vol.6 , Issue.4 , pp. 419-439
    • Chen-Huei, C.1    Sinha Atish, P.2    Huimin, Z.3
  • 14
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • D'Arcy, J.; Hovav, A.; Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inf. Sys. Res., 20 (1), pp. 79-98.
    • (2009) Inf. Sys. Res. , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 15
    • 33749667570 scopus 로고    scopus 로고
    • An empirical investigation of antecedents of Internet abuse in the workplace
    • Galletta, Dennis F.; Polak, Peter (2003). An empirical investigation of antecedents of Internet abuse in the workplace. In SIGHCI 2003 Proceedings, pp. 47-51.
    • (2003) SIGHCI 2003 Proceedings , pp. 47-51
    • Galletta Dennis, F.1    Peter, P.2
  • 16
    • 44949172648 scopus 로고    scopus 로고
    • On cyberslacking: Workplace status and personal Internet use at work
    • Garrett, R. Kelly; Danziger, James N. (2008). On cyberslacking: workplace status and personal Internet use at work. CyberPsychology & Behavior, 11 (3), pp. 287-292.
    • (2008) CyberPsychology & Behavior , vol.11 , Issue.3 , pp. 287-292
    • Kelly, G.R.1    Danziger James, N.2
  • 19
    • 0038009720 scopus 로고    scopus 로고
    • Internet abuse in the workplace: Issues and concerns for employers and employment counselors
    • Griffiths, Mark (2003). Internet abuse in the workplace: issues and concerns for employers and employment counselors. Journal of Employment Counseling, 40 (2), pp. 87-96.
    • (2003) Journal of Employment Counseling , vol.40 , Issue.2 , pp. 87-96
    • Mark, G.1
  • 20
    • 81255163048 scopus 로고    scopus 로고
    • Understanding nonmalicious security violations in the workplace: A composite behavior model
    • Guo, Ken H.; Yuan, Yufei; Archer, Norman P.; Connelly, Catherine E. (2011). Understanding nonmalicious security violations in the workplace: a composite behavior model. J. of Management Information Systems, 28 (2), pp. 203-236.
    • (2011) J. of Management Information Systems , vol.28 , Issue.2 , pp. 203-236
    • Guo Ken, H.1    Yufei, Y.2    Archer Norman, P.3    Connelly, C.E.4
  • 21
    • 84905750450 scopus 로고    scopus 로고
    • Exploring the shadows: IT governance approaches to user-driven innovation
    • Paper 222
    • Gyoery, Andreas; Cleven, Anne; Uebernickel, Falk; Brenner, Walter (2012). Exploring the shadows: IT governance approaches to user-driven innovation. In ECIS 2012 Proceedings, paper 222.
    • (2012) ECIS 2012 Proceedings
    • Andreas, G.1    Anne, C.2    Falk, U.3    Walter, B.4
  • 22
    • 84872554808 scopus 로고    scopus 로고
    • IT consumerization: When gadgets turn into enterprise IT tools
    • Harris, Jeanne; Ives, Blake; Junglas, Iris A. (2012). IT consumerization: when gadgets turn into enterprise IT tools. MIS Quarterly Executive, 11 (3), pp. 99-111.
    • (2012) MIS Quarterly Executive , vol.11 , Issue.3 , pp. 99-111
    • Jeanne, H.1    Blake, I.2    Junglas Iris, A.3
  • 23
    • 84905815949 scopus 로고    scopus 로고
    • Cisco panel discusses legal issues in BYOD
    • Hemsley, Paul (2012). Cisco panel discusses legal issues in BYOD. Government News, 31 (6).
    • (2012) Government News , vol.31 , pp. 6
    • Paul, H.1
  • 24
    • 54549106841 scopus 로고    scopus 로고
    • The interaction of work stressors and organizational sanctions on cyberloafing
    • Henle, Christine A.; Blanchard, Anita L. (2008). The interaction of work stressors and organizational sanctions on cyberloafing. Journal of Managerial Issues, 20 (3), pp. 383-400.
    • (2008) Journal of Managerial Issues , vol.20 , Issue.3 , pp. 383-400
    • Henle Christine, A.1    Blanchard Anita, L.2
  • 25
    • 79959944364 scopus 로고    scopus 로고
    • Does deterrence work in reducing information security policy abuse by employees?
    • Hu, Qing; Xu, Zhengchuan; Dinev, Tamara; Ling, Hong (2011). Does deterrence work in reducing information security policy abuse by employees? Commun. ACM, 54 (6), pp. 54-60.
    • (2011) Commun ACM , vol.54 , Issue.6 , pp. 54-60
    • Qing, H.1    Zhengchuan, X.2    Tamara, D.3    Hong, L.4
  • 26
    • 84905833223 scopus 로고    scopus 로고
    • Pluralistic ignorance in the personal use of the Internet and system monitoring
    • Kim, Jongheon; Lee, Zoonky; Yoon, Seong No (2005). Pluralistic ignorance in the personal use of the Internet and system monitoring. In AMCIS 2005 Proceedings, p. 446.
    • (2005) AMCIS 2005 Proceedings , pp. 446
    • Jongheon, K.1    Zoonky, L.2    Seong No, Y.3
  • 27
    • 0036064934 scopus 로고    scopus 로고
    • A holistic model of computer abuse within organizations
    • Lee, Jintae; Lee, Younghwa (2002). A holistic model of computer abuse within organizations. Information Management & Computer Security, 10 (2), pp. 57-63.
    • (2002) Information Management & Computer Security , vol.10 , Issue.2 , pp. 57-63
    • Jintae, L.1    Younghwa, L.2
  • 28
    • 0142123338 scopus 로고    scopus 로고
    • The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice
    • Lim, Vivien K. G. (2002). The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. J. Organiz. Behav, 23 (5), pp. 675-694.
    • (2002) J. Organiz. Behav , vol.23 , Issue.5 , pp. 675-694
    • Lim Vivien, K.G.1
  • 29
    • 1442329001 scopus 로고    scopus 로고
    • Development of a measure of personal web usage in the workplace
    • Mahatanankoon, Pruthikrai; Anandarajan, Murugan; Igbaria, Magid (2004). Development of a measure of personal web usage in the workplace. CyberPsychology & Behavior, 7 (1), pp. 93-104.
    • (2004) CyberPsychology & Behavior , vol.7 , Issue.1 , pp. 93-104
    • Pruthikrai, M.1    Murugan, A.2    Magid, I.3
  • 30
    • 8644250221 scopus 로고    scopus 로고
    • Reducing Internet abuse in the workplace
    • Mirchandani, Dinesh; Motwani, Jaideep (2003). Reducing Internet abuse in the workplace. SAM Advanced Management Journal, 68 (1), pp. 22-26.
    • (2003) SAM Advanced Management Journal , vol.68 , Issue.1 , pp. 22-26
    • Dinesh, M.1    Jaideep, M.2
  • 31
    • 33846313618 scopus 로고    scopus 로고
    • The qualitative interview in IS research: Examining the craft
    • Myers, Michael D.; Newman, Michael (2007). The qualitative interview in IS research: Examining the craft. Information and Organization, 17 (1), pp. 2-26.
    • (2007) Information and Organization, 17 , vol.1 , pp. 2-26
    • Myers Michael, D.1    Michael, N.2
  • 32
    • 0020469034 scopus 로고
    • Teleworking: Working closer to home
    • Nilles, Jack (1992). Teleworking: working closer to home. Technology Review, 85 (3), pp. 56-62.
    • (1992) Technology Review , vol.85 , Issue.3 , pp. 56-62
    • Jack, N.1
  • 33
    • 84855845949 scopus 로고    scopus 로고
    • Cyberloafing, neutralization, and organizational citizenship behavior
    • Rajah, Rashimah; Lim, Vivien K. G. (2011). Cyberloafing, neutralization, and organizational citizenship behavior. In PACIS 2011 Proceedings, p. 152.
    • (2011) PACIS 2011 Proceedings , pp. 152
    • Rashimah, R.1    Lim Vivien, K.G.2
  • 34
    • 84905863022 scopus 로고    scopus 로고
    • accessed 6/12/2012
    • Savitz, Eric; Viveros, Marisa (2011). The pros and cons of 'bring your own device'. Available online at http://www.forbes.com/sites/ciocentral/2011/11/ 16/the-pros-and-cons-of-bring-your-own-device/, accessed 6/12/2012.
    • (2011) The Pros and Cons of Bring Your Own Device
    • Eric, S.1    Marisa, V.2
  • 36
    • 84857961941 scopus 로고    scopus 로고
    • Using deterrence to mitigate employee Internet abuse
    • Shepherd, Morgan M.; Klein, Gary (2012). Using deterrence to mitigate employee Internet abuse. In HICSS Proceedings, IEEE, pp. 5261-5266.
    • (2012) HICSS Proceedings IEEE , pp. 5261-5266
    • Shepherd Morgan, M.1    Gary, K.2
  • 37
    • 84905833228 scopus 로고    scopus 로고
    • BYOD: Save money, gain productivity
    • Steinert-Threlkeld, Tom (2011). BYOD: Save money, gain productivity. In Money Management Executive, 19 (45).
    • (2011) Money Management Executive , vol.19 , pp. 45
    • Tom, S.1
  • 38
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, Detmar W.; Welke, Richard J. (1998). Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22 (4), pp. 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub Detmar, W.1    Welke Richard, J.2
  • 40
    • 70849112725 scopus 로고    scopus 로고
    • Exploring Internet abuse in the workplace: How can we maximize deterrence efforts?
    • Ugrin, Joseph C.; Pearson, J. Michael (2008). Exploring Internet abuse in the workplace: how can we maximize deterrence efforts? Review of Business, 28 (2), p. 12.
    • (2008) Review of Business , vol.28 , Issue.2 , pp. 12
    • Ugrin Joseph, C.1    Michael, P.J.2
  • 41
    • 77954636623 scopus 로고    scopus 로고
    • Putting the theory back into grounded theory: Guidelines for grounded theory studies in IS
    • Urquhart, Cathy; Lehmann, Hans; Myers, Michael D. (2010). Putting the theory back into grounded theory: guidelines for grounded theory studies in IS. Inf. Syst. J., 20 (4), pp. 357-381.
    • (2010) Inf. Syst. J. , vol.20 , Issue.4 , pp. 357-381
    • Cathy, U.1    Hans, L.2    Myers Michael, D.3
  • 42
    • 84905819661 scopus 로고    scopus 로고
    • Vogel, Robert; Koçoǧlu, Tarkan; Berger, Thomas (Eds.) Desktopvirtualisierung. Wiesbaden: Vieweg+Teubner
    • Vogel, Robert; Koçoǧlu, Tarkan; Berger, Thomas (2010). Consumerization. In: Vogel, Robert; Koçoǧlu, Tarkan; Berger, Thomas (Eds.) Desktopvirtualisierung. Wiesbaden: Vieweg+Teubner, pp. 25-28.
    • (2010) Consumerization , pp. 25-28
    • Robert, V.1    Tarkan, K.2    Thomas, B.3
  • 45
    • 79960702988 scopus 로고    scopus 로고
    • Punishment, justice, and compliance in mandatory IT settings
    • Xue, Y.; Liang, H.; Wu, L. (2011). Punishment, justice, and compliance in mandatory IT settings. Inf. Sys. Res. 22 (2), pp. 400-414.
    • (2011) Inf. Sys. Res. , vol.22 , Issue.2 , pp. 400-414
    • Xue, Y.1    Liang, H.2    Wu, L.3
  • 46
    • 1442328997 scopus 로고    scopus 로고
    • Internet abuse in the workplace: New trends in risk management
    • Young, Kimberly S.; Case, Carl J. (2004). Internet abuse in the workplace: new trends in risk management. CyberPsychology & Behavior, 7 (1), pp. 105-111.
    • (2004) CyberPsychology & Behavior , vol.7 , Issue.1 , pp. 105-111
    • Young Kimberly, S.1    Case Carl, J.2
  • 47
    • 84905862360 scopus 로고    scopus 로고
    • Why employees do non-work-related computing: An investigation of factors affecting NWRC in a workplace
    • Zhang, Chun-Yan; Bock, Gee-Woo (2006). Why employees do non-work-related computing: an investigation of factors affecting NWRC in a workplace. In PACIS 2006 Proceedings, p. 79.
    • (2006) PACIS 2006 Proceedings , pp. 79
    • Chun-Yan, Z.1    Gee-Woo, B.2
  • 48
    • 33749653343 scopus 로고    scopus 로고
    • An experimental study of the factors influencing non-work related use of IT resources at workplace
    • Zhang, Dong; Oh, Lih-Bin; Teo, Hock-Hai (2006). An experimental study of the factors influencing non-work related use of IT resources at workplace. In HICSS 2006 Proceedings, IEEE, p. 206.
    • (2006) HICSS 2006 Proceedings IEEE , pp. 206
    • Dong, Z.1    Lih-Bin, O.2    Hock-Hai, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.