Note: Page numbers in italics indicate figures and those in bold indicate tables.
adaptation readiness 270–271; classifying, by country 275–276, 276; indicators for country’s 274–275
adaptive capacity 270–271; classifying, by country 275, 275–276; indicators for country’s 272, 272–274
adaptive framework, IoPTS 271, 271–276; adaption readiness indicators, country’s 274–275; adaptive capacity indicators, country’s 272, 272–274
adopters, categories of 112
age, online repurchasing behavior and 228–229
Amazon 67, 193; Anytime Feedback Tool 194; Day One building at 256
Amazon Echo 192
Americans with Disabilities Act (ADA) 90
analytics: decision making and 35–36; defined 34, 35
anchoring bias 39
artificial intelligence and machine learning (AI/ML) 245
big data: attributes of 35; characteristics of 34; created by IoT, management of 136–137; defined 34; storing and managing costs 133
big data analytics 34–36; defined 34
boundarylessness concept 45
bring your own device (BYOD): policies 98; technologies, security challenges and 134
BYOD see bring your own device (BYOD)
career management, IoPTS and 54 , 58–61, 59
circular response concept 15, 16–17
citizen journalism 94
cloud 1
cognitive analytics 31–41; big data analytics and 34–36; construct of 36–38; future research for 38–39; human dimension of 37, 37 , 38–39; Internet of Things and 32–34, 34, 37 ; introduction to 31–32; for management practice guidelines 40–41; technological dimension of 37 , 37–38, 39
cognitive compensatory behaviors 83–84
communities of practice/innovation, creating 25–26
Computer Fraud and Abuse Act 98
confirmation bias 39
consensus-driven demand forecast 246
counterproductive work behavior (CWB) 73
Creative Experience (Follett) 16
cyberloafing 67–85; defined 68, 75; examples of 68; as form of workplace deviance 69, 73; future research for 85; Gen Y population and 69–70; ICT devices and 75; implications for management 80, 82–84; introduction to 67–68; IoPTS and 70–72; literature review on 68–70; neutralization and 73–74, 75, 76 , 79; organizational citizenship behavior and 72–75, 78–79; Pomodoro technique and 72; positive effects of 72–73; research model, study 1 75–77; 16-item measure, Study 2 77–80, 81–82; solutions to combat 72; types of 75
data collection/usage, workplace policies regarding 102
data-driven analytics 91
data privacy, workplace see social media/data privacy, IoPTS in workplace and
device connectivity 3
digital natives 228
digital supply chain 242–256; behavior integrators 252; demand forecast accuracy and 244–245; described 242; future expectations for 245–246; impacts on traditional supply chain 252–253, 253, 254 ; integration case study examples 247–252; IoPTS enabled 243–244; leaders, developing 254–255; overview of 242–243; perfect order performance and 244–245; technology disruptions transforming, navigating 242–243; zero base designs and 256; see also supply chain leaders
disciplinary action, for employee social media use 93–94
Distributed Denial of Service (DDoS) attacks 135
Dynamic Administration: The Collected Papers of Mary Parker Follett (Metcalf and Urwick) 16
Dynamic Supply Chains (Gattorna) 243
education level, online repurchasing behavior and 230
Electronic Privacy and Communications Act (EPCA) 101–102
email privacy, workplace and 101–102
employee privacy, protecting 94–95
employee satisfaction/well-being, increasing 24–25
environment-centric IoPTS 259
Equal Opportunity Employment Commission (EEOC) 91–92
Facebook 67, 68, 70, 89, 91, 94
fear, defined 156
Federal Communications Commission (FCC) 160
fog computing 172
Follett, M. P. 26; circular response concept 16–17; information credibility and 23; integration concept 17–18, 25; law of the situation 18; media richness theory and 18–19; psychological hermeneutics and 21; social presence and 19–20; user responsibility in IoPTS and 14–21; writings and lectures 15–16
Follett’s web 15
force multiplier 244
future workplace, IoPTS and 270–278; adaptation framework 271 , 271–277, 277 ; introduction to 270; literature review 270–271; study results 276–277, 277
gender, online repurchasing behavior and 227–228
Genetic Information Nondisclosure Act (GINA) 90
global positioning system (GPS) devices, employer-owned 95–97
goalsetting theory 199
Google Android 159
GPS see global positioning system (GPS) devices, employer-owned
Health Insurance Portability and Accountability Act (HIPAA) 95
health promotion/outpatient support system software designers, problems/solutions for 217
holism 137
holoportation 53
HR see human resources (HR), SWOT analysis of IoT in
human dimension, of cognitive analytics 37, 37 , 38–39
human factors of outpatient support 207–218; connectivity and 210–212; email studies of 209; ignoring Internet 213–215; IoP and 209–210; IoPTS and 208–209; IoT and 207–208; online service provider model 215–217, 216 ; opting out of Internet 212–213; overview of 207; problems/solutions for software designers 217
human intranet 173
human resource management (HRM): IoPTS and 54 , 56–58, 57
human resources (HR), SWOT analysis of IoT in 187–200; introduction to 187–189; justification for use of 189–190; opportunities quadrant of 194–196; recommendations from 198–200; strengths quadrant of 191–192; threats quadrant of 196–198; weaknesses quadrant of 192–194
iCloud 94
ICT see information and communications technology (ICT)
incidental learning 170
income level, online repurchasing behavior and 229
individual career management, IoPTS and 58–61, 59
individualism, security context of 158–159
informal learning, modes of 170
information and communications technology (ICT) 1; communication via 18–19; cyberloafing and use of, devices 75; Follett’s concepts and users of 14–21; negative effects of, on organizational users 12–13; users of, in organizations 11–12
information credibility 23
information equivocality 13
information inaccuracy 13
Information Systems Audit and Control Association (ISACA) 267
information technology (IT): convergence with OT and 135–136; governance 145; network segmentation 143–144, 147; privacy and control, threats to 144, 147; security challenges, traditional colleges and universities 134–136; security convergence 142–143, 147
innovation: adopters and 112; defined 112; Internet of things (IoT) as 112–113
integrative learning 170
Interactive Health Solutions (IHS) 100–101
International Standards Organization (ISO) 47
Internet of people (IoP): described 11–12; health interventions and 209–210; online influence/interventions model 215–217, 216 ; sustainable careers and 47 , 50–52
Internet of People, moving from Internet of Things to 11–27; active listening and 22–23; communities of practice/innovation, creating 25–26; deteriorating social skills and 13; employee satisfaction/well-being implications for 24–25; feedback processing implications for 23–24; Follett human-oriented prescription for 14–21 (see also Follett, M. P.); human-oriented solutions for 14; information credibility and 23; information inaccuracy/equivocality and 13; organizational user disassociation and 12–13; time, adjusting organizational attitudes toward 25; trust implications for 21–22; users as participants 11–12
Internet of People, Things and Services (IoPTS): background 2–4; benefits of 267; cyberloafing and 70–72; data privacy in workplace and 89–103; defined 11, 46, 166; described 1–2; device connectivity and 3; digital supply chain 243–244; enabled workplace 258–259; environment, described 68; environmental impacts, digital supply chain 253, 254 ; environment-centric 259; future workplace and 270–278; government funding for 267; human factors of outpatient support and 207–218; human resource management and 47, 54, 56–58, 57; individual career management and 47, 54, 58–61, 59; introduction to 1–8; model, sustainable careers and 46–53, 47 ; people-centric 259; process-centric 259; security breaches, reducing 258–268; security policy framework 263 , 263–266; service architecture and risks 259–263, 260 , 262; social media in workplace and 89–103; strategies for VHRD in 175–176; sustainable careers and 46–53, 47 ; users in, implications for 21–26; users of ICT, as participants in 11; VHRD and 167–171; work and personal convergence with 2
Internet of services (IoS): defined 52; described 12; sustainable careers and 47 , 52–53
Internet of things (IoT): architecture of 34; characteristics of 33, 34; cloud infrastructures 145–146; concept of 32–34; defined 166; described 12; human resource management examples 49; impact of, on Utah colleges/universities 132–149; individual career examples 49; initiation of 111–130; layers of 33–34, 34; network segmentation 143–144, 147; online repurchasing behavior 225–237; privacy and control, threats to 144, 147; security challenges, traditional colleges and universities 136–137; security convergence 142–143, 147; Security Triad 146, 147 ; service architecture 260 ; smart phones 154–163; sustainable careers and 47 , 48–50; SWOT analysis of HR practices/strategies and 187–200; users in, negative effects of ICT on 12–13
Internet of things (IoT), organization initiation of 111–130; as an innovation 112–113; changing work practices and 125, 127; frontline staff concerns 127–128; introduction to 111–112; nature of technology results 117–119, 126; privacy, security, ant trust challenges 128–129; research metholology used 115, 116; research related to 112–113; study results 116–125; technological frames framework used in 114 , 114–115; technology-in-use results 122–125, 126; technology strategy results 119–122, 126; term use of 112; working together with others and 125, 127
intranets, defined 166
IoP see Internet of people (IoP)
IoPTS see Internet of People, Things and Services (IoPTS)
IoS see Internet of services (IoS)
IoT see Internet of things (IoT)
ironies of automation 193
Isen, A. M. 215
IT see information technology (IT)
loss aversion bias 39
market signal focus 246
matter of public concern, defined 94
metadata 89
microchip implantation 97
Microsoft 192
Microsoft Research 53
minimization type of neutralization 73–74, 76 , 79, 81
mobile social networks (MSNs) 15
multitasking 69
National Basketball Association (NBA) 49
National Communications Association 154
National Labor Relations Act (NLRA) 90, 93
National Labor Relations Board (NLRB) 93
nature of technology 114, 114 , 117–119; in product-oriented firms 116, 117, 126; in service-oriented firms 116, 118, 126; in technology-oriented firms 116, 118–119, 126
negative affect, OCB and 74
networked performance 251
network of networks 166
neutralization: as cognitive compensatory behavior 83–84; cyberloafing and 73–74, 75, 76 ; OCB and 76 ; 16-item measure, Study 2 79; types of 73
New Lanark 187
New State: Group Organization, the Solution of Popular Government, The (Follett) 16
normalization type of neutralization 73–74, 76 , 80, 81
OCB see organizational citizenship behavior (OCB)
OCB-individual (OCB-I) 73–74, 81–82
OCB-organization (OCB-O) 73, 74, 81–82
online repurchasing behavior 225–237; age and 228–229; education level and 230; future research for 237; gender and 227–228; hypotheses 230, 234–235; income level and 229; introduction to 225–226; literature review 226–230; research model 230–233; study results 233–237
online social networks (OSNs) 15
operational technology (OT) 135
Oracle 48
organizational citizenship behavior (OCB) 72–75; as behavioral compensatory technique 83–84; cyberloafing and 72–75; defined 73; guilt and 74–75; individual 73–74; negative affect and 74; organization 73, 74; 16-item measure, Study 2 78–79, 81–82
organizational user disassociation 12–13
OT see operational technology (OT)
Pacific Gas and Electric (PG&E) 40
Parsable 53
penetration, defined 2
people-centric IoPTS 259
perceived severity, defined 156
perceived threat 156
perceived vulnerability, defined 156
performance appraisal 188, 193
performance management 188, 193, 198
personally identifiable information (PII) 134, 135
pervasive computing 90
Pew Research 154
Pew Research Internet Project 154
Pomodoro technique 72
predictive analysis, data-driven analytics and 91
process-centric IoPTS 259
product-oriented firms: nature of technology in 116, 117, 126; technology-in-use in 116, 122–123, 126; technology strategy in 116, 119–120, 126
Protection Motivation Theory (PMT) 155–156, 157
protective behaviors 156
psychological hermeneutics 18, 21
radio-frequency identification (RFID) 49, 112, 173
Rajaee v. Design Tech Homes 98
rank and yank approach 193
recommendation agents (RA) 27
Reinfelder, L. 156
response costs, defined 157
response efficacy, defined 157
satisfaction, increasing employee 24–25
Scrum technique 72
security breaches, reducing 258–268; introduction to 258; in IoPTS-enabled workplace 258–259; IoPTS security policy framework 263 , 263–266; IOPTS service architecture and risks 259–263, 260 , 262
security challenges: BYOD technologies and 134; IoT, for traditional colleges and universities 136–137; IT, for traditional colleges and universities 134–136
security policy framework, IoPTS 263 , 263–266; accountability 263 , 266; data collection 263 , 263–264; data quality 263, 264; data use 263 , 264–265; individual participation 263 , 266; openness about practices/policies 26 3, 265–266; purpose specification 263 , 264; security safeguards 263 , 265
selection discrimination, social media/data driven analytics in 91–92
self-directed learning 170
self-efficacy, defined 157
service-oriented architectures (SOA) 12
service-oriented firms: nature of technology in 116, 118, 126; technology-in-use in 116, 123–124, 126; technology strategy in 116, 120–121, 126
size, big data and 35
Skype 53
Skyscanner 67
Slack 72
Smart City Initiative 40
smartphones, securing 154–163; data analysis/results 160–161, 160–162; hypotheses discussion 158, 159, 161–163; introduction to 154; IoT and 155; literature review concerning 156–159; Protection Motivation Theory (PMT) 155–156; research study methodology 159–160
social media/data privacy, IoPTS in workplace and 89–103; BYOD policies and 98; data collection/usage policies 102; email privacy 101–102; employee privacy, protecting 94–95; employer disciplinary action 93–94; employer-owned GPS devices 95–97; future research for 102–103; introduction to 89–91; mobile devices/apps and 97–99; policies governing selection 92–93; selection discrimination and 91–92; wearable technology and 99–101; wellness programs and 99–101
social media policies, employee selection 92–93
social presence 18, 19–20; defined 19
social skills, ICT and deteriorating 13
Society for Human Resource Management (SHRM) 94
sociomateriality 198
Sociometric Solutions 192
subdermal microchip 97
supply chain leaders: consensus-driven demand forecast and 246; customer demand concerns of 243–244; demand forecast accuracy and 244–245; developing 254–255; market signal focus of 246; mind-sets of 251; networked performance and 251; organizational-level characteristics of 250–251; role of 250; social media data mining and 245–246; see also digital supply chain
surreptitious monitoring capabilities 98
sustainable career theory 45–62; boundarylessness concept and 45; human resource management and IoPTS 56–58, 57; individual career management and IoPTS 58–61, 59; introduction to 45–46; IoP and 47 , 50–52; IoPTS model and 46–53, 47 ; IoS and 47 , 52–53; IoT and 47 , 48–50; TMGT effect and 53–56, 54
SWOT analysis of IoT in human resources (HR) 187–200; introduction to 187–189; justification for use of 189–190; opportunities quadrant of 194–196; recommendations from 198–200; strengths quadrant of 191–192; threats quadrant of 196–198; weaknesses quadrant of 192–194
tacit learning 170
technological dimension, of cognitive analytics 37 , 37–38, 39
technological frames framework 114 , 114–115
technology development (TD) 177–178
technology-in-use 114, 114 , 122–125; in product-oriented firms 116, 122–123, 126; in service-oriented firms 116, 123–124, 126; in technology-oriented firms 116, 124–125, 126
technology-oriented firms: nature of technology in 116, 118–119, 126; technology-in-use in 116, 124–125, 126; technology strategy in 116, 121–122, 126
technology strategy 114, 114 , 119–122; in product-oriented firms 116, 119–120, 126; in service-oriented firms 116, 120–121, 126; in technology-oriented firms 116, 121–122, 126
threat, defined 156
threat appraisal, defined 156
Three Square Market (“32M”) 97
time, adjusting organizational attitudes toward 25
time theft 90
Title VII antidiscrimination laws 90, 92
TMGT see Too Much of a Good Thing (TMGT) effect
Too Much of a Good Thing (TMGT) effect 53–56, 54
transhumanism 199
trust management (TM) 200
U.S. Department of Homeland Security 159
U.S. Department of Justice 159
users, defined 11
Utah colleges/universities, IoT impact on 132–149; challenges associated with IoT 133–134; cloud infrastructure and 145–146; data management issues 136–137; future research for 148; holism based research study 137–138; implications 144–146; introduction to 132; IoT security challenges 136–137; IoT Security Triad 147 ; IT governance and 145; IT leadership/decision-making structure challenges 135–136; IT security infrastructure challenges 134–136; network segmentation 143–144, 147; opportunities offered by IoT 132–133; privacy and control, threats to 144, 147; privacy issues 137; propositions, test of 141–142; research study limitations 139; research study methods 138–139; research study results 139–141; security convergence 142–143, 147; security practitioners, recommendations for 148–149
variety, big data and 35
velocity, big data and 35
VHRD see virtual human resource development (VHRD)
VirginPulse 53
virtual discrimination 53, 57–58
virtual human resource development (VHRD) 166–179; defining 168–170; design thinking and 178–179; guidelines and implications for IoPTS and 173–179, 174 ; integration of intranets and Internet 172–173; introduction to 166–167; IoPTS and 167–171; learning agility and 176–177; strategies for, in IoPTS 175–176; technology development and 177–178; trends in 170–171
volume, big data and 35
wearables: data privacy and 99–101; encryption and 100
Web 2.0 15
well-being, increasing employee 24–25
wellness programs, data privacy and 99–101
Whitman v. Interactive Health Solutions 100–101
3.17.79.60