Did You Get My Email?! - Leveraging Boundary Work Tactics to Safeguard Connectivity Boundaries

aut.relation.endpage148
aut.relation.issue1
aut.relation.journalJournal of Information Technology
aut.relation.startpage123
aut.relation.volume39
dc.contributor.authorWaizenegger, L
dc.contributor.authorRemus, U
dc.contributor.authorMaier, R
dc.contributor.authorKolb, D
dc.date.accessioned2024-06-27T02:45:24Z
dc.date.available2024-06-27T02:45:24Z
dc.date.issued2023-06-06
dc.description.abstractBeing connected to the Internet through various mobile devices is pervasive in our daily professional and private lives. Yet, the way people connect, including when, with whom and through which communication channels differs, manifesting individuals’ idiosyncratic connectivity patterns. In team collaboration, where individuals are dependent on each other’s availability and responsiveness, differences in team members’ connectivity patterns can lead to clashing expectations concerning connectivity. This, in turn, can compromise individuals’ well-being and productivity and threaten team collaboration outcomes. In this paper, we address the question of how to manage connectivity in interdependent teams and align connectivity patterns to facilitate successful collaboration while at the same time safeguarding individuals’ connectivity boundaries. To address this question, we conducted a qualitative case study that involved 39 semi-structured interviews with employees and members of the management board of an international consultancy headquartered in Germany. Building on concepts established in boundary theory, we coined the term “connectivity boundaries” and identified the six boundary work tactics, externalizing, accommodating, adapting, pushing, sacrificing, and enforcing that allow team members to create, maintain, temporarily change, and reclaim their connectivity boundaries and achieve team collaboration success. We developed propositions that highlight which contextual factors and goals are associated with which boundary work tactic.
dc.identifier.citationJournal of Information Technology, ISSN: 0268-3962 (Print); 1466-4437 (Online), SAGE Publications, 39(1), 123-148. doi: 10.1177/02683962231175924
dc.identifier.doi10.1177/02683962231175924
dc.identifier.issn0268-3962
dc.identifier.issn1466-4437
dc.identifier.urihttp://hdl.handle.net/10292/17725
dc.languageen
dc.publisherSAGE Publications
dc.relation.urihttps://journals.sagepub.com/doi/10.1177/02683962231175924
dc.rights© Association for Information Technology Trust 2023. Creative Commons License (CC BY 4.0). This article is distributed under the terms of the Creative Commons Attribution 4.0 License (https://creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access page (https://us.sagepub.com/en-us/nam/open-access-at-sage).
dc.rights.accessrightsOpenAccess
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.subject46 Information and Computing Sciences
dc.subject4608 Human-Centred Computing
dc.subject35 Commerce, Management, Tourism and Services
dc.subjectClinical Research
dc.subject08 Information and Computing Sciences
dc.subject15 Commerce, Management, Tourism and Services
dc.subject17 Psychology and Cognitive Sciences
dc.subjectInformation Systems
dc.subject35 Commerce, management, tourism and services
dc.subject46 Information and computing sciences
dc.subject52 Psychology
dc.titleDid You Get My Email?! - Leveraging Boundary Work Tactics to Safeguard Connectivity Boundaries
dc.typeJournal Article
pubs.elements-id514473
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Waizenegger et al._2024_Did you get my email.pdf
Size:
828.38 KB
Format:
Adobe Portable Document Format
Description:
Journal article