{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:10:10Z","timestamp":1750227010547,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,4]],"date-time":"2015-06-04T00:00:00Z","timestamp":1433376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,4]]},"DOI":"10.1145\/2751957.2751959","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"79-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["IT Surveillance and Social Implications in the Workplace"],"prefix":"10.1145","author":[{"given":"Mohammad","family":"Mohammad","sequence":"first","affiliation":[{"name":"University of Western Sydney, Parramatta , Australia"}]}],"member":"320","published-online":{"date-parts":[[2015,6,4]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Canadian Employment Law Today","volume":"1","author":"Anonymous","year":"2015","journal-title":"Carswell Publishing."},{"issue":"2","key":"e_1_3_2_1_2_1","first-page":"44","article-title":"Spies Like Us","volume":"38","author":"Buss D.","year":"2001","journal-title":"Training."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/009102609702600408"},{"issue":"7","key":"e_1_3_2_1_4_1","first-page":"475","article-title":"Philosophical Dimensions of Privacy","volume":"12","author":"Fried S.","year":"1984","journal-title":"Yale Law Journal."},{"issue":"1","key":"e_1_3_2_1_5_1","first-page":"1","article-title":"Can you trust your staff?","volume":"7","author":"Grant I.","year":"2008","journal-title":"Computer Weekly."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-007-9449-6"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/43327.12.3.20030701\/43625.6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/572260.572267"},{"issue":"2","key":"e_1_3_2_1_9_1","first-page":"223","article-title":"What is a reasonable expectation of privacy in the information contained on a workplace computer?","volume":"22","author":"Kotyk J.","year":"2013","journal-title":"Education Law Journal."},{"key":"e_1_3_2_1_10_1","unstructured":"Kozlowski J. 2009. Privacy please! Parks & Recreation. Technical report NJ.  Kozlowski J. 2009. Privacy please! Parks & Recreation. Technical report NJ."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1108\/01409170310784014"},{"volume-title":"A Theory of Justice Available from: ProQuest ebrary. {12","year":"2015","author":"Leiden N.L.D.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012227629496"},{"issue":"1","key":"e_1_3_2_1_14_1","first-page":"72","article-title":"WORKER watching","volume":"3","author":"Martin A.","year":"2008","journal-title":"Journal International"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1145287.1145290"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/502269.502298"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-009-9208-8"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/502269.502304"},{"issue":"4","key":"e_1_3_2_1_19_1","first-page":"44","article-title":"From workplace bullying to cyberbullying: The enigma of harassment in modern organizations","volume":"30","author":"Piotrowski C.","year":"2012","journal-title":"Organization Development Journal"},{"issue":"2","key":"e_1_3_2_1_20_1","first-page":"186","article-title":"Implementing electronic health information systems in local community settings: Examining individual and organizational change experiences in the Philippines","volume":"15","author":"Premji S.","year":"2012","journal-title":"Electronic Journal of Information Systems Evaluation."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290310001599733"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/503345.503347"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1108\/00012530210426266"},{"key":"e_1_3_2_1_24_1","first-page":"26","article-title":"Tape Recorders at Work","volume":"22","author":"Wilczeck D.G.","year":"2005","journal-title":"Computer and Internet Lawyer"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(02)00075-4"}],"event":{"name":"SIGMIS-CPR '15: 2015 Computers and People Research Conference","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Newport Beach California USA","acronym":"SIGMIS-CPR '15"},"container-title":["Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751957.2751959","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2751957.2751959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:07Z","timestamp":1750225387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2751957.2751959"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,4]]},"references-count":25,"alternative-id":["10.1145\/2751957.2751959","10.1145\/2751957"],"URL":"https:\/\/doi.org\/10.1145\/2751957.2751959","relation":{},"subject":[],"published":{"date-parts":[[2015,6,4]]},"assertion":[{"value":"2015-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}