{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T07:56:44Z","timestamp":1761983804413,"version":"build-2065373602"},"reference-count":102,"publisher":"American Accounting Association","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>This study examines the impact of dataveillance on employee accountability, privacy invasion, and compliance intentions across various industries. By drawing on accountability theory and analyzing survey data from 149 employees, we explore how monitoring practices influence these perceptions. Our findings reveal that dataveillance significantly enhances accountability, which in turn promotes compliance with data security policies. However, heightened perceptions of privacy invasion due to monitoring can reduce compliance intentions, creating a tension between its positive and negative effects. These results emphasize the dual role of workplace monitoring, as it serves both to reinforce accountability and to provoke concerns about privacy. Organizations must navigate these tradeoffs carefully to maximize the benefits of dataveillance while minimizing its adverse impacts on employee behavior. This study contributes to the literature by demonstrating how dataveillance simultaneously enhances accountability and heightens privacy concerns, providing insights into the tradeoffs organizations face when implementing monitoring practices to ensure compliance.<\/jats:p>","DOI":"10.2308\/isys-2023-050","type":"journal-article","created":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T09:51:39Z","timestamp":1748512299000},"page":"157-175","source":"Crossref","is-referenced-by-count":1,"title":["Dataveillance Duality: Navigating Employee Accountability and Privacy Concerns in the Digital Age"],"prefix":"10.2308","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1895-194X","authenticated-orcid":false,"given":"Paul A.","family":"Raddatz","sequence":"first","affiliation":[{"name":"The University of Memphis"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7641-1314","authenticated-orcid":false,"given":"Nirmalee I.","family":"Raddatz","sequence":"additional","affiliation":[{"name":"The University of Memphis"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0534-6732","authenticated-orcid":false,"given":"Kehinde M.","family":"Ogunade","sequence":"additional","affiliation":[{"name":"Middle Tennessee State University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2866-3549","authenticated-orcid":false,"given":"Sohee","family":"Kim","sequence":"additional","affiliation":[{"name":"Missouri State University"}]}],"member":"1112","published-online":{"date-parts":[[2025,9,25]]},"reference":[{"key":"2025110103523672400_B1","unstructured":"Accenture. 2019. More responsible use of workforce data required to strengthen employee trust and unlock growth, according to Accenture report. https:\/\/newsroom.accenture.com\/news\/2019\/more-responsible-use-of-workforce-data-required-to-strengthen-employee-trust-and-unlock-growth-according-to-accenture-report?utm_source=chatgpt.com"},{"issue":"6221","key":"2025110103523672400_B2","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.aaa1465","article-title":"Privacy and human behavior in the age of information","volume":"347","author":"Acquisti,","year":"2015","journal-title":"Science"},{"issue":"3","key":"2025110103523672400_B3","first-page":"735","article-title":"Limitless worker surveillance","volume":"105","author":"Ajunwa,","year":"2017","journal-title":"California Law Review"},{"issue":"4","key":"2025110103523672400_B4","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1037\/0021-9010.86.4.797","article-title":"Effects of computer surveillance on perceptions of privacy and procedural justice","volume":"86","author":"Alge,","year":"2001","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"2025110103523672400_B5","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1037\/0021-9010.91.1.221","article-title":"Information privacy in organizations: Empowering creative and extrarole performance","volume":"91","author":"Alge,","year":"2006","journal-title":"Journal of Applied Psychology"},{"issue":"2","key":"2025110103523672400_B6","doi-asserted-by":"crossref","first-page":"195","DOI":"10.2308\/jis.2008.22.2.195","article-title":"Putting continuous auditing theory into practice: Lessons from two pilot implementations","volume":"22","author":"Alles,","year":"2008","journal-title":"Journal of Information Systems"},{"key":"2025110103523672400_B7","unstructured":"American Management Association (AMA). 2007. The latest on workplace monitoring and surveillance. https:\/\/www.amanet.org\/articles\/the-latest-on-workplace-monitoring-and-surveillance\/"},{"issue":"3-part-2","key":"2025110103523672400_B8","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1287\/isre.1110.0408","article-title":"Information, technology, and information worker productivity","volume":"23","author":"Aral,","year":"2012","journal-title":"Information Systems Research"},{"issue":"2","key":"2025110103523672400_B9","doi-asserted-by":"crossref","first-page":"261","DOI":"10.2307\/23044044","article-title":"Measurement and meaning in information systems and organizational research: Methodological and philosophical foundations","volume":"35","author":"Bagozzi,","year":"2011","journal-title":"MIS Quarterly"},{"issue":"1","key":"2025110103523672400_B10","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1080\/00236561003654776","article-title":"Workplace surveillance: An overview","volume":"51","author":"Ball,","year":"2010","journal-title":"Labor History"},{"key":"2025110103523672400_B11","unstructured":"Ball,\n              K.\n            \n          \n          2021. Electronic monitoring and surveillance in the workplace: Literature review and policy recommendations. https:\/\/publications.jrc.ec.europa.eu\/repository\/bitstream\/JRC125716\/jrc125716_electronic_monitoring_and_surveillance_in_the_workplace_final.pdf"},{"issue":"2","key":"2025110103523672400_B12","doi-asserted-by":"crossref","first-page":"209","DOI":"10.2308\/jis.2002.16.2.209","article-title":"Impact of information technology on public accounting firm productivity","volume":"16","author":"Banker,","year":"2002","journal-title":"Journal of Information Systems"},{"issue":"6","key":"2025110103523672400_B13","doi-asserted-by":"crossref","first-page":"1173","DOI":"10.1037\/0022-3514.51.6.1173","article-title":"The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations","volume":"51","author":"Baron,","year":"1986","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"2025110103523672400_B14","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1093\/pan\/mpr057","article-title":"Evaluating online labor markets for experimental research: Amazon.com\u2019s Mechanical Turk","volume":"20","author":"Berinsky,","year":"2012","journal-title":"Political Analysis"},{"issue":"5","key":"2025110103523672400_B15","doi-asserted-by":"crossref","first-page":"946","DOI":"10.1080\/01402382.2010.486119","article-title":"Two concepts of AC: Accountability as a virtue and as a mechanism","volume":"33","author":"Bovens,","year":"2010","journal-title":"West European Politics"},{"volume-title":"Psychological Reactance: A Theory of Freedom and Control","year":"1981","author":"Brehm,","key":"2025110103523672400_B16"},{"issue":"3","key":"2025110103523672400_B17","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness","volume":"34","author":"Bulgurcu,","year":"2010","journal-title":"MIS Quarterly"},{"key":"2025110103523672400_B18","unstructured":"Carnegie,\n              M.\n            \n          \n          2023. The creepy rise of bossware. Wired. https:\/\/www.wired.com\/story\/creepy-rise-bossware\/#:\u223c:text=By 2025%2C Gartner estimates that,employers doing so in 2021"},{"issue":"6","key":"2025110103523672400_B19","doi-asserted-by":"crossref","first-page":"2156","DOI":"10.1016\/j.chb.2013.05.009","article-title":"Separate but equal? A comparison of participants and data gathered via Amazon\u2019s MTurk, social media, and face-to-face behavioral testing","volume":"29","author":"Casler,","year":"2013","journal-title":"Computers in Human Behavior"},{"key":"2025110103523672400_B20","doi-asserted-by":"crossref","unstructured":"Chen,\n              D.\n            , and H.Zhao. 2012. Data security and privacy protection issues in cloud computing. 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, China, March 23\u201325.","DOI":"10.1109\/ICCSEE.2012.193"},{"issue":"2","key":"2025110103523672400_B21","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1287\/isre.14.2.189.16018","article-title":"A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion\/adoption study","volume":"14","author":"Chin,","year":"2003","journal-title":"Information Systems Research"},{"issue":"1","key":"2025110103523672400_B22","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1177\/002224377901600110","article-title":"A paradigm for developing better measures of marketing constructs","volume":"16","author":"Churchill,","year":"1979","journal-title":"Journal of Marketing Research"},{"issue":"5","key":"2025110103523672400_B23","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1145\/42411.42413","article-title":"Information technology and dataveillance","volume":"31","author":"Clarke,","year":"1988","journal-title":"Communications of the ACM"},{"key":"2025110103523672400_B24","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.3073492","article-title":"Dataveillance regulation: A research framework","author":"Clarke,","year":"2017"},{"issue":"6","key":"2025110103523672400_B25","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1057\/s41303-017-0059-9","article-title":"Organizational information security policies: A review and research framework","volume":"26","author":"Cram,","year":"2017","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"2025110103523672400_B26","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/2691517.2691521","article-title":"An extended perspective on individual security behaviors: Protection motivation theory and a unified security practices (USP) instrument","volume":"45","author":"Crossler,","year":"2014","journal-title":"ACM SIGMIS Database: The DATABASE for Advances in Information Systems"},{"issue":"1","key":"2025110103523672400_B27","doi-asserted-by":"crossref","first-page":"209","DOI":"10.2308\/isys-50704","article-title":"Understanding compliance with bring your own device policies utilizing protection motivation theory: Bridging the intention-behavior gap","volume":"28","author":"Crossler,","year":"2014","journal-title":"Journal of Information Systems"},{"issue":"1","key":"2025110103523672400_B28","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","article-title":"Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation","volume":"10","author":"Culnan,","year":"1999","journal-title":"Organization Science"},{"key":"2025110103523672400_B29","unstructured":"Cybersecurity Insiders. 2024. New report reveals insider threat trends, challenges, and solutions. https:\/\/www.cybersecurity-insiders.com\/2024-insider-threat-report-trends-challenges-and-solutions\/"},{"issue":"1","key":"2025110103523672400_B30","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1287\/isre.1070.0160","article-title":"User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach","volume":"20","author":"D\u2019Arcy,","year":"2009","journal-title":"Information Systems Research"},{"issue":"2","key":"2025110103523672400_B31","doi-asserted-by":"crossref","first-page":"209","DOI":"10.24908\/ss.v12i2.5113","article-title":"When Big Data meets dataveillance: The hidden side of analytics","volume":"12","author":"Degli Esposti,","year":"2014","journal-title":"Surveillance & Society"},{"key":"2025110103523672400_B32","first-page":"68","article-title":"Clarifying accountability: An ethical theory framework","author":"Dubnick,","year":"1998","journal-title":"Public Sector Ethics: Finding and Implementing Values"},{"issue":"6","key":"2025110103523672400_B33","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1287\/mksc.1110.0666","article-title":"The sense and non-sense of holdout sample validation in the presence of endogeneity","volume":"30","author":"Ebbes,","year":"2011","journal-title":"Marketing Science"},{"issue":"1","key":"2025110103523672400_B34","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/0749-5978(90)90008-W","article-title":"The management of information and impressions: When employees behave opportunistically","volume":"45","author":"Fandt,","year":"1990","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"1","key":"2025110103523672400_B35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.hrmr.2004.02.001","article-title":"Advancing accountability theory and practice: Introduction to the human resource management review special edition","volume":"14","author":"Frink,","year":"2004","journal-title":"Human Resource Management Review"},{"key":"2025110103523672400_B36","doi-asserted-by":"crossref","DOI":"10.17705\/1CAIS.01605","article-title":"A practical guide to factorial validity using pls-graph: Tutorial and annotated example","volume":"16","author":"Gefen,","year":"2005","journal-title":"Communications of the Association for Information Systems"},{"issue":"1","key":"2025110103523672400_B37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1460-8545.2004.00094.x","article-title":"Flexible employment contracts, the psychological contract and employee outcomes: An analysis and review of the evidence","volume":"5\u20136","author":"Guest,","year":"2004","journal-title":"International Journal of Management Reviews"},{"issue":"2","key":"2025110103523672400_B38","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1108\/JOEPP-04-2014-0017","article-title":"Employee engagement: A sceptical analysis","volume":"1","author":"Guest,","year":"2014","journal-title":"Journal of Organizational Effectiveness: People and Performance"},{"volume-title":"Multivariate Data Analysis","year":"2002","author":"Hair,","key":"2025110103523672400_B39"},{"key":"2025110103523672400_B40","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"Hair,","year":"2017","edition":"2nd edition"},{"issue":"1","key":"2025110103523672400_B41","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s11142-007-9046-z","article-title":"Market reactions to the disclosure of internal control weaknesses and to the characteristics of those weaknesses under Section 302 of the Sarbanes Oxley Act of 2002","volume":"13","author":"Hammersley,","year":"2008","journal-title":"Review of Accounting Studies"},{"issue":"2","key":"2025110103523672400_B42","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/S0148-2963(01)00295-8","article-title":"The use of expert judges in scale development","volume":"57","author":"Hardesty,","year":"2004","journal-title":"Journal of Business Research"},{"issue":"1","key":"2025110103523672400_B43","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","article-title":"A new criterion for assessing discriminant validity in variance-based structural equation modeling","volume":"43","author":"Henseler,","year":"2015","journal-title":"Journal of the Academy of Marketing Science"},{"volume-title":"The Failure of Risk Management: Why It\u2019s Broken and How To Fix It","year":"2009","author":"Hubbard,","key":"2025110103523672400_B44"},{"issue":"2","key":"2025110103523672400_B45","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1086\/376806","article-title":"A critical review of construct indicators and measurement model misspecification in marketing and consumer research","volume":"30","author":"Jarvis,","year":"2003","journal-title":"Journal of Consumer Research"},{"issue":"3","key":"2025110103523672400_B46","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1177\/1059601112445804","article-title":"When self-management and surveillance collide","volume":"37","author":"Jensen,","year":"2012","journal-title":"Group & Organization Management"},{"issue":"2","key":"2025110103523672400_B47","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1111\/j.1468-005X.2009.00228.x","article-title":"Electronic surveillance in the global workplace: Laws, ethics, research and practice","volume":"24","author":"Kidwell,","year":"2009","journal-title":"New Technology, Work and Employment"},{"issue":"3","key":"2025110103523672400_B48","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1287\/isre.1050.0063","article-title":"On data reliability assessment in accounting information systems","volume":"16","author":"Krishnan,","year":"2005","journal-title":"Information Systems Research"},{"issue":"3","key":"2025110103523672400_B49","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1177\/0149206307300816","article-title":"Ain\u2019t misbehavin: Workplace deviance as organizational resistance","volume":"33","author":"Lawrence,","year":"2007","journal-title":"Journal of Management"},{"issue":"3","key":"2025110103523672400_B50","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1111\/isj.12063","article-title":"Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust","volume":"25","author":"Lowry,","year":"2015","journal-title":"Information Systems Journal"},{"issue":"3","key":"2025110103523672400_B51","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.jsr.2007.12.003","article-title":"The effect of workers\u2019 visibility on effectiveness of intervention programs: Supervisory-based safety interventions","volume":"39","author":"Luria,","year":"2008","journal-title":"Journal of Safety Research"},{"volume-title":"The Culture of Surveillance: Watching As a Way of Life","year":"2018","author":"Lyon,","key":"2025110103523672400_B52"},{"issue":"2","key":"2025110103523672400_B53","doi-asserted-by":"crossref","first-page":"293","DOI":"10.2307\/23044045","article-title":"Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques","volume":"35","author":"MacKenzie,","year":"2011","journal-title":"MIS Quarterly"},{"issue":"12","key":"2025110103523672400_B54","doi-asserted-by":"crossref","first-page":"1865","DOI":"10.1287\/mnsc.1060.0597","article-title":"Common method variance in is research: A comparison of alternative approaches and a reanalysis of past research","volume":"52","author":"Malhotra,","year":"2006","journal-title":"Management Science"},{"issue":"2","key":"2025110103523672400_B89338438","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s11747-016-0495-4","article-title":"The role of data privacy in marketing","volume":"45","author":"Martin","year":"2017","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"21","key":"2025110103523672400_B55","doi-asserted-by":"crossref","first-page":"2635","DOI":"10.1080\/09585192.2016.1225313","article-title":"An eye on your work: How empowerment affects the relationship between electronic surveillance and counterproductive work behaviours","volume":"27","author":"Martin,","year":"2016","journal-title":"The International Journal of Human Resource Management"},{"issue":"1","key":"2025110103523672400_B56","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1509\/jm.15.0497","article-title":"Data privacy: Effects on customer and firm performance","volume":"81","author":"Martin,","year":"2017","journal-title":"Journal of Marketing"},{"issue":"3","key":"2025110103523672400_B57","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s10869-010-9189-y","article-title":"Private eyes are watching you: Reactions to location sensing technologies","volume":"26","author":"McNall,","year":"2011","journal-title":"Journal of Business and Psychology"},{"issue":"5","key":"2025110103523672400_B58","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1111\/j.1751-9004.2010.00263.x","article-title":"Moral self-licensing: When being good frees us to be bad","volume":"4","author":"Merritt,","year":"2010","journal-title":"Social and Personality Psychology Compass"},{"issue":"3","key":"2025110103523672400_B59","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1023\/A:1006232417265","article-title":"Privacy, the workplace and the internet","volume":"28","author":"Miller,","year":"2000","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"2025110103523672400_B60","doi-asserted-by":"crossref","first-page":"226","DOI":"10.2307\/259230","article-title":"When employees feel betrayed: A model of how psychological contract violation develops","volume":"22","author":"Morrison,","year":"1997","journal-title":"The Academy of Management Review"},{"issue":"3","key":"2025110103523672400_B61","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1111\/1467-9299.00218","article-title":"\u2018Accountability\u2019: An ever-expanding concept?","volume":"78","author":"Mulgan,","year":"2000","journal-title":"Public Administration"},{"key":"2025110103523672400_B62","unstructured":"Nadeau,\n              M.\n            \n          \n          2018. State of cybercrime 2018: Security spending up, but so are the risks. https:\/\/www.csoonline.com\/article\/566513\/state-of-cybercrime-2018-security-spending-up-but-so-are-the-risks.html"},{"key":"2025110103523672400_B63","unstructured":"National Retail Federation (NRF). 2020. 2020 National Retail Security Survey. https:\/\/nrf.com\/research\/national-retail-security-survey-2020"},{"issue":"3","key":"2025110103523672400_B64","doi-asserted-by":"crossref","first-page":"527","DOI":"10.2307\/256591","article-title":"Justice as a mediator of the relationship between methods of monitoring and organizational citizenship behavior","volume":"36","author":"Niehoff,","year":"1993","journal-title":"Academy of Management Journal"},{"issue":"1","key":"2025110103523672400_B65","doi-asserted-by":"crossref","first-page":"63","DOI":"10.2308\/iace.2009.24.1.63","article-title":"Assessing information technology general control risk: An instructional case","volume":"24","author":"Norman,","year":"2009","journal-title":"Issues in Accounting Education"},{"volume-title":"Psychometric Theory","year":"1978","author":"Nunnally,","key":"2025110103523672400_B66"},{"issue":"1","key":"2025110103523672400_B67","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1002\/ejsp.615","article-title":"Who is watching over you? The role of shared identity in perceptions of surveillance","volume":"40","author":"O\u2019Donnell,","year":"2010","journal-title":"European Journal of Social Psychology"},{"issue":"1","key":"2025110103523672400_B68","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/TSMCB.2008.2006638","article-title":"Technology and methodology for automatically measuring organizational behavior","volume":"39","author":"Olguin Olguin,","year":"2008","journal-title":"EEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"2025110103523672400_B69","unstructured":"Orru,\n              M.\n            \n          \n          2024. Amazon fined in France over alleged employee surveillance. The Wall Street Journal. https:\/\/www.wsj.com\/tech\/amazon-fined-in-france-over-alleged-employee-surveillance-74cd20a3"},{"issue":"2","key":"2025110103523672400_B70","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s10677-008-9129-3","article-title":"Privacy expectations at work\u2014What is reasonable and why?","volume":"12","author":"Palm,","year":"2009","journal-title":"Ethical Theory and Moral Practice"},{"key":"2025110103523672400_B71","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.jesp.2017.01.006","article-title":"Beyond the Turk: Alternative platforms for crowdsourcing behavioral research","volume":"70","author":"Peer,","year":"2017","journal-title":"Journal of Experimental Social Psychology"},{"issue":"2","key":"2025110103523672400_B72","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1177\/002224378101800201","article-title":"Construct validity: A review of basic issues and marketing practices","volume":"18","author":"Peter,","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"10","key":"2025110103523672400_B73","doi-asserted-by":"crossref","first-page":"2299","DOI":"10.1287\/mnsc.2014.2103","article-title":"Cleaning house: The impact of information technology monitoring on employee theft and productivity","volume":"61","author":"Pierce,","year":"2015","journal-title":"Management Science"},{"issue":"5","key":"2025110103523672400_B74","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: A critical review of the literature and recommended remedies","volume":"88","author":"Podsakoff,","year":"2003","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"2025110103523672400_B75","doi-asserted-by":"crossref","first-page":"135","DOI":"10.2308\/isys-52246","article-title":"The impact of awareness of being monitored on computer usage policy compliance: An agency view","volume":"34","author":"Raddatz,","year":"2020","journal-title":"Journal of Information Systems"},{"article-title":"SmartPLS 3: Boenningstedt: SmartPLS GmbH","year":"2015","author":"Ringle,","key":"2025110103523672400_B76"},{"key":"2025110103523672400_B77","doi-asserted-by":"crossref","DOI":"10.1515\/9781685854133","volume-title":"Conceptualizing Accountability, The Self-Restraining State: Power and Accountability in New Democracies","author":"Schedler,","year":"1999"},{"volume-title":"SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies","year":"2023","author":"SEC","key":"2025110103523672400_B78"},{"key":"2025110103523672400_B79","doi-asserted-by":"crossref","first-page":"100227","DOI":"10.1016\/j.chbr.2022.100227","article-title":"The impact of electronic monitoring on employees\u2019 job satisfaction, stress, performance, and counterproductive work behavior: A meta-analysis","volume":"8","author":"Siegel,","year":"2022","journal-title":"Computers in Human Behavior Reports"},{"issue":"2\u20133","key":"2025110103523672400_B80","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/0361-3682(93)E0003-Y","article-title":"The chameleon of accountability: Forms and discourses","volume":"20","author":"Sinclair,","year":"1995","journal-title":"Accounting, Organizations and Society"},{"issue":"1","key":"2025110103523672400_B81","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1037\/1040-3590.12.1.102","article-title":"On the sins of short-form development","volume":"12","author":"Smith,","year":"2000","journal-title":"Psychological Assessment"},{"issue":"4","key":"2025110103523672400_B82","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research: An interdisciplinary review","volume":"35","author":"Smith,","year":"2011","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025110103523672400_B83","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1023\/A:1008729129953","article-title":"Powers and accountability of private police","volume":"8","author":"Stenning,","year":"2000","journal-title":"European Journal on Criminal Policy and Research"},{"issue":"2","key":"2025110103523672400_B84","doi-asserted-by":"crossref","first-page":"147","DOI":"10.2307\/248922","article-title":"Validating instruments in mis research","volume":"13","author":"Straub,","year":"1989","journal-title":"MIS Quarterly"},{"key":"2025110103523672400_B85","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/S0065-2601(08)60287-7","article-title":"The impact of accountability on judgment and choice: Toward a social contingency model","volume":"125","author":"Tetlock,","year":"1992","journal-title":"Advances in Experimental Social Psychology"},{"key":"2025110103523672400_B86","doi-asserted-by":"crossref","first-page":"117","DOI":"10.4324\/9781410603227-6","volume-title":"Shared Cognition in Organizations","author":"Tetlock,","year":"1999"},{"issue":"4","key":"2025110103523672400_B87","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1037\/0022-3514.57.4.632","article-title":"Social and cognitive strategies for coping with accountability: Conformity, complexity, and bolstering","volume":"57","author":"Tetlock,","year":"1989","journal-title":"Journal of Personality and Social Psychology"},{"key":"2025110103523672400_B88","unstructured":"Thiel,\n              C.\n            , J. M.Bonner, J.Bush, D.Welsh, and N.Garud. 2022. Monitoring employees makes them more likely to break rules. Harvard Business Review. https:\/\/hbr.org\/2022\/06\/monitoring-employees-makes-them-more-likely-to-break-rules"},{"key":"2025110103523672400_B89","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.chb.2017.08.038","article-title":"Validity and Mechanical Turk: An assessment of exclusion methods and interactive experiments","volume":"77","author":"Thomas,","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"2025110103523672400_B90","first-page":"5","article-title":"Content validity of instruments in IS research","volume":"8","author":"Tojib,","year":"2006","journal-title":"Journal of Information Technology Theory and Application (JITTA)"},{"issue":"7","key":"2025110103523672400_B91","doi-asserted-by":"crossref","first-page":"e68967","DOI":"10.1371\/journal.pone.0068967","article-title":"Ineffectiveness of reverse wording of questionnaire items: Let\u2019s learn from cows in the rain","volume":"8","author":"van Sonderen,","year":"2013","journal-title":"PLoS ONE"},{"issue":"4","key":"2025110103523672400_B92","doi-asserted-by":"crossref","first-page":"263","DOI":"10.2753\/MIS0742-1222290410","article-title":"Using accountability to reduce access policy violations in information systems","volume":"29","author":"Vance,","year":"2013","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"2025110103523672400_B93","doi-asserted-by":"crossref","first-page":"345","DOI":"10.25300\/MISQ\/2015\/39.2.04","article-title":"Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations","volume":"39","author":"Vance,","year":"2015","journal-title":"MIS Quarterly"},{"issue":"2","key":"2025110103523672400_B94","doi-asserted-by":"crossref","first-page":"381","DOI":"10.2308\/acch-51071","article-title":"Big Data in accounting: An overview","volume":"29","author":"Vasarhelyi,","year":"2015","journal-title":"Accounting Horizons"},{"issue":"1","key":"2025110103523672400_B95","doi-asserted-by":"crossref","first-page":"185","DOI":"10.2308\/jis.2011.25.1.185","article-title":"Information security and Sarbanes-Oxley compliance: An exploratory study","volume":"25","author":"Wallace,","year":"2011","journal-title":"Journal of Information Systems"},{"issue":"3","key":"2025110103523672400_B96","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1037\/a0032121","article-title":"Reversed item bias: An integrative model","volume":"18","author":"Weijters,","year":"2013","journal-title":"Psychological Methods"},{"issue":"4","key":"2025110103523672400_B97","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1111\/j.1539-6924.1982.tb01384.x","article-title":"The theory of risk homeostasis: Implications for safety and health","volume":"2","author":"Wilde,","year":"1982","journal-title":"Risk Analysis"},{"issue":"1","key":"2025110103523672400_B98","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s10869-018-9532-2","article-title":"Reactance to electronic surveillance: A test of antecedents and outcomes","volume":"34","author":"Yost,","year":"2019","journal-title":"Journal of Business and Psychology"},{"key":"2025110103523672400_B99","doi-asserted-by":"crossref","first-page":"102221","DOI":"10.1016\/j.cose.2021.102221","article-title":"Deep learning for insider threat detection: Review, challenges and opportunities","volume":"104","author":"Yuan,","year":"2021","journal-title":"Computers & Security"},{"issue":"2","key":"2025110103523672400_B100","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1086\/651257","article-title":"Reconsidering Baron and Kenny: Myths and truths about mediation analysis","volume":"37","author":"Zhao,","year":"2010","journal-title":"Journal of Consumer Research"},{"issue":"1","key":"2025110103523672400_B101","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1057\/jit.2015.5","article-title":"Big other: Surveillance capitalism and the prospects of an information civilization","volume":"30","author":"Zuboff,","year":"2015","journal-title":"Journal of Information Technology"}],"container-title":["Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/39\/3\/157\/123012\/i0888-7985-39-3-157.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/39\/3\/157\/123012\/i0888-7985-39-3-157.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T07:52:58Z","timestamp":1761983578000},"score":1,"resource":{"primary":{"URL":"https:\/\/publications.aaahq.org\/jis\/article\/39\/3\/157\/13686\/Dataveillance-Duality-Navigating-Employee"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,25]]},"references-count":102,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,9,25]]},"published-print":{"date-parts":[[2025,11,1]]}},"URL":"https:\/\/doi.org\/10.2308\/isys-2023-050","relation":{},"ISSN":["0888-7985","1558-7959"],"issn-type":[{"type":"print","value":"0888-7985"},{"type":"electronic","value":"1558-7959"}],"subject":[],"published":{"date-parts":[[2025,9,25]]}}}