693
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

The Relationship Between Workplace E-Mail Privacy and Psychological Contract Violation, and Their Influence on Trust in Top Management and Affective Commitment

&
Pages 121-129 | Published online: 22 Apr 2011

References

  • Allen , M. W. , Coopman , S. J. , Hart , J. L. , & Walker , K. L. ( 2007 ). Workplace surveillance and managing privacy boundaries . Management Communication Quarterly , 21 , 172 – 200 .
  • American Management Association . ( 2005 ). 2005 electronic monitoring and surveillance survey . Retrieved from http://www. amanet.org
  • American Management Association . ( 2007 ). 2007 electronic monitoring and surveillance survey: Over half of all employers combined fire workers for e-mail and Internet abuse . Retrieved from http://press. amanet.org/press-releases/177/2007-electronic-monitoring-surveillance-survey
  • Baron , R. M. , & Kenny , D. A. ( 1986 ). The moderator–mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations . Journal of Personality and Social Psychology , 51 , 1173 – 1182 .
  • Baxter , L. A. , & Montgomery , B. M. ( 1996 ). Relating: Dialogues and dialectics . New York , NY : Guilford .
  • D'Urso , S. C. ( 2006 ). Who's watching us at work? Toward a structural–perceptual model of electronic monitoring and surveillance in organizations . Communication Theory , 16 , 281 – 303 .
  • Ellis , K. , & Shockley-Zalabak , P. ( 2001 ). Trust in top management and immediate supervisor: The relationship to satisfaction, perceived organizational effectiveness, and information receiving . Communication Quarterly , 49 , 382 – 398 .
  • Gumpert , G. , & Drucker , S. J. (1998). The demise of privacy in a private world: From front porches to chat rooms. Communication Theory , 8, 408–425.
  • Johnson , J. L. , & O'Leary-Kelly , A. M. ( 2003 ). The effects of psychological contract breach and organizational cynicism: Not all social exchange violations are created equal . Journal of Organizational Behavior , 24 , 627 – 647 .
  • Lester , S. W. , Turnley , W. H. , Bloodgood , J. M. , & Bolino , M. C. ( 2002 ). Not seeing eye to eye: Differences in supervisor and subordinate perceptions of and attributions for psychological contract breach . Journal of Organizational Behavior , 23 , 39 – 56 .
  • Livio , S. K. ( 2010 ). N.J. Supreme Court upholds privacy of personal e-mail accessed at work . Retrieved from http://www.nj.com/news/index.ssf/2010/03/nj_supreme_court_sets_new_ruli.html
  • Mathieu , J. E. , & Zajac , D. ( 1990 ). A review and meta-analysis of the antecedents, correlates, and consequences of organizational commitment . Psychological Bulletin , 108 , 171 – 194 .
  • Meyer , J. P. , & Allen , N. J. ( 1991 ). A three-component conceptualization of organizational commitment . Human Resource Management Review , 1 , 61 – 89 .
  • Montana , J. C. ( 2004 ). Email, voice mail, and instant messaging: A legal perspective . Information Management Journal , 38 , 37 – 41 .
  • Naumann , E. ( 1993 ). Antecedents and consequences of satisfaction and commitment among expatriate managers . Group & Organization Management , 18 , 153 – 187 .
  • Petronio , S. ( 1991 ). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples . Communication Theory , 1 , 311 – 335 .
  • Petronio , S. ( 2007 ). Translational research endeavors and the practices of communication privacy management . Journal of Applied Communication Research , 35 , 218 – 222 .
  • Robinson , S. L. ( 1995 ). Violation of psychological contracts: Impact on employee attitudes . In L. E. Tetrick & J. Barling (Eds.), Changing employment relations: Behavioral and social perspectives (pp. 91 – 108 ). Washington , DC : American Psychological Association .
  • Robinson , S. L. ( 1996 ). Trust and breach of the psychological contract . Administrative Science Quarterly , 41 , 574 – 599 .
  • Robinson , S. L. , & Morrison , E. W. ( 2000 ). The development of psychological contract breach and violation: A longitudinal study . Journal of Organizational Behavior , 21 , 525 – 546 .
  • Rousseau , D. M. ( 1989 ). Psychological and implied contracts in organization . Employee Responsibilities and Rights Journal , 2 , 121 – 139 .
  • Rousseau , D. M. ( 1995 ). Promises in action: Psychological contracts in organizations . Newbury Park , CA : Sage .
  • Sewell , G. , & Barker , J. R. ( 2006 ). Coercion versus care: Using irony to make sense of organizational surveillance . Academy of Management Review , 31 , 934 – 961 .
  • Shockley-Zalabak , P. , Ellis , K. , & Winograd , G. ( 2000 ). What it means, why it matters . Organization Development Journal , 18 , 35 – 48 .
  • Snyder , J. L. ( 2010 ). Email privacy in the workplace: A boundary regulation perspective . Journal of Business Communication , 47 , 266 – 294 .
  • Snyder , J. L. , & Cornetto , K. M. ( 2009 ). Employee perceptions of email monitoring from a boundary management perspective . Communication Studies , 60 , 476 – 492 .
  • Tompkins , P. K. , & Cheney , G. ( 1985 ). Communication and unobtrusive control in contemporary organizations . In R. McPhee & P. K. Tompkins (Eds.), Organizational communication: Traditional themes and new directions (pp. 179 – 210 ). Newbury Park , CA : Sage .
  • Turnley , W. H. , & Feldman , D. C. ( 2000 ). Re-examining the effects of psychological contract violations: Unmet expectations and job dissatisfaction as mediators . Journal of Organizational Behavior , 21 , 25 – 42 .
  • Websense . ( 2006 ). Websense, Inc. Web @ Work Survey 2006 . Retrieved from http://www.websense.com/global/en/PressRoom/MediaCenter/Research/webatwork/Employee_Computing.pdf
  • Weisband , S. P. , & Reinig , B. A. ( 1995 ). Managing users' perceptions of email privacy . Communications of the ACM , 38 ( 12 ), 40 – 47 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.