References
- Abril PS, Levin A, Del Riego A. 2012. Blurred boundaries: Social media privacy and the twenty-first-century employee. Am Bus Law J. 49(1):63–124.
- Ajzen I. 1991. The theory of planned behavior. Organ Behav Hum Decis Process. 50(2):179–211.
- Alder GS, Ambrose ML, Noel TW. 2006. The effect of formal advance notice and justification on Internet monitoring fairness: Much about nothing?. J Leadersh Organ Stud. 13(1):93–107.
- Alder GS, Noel TW, Ambrose ML. 2006. Clarifying the effects of Internet monitoring on job attitudes: The mediating role of employee trust. Inf Manage. 43(7):894–903.
- Ariss SS. 2002. Computer monitoring: benefits and pitfalls facing management. Inf Manage. 39:553–558.
- Bélanger F, Crossler RE. 2011. Privacy in the digital age: A review of information privacy research in information systems. MIS Q. 35(4):1017–1041.
- Bélanger F, Hiller JS, Smith WJ. 2002. Trustworthiness in electronic commerce: The role of privacy, security, and site attributes. J Strategic Inf Syst. 11(3/4):245.
- Boss SR, Kirsch LJ, Angermeier I, Shingler RA. 2009. If someone is watching, I’ll do what I’m asked: Mandatoriness, control, and information security. Eur J Inf Syst. 18(2):151–164.
- Bovens M. 2010. Two concepts of accountability: Accountability as a virtue and as a mechanism. West Eur Polit. 33(5): 946–967.
- Bradley J, Loucks J, Macaulay J, Medcalf R, Buckalew L. 2012. BYOD: A Global Perspective Harnessing Employee-Led Innovation. Cisco Systems, San Jose, CA.
- Bulgurcu B, Benbasat I. 2009. Analysis of consumers’ privacy breach consent: A resource dependency perspective. In: Workshop on Information Security & Privacy. Phoenix, AZ; 1–9.
- Caldwell C, Zeltmann S, Griffin K. 2012. BYOD (Bring Your Own Device). Compet. Forum 10(2):117–121.
- Canalys. 2012. Smartphones Overtake Client PCs in 2011. http://www.canalys.com/newsroom/smart-phones-overtake-client-pcs-2011
- Churchill GA. 1979. A paradigm for developing better measures of marketing constructs. J Mark Res. 16(1):64–73.
- Compeau DR, Higgins CA. 1995. Application of social cognitive theory to training for computer skills. Inf Syst Res. 6(2):118–143.
- Davis FD, Bagozzi RP, Warshaw PR. 1992. Extrinsic and intrinsic motivation to use computers in the workplace. J Appl Soc Psychol. 22(14):1111–1132.
- Davis FD. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3):319–340.
- Deshmukh Balaji A. 2006. Performance analysis of filtering software using Signal Detection Theory. Decis Support Syst. 42(2):1015–1028.
- Dinev T, Hart P. 2006 An extended privacy calculus model for e-commerce transactions. Inf Syst Res. 17(1): 61–80.
- Douthitt EA, Aiello JR. 2001. The role of participation and control in the effects of computer monitoring on fairness perceptions, task satisfaction, and performance. J Appl Psychol. 86(5): 867–874.
- Eivazi K. 2011. Computer use monitoring and privacy at work. Comput Law Secur Rev Int J Technol Pract. 27(5): 516–523.
- Fiberlink. 2012. Mobile Device Management (MDM) Policies: Best Practices Guide. http://www.webtorials.com/main/resource/papers/fiberlink/paper2/MDM_Policies_Best_Practices_Guide.pdf
- Gefen D, Straub DW, Boudreau M. 2000. Structural equation modeling and regression: Guidelines for research and practice. Commun Assoc Inf Syst. 4(7): 1–76.
- George JF. 1996. Computer-based monitoring: Common perceptions and empirical results. MIS Q. 20(4): 459–480.
- Gould D. 1996. Using vignettes to collect data for nursing research studies: How valid are the findings?. J Clin Nurs. 5(4): 207–212.
- Grant RA, Higgins C. 1991. The impact of computerized performance monitoring on service work: Testing a causal model. Inf Syst Res. 2(2): 116–142.
- Grant RA, Higgins CA. 1996. Computerized performance monitors as multidimensional systems: Derivation and application. ACM Trans Inf Syst. 14(2): 212–235.
- Greenleaf EA. 1992. Measuring extreme response style. Public Opin Q. 56(3): 328–351.
- Grodzinsky F, Gumbus A, Lilley S. 2010. Ethical implications of internet monitoring: A comparative study. Inf Syst Front. 12(4): 433–441.
- Hair JF, Black WC, Babin BJ, Anderson RE. 2010. Multivariate Data Analysis: A Global Perspective, Vol 7th ed. Pearson Education, Upper Saddle River, NJ.
- Hoover N. 2010. Stolen VA laptop contains personal data. http://www.darkreading.com/risk-management/stolen-va-laptop-contains-personal-data/d/d-id/1089135
- Hox JJ, Kreft IGG, Hermkens PLJ. 1991. The analysis of factorial surveys. Sociol Methods Res. 19(4): 493–510.
- Jasso G. 2006. Factorial survey methods for studying beliefs and judgments. Sociol Methods Res. 34(3): 334–423.
- Ketchum Global Research & Analytics. 2012. 2012 IT Risk/reward Barometer: US Consumer Edition.
- Kim EKJ. 2006. The new electronic discovery rules: a place for employee privacy?. Yale Law J. 115(6):1481–1490.
- Krill P. 2012. BYOD: A world of pain awaits IT. http://www.infoworld.com/article/2619520/byod/byod--a-world-of-pain-awaits-it.html
- Lee J, Crossler R, Warkentin M. 2013. Implications of monitoring mechanisms on bring your own device (BYOD) adoption. In: Proceedings of the 34th International Conference on Information Systems. Vol Milan, Italy; 1–12.
- Liao Q, Gurung A, Luo X, Li L. (2009). Workplace management and employee misuse: Does punishment matter? J Comput Inf Syst. 50(2):49–59.
- Lindell MK, Whitney DJ. 2001. Accounting for common method variance in cross-selectional research designs. J Appl Psychol. 86(1): 114–121.
- Liu C, Marchewka JT, Lu J, Yu C-S. 2005. Beyond concern—a privacy-trust-behavioral intention model of electronic commerce. Inf Manag. 42: 289–304.
- Loch KD, Conger S, Oz E. 1998. Ownership, privacy and monitoring in the workplace: A debate on technology and ethics. J Bus Ethics 17(6):653–663.
- MacKenzie SB, Podsakoff PM, Podsakoff NP. 2011. Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Q. 35(2): 293–334.
- Malhotra NK, Kim SS, Agarwal J. 2004. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Inf Syst Res. 15(4): 336–355.
- Marx GT, Sherizen S. 1986. Social Aspects of Changes in Worker Monitoring and Computer/communications Privacy and Security Practices. Washington, D.C.: The Office.
- McGrath JE. 1994. Methodology matters: Doing research in the behavioral and social sciences. In: Research Strategies. Vol Morgan Kaufmann Publishers, Inc.,San Francisco, CA; 152–169.
- Messmer E. 2012. Government IT strains under BYOD challenge. Netw World 29(7): 10.
- Miller S, Weckert J. 2000. Privacy, the workplace and the internet. J. Bus. Ethics 28(3): 255–265.
- Moore GC, Benbasat I. 1991. Development of an instrument to measure the perceptions of adopting an information technology innovation. Inf Syst Res. 2(3): 192–223.
- Pavlou PA. 2011. State of the information privacy literature: Where are we know and where should we go?. MIS Q. 35(4): 977–988.
- Podsakoff PM, MacKenzie SB, Lee J-Y, Podsakoff NP. 2003. Common method biases in behavioral research: A critical review of the literature and recommended remedies. J Appl Psychol. 88(5): 879–903.
- Podsakoff PM, MacKenzie SB, Podsakoff NP. 2012. Sources of method bias in social science research and recommendations on how to control it. Annu Rev Psychol. 63: 539–569.
- Raudenbush SW, Bryk AS, Congdon R. 2013. HLM for Windows, In: Version 7.01. Vol Scientific Software International,Lincolnwood, IL.
- Raudenbush SW, Bryk AS. 2002. Hierarchical Linear Models: Applications and Data Analysis Methods, Vol 1. Thousand Oaks, CA: Sage.
- Research in Motion. 2013. BlackBerry 10: Setting New Standards in Mobile Security. http://www.bizreport.com/whitepapers/blackberry_10_setting_new_standards.html
- Richardson HA, Simmering MJ, Sturman MC. 2009.A Tale of three perspectives: Examining post hoc statistical techniques for detection and correction of common method variance. Organ Res Methods 12 (4): 762–800.
- Rossi PH, Anderson AB. 1982. The factorial survey approach: An introduction. In: Measuring Social Judgments: The Factorial Survey Approach. Vol SAGE Publications, Inc
- Smith A. 2012. 46% of American Adults Are Smartphone Owners. http://www.pewinternet.org/2012/03/01/nearly-half-of-american-adults-are-smartphone-owners/
- Smith HJ, Dinev T, Xu H. 2011. Information privacy research: An interdisciplinary review. MIS Q. 35(4): 989–1015.
- Stanton JM. 2000. Traditional and electronic monitoring from an organizational justice perspective. J Bus Psychol. 15(1): 129–147.
- Steelman ZR, Hammer BI, Limayem M. 2014. Data collection in the digital age: Innovative. alternatives to student samples. MIS Q. 38(2): 355–378.
- Straub DW, Boudreau M, Gefen D. 2004. Validation guidelines for IS positivist research. Commun Assoc Inf Syst. 13(24):380–427.
- Straub DW, Limayem M, Karahanna-Evaristo E. 1995. Measuring system usage: Implications for IS theory testing. Manage Sci. 41(8):85–92.
- Tabak F, Smith W. 2005. Privacy and electronic monitoring in the workplace: A model of managerial cognition and relational trust development. Empl Responsib Rights J. 17(3): 173–189.
- Tang ZL, Hu Y, Smith MD. 2008. Gaining trust through online privacy protection: Self-regulation, mandatory standards, or caveat emptor. J Manag Inf Syst. 24(4): 153–173.
- Thompson RL, Higgins CA, Howell JM. 1991. Personal computing: Toward a conceptual model of utilization. MIS Q. 15(1): 125–142.
- Van Toorn C, Shu AY. 2010. Assessing the impact of organizational Internet and email monitoring policy on Australian employees. In: AMCIS 2010 Proceedings. Vol Lima, Peru; 1–12.
- Trevino LK. 1992. Experimental approaches to studying ethical-unethical behavior in organizations. Bus. Ethics Q. 2(2): 121–136.
- Vance A, Lowry PB, Eggett D. 2013. Using accountability to reduce access policy violations in information systems. J Manage Inf Syst. 29(4): 263–290.
- Vegosen J. 2010. Employee monitoring and pre-employment screening. Risk Manage 57(8): 29.
- Venkatesh V, Morris MG, Hall M, Davis GB, Davis FD. 2003. User acceptance of information technology: Toward a unified view. MIS Q. 27(3): 425–478.
- Venkatesh V, Thong JYL, Xu X. 2012. Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technolgoy. MIS Q. 36(1): 157–178.
- Vijayan J. 2012. NASA breach update: Stolen laptop had data on 10,000 users. http://www.computerworld.com/article/2493084/security0/nasa-breach-update--stolen-laptop-had-data-on-10-000-users.html
- Wallander L. 2009. 25 years of factorial surveys in sociology: A review. Soc Sci Res. 38(3): 505–520.
- Weeger A, Wang X, Gewald H. 2015. IT consumerization: BYOD-Program acceptance and its impact on employer attractiveness. J Comput Inf Syst. 56(1): 1–9.
- Whitten D, Hightower R, Lutfus S. 2014. Mobile device adaptation efforts: The impact of hedonic and utilitarian value. J Comp Inf Syst. 55(1): 48–58.
- Williams K, Harkins S, Latané B. 1981. Identifiability as a deterrent to social loafing: Two cheering experiments. J Personal Soc Psychol. 40(2): 303–311.
- Workman M. 2009. A field study of corporate employee monitoring: Attitudes, absenteeism, and the moderating influences of procedural justice perceptions. Inf Organ. 19(4): 218–232