|
Allen, M.W., Walker, K.L., Coopman, S.J., and Hart, J.L. (2007), “Workplace surveillance and managing privacy boundary”, Management Communication Quarterly, Vol.21 No.2, pp.172–200. Allen, N. J., and Meyer, J. P. (1990), “The measurement and antecedents of affective, continuance and normative commitment to the organization”, Journal of Occupational Psychology, Vol.63 No.1, pp.1–18. Almeling, D.S., Snyder, D.W., Sapoznikow, M., McCollum, W.E.,and Weader, J. (2010), “A statistical analysis of trade secret litigation in state courts”, Gonzaga Law Review, Vol.46 No.1, pp.57–101. Altman, I., Vinsel, A., and Brown, B. (1981), “Dialectic conceptions in social psychology: An application to social penetration and privacy regulation”, Advances in Experimental Social Psychology,Vol.14, pp.107–160. Anderson, E., Fornell, C., and Lehman, D.R. (1994), “Customer satisfaction, market share, and profitability: Findings from Sweden”, Journal of Marketing, Vol.58 No.3, pp.53−66. Anderson, J.C., and Narus, J.A. (1990), “A model of distributor firm and manufacturer firm working partnerships”, Journal of Marketing, Vol.54 No.1, pp.42–58. ASIS International (2007),Trends in Proprietary Information Loss, Survey Report, June 2007. Alexandria, Virginia: ASIS International. https://foundation.asisonline.org/FoundationResearch/Publications/Documents/trendsinproprietaryinformationloss.pdf Bahtiyar, S., and UfukÇağlayan,M.(2012), “Extracting trust information from security system of a service”, Journal of Network and Computer Applications,Vol.35 No.1, pp.480–490. Ball, K., Daniel, E.M.,and Stride, C. (2012), “Dimensions of employee privacy: an empirical study”,Information, Technology & People,Vol.25 No.4, pp.376–394. Bansal G., and Zahedi, F.M. (2015), “Trust violation and repair: The information privacy perspective”,Decision Support Systems,Vol.71, pp.62–77. Barclay, D., Thompson, R., and Higgins, C. (1995), “The partial least squares (PLS) approach to causal modeling: Personal computeradoption and use an illustration”,Technology Studies, Vol.2 No.2, pp.285-309. Baxter, L.A., and Montgomery, B.M. (1996), Relating: Dialogues and dialectics. Guilford Press, New York. Bélanger, F., Hiller, J.,and Smith, W.J. (2002),“Trustworthiness in electronic commerce: The role of privacy, security, and site attributes”, Journal of Strategic Information System, Vol.11 No.3, pp.245–270. Bélanger, F.,and Hiller, J.S. (2006),“A framework for e-government: Privacy implications”, Business Process Management Journal,Vol.12 No.1, pp.48–60. Beldad, A., de Jong, M., and Steehouder, M. (2011), “I trust not therefore it must be risky: Determinants of the perceived risks of disclosing personal data for e-government transactions”, Computers in Human Behavior, Vol.27, pp.2233–2242. Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A.D. (2003), “Experience with the KeyNote Trust Management System: Applications and Future Directions”, In: Proceedings of the 1st International Conference on Trust Management.Available at: http://www.cs.columbia.edu/~angelos/Papers/newkeynote.pdf Boggs, W.B. (2004), “TQM and organizational culture: a case study”, The Quality Management Journal, Vol.11 No.2, pp.42–52. Botan, C. (1996), “Communication work and electronic surveillance: A model for predicting panoptic effects”, Communication Monographs, Vol.63, pp.293–313. Cameron, K.S., and Freeman, S.J. (1991), “Culture congruence strength and type: Relationship to effectiveness”, Research in Organizational Change and Development, Vol.5, pp.23–58. Careerbuilder (2011),Half of American Workers Will Shop Online at Work This Holiday Season.Available at: http://www.careerbuilder.com/share/aboutus/pressreleasesdetail.aspx?id=pr6 Carnevale, D. G., and Wechsler, B. (1992), “Trust in the public-sector - Individual and organizational determinants”, Administration and Society, Vol.23, pp.471–494. Chang, S.E., and Ho, C.B. (2006), “Organizational factors to the effectiveness of implementing information security management”, Industrial Management and Data Systems, Vol.106 No.3, pp.345–361 Chang, S.E., and Lin, C.S. (2007), “Exploring organizational culture for information security management”, Industrial Management and Data Systems, Vol.107 No.3, pp.438–458. Clarke, R. (1999),“Internet privacy concerns confirm the case for intervention”,Communication of the ACM,Vol. 42 No.2, pp.60–67. Colquitt, J.A., and Greenberg, J. (2003), “Organizational justice: A fair assessment of the state of the literature”, In: J.Greenberg (Ed.), Organizational Behaivor: The STATE of the Literature. Lawrence Erlbaum Associates, Mahwah, NJ, pp.165–210. Cooper B., and Hecker, R. (2015), TheElectronic Workplace Survey: Analysis of the First National Survey on Employee Attitudes to Electronic Monitoring and Surveillance in the Australian Workplace. Monash University, Melbourne. Available at: http://www.buseco.monash.edu.au/mgt/news/documents/electronic-report.pdf. Costa, A.C.( 2003),“Work team trust and effectiveness”, Personnel Review,Vol.32No.5, pp.605–22. D’Urso, S. (2006), “Who’s watching us at work? Toward a structural–perceptual model of electronic monitoring and surveillance in organizations”, Communication Theory, Vol. 16 No. 3, pp.281–303. De Cremer, D., and Tyler, T.R. (2007), “The effects of trust in authority and procedural fairness on cooperation”, Journal of Applied Psychology, Vol.92, pp.639–649. deVries, R.E., and van Gelder, J.-L. (2015),“Explaining workplace delinquency: The role of honesty–humility, ethical culture, and employee surveillance”,Personality and Individual Differences,Vol.86, pp.112–116. Deal, T., and Kennedy, A. (1982), Corporate Culture: The Rites and Rituals of Corporate Life. Addison-Wesley, New York. Denison, D.R., Haaland, S., and Goelzer, P. (2004), “Corporate culture and organizational effectiveness: Is Asia different from the rest of the world?”,Organizational Dynamics, Vol.33 No.1, pp.98-109. DePree, C., and Jude, R. (2006), “Who’sreading your office email? Is that legal?”,Strategic Finance, Vol.87 No.10, pp.44–47. Desprochers, S., and Roussos, A., (2001), “The jurisprudence of surveillance: A critical look at the laws of intimacy”, Working Paper, Lex Electronica, Vol.6 No.2, Available at: http://www.lex-electronica.org/articles/v6-2/> Deutsch, M. (1958), “Trust and suspicion”, The Journal of Conflict Resolution, Vol.2, pp.265–79. Dietz, D.,and Hartog, D.N. (2006), “Measuring trust inside organizations,” Personnel Review, Vol.35 No.5, pp.557–588. Dijke, M.H., and Verboon, P.(2010), “Trust in authorities as a boundary condition to procedural fairness effects on tax compliance”, Journal of Economic Psychology, Vol.31 No.1, pp.80–91. Doney, P.M., Cannon, J.P., and Mullen, M.R. (1998), “Understanding the influence of national culture on the development of trust”, Academy of Management Review, Vol.23 No.3, pp.601–620. Douglas, M. (1985), Measuring Culture: A Paradigm for the Analysis of Social Organization. Columbia University Press, New York. Eastlick, M.A., Lotz, S.L., and Warrington, P. (2006), “Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment”, Journal of Business Research,Vol.59No.8, pp.877–886 Eddy, E.R., Stone, D.L., and Stone-Romero, E.E. (1999), “The effects of information management policies on reactions to human resource information systems: An integration of privacy and procedural justice perspectives”, Personnel Psychology, Vol.52, pp.335–358. Etzioni, A. (1961), A Comparative Analysis of Complex Organizations. The Free Press of Glencoe, New York. Fairweather, N.B. (1999), “Surveillance in employment- the case of teleworking”, Journal of Business Ethics, Vol.22, pp.39–49. Fazekas, P., (2004), “1984 is still fiction: Electronic monitoring in the workplace and U.S. privacy”,Duke Law and Technology Review, Vol.15. Available at: http://www.law.duke.edu/journals/dltr/articles/PDF/2004DLTR-0015.pdf Fornell, C., Larcker, D.F. (1981), “Evaluating structural equation models with unobservablevariables and measurement error”,Journal of Marketing Research, Vol.18 No.1, pp.39-50. Fornell. C., and Larcker, D.F. (1981), “Evaluating structural equation models with unobservable variables and measurement error”, Journal of Marketing Research,Vol.18 No.1, pp.39–50. Gambetta, D. (2000), “Canwe trust trust?”,In: D. Gambetta (ed.) Trust: Making and Breaking Cooperative Relations. Department of Sociology, University of Oxford, pp. 213–237.Available at: http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf Gefen, D., Karahanna, E., and Straub, D.W. (2003), “Trust and TAM in online shopping: An integrated model”, MIS Quarterly, Vol.27 No.1, pp.51–90. Gollmann, D. (2006), “Why trust is bad for security”, Electronic Notes in Theoretical Computer Science,Vol.157, pp.3–9 Grandison, T., and Sloman, M. (2000), “A survey of trust in internet applications”, IEEE Communications Survey,Vol. 3, pp.2–16. Greenaway, K.E., and Chan, Y.E. (2005), “Theoretical Explanations for Firms’ Information PrivacyBehaviors”, Journal of the Association for Information Systems, Vol.6 No.6, pp.171-198. Hagberg, R., and Heifetz, J. (1997), Corporate Culture: Telling the CEO the Baby is Ugly. Available at: www.hcgnet.com/research.asp?id=6 Hair, J.F., Ringle, C.M., and Sarstedt, M. (2011), “PLS-SEM: Indeed a silver bullet”,Journal of Marketing Theory and Practice,Vol.19 No.2, pp.139–151. Hart, K. (2000),The Memory Bank: Money in an Unequal World. Profile Books Ltd., Cambridge, England. Hausman, A., and Johnston, W.J. (2010), “The impact of coercive and non-coercive forms of influence on trust, commitment, and compliance in supply chains”, Industrial Marketing Management, Vol.39, pp.519–526. Haws, K. L., Dholakia, U. M., and Bearden, W. O. (2010), “An assessment of chronic regulatory focus measures”, Journal of Marketing Research, Vol.47 No.5, pp.967–982. Henseler, J., Ringle, C.M., andSinkovics, R.R. (2009), “The use of partial least squares path modeling in international marketing”, Advances in International Marketing, Vol.20, pp.277–319. Holland, P., Copper, B. and Hecker, R. (2012), The Electronic Workplace Survey: Analysis of the First National Survey on Employee Attitudes to Electronic Monitoring and Surveillance in the Australian Workplace. Monash University, Melbourne. Hollander, B. (2001),“It pays to understand law on trade secrets”, Louisville Business First. Available at: http://www.bizjournals.com/louisville/stories/2001/02/26/editorial2.html Hon, A.H.Y., and Lu, L. (2010), “The mediating roles of trust between expatriate procedural justice and employee outcomes in the Chinese hotel industry”,International Journal of Hospitality Management,Vol.29 No.4,pp.669-676. Hoven, D.J.D. (1997), “Computer ethics and moral methodology”, Metaphilosophy, Vol.28, No.3, pp.234–248 Hsu,M.H., Chang, C.M., and Yen, C.H. (2011), “Exploring the antecedents of trust in virtual communities”, Behaviourand Information Technology, Vol.30 No.5, pp.587–601. Hulland, J. (1999), “Use of partial least squares (PLS) in strategic management research: A review of four recent studies”, Strategic Management Journal, Vol.20 No.2, pp.195–204. Ifinedo, P. (2012), “Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory”, Computers and Security, Vol.31, pp.83–95. Ifinedo, P. (2014), “Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition”, Information and Management, Vol.51, pp.69–79. Jahansoozi, J. (2006),“Organization-stakeholder relationships: Exploring trust and transparency”, Journal of Management Development, Vol.25 No.10, pp.942–955. Kim, K., and Kim, J. (2011), “Third-party privacy certification as an online advertising strategy: An investigation of the factors affecting the relationship between third-party certification and initial trust”, Journal of Interactive Marketing, Vol.25 No.3, pp.145–158. Kogler,C., Batrancea, L., Nichita, A., Pantya, J., Belianin, A., and Kirchler, E. (2013), “Trust and power as determinants of tax compliance: Testing the assumptions of the slippery slope framework in Austria, Hungary, Romania and Russia”, Journal of Economic Psychology, Vol.34, pp.169-180. Koller, M. (1988), “Risk as a determinant of trust”, Basic and Applied Social Psychology, Vol.9 No.4, pp.265–276. Kramer, R.M. (1996), “Divergent realities and convergent disappointments in the hierarchic relation: Trust and the intuitive auditor at work”, In: R.M.Kramer, and T.R.Tyler (Eds.), Trust in Organizations: Frontiers of Theory and Research.Sage Publications, Thousand Oaks, CA, pp.216–245. Krasnova, H., Veltri, N.F., and Günther, O. (2012),“Self-disclosure and privacy calculus on social networking sites: The role of culture”,Business & Information Systems Engineering, Vol.4 No.3, pp.127–135. Laurence, G.A., Fried, Y. andSlowik, L.H. (2013), “‘My space’: A moderated mediation model of the effect of architectural and experienced privacy and workspace personalization on emotional exhaustion at work”, Journal of Environmental Psychology, Vol.36, pp.144–152 Lee, S., and Kleiner, B.H. (2003), “Electronic surveillance in the workplace”, Management Research News, Vol.26 No.2, pp.72–81. Lin, C.P. (2007), “To share or not to share: Modeling tacit knowledge sharing, its mediators and antecedents”, Journal of Business Ethics, Vol.70 No.4, pp.411–428. Lind, E.A. (2001), “Fairness heuristic theory: Justice judgments as pivotal cognitions in organizational relations”, In: J. Greenberg, and R. Cropanzano (Eds.), Advances in Organizational Justice. Stanford University Press, Stanford, CA. Liu, C.,Marchewka, J.T., Lu, J., and Yu, C.S. (2005), “Beyond concern–A privacy-trust-behavioral intention model of electronic commerce,” Information & Management, Vol.42 No.2, pp.289–304. Luchak, A.A., and Gellatly, I.R. (2007), “A comparison of linear and nonlinear relations between organizational commitment and work outcomes”, The Journal of Applied Psychology, Vol.92 No.3, pp.786–793. Lupton, D. (1999), Risk. Routledge,London, UK. Marshall, P. (2001), “Privacy under attack: Are tougher laws needed to protect citizens?”,Congressional Quarterly, Vol.11 No.19, pp.1–30. Mayer, R.C., Davis, J.H., and Schoorman, F.D. (1995), “An integrative model of organizational trust”, Academy of Management Review, Vol.20, pp.709–734. McGrath, J.E. (1984),Groups: Interaction and performance. Prentice-Hall, Englewood Cliffs, NJ. McKnight, D.H., Cummings, L.L., and Chervany, N.L. (1998), “Initial trust formation in new organizational relationships”, The Academy of Management Review, Vol.23 No.3, pp.473–490. McKnight, D.H., Kacmar, C.J., and Choudhury, V. (2004), “Dispositional trust and distrust distinctions in predicting high- and low-risk internet expert advice site perceptions”,e-Service Journal, Vol.3 No.2, pp.35-58. Meyer, J.P., Allen, N.J., and Smith, C.A. (1993), “Commitment to organizations and occupations: Extension and test of a three-component conceptualization”, Journal of Applied Psychology, Vol.78 No.4, pp.538–551. Meyer, J.P., and Herscovitch, L. (2001), “Commitment in the workplace: Toward a general model”, Human Resource Management Review, Vol.11 No.3, pp.299–326. Meyer, J.P., Stanley, D.J., Herscovitch, L., and Topolnytsky, L. (2002), “Affective, continuance and normative commitment to the organization: A meta-analysis of antecedents, correlates and consequences”, Journal of Vocational Behavior, Vol.61 No.1, pp.20–52. Milberg, S.J., Smith, H.J., and Burke, S.J. (2000), “Information privacy: Corporate management and national regulation”, Organization Science,Vol.11 No.1, pp.35–57. Mitrou,L., and Karyda, M.(2006),“Employeesprivacy vs. employerssecurity: Can they be balanced?”, Telematics and Informatics, Vol.23, pp.164–178. Moorman, C., Deshpande, R., and Zaltman, G. (1993), “Factors affecting trust in market research relationships”, Journal of Marketing, Vol.57 No.1, pp.81−101. Morgan, R.M., and Hunt, S.D. (1994), “The commitment-trust theory of relationship marketing”, Journal of Marketing, Vol.58 No.3, pp.20–38. Morrow, P.C. (1993), TheTheory and Measurement of Work Commitment. JAI Press, Greenwich, CT. Morrow, P.C., McElroy, J.C., and Scheibe, K.P. (2012), “Influencing organizational commitment through office redesign”, Journal of Vocational Behavior, Vol.81, pp. 99–111. Nofer, M.D.,Hinz, O., Muntermann,J.,and Roßnagel, H. (2014),“The Economic impact of privacy violations and security breaches: A laboratory experiment”, Business & Information Systems Engineering, Vol.6No.6, pp.339–348. Palmatier, R.W., Dant, R.P., Grewal, D., and Evans, K.R. (2006), “Factors influencing the effectiveness of relationship marketing: A meta-analysis”, Journal of Marketing, Vol.70 No.4, pp.136–153. Petronio, S. (1991), “Communication boundary management: A theoretical model of managing disclosure of private information between marital couples”, Communication Theory, Vol.1, pp.311–335. Petronio, S. (2002), Boundary of Privacy: Dialectics of Disclosure. SUNY Press, New York. Petronio,S., andReierson, J. (2009), “Regulating the privacy of confidentiality”, In: T.A. Afifi,and W.A.Afifi (Eds.), Uncertainty, Information Management, and Disclosure Decision: Theories and Application, Routledge, New York, pp.365–383. Quinn, R.E., and Spreitzer, G.M. (1991), “The psychometrics of the competing values culture instrument and an analysis of the impact of organization culture on quality of life”, Research in Organizational Change and Development,Vol.5, pp.115–142. Reichheld, F.F. (1996), “Learning from customer defection”, Harvard Business Review, Vol.74 No.2, pp.56−67. Riegelsberger, J., Sasse, M.A., and McCarthy, J.D. (2005), “The mechanics of trust: A framework for research and design”, International Journal of Human-Computer Studies, Vol.62, pp.759–781. Schein, E. (1985), “Coming to a new awareness of organizational culture”,Sloan Management Review, Vol.25 No.2, pp.3–16. Schoorman, F. D., Mayer, R. C., and Davis, J. H. (2007). “An integrative model of organizational trust: Past, present, and future”,Academy of Management Review, Vol.32 No.2, pp.344-354. Schumacher, S. (2010), “What employees should know about electronic performance monitoring”,ESSAI, Vol.8 No.38. Shao, Z., Feng, Y., and Liu, L. (2012), “The mediating effect of organizational culture and knowledge sharing on transformational leadership and enterprise resource planning systems success: An empirical study in China”,Computers in Human Behavior, Vol.28 No.6, pp.2400–2413. Sheppard, B.H., and Sherman, D.M. (1998), “The grammars of trust: A model and general implications”, The Academy of Management Review, Vol.23 No.3, pp.422–437. Simon, J.L. and Burstein, P. (1985), Basic Research Methods in Social Science (3rd ed.). Reading, New York: Random House. Sipior J.C., and Ward, B.T.(1995), “The ethical and legal quandary of email privacy”,Communications of the ACM, Vol.38 No.12, pp.48–54. Smith, H.J. (1993), “Privacy policies and practices: Inside the organizational maze”,Communications of the ACM, Vol.36 No.12, pp.105-122. Smith, W.P., and Tabak, F. (2009), “Monitoring employee e-mails: Is there any room for privacy?”,Academy of Management Perspectives,Vol.23 No.4, pp.33–48. Snyder, J.L. (2010), “E-mail privacy in the workplace”, Journal of Business Communication, Vol.47 No.3, pp.266–294. Solove, D.J., Rotenberg, M.,and Schwartz, P.M. (2006), Information Privacy Law(2nd ed.). Aspen Publishers, New York. Stanton, J., and Stam, K. (2003), “Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives”, Surveillance and Society, Vol.1 No.2, pp.152–190. Steers, R.M. (1977), “Antecedents and outcomes of organizational commitment”, Administrative Science Quarterly, Vol.22, pp.46-55. Suliman, A., and Iles, P.A. (2000), “Is continuance commitment beneficial to organizations? Commitment-performance relationship: A new look”, Journal of Managerial Psychology, Vol.15 No.5, pp.407–422. Sun, Y.L., Han, Z., and Liu, K.J.R. (2008), “Defense of trust management vulnerabilities in distributed networks”, IEEE Communications Magazine,Vol.46, pp.112–9. Taddei, S., and Contena, B. (2013), “Privacy, trust and control: Which relationships with online self-disclosure?”,Computers in Human Behavior,Vol.29 No.3, pp.821–826 Tenenhaus, M., Vinzi, V.E., Chatelin, Y.M., and Lauro.C. (2005), “PLS path modeling”, Computer Statistics Data Analysis,Vol.48 No.1, pp.159–205 Townsend, A.M., and Bennett, J.T. (2003), “Privacy, technology, and conflict: Emerging issues and action in workplace privacy”, Journal of Labor Research, Vol.24, pp.195–205. Trcek, D.(2009), “A formal apparatus for modeling trust in computing environments”, Mathematical and Computer Modeling, Vol.49, pp.226–233. US Department of Defense (1985), Trusted Computer System Evaluation Criteria. Department of Defense,USA. Utami, S., Soemarno, S., and Bisri, M. (2014), “Disaster risk and adaptation of settlement along the river brantas in the context of sustainable development, Malang, Indonesia”, Procedia Environmental Sciences, Vol.20, pp.602–611 Wilson, D.T., and Mummalaneni, V. (1988), Modeling and Measuring Buyer-Seller Relationships.Pennsylvania State University, PA. Wu, K.W., Huang, S.Y., Yen, D.C., and Popova, I. (2012), “The effect of online privacy policy on consumer privacy concern and trust”, Computers in Human Behavior, Vol.28 No.3, pp.889–897 Xu, H., Dinev, T., Smith, H.J., and Hart, P. (2008), “Examining the formation of individual’s privacy concerns: Toward an integrative view”, Proceedings of the 29th International Conference on Information Systems. Available at:http://aisel.aisnet.org/icis2008/6/ Yang, J., Mossholder, K.W. and Peng, T.K.( 2009), “Supervisory procedural justice effects: the mediating roles of cognitive and affective trust”, Leadership Quarterly , Vol.20, pp.143–154. Yerby, J. (2013), “Legal and ethical issues of employee monitoring”, Online Journal of Applied Knowledge Management, Vol.1 No.2, pp.44–55.
|