{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:04:10Z","timestamp":1760061850545},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,7,29]],"date-time":"2009-07-29T00:00:00Z","timestamp":1248825600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1007\/s10796-009-9205-9","type":"journal-article","created":{"date-parts":[[2009,7,28]],"date-time":"2009-07-28T08:53:04Z","timestamp":1248771184000},"page":"433-441","source":"Crossref","is-referenced-by-count":3,"title":["Ethical implications of internet monitoring: A comparative study"],"prefix":"10.1007","volume":"12","author":[{"given":"Frances S.","family":"Grodzinsky","sequence":"first","affiliation":[]},{"given":"Andra","family":"Gumbus","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Lilley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,7,29]]},"reference":[{"issue":"2","key":"9205_CR1","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1111\/j.1744-6570.2004.tb02495.x","volume":"57","author":"BJ Alge","year":"2004","unstructured":"Alge, B. J., Ballinger, G. A., & Green, S. G. (2004). Remote control: predictors of electronic monitoring intensity and secrecy. Personnel Psychology, 57(2), 377\u2013411. Durham: Summer (2004).","journal-title":"Personnel Psychology"},{"key":"9205_CR2","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1080\/014492900118803","volume":"19","author":"M Anandarajan","year":"2000","unstructured":"Anandarajan, M., Simmers, C., & Igbaria, M. (2000). An exploratory investigation of the antecedents and impact of internet usage: an individual perspective. Behavior and Information Technology, 19, 69\u201385.","journal-title":"Behavior and Information Technology"},{"key":"9205_CR3","first-page":"249","volume":"3","author":"F Grodzinsky","year":"2005","unstructured":"Grodzinsky, F., & Gumbus, A. (2005). Internet and productivity: ethical perspectives on workplace behavior. Journal of Information Communication and Ethics in Society, 3, 249\u2013256. supplement.","journal-title":"Journal of Information Communication and Ethics in Society"},{"key":"9205_CR4","unstructured":"Hall, L. (2004). Where to draw the line. Personnel Today. Sutton: June 1, 2004. p. 16."},{"key":"9205_CR5","unstructured":"Introna, L. (2001). Workplace surveillance, privacy and distributive justice. In Spinello and Tavani (Eds.), Readings in cyberethics (pp. 418\u2013429). Jones and Bartlett"},{"issue":"5","key":"9205_CR6","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1002\/job.161","volume":"23","author":"VKG Lim","year":"2002","unstructured":"Lim, V. K. G. (2002). The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675\u2013694.","journal-title":"Journal of Organizational Behavior"},{"issue":"4","key":"9205_CR7","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1108\/09593840210453124","volume":"15","author":"DK Peterson","year":"2002","unstructured":"Peterson, D. K. (2002). Computer ethics: the influence of guidelines and universal moral beliefs. Information Technology & People, 15(4), 346\u2013362. West Linn.","journal-title":"Information Technology & People"},{"issue":"2\/3","key":"9205_CR8","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1108\/09685220410530807","volume":"12","author":"S Petrovic-Lazarevic","year":"2004","unstructured":"Petrovic-Lazarevic, S., & Sohal, A. (2004). Nature of e-business ethical dilemmas. Information Management & Computer Security, 12(2\/3), 167. Bradford.","journal-title":"Information Management & Computer Security"},{"key":"9205_CR9","unstructured":"Soat, J. (2005). Spamming the globe, surfing at work. Information Week, (1039), 76. Manhasset: May 16, 2005."},{"key":"9205_CR10","unstructured":"Tavani, H. (ed) (2004), Readings in cyberethics, Jones and Bartlett, p. 418\u2013429."},{"issue":"3","key":"9205_CR11","doi-asserted-by":"crossref","first-page":"13","DOI":"10.5840\/bpej2000193\/45","volume":"19","author":"JS Taylor","year":"2000","unstructured":"Taylor, J. S. (2000). Big business as big brother: is employee privacy necessary for a human-centered management organization? Business and Professional Ethics Journal, 19(3), 13.","journal-title":"Business and Professional Ethics Journal"},{"issue":"1","key":"9205_CR12","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/502269.502303","volume":"45","author":"A Urbaczewski","year":"2002","unstructured":"Urbaczewski, A., & Jessup, L. M. (2002). Does electronic monitoring of employee internet usage work? Communications of the ACM, 45(1), 80\u201384.","journal-title":"Communications of the ACM"},{"issue":"193","key":"9205_CR13","first-page":"1","volume":"92","author":"P Slambrouck Van","year":"2000","unstructured":"Van Slambrouck, P. (2000). E-mail ethics: you\u2019ve got pink slip. Christian Science Monitor, 92(193), 1. 08827729.","journal-title":"Christian Science Monitor"},{"issue":"7","key":"9205_CR14","first-page":"52","volume":"74","author":"R Wakefield","year":"2004","unstructured":"Wakefield, R. (2004). Computer monitoring and surveillance. The CPA Journal, 74(7), 52. New York: Jul 2004.","journal-title":"The CPA Journal"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9205-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-009-9205-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-009-9205-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T00:36:13Z","timestamp":1559262973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-009-9205-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,29]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["9205"],"URL":"https:\/\/doi.org\/10.1007\/s10796-009-9205-9","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,29]]}}}