69
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

Information Protection at Telecommunications Firms: Human Resource Management Strategies and their Impact on Organizational Justice

Pages 49-77 | Published online: 10 Sep 2014

References

  • Adams, J. S. (1965). Inequity in social exchange. In L. Berkowitz (Ed.), Advances in experimental social psychology, Vol. 2. New York: Academic Press, 267–299.
  • Alder, G. S., Schminke, M., & Noel, T. W. (2007). The impact of individual ethics on reactions to potentially invasive HR practices. Journal of Business Ethics, 75 (2), 201–214.
  • Alge, B. J., Ballinger, G. A., & Green, S. G. (2004). Remote control: Predictors of electronic monitoring intensity and secrecy. Personnel Psychology, 57 (2), 377–411.
  • Allred, K. G. (1999). Anger and retaliation toward an understanding of impassioned conflict in organizations. In R. J. Bies, R. J. Lewicki, & B. H. Sheppard (Eds.), Research on Negotiation in Organizations, 7, 27–58. Greenwich, CT: JAI Press.
  • Ambrose, M. & Alder, G. S. (2000). Designing, implementing, and utilizing computerized performance monitoring: Enhancing organizational justice. Research in Personnel and Human Resources Management, 18, 187–219.
  • Andeman, B. S. (2007, July 27). Using GPS to track your friends, Office Server 2007 Ramblings. Accessed October 4, 2007. Available at: http://blogs.officezealot.com/bsandeman/archive/2007/07/27/20480.aspx
  • Angeles, R. (2009). Theoretical views on the potential shopper response to RFID item tagging. International Journal of Business Information Systems, 4 (1), 63–84.
  • Ashworth, L. & Free, C. (2006). Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns. Journal of Business Ethics, 67 (2), 107–123.
  • Bacal, R. (2004). Manager’s guide to performance reviews. New York: McGraw-Hill.
  • Ban, L. & Heng, G. (1995). Computer security issues in small and medium-sized enterprises. Singapore Management Review, 17 (1), 15–30.
  • Bartlett, D. & Smith, L. (2008). Managing the data loss crisis. Risk Management, 55 (6), 34–37.
  • Bauer, T., Morrison, E., & Callister, R. (1998). Organizational socialization: A review and directions for future research. Research in Personnel and Human Resource Management, 16, 149–214.
  • Bell, B. S. & Ford, J. K. (2007). Reactions to skill assessment: The forgotten factor in explaining motivation to learn. Human Resource Development Quarterly, 18 (1), 33–62.
  • Bentley, R. (2008, Jan. 15). Strictly confidential. Personnel Today, 18–21.
  • Bernardin, H. J., Buckley, M. R., Tyler, C. L., & Wiese, D. S. (2000). A reconsideration of strategies for rater training. Research in Personnel and Human Resources Management, 18, 221–274.
  • Berry, C. M., Sackett, P. R., & Wiemann, S. (2007). A review of recent developments in integrity test research. Personnel Psychology, 60 (2), 271–301.
  • Bies, R. J. & Moag, J. F. (1986). Interactional justice: Communication criteria of fairness. In Sheppard, B. H., Lewicki, R. J., & Bazerman, M. H. (Eds.), Research on negotiations in organizations, Vol. 1, 43–55. Greenwich, CT: JAI Press.
  • Blanchard, P. N. & Thacker, J. W. (2007). Effective training: Systems, strategies, and practices, third edition. Upper Saddle River, NJ: Pearson/Prentice-Hall.
  • Cardy, R. L. & Dobbins, G. H. (1994). Performance appraisal: Alternative perspectives. Cincinnati, Ohio: South-Western Publishing.
  • Cialdini, R. B. (2000). Influence: Science and practice. 4th ed. Needham Heights, MA: Allyn & Bacon.
  • Chen, J. V. & Pfleuger, P. (2008). Employee behavior towards surveillance technology implementation as an information assurance measure in the workplace. International Journal of Management and Enterprise Development, 5 (4), 497–511.
  • Chen, J. V. & Ross, W. H. (2005). The decision to implement electronic monitoring at work: A literature review and set of testable research propositions. International Journal of Organizational Analysis, 13 (3), 244–268.
  • Chen, M. J. & Miller, D. (1994). Competitive attack, retaliation and performance: An expectancy-valence framework. Strategic Management Journal, 15 (1), 85–102.
  • Cockcroft, S. (2002). Gaps between policy and practice in the protection of data privacy. Journal of Information Technology Theory and Application, 4 (3), 1–14.
  • Colquitt, J. A. (2001). On the dimensionality of organizational justice: A construct validation of a measure. Journal of Applied Psychology, 86 (3), 386–400.
  • Colquitt, J. A., Conlon, D. E., Wesson, M. J., Porter, C., & Ng, K. Y. (2001). Justice at the millennium: A meta-analytic review of 25 years of organizational justice research. Journal of Applied Psychology, 86 (3), 425–445.
  • Conlon, D. E., Meyer, C. J., & Nowakowski, J. M. (2005). What types of justice relate most strongly to key organizational outcomes? In J. Greenberg & J. A. Colquitt (Eds.), Handbook of organizational justice: Fundamental questions about fairness in the workplace. Mahwah, NJ: Lawrence Erlbaum Associates, 301–328.
  • Cropanzano, R. (Ed., 1993). Justice in the workplace, Vol. 1: Approaching fairness in human resource management. Hillsdale, NJ: Lawrence Erlbaum Associates.
  • Cropanzano, R., Bowen, D. E., & Gilliland, S. (2007). The management of organizational justice. Academy of Management Perspectives, 21 (4), 34–48.
  • Davidson, R. & Henderson, R. (2000). Electronic performance monitoring: A laboratory investigation of the influence of monitoring and difficulty on task performance, mood state, and self-reported stress levels. Journal of Applied Social Psychology, 30 (5), 906–920.
  • De Boer, E. M., Bakker, A. B., Syriot, J. E., & Schaufeli, W. B. (2002). Unfairness at work as a predictor of absenteeism. Journal of Organizational Behavior, 23 (2), 181–197.
  • DeCew, J. W. (1997). In pursuit of privacy: Law, ethics, and the rise of technology. Ithaca, NY: Cornell University Press.
  • Delery, J. & Doty, H. (1996). Modes of theorizing in strategic human resource management: Tests of universalistic, contingency, and configurational performance predictions. Academy of Management Journal, 39 (4), 802–835.
  • Deutsch, M. (1975). Equity, equality, and need: What determines which value will be used as the basis of distributive justice? Journal of Social Issues, 31 (1), 137–149.
  • Devanna, M. A., Fombrun, C., & Tichy, N. M. (1984). A framework for strategic human resource management. In C. Fombrun, N. M. Tichy, and M. A. Devanna (Eds.), Strategic human resource management. New York: Wiley, 33–56.
  • Dhanoa, D. S. & Kleiner, B. H. (2000). How to conduct due process discipline. Management Research News, 23 (7), 89–94.
  • Doering, B. W. (2005, Apr. 15). Ohio Bell Telephone Co. and District 4, Communications Workers of America. Labor Arbitration [Reports], 121, 129–134.
  • Drucker, P. F. (1954). The Practice of management. New York: Harper & Row.
  • Eison, R. J. & La Clere, R. (2006). Customer information: Protecting the organization’s most critical asset from misappropriation and identity theft. Journal of Information Privacy and Security, 2 (1), 3–16.
  • Euromonitor International (2008). Global Market Information Database. Accessed Feb. 8, 2008. www.euromonitor.com/
  • Folger, R. (1993). Reactions to mistreatment at work. In J. K. Murnighan (Ed.), Social Psychology in Organizations: Advances in Theory and Research. Englewood Cliffs, NJ: Prentice-Hall, 161–183.
  • Folger, R. & Greenberg, J. (1985). Procedural justice: An interpretive analysis of personnel systems. Research in personnel and human resources management, 3, 141–184.
  • Fortin, M. & Fellenz, M. R. (2008). Hypocrisies of fairness: Toward a more reflexive ethical base in organizational justice research and practice. Journal of Business Ethics, 78 (3), 415–433.
  • Garg, A., Curtis, J., & Halper, H. (2003). Quantifying the financial impact of IT security breaches. Information Management & Computer Security, 11 (2), 74–83.
  • Gatewood, R. D., Feild, H. S., & Barrick, M. (2008). Human Resource Selection, Sixth Edition. Mason, OH: Thomson-Southwestern.
  • Gerhart, B., Trevor, C., & Graham, M. (1996). New directions in employee compensation research. Research in Personnel and Human Resource Management, 14, 143–204.
  • Gilliland, S. W. (1994). Effects of procedural and distributive justice on reactions to a selection system. Journal of Applied Psychology, 79 (5), 691–701.
  • Gilliland, S. W. (2001). Improving applicants’ reactions to rejection letters: An application of fairness theory. Personnel Psychology, 54 (3), 669–703.
  • Gilliland, S. W. & Steiner, D. D. (Eds.). (2001). Causes and consequences of applicant perceptions of unfairness. In R. Cropanzano (Ed.), Justice in the workplace, Vol. 2: From theory to practice. Mahwah, NJ: Lawrence Erlbaum, 175–195.
  • Grandey, A. A. (2001). Family friendly policies: Organizational justice perceptions of need-based allocations. In Cropanzano (Ed.), Justice in the workplace, Vol. 2. Mahwah, NJ: Lawrence Erlbaum Associates, 145–174.
  • Greenberg, J. (1990). Employee theft as a reaction to underpayment inequity: The hidden cost of pay cuts. Journal of Applied Psychology, 75 (5), 561–568.
  • Greenberg, J. (1993). Stealing in the name of justice: Informational and interpersonal moderators of theft reaction to underpayment inequity. Organizational Behavior and Human Decision Processes, 54 (1), 81–103.
  • Greenemeier, L. (2007, Aug. 13). Data theft, pushback, and the TJX effect. Information Week, 1150, 36–42.
  • Gupta, A. & Hammond, R. (2005). Information systems security issues and decisions for small businesses: An empirical examination. Information Management & Computer Security, 13 (4), 297–310.
  • Hovorka-Mead, A. D., Whipple, T., & Renchin, M. B. (2002). Watching the detectives: Seasonal student employee reactions to electronic monitoring with and without advance notification. Personnel Psychology, 55 (2), 329–362.
  • Home Office [U.K.] (2007, May 24). Securing mobile phones by design. eGov Monitor. Accessed October 4, 2007. Available at: http://www.egovmonitor.com/node/11159
  • Hulin, C. L. & Rousseau, D. M. (1980). Analyzing infrequent events: Once you find them, your troubles begin. New Directions for Methodology of Social and Behavioral Sciences, 6, 65–75.
  • Huselid, M. (1995). The impact of human resource management practices on turnover, productivity and corporate financial performance. Academy of Management Journal, 38 (3), 635–672.
  • Jawahar, I. M. (2007). The influence of perceptions of fairness on performance appraisal reactions. Journal of Labor Research, 28 (4), 735–754.
  • Karim, W. (2004). The privacy implications of personal locators: Why you should think twice before voluntarily availing yourself to GPS monitoring. Washington University Journal of Law & Policy, 14 (1), 485–515.
  • Kemp, R. & Moore, A. D. (2007). Privacy. Library Hi Tech, 25 (1), 58–78.
  • Klein, H. & Weaver, N. (2000). The effectiveness of an organizational-level orientation training program in the socialization of new hires. Personnel Psychology, 53 (1), 47–66.
  • Koong, K. S., Liu, L. C., Bai, S., & Lin, B. (2008). Identity theft in the USA: Evidence from 2002 to 2006. International Journal of Mobile Communications, 6 (2), 199–216.
  • Lee, M. & Chang, T. (2007). Applying ISO 17799: 2005 in information security management. International Journal of Services and Standards, 3 (3), 352–373.
  • Leventhal, G. S. (1980). What should be done with equity theory? New approaches to the study of fairness in social relationships. In M. G. K. Gergen, R. Willis (Ed.), Social exchange: Advances in theory and research. New York: Plenum Press, 27–55.
  • Lind, E. A. (2001). Fairness heuristic theory: Justice judgments as pivotal cognitions in organizational relations. In J. Greenberg and R. Cropanzano (Eds.) Advances in organizational justice. Stanford, CA: Stanford University Press, 56–88.
  • Longenecker, C. O., Sims, H. P., & Gioia, D. A. (1987). Behind the mask: The politics of employee appraisal. Academy of Management Executive, 1 (3), 183–193.
  • McClean-Parks, J. & Kidder, D. L. (1994). “Till death us do part…” Changing work relationships in the 1990s. Trends in Organizational Behaviour, 1 (2), 111–136.
  • Moore, A. D. (2003). Privacy: Its meaning and value. American Philosophical Quarterly, 40 (3), 215–227.
  • Moorman, R. H. & Wells, D. L. (2003). Can electronic performance monitoring be fair? Exploring relationships among monitoring characteristics, perceived fairness, and job performance. Journal of Leadership & Organizational Studies, 10 (2), 2–16.
  • Murphy, K. R. & Cleveland, J. N. (1991). Performance appraisal: An organizational perspective. Boston: Allyn & Bacon.
  • Nolan, D. R. (1996, Sept. 23). Southwestern Bell Telephone Co., Cape Girardeau, Missouri and Communication Workers of America. Labor Arbitration [Reports], 107, 928–937.
  • Parker, D. B. (2003, July). Motivating the workforce to support security, Risk Management, 50 (7), 16–19.
  • Paskoff, S. M. (1996, August). Ending the workplace diversity wars. Training, 33 (8), 43–47.
  • Peelle III, H. E. (2007). Reciprocating perceived organizational support through citizenship behaviors. Journal of Managerial Issues, 14 (4), 554–575.
  • Ployhart, R. E. & Ryan, A. M. (1997). Toward an explanation of employee reactions: An examination of organizational justice and attribution frameworks. Organizational Behavior and Human Decision Processes, 72 (3), 308–335.
  • Ployhart, R. E., Ryan, A. M., & Bennett, M. (1999). Explanations for selection decisions: Applicants reactions to informational and sensitivity features of explanations. Journal of Applied Psychology, 84 (1), 87–106.
  • Praxiom Research Group, Ltd. (2008). ISO IEC 27002 (2005) information security standard translated into plain English. Accessed March 27, 2009. at: http://praxiom.com/iso-17799-2005.htm
  • Raghuram, S. & Arvey, R. (1994). Business strategy links with training and staffing practices. Human Resource Planning, 17 (3), 55–73.
  • Reid, L. A. (2006). Expert Opinion: Amanda M. Hubbard, J.D. Journal of Information Privacy & Security, 2 (1), 47–56.
  • Roberts, W. (2008, October). Stay ahead of the technology use curve. HRMagazine, 53 (10), 57–61.
  • Romano, N. C. & Fjermestad, J. (2007). Privacy and security in the age of electronic customer relationship management. International Journal of Information Security & Privacy, 1 (1), 85–106.
  • Ross, W. H. (2005, Summer). What every human resource manager should know about web logs. S.A.M. Advanced Management Journal, 70 (3), 4–14.
  • Rosse, J. G. & Hulin, C.L.. (1985). Adaptation to Work: An Analysis of Employee Health, Withdrawal, and Change. Organizational Behavior and Human Decision Processes, 36 (3), 324–348.
  • Rosse, J. G. & Miller, H. E. (1984). Relationship between absenteeism and other employee behaviors. In P.S. Goodman and R.S. Arkin (Eds.), Absenteeism: New approaches to understanding, measuring, and managing employee absence, San Francisco, CA: Josey-Bass, 194–228.
  • Rosse, J. G., Miller, J. L., & Ringer, R. C. (1996). The deterrent value of drug and integrity testing. Journal of Business and Psychology, 10 (4), 477–485.
  • Salgado, J. F. (2002). The Big Five personality dimensions and counterproductive behaviors. Journal of Selection and Assessment, 10 (1-2), 117–125.
  • Schweitzer, M. E. & Gibson, D. E. (2008). Fairness, feelings, and ethical decision-making: Consequences of violating community standards of fairness. Journal of Business Ethics, 77 (3), 287–301.
  • Shanley, A. & Crabb, C. (1998). Corporate espionage: No longer a hidden threat. Chemical Engineering, 105 (13), 82–96.
  • Shing, M. L., Shing, C. C., Chen, K. L., & Lee, H. (2007). Issues in information security curriculum: Collaborative learning and team teaching. International Journal of Innovation and Learning, 4 (5), 516–529.
  • Silvester, J., Anderson, N. R., & Patterson, F. (1999). Organizational culture change: An inter-group attributional analysis. Journal of Occupational and Organizational Psychology, 72 (1), 1–23.
  • Skarlicki, D. P. & Folger, R. (1997). Retaliation in the workplace: The roles of distributive, procedural and interactional justice. Journal of Applied Psychology, 82 (3), 434–443.
  • Smith, A. D. (2007). Establishing standards for wireless security in a security-conscious world. International Journal of Services and Standards, 3 (3), 263–276.
  • Stanton, J. M. (2000). Reactions to employee performance monitoring: Framework, review, and research directions. Human Performance, 13 (1), 85–114.
  • Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behaviors. Computers & Security, 24 (2), 124–133.
  • Steele, S. & Wargo, C. (2007). An introduction to insider threat management. Information Systems Security, 16 (1), 23–34.
  • Sutton, G. & Griffin, M. A. (2004). Integrating expectations, experiences, and psychological contract violations: A longitudinal study of new professionals. Journal of Occupational and Organizational Psychology, 77 (4), 493–515.
  • Taylor, C. (2007, Dec.). Incentives, behavior, and operational risk management in IT. The RMA Journal, 90 (4), 50–55.
  • Turner, D. (2006, July 4). Computer hacker arrests increase in Japan, [London, UK]. Financial Times, 24.
  • Van Iddekinge, C. H., Eidson, C. E., Kudisch, J. D., & Goldblatt, A. M. (2003). A biodata inventory administered via Interactive Voice Response (IVR) Technology. Journal of Business and Psychology, 18 (2), 145–156.
  • Waldman, D. A. & Atwater, L. E. (1998). The power of 360° feedback: How to leverage performance evaluations for top productivity. Houston, TX: Gulf.
  • Wall, M. (2007, July 29). The hi-tech way to mind that child. Sunday Times [UK], 14.
  • Wanek, J. E., Sackett, P. R., & Ones, D. S. (2003). Toward an understanding of integrity test similarities and differences: An item-level analysis of seven tests. Personnel Psychology, 56 (4), 873–894.
  • Werner, S. H., Joy, D. S., & Jones, J. W. (1991). Improving corporate profitability with preemployment integrity tests. In J. W. Jones (Ed.) Preemployment honesty testing: Current research and future directions. New York: Quorum Books, 53–62.
  • Westin, A. (1968). Privacy and freedom. New York, NY: Atheneum.
  • Wood, D. P. (1997, June 6). Schmidt v. Ameritech Corp. Individual Employment Rights Cases, 12, (Bureau of National Affairs Case (96-2067), 1627–1630.
  • Woods, D. R., Jr. & Savino, D. M. (2007). Do You Blush Often? Questions on Integrity and Personality Tests That Legally Embarrass Employers. Employee Relations Law Journal, 33 (1), 3–32.
  • Workman, M. & Gathegi, J. (2007, Jan.). Punishment and ethics deterrents: A study of insider security. Journal of the American Society for Information Science and Technology, 58 (2), 212–222.
  • Wright, P. M. & Snell, S. A. (1998). Strategy - HR fit: Does it really matter? Human Resource Planning, 21 (4), 56–57.
  • Yehle, L. C. (1996, Dec. 9). U.S. West Communications and Communication Workers of America. Labor Arbitration [Reports], 107, 791–796.
  • Zeidner, R. (2009, Jan.). Human resource data: Still breachable after all these years, HR Magazine, 54 (1), 52–53.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.