Control configuration and control enactment in information systems projects

M Wiener, M Mähring, U Remus, C Saunders - Mis Quarterly, 2016 - JSTOR
The control of information systems (IS) projects is a key activity for deployment of information
technology (IT) resources and ultimately for value creation through IT. For the last 20 years …

Workplace incivility and knowledge hiding: a research agenda

A Irum, K Ghosh, A Pandey - Benchmarking: An International Journal, 2020 - emerald.com
Purpose Contemporary organizations report a sharp increase in the incidences of workplace
incivility. The purpose of this paper is to capture the impact of workplace incivility on the …

Cognitive and affective job insecurity: A meta-analysis and a primary study

L Jiang, LM Lavaysse - Journal of Management, 2018 - journals.sagepub.com
Job insecurity is one of the most common stressors in contemporary working life. Although
research indicates that the job insecurity construct has cognitive (ie, the perceived negative …

Narcissistic leadership and behavioral cynicism in the hotel industry: the role of employee silence and negative workplace gossiping

M Aboramadan, MA Turkmenoglu… - International Journal of …, 2020 - emerald.com
Purpose Building on leader-member exchange and social cognitive theories, this paper
aims to propose a model of the influence of narcissistic leadership on hotel employees' …

Power, institutions and organizations

TB Lawrence, S Buchanan - The Sage handbook of organizational …, 2017 - torrossa.com
The relationship between power and institutions is an intimate one. Institutions exist to the
extent that they are powerful–the extent to which they affect the behaviors, beliefs and …

Abusive supervision and subordinates' organization deviance.

BJ Tepper, CA Henle, LS Lambert… - Journal of applied …, 2008 - psycnet.apa.org
The authors developed an integrated model of the relationships among abusive supervision,
affective organizational commitment, norms toward organization deviance, and organization …

Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies

PB Lowry, GD Moody - Information Systems Journal, 2015 - Wiley Online Library
Organisations increasingly rely on information and related systems, which are also a source
of risk. Unfortunately, employees represent the greatest risk to organisational information …

After-hours work-related technology use and individuals' deviance: the role of other-initiated versus self-initiated interruptions

J Khalid, QD Weng, A Luqman, MI Rasheed… - … Technology & People, 2022 - emerald.com
Purpose The purpose of this study is to investigate the effect of after-hours work-related
technology use on interpersonal, organizational and nonwork deviance through work–family …

Beyond engagement: Toward a framework and operational definition for employee work passion

D Zigarmi, K Nimon, D Houson… - Human Resource …, 2009 - journals.sagepub.com
The purpose of this article is to respond to the lack of consistency in the academic and
practitioner literature regarding the construct of employee engagement and to offer a …

A social influence interpretation of workplace ostracism and counterproductive work behavior

J Yang, DC Treadway - Journal of Business Ethics, 2018 - Springer
We used social network analysis to examine a theoretical model exploring why, and under
what circumstances, the perpetrators' ostracizing behaviors are accurately perceived by the …