Bibliography

  1. [AKR 00] AKRICH M., MÉADEL C., PARAVEL V., “Le temps du mail: écrit instantané ou oral médiat”, Sociologie et sociétés, vol. 32, no. 2, pp. 154–171, 2000.
  2. [ARI 94] ARISTOTE, Ethique à Eudème, Payot & Rivage, Paris, France, 1994.
  3. [ARI 08] ARISTOTE, Sur la justice. Ethique à Nicomaque, Flammarion, Paris, France, 2008.
  4. [ASH 00] ASHFORTH B.E., KREINER G.E., FUGATE M., “All in day’s work: boundaries and micro role transitions”, Academy of Management Review, vol. 25, no. 3, pp. 472–491, July 2000.
  5. [BAT 09] BATTARD N., DE CHURCH L., MANGEMATIN V., “Idiosyncratic distances: practices around mobile technologies”, Academy of Management Conference, 2009.
  6. [BEN 98] BENNETT M., Basic Concepts of Intercultural Communication, Intercultural Press, Yarmouth, Maine, 1998.
  7. [BID 86] BIDDLE B.J., “Recent development in role theory”, Annual Review of Sociology, vol. 12, pp. 67–92, 1986.
  8. [BUL 03] BULLETIN OFFICIEL DU MINISTÈRE DE L’ÉDUCATION NATIONALE, DE L’ENSEIGNEMENT SUPÉRIEUR ET DE LA RECHERCHE, available at: http://www.education.gouv.fr/bo/2003/31/CTNX0306622X.htm, 2003.
  9. [BYR 08] BYRON K., “Carrying too heavy a load? The communication and miscommunication of emotions by e-mail”, Academy of Management Review, vol. 33, no. 2, pp. 309–327, 2008.
  10. [CAM 05] CAMARGO M., The role of e-mail in high technology employee burnout, Thesis, Walden University, 2005.
  11. [CAR 97] CARNEVALE P.J., PROBST T.M., “Conflict on the internet”, in KIESLER S. (ed.), Culture of the Internet, Lawrence Erlbaum, Hillsdale, NJ, 1997.
  12. [CAS 15] COUR DE CASSATION, CIVILE, CHAMBRE COMMERCIAL, Audience publique du 10 février 2015, N° de pourvoi 13-14779, available at: http://www.legifrance.gouv.fr/, 2015.
  13. [CHE 05] CHESLEY N., “Blurring boundaries? Linking technology use, spillover, individual distress, and family satisfaction”, Journal of Marriage and Family, vol. 67, pp. 1237–1248, December 2005.
  14. [DIM 07] DIMENSION DATA AND DATAMONITOR, Dimension data unified communication study, accessed 10 December 2008, available at: http://www.dimensiondata.com/uc/, 2007.
  15. [DUC 01] DUCHENEAUT N., BELLOTTI V., “E-mail as habitat: an exploration of embedded personal information management”, Interactions, vol. 8, no. 5, pp. 30–38, 2001.
  16. [EBA 88] EBAUGH H.R.F., Becoming an Ex: the Process of Role Exit, University of Chicago Press, Chicago, 1988.
  17. [ENQ 98] ENQUIST H., MAKRYGIANNIS N., “Understanding misunderstandings”, Proceedings of the 31st Hawaii International Conference on System Science, pp. 83–92, 1998.
  18. [FAL 89] FALZON P., L’ergonomie cognitive du dialogue, PUG, Grenoble, France, 1989.
  19. [FRI 03] FRIEDMAN R.A., CURRALL S.C., “Conflict escalation: dispute exacerbating elements of e-mail communication”, Human Relations, vol. 56, pp. 1325–1347, 2003.
  20. [GAR 95] GARTON L.E., WELLMAN B., “Social impacts of electronic mail in organizations: a review of the research literature”, Communication Yearbook, Ontario Telepresence Project, vol. 18, pp. 434–453, 1995.
  21. [GID 90] GIDDENS A., The Consequences of Modernity, Polity Press, Cambridge, UK, 1990.
  22. [GRE 85] GREENHAUS J.H., BEUTELL N.J., “Sources of conflict between work and family roles”, The Academy of Management Review, vol. 10, no. 1, p. 76, 1985.
  23. [HAL 89] HALL D.T., RICHTER J., “Balancing work life and home life: what can organizations do to help?”, The Academy of Management Executive (1987-1989), vol. 2, no. 3, pp. 213–223, 1989.
  24. [HOU 03] HOUSE J., “Misunderstanding in intercultural university encounters”, in HOUSE J., KASPER G., ROSS S. (eds), Misunderstanding in Social Life, Longman, London, UK, 2003.
  25. [HUM 86] HUMPHREY-JONES C., in HOUSE J., KASPER G., ROSS S. (eds), Misunderstanding in Social Life, Longman, London, UK, 1986.
  26. [IET 08] INTERNET ENGINEERING TASK FORCE, Request for comment 5322, available at: http://www.rfc-editor.org/rfc/rfc5322.txt, 2008.
  27. [ISA 07] ISAAC H., CAMPOY E., KALIKA M., “Surcharge informationnelle, urgence et TIC. L’effet temporal des technologies de l’information”, Management & Avenir, vol. 12, pp. 153–172, 2007.
  28. [KAR 29] KARINTHY F., Láncszemek (Chains), available at: http://electriceye.org. uk/sites/default/files/Chains.pdf, 1929.
  29. [KAR 93] KARSENTY L., FALZON P., “L’analyse des dialogues orientés-tâche: Introduction à des modèles de la communication”, in SIX F., VAXEVENOGLOU X. (eds), Les aspects collectifs du travail, Octarès, Toulouse, 1993.
  30. [KAR 04] KARSENTY L., LACOSTE M., “Communication et travail”, in FALZON P. (ed.), Traité d’ergonomie, Presses Universitaires de France, Paris, France, 2004.
  31. [KAR 08] KARSENTY L., L’incompréhension dans la communication, Presses Universitaires de France, Paris, France, 2008.
  32. [KAT 78] KATZ D., KHAN R.L., The Social Psychology of Organizations, 2nd ed., John Wiley and Sons, Hoboken, NJ, 1978.
  33. [KOW 09] KOWALSKI K.B., SWANSON J.A., “A framework for understanding role identity and role boundaries at the work-family interface”, Decision Sciences, pp. 376–380, 2009.
  34. [LAG 11] LAGRAÑA F., When e-mail crosses role boundaries – exposure to spam and protection strategies, PhD Thesis, GEM Doctoral School, Grenoble, 2011.
  35. [LAN 96] LANGFORD D., “Ethics and the internet: appropriate behavior in electronic communication”, Ethics & Behavior, vol. 6, no. 2, pp. 91–106, 1996.
  36. [LEA 91] LEA M., SPEARS R., “Computer-mediated communication, deindividuation and group decision-making”, International Journal of Man-Machine Studies, vol. 34, pp. 283–301, 1991.
  37. [LEF 97] LÉGIFRANCE, Fac-similé du Journal Officiel du 02/12/1997, texte 7418, available at: http://www.legifrance.gouv.fr/, 1997.
  38. [LEM 15] LE MONDE, Des hackers volent le numéro de sécurité sociale de millions d’américains, 10 July 2015, available at: http://www.lemonde.fr/pixels/article/2015/07/09/des-hackers-volent-le-numero-de-securite-sociale-de-21-millions-d-americains_4677672_4408996.html, 2015.
  39. [LOC 98] LOCH K.D., CONGER S., OZ E., “Ownership, privacy and monitoring in the workplace: a debate on technology and ethics”, Journal of Business Ethics, vol. 17, pp. 653–663, 1998.
  40. [LUS 06] L’USINE NOUVELLE, A380, quand la CAO s’emmêle, available at: doucetconseil.fr/presse/UN061130_A380.pdf, 30 November 2006.
  41. [MAA 09] MESSAGING ANTI-ABUSE WORKING GROUP, “One out of six responded to spam”, The Wall Street Journal, available at: http://blogs.wsj.com/digits/2009/07/17/one-out-of-six-responded-to-spam/tab/print/, 2009.
  42. [MAA 10] MESSAGING ANTI-ABUSE WORKING GROUP, Key findings of the 2010 MAAWG email security awareness and usage survey, available at: http://www.maawg.org/system/files/2010_MAAWG-Consumer_Survey_Key_Findings.pdf, 2010.
  43. [MIL 00] MILLER S., WECKERT J., “Privacy, the workplace and the internet”, Journal of Business Ethics, vol. 28, pp. 255–265, 2000.
  44. [MON 09] MONSTER PRESS ROOM, Plus de la moitié des salariés européens envoient des courriels personnels ou surfent sur le Net durant leurs heures de travail, accessed 9 May 2009, available at: http://presse.monster.fr/13162_fr_p1.asp, 2009.
  45. [NEA 06] NEALE M., GRIFFIN M.A., “A model of self-held work roles and role transitions”, Human Performance, vol. 19, no. 1, pp. 23–41, January 2006.
  46. [NIP 95] NIPPERT-ENG C., Home and Work: Negotiating Boundaries through Everyday Life, University of Chicago Press, Chicago, 1995.
  47. [NIP 96] NIPPERT-ENG C., “Calendars and keys: the classification of home and work”, Sociological Forum, vol. 11, no. 3, pp. 563–582, 1996.
  48. [OLF 14] OLFEO, La réalité de l’utilisation d’Internet au bureau, available at:http://www.olfeo.com/, 2014.
  49. [OLS 06] OLSON-BUCHANAN J.B., BOSWELL W.R., “Blurring boundaries: correlates of integration and segmentation between work and non work”, Journal of Vocational Behavior, vol. 68, pp. 432–445, 2006.
  50. [PAL 05] PALMER D.E., “Pop-ups, cookies, and spam: toward a deeper analysis of the ethical significance of internet marketing practices”, Journal of Business Ethics, vol. 58, pp. 271–280, 2005.
  51. [PEY 02] PEYRELONG M.-F., ACCART J.P., “Du système d’information personnel au système d’information collectif: réalités et mirages du partage d’information en entreprise”, Conference Proceedings, Canadian Association for Information Science, pp. 135–149, 2002.
  52. [RAD 15] THE RADICATI GROUP, INC., Email statistic report, 2015–2019, available at: http://www.radicati.com/wp/wp-content/uploads/2015/02/Email-Statistics-Report-2015-2019-Executive-Summary.pdf, 2015.
  53. [RIC 90] RICHTER J., “Crossing boundaries between professional and private lives”, in GROSSMAN H.Y., CHESTER N.L. (eds), The Experience and Meaning of Work in Women’s Lives, Lawrence Erlbaum Associates, Hillsdale, NJ, 1990.
  54. [ROG 66] ROGERS C., KINGET G.M., Psychothérapie et relations humaines, Publications Universitaires, Louvain, Belgique, 1966.
  55. [ROT 05] ROTHBARD N.P., PHILLIPS K.W., DUMAS T.L., “Managing multiple roles: work-family policies and individual’s desires for segmentation”, Organization Science, vol. 16, no. 3, pp. 243–258, May–June 2005.
  56. [RUS 10] RUSHWORTH M., How to reduce spam email, accessed 26 July 2011, available at: http://www.markrushworth.com/reduce-spam-10-top-tipsstop-spam/, 2010.
  57. [RYA 11] RYAN S., “Facebook security breach allowed advertisers access to user data”, Business ETC, accessed 13 July 2011, available at: http://businessetc.thejournal.ie/facebook-security-breach-allowed-advertisersaccess-to-user-data-134549-May2011/, May 2011.
  58. [SAR 98] SARBAUGH-THOMPSON M., FELDMAN M.S., “Electronic mail and organizational communication: does saying ‘hi’ really matter?”, Organization Science, vol. 9, pp. 685–698, 1998.
  59. [SLU 07] SLUSS D.M., ASHFORTH B.E., “Relational identity and identification: defining ourselves through work relationships”, Academy of Management Review, vol. 32, no. 1, pp. 9–32, 2007.
  60. [SPR 86] SPROULL L.O., KIESLER S., “Reducing social context cues: electronic mail in organizational communication”, Management Science, vol. 32, pp. 1492–1512, 1986.
  61. [STE 01] STEAD B.A., GILBERT J., “Ethical issues in electronic commerce”, Journal of Business Ethics, vol. 34, pp. 75–85, 2001.
  62. [TAY 08] TAYLOR H., FIELDMAN G., ALTMAN Y., “E-mail at work: a cause of concern? The implications of the new technologies for health, wellbeing and productivity at work”, Journal of Organizational Transformation and Social Change, vol. 5, no. 2, pp. 159–173, 2008.
  63. [TEP 01] TEPPER B.J., LOCKHART D., HOOBLER J., “Justice, citizenship, and role definition effects”, Journal of Applied Psychology, vol. 86, pp. 789–796, 2001.
  64. [VAS 09] VASCELLARO J.E., “Why email no longer rules”, The Wall Street Journal, available at: http://www.wsj.com/articles/SB10001424052970203803904574431151489408372, 2009.
  65. [WAR 90] WARREN S.D., BRANDEIS L.D., “The right to privacy”, Harvard Law Review, vol. 4, no. 5, 1980.
  66. [WIL 08] WILSON J.M., BOYER O.L., METIU A. et al., “Perceived proximity in virtual work: explaining the paradox of far-but-close”, Organization Studies, vol. 29, no. 7, pp. 979–1022, 2008.
  67. [ZER 79] ZERUBAVEL E., “Private time and public time: the temporal structure of social accessibility and professional commitments”, Social Forces, vol. 58, no. 1, pp. 38–58, 1979.
  68. [ZER 91] ZERUBAVEL E., The Fine Line: Making Distinctions in Everyday Life, Free Press, New York, 1991.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset