{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T11:30:54Z","timestamp":1777635054850,"version":"3.51.4"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst E-Bus Manage"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10257-023-00654-y","type":"journal-article","created":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T14:02:06Z","timestamp":1697464926000},"page":"913-945","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security compliance and work-issued mobile devices: Out of sight, out of mind?"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0949-9069","authenticated-orcid":false,"given":"Kent","family":"Marett","sequence":"first","affiliation":[]},{"given":"Shan","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Sumin","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"issue":"8","key":"654_CR1","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.1108\/PR-08-2016-0222","volume":"46","author":"TA Adisa","year":"2017","unstructured":"Adisa TA, Gbadamosi G, Osabutey E (2017) What happened to the border? The role of mobile information technology devices on employees\u2019 work-life balance. Pers Rev 46(8):1651\u20131671","journal-title":"Pers Rev"},{"issue":"1","key":"654_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/25148778","volume":"31","author":"M Ahuja","year":"2007","unstructured":"Ahuja M, Chudoba K, Kacmar C, McKnight DH, George J (2007) IT road warriors: balancing work-family conflict, job autonomy, and work overload to mitigate turnover intentions. MIS Q 31(1):1\u201317","journal-title":"MIS Q"},{"key":"654_CR3","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s10257-022-00575-2","volume":"21","author":"S Alahmari","year":"2023","unstructured":"Alahmari S, Renaud K, Omoronyia I (2023) Moving beyond cyber security awareness and training to engendering security knowledge sharing. Inf Syst e-Bus Manag 21(1):123\u2013158","journal-title":"Inf Syst e-Bus Manag"},{"issue":"2","key":"654_CR4","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1111\/joop.12346","volume":"94","author":"SE Althammer","year":"2021","unstructured":"Althammer SE, Reis D, van der Beek S, Beck L, Michel A (2021) A mindfulness intervention promoting work\u2013life balance: how segmentation preference affects changes in detachment, well-being, and work\u2013life balance. J Occup Organ Psychol 94(2):282\u2013308","journal-title":"J Occup Organ Psychol"},{"issue":"6","key":"654_CR5","doi-asserted-by":"publisher","first-page":"1082","DOI":"10.1111\/isj.12185","volume":"28","author":"D Armstrong","year":"2018","unstructured":"Armstrong D, Riemenschneider C, Giddens L (2018) The advancement and persistence of women in the information technology profession: an extension of Ahuja\u2019s gendered theory of IT career stages. Inf Syst J 28(6):1082\u20131124","journal-title":"Inf Syst J"},{"issue":"B","key":"654_CR6","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.cose.2013.05.006","volume":"39","author":"J Barlow","year":"2013","unstructured":"Barlow J, Warkentin M, Ormond D, Dennis A (2013) Don\u2019t make excuses! Discouraging neutralization to reduce it policy violation. Comput Secur 39(B):145\u2013159","journal-title":"Comput Secur"},{"issue":"4","key":"654_CR7","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1111\/1467-8551.12052","volume":"25","author":"A Beauregard","year":"2014","unstructured":"Beauregard A (2014) Fairness perceptions of work\u2212life balance initiatives: effects on counterproductive work behaviour. Br J Manag 25(4):772\u2013789","journal-title":"Br J Manag"},{"issue":"4","key":"654_CR8","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1086\/224665","volume":"74","author":"P Blumstein","year":"1969","unstructured":"Blumstein P, Weinstein E (1969) The redress of distributive injustice. Am J Sociol 74(4):408\u2013418","journal-title":"Am J Sociol"},{"issue":"3","key":"654_CR9","first-page":"38","volume":"11","author":"WS Brown","year":"2020","unstructured":"Brown WS, Palvia PC (2020) Differing perceptions of mobile devices: company-issued devices and bring your own device (BYOD). Int J Mob Comput Multimed Commun 11(3):38\u201347","journal-title":"Int J Mob Comput Multimed Commun"},{"issue":"3","key":"654_CR10","doi-asserted-by":"publisher","first-page":"763","DOI":"10.5465\/amj.2014.0170","volume":"58","author":"M Butts","year":"2015","unstructured":"Butts M, Becker W, Boswell W (2015) Hot buttons and time sinks: the effects of electronic communication during nonwork time on emotions and work-nonwork conflict. Acad Manag J 58(3):763\u2013788","journal-title":"Acad Manag J"},{"issue":"1","key":"654_CR11","first-page":"103","volume":"78","author":"P Cappelli","year":"2000","unstructured":"Cappelli P (2000) A market-driven approach to retaining talent. Harv Bus Rev 78(1):103\u2013111","journal-title":"Harv Bus Rev"},{"issue":"4","key":"654_CR12","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1037\/ocp0000103","volume":"23","author":"D Carlson","year":"2018","unstructured":"Carlson D, Thompson M, Crawford W, Boswell W, Whitten D (2018) Your job is messing with mine! The impact of mobile device use for work during family time on the spouse\u2019s work life. J Occup Health Psychol 23(4):471\u2013482","journal-title":"J Occup Health Psychol"},{"key":"654_CR13","unstructured":"Chaudhury A, Mallick D (2018) Can an ego defense mechanism model help explain dysfunctional is security behavior? Paper presented at the Twenty-fourth Americas Conference on Information Systems, New Orleans, LA"},{"issue":"1","key":"654_CR14","first-page":"41","volume":"7","author":"L Chen","year":"2008","unstructured":"Chen L, Nath R (2008) A socio-technical perspective of mobile work. Inf Knowl Syst Manag 7(1):41\u201360","journal-title":"Inf Knowl Syst Manag"},{"key":"654_CR15","doi-asserted-by":"publisher","first-page":"102568","DOI":"10.1016\/j.cose.2021.102568","volume":"113","author":"Y Chen","year":"2022","unstructured":"Chen Y, Xia W, Cousins K (2022) Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. Comput Secur 113:102568","journal-title":"Comput Secur"},{"issue":"6","key":"654_CR16","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1177\/0018726700536001","volume":"53","author":"SC Clark","year":"2000","unstructured":"Clark SC (2000) Work\/family border theory: a new theory of work\/family balance. Hum Relat 53(6):747\u2013770","journal-title":"Hum Relat"},{"issue":"3","key":"654_CR17","doi-asserted-by":"publisher","first-page":"731","DOI":"10.5465\/amj.2016.4003","volume":"59","author":"A Colbert","year":"2016","unstructured":"Colbert A, Yee N, George G (2016) The digital workforce and the workplace of the future. Acad Manag J 59(3):731\u2013739","journal-title":"Acad Manag J"},{"issue":"2","key":"654_CR18","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1037\/a0031757","volume":"98","author":"JA Colquitt","year":"2013","unstructured":"Colquitt JA, Scott BA, Rodell JB, Long DM, Zapata CP, Conlon DE, Wesson MJ (2013) Justice at the millennium, a decade later: a meta-analytic test of social exchange and affect-based perspectives. J Appl Psychol 98(2):199\u2013236","journal-title":"J Appl Psychol"},{"issue":"3","key":"654_CR19","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1111\/fare.12012","volume":"62","author":"JT Cooper","year":"2013","unstructured":"Cooper JT, Kidwell RE, Eddleston KA (2013) Boss and parent, employee and child: work-family roles and deviant behavior in the family firm. Fam Relat 62(3):457\u2013471","journal-title":"Fam Relat"},{"key":"654_CR20","volume-title":"Research design: qualitative and quantitative approaches","author":"JW Cresswell","year":"1994","unstructured":"Cresswell JW (1994) Research design: qualitative and quantitative approaches. Sage Publications, Thousand Oaks"},{"issue":"1","key":"654_CR21","first-page":"209","volume":"28","author":"R Crossler","year":"2014","unstructured":"Crossler R, Long J, Loraas T, Trinkle B (2014) Understanding compliance with bring your own device policies utilizing protection motivation theory: bridging the intentionbehavior gap. J Inf Syst 28(1):209\u2013226","journal-title":"J Inf Syst"},{"issue":"2","key":"654_CR22","doi-asserted-by":"publisher","first-page":"285","DOI":"10.2753\/MIS0742-1222310210","volume":"31","author":"J D'Arcy","year":"2014","unstructured":"D\u2019Arcy J, Herath T, Shoss M (2014) Understanding employee responses to stressful information security requirements: a coping perspective. J Manag Inf Syst 31(2):285\u2013318","journal-title":"J Manag Inf Syst"},{"issue":"1","key":"654_CR23","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1111\/isj.12173","volume":"29","author":"J D'Arcy","year":"2019","unstructured":"D\u2019Arcy J, Lowry PB (2019) Cognitive-affective drivers of employees\u2019 daily compliance with information security policies: a multilevel, longitudinal study. Inf Syst J 29(1):43\u201369","journal-title":"Inf Syst J"},{"issue":"3","key":"654_CR24","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1108\/IJCHM-12-2013-0538","volume":"27","author":"M Deery","year":"2015","unstructured":"Deery M, Jago L (2015) Revisiting talent management, work-life balance and retention strategies. Int J Contemp Hosp 27(3):453\u2013472","journal-title":"Int J Contemp Hosp"},{"key":"654_CR25","unstructured":"Deloitte (2022) Women at Work 2022: A Global Outlook. Retrieved from https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/global\/Documents\/deloitte-women-at-work-2022-a-global-outlook.pdf"},{"issue":"2","key":"654_CR26","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1111\/ntwe.12031","volume":"29","author":"I D\u00e9n-Nagy","year":"2014","unstructured":"D\u00e9n-Nagy I (2014) A double-edged sword?: A critical evaluation of the mobile phone in creating work\u2013life balance. N Technol Work Employ 29(2):193\u2013211","journal-title":"N Technol Work Employ"},{"issue":"2","key":"654_CR27","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1177\/07308884211047208","volume":"49","author":"W Fan","year":"2022","unstructured":"Fan W, Moen P (2022) Working more, less or the same during COVID-19? A mixed method, intersectional analysis of remote workers. Work Occup 49(2):143\u2013186","journal-title":"Work Occup"},{"key":"654_CR28","doi-asserted-by":"publisher","first-page":"2414","DOI":"10.3389\/fpsyg.2018.02414","volume":"9","author":"JC Field","year":"2018","unstructured":"Field JC, Chan XW (2018) Contemporary knowledge workers and the boundaryless work\u2013life interface: implications for the human resource management of the knowledge workforce. Front Psychol 9:2414","journal-title":"Front Psychol"},{"issue":"2023","key":"654_CR29","first-page":"634","volume":"32","author":"LH Fischer","year":"2022","unstructured":"Fischer LH, Baskerville R (2022) Explaining sociotechnical change: an unstable equilibrium perspective. Eur J Inf Syst 32(2023):634\u2013652","journal-title":"Eur J Inf Syst"},{"issue":"1","key":"654_CR30","doi-asserted-by":"publisher","first-page":"10","DOI":"10.2307\/258605","volume":"16","author":"C Gersick","year":"1991","unstructured":"Gersick C (1991) Revolutionary change theories: a multilevel exploration of the punctuated equilibrium paradigm. Acad Manag Rev 16(1):10\u201336","journal-title":"Acad Manag Rev"},{"key":"654_CR31","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.cose.2017.12.006","volume":"73","author":"D Goel","year":"2018","unstructured":"Goel D, Jain AK (2018) Mobile phishing attacks and defence mechanisms: state of art and open research challenges. Comput Secur 73:519\u2013544","journal-title":"Comput Secur"},{"issue":"3","key":"654_CR32","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1177\/0893318908327160","volume":"22","author":"A Golden","year":"2009","unstructured":"Golden A (2009) Employee families and organizations as mutually enacted environments: a sensemaking approach to work\u2013life interrelationships. Manag Commun Q 22(3):385\u2013415","journal-title":"Manag Commun Q"},{"key":"654_CR33","unstructured":"Grand Canyon University (2020) Work-Life Balance Stats Among Business Professionals. Retrieved from https:\/\/www.gcu.edu\/blog\/business-management\/work-life-balance-stats-among-business-professionals. Accessed Dec 13, 2022"},{"key":"654_CR34","first-page":"111","volume-title":"Research in organizational behavior","author":"J Greenberg","year":"1990","unstructured":"Greenberg J (1990) Looking fair versus being fair: managing impressions of organizational justice. In: Staw BM, Cummings LL (eds) Research in organizational behavior, vol 12. JAI Press, Greenwich, pp 111\u2013157"},{"key":"654_CR01","doi-asserted-by":"publisher","first-page":"611","DOI":"10.2307\/25148742","volume":"30","author":"S Gregor","year":"2006","unstructured":"Gregor S (2006) The nature of theory in information systems. MIS Q 30(3):611\u2013642","journal-title":"MIS Q"},{"issue":"11","key":"654_CR35","first-page":"5","volume":"15","author":"S Gregor","year":"2014","unstructured":"Gregor S, Klein G (2014) Eight obstacles to overcome in the theory testing genre. J Assoc Inf Syst 15(11):5","journal-title":"J Assoc Inf Syst"},{"issue":"4","key":"654_CR36","first-page":"577","volume":"9","author":"R Griffeth","year":"1999","unstructured":"Griffeth R, Gaertner S, Sager J (1999) Taxonomic model of withdrawal behaviors: the adaptive response model. Hum Resour Manag Rev 9(4):577\u2013590","journal-title":"Hum Resour Manag Rev"},{"issue":"3","key":"654_CR37","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/s10257-015-0299-y","volume":"14","author":"CH Han","year":"2016","unstructured":"Han CH, Tyagi S, Kim N, Choi B (2016) Understanding Internet service switching behaviour based on the stage model. IseB 14(3):665\u2013689","journal-title":"IseB"},{"issue":"9","key":"654_CR38","doi-asserted-by":"publisher","first-page":"2077","DOI":"10.1111\/j.1559-1816.2011.00805.x","volume":"41","author":"KJ Harris","year":"2011","unstructured":"Harris KJ, Marett K, Harris RB (2011) Technology-related pressure and work\u2013family conflict: main effects and an examination of moderating variables. J Appl Soc Psychol 41(9):2077\u20132103","journal-title":"J Appl Soc Psychol"},{"key":"654_CR39","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1016\/j.chb.2009.03.005","volume":"25","author":"C Henle","year":"2009","unstructured":"Henle C, Kohut G, Booth R (2009) Designing electronic use policies to enhance employee perceptions of fairness and to reduce cyberloafing: an empirical test of justice theory. Comput Hum Behav 25:902\u2013910","journal-title":"Comput Hum Behav"},{"issue":"1","key":"654_CR40","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1111\/j.1741-3729.2001.00049.x","volume":"50","author":"E Hill","year":"2001","unstructured":"Hill E, Hawkins A, Ferris M, Weitzman M (2001) Finding an extra day a week: the positive influence of perceived job flexibility on work and family life balance. Fam Relat 50(1):49\u201358","journal-title":"Fam Relat"},{"issue":"6","key":"654_CR41","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/1953122.1953142","volume":"54","author":"Q Hu","year":"2011","unstructured":"Hu Q, Xu Z, Dinev T, Ling H (2011) Does deterrence work in reducing information security policy abuse by employees? Commun ACM 54(6):54\u201360","journal-title":"Commun ACM"},{"issue":"2","key":"654_CR42","doi-asserted-by":"publisher","first-page":"151","DOI":"10.2307\/249376","volume":"15","author":"M Igbaria","year":"1991","unstructured":"Igbaria M, Greenhaus JH, Parasuraman S (1991) Career orientations of MIS employees: an empirical analysis. MIS Q 15(2):151\u2013169","journal-title":"MIS Q"},{"issue":"4","key":"654_CR43","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1177\/1534484317725438","volume":"16","author":"S Kim","year":"2017","unstructured":"Kim S, Christensen A (2017) The dark and bright sides of personal use of technology at work: a job demands\u2013resources model. Hum Resour Dev Rev 16(4):425\u2013447","journal-title":"Hum Resour Dev Rev"},{"issue":"6","key":"654_CR44","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1057\/ejis.2012.18","volume":"21","author":"H Koch","year":"2012","unstructured":"Koch H, Gonzalez E, Leidner D (2012) Bridging the work\/social divide: the emotional response to organizational social networking sites. Eur J Inf Syst 21(6):699\u2013717","journal-title":"Eur J Inf Syst"},{"key":"654_CR45","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.chb.2013.09.021","volume":"30","author":"C K\u00f6nig","year":"2014","unstructured":"K\u00f6nig C, Caner de la Guardia M (2014) Exploring the positive side of personal Internet use at work: Does it help in managing the border between work and nonwork? Comput Hum Behav 30:355\u2013360","journal-title":"Comput Hum Behav"},{"issue":"4","key":"654_CR46","first-page":"317","volume":"20","author":"D Kwak","year":"2019","unstructured":"Kwak D, Holtkamp P, Kim S (2019) Measuring and controlling social desirability Bias: applications in information systems research. J Assoc Inf Syst 20(4):317\u2013345","journal-title":"J Assoc Inf Syst"},{"issue":"4","key":"654_CR47","first-page":"309","volume":"57","author":"J Lee","year":"2017","unstructured":"Lee J, Warkentin M, Crossler R, Otondo R (2017) Implications of monitoring mechanisms on bring your own device adoption. J Comput Inf Syst 57(4):309\u2013318","journal-title":"J Comput Inf Syst"},{"issue":"6","key":"654_CR48","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1111\/isj.12037","volume":"24","author":"H Li","year":"2014","unstructured":"Li H, Sarathy R, Zhang J, Luo X (2014) Exploring the effects of organizational justice, personal ethics and sanction on Internet use policy compliance. Inf Syst J 24(6):479\u2013502","journal-title":"Inf Syst J"},{"issue":"4","key":"654_CR49","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1016\/j.jretai.2012.08.001","volume":"88","author":"S MacKenzie","year":"2012","unstructured":"MacKenzie S, Podsakoff P (2012) Common method bias in marketing: causes, mechanisms, and procedural remedies. J Retail 88(4):542\u2013555","journal-title":"J Retail"},{"issue":"1\/2","key":"654_CR50","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1111\/1468-2389.00192","volume":"10","author":"M Martinko","year":"2002","unstructured":"Martinko M, Gundlach M, Douglas S (2002) Toward an integrative theory of counterproductive workplace behavior: a causal reasoning perspective. Int J Sel Assess 10(1\/2):36\u201350","journal-title":"Int J Sel Assess"},{"issue":"8","key":"654_CR51","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1177\/0018726711405552","volume":"64","author":"S Matusik","year":"2011","unstructured":"Matusik S, Mickel A (2011) Embracing or embattled by converged mobile devices? Users\u2019 experiences with a contemporary connectivity technology. Hum Relat 64(8):1001\u20131030","journal-title":"Hum Relat"},{"key":"654_CR52","first-page":"152","volume-title":"Readings in human-computer interaction","author":"J McGrath","year":"1995","unstructured":"McGrath J (1995) Methodology matters: doing research in the behavioral and social sciences. In: Baecker RM, Grudin J, Buxton W, Greenberg S (eds) Readings in human-computer interaction. Morgan Kaufmann, San Francisco, pp 152\u2013169"},{"key":"654_CR53","doi-asserted-by":"publisher","first-page":"209","DOI":"10.4324\/9780203894354.ch15","volume-title":"Mobility and technology in the workplace","author":"C Middleton","year":"2008","unstructured":"Middleton C (2008) Do mobile technologies enable work\u2013life balance? In: Hislop D (ed) Mobility and technology in the workplace. Routledge, Abingdon, pp 209\u2013224"},{"issue":"16","key":"654_CR54","first-page":"289","volume":"11","author":"P Palvia","year":"2003","unstructured":"Palvia P, Mao E, Salam A, Soliman K (2003) Management information systems research: What\u2019s there in a methodology? Commun Assoc Inf Syst 11(16):289\u2013309","journal-title":"Commun Assoc Inf Syst"},{"issue":"2","key":"654_CR55","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1080\/07421222.1993.11518001","volume":"10","author":"A Pinsonneault","year":"1993","unstructured":"Pinsonneault A, Kraemer K (1993) Survey research methodology in management information systems: an assessment. J Manag Inf Syst 10(2):75\u2013105","journal-title":"J Manag Inf Syst"},{"issue":"3","key":"654_CR56","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/2629567","volume":"9","author":"J Pitt","year":"2014","unstructured":"Pitt J, Busquets D, Macbeth S (2014) Distributive justice for self-organised common-pool resource management. ACM Trans Auton Adapt Syst 9(3):14","journal-title":"ACM Trans Auton Adapt Syst"},{"issue":"5","key":"654_CR57","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1080\/0960085X.2018.1457194","volume":"27","author":"G Polites","year":"2018","unstructured":"Polites G, Serrano C, Thatcher J, Matthews K (2018) Understanding social networking site (SNS) identity from a dual systems perspective: an investigation of the dark side of SNS use. Eur J Inf Syst 27(5):600\u2013621","journal-title":"Eur J Inf Syst"},{"issue":"1","key":"654_CR58","first-page":"24","volume":"7","author":"C Posey","year":"2011","unstructured":"Posey C, Bennett B, Roberts T, Lowry PB (2011) When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse. J Inf Syst Secur 7(1):24\u201347","journal-title":"J Inf Syst Secur"},{"issue":"3","key":"654_CR59","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1057\/palgrave.ejis.3000617","volume":"15","author":"E Prasopoulou","year":"2006","unstructured":"Prasopoulou E, Pouloudi A, Panteli N (2006) Enacting new temporal boundaries: the role of mobile phones. Eur J Inf Syst 15(3):277\u2013284","journal-title":"Eur J Inf Syst"},{"issue":"6","key":"654_CR60","doi-asserted-by":"publisher","first-page":"1580","DOI":"10.1111\/j.1559-1816.2008.00360.x","volume":"38","author":"SJ Ramlall","year":"2008","unstructured":"Ramlall SJ (2008) Enhancing employee performance through positive organizational behavior. J Appl Soc Psychol 38(6):1580\u20131600","journal-title":"J Appl Soc Psychol"},{"key":"654_CR61","unstructured":"Reisinger PP (2022) Through the spying-glass: Data privacy concerns regarding mobile spyware apps. In: Proceedings of the Boston College Intellectual Property and Technology Forum, vol 2022. pp 1\u201318"},{"key":"654_CR62","volume-title":"Theories of distributive justice","author":"J Roemer","year":"1998","unstructured":"Roemer J (1998) Theories of distributive justice. Harvard University Press, Cambridge"},{"issue":"1","key":"654_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/job.78","volume":"22","author":"D Rousseau","year":"2001","unstructured":"Rousseau D, Fried Y (2001) Location, location, location: contextualizing organizational research. J Organ Behav 22(1):1\u201313","journal-title":"J Organ Behav"},{"issue":"1","key":"654_CR64","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1287\/isre.2017.0734","volume":"29","author":"S Sarker","year":"2018","unstructured":"Sarker S, Ahuja M, Sarker S (2018) Work\u2013life conflict of globally distributed software development personnel: an empirical investigation using border theory. Inf Syst Res 29(1):103\u2013126","journal-title":"Inf Syst Res"},{"issue":"4","key":"654_CR65","first-page":"143","volume":"11","author":"S Sarker","year":"2012","unstructured":"Sarker S, Sarker S, Xiao X, Ahuja M (2012) Managing employees\u2019 use of mobile technologies to minimize work-life balance impacts. MIS Q Exec 11(4):143\u2013157","journal-title":"MIS Q Exec"},{"issue":"4","key":"654_CR66","doi-asserted-by":"publisher","first-page":"iii","DOI":"10.2307\/25148813","volume":"31","author":"C Saunders","year":"2007","unstructured":"Saunders C, Kim J (2007) Editor\u2019s comments: Perspectives on time. MIS Q 31(4):iii\u2013xi","journal-title":"MIS Q"},{"key":"654_CR67","first-page":"100564","volume":"71","author":"S Schieman","year":"2021","unstructured":"Schieman S, Narisada A (2021) A less objectionable greed? Work-life conflict and unjust pay during a pandemic. Res Soc Stratif Mobil 71:100564","journal-title":"Res Soc Stratif Mobil"},{"issue":"2","key":"654_CR68","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1111\/j.1748-8583.2004.tb00119.x","volume":"14","author":"D Scholarios","year":"2004","unstructured":"Scholarios D, Marks A (2004) Work-life balance and the software worker. Hum Resour Manag J 14(2):54\u201374","journal-title":"Hum Resour Manag J"},{"issue":"3","key":"654_CR69","doi-asserted-by":"publisher","first-page":"712","DOI":"10.5465\/amj.2012.0911","volume":"58","author":"T Stanko","year":"2015","unstructured":"Stanko T, Beckman C (2015) Watching you watching me: Boundary control and capturing attention in the context of ubiquitous technology use. Acad Manag J 58(3):712\u2013738","journal-title":"Acad Manag J"},{"key":"654_CR70","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190625504.001.0001","volume-title":"Negotiating control: organizations and mobile communication","author":"K Stephens","year":"2018","unstructured":"Stephens K (2018) Negotiating control: organizations and mobile communication. Oxford University Press, New York"},{"key":"654_CR71","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s10257-021-00526-3","volume":"20","author":"S Tams","year":"2022","unstructured":"Tams S, Grover V, Thatcher J, Ahuja M (2022) Grappling with modern technology: interruptions mediated by mobile devices impact older workers disproportionately. Inf Syst e-Bus Manag 20(4):635\u2013655","journal-title":"Inf Syst e-Bus Manag"},{"issue":"5","key":"654_CR72","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1108\/ER-11-2016-0223","volume":"39","author":"SJ Thakur","year":"2017","unstructured":"Thakur SJ, Bhatnagar J (2017) Mediator analysis of job embeddedness: relationship between work-life balance practices and turnover intentions. Empl Relat 39(5):718\u2013731","journal-title":"Empl Relat"},{"issue":"10","key":"654_CR73","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2022.e10881","volume":"8","author":"YT Tu","year":"2022","unstructured":"Tu YT, Sulistiawan J, Ekowati D, Rizaldy H (2022) Work-family conflict and salespeople deviant behavior: the mediating role of job stress. Heliyon 8(10):e10881","journal-title":"Heliyon"},{"issue":"4","key":"654_CR74","doi-asserted-by":"publisher","first-page":"263","DOI":"10.2753\/MIS0742-1222290410","volume":"29","author":"A Vance","year":"2013","unstructured":"Vance A, Lowry PB, Eggett D (2013) Using accountability to reduce access policy violations in information systems. J Manag Inf Syst 29(4):263\u2013289","journal-title":"J Manag Inf Syst"},{"issue":"4","key":"654_CR75","doi-asserted-by":"publisher","first-page":"103212","DOI":"10.1016\/j.im.2019.103212","volume":"57","author":"A Vance","year":"2020","unstructured":"Vance A, Siponen MT, Straub DW (2020) Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Inf Manag 57(4):103212","journal-title":"Inf Manag"},{"issue":"2","key":"654_CR76","doi-asserted-by":"publisher","first-page":"27","DOI":"10.7309\/jmtm.7.2.4","volume":"7","author":"L Vearrier","year":"2018","unstructured":"Vearrier L, Rosenberger K, Weber V (2018) Use of personal devices in healthcare: guidelines from a roundtable discussion. J Mob Technol Med 7(2):27\u201334","journal-title":"J Mob Technol Med"},{"issue":"2","key":"654_CR77","first-page":"51","volume":"21","author":"C Von Bergen","year":"2019","unstructured":"Von Bergen C, Bressler M (2019) Work, non-work boundaries and the right to disconnect. J Appl Bus Econ 21(2):51\u201369","journal-title":"J Appl Bus Econ"},{"issue":"1","key":"654_CR78","first-page":"48","volume":"55","author":"D Whitten","year":"2014","unstructured":"Whitten D, Hightower R, Sayeed L (2014) Mobile device adaptation efforts: the impact of hedonic and utilitarian value. J Comput Inf Syst 55(1):48\u201358","journal-title":"J Comput Inf Syst"},{"issue":"2","key":"654_CR79","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1111\/isj.12129","volume":"28","author":"R Willison","year":"2018","unstructured":"Willison R, Warkentin M, Johnston AC (2018) Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Inf Syst J 28(2):266\u2013293","journal-title":"Inf Syst J"},{"key":"654_CR80","volume-title":"Work, families, and organizations","author":"S Zedeck","year":"1992","unstructured":"Zedeck S (1992) Work, families, and organizations. Jossey-Bass, San Francisco"}],"container-title":["Information Systems and e-Business Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-023-00654-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10257-023-00654-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10257-023-00654-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,9]],"date-time":"2023-12-09T04:23:18Z","timestamp":1702095798000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10257-023-00654-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":81,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["654"],"URL":"https:\/\/doi.org\/10.1007\/s10257-023-00654-y","relation":{},"ISSN":["1617-9846","1617-9854"],"issn-type":[{"value":"1617-9846","type":"print"},{"value":"1617-9854","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"28 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}