:::

詳目顯示

回上一頁
題名:企業智慧財產管理:組織文化與資訊監控對營業秘密保護之成效
作者:劉彥青
作者(外文):Yen-Ching Liu
校院名稱:國立中興大學
系所名稱:科技管理研究所
指導教授:張樹之
學位類別:博士
出版日期:2017
主題關鍵詞:信任組織文化隱私資訊監控承諾遵循TrustOrganizational culturePrivacyInformation monitoringCommitmentCompliance
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:1
企業組織常運用各種策略在商業競爭上,而營業秘密則是商業競爭中最具價值的資產。企業組織採用各種方式來保護營業秘密,但是企業組織中重要資訊的洩漏事件仍然層出不窮,組織保護方式無法有效地使員工遵循規定。瞭解在保護措施過程中,組織措施及員工態度之間的差異是極為重要的。本研究試著找出為什麼員工遵循保護措施與組織預期有所落差,進而本研究評估員工對於組織保護措施的接受度與績效表現。
本研究藉由三個子研究,以不同因素包含組織文化、資訊監控及隱私風險來瞭解為什麼員工對組織規範的遵循。首先探討隱私風險對於員工信任、承諾及遵循之間的關係,接著探討組織文化及隱私風險對員工信任的影響,最後全面性探討組織文化、隱私風險及信任對員工對組織保護措施的承諾與遵循。控制型的組織文化對於員工在隱私的及信任有顯著負面的影響,同時資訊監控及隱私風險也會降低員工對於組織的信任,因此影響員工對企業組織保護營業秘密上不同程度的承諾與遵循。
本研究結果對於企業管理智慧財產實務上極有貢獻。企業組織管理員工保護營業秘密只有規定或指令是無法達成,員工在心理層面上排斥企業組織硬性的強制保護措施。因此藉由組織文化及信任的考量,可以促使企業組織達到保護的最終目的。此外本研究對於學術也有相當貢獻,過去極少數研究針對組織營業秘密的成效,本研究透過不同層面的探討,瞭解不同企業保護營業秘密的影響因素。
Organizations use various strategies to compete in business and their trade secrets are the most valuable assets to advance in the competition. Organizations utilize different measures to safeguard their trade secrets. However, incidents of disclosing important organizational information still occur now and then. Organizational protection measures are not fully efficient in preventing employees from misconducts. It is important to understand the gap between organizational practices and employees’ perspective on the various protecting process. Therefore, this study intends to understand why employees disclose trade secrets by investigating different factors, including organizational culture, information monitoring, and privacy risks. Also, this study attempts to find out why there is a gap between employees’ compliance and organizational expectation in information monitoring. Further, this study evaluates the relationship between employees’ perception of organizational practices and employee performance in organizations.
This research is intended to be divided into three parts. The first part of the research is to build a model consisting two layers of constructs to explore the influence of privacy on trust. The second part of the research is to expand the research into three layers of constructs including organizational culture, privacy and employees’ trust, commitment and compliance. The final part of the research is to examine the relationships among all the factors mentioned in this research by building a complex model. The three parts of the research provide both focused perspectives and complete view of current practiced practice of employee monitoring in trade secret protection. Control-oriented organizational culture affects negatively on employees’ privacy concerns and trust. Information monitoring and privacy infringement also lower employees’ trust, and further affect employees’ commitment and compliance to trade secret protection in enterprises.
The findings provide practical contribution to enterprise management of intellectual property. Trade secret cannot be protected only by rules and orders. Employees feel psychological resistance when they are forced to accept the practice of monitoring in trade secret protection. Enterprises must consider the factor of organizational culture and privacy concerns in order to increase their employee’s trust. The findings also provide theoretical contributions to academic research relating to the implementation of monitoring. The effect of trade secret protection is rarely studied. This research explores the antecedents of trade secret protection by including different factors so the influential relationships in enterprise management of trade secrets are understood.
Allen, M.W., Walker, K.L., Coopman, S.J., and Hart, J.L. (2007), “Workplace surveillance and managing privacy boundary”, Management Communication Quarterly, Vol.21 No.2, pp.172–200.
Allen, N. J., and Meyer, J. P. (1990), “The measurement and antecedents of affective, continuance and normative commitment to the organization”, Journal of Occupational Psychology, Vol.63 No.1, pp.1–18.
Almeling, D.S., Snyder, D.W., Sapoznikow, M., McCollum, W.E.,and Weader, J. (2010), “A statistical analysis of trade secret litigation in state courts”, Gonzaga Law Review, Vol.46 No.1, pp.57–101.
Altman, I., Vinsel, A., and Brown, B. (1981), “Dialectic conceptions in social psychology: An application to social penetration and privacy regulation”, Advances in Experimental Social Psychology,Vol.14, pp.107–160.
Anderson, E., Fornell, C., and Lehman, D.R. (1994), “Customer satisfaction, market share, and profitability: Findings from Sweden”, Journal of Marketing, Vol.58 No.3, pp.53−66.
Anderson, J.C., and Narus, J.A. (1990), “A model of distributor firm and manufacturer firm working partnerships”, Journal of Marketing, Vol.54 No.1, pp.42–58.
ASIS International (2007),Trends in Proprietary Information Loss, Survey Report, June 2007. Alexandria, Virginia: ASIS International. https://foundation.asisonline.org/FoundationResearch/Publications/Documents/trendsinproprietaryinformationloss.pdf
Bahtiyar, S., and UfukÇağlayan,M.(2012), “Extracting trust information from security system of a service”, Journal of Network and Computer Applications,Vol.35 No.1, pp.480–490.
Ball, K., Daniel, E.M.,and Stride, C. (2012), “Dimensions of employee privacy: an empirical study”,Information, Technology & People,Vol.25 No.4, pp.376–394.
Bansal G., and Zahedi, F.M. (2015), “Trust violation and repair: The information privacy perspective”,Decision Support Systems,Vol.71, pp.62–77.
Barclay, D., Thompson, R., and Higgins, C. (1995), “The partial least squares (PLS) approach to causal modeling: Personal computeradoption and use an illustration”,Technology Studies, Vol.2 No.2, pp.285-309.
Baxter, L.A., and Montgomery, B.M. (1996), Relating: Dialogues and dialectics. Guilford Press, New York.
Bélanger, F., Hiller, J.,and Smith, W.J. (2002),“Trustworthiness in electronic commerce: The role of privacy, security, and site attributes”, Journal of Strategic Information System, Vol.11 No.3, pp.245–270.
Bélanger, F.,and Hiller, J.S. (2006),“A framework for e-government: Privacy implications”, Business Process Management Journal,Vol.12 No.1, pp.48–60.
Beldad, A., de Jong, M., and Steehouder, M. (2011), “I trust not therefore it must be risky: Determinants of the perceived risks of disclosing personal data for e-government transactions”, Computers in Human Behavior, Vol.27, pp.2233–2242.
Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A.D. (2003), “Experience with the KeyNote Trust Management System: Applications and Future Directions”, In: Proceedings of the 1st International Conference on Trust Management.Available at: http://www.cs.columbia.edu/~angelos/Papers/newkeynote.pdf
Boggs, W.B. (2004), “TQM and organizational culture: a case study”, The Quality Management Journal, Vol.11 No.2, pp.42–52.
Botan, C. (1996), “Communication work and electronic surveillance: A model for predicting panoptic effects”, Communication Monographs, Vol.63, pp.293–313.
Cameron, K.S., and Freeman, S.J. (1991), “Culture congruence strength and type: Relationship to effectiveness”, Research in Organizational Change and Development, Vol.5, pp.23–58.
Careerbuilder (2011),Half of American Workers Will Shop Online at Work This Holiday Season.Available at: http://www.careerbuilder.com/share/aboutus/pressreleasesdetail.aspx?id=pr6
Carnevale, D. G., and Wechsler, B. (1992), “Trust in the public-sector - Individual and organizational determinants”, Administration and Society, Vol.23, pp.471–494.
Chang, S.E., and Ho, C.B. (2006), “Organizational factors to the effectiveness of implementing information security management”, Industrial Management and Data Systems, Vol.106 No.3, pp.345–361
Chang, S.E., and Lin, C.S. (2007), “Exploring organizational culture for information security management”, Industrial Management and Data Systems, Vol.107 No.3, pp.438–458.
Clarke, R. (1999),“Internet privacy concerns confirm the case for intervention”,Communication of the ACM,Vol. 42 No.2, pp.60–67.
Colquitt, J.A., and Greenberg, J. (2003), “Organizational justice: A fair assessment of the state of the literature”, In: J.Greenberg (Ed.), Organizational Behaivor: The STATE of the Literature. Lawrence Erlbaum Associates, Mahwah, NJ, pp.165–210.
Cooper B., and Hecker, R. (2015), TheElectronic Workplace Survey: Analysis of the First National Survey on Employee Attitudes to Electronic Monitoring and Surveillance in the Australian Workplace. Monash University, Melbourne. Available at: http://www.buseco.monash.edu.au/mgt/news/documents/electronic-report.pdf.
Costa, A.C.( 2003),“Work team trust and effectiveness”, Personnel Review,Vol.32No.5, pp.605–22.
D’Urso, S. (2006), “Who’s watching us at work? Toward a structural–perceptual model of electronic monitoring and surveillance in organizations”, Communication Theory, Vol. 16 No. 3, pp.281–303.
De Cremer, D., and Tyler, T.R. (2007), “The effects of trust in authority and procedural fairness on cooperation”, Journal of Applied Psychology, Vol.92, pp.639–649.
deVries, R.E., and van Gelder, J.-L. (2015),“Explaining workplace delinquency: The role of honesty–humility, ethical culture, and employee surveillance”,Personality and Individual Differences,Vol.86, pp.112–116.
Deal, T., and Kennedy, A. (1982), Corporate Culture: The Rites and Rituals of Corporate Life. Addison-Wesley, New York.
Denison, D.R., Haaland, S., and Goelzer, P. (2004), “Corporate culture and organizational effectiveness: Is Asia different from the rest of the world?”,Organizational Dynamics, Vol.33 No.1, pp.98-109.
DePree, C., and Jude, R. (2006), “Who’sreading your office email? Is that legal?”,Strategic Finance, Vol.87 No.10, pp.44–47.
Desprochers, S., and Roussos, A., (2001), “The jurisprudence of surveillance: A critical look at the laws of intimacy”, Working Paper, Lex Electronica, Vol.6 No.2, Available at: http://www.lex-electronica.org/articles/v6-2/>
Deutsch, M. (1958), “Trust and suspicion”, The Journal of Conflict Resolution, Vol.2, pp.265–79.
Dietz, D.,and Hartog, D.N. (2006), “Measuring trust inside organizations,” Personnel Review, Vol.35 No.5, pp.557–588.
Dijke, M.H., and Verboon, P.(2010), “Trust in authorities as a boundary condition to procedural fairness effects on tax compliance”, Journal of Economic Psychology, Vol.31 No.1, pp.80–91.
Doney, P.M., Cannon, J.P., and Mullen, M.R. (1998), “Understanding the influence of national culture on the development of trust”, Academy of Management Review, Vol.23 No.3, pp.601–620.
Douglas, M. (1985), Measuring Culture: A Paradigm for the Analysis of Social Organization. Columbia University Press, New York.
Eastlick, M.A., Lotz, S.L., and Warrington, P. (2006), “Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment”, Journal of Business Research,Vol.59No.8, pp.877–886
Eddy, E.R., Stone, D.L., and Stone-Romero, E.E. (1999), “The effects of information management policies on reactions to human resource information systems: An integration of privacy and procedural justice perspectives”, Personnel Psychology, Vol.52, pp.335–358.
Etzioni, A. (1961), A Comparative Analysis of Complex Organizations. The Free Press of Glencoe, New York.
Fairweather, N.B. (1999), “Surveillance in employment- the case of teleworking”, Journal of Business Ethics, Vol.22, pp.39–49.
Fazekas, P., (2004), “1984 is still fiction: Electronic monitoring in the workplace and U.S. privacy”,Duke Law and Technology Review, Vol.15. Available at: http://www.law.duke.edu/journals/dltr/articles/PDF/2004DLTR-0015.pdf
Fornell, C., Larcker, D.F. (1981), “Evaluating structural equation models with unobservablevariables and measurement error”,Journal of Marketing Research, Vol.18 No.1, pp.39-50.
Fornell. C., and Larcker, D.F. (1981), “Evaluating structural equation models with unobservable variables and measurement error”, Journal of Marketing Research,Vol.18 No.1, pp.39–50.
Gambetta, D. (2000), “Canwe trust trust?”,In: D. Gambetta (ed.) Trust: Making and Breaking Cooperative Relations. Department of Sociology, University of Oxford, pp. 213–237.Available at: http://www.sociology.ox.ac.uk/papers/gambetta213-237.pdf
Gefen, D., Karahanna, E., and Straub, D.W. (2003), “Trust and TAM in online shopping: An integrated model”, MIS Quarterly, Vol.27 No.1, pp.51–90.
Gollmann, D. (2006), “Why trust is bad for security”, Electronic Notes in Theoretical Computer Science,Vol.157, pp.3–9
Grandison, T., and Sloman, M. (2000), “A survey of trust in internet applications”, IEEE Communications Survey,Vol. 3, pp.2–16.
Greenaway, K.E., and Chan, Y.E. (2005), “Theoretical Explanations for Firms’ Information PrivacyBehaviors”, Journal of the Association for Information Systems, Vol.6 No.6, pp.171-198.
Hagberg, R., and Heifetz, J. (1997), Corporate Culture: Telling the CEO the Baby is Ugly. Available at: www.hcgnet.com/research.asp?id=6
Hair, J.F., Ringle, C.M., and Sarstedt, M. (2011), “PLS-SEM: Indeed a silver bullet”,Journal of Marketing Theory and Practice,Vol.19 No.2, pp.139–151.
Hart, K. (2000),The Memory Bank: Money in an Unequal World. Profile Books Ltd., Cambridge, England.
Hausman, A., and Johnston, W.J. (2010), “The impact of coercive and non-coercive forms of influence on trust, commitment, and compliance in supply chains”, Industrial Marketing Management, Vol.39, pp.519–526.
Haws, K. L., Dholakia, U. M., and Bearden, W. O. (2010), “An assessment of chronic regulatory focus measures”, Journal of Marketing Research, Vol.47 No.5, pp.967–982.
Henseler, J., Ringle, C.M., andSinkovics, R.R. (2009), “The use of partial least squares path modeling in international marketing”, Advances in International Marketing, Vol.20, pp.277–319.
Holland, P., Copper, B. and Hecker, R. (2012), The Electronic Workplace Survey: Analysis of the First National Survey on Employee Attitudes to Electronic Monitoring and Surveillance in the Australian Workplace. Monash University, Melbourne.
Hollander, B. (2001),“It pays to understand law on trade secrets”, Louisville Business First. Available at: http://www.bizjournals.com/louisville/stories/2001/02/26/editorial2.html
Hon, A.H.Y., and Lu, L. (2010), “The mediating roles of trust between expatriate procedural justice and employee outcomes in the Chinese hotel industry”,International Journal of Hospitality Management,Vol.29 No.4,pp.669-676.
Hoven, D.J.D. (1997), “Computer ethics and moral methodology”, Metaphilosophy, Vol.28, No.3, pp.234–248
Hsu,M.H., Chang, C.M., and Yen, C.H. (2011), “Exploring the antecedents of trust in virtual communities”, Behaviourand Information Technology, Vol.30 No.5, pp.587–601.
Hulland, J. (1999), “Use of partial least squares (PLS) in strategic management research: A review of four recent studies”, Strategic Management Journal, Vol.20 No.2, pp.195–204.
Ifinedo, P. (2012), “Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory”, Computers and Security, Vol.31, pp.83–95.
Ifinedo, P. (2014), “Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition”, Information and Management, Vol.51, pp.69–79.
Jahansoozi, J. (2006),“Organization-stakeholder relationships: Exploring trust and transparency”, Journal of Management Development, Vol.25 No.10, pp.942–955.
Kim, K., and Kim, J. (2011), “Third-party privacy certification as an online advertising strategy: An investigation of the factors affecting the relationship between third-party certification and initial trust”, Journal of Interactive Marketing, Vol.25 No.3, pp.145–158.
Kogler,C., Batrancea, L., Nichita, A., Pantya, J., Belianin, A., and Kirchler, E. (2013), “Trust and power as determinants of tax compliance: Testing the assumptions of the slippery slope framework in Austria, Hungary, Romania and Russia”, Journal of Economic Psychology, Vol.34, pp.169-180.
Koller, M. (1988), “Risk as a determinant of trust”, Basic and Applied Social Psychology, Vol.9 No.4, pp.265–276.
Kramer, R.M. (1996), “Divergent realities and convergent disappointments in the hierarchic relation: Trust and the intuitive auditor at work”, In: R.M.Kramer, and T.R.Tyler (Eds.), Trust in Organizations: Frontiers of Theory and Research.Sage Publications, Thousand Oaks, CA, pp.216–245.
Krasnova, H., Veltri, N.F., and Günther, O. (2012),“Self-disclosure and privacy calculus on social networking sites: The role of culture”,Business & Information Systems Engineering, Vol.4 No.3, pp.127–135.
Laurence, G.A., Fried, Y. andSlowik, L.H. (2013), “‘My space’: A moderated mediation model of the effect of architectural and experienced privacy and workspace personalization on emotional exhaustion at work”, Journal of Environmental Psychology, Vol.36, pp.144–152
Lee, S., and Kleiner, B.H. (2003), “Electronic surveillance in the workplace”, Management Research News, Vol.26 No.2, pp.72–81.
Lin, C.P. (2007), “To share or not to share: Modeling tacit knowledge sharing, its mediators and antecedents”, Journal of Business Ethics, Vol.70 No.4, pp.411–428.
Lind, E.A. (2001), “Fairness heuristic theory: Justice judgments as pivotal cognitions in organizational relations”, In: J. Greenberg, and R. Cropanzano (Eds.), Advances in Organizational Justice. Stanford University Press, Stanford, CA.
Liu, C.,Marchewka, J.T., Lu, J., and Yu, C.S. (2005), “Beyond concern–A privacy-trust-behavioral intention model of electronic commerce,” Information & Management, Vol.42 No.2, pp.289–304.
Luchak, A.A., and Gellatly, I.R. (2007), “A comparison of linear and nonlinear relations between organizational commitment and work outcomes”, The Journal of Applied Psychology, Vol.92 No.3, pp.786–793.
Lupton, D. (1999), Risk. Routledge,London, UK.
Marshall, P. (2001), “Privacy under attack: Are tougher laws needed to protect citizens?”,Congressional Quarterly, Vol.11 No.19, pp.1–30.
Mayer, R.C., Davis, J.H., and Schoorman, F.D. (1995), “An integrative model of organizational trust”, Academy of Management Review, Vol.20, pp.709–734.
McGrath, J.E. (1984),Groups: Interaction and performance. Prentice-Hall, Englewood Cliffs, NJ.
McKnight, D.H., Cummings, L.L., and Chervany, N.L. (1998), “Initial trust formation in new organizational relationships”, The Academy of Management Review, Vol.23 No.3, pp.473–490.
McKnight, D.H., Kacmar, C.J., and Choudhury, V. (2004), “Dispositional trust and distrust distinctions in predicting high- and low-risk internet expert advice site perceptions”,e-Service Journal, Vol.3 No.2, pp.35-58.
Meyer, J.P., Allen, N.J., and Smith, C.A. (1993), “Commitment to organizations and occupations: Extension and test of a three-component conceptualization”, Journal of Applied Psychology, Vol.78 No.4, pp.538–551.
Meyer, J.P., and Herscovitch, L. (2001), “Commitment in the workplace: Toward a general model”, Human Resource Management Review, Vol.11 No.3, pp.299–326.
Meyer, J.P., Stanley, D.J., Herscovitch, L., and Topolnytsky, L. (2002), “Affective, continuance and normative commitment to the organization: A meta-analysis of antecedents, correlates and consequences”, Journal of Vocational Behavior, Vol.61 No.1, pp.20–52.
Milberg, S.J., Smith, H.J., and Burke, S.J. (2000), “Information privacy: Corporate management and national regulation”, Organization Science,Vol.11 No.1, pp.35–57.
Mitrou,L., and Karyda, M.(2006),“Employeesprivacy vs. employerssecurity: Can they be balanced?”, Telematics and Informatics, Vol.23, pp.164–178.
Moorman, C., Deshpande, R., and Zaltman, G. (1993), “Factors affecting trust in market research relationships”, Journal of Marketing, Vol.57 No.1, pp.81−101.
Morgan, R.M., and Hunt, S.D. (1994), “The commitment-trust theory of relationship marketing”, Journal of Marketing, Vol.58 No.3, pp.20–38.
Morrow, P.C. (1993), TheTheory and Measurement of Work Commitment. JAI Press, Greenwich, CT.
Morrow, P.C., McElroy, J.C., and Scheibe, K.P. (2012), “Influencing organizational commitment through office redesign”, Journal of Vocational Behavior, Vol.81, pp. 99–111.
Nofer, M.D.,Hinz, O., Muntermann,J.,and Roßnagel, H. (2014),“The Economic impact of privacy violations and security breaches: A laboratory experiment”, Business & Information Systems Engineering, Vol.6No.6, pp.339–348.
Palmatier, R.W., Dant, R.P., Grewal, D., and Evans, K.R. (2006), “Factors influencing the effectiveness of relationship marketing: A meta-analysis”, Journal of Marketing, Vol.70 No.4, pp.136–153.
Petronio, S. (1991), “Communication boundary management: A theoretical model of managing disclosure of private information between marital couples”, Communication Theory, Vol.1, pp.311–335.
Petronio, S. (2002), Boundary of Privacy: Dialectics of Disclosure. SUNY Press, New York.
Petronio,S., andReierson, J. (2009), “Regulating the privacy of confidentiality”, In: T.A. Afifi,and W.A.Afifi (Eds.), Uncertainty, Information Management, and Disclosure Decision: Theories and Application, Routledge, New York, pp.365–383.
Quinn, R.E., and Spreitzer, G.M. (1991), “The psychometrics of the competing values culture instrument and an analysis of the impact of organization culture on quality of life”, Research in Organizational Change and Development,Vol.5, pp.115–142.
Reichheld, F.F. (1996), “Learning from customer defection”, Harvard Business Review, Vol.74 No.2, pp.56−67.
Riegelsberger, J., Sasse, M.A., and McCarthy, J.D. (2005), “The mechanics of trust: A framework for research and design”, International Journal of Human-Computer Studies, Vol.62, pp.759–781.
Schein, E. (1985), “Coming to a new awareness of organizational culture”,Sloan Management Review, Vol.25 No.2, pp.3–16.
Schoorman, F. D., Mayer, R. C., and Davis, J. H. (2007). “An integrative model of organizational trust: Past, present, and future”,Academy of Management Review, Vol.32 No.2, pp.344-354.
Schumacher, S. (2010), “What employees should know about electronic performance monitoring”,ESSAI, Vol.8 No.38.
Shao, Z., Feng, Y., and Liu, L. (2012), “The mediating effect of organizational culture and knowledge sharing on transformational leadership and enterprise resource planning systems success: An empirical study in China”,Computers in Human Behavior, Vol.28 No.6, pp.2400–2413.
Sheppard, B.H., and Sherman, D.M. (1998), “The grammars of trust: A model and general implications”, The Academy of Management Review, Vol.23 No.3, pp.422–437.
Simon, J.L. and Burstein, P. (1985), Basic Research Methods in Social Science (3rd ed.). Reading, New York: Random House.
Sipior J.C., and Ward, B.T.(1995), “The ethical and legal quandary of email privacy”,Communications of the ACM, Vol.38 No.12, pp.48–54.
Smith, H.J. (1993), “Privacy policies and practices: Inside the organizational maze”,Communications of the ACM, Vol.36 No.12, pp.105-122.
Smith, W.P., and Tabak, F. (2009), “Monitoring employee e-mails: Is there any room for privacy?”,Academy of Management Perspectives,Vol.23 No.4, pp.33–48.
Snyder, J.L. (2010), “E-mail privacy in the workplace”, Journal of Business Communication, Vol.47 No.3, pp.266–294.
Solove, D.J., Rotenberg, M.,and Schwartz, P.M. (2006), Information Privacy Law(2nd ed.). Aspen Publishers, New York.
Stanton, J., and Stam, K. (2003), “Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives”, Surveillance and Society, Vol.1 No.2, pp.152–190.
Steers, R.M. (1977), “Antecedents and outcomes of organizational commitment”, Administrative Science Quarterly, Vol.22, pp.46-55.
Suliman, A., and Iles, P.A. (2000), “Is continuance commitment beneficial to organizations? Commitment-performance relationship: A new look”, Journal of Managerial Psychology, Vol.15 No.5, pp.407–422.
Sun, Y.L., Han, Z., and Liu, K.J.R. (2008), “Defense of trust management vulnerabilities in distributed networks”, IEEE Communications Magazine,Vol.46, pp.112–9.
Taddei, S., and Contena, B. (2013), “Privacy, trust and control: Which relationships with online self-disclosure?”,Computers in Human Behavior,Vol.29 No.3, pp.821–826
Tenenhaus, M., Vinzi, V.E., Chatelin, Y.M., and Lauro.C. (2005), “PLS path modeling”, Computer Statistics Data Analysis,Vol.48 No.1, pp.159–205
Townsend, A.M., and Bennett, J.T. (2003), “Privacy, technology, and conflict: Emerging issues and action in workplace privacy”, Journal of Labor Research, Vol.24, pp.195–205.
Trcek, D.(2009), “A formal apparatus for modeling trust in computing environments”, Mathematical and Computer Modeling, Vol.49, pp.226–233.
US Department of Defense (1985), Trusted Computer System Evaluation Criteria. Department of Defense,USA.
Utami, S., Soemarno, S., and Bisri, M. (2014), “Disaster risk and adaptation of settlement along the river brantas in the context of sustainable development, Malang, Indonesia”, Procedia Environmental Sciences, Vol.20, pp.602–611
Wilson, D.T., and Mummalaneni, V. (1988), Modeling and Measuring Buyer-Seller Relationships.Pennsylvania State University, PA.
Wu, K.W., Huang, S.Y., Yen, D.C., and Popova, I. (2012), “The effect of online privacy policy on consumer privacy concern and trust”, Computers in Human Behavior, Vol.28 No.3, pp.889–897
Xu, H., Dinev, T., Smith, H.J., and Hart, P. (2008), “Examining the formation of individual’s privacy concerns: Toward an integrative view”, Proceedings of the 29th International Conference on Information Systems. Available at:http://aisel.aisnet.org/icis2008/6/
Yang, J., Mossholder, K.W. and Peng, T.K.( 2009), “Supervisory procedural justice effects: the mediating roles of cognitive and affective trust”, Leadership Quarterly , Vol.20, pp.143–154.
Yerby, J. (2013), “Legal and ethical issues of employee monitoring”, Online Journal of Applied Knowledge Management, Vol.1 No.2, pp.44–55.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關書籍
 
無相關著作
 
無相關點閱
 
QR Code
QRCODE