{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T17:50:02Z","timestamp":1776189002640,"version":"3.50.1"},"reference-count":58,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2017,5,27]]},"DOI":"10.1080\/01972243.2017.1294126","type":"journal-article","created":{"date-parts":[[2017,4,6]],"date-time":"2017-04-06T20:10:57Z","timestamp":1491509457000},"page":"133-146","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":6,"title":["The technology mismatch paradox of mobile e-mail access: When changed norms of responsiveness meet technology undersupply"],"prefix":"10.1080","volume":"33","author":[{"given":"Isabell","family":"Loeschner","sequence":"first","affiliation":[{"name":",","place":["United Kingdom"]}]}],"member":"301","published-online":{"date-parts":[[2017,4,6]]},"reference":[{"key":"e_1_3_1_2_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1100.0573"},{"key":"e_1_3_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/0950017007073623"},{"key":"e_1_3_1_4_1","first-page":"16","volume-title":"New ways of organizing work: Developments, perspectives and experiences","author":"Besseyre des Horts C. H.","year":"2012","unstructured":"Besseyre des Horts, C. H., K. Dery, and J. S. MacCormick. 2012. Paradoxical consequences of the use of BlackBerrys? An application of the job-demand-support-control model. In New ways of organizing work: Developments, perspectives and experiences, ed. C. Kelliher and J. Richardson, 16\u201329. New York, NY: Routledge."},{"key":"e_1_3_1_5_1","doi-asserted-by":"publisher","DOI":"10.1162\/00346530152480081"},{"key":"e_1_3_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/0170840609104394"},{"key":"e_1_3_1_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/976784"},{"key":"e_1_3_1_8_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2008.31193163"},{"key":"e_1_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1741-3737.2005.00213.x"},{"key":"e_1_3_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691180903473806"},{"key":"e_1_3_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/0950017013500112"},{"key":"e_1_3_1_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/soc4.12170"},{"key":"e_1_3_1_13_1","doi-asserted-by":"publisher","DOI":"10.1057\/9780230227293"},{"key":"e_1_3_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2010.01.001"},{"key":"e_1_3_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMR.2010.5494697"},{"key":"e_1_3_1_16_1","doi-asserted-by":"crossref","unstructured":"Dawley D. D. and W. P. Anthony. 2003. User Perceptions of E-Mail at Work. Journal of Business and Technical Communication 17 (2): 170\u2013200.","DOI":"10.1177\/1050651902250947"},{"issue":"1","key":"e_1_3_1_17_1","first-page":"article 1","article-title":"The impact of e-mail communication on organizational life","volume":"4","author":"Derks D.","year":"2010","unstructured":"Derks, D., and A. B. Bakker. 2010. The impact of e-mail communication on organizational life. Cyberpsychology 4 (1):article 1.","journal-title":"Cyberpsychology"},{"key":"e_1_3_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8551.12027"},{"key":"e_1_3_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16199-5_15"},{"key":"e_1_3_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(99)00051-1"},{"key":"e_1_3_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507974"},{"key":"e_1_3_1_22_1","doi-asserted-by":"crossref","DOI":"10.4324\/9780203204962","volume-title":"Reinventing government in the information age: International practice in IT-Enabled public sector reform","author":"Heeks R.","year":"2002","unstructured":"Heeks, R. 2002. Reinventing government in the information age: International practice in IT-Enabled public sector reform. London, UK: Routledge."},{"issue":"9","key":"e_1_3_1_23_1","first-page":"83","article-title":"Death by information overload","volume":"87","author":"Hemp P.","year":"2009","unstructured":"Hemp, P. 2009. Death by information overload. Harvard Business Review 87 (9):83\u201389.","journal-title":"Harvard Business Review"},{"issue":"6","key":"e_1_3_1_24_1","first-page":"1","article-title":"Saying \u201cNo\u201d in a culture of hours, money and non-support","volume":"69","author":"Higgins C.","year":"2005","unstructured":"Higgins, C., and L. Duxbury. 2005. Saying \u201cNo\u201d in a culture of hours, money and non-support. Ivey Business Journal 69 (6):1\u20135.","journal-title":"Ivey Business Journal"},{"key":"e_1_3_1_25_1","doi-asserted-by":"publisher","DOI":"10.1177\/S0038038501000219"},{"key":"e_1_3_1_26_1","doi-asserted-by":"publisher","DOI":"10.1201\/1078.10580530\/45520.22.4.20050901\/90026.2"},{"key":"e_1_3_1_27_1","first-page":"398","volume-title":"Pervasive \u201909: Proceedings of the 7th international conference on pervasive computing","author":"Karlson A. K.","year":"2009","unstructured":"Karlson, A. K., B. R. Meyers, A. Jacobs, P. Johns, and S. K. Kane. 2009. Working overtime: Patterns of smartphone and PC usage in the day of an information worker. In Pervasive \u201909: Proceedings of the 7th international conference on pervasive computing, 398\u2013405. Berlin, Germany: Springer-Verlag."},{"key":"e_1_3_1_28_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400821211"},{"key":"e_1_3_1_29_1","article-title":"IT-Beauftragter: Fl\u00fcchtlinge \u00fcberfordern die Computer des Staates","author":"Knop C.","year":"2015","unstructured":"Knop, C. 2015. IT-Beauftragter: Fl\u00fcchtlinge \u00fcberfordern die Computer des Staates. Frankfurter Allgemeine Zeitung, November 7. http:\/\/www.faz.net\/aktuell\/wirtschaft\/menschen-wirtschaft\/fluechtlinge-ueberfordern-die-computer-des-staates-13898066.html (accessed January 26, 2017).","journal-title":"Frankfurter Allgemeine Zeitung"},{"key":"e_1_3_1_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/0170840611431653"},{"key":"e_1_3_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.orgdyn.2008.02.004"},{"key":"e_1_3_1_32_1","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199664054.001.0001"},{"key":"e_1_3_1_33_1","volume-title":"Understanding peripheral work connectivity: Power and contested spaces in digital workplaces","author":"Loeschner I. C.","year":"2016","unstructured":"Loeschner, I. C. 2016. Understanding peripheral work connectivity: Power and contested spaces in digital workplaces. Doctoral dissertation, London School of Economics and Political Science, London, UK."},{"key":"e_1_3_1_34_1","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195121599.001.0001","volume-title":"Information technology and the productivity paradox: Assessing the value of investing in IT","author":"Lucas H. C.","year":"1999","unstructured":"Lucas, H. C. 1999. Information technology and the productivity paradox: Assessing the value of investing in IT. New York, NY: Oxford University Press."},{"key":"e_1_3_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.orgdyn.2012.03.007"},{"key":"e_1_3_1_36_1","first-page":"344","volume-title":"Proceedings of the 1988 ACM conference on computer-supported cooperative work","author":"Mackay W. E.","year":"1988","unstructured":"Mackay, W. E. 1988. More than just a communication system: Diversity in the use of electronic mail. In Proceedings of the 1988 ACM conference on computer-supported cooperative work, 344\u201353. New York, NY: ACM."},{"key":"e_1_3_1_37_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2010.0787"},{"key":"e_1_3_1_38_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1120.0806"},{"key":"e_1_3_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/10304310701268695"},{"key":"e_1_3_1_40_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000614"},{"key":"e_1_3_1_41_1","volume-title":"Qualitative data analysis: An expanded sourcebook","author":"Miles M. B.","year":"1994","unstructured":"Miles, M. B., and A. M. Huberman. 1994. Qualitative data analysis: An expanded sourcebook, 2nd ed. Thousand Oaks, CA: Sage."},{"key":"e_1_3_1_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/0730888413481482"},{"key":"e_1_3_1_43_1","volume-title":"Sleeping with your smartphone: How to break the 24\/7 habit and change the way you work","author":"Perlow L. A.","year":"2012","unstructured":"Perlow, L. A. 2012. Sleeping with your smartphone: How to break the 24\/7 habit and change the way you work. Cambridge, MA: Harvard Business Review Press."},{"key":"e_1_3_1_44_1","doi-asserted-by":"crossref","unstructured":"Renaud K. J. Ramsay and M. Hair. 2006. \u2018You've Got E-Mail!' \u2026 Shall I Deal With It Now? Electronic Mail From the Recipient's Perspective. International Journal of Human-Computer Interaction 21 (3): 313\u201332.","DOI":"10.1207\/s15327590ijhc2103_3"},{"key":"e_1_3_1_45_1","doi-asserted-by":"crossref","unstructured":"Rennecker J. and L. Godwin. 2005. Delays and Interruptions: A Self-Perpetuating Paradox of Communication Technology Use. Information and Organization 15 (3): 247\u201366.","DOI":"10.1016\/j.infoandorg.2005.02.004"},{"key":"e_1_3_1_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/0950017012460329"},{"key":"e_1_3_1_47_1","first-page":"5-1\u20135-27","volume-title":"Computing handbook: Information systems and information technology","author":"Sawyer S.","year":"2014","unstructured":"Sawyer, S., and M. H. Jarrahi. 2014. Sociotechnical approaches to the study of Information Systems. In Computing handbook: Information systems and information technology, ed. H. Topi and A. Tucker, 3rd ed., pp. 5-1\u20135-27. London, UK: Chapman and Hall\/CRC.","edition":"3"},{"key":"e_1_3_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.04.024"},{"key":"e_1_3_1_49_1","unstructured":"Statista. 2016. Smartphone-Nutzung in Deutschland bis 2016. https:\/\/de.statista.com\/statistik\/daten\/studie\/198959\/umfrage\/anzahl-der-smartphonenutzer-in-deutschland-seit-2010 (accessed November 20 2016)."},{"key":"e_1_3_1_50_1","volume-title":"Human\u2013machine reconfigurations: Plans and situated actions","author":"Suchman L.","year":"2007","unstructured":"Suchman, L. 2007. Human\u2013machine reconfigurations: Plans and situated actions. New York, NY: Cambridge University Press."},{"key":"e_1_3_1_51_1","first-page":"305","volume-title":"DIS \u201908: Proceedings of the 7th ACM conference on designing interactive systems","author":"Su N. M.","year":"2008","unstructured":"Su, N. M., and G. Mark. 2008. Designing for Nomadic work. In DIS \u201908: Proceedings of the 7th ACM conference on designing interactive systems, 305\u201314. New York, NY: ACM."},{"key":"e_1_3_1_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/0275074006286704"},{"key":"e_1_3_1_53_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6486.00266"},{"key":"e_1_3_1_54_1","volume-title":"Quality and quantity","author":"Turner B. A.","year":"1981","unstructured":"Turner, B. A. 1981. Quality and quantity. Amsterdam, The Netherlands: Elsevier Scientific."},{"key":"e_1_3_1_55_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.1983.tb00211.x"},{"key":"e_1_3_1_56_1","doi-asserted-by":"publisher","DOI":"10.1177\/0038038508091620"},{"key":"e_1_3_1_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/0170840611410829"},{"key":"e_1_3_1_58_1","first-page":"276","volume-title":"Proceedings of the SIGCHI conference on human factors in computing systems","author":"Whittaker S.","year":"1996","unstructured":"Whittaker, S., and C. Sidner. 1996. Email overload: Exploring personal information management of email. In Proceedings of the SIGCHI conference on human factors in computing systems, 276\u201383. New York, NY: ACM."},{"key":"e_1_3_1_59_1","volume-title":"Case study research: Design and methods","author":"Yin R. K.","year":"2009","unstructured":"Yin, R. K. 2009. Case study research: Design and methods, 5th ed. Thousand Oaks, CA: Sage."}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2017.1294126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T09:42:54Z","timestamp":1744623774000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2017.1294126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,6]]},"references-count":58,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,5,27]]}},"alternative-id":["10.1080\/01972243.2017.1294126"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2017.1294126","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,6]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2015-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-01-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-04-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}