151
Views
0
CrossRef citations to date
0
Altmetric
Original Article

Hide and don’t seek: analyzing strategies for concealing organizations and their members

&
Pages 131-148 | Received 23 Jun 2016, Accepted 14 Apr 2017, Published online: 01 Jun 2018

References

  • Athanassiades, J. C. (1973). The distortion of upward communication in hierarchical organizations. Academy of Management Journal, 16(2), 207–226. doi:10.2307/255323.
  • Bean, H., & Buikema, R. J. (2015). De-constituting al-Qa’ida: CCO theory and the decline and dissolution of hidden organizations. Management Communication Quarterly, 29, 512–538. doi:10.1177/0893318915597300
  • Bettis-Outland, H. (1999). The impact of information distortion within the context of implementing and sustaining a market orientation. Journal of Strategic Marketing, 7(4), 251–263. doi:10.1080/096525499346369.
  • Bok, S. (1982). Secrets: On the ethics of concealment and revelation. New York, USA: Pantheon Books.
  • Buller, D. B., & Burgoon, J. K. (1996). Interpersonal deception theory. Communication Theory, 6, 203–242. doi:10.1111/j.1468-2885.1996.tb00127.x.
  • Caillouet, R., & Allen, M. (1996). Impression management strategies employees use when discussing their organization’s public image. Journal of Public Relations Research, 8(4), 211–227. doi:10.1207/s1532754xjprr0804_01.
  • Carley, K. M., & Lin, Z. (1997). A theoretical study of organizational performance under information distortion. Management Science, 43, 976–997. doi:10.1287/mnsc.43.7.976.
  • Charmaz, K. (2006). Constructing grounded theory: A practical guide through qualitative analysis. London, UK: Sage.
  • Cheney, G., & Christensen, L. T. (2001). Organizational identification: Linkages between internal and external communication. In F. M. Jablin & L. L. Putnam (Eds), The new handbook of organizational communication: Advances in theory, research, and methods (pp. 231–269). Thousand Oaks, CA: Sage.
  • Christensen, L. T., & Cheney, G. (2015). Peering into transparency: Challenging ideals, proxies, and organizational practices. Communication Theory, 25, 70–90. doi:10.1111/comt.12052
  • Corbin, J., & Strauss, A. (2008). Basics of qualitative research: Techniques and procedures for developing grounded theory (3rd ed.). Thousand Oaks, CA: Sage.
  • Cowton, C. J. (1998). The use of secondary data in business ethics research. Journal of Business Ethics, 17(4), 423–434. doi:10.1023/A:1005730825103
  • Dufresne, R. L., & Offstein, E. H. (2008). On the virtues of secrecy in organizations. Journal of Management Inquiry, 17(2), 102–106. doi:10.1177/1056492607313082
  • Eisenberg, E. M. (1984). Ambiguity as strategy in organizational communication. Communication Monographs, 51, 227–242. doi:10.1080/03637758409390197
  • Flyverbom, M., Leonardi, P. M., Stohl, C., & Stohl, M. (2016). The management of visibilities in the digital age: Introduction. International Journal of Communication, 10, 98–109.
  • Glaser, B. G., & Strauss, A. L. (1967). The discovery of grounded theory: Strategies for qualitative research. Chicago, IL: Aldine de Gruyter.
  • Grey, C., & Costas, J. (2016). Secrecy at work: The hidden architecture of organizational life. Stanford, CA: Stanford University Press.
  • Hirschman, A. O. (1970). Exit, voice, and loyalty: Responses to decline in firms, organizations, and states. Cambridge, MA: Harvard University Press.
  • Hoerl, K., & Ortiz, E. (2015). Organizational secrecy and the FBI’s COINTELPRO-Black nationalist hate groups program, 1967–1971. Management Communication Quarterly, 29, 590–615. doi:10.1177/0893318915597302
  • Hudson, B. A. (2008). Against all odds: A consideration of core-stigmatized organizations. Academy of Management Review, 33, 252–266. doi:10.5465/amr.2008.27752775
  • Hudson, B. A., & Okhuysen, G. A. (2009). Not with a ten-foot pole: Core stigma, stigma transfer, and improbable persistence of men’s bathhouses. Organization Science, 20, 134–153. doi:10.1287/orsc.1080.0368
  • McPhee, R. D., & Poole, M. S. (2001). Organizational structures and configurations. In F. M. Jablin & L. L. Putnam (Eds), The new handbook of organizational communication: Advances in theory, research and methods (pp. 503–543). Thousand Oaks, CA: Sage.
  • McPhee, R. D., & Zaug, P. (2000). The communicative constitution of organization: A framework for explanation. Electronic Journal of Communication/La Revue Electronique De Communication. 10, 1–16. Retrieved from http://www.cios.org/EJCPUBLIC/010/1/01017.html
  • Miles, M. B., & Huberman, A. M. (1994). Qualitative data analysis: A sourcebook of new methods. Thousand Oaks, CA: Sage.
  • O’Reilly, C. A. (1978). The intentional distortion of information in organizational communication: A laboratory and field investigation. Human Relations, 31(2), 173–193. doi:10.1177/001872677803100205
  • Schoeneborn, D., & Scherer, A. G. (2012). Clandestine organizations, al Qaeda, and the paradox of invisibility: A response to Stohl and Stohl. Organization Studies, 33, 963–971. doi:10.1177/0170840612448031
  • Scott, C. R. (2013). Anonymous agencies, backstreet businesses, and covert collectives: Rethinking organizations in the 21st century. Stanford, CA: Stanford University Press.
  • Scott, C. R., & Rains, S. A. (2005). Anonymous communication in organizations: Assessing use and appropriateness. Management Communication Quarterly, 19, 157–197. doi:10.1177/0893318905279191
  • Stohl, C., & Stohl, M. (2011). Secret agencies: The communicative constitution of a clandestine organization. Organization Studies, 32, 1197–1215. doi:10.1177/0170840611410839
  • Suddaby, R. (2006). From the editors: What grounded theory is not. Academy of Management Journal, 49, 633–642. doi:10.5465/AMJ.2006.22083020

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.