[1. Alder, G.S., Noel, T.W Ambrose, M.L. (2006), “Clarifying the effects of Internet Monitoring on Job Attitudes: The Mediating Role of Employee Trust”. Information and Management, Vol. 43, No. 7, pp. 894-903.10.1016/j.im.2006.08.008]Search in Google Scholar
[2. AMA Survey 2003. Email Rules, Policies and Practices Survey [Online]. Available from http://www.amanet.org/research/pdfs/email_policies_practices.pdf (15 January 2019).]Search in Google Scholar
[3. AMA Survey (2017). Workplace Monitoring and Surveillance, available at: http://www.amanet.org/research/ (15 January 2019).]Search in Google Scholar
[4. Ambrose, M.L., Arnaud, A. (2005), “Are Procedural Justice and Distributive Justice conceptually different?”, in J. Greenberg J.A Colquitt, (Eds.), Handbook of Organisational Justice, pp. 59-84,. New Jersey Lawrence Erlbaum Associates.]Search in Google Scholar
[5. Barrett-Howard, E., Tyler, T.R. (1986). “Procedural Justice as a Criterion in Allocation Decisions”, Journal of Personality and Social Pyschology, Vol 50 No. 2, pp. 296-304.10.1037/0022-3514.50.2.296]Search in Google Scholar
[6. Beaudry, A., Pinsonneault, A. (2005), “Understanding User Responses to Information Technology: A Coping Model of User Adaptation”, MIS Quarterly, Vol. 29 No. 3, pp.493-524.10.2307/25148693]Search in Google Scholar
[7. Beaulieu R., Shamian J., Donner G. Pringle D. (1997), “Empowerment and commitment of nurses in long term care”, Nursing Economics, Vol. 15 No.1, pp.32–41.]Search in Google Scholar
[8. Bies, R.J. Moag, J.F. (1986). “Interactional Justice: Communication Criteria of Fairness”, In Lewicki, R.J., Sheppard, B.H., Bazerman, M.H., (Eds), Research on Negotiations in Organizations, Vol 1, JAI Press, pp. 43-55.]Search in Google Scholar
[9. Boxall, P Purcell, J. (2011), “Strategy and Human Resource Management, 3rd ed., Palgrave Macmillan, Basingstoke.10.1007/978-1-137-40765-8_1]Search in Google Scholar
[10. Bradbury-Jones, C., Sambrook, S., Irvine, F. (2007). Empowerment and being valued: A phenomenological study of nursing students’ experiences of clinical practice. Nurse Education Today, Vol.31 No. 4, pp. 368 – 372.10.1016/j.nedt.2010.07.008]Search in Google Scholar
[11. Buchanan, T., Paine, C., Joinson, A.N., Reips, U. (2007), “Development of Measures of Online Privacy Concern and Protection for Use on the Internet”, Journal of the American Society for Information Science and Technology, Vol. 58 No. 2, pp. 157-165.10.1002/asi.20459]Search in Google Scholar
[12. Butler, A.M. (2012), “The Effects of Organizational Justice Perceptions Associated with the use of Electronic Monitoring on Employees’ Organizational Citizenship and Withdrawal Behaviours: A Social Exchange Perspective”, Electronic Theses and Dissertations, 478, available at: http;//scholar.uwindsor.ca/etd/478 / (15 January, 2019)]Search in Google Scholar
[13. Chory, R.M., Vela, L.E., Avtgis, T.A. (2016), “Organizational Surveillance of Computer-Mediated Workplace Communication: Employee Privacy Concerns and Responses”, Employee Responsibilities and Rights Journal, Vol. 28 No. 1, pp. 23-43.10.1007/s10672-015-9267-4]Search in Google Scholar
[14. Clarke, R.A (1988). “Information Technology and Dataveillance”, Communications of the ACM, Vol. 31 No. 5, pp. 498-512.10.1145/42411.42413]Search in Google Scholar
[15. Cohen-Charash, Y., Spector, P.E. (2001), “The Role of Justice in Organizations: A Meta-Analysis”, Organizational Behavior and Human Decision Processes, Vol. 86 No. 2, pp. 278-321.10.1006/obhd.2001.2958]Search in Google Scholar
[16. Connell, J., Ferres, N. Travalione, T. (2003), “Engendering trust in manager-subordinate relationships”, Personnel Review, Vol. 32 No. 5, pp. 569-587.10.1108/00483480310488342]Search in Google Scholar
[17. Conway, N. Briner, R.B. (2002), “A daily diary study of affective responses to contract breach and exceeded promises”, Journal of Organizational Behaviour, Vol. 23 No. 3, pp. 287 – 302.10.1002/job.139]Search in Google Scholar
[18. Craver, C. B. (2006). “Privacy issues affecting employers, employees and labour organizations”, Louisiana Law Review, Vol. 66, pp. 1057–1078.]Search in Google Scholar
[19. Crowd Research Partners: Insider Threat Report (2017). Cyber-security Insiders, CA Technologies, Available at: https://www.ca.com/content/dam/ca/us/files/ebook/insider-threat-report.pdf (10 August 2018).]Search in Google Scholar
[20. Dietz, G. Fortin, M. (2007), “Trust and justice in the formation of joint consultation committees”, Journal of International Human Resource Management, Vol. 18 No. 7, pp. 1159-1181.10.1080/09585190701391867]Search in Google Scholar
[21. Elie-Dit-Cosaque, C. M., Straub, D. W. (2011). Opening the black box of system usage: User adaptation to disruptive it. European Journal of Information Systems, 20, 589–607.10.1057/ejis.2010.23]Search in Google Scholar
[22. Evans, L. (2007). “Monitoring technology in the American workplace: Would adopting English privacy standards better balance employee privacy and productivity?”, California Law Review, Vol. 95, pp. 1115–1149. Forbes Survey (2012). Employees really do waste time at work, Available at: https://www.forbes.com/sites/cherylsnappconner/2012/07/17/employees-really-do-waste-time-at-work/#b0461805e6da / (10 August 2018).]Search in Google Scholar
[23. Foucault, M. (1977). “Discipline and Punishment: The Birth of the Prison, Penguin Books, London.]Search in Google Scholar
[24. Gould-Williams, J. (2003). “The importance of HR practices and workplace trust in achieving superior performance: a study of public-sector organizations”, International Journal of Human Resource Management, Vol. 14 No. 1, pp. 28-54.10.1080/09585190210158501]Search in Google Scholar
[25. Graupmann, V., Jonas, E., Meier, E., Hawelka, S., Aichhorn, M. (2012). “Reactance, the self, and its group: When threats to freedom come from the ingroup versus the outgroup”, European Journal of Social Psychology, Vol. 42 No. 2, pp. 164–173.10.1002/ejsp.857]Search in Google Scholar
[26. Guest, D.E. (2004). “The Psychology of the employment relationship: An analysis based on the psychological contract”, Applied Psychology, Vol. 53 No. 4, pp. 541-555.10.1111/j.1464-0597.2004.00187.x]Search in Google Scholar
[27. Hauenstein, N.M.A., McGonigle, T., and Flinder, S.W. (2001), “A meta-analysis of the relationship between procedural justice and distributive justice: Implications of justice research”, Employee Responsibilities and Rights Journal, Vol. 13 No. 1, pp. 39-55.10.1023/A:1014482124497]Search in Google Scholar
[28. Helne, C.A. (2005). “Prediciting workplace deviance from the interaction between organizational justice and personality”, Journal of Managerial Issues, Vol. 17 No.20, pp. 247-263.]Search in Google Scholar
[29. Holland, P.J., Cooper, B. Hecker, R. (2015). “Electronic monitoring and surveillance in the workplace: The effects on trust in management, and the moderating role of occupational type”, Personnel Review, Vol. 44 No. 1, pp.161-175.10.1108/PR-11-2013-0211]Search in Google Scholar
[30. IBM (2006). “Stopping insider attacks: How organizations can protect their sensitive information”, Retrieved from http://www-935.ibm.com/services/us/imc/pdf/gsw00316-usen-00-insider-threats-wp.pdf (15 August 2019)]Search in Google Scholar
[31. Jackson, T., Dawson, R., Wilson, D. (2001). The cost of email interruption (Item No. 2134/495). Loughborough University Institutional Repository, Loughborough.]Search in Google Scholar
[32. Jensen, J. M., Raver, J. L. (2012). “When self-management and surveillance collide: Consequences for employees’ trust, autonomy, and discretionary behaviors”, Group & Organization Management, Vol. 37 No. 3, pp. 308–346.10.1177/1059601112445804]Search in Google Scholar
[33. Kanter R. (1977) Men and Women of the Corporation. Basic Books, New York, NY.]Search in Google Scholar
[34. Kanter R. (1993) Men and Women of the Corporation, 2nd edn. Basic Books, New York, NY.]Search in Google Scholar
[35. Krebs, J., Madigan, E., Tullai-McGuiness, S. (2008). The rural nurse work environment and structural empowerment. Policy, Politics and Nursing Practice, Vol. 9 No. 1, pp.28-310.1177/1527154408316255]Search in Google Scholar
[36. Kim, H. Kankanhalli, A. (2009). “Investigating user resistance to information systems implementation: A status quo bias perspective”, MIS Quarterly, Vol. 33 No. 3, pp. 567-582.10.2307/20650309]Search in Google Scholar
[37. Lane, F. S. (2003). “The naked employee: How technology is compromising workplace privacy”, AMACOM, New York.]Search in Google Scholar
[38. Laschinger, H.K.S., Wong, C., McMahon, L. Kaufmann, C. (1999). “Leader Behavior Impact on Staff Nurse Empowerment, Job Tension and Work Effectiveness”, Journal of Nursing Administration, Vol. 29 No. 5, pp. 28-39.10.1097/00005110-199905000-00005]Search in Google Scholar
[39. Laschinger H.K.S., Finegan J., Shamian J. Casier S. (2000) Organizational trust and empowerment in restructured healthcare settings: effects on staff nurse commitment, Journal of Nursing Administration, Vol. 30 No. 9, pp.413–425.10.1097/00005110-200009000-00008]Search in Google Scholar
[40. Laschinger, H.K.S., Finegan, J., Shamian, J., Wilk, P. (2001). “Impact of Structural and Psychological Empowerment on Job Strains in Nursing Work Settings: Effects on Staff Nurse Commitment”, Journal of Nursing Administration, Vol. 31 No. 5, pp. 260-272.10.1097/00005110-200105000-00006]Search in Google Scholar
[41. Laudon, K. C., Laudon, J. P. (2001). “Essentials of management information systems: Organisation and technology in the networked enterprise”, 4th ed., Prentice Hall, Upper Saddle River.]Search in Google Scholar
[42. Lawrence, T.B., Robinson, S.L. (2007), “Ain’t Misbehaving: Workplace Deviance as Organizational Resisitance”, Journal of Management, 33, pp. 378-394.10.1177/0149206307300816]Search in Google Scholar
[43. Leventhal, G.S. (1980). “What should be done with equity theory? New approaches to the study of fairness in social relationships”, in K.Gergen, M. Greenberg., R. Willis (Ed), Socia Exchange: Advances in Theory and Research, pp. 27-55, Plenum Press, New York.10.1007/978-1-4613-3087-5_2]Search in Google Scholar
[44. Martin, A. J., Wellen, J. M. Grimmer, M. R. (2016). “An eye on your work: How empowerment affects the relationship between electronic surveillance and counterproductive work behaviours”, The International Journal of Human Resource Management, Vol. 27 No. 21, pp. 2635–2651.10.1080/09585192.2016.1225313]Search in Google Scholar
[45. Marx, G., Sherizen, S. (1991). “Monitoring on the job: How to protect privacy as well as property”, In T. Forester (Ed.), Computers in the human context: Information technology, productivity, and people, pp. 397–406, MIT Press, Cambridge.]Search in Google Scholar
[46. Mayer, R. C., Davis, J. D., Schoorman, F. D. (1995). “An integrative model of organisational trust”, Academy of Management Review, Vol. 20 No. 3, pp. 709–734.10.5465/amr.1995.9508080335]Search in Google Scholar
[47. McFarlin, D.B., Sweeney, P.D. (1992), “Distributive and procedural justice as predictors of satisfaction with personal and organizational outcomes”, Academy of Management Journal, Vol. 35 No. 3, pp. 626-637.10.2307/256489]Search in Google Scholar
[48. McNall, L.A., Stanton, J.M. (2011), “Private Eyes are Atching You: Reactions to Location Sensing Technologies”, Journal of Business and Pyschology, Vol. 26 No. 3, pp. 299-309.10.1007/s10869-010-9189-y]Search in Google Scholar
[49. McParland, C., Connolly, R. (2009), “The role of dataveillance in the organsiation: Some emerging trends”, Paper presented at the Irish Academy of Management Conference. Galway, UK.]Search in Google Scholar
[50. Morrison, E.W. Robinson, S.L. (1997), “When employees feel betrayed: A model of how psychological contract violation develops”, The Academy of Management Review, Vol. 22 No. 1, pp. 226-256.10.2307/259230]Search in Google Scholar
[51. Nelson, D., Quick, J. (2012). Principles of Organizational Behavior: Realities and Challenges. South Western, Sydney.]Search in Google Scholar
[52. Nord, G. D., McCubbins, T. F., Horn Nord, J. (2006). “Email monitoring in the workplace: Privacy, legislation, and surveillance software”, Communications of the ACM, Vol. 49 No. 8, pp. 73–77.10.1145/1145287.1145290]Search in Google Scholar
[53. Nussbaum, K., duRivage, V. (1986). “Computer monitoring: Mismanagement by remote control”, Business and Society Review, Vol. 56, pp. 16–29.]Search in Google Scholar
[54. O’Donnell, A.T., Jetten, J., Ryan, M.K. (2010). “Who is Watching Over You? The Role of Shared Identity in Perceptions of Surveillance”, European Journal of Social Psychology, Vol. 40 No. 1, pp. 135-147.10.1002/ejsp.615]Search in Google Scholar
[55. Petronio, S. (2002). “Boundaries of Privacy: Dialectics of Disclosure”, State University of New York Press, Albany.]Search in Google Scholar
[56. Prakhaber, P. R. (2000). “Who owns the online consumer?”, Journal of Consumer Marketing, Vol. 17 No. 2, pp. 158–171.10.1108/07363760010317213]Search in Google Scholar
[57. Purang, P. (2012). “Organisational Justice and Affective Commitment: The Mediating Role of Perceived Organisational Support”, Asian Academy of Management Journal, Vol. 16 No. 1, pp. 141-156.]Search in Google Scholar
[58. Robinson, S. L., Bennett, R. J. (1997). “Workplace deviance: Its definition, its manifestations, and its causes”, JAI Press, Greenwich.]Search in Google Scholar
[59. Rodgers, R. (1975). “A Protection Motivation Theory of Fear Appeals and Attitude Change”, The Journal of Psychology – Interdisiplinary and Applied, Vol. 91 No. 1, pp. 93 – 114.10.1080/00223980.1975.9915803]Search in Google Scholar
[60. Saalfield, P., (2005). “Internet Misuse Costs Businesses”, Infoworld. Available at: https://www.infoworld.com/article/2671119/internet-misuse-costs-businesses--178-billion-annually.html (10 August, 2019)]Search in Google Scholar
[61. Safire, W. (2002). “The Great Unwatched”, New York Times. Available at http://query.nytimes.com/gst/fullpage.html?res=9A03E7DB1E3FF93BA25751C0A9649C8B6 3 (10 August, 2019)]Search in Google Scholar
[62. Saif, N., Saleh, A. (2013). Psychological empowerment and job satisfaction in Jordanian hospitals. International Journal of Humanities and Social Science, Vol. 3 No. 16, pp.250-257.]Search in Google Scholar
[63. Sarmiento T.P., Laschinger H.K.S. Iwasiw C. (2004) Nurse educators workplace empowerment, burnout, and job satisfaction: testing Kanters theory. Journal of Advanced Nursing, Vol. 46 No. 2, pp.134–143.10.1111/j.1365-2648.2003.02973.x]Search in Google Scholar
[64. Searle, R., Den Hartog, D.N., Weibel, A., Gillespie, N., Six, F., Hatzakis, T. Skinner, D. (2011), “Trust in the employer: the role of high-involvement work practices and procedural justice in European organizations”, The International Journal of Human Resource Management, Vol. 22 No. 5, pp. 1069-1092.10.1080/09585192.2011.556782]Search in Google Scholar
[65. Selmi, M. (2006). “Privacy for the working class: Public work and private lives”, Louisiana Law Review, Vol. 66, pp. 1035–1056.]Search in Google Scholar
[66. Semuels, A. (2013). Monitoring up- ends balance of power at workplace some say. Los Angeles Times. Available at: http://www.latimes.com/business/money/la-fi-mo-monitoring-upends-balance-of-power-at-work- place-20130408,0,7425573.story (15 April 2019)]Search in Google Scholar
[67. Shore, J. (2012). “Social Media Distractions Cost US Economy $650 (Infographic), Mashable UK. Available at: https://mashable.com/2012/11/02/social-media-work-productivity/?europe=true (20 April, 2019)]Search in Google Scholar
[68. Siegall, M., Gardner, S. (2000). Contextual factors of psychological empowerment. Personnel Review, Vol. 29 No. 6, pp.703-722.10.1108/00483480010296474]Search in Google Scholar
[69. Smith, J.H., Milberg, S.J., Burke, S.J. (1996), “Information Privacy: Measuring Individuals Concerns about Organizational Practices”, MIS Quarterly, Vol.20 No. 2, pp. 167-196.10.2307/249477]Search in Google Scholar
[70. Stanton, J. M. (2002). “Company profile of the frequent internet user: Web addict or happy employee?”, Communications of the Association for Computing Machinery, Vol. 45 No.1, pp. 55–59.10.1145/502269.502297]Search in Google Scholar
[71. Stanton, J., Stam, K. (2003). “Information Technology, Privacy and Power within Organizations: A View from Boundary Theory and Social Exchange Perspectives”, Surveillance and Society, Vol. 1 No. 2, pp. 152-190.10.24908/ss.v1i2.3351]Search in Google Scholar
[72. Stanton, J., Stam, K. (2006). The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets without Compromising Employee Privacy or Trust, Information Today, Medford.]Search in Google Scholar
[73. Stanton, J. M., Weiss, E. M. (2000). “Electronic monitoring in their own words: An exploratory study of employees’ experiences with new types of surveillance”, Computers in Human Behavior, Vol. 16 No.4, pp. 423–440.10.1016/S0747-5632(00)00018-2]Search in Google Scholar
[74. Stein, M.K., Newell, S., Wagner, E., Galliers, R. (2015). Coping with information technology: Mixed emotions, vacillation and non-conforming use patterns. MIS Quarterly, Vol. 32 No. 2, pp.367–392.10.25300/MISQ/2015/39.2.05]Search in Google Scholar
[75. Synder, J.L. (2010), “E-mail Privacy in the Workplace. A Boundary Regulation Perspective”, Journal of Business Communications, Vol. 47 No. 3, pp. 266-294.10.1177/0021943610369783]Search in Google Scholar
[76. Taddicken, M. (2010), “Measuring Online Privacy Concern and Protection in the (Social) Web: Development of the APCP and APCP-18 Scale”, Paper presented at the 60th Annual Conference of the International Communication Association, Singapore.]Search in Google Scholar
[77. Taddicken, M. (2014), “The ‘Privacy Paradox’ in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure”, Journal of Computer- Mediated Communication, Vol. 19 No.2, pp. 248-273.10.1111/jcc4.12052]Search in Google Scholar
[78. Tavani, H. T. (2004). “Ethics and technology: Ethical issues in an age of information and communication technology”, John Wiley & Sons, Chichester.]Search in Google Scholar
[79. Taylor, P., Bain, P. (1999). “An assembly line in the head’: Work and employee relations in the call centre”, Industrial Relations Journal, Vol. 30 No.2, pp. 101–117.10.1111/1468-2338.00113]Search in Google Scholar
[80. Tyler, T. (2003). “Trust within organisations”, Personnel Review, Vol. 32 No. 5, pp. 556-568.10.1108/00483480310488333]Search in Google Scholar
[81. Wagner, J., Cummings, G., Smith, D., Olson, J., Anderson, L., Warren, S. (2010), “The Relationship between structural empowerment and psychological empowerment for nurses – a systematic view”, Journal of Nursing Management, Vol. 18 No. 4, pp. 448 – 462.10.1111/j.1365-2834.2010.01088.x]Search in Google Scholar
[82. Wong, C. A., Laschinger, H. K. (2013). Authentic leadership, performance, and job satisfaction: The mediating role of empowerment. Journal of Advanced Nursing, Vol. 69 No. 4, pp. 947-959.10.1111/j.1365-2648.2012.06089.x]Search in Google Scholar