495
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

Losing information is like losing an arm: employee reactions to data loss

ORCID Icon
Pages 1297-1307 | Received 23 May 2019, Accepted 27 Aug 2019, Published online: 10 Sep 2019

References

  • Addis, M., R. Wright, and A. Miller. 2009. “The Significance of Storage in the ‘Cost of Risk’ of Digital Preservation.” International Journal of Digital Curation 4 (3): 104–122.
  • Alberts, I. 2013. “Challenges of Information System Use by Knowledge Workers: The Email Productivity Paradox.” Proceedings of the American Society for Information Science and Technology 50 (1): 1–10.
  • Barreau, D. 2006. “Personal Information Management in Context.” Paper presented at the at the 2006 ACM SIGIR Workshop on Personal Information Management in Seattle, Washington, August 10–11, 2006.
  • Belk, R. W. 1988. “Possessions and the Extended Self.” Journal of Consumer Research 15 (2): 139–168.
  • Belk, R. W. 2013. “Extended Self in a Digital World.” Journal of Consumer Research 40 (3): 477–500.
  • Belk, R. 2018. “Ownership: The Extended Self and the Extended Object.” In Psychological Ownership and Consumer Behavior, 53–67. Cham: Springer.
  • Bello Garba, A., J. Armarego, and D. Murray. 2015. “Bring Your Own Device Organizational Information Security and Privacy.” ARPN Journal of Engineering and Applied Sciences 10 (3): 1279–1287.
  • Bellotti, V., N. Ducheneaut, M. Howard, and I. Smith. 2003. “Taking Email to Task: The Design and Evaluation.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 345–352. Ft. Lauderdale, FL: ACM.
  • Bergman, O., and S. Whittaker. 2016. The Science of Managing Our Digital Stuff. Cambridge: MIT Press.
  • Bergman, O., S. Whittaker, and N. Falk. 2014. “Shared Files: The Retrieval Perspective.” Journal of the Association for Information Science and Technology 65 (10): 1949–1963.
  • Brey, P. 2000. “Technology as Extension of Human Faculties.” In Metaphysics, Epistemology and Technology. Research in Philosophy and Technology. Vol. 19, edited by C. Mitcham, 59–78. Amsterdam: Elsevier.
  • Brunsmann, J., W. Wilkes, G. Schlageter, and M. Hemmje. 2012. “State-of-the-art of Long-term Preservation in Product Lifecycle Management.” International Journal on Digital Libraries 12 (1): 27–39.
  • Bullough, R. V. 1991. “Exploring Personal Teaching Metaphors in Preservice Teacher Education.” Journal of Teacher Education 42 (1): 43–51.
  • Caine, R. M., and L. Ter-Bagdasarian. 2003. “Early Identification and Management of Critical Incident Stress.” Critical Care Nurse 23 (1): 59–65.
  • Carter, M. 2015. “Me, Myself, and I (T): Conceptualizing Information Technology Identity and Its Implications.” MIS Quarterly 39 (4): 931–957.
  • Case, A. 2010. “We Are All Cyborgs Now.” In TED Conferences. http://www.ted.com.
  • Chen, W., G. Huang, J. Miller, K. H. Lee, D. Mauro, B. Stephens, and X. Li. 2018. “‘As We Grow, It Will Become a Priority’: American Mobile Start-Ups’ Privacy Practices.” American Behavioral Scientist 62 (10): 1338–1355.
  • Chervenak, A., V. Vellanki, and Z. Kurmas. 1998. “Protecting File Systems: A Survey of Backup Techniques.” In Joint NASA and IEEE Mass Storage Conference. Vol. 99. Ft. Lauderdale, FL.
  • Clayton, R. B., G. Leshner, and A. Almond. 2015. “The Extended ISelf: The Impact of IPhone Separation on Cognition, Emotion, and Physiology.” Journal of Computer-Mediated Communication 20 (2): 119–135.
  • Cox, R. J. 2008. Personal Archives and a New Archival Calling: Readings, Reflections and Ruminations. Duluth, MN: Litwin Books.
  • Cushing, A. L. 2013. “‘It’s Stuff That Speaks to Me’: Exploring the Characteristics of Digital Possessions.” Journal of the American Society for Information Science and Technology 64 (8): 1723–1734.
  • D’Andrea, M., J. Daniels, R. Heck, and P. Whiting. 1992. “The Factor Analytic Structure of Personal Loss.” Measurement & Evaluation in Counseling & Development 25 (3): 121–132.
  • Downey, G. L., J. Dumit, and S. Williams. 1995. “Cyborg Anthropology.” Cultural Anthropology 10 (2): 264–269.
  • Drevin, L., H. A. Kruger, and T. Steyn. 2007. “Value-focused Assessment of ICT Security Awareness in an Academic Environment.” Computers & Security 26 (1): 36–43.
  • Ducheneaut, N., and V. Bellotti. 2001. “E-mail as Habitat: An Exploration of Embedded Personal Information Management.” Interactions 8 (5): 30–38.
  • Eivazi, K. 2011. “Computer Use Monitoring and Privacy at Work.” Computer Law & Security Review 27 (5): 516–523.
  • Emanuel, R., R. Bell, C. Cotton, J. Craig, D. Drummond, S. Gibson, … J. Lewis. 2015. “The Truth About Smartphone Addiction.” College Student Journal 49 (2): 291–299.
  • Ferraro, R., J. E. Escalas, and J. R. Bettman. 2011. “Our Possessions, Our Selves: Domains of Self-Worth and the Possession-Self Link.” Journal of Consumer Psychology 21 (2): 169–177.
  • Greenberger, D. B., and S. Strasser. 1986. “Development and Application of a Model of Personal Control in Organizations.” Academy of Management Review 11 (1): 164–177.
  • Grevet, C., D. Choi, D. Kumar, and E. Gilbert. 2014. “Overload Is Overloaded: Email in the Age of Gmail.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 793–802. Toronto, ON: ACM.
  • Guga, J. 2015. “Cyborg Tales: The Reinvention of the Human in the Information Age.” In Beyond Artificial Intelligence, 45–62. Cham: Springer.
  • Haraway, D. 2006. “A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late 20th Century.” In The International Handbook of Virtual Learning Environments, 117–158. Dordrecht: Springer.
  • Hayles, N. K. 2006. “Unfinished Work: From Cyborg to Cognisphere.” Theory, Culture & Society 23 (7–8): 159–166.
  • Jones, W. 2007. “Personal Information Management.” Annual Review of Information Science and Technology 41 (1): 453–504.
  • Keshet, Y., A. Popper-Giveon, and I. Liberman. 2015. “Intersectionality and Underrepresentation Among Health Care Workforce: The Case of Arab Physicians in Israel.” Israel Journal of Health Policy Research 4 (18): 1–13.
  • Kiran, A. H., and P. P. Verbeek. 2010. “Trusting Our Selves to Technology.” Knowledge, Technology & Policy 23 (3–4): 409–427.
  • Kleine, S. S., and S. M. Baker. 2004. “An Integrative Review of Material Possession Attachment.” Academy of Marketing Science Review 1 (1): 1–39.
  • Kruger, D. J., and J. M. Djerf. 2016. “High Ringxiety: Attachment Anxiety Predicts Experiences of Phantom Cell Phone Ringing.” Cyberpsychology, Behavior, and Social Networking 19 (1): 56–59.
  • Levy, D. 2007. Love and Sex with Robots: The Evolution of Human-Robot Relationships. New York: HarperCollins Publishers.
  • Massey, C., T. Lennig, and S. Whittaker. 2014. “Cloudy Forecast: An Exploration of the Factors Underlying Shared Repository Use.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2461–2470. Toronto, ON: ACM.
  • Mazis, G. 2008. Humans, Animals, Machines Blurring Boundaries. Albany: SUNY Press.
  • McLuhan, M. 1964. Understanding Media: The Extensions of Man. New York: MIT Press.
  • McMurtry, K. 2014. “Managing Email Overload in the Workplace.” Performance Improvement 53 (7): 31–37.
  • Morris, R. J., and B. J. Truskowski. 2003. “The Evolution of Storage Systems.” IBM Systems Journal 42 (2): 205–217.
  • Neuman, A., and O. Guterman. 2018. “Metaphors and Education: Comparison of Metaphors for Education Among Parents of Children in School and Home Education.” Pedagogy, Culture & Society 26 (3): 435–447.
  • Odom, W., A. R. Sellen, Harper, and E. Thereska. 2012. “Lost in Translation: Understanding the Possession of Digital Things in the Cloud.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 781–790. Austin, TX: ACM.
  • Park, Y. J., J. E. Chung, and D. H. Shin. 2018. “The Structuration of Digital Ecosystem, Privacy, and Big Data Intelligence.” American Behavioral Scientist 62 (10): 1319–1337.
  • Raymond, A. H. 2013. “Data Management Regulation: Your Company Needs an Up-to-Date Data/Information Management Policy.” Business Horizons 56 (4): 513–520.
  • Sas, C., and S. Whittaker. 2013. “Design for Forgetting: Disposing of Digital Possessions After a Breakup.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1823–1832. New York: ACM.
  • Sheth, J. N., and M. R. Solomon. 2014. “Extending the Extended Self in a Digital World.” Journal of Marketing Theory and Practice 22 (2): 123–132.
  • Sillman, K., and T. M. Dana. 2001. “Metaphor: A Tool for Promoting Prospective Elementary Teachers’ Participation in Science Teacher Learning Community.” Journal of Science Teacher Education 12 (2): 87–106.
  • Van Manen, M. 2017. “Phenomenology in Its Original Sense.” Qualitative Health Research 27 (6): 810–825.
  • Verbeek, P. P. 2008. “Cyborg Intentionality: Rethinking the Phenomenology of Human–Technology Relations.” Phenomenology and the Cognitive Sciences 7 (3): 387–395.
  • Whitman, M. E. 2003. “Enemy at the Gate: Threats to Information Security.” Communications of the ACM 46 (8): 91–95.
  • Whittaker, S., V. Bellotti, and J. Gwizdka. 2006. “Email in Personal Information Management.” Communications of the ACM 49 (1): 68–73.
  • Whittaker, S., O. Bergman, and P. Clough. 2010. “Easy on that Trigger Dad: A Study of Long Term Family Photo Retrieval.” Personal and Ubiquitous Computing 14 (1): 31–43.
  • Whittaker, S., and C. Sidner. 1996. “Email Overload: Exploring Personal Information Management of Email.” Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: Common Ground, 276–283. Vancouver, BC: ACM Press.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.