Why and How Do Employees Break and Bend Confidential Information Protection Rules?
Organizations cannot function effectively if their employees do not follow organizational rules and policies. In this paper, we explore why and how employees in two high‐tech organizations often broke or bent rules designed to protect their employers' confidential information (CI). The CI prote...
Ausführliche Beschreibung
Autor*in: |
Hannah, David R [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015 |
---|
Rechteinformationen: |
Nutzungsrecht: © 2015 John Wiley & Sons Ltd and Society for the Advancement of Management Studies © COPYRIGHT 2015 Blackwell Publishers Ltd. |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: Journal of management studies - Oxford : Blackwell, 1964, 52(2015), 3, Seite 381-413 |
---|---|
Übergeordnetes Werk: |
volume:52 ; year:2015 ; number:3 ; pages:381-413 |
Links: |
---|
DOI / URN: |
10.1111/joms.12120 |
---|
Katalog-ID: |
OLC1962302865 |
---|
LEADER | 01000caa a2200265 4500 | ||
---|---|---|---|
001 | OLC1962302865 | ||
003 | DE-627 | ||
005 | 20220216054423.0 | ||
007 | tu | ||
008 | 160206s2015 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1111/joms.12120 |2 doi | |
028 | 5 | 2 | |a PQ20160617 |
035 | |a (DE-627)OLC1962302865 | ||
035 | |a (DE-599)GBVOLC1962302865 | ||
035 | |a (PRQ)c2400-175371232cf09516c969f6b8819f1c20736e90f01d2ea19c600dac27bb0d6afa0 | ||
035 | |a (KEY)0002413920150000052000300381whyandhowdoemployeesbreakandbendconfidentialinform | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 330 |q DE-600 |
084 | |a 85.00 |2 bkl | ||
100 | 1 | |a Hannah, David R |e verfasserin |4 aut | |
245 | 1 | 0 | |a Why and How Do Employees Break and Bend Confidential Information Protection Rules? |
264 | 1 | |c 2015 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
520 | |a Organizations cannot function effectively if their employees do not follow organizational rules and policies. In this paper, we explore why and how employees in two high‐tech organizations often broke or bent rules designed to protect their employers' confidential information (CI). The CI protection rules sometimes imposed requirements that disrupted employees' work, forcing employees to choose between CI rule compliance and doing their work effectively and efficiently. Employees in these situations often broke the rules or bent them in ways that enabled employees to meet some of the rules' requirements, while also satisfying other expectations that they faced. We discuss implications of our findings for practice and for future organizational scholarship on rule following. | ||
540 | |a Nutzungsrecht: © 2015 John Wiley & Sons Ltd and Society for the Advancement of Management Studies | ||
540 | |a © COPYRIGHT 2015 Blackwell Publishers Ltd. | ||
650 | 4 | |a rule bending | |
650 | 4 | |a rule following | |
650 | 4 | |a confidential information protection | |
650 | 4 | |a Workers | |
650 | 4 | |a Confidential communications | |
650 | 4 | |a Employment policies | |
650 | 4 | |a Data integrity | |
650 | 4 | |a Confidentiality | |
650 | 4 | |a Studies | |
650 | 4 | |a Noncompliance | |
650 | 4 | |a Organizational behavior | |
650 | 4 | |a Requirements | |
700 | 1 | |a Robertson, Kirsten |4 oth | |
773 | 0 | 8 | |i Enthalten in |t Journal of management studies |d Oxford : Blackwell, 1964 |g 52(2015), 3, Seite 381-413 |w (DE-627)129607983 |w (DE-600)242497-6 |w (DE-576)015102718 |x 0022-2380 |7 nnns |
773 | 1 | 8 | |g volume:52 |g year:2015 |g number:3 |g pages:381-413 |
856 | 4 | 1 | |u http://dx.doi.org/10.1111/joms.12120 |3 Volltext |
856 | 4 | 2 | |u http://onlinelibrary.wiley.com/doi/10.1111/joms.12120/abstract |
856 | 4 | 2 | |u http://search.proquest.com/docview/1674475886 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-WIW | ||
912 | |a GBV_ILN_26 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4700 | ||
936 | b | k | |a 85.00 |q AVZ |
951 | |a AR | ||
952 | |d 52 |j 2015 |e 3 |h 381-413 |
author_variant |
d r h dr drh |
---|---|
matchkey_str |
article:00222380:2015----::hadodepoesraadedofdnilnom |
hierarchy_sort_str |
2015 |
bklnumber |
85.00 |
publishDate |
2015 |
allfields |
10.1111/joms.12120 doi PQ20160617 (DE-627)OLC1962302865 (DE-599)GBVOLC1962302865 (PRQ)c2400-175371232cf09516c969f6b8819f1c20736e90f01d2ea19c600dac27bb0d6afa0 (KEY)0002413920150000052000300381whyandhowdoemployeesbreakandbendconfidentialinform DE-627 ger DE-627 rakwb eng 330 DE-600 85.00 bkl Hannah, David R verfasserin aut Why and How Do Employees Break and Bend Confidential Information Protection Rules? 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Organizations cannot function effectively if their employees do not follow organizational rules and policies. In this paper, we explore why and how employees in two high‐tech organizations often broke or bent rules designed to protect their employers' confidential information (CI). The CI protection rules sometimes imposed requirements that disrupted employees' work, forcing employees to choose between CI rule compliance and doing their work effectively and efficiently. Employees in these situations often broke the rules or bent them in ways that enabled employees to meet some of the rules' requirements, while also satisfying other expectations that they faced. We discuss implications of our findings for practice and for future organizational scholarship on rule following. Nutzungsrecht: © 2015 John Wiley & Sons Ltd and Society for the Advancement of Management Studies © COPYRIGHT 2015 Blackwell Publishers Ltd. rule bending rule following confidential information protection Workers Confidential communications Employment policies Data integrity Confidentiality Studies Noncompliance Organizational behavior Requirements Robertson, Kirsten oth Enthalten in Journal of management studies Oxford : Blackwell, 1964 52(2015), 3, Seite 381-413 (DE-627)129607983 (DE-600)242497-6 (DE-576)015102718 0022-2380 nnns volume:52 year:2015 number:3 pages:381-413 http://dx.doi.org/10.1111/joms.12120 Volltext http://onlinelibrary.wiley.com/doi/10.1111/joms.12120/abstract http://search.proquest.com/docview/1674475886 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-WIW GBV_ILN_26 GBV_ILN_39 GBV_ILN_70 GBV_ILN_2005 GBV_ILN_4012 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4700 85.00 AVZ AR 52 2015 3 381-413 |
spelling |
10.1111/joms.12120 doi PQ20160617 (DE-627)OLC1962302865 (DE-599)GBVOLC1962302865 (PRQ)c2400-175371232cf09516c969f6b8819f1c20736e90f01d2ea19c600dac27bb0d6afa0 (KEY)0002413920150000052000300381whyandhowdoemployeesbreakandbendconfidentialinform DE-627 ger DE-627 rakwb eng 330 DE-600 85.00 bkl Hannah, David R verfasserin aut Why and How Do Employees Break and Bend Confidential Information Protection Rules? 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Organizations cannot function effectively if their employees do not follow organizational rules and policies. In this paper, we explore why and how employees in two high‐tech organizations often broke or bent rules designed to protect their employers' confidential information (CI). The CI protection rules sometimes imposed requirements that disrupted employees' work, forcing employees to choose between CI rule compliance and doing their work effectively and efficiently. Employees in these situations often broke the rules or bent them in ways that enabled employees to meet some of the rules' requirements, while also satisfying other expectations that they faced. We discuss implications of our findings for practice and for future organizational scholarship on rule following. Nutzungsrecht: © 2015 John Wiley & Sons Ltd and Society for the Advancement of Management Studies © COPYRIGHT 2015 Blackwell Publishers Ltd. rule bending rule following confidential information protection Workers Confidential communications Employment policies Data integrity Confidentiality Studies Noncompliance Organizational behavior Requirements Robertson, Kirsten oth Enthalten in Journal of management studies Oxford : Blackwell, 1964 52(2015), 3, Seite 381-413 (DE-627)129607983 (DE-600)242497-6 (DE-576)015102718 0022-2380 nnns volume:52 year:2015 number:3 pages:381-413 http://dx.doi.org/10.1111/joms.12120 Volltext http://onlinelibrary.wiley.com/doi/10.1111/joms.12120/abstract http://search.proquest.com/docview/1674475886 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-WIW GBV_ILN_26 GBV_ILN_39 GBV_ILN_70 GBV_ILN_2005 GBV_ILN_4012 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4700 85.00 AVZ AR 52 2015 3 381-413 |
allfields_unstemmed |
10.1111/joms.12120 doi PQ20160617 (DE-627)OLC1962302865 (DE-599)GBVOLC1962302865 (PRQ)c2400-175371232cf09516c969f6b8819f1c20736e90f01d2ea19c600dac27bb0d6afa0 (KEY)0002413920150000052000300381whyandhowdoemployeesbreakandbendconfidentialinform DE-627 ger DE-627 rakwb eng 330 DE-600 85.00 bkl Hannah, David R verfasserin aut Why and How Do Employees Break and Bend Confidential Information Protection Rules? 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Organizations cannot function effectively if their employees do not follow organizational rules and policies. In this paper, we explore why and how employees in two high‐tech organizations often broke or bent rules designed to protect their employers' confidential information (CI). The CI protection rules sometimes imposed requirements that disrupted employees' work, forcing employees to choose between CI rule compliance and doing their work effectively and efficiently. Employees in these situations often broke the rules or bent them in ways that enabled employees to meet some of the rules' requirements, while also satisfying other expectations that they faced. We discuss implications of our findings for practice and for future organizational scholarship on rule following. Nutzungsrecht: © 2015 John Wiley & Sons Ltd and Society for the Advancement of Management Studies © COPYRIGHT 2015 Blackwell Publishers Ltd. rule bending rule following confidential information protection Workers Confidential communications Employment policies Data integrity Confidentiality Studies Noncompliance Organizational behavior Requirements Robertson, Kirsten oth Enthalten in Journal of management studies Oxford : Blackwell, 1964 52(2015), 3, Seite 381-413 (DE-627)129607983 (DE-600)242497-6 (DE-576)015102718 0022-2380 nnns volume:52 year:2015 number:3 pages:381-413 http://dx.doi.org/10.1111/joms.12120 Volltext http://onlinelibrary.wiley.com/doi/10.1111/joms.12120/abstract http://search.proquest.com/docview/1674475886 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-WIW GBV_ILN_26 GBV_ILN_39 GBV_ILN_70 GBV_ILN_2005 GBV_ILN_4012 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4700 85.00 AVZ AR 52 2015 3 381-413 |
allfieldsGer |
10.1111/joms.12120 doi PQ20160617 (DE-627)OLC1962302865 (DE-599)GBVOLC1962302865 (PRQ)c2400-175371232cf09516c969f6b8819f1c20736e90f01d2ea19c600dac27bb0d6afa0 (KEY)0002413920150000052000300381whyandhowdoemployeesbreakandbendconfidentialinform DE-627 ger DE-627 rakwb eng 330 DE-600 85.00 bkl Hannah, David R verfasserin aut Why and How Do Employees Break and Bend Confidential Information Protection Rules? 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Organizations cannot function effectively if their employees do not follow organizational rules and policies. In this paper, we explore why and how employees in two high‐tech organizations often broke or bent rules designed to protect their employers' confidential information (CI). The CI protection rules sometimes imposed requirements that disrupted employees' work, forcing employees to choose between CI rule compliance and doing their work effectively and efficiently. Employees in these situations often broke the rules or bent them in ways that enabled employees to meet some of the rules' requirements, while also satisfying other expectations that they faced. We discuss implications of our findings for practice and for future organizational scholarship on rule following. Nutzungsrecht: © 2015 John Wiley & Sons Ltd and Society for the Advancement of Management Studies © COPYRIGHT 2015 Blackwell Publishers Ltd. rule bending rule following confidential information protection Workers Confidential communications Employment policies Data integrity Confidentiality Studies Noncompliance Organizational behavior Requirements Robertson, Kirsten oth Enthalten in Journal of management studies Oxford : Blackwell, 1964 52(2015), 3, Seite 381-413 (DE-627)129607983 (DE-600)242497-6 (DE-576)015102718 0022-2380 nnns volume:52 year:2015 number:3 pages:381-413 http://dx.doi.org/10.1111/joms.12120 Volltext http://onlinelibrary.wiley.com/doi/10.1111/joms.12120/abstract http://search.proquest.com/docview/1674475886 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-WIW GBV_ILN_26 GBV_ILN_39 GBV_ILN_70 GBV_ILN_2005 GBV_ILN_4012 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4700 85.00 AVZ AR 52 2015 3 381-413 |
allfieldsSound |
10.1111/joms.12120 doi PQ20160617 (DE-627)OLC1962302865 (DE-599)GBVOLC1962302865 (PRQ)c2400-175371232cf09516c969f6b8819f1c20736e90f01d2ea19c600dac27bb0d6afa0 (KEY)0002413920150000052000300381whyandhowdoemployeesbreakandbendconfidentialinform DE-627 ger DE-627 rakwb eng 330 DE-600 85.00 bkl Hannah, David R verfasserin aut Why and How Do Employees Break and Bend Confidential Information Protection Rules? 2015 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Organizations cannot function effectively if their employees do not follow organizational rules and policies. In this paper, we explore why and how employees in two high‐tech organizations often broke or bent rules designed to protect their employers' confidential information (CI). The CI protection rules sometimes imposed requirements that disrupted employees' work, forcing employees to choose between CI rule compliance and doing their work effectively and efficiently. Employees in these situations often broke the rules or bent them in ways that enabled employees to meet some of the rules' requirements, while also satisfying other expectations that they faced. We discuss implications of our findings for practice and for future organizational scholarship on rule following. Nutzungsrecht: © 2015 John Wiley & Sons Ltd and Society for the Advancement of Management Studies © COPYRIGHT 2015 Blackwell Publishers Ltd. rule bending rule following confidential information protection Workers Confidential communications Employment policies Data integrity Confidentiality Studies Noncompliance Organizational behavior Requirements Robertson, Kirsten oth Enthalten in Journal of management studies Oxford : Blackwell, 1964 52(2015), 3, Seite 381-413 (DE-627)129607983 (DE-600)242497-6 (DE-576)015102718 0022-2380 nnns volume:52 year:2015 number:3 pages:381-413 http://dx.doi.org/10.1111/joms.12120 Volltext http://onlinelibrary.wiley.com/doi/10.1111/joms.12120/abstract http://search.proquest.com/docview/1674475886 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-WIW GBV_ILN_26 GBV_ILN_39 GBV_ILN_70 GBV_ILN_2005 GBV_ILN_4012 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4700 85.00 AVZ AR 52 2015 3 381-413 |
language |
English |
source |
Enthalten in Journal of management studies 52(2015), 3, Seite 381-413 volume:52 year:2015 number:3 pages:381-413 |
sourceStr |
Enthalten in Journal of management studies 52(2015), 3, Seite 381-413 volume:52 year:2015 number:3 pages:381-413 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
rule bending rule following confidential information protection Workers Confidential communications Employment policies Data integrity Confidentiality Studies Noncompliance Organizational behavior Requirements |
dewey-raw |
330 |
isfreeaccess_bool |
false |
container_title |
Journal of management studies |
authorswithroles_txt_mv |
Hannah, David R @@aut@@ Robertson, Kirsten @@oth@@ |
publishDateDaySort_date |
2015-01-01T00:00:00Z |
hierarchy_top_id |
129607983 |
dewey-sort |
3330 |
id |
OLC1962302865 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1962302865</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220216054423.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">160206s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1111/joms.12120</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20160617</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1962302865</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1962302865</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)c2400-175371232cf09516c969f6b8819f1c20736e90f01d2ea19c600dac27bb0d6afa0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0002413920150000052000300381whyandhowdoemployeesbreakandbendconfidentialinform</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">330</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">85.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hannah, David R</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Why and How Do Employees Break and Bend Confidential Information Protection Rules?</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Organizations cannot function effectively if their employees do not follow organizational rules and policies. In this paper, we explore why and how employees in two high‐tech organizations often broke or bent rules designed to protect their employers' confidential information (CI). The CI protection rules sometimes imposed requirements that disrupted employees' work, forcing employees to choose between CI rule compliance and doing their work effectively and efficiently. Employees in these situations often broke the rules or bent them in ways that enabled employees to meet some of the rules' requirements, while also satisfying other expectations that they faced. We discuss implications of our findings for practice and for future organizational scholarship on rule following.</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">Nutzungsrecht: © 2015 John Wiley & Sons Ltd and Society for the Advancement of Management Studies</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">© COPYRIGHT 2015 Blackwell Publishers Ltd.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">rule bending</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">rule following</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">confidential information protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Workers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidential communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employment policies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data integrity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidentiality</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Noncompliance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Organizational behavior</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Requirements</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Robertson, Kirsten</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of management studies</subfield><subfield code="d">Oxford : Blackwell, 1964</subfield><subfield code="g">52(2015), 3, Seite 381-413</subfield><subfield code="w">(DE-627)129607983</subfield><subfield code="w">(DE-600)242497-6</subfield><subfield code="w">(DE-576)015102718</subfield><subfield code="x">0022-2380</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:52</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:3</subfield><subfield code="g">pages:381-413</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1111/joms.12120</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://onlinelibrary.wiley.com/doi/10.1111/joms.12120/abstract</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://search.proquest.com/docview/1674475886</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-WIW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_26</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">85.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">52</subfield><subfield code="j">2015</subfield><subfield code="e">3</subfield><subfield code="h">381-413</subfield></datafield></record></collection>
|
author |
Hannah, David R |
spellingShingle |
Hannah, David R ddc 330 bkl 85.00 misc rule bending misc rule following misc confidential information protection misc Workers misc Confidential communications misc Employment policies misc Data integrity misc Confidentiality misc Studies misc Noncompliance misc Organizational behavior misc Requirements Why and How Do Employees Break and Bend Confidential Information Protection Rules? |
authorStr |
Hannah, David R |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)129607983 |
format |
Article |
dewey-ones |
330 - Economics |
delete_txt_mv |
keep |
author_role |
aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0022-2380 |
topic_title |
330 DE-600 85.00 bkl Why and How Do Employees Break and Bend Confidential Information Protection Rules? rule bending rule following confidential information protection Workers Confidential communications Employment policies Data integrity Confidentiality Studies Noncompliance Organizational behavior Requirements |
topic |
ddc 330 bkl 85.00 misc rule bending misc rule following misc confidential information protection misc Workers misc Confidential communications misc Employment policies misc Data integrity misc Confidentiality misc Studies misc Noncompliance misc Organizational behavior misc Requirements |
topic_unstemmed |
ddc 330 bkl 85.00 misc rule bending misc rule following misc confidential information protection misc Workers misc Confidential communications misc Employment policies misc Data integrity misc Confidentiality misc Studies misc Noncompliance misc Organizational behavior misc Requirements |
topic_browse |
ddc 330 bkl 85.00 misc rule bending misc rule following misc confidential information protection misc Workers misc Confidential communications misc Employment policies misc Data integrity misc Confidentiality misc Studies misc Noncompliance misc Organizational behavior misc Requirements |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
author2_variant |
k r kr |
hierarchy_parent_title |
Journal of management studies |
hierarchy_parent_id |
129607983 |
dewey-tens |
330 - Economics |
hierarchy_top_title |
Journal of management studies |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)129607983 (DE-600)242497-6 (DE-576)015102718 |
title |
Why and How Do Employees Break and Bend Confidential Information Protection Rules? |
ctrlnum |
(DE-627)OLC1962302865 (DE-599)GBVOLC1962302865 (PRQ)c2400-175371232cf09516c969f6b8819f1c20736e90f01d2ea19c600dac27bb0d6afa0 (KEY)0002413920150000052000300381whyandhowdoemployeesbreakandbendconfidentialinform |
title_full |
Why and How Do Employees Break and Bend Confidential Information Protection Rules? |
author_sort |
Hannah, David R |
journal |
Journal of management studies |
journalStr |
Journal of management studies |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
300 - Social sciences |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
txt |
container_start_page |
381 |
author_browse |
Hannah, David R |
container_volume |
52 |
class |
330 DE-600 85.00 bkl |
format_se |
Aufsätze |
author-letter |
Hannah, David R |
doi_str_mv |
10.1111/joms.12120 |
dewey-full |
330 |
title_sort |
why and how do employees break and bend confidential information protection rules? |
title_auth |
Why and How Do Employees Break and Bend Confidential Information Protection Rules? |
abstract |
Organizations cannot function effectively if their employees do not follow organizational rules and policies. In this paper, we explore why and how employees in two high‐tech organizations often broke or bent rules designed to protect their employers' confidential information (CI). The CI protection rules sometimes imposed requirements that disrupted employees' work, forcing employees to choose between CI rule compliance and doing their work effectively and efficiently. Employees in these situations often broke the rules or bent them in ways that enabled employees to meet some of the rules' requirements, while also satisfying other expectations that they faced. We discuss implications of our findings for practice and for future organizational scholarship on rule following. |
abstractGer |
Organizations cannot function effectively if their employees do not follow organizational rules and policies. In this paper, we explore why and how employees in two high‐tech organizations often broke or bent rules designed to protect their employers' confidential information (CI). The CI protection rules sometimes imposed requirements that disrupted employees' work, forcing employees to choose between CI rule compliance and doing their work effectively and efficiently. Employees in these situations often broke the rules or bent them in ways that enabled employees to meet some of the rules' requirements, while also satisfying other expectations that they faced. We discuss implications of our findings for practice and for future organizational scholarship on rule following. |
abstract_unstemmed |
Organizations cannot function effectively if their employees do not follow organizational rules and policies. In this paper, we explore why and how employees in two high‐tech organizations often broke or bent rules designed to protect their employers' confidential information (CI). The CI protection rules sometimes imposed requirements that disrupted employees' work, forcing employees to choose between CI rule compliance and doing their work effectively and efficiently. Employees in these situations often broke the rules or bent them in ways that enabled employees to meet some of the rules' requirements, while also satisfying other expectations that they faced. We discuss implications of our findings for practice and for future organizational scholarship on rule following. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-WIW GBV_ILN_26 GBV_ILN_39 GBV_ILN_70 GBV_ILN_2005 GBV_ILN_4012 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4700 |
container_issue |
3 |
title_short |
Why and How Do Employees Break and Bend Confidential Information Protection Rules? |
url |
http://dx.doi.org/10.1111/joms.12120 http://onlinelibrary.wiley.com/doi/10.1111/joms.12120/abstract http://search.proquest.com/docview/1674475886 |
remote_bool |
false |
author2 |
Robertson, Kirsten |
author2Str |
Robertson, Kirsten |
ppnlink |
129607983 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth |
doi_str |
10.1111/joms.12120 |
up_date |
2024-07-04T03:14:10.040Z |
_version_ |
1803616623061368832 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1962302865</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20220216054423.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">160206s2015 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1111/joms.12120</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20160617</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1962302865</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1962302865</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)c2400-175371232cf09516c969f6b8819f1c20736e90f01d2ea19c600dac27bb0d6afa0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0002413920150000052000300381whyandhowdoemployeesbreakandbendconfidentialinform</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">330</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">85.00</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hannah, David R</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Why and How Do Employees Break and Bend Confidential Information Protection Rules?</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Organizations cannot function effectively if their employees do not follow organizational rules and policies. In this paper, we explore why and how employees in two high‐tech organizations often broke or bent rules designed to protect their employers' confidential information (CI). The CI protection rules sometimes imposed requirements that disrupted employees' work, forcing employees to choose between CI rule compliance and doing their work effectively and efficiently. Employees in these situations often broke the rules or bent them in ways that enabled employees to meet some of the rules' requirements, while also satisfying other expectations that they faced. We discuss implications of our findings for practice and for future organizational scholarship on rule following.</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">Nutzungsrecht: © 2015 John Wiley & Sons Ltd and Society for the Advancement of Management Studies</subfield></datafield><datafield tag="540" ind1=" " ind2=" "><subfield code="a">© COPYRIGHT 2015 Blackwell Publishers Ltd.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">rule bending</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">rule following</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">confidential information protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Workers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidential communications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Employment policies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data integrity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidentiality</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Noncompliance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Organizational behavior</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Requirements</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Robertson, Kirsten</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of management studies</subfield><subfield code="d">Oxford : Blackwell, 1964</subfield><subfield code="g">52(2015), 3, Seite 381-413</subfield><subfield code="w">(DE-627)129607983</subfield><subfield code="w">(DE-600)242497-6</subfield><subfield code="w">(DE-576)015102718</subfield><subfield code="x">0022-2380</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:52</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:3</subfield><subfield code="g">pages:381-413</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://dx.doi.org/10.1111/joms.12120</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://onlinelibrary.wiley.com/doi/10.1111/joms.12120/abstract</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://search.proquest.com/docview/1674475886</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-WIW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_26</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">85.00</subfield><subfield code="q">AVZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">52</subfield><subfield code="j">2015</subfield><subfield code="e">3</subfield><subfield code="h">381-413</subfield></datafield></record></collection>
|
score |
7.398222 |