Index

Note: Page numbers in italics indicate figures and those in bold indicate tables.

active listening 2223

adaptation readiness 270271; classifying, by country 275276, 276; indicators for country’s 274275

adaptive capacity 270271; classifying, by country 275, 275276; indicators for country’s 272, 272274

adaptive framework, IoPTS 271, 271276; adaption readiness indicators, country’s 274275; adaptive capacity indicators, country’s 272, 272274

adopters, categories of 112

age, online repurchasing behavior and 228229

Amazon 67, 193; Anytime Feedback Tool 194; Day One building at 256

Amazon Echo 192

Americans with Disabilities Act (ADA) 90

analytics: decision making and 3536; defined 34, 35

anchoring bias 39

artificial intelligence and machine learning (AI/ML) 245

automation surprises 193194

big data: attributes of 35; characteristics of 34; created by IoT, management of 136137; defined 34; storing and managing costs 133

big data analytics 3436; defined 34

boundarylessness concept 45

bring your own device (BYOD): policies 98; technologies, security challenges and 134

BYOD see bring your own device (BYOD)

career management, IoPTS and 54 , 5861, 59

circular response concept 15, 1617

citizen journalism 94

cloud 1

cognitive analytics 3141; big data analytics and 3436; construct of 3638; future research for 3839; human dimension of 37, 37 , 3839; Internet of Things and 3234, 34, 37 ; introduction to 3132; for management practice guidelines 4041; technological dimension of 37 , 3738, 39

cognitive compensatory behaviors 8384

communities of practice/innovation, creating 2526

Computer Fraud and Abuse Act 98

confirmation bias 39

consensus-driven demand forecast 246

coping appraisal 156, 157

counterproductive work behavior (CWB) 73

Creative Experience (Follett) 16

cyberloafing 6785; defined 68, 75; examples of 68; as form of workplace deviance 69, 73; future research for 85; Gen Y population and 6970; ICT devices and 75; implications for management 80, 8284; introduction to 6768; IoPTS and 7072; literature review on 6870; neutralization and 7374, 75, 76 , 79; organizational citizenship behavior and 7275, 7879; Pomodoro technique and 72; positive effects of 7273; research model, study 1 7577; 16-item measure, Study 2 7780, 8182; solutions to combat 72; types of 75

data collection/usage, workplace policies regarding 102

data-driven analytics 91

data privacy, workplace see social media/data privacy, IoPTS in workplace and

Design Thinking (DT) 178179

device connectivity 3

digital immigrants 228229

digital natives 228

digital supply chain 242256; behavior integrators 252; demand forecast accuracy and 244245; described 242; future expectations for 245246; impacts on traditional supply chain 252253, 253, 254 ; integration case study examples 247252; IoPTS enabled 243244; leaders, developing 254255; overview of 242243; perfect order performance and 244245; technology disruptions transforming, navigating 242243; zero base designs and 256; see also supply chain leaders

disciplinary action, for employee social media use 9394

Distributed Denial of Service (DDoS) attacks 135

Dynamic Administration: The Collected Papers of Mary Parker Follett (Metcalf and Urwick) 16

Dynamic Supply Chains (Gattorna) 243

education level, online repurchasing behavior and 230

Electronic Privacy and Communications Act (EPCA) 101102

email privacy, workplace and 101102

employee privacy, protecting 9495

employee satisfaction/well-being, increasing 2425

environment-centric IoPTS 259

Equal Opportunity Employment Commission (EEOC) 9192

Facebook 67, 68, 70, 89, 91, 94

fear, defined 156

Federal Communications Commission (FCC) 160

feedback processing 2324

Fermat 1112

Fitbits 90, 91, 99, 166

fog computing 172

Follett, M. P. 26; circular response concept 1617; information credibility and 23; integration concept 1718, 25; law of the situation 18; media richness theory and 1819; psychological hermeneutics and 21; social presence and 1920; user responsibility in IoPTS and 1421; writings and lectures 1516

Follett’s web 15

force multiplier 244

future workplace, IoPTS and 270278; adaptation framework 271 , 271277, 277 ; introduction to 270; literature review 270271; study results 276277, 277

gender, online repurchasing behavior and 227228

Genetic Information Nondisclosure Act (GINA) 90

global positioning system (GPS) devices, employer-owned 9597

goalsetting theory 199

Google 60, 67, 194

Google Android 159

Google Glass 50, 197

GPS see global positioning system (GPS) devices, employer-owned

guilt, OCB and 7475

Health Insurance Portability and Accountability Act (HIPAA) 95

health promotion/outpatient support system software designers, problems/solutions for 217

holism 137

holoportation 53

HR see human resources (HR), SWOT analysis of IoT in

human dimension, of cognitive analytics 37, 37 , 3839

human factors of outpatient support 207218; connectivity and 210212; email studies of 209; ignoring Internet 213215; IoP and 209210; IoPTS and 208209; IoT and 207208; online service provider model 215217, 216 ; opting out of Internet 212213; overview of 207; problems/solutions for software designers 217

human intranet 173

human resource management (HRM): IoPTS and 54 , 5658, 57

human resources (HR), SWOT analysis of IoT in 187200; introduction to 187189; justification for use of 189190; opportunities quadrant of 194196; recommendations from 198200; strengths quadrant of 191192; threats quadrant of 196198; weaknesses quadrant of 192194

Humanyze 5152

iCloud 94

ICT see information and communications technology (ICT)

incidental learning 170

income level, online repurchasing behavior and 229

individual career management, IoPTS and 5861, 59

individualism, security context of 158159

Industrial Internet 194195

informal learning, modes of 170

information and communications technology (ICT) 1; communication via 1819; cyberloafing and use of, devices 75; Follett’s concepts and users of 1421; negative effects of, on organizational users 1213; users of, in organizations 1112

information credibility 23

information equivocality 13

information inaccuracy 13

Information Systems Audit and Control Association (ISACA) 267

information technology (IT): convergence with OT and 135136; governance 145; network segmentation 143144, 147; privacy and control, threats to 144, 147; security challenges, traditional colleges and universities 134136; security convergence 142143, 147

innovation: adopters and 112; defined 112; Internet of things (IoT) as 112113

integration concept 15, 1718

integrative learning 170

Interactive Health Solutions (IHS) 100101

International Standards Organization (ISO) 47

Internet of people (IoP): described 1112; health interventions and 209210; online influence/interventions model 215217, 216 ; sustainable careers and 47 , 5052

Internet of People, moving from Internet of Things to 1127; active listening and 2223; communities of practice/innovation, creating 2526; deteriorating social skills and 13; employee satisfaction/well-being implications for 2425; feedback processing implications for 2324; Follett human-oriented prescription for 1421 (see also Follett, M. P.); human-oriented solutions for 14; information credibility and 23; information inaccuracy/equivocality and 13; organizational user disassociation and 1213; time, adjusting organizational attitudes toward 25; trust implications for 2122; users as participants 1112

Internet of People, Things and Services (IoPTS): background 24; benefits of 267; cyberloafing and 7072; data privacy in workplace and 89103; defined 11, 46, 166; described 12; device connectivity and 3; digital supply chain 243244; enabled workplace 258259; environment, described 68; environmental impacts, digital supply chain 253, 254 ; environment-centric 259; future workplace and 270278; government funding for 267; human factors of outpatient support and 207218; human resource management and 47, 54, 5658, 57; individual career management and 47, 54, 5861, 59; introduction to 18; model, sustainable careers and 4653, 47 ; people-centric 259; process-centric 259; security breaches, reducing 258268; security policy framework 263 , 263266; service architecture and risks 259263, 260 , 262; social media in workplace and 89103; strategies for VHRD in 175176; sustainable careers and 4653, 47 ; users in, implications for 2126; users of ICT, as participants in 11; VHRD and 167171; work and personal convergence with 2

Internet of services (IoS): defined 52; described 12; sustainable careers and 47 , 5253

Internet of things (IoT): architecture of 34; characteristics of 33, 34; cloud infrastructures 145146; concept of 3234; defined 166; described 12; human resource management examples 49; impact of, on Utah colleges/universities 132149; individual career examples 49; initiation of 111130; layers of 3334, 34; network segmentation 143144, 147; online repurchasing behavior 225237; privacy and control, threats to 144, 147; security challenges, traditional colleges and universities 136137; security convergence 142143, 147; Security Triad 146, 147 ; service architecture 260 ; smart phones 154163; sustainable careers and 47 , 4850; SWOT analysis of HR practices/strategies and 187200; users in, negative effects of ICT on 1213

Internet of things (IoT), organization initiation of 111130; as an innovation 112113; changing work practices and 125, 127; frontline staff concerns 127128; introduction to 111112; nature of technology results 117119, 126; privacy, security, ant trust challenges 128129; research metholology used 115, 116; research related to 112113; study results 116125; technological frames framework used in 114 , 114115; technology-in-use results 122125, 126; technology strategy results 119122, 126; term use of 112; working together with others and 125, 127

Internet penetration 23

Internet usage, growth of 23

intranets, defined 166

IoP see Internet of people (IoP)

IoPTS see Internet of People, Things and Services (IoPTS)

IoS see Internet of services (IoS)

IoT see Internet of things (IoT)

IoT Security Triad 146, 147

ironies of automation 193

Isen, A. M. 215

IT see information technology (IT)

law of the situation 15, 18

learning agility 176177

loss aversion bias 39

market signal focus 246

matter of public concern, defined 94

media richness theory 1819

metadata 89

microchip implantation 97

Microsoft 192

Microsoft Research 53

minimization type of neutralization 7374, 76 , 79, 81

mobile devices/apps 9799

mobile social networks (MSNs) 15

multitasking 69

National Basketball Association (NBA) 49

National Communications Association 154

National Labor Relations Act (NLRA) 90, 93

National Labor Relations Board (NLRB) 93

nature of technology 114, 114 , 117119; in product-oriented firms 116, 117, 126; in service-oriented firms 116, 118, 126; in technology-oriented firms 116, 118119, 126

negative affect, OCB and 74

networked performance 251

network of networks 166

neutralization: as cognitive compensatory behavior 8384; cyberloafing and 7374, 75, 76 ; OCB and 76 ; 16-item measure, Study 2 79; types of 73

New Lanark 187

New State: Group Organization, the Solution of Popular Government, The (Follett) 16

normalization type of neutralization 7374, 76 , 80, 81

OCB see organizational citizenship behavior (OCB)

OCB-individual (OCB-I) 7374, 8182

OCB-organization (OCB-O) 73, 74, 8182

online repurchasing behavior 225237; age and 228229; education level and 230; future research for 237; gender and 227228; hypotheses 230, 234235; income level and 229; introduction to 225226; literature review 226230; research model 230233; study results 233237

online social networks (OSNs) 15

operational technology (OT) 135

Oracle 48

organizational citizenship behavior (OCB) 7275; as behavioral compensatory technique 8384; cyberloafing and 7275; defined 73; guilt and 7475; individual 7374; negative affect and 74; organization 73, 74; 16-item measure, Study 2 7879, 8182

organizational user disassociation 1213

OT see operational technology (OT)

Pacific Gas and Electric (PG&E) 40

Parsable 53

penetration, defined 2

Pentland, A. 191192

people-centric IoPTS 259

perceived severity, defined 156

perceived threat 156

perceived vulnerability, defined 156

performance appraisal 188, 193

performance management 188, 193, 198

personally identifiable information (PII) 134, 135

persuasive technologies 2627

pervasive computing 90

Pew Research 154

Pew Research Internet Project 154

Pollfish 230, 232

Pomodoro technique 72

predictive analysis, data-driven analytics and 91

process-centric IoPTS 259

product-oriented firms: nature of technology in 116, 117, 126; technology-in-use in 116, 122123, 126; technology strategy in 116, 119120, 126

Protection Motivation Theory (PMT) 155156, 157

protective behaviors 156

psychological contracts 34

psychological hermeneutics 18, 21

radio-frequency identification (RFID) 49, 112, 173

Rajaee v. Design Tech Homes 98

rank and yank approach 193

recommendation agents (RA) 27

Reinfelder, L. 156

response costs, defined 157

response efficacy, defined 157

satisfaction, increasing employee 2425

Scrum technique 72

security breaches, reducing 258268; introduction to 258; in IoPTS-enabled workplace 258259; IoPTS security policy framework 263 , 263266; IOPTS service architecture and risks 259263, 260 , 262

security challenges: BYOD technologies and 134; IoT, for traditional colleges and universities 136137; IT, for traditional colleges and universities 134136

security policy framework, IoPTS 263 , 263266; accountability 263 , 266; data collection 263 , 263264; data quality 263, 264; data use 263 , 264265; individual participation 263 , 266; openness about practices/policies 26 3, 265266; purpose specification 263 , 264; security safeguards 263 , 265

selection discrimination, social media/data driven analytics in 9192

self-directed learning 170

self-efficacy, defined 157

service-oriented architectures (SOA) 12

service-oriented firms: nature of technology in 116, 118, 126; technology-in-use in 116, 123124, 126; technology strategy in 116, 120121, 126

size, big data and 35

Skype 53

Skyscanner 67

Slack 72

Smart City Initiative 40

smartphones 9798

smartphones, securing 154163; data analysis/results 160161, 160162; hypotheses discussion 158, 159, 161163; introduction to 154; IoT and 155; literature review concerning 156159; Protection Motivation Theory (PMT) 155156; research study methodology 159160

social media/data privacy, IoPTS in workplace and 89103; BYOD policies and 98; data collection/usage policies 102; email privacy 101102; employee privacy, protecting 9495; employer disciplinary action 9394; employer-owned GPS devices 9597; future research for 102103; introduction to 8991; mobile devices/apps and 9799; policies governing selection 9293; selection discrimination and 9192; wearable technology and 99101; wellness programs and 99101

social media policies, employee selection 9293

social presence 18, 1920; defined 19

social skills, ICT and deteriorating 13

Society for Human Resource Management (SHRM) 94

sociomateriality 198

Sociometric Solutions 192

subdermal microchip 97

supply chain leaders: consensus-driven demand forecast and 246; customer demand concerns of 243244; demand forecast accuracy and 244245; developing 254255; market signal focus of 246; mind-sets of 251; networked performance and 251; organizational-level characteristics of 250251; role of 250; social media data mining and 245246; see also digital supply chain

surreptitious monitoring capabilities 98

sustainable career theory 4562; boundarylessness concept and 45; human resource management and IoPTS 5658, 57; individual career management and IoPTS 5861, 59; introduction to 4546; IoP and 47 , 5052; IoPTS model and 4653, 47 ; IoS and 47 , 5253; IoT and 47 , 4850; TMGT effect and 5356, 54

SWOT analysis of IoT in human resources (HR) 187200; introduction to 187189; justification for use of 189190; opportunities quadrant of 194196; recommendations from 198200; strengths quadrant of 191192; threats quadrant of 196198; weaknesses quadrant of 192194

tacit learning 170

technological dimension, of cognitive analytics 37 , 3738, 39

technological frames framework 114 , 114115

technology development (TD) 177178

technology-in-use 114, 114 , 122125; in product-oriented firms 116, 122123, 126; in service-oriented firms 116, 123124, 126; in technology-oriented firms 116, 124125, 126

technology-oriented firms: nature of technology in 116, 118119, 126; technology-in-use in 116, 124125, 126; technology strategy in 116, 121122, 126

technology strategy 114, 114 , 119122; in product-oriented firms 116, 119120, 126; in service-oriented firms 116, 120121, 126; in technology-oriented firms 116, 121122, 126

threat, defined 156

threat appraisal, defined 156

Three Square Market (“32M”) 97

time, adjusting organizational attitudes toward 25

time theft 90

Title VII antidiscrimination laws 90, 92

TMGT see Too Much of a Good Thing (TMGT) effect

Too Much of a Good Thing (TMGT) effect 5356, 54

Transferwise 67, 68

transhumanism 199

trust, in IoPTS 2122

trust management (TM) 200

Twitter 89, 91, 94

U.S. Department of Homeland Security 159

U.S. Department of Justice 159

users, defined 11

Utah colleges/universities, IoT impact on 132149; challenges associated with IoT 133134; cloud infrastructure and 145146; data management issues 136137; future research for 148; holism based research study 137138; implications 144146; introduction to 132; IoT security challenges 136137; IoT Security Triad 147 ; IT governance and 145; IT leadership/decision-making structure challenges 135136; IT security infrastructure challenges 134136; network segmentation 143144, 147; opportunities offered by IoT 132133; privacy and control, threats to 144, 147; privacy issues 137; propositions, test of 141142; research study limitations 139; research study methods 138139; research study results 139141; security convergence 142143, 147; security practitioners, recommendations for 148149

variety, big data and 35

velocity, big data and 35

VHRD see virtual human resource development (VHRD)

VirginPulse 53

virtual discrimination 53, 5758

virtual human resource development (VHRD) 166179; defining 168170; design thinking and 178179; guidelines and implications for IoPTS and 173179, 174 ; integration of intranets and Internet 172173; introduction to 166167; IoPTS and 167171; learning agility and 176177; strategies for, in IoPTS 175176; technology development and 177178; trends in 170171

volume, big data and 35

wearables: data privacy and 99101; encryption and 100

Web 2.0 15

well-being, increasing employee 2425

wellness programs, data privacy and 99101

WhatsApp 68, 70

Whitman v. Interactive Health Solutions 100101

workplace deviance 69, 73

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.17.79.60