Waizenegger, LRemus, UMaier, RKolb, D2024-06-272024-06-272023-06-06Journal of Information Technology, ISSN: 0268-3962 (Print); 1466-4437 (Online), SAGE Publications, 39(1), 123-148. doi: 10.1177/026839622311759240268-39621466-4437http://hdl.handle.net/10292/17725Being connected to the Internet through various mobile devices is pervasive in our daily professional and private lives. Yet, the way people connect, including when, with whom and through which communication channels differs, manifesting individuals’ idiosyncratic connectivity patterns. In team collaboration, where individuals are dependent on each other’s availability and responsiveness, differences in team members’ connectivity patterns can lead to clashing expectations concerning connectivity. This, in turn, can compromise individuals’ well-being and productivity and threaten team collaboration outcomes. In this paper, we address the question of how to manage connectivity in interdependent teams and align connectivity patterns to facilitate successful collaboration while at the same time safeguarding individuals’ connectivity boundaries. To address this question, we conducted a qualitative case study that involved 39 semi-structured interviews with employees and members of the management board of an international consultancy headquartered in Germany. Building on concepts established in boundary theory, we coined the term “connectivity boundaries” and identified the six boundary work tactics, externalizing, accommodating, adapting, pushing, sacrificing, and enforcing that allow team members to create, maintain, temporarily change, and reclaim their connectivity boundaries and achieve team collaboration success. We developed propositions that highlight which contextual factors and goals are associated with which boundary work tactic.© Association for Information Technology Trust 2023. Creative Commons License (CC BY 4.0). This article is distributed under the terms of the Creative Commons Attribution 4.0 License (https://creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access page (https://us.sagepub.com/en-us/nam/open-access-at-sage).https://creativecommons.org/licenses/by/4.0/46 Information and Computing Sciences4608 Human-Centred Computing35 Commerce, Management, Tourism and ServicesClinical Research08 Information and Computing Sciences15 Commerce, Management, Tourism and Services17 Psychology and Cognitive SciencesInformation Systems35 Commerce, management, tourism and services46 Information and computing sciences52 PsychologyDid You Get My Email?! - Leveraging Boundary Work Tactics to Safeguard Connectivity BoundariesJournal ArticleOpenAccess10.1177/02683962231175924