Reference Hub11
Information Technology and Privacy: A Boundary Management Perspective

Information Technology and Privacy: A Boundary Management Perspective

Jeffrey M. Stanton
ISBN13: 9781591401049|ISBN10: 1591401046|EISBN13: 9781591401124
DOI: 10.4018/978-1-59140-104-9.ch005
Cite Chapter Cite Chapter

MLA

Stanton, Jeffrey M. "Information Technology and Privacy: A Boundary Management Perspective." Socio-Technical and Human Cognition Elements of Information Systems, edited by Steve Clarke, et al., IGI Global, 2003, pp. 79-103. https://doi.org/10.4018/978-1-59140-104-9.ch005

APA

Stanton, J. M. (2003). Information Technology and Privacy: A Boundary Management Perspective. In S. Clarke, E. Coakes, M. Hunter, & A. Wenn (Eds.), Socio-Technical and Human Cognition Elements of Information Systems (pp. 79-103). IGI Global. https://doi.org/10.4018/978-1-59140-104-9.ch005

Chicago

Stanton, Jeffrey M. "Information Technology and Privacy: A Boundary Management Perspective." In Socio-Technical and Human Cognition Elements of Information Systems, edited by Steve Clarke, et al., 79-103. Hershey, PA: IGI Global, 2003. https://doi.org/10.4018/978-1-59140-104-9.ch005

Export Reference

Mendeley
Favorite

Abstract

With the rising popularity of the Internet and some widely publicized occurrences of privacy loss due to information technology, many individuals have recently become more concerned with the privacy and security of sensitive information. These concerns have special relevance within work organizations because of the substantial amounts of data that organizations typically collect about the work and non-work activities of their employees. This chapter presents a new theoretical perspective called Information Boundary Theory, that describes whether, when, and why employees care about the privacy and security of sensitive information at work. Analysis of interview data from N=25 non-managerial U.S. workers provided preliminary support for four of the new theory’s research propositions. The chapter describes implications of the theory and the research findings for the design and deployment of information technology systems within organizations and maps a research agenda for future uses of the theory.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.