-
1
-
-
84905833236
-
-
Accenture, accessed 6/12/2012
-
Accenture (2012). Private Geräte am Arbeitsplatz: der Geist ist aus der Flasche. Available online at http://www.accenture.com/de-de/company/ newsroom-germany/Pages/private-gerate-arbeitsplatzgeist-aus-flasche.aspx, accessed 6/12/2012.
-
(2012)
Private Geräte Am Arbeitsplatz: Der Geist Ist Aus der Flasche
-
-
-
4
-
-
84905833237
-
Bring your phone to work?
-
Andel, Tom (2011). Bring your phone to work? Material Handling & Logistics, 66 (12), p. 26.
-
(2011)
Material Handling & Logistics
, vol.66
, Issue.12
, pp. 26
-
-
Tom, A.1
-
5
-
-
0034339058
-
All in a day's work: Boundaries and micro role transitions
-
Ashforth, Blake E.; Kreiner, Glen E.; Fugate, Mel (2000). All in a day's work: boundaries and micro role transitions. Academy of Management Review, 25 (3), pp. 472-491.
-
(2000)
Academy of Management Review
, vol.25
, Issue.3
, pp. 472-491
-
-
Ashforth Blake, E.1
Kreiner Glen, E.2
Mel, F.3
-
6
-
-
0036246123
-
A review of telework research: Findings new directions, and lessons for the study of modern work
-
Bailey, Diane E.; Kurland, Nancy B. (2002). A review of telework research: findings, new directions, and lessons for the study of modern work. Journ. of Organizational Behavior, 23 (4), pp. 383-400.
-
(2002)
Journ. of Organizational Behavior
, vol.23
, Issue.4
, pp. 383-400
-
-
Bailey Diane, E.1
Kurland Nancy, B.2
-
7
-
-
0345806555
-
Abuse or learning?
-
Belanger, France; van Slyke, Craig (2002). Abuse or learning? Commun. ACM, 45 (1), pp. 64-65.
-
(2002)
Commun ACM
, vol.45
, Issue.1
, pp. 64-65
-
-
France, B.1
Van Slyke Craig2
-
8
-
-
65949110358
-
Non-work related computing (NWRC)
-
Bock, Gee-Woo; Ho, Swee Ling (2009). Non-work related computing (NWRC). Commun. ACM, 52 (4), pp. 124-128.
-
(2009)
Commun ACM
, vol.52
, Issue.4
, pp. 124-128
-
-
Gee-Woo, B.1
Swee Ling, H.2
-
10
-
-
84905833231
-
-
accessed 6/12/2012.
-
Burrus, Daniel (2012). How to embrace the consumerization of IT. Available online at http://www.cioupdate.com/cio-insights/how-to-embrace-the- consumerization-of-it.html, accessed 6/12/2012.
-
(2012)
How to Embrace the Consumerization of IT
-
-
Daniel, B.1
-
11
-
-
84871810130
-
BYOD trend pressures corporate networks
-
Burt, Jeffrey (2011). BYOD trend pressures corporate networks. eWeek, 28 (14), p. 30.
-
(2011)
EWeek
, vol.28
, Issue.14
, pp. 30
-
-
Jeffrey, B.1
-
12
-
-
33646059951
-
Blurring boundaries? Linking technology use, spillover, individual distress, and family satisfaction
-
Chesley, Noelle (2005). Blurring boundaries? Linking technology use, spillover, individual distress, and family satisfaction. Journal of Marriage and Family, 67 (5), pp. 1237-1248.
-
(2005)
Journal of Marriage and Family
, vol.67
, Issue.5
, pp. 1237-1248
-
-
Noelle, C.1
-
13
-
-
50149089596
-
A text mining approach to Internet abuse detection
-
Chou, Chen-Huei; Sinha, Atish P.; Zhao, Huimin (2008). A text mining approach to Internet abuse detection. Inf Syst E-Bus Manage, 6 (4), pp. 419-439.
-
(2008)
Inf Syst E-Bus Manage
, vol.6
, Issue.4
, pp. 419-439
-
-
Chen-Huei, C.1
Sinha Atish, P.2
Huimin, Z.3
-
14
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'Arcy, J.; Hovav, A.; Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inf. Sys. Res., 20 (1), pp. 79-98.
-
(2009)
Inf. Sys. Res.
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
15
-
-
33749667570
-
An empirical investigation of antecedents of Internet abuse in the workplace
-
Galletta, Dennis F.; Polak, Peter (2003). An empirical investigation of antecedents of Internet abuse in the workplace. In SIGHCI 2003 Proceedings, pp. 47-51.
-
(2003)
SIGHCI 2003 Proceedings
, pp. 47-51
-
-
Galletta Dennis, F.1
Peter, P.2
-
16
-
-
44949172648
-
On cyberslacking: Workplace status and personal Internet use at work
-
Garrett, R. Kelly; Danziger, James N. (2008). On cyberslacking: workplace status and personal Internet use at work. CyberPsychology & Behavior, 11 (3), pp. 287-292.
-
(2008)
CyberPsychology & Behavior
, vol.11
, Issue.3
, pp. 287-292
-
-
Kelly, G.R.1
Danziger James, N.2
-
19
-
-
0038009720
-
Internet abuse in the workplace: Issues and concerns for employers and employment counselors
-
Griffiths, Mark (2003). Internet abuse in the workplace: issues and concerns for employers and employment counselors. Journal of Employment Counseling, 40 (2), pp. 87-96.
-
(2003)
Journal of Employment Counseling
, vol.40
, Issue.2
, pp. 87-96
-
-
Mark, G.1
-
20
-
-
81255163048
-
Understanding nonmalicious security violations in the workplace: A composite behavior model
-
Guo, Ken H.; Yuan, Yufei; Archer, Norman P.; Connelly, Catherine E. (2011). Understanding nonmalicious security violations in the workplace: a composite behavior model. J. of Management Information Systems, 28 (2), pp. 203-236.
-
(2011)
J. of Management Information Systems
, vol.28
, Issue.2
, pp. 203-236
-
-
Guo Ken, H.1
Yufei, Y.2
Archer Norman, P.3
Connelly, C.E.4
-
21
-
-
84905750450
-
Exploring the shadows: IT governance approaches to user-driven innovation
-
Paper 222
-
Gyoery, Andreas; Cleven, Anne; Uebernickel, Falk; Brenner, Walter (2012). Exploring the shadows: IT governance approaches to user-driven innovation. In ECIS 2012 Proceedings, paper 222.
-
(2012)
ECIS 2012 Proceedings
-
-
Andreas, G.1
Anne, C.2
Falk, U.3
Walter, B.4
-
22
-
-
84872554808
-
IT consumerization: When gadgets turn into enterprise IT tools
-
Harris, Jeanne; Ives, Blake; Junglas, Iris A. (2012). IT consumerization: when gadgets turn into enterprise IT tools. MIS Quarterly Executive, 11 (3), pp. 99-111.
-
(2012)
MIS Quarterly Executive
, vol.11
, Issue.3
, pp. 99-111
-
-
Jeanne, H.1
Blake, I.2
Junglas Iris, A.3
-
23
-
-
84905815949
-
Cisco panel discusses legal issues in BYOD
-
Hemsley, Paul (2012). Cisco panel discusses legal issues in BYOD. Government News, 31 (6).
-
(2012)
Government News
, vol.31
, pp. 6
-
-
Paul, H.1
-
24
-
-
54549106841
-
The interaction of work stressors and organizational sanctions on cyberloafing
-
Henle, Christine A.; Blanchard, Anita L. (2008). The interaction of work stressors and organizational sanctions on cyberloafing. Journal of Managerial Issues, 20 (3), pp. 383-400.
-
(2008)
Journal of Managerial Issues
, vol.20
, Issue.3
, pp. 383-400
-
-
Henle Christine, A.1
Blanchard Anita, L.2
-
25
-
-
79959944364
-
Does deterrence work in reducing information security policy abuse by employees?
-
Hu, Qing; Xu, Zhengchuan; Dinev, Tamara; Ling, Hong (2011). Does deterrence work in reducing information security policy abuse by employees? Commun. ACM, 54 (6), pp. 54-60.
-
(2011)
Commun ACM
, vol.54
, Issue.6
, pp. 54-60
-
-
Qing, H.1
Zhengchuan, X.2
Tamara, D.3
Hong, L.4
-
26
-
-
84905833223
-
Pluralistic ignorance in the personal use of the Internet and system monitoring
-
Kim, Jongheon; Lee, Zoonky; Yoon, Seong No (2005). Pluralistic ignorance in the personal use of the Internet and system monitoring. In AMCIS 2005 Proceedings, p. 446.
-
(2005)
AMCIS 2005 Proceedings
, pp. 446
-
-
Jongheon, K.1
Zoonky, L.2
Seong No, Y.3
-
28
-
-
0142123338
-
The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice
-
Lim, Vivien K. G. (2002). The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. J. Organiz. Behav, 23 (5), pp. 675-694.
-
(2002)
J. Organiz. Behav
, vol.23
, Issue.5
, pp. 675-694
-
-
Lim Vivien, K.G.1
-
29
-
-
1442329001
-
Development of a measure of personal web usage in the workplace
-
Mahatanankoon, Pruthikrai; Anandarajan, Murugan; Igbaria, Magid (2004). Development of a measure of personal web usage in the workplace. CyberPsychology & Behavior, 7 (1), pp. 93-104.
-
(2004)
CyberPsychology & Behavior
, vol.7
, Issue.1
, pp. 93-104
-
-
Pruthikrai, M.1
Murugan, A.2
Magid, I.3
-
30
-
-
8644250221
-
Reducing Internet abuse in the workplace
-
Mirchandani, Dinesh; Motwani, Jaideep (2003). Reducing Internet abuse in the workplace. SAM Advanced Management Journal, 68 (1), pp. 22-26.
-
(2003)
SAM Advanced Management Journal
, vol.68
, Issue.1
, pp. 22-26
-
-
Dinesh, M.1
Jaideep, M.2
-
31
-
-
33846313618
-
The qualitative interview in IS research: Examining the craft
-
Myers, Michael D.; Newman, Michael (2007). The qualitative interview in IS research: Examining the craft. Information and Organization, 17 (1), pp. 2-26.
-
(2007)
Information and Organization, 17
, vol.1
, pp. 2-26
-
-
Myers Michael, D.1
Michael, N.2
-
32
-
-
0020469034
-
Teleworking: Working closer to home
-
Nilles, Jack (1992). Teleworking: working closer to home. Technology Review, 85 (3), pp. 56-62.
-
(1992)
Technology Review
, vol.85
, Issue.3
, pp. 56-62
-
-
Jack, N.1
-
33
-
-
84855845949
-
Cyberloafing, neutralization, and organizational citizenship behavior
-
Rajah, Rashimah; Lim, Vivien K. G. (2011). Cyberloafing, neutralization, and organizational citizenship behavior. In PACIS 2011 Proceedings, p. 152.
-
(2011)
PACIS 2011 Proceedings
, pp. 152
-
-
Rashimah, R.1
Lim Vivien, K.G.2
-
34
-
-
84905863022
-
-
accessed 6/12/2012
-
Savitz, Eric; Viveros, Marisa (2011). The pros and cons of 'bring your own device'. Available online at http://www.forbes.com/sites/ciocentral/2011/11/ 16/the-pros-and-cons-of-bring-your-own-device/, accessed 6/12/2012.
-
(2011)
The Pros and Cons of Bring Your Own Device
-
-
Eric, S.1
Marisa, V.2
-
36
-
-
84857961941
-
Using deterrence to mitigate employee Internet abuse
-
Shepherd, Morgan M.; Klein, Gary (2012). Using deterrence to mitigate employee Internet abuse. In HICSS Proceedings, IEEE, pp. 5261-5266.
-
(2012)
HICSS Proceedings IEEE
, pp. 5261-5266
-
-
Shepherd Morgan, M.1
Gary, K.2
-
37
-
-
84905833228
-
BYOD: Save money, gain productivity
-
Steinert-Threlkeld, Tom (2011). BYOD: Save money, gain productivity. In Money Management Executive, 19 (45).
-
(2011)
Money Management Executive
, vol.19
, pp. 45
-
-
Tom, S.1
-
38
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, Detmar W.; Welke, Richard J. (1998). Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22 (4), pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub Detmar, W.1
Welke Richard, J.2
-
40
-
-
70849112725
-
Exploring Internet abuse in the workplace: How can we maximize deterrence efforts?
-
Ugrin, Joseph C.; Pearson, J. Michael (2008). Exploring Internet abuse in the workplace: how can we maximize deterrence efforts? Review of Business, 28 (2), p. 12.
-
(2008)
Review of Business
, vol.28
, Issue.2
, pp. 12
-
-
Ugrin Joseph, C.1
Michael, P.J.2
-
41
-
-
77954636623
-
Putting the theory back into grounded theory: Guidelines for grounded theory studies in IS
-
Urquhart, Cathy; Lehmann, Hans; Myers, Michael D. (2010). Putting the theory back into grounded theory: guidelines for grounded theory studies in IS. Inf. Syst. J., 20 (4), pp. 357-381.
-
(2010)
Inf. Syst. J.
, vol.20
, Issue.4
, pp. 357-381
-
-
Cathy, U.1
Hans, L.2
Myers Michael, D.3
-
42
-
-
84905819661
-
-
Vogel, Robert; Koçoǧlu, Tarkan; Berger, Thomas (Eds.) Desktopvirtualisierung. Wiesbaden: Vieweg+Teubner
-
Vogel, Robert; Koçoǧlu, Tarkan; Berger, Thomas (2010). Consumerization. In: Vogel, Robert; Koçoǧlu, Tarkan; Berger, Thomas (Eds.) Desktopvirtualisierung. Wiesbaden: Vieweg+Teubner, pp. 25-28.
-
(2010)
Consumerization
, pp. 25-28
-
-
Robert, V.1
Tarkan, K.2
Thomas, B.3
-
44
-
-
84875503799
-
The impact of software as a service on IS authority-A contingency perspective
-
Paper 22
-
Winkler, Till J.; Goebel, Christoph; Benlian, Alexander; Bidault, Francis; Günther, Oliver (2011). The impact of software as a service on IS authority-a contingency perspective. In ICIS 2011 Proceedings, paper 22.
-
(2011)
ICIS 2011 Proceedings
-
-
Winkler Till, J.1
Christoph, G.2
Alexander, B.3
Francis, B.4
Oliver, G.5
-
45
-
-
79960702988
-
Punishment, justice, and compliance in mandatory IT settings
-
Xue, Y.; Liang, H.; Wu, L. (2011). Punishment, justice, and compliance in mandatory IT settings. Inf. Sys. Res. 22 (2), pp. 400-414.
-
(2011)
Inf. Sys. Res.
, vol.22
, Issue.2
, pp. 400-414
-
-
Xue, Y.1
Liang, H.2
Wu, L.3
-
46
-
-
1442328997
-
Internet abuse in the workplace: New trends in risk management
-
Young, Kimberly S.; Case, Carl J. (2004). Internet abuse in the workplace: new trends in risk management. CyberPsychology & Behavior, 7 (1), pp. 105-111.
-
(2004)
CyberPsychology & Behavior
, vol.7
, Issue.1
, pp. 105-111
-
-
Young Kimberly, S.1
Case Carl, J.2
-
47
-
-
84905862360
-
Why employees do non-work-related computing: An investigation of factors affecting NWRC in a workplace
-
Zhang, Chun-Yan; Bock, Gee-Woo (2006). Why employees do non-work-related computing: an investigation of factors affecting NWRC in a workplace. In PACIS 2006 Proceedings, p. 79.
-
(2006)
PACIS 2006 Proceedings
, pp. 79
-
-
Chun-Yan, Z.1
Gee-Woo, B.2
-
48
-
-
33749653343
-
An experimental study of the factors influencing non-work related use of IT resources at workplace
-
Zhang, Dong; Oh, Lih-Bin; Teo, Hock-Hai (2006). An experimental study of the factors influencing non-work related use of IT resources at workplace. In HICSS 2006 Proceedings, IEEE, p. 206.
-
(2006)
HICSS 2006 Proceedings IEEE
, pp. 206
-
-
Dong, Z.1
Lih-Bin, O.2
Hock-Hai, T.3
|