首页    期刊浏览 2024年12月04日 星期三
登录注册

文章基本信息

  • 标题:Using family firm boundary management theory to explain the impact of privacy issues on family firm research.
  • 作者:Envick, Brooke R. ; Langford, Margaret ; Ward, Stephanie G.
  • 期刊名称:Academy of Entrepreneurship Journal
  • 印刷版ISSN:1087-9595
  • 出版年度:2008
  • 期号:January
  • 语种:English
  • 出版社:The DreamCatchers Group, LLC
  • 摘要:While the family firm is the most prevailing type of organization in the United States and throughout the world (Shanker & Astrachan; Dyer, 2003), the number of studies conducted on family firms is relatively few. This is especially true for topics relating to internal operations such as business priorities versus family priorities, strategic and financial decision-making processes, and human resource issues that may lead to questions about perceived promises, trust, and fairness. The issue of privacy among family firms has been addressed in the literature, with the overall conclusion being that, in the minds of family business members, disclosing firm-specific information is virtually indistinguishable from disclosing family-specific information (Hoy & Vesper, 1994).
  • 关键词:Entrepreneurship;Family corporations;Family-owned business enterprises;Family-owned businesses;Strategic planning (Business)

Using family firm boundary management theory to explain the impact of privacy issues on family firm research.


Envick, Brooke R. ; Langford, Margaret ; Ward, Stephanie G. 等


INTRODUCTION

While the family firm is the most prevailing type of organization in the United States and throughout the world (Shanker & Astrachan; Dyer, 2003), the number of studies conducted on family firms is relatively few. This is especially true for topics relating to internal operations such as business priorities versus family priorities, strategic and financial decision-making processes, and human resource issues that may lead to questions about perceived promises, trust, and fairness. The issue of privacy among family firms has been addressed in the literature, with the overall conclusion being that, in the minds of family business members, disclosing firm-specific information is virtually indistinguishable from disclosing family-specific information (Hoy & Vesper, 1994).

The contribution of this paper is the introduction of Family Firm Boundary Management Theory (FFBM) to help researchers understand why family firms have such a noted penchant for privacy. FFBM is based on Communication Boundary Management Theory (CBM), which is from the family psychology literature. This theory offers an explanation of how communication barriers are established to regulate ownership of private information (Petronio, 1991; 2000). There are four interrelated dimensions of FFBM, which include ownership, control, permeability, and levels. By understanding these dimensions and other aspects of FFBM, researchers can better plan their approach to collect information, select accessible topics for research, and deepen their understanding of family firms' preference for privacy. Family firms are as much, if not more, about the family as they are about the business. Looking to the family psychology literature is an important step in family firm research to enhance our knowledge base and deepen our understanding of how family firms operate and interact with outside entities.

According to Dyer (2003), the family firm is the most dominant organizational form in the world, and it is estimated that 90 percent of all businesses in the United States are family businesses (Shanker & Astrachan, 1996). However, in relation to these numbers, very few studies have been done regarding family firms (Dyer 2003). According to Litz (1997), this is due to informational constraints that limit both the quality and quantity of family firm research. This forces one to consider why these informational constraints are so prevalent.

We address the issue in this paper by introducing Communication Boundary Management Theory (CBM), from the family psychology literature, and offer a new theoretical perspective to the family firm literature called Family Firm Boundary Management Theory (FFBM). A literature review is presented that outlines difficulty in collecting data for family firm research. A case in point is offered as a concrete example of the difficulties that exist. Next, Communication Boundary Management Theory is introduced from the family psychology literature, which is the basis for our theory on Family Firm Boundary Management. The four dimensions and two components of FFBM are presented, followed by conclusions.

LITERATURE REVIEW

There is an interesting story in the family firm literature that focuses on a unique exercise conducted by a management consultant. The consultant asks the attendees to describe their businesses as if they were automobiles. One business owner compared his business to a sports car, because of its innovative marketing strategies. A second attendee said that her firm is analogous to a station wagon because of its conservative history and conventional product lines. The third business owner compared his firm to an armored car. When asked to explain the parallel, he responded that unlike the other two, his is a family business: no one gets in; no one gets out (Litz, 1997). The purpose of this paper is to offer one plausible explanation why it is so difficult for academic researchers to "get in" and collect the data needed to further our understanding of family firms.

The bottom line is that family firms prefer privacy (Ward, 1987; Whisler, 1988; Litz, 1997). In fact, some researchers have concluded that in the minds of family business members, disclosing firm-specific information is virtually indistinguishable from disclosing family-specific information (Hoy & Vesper, 1994). Simply stated, family firms have a greater unwillingness to disclose firm-specific information than their non-family counterparts. This predisposition to safeguard information from outside entities tends to steer academic researchers towards topics and subjects that are more accessible and manageable (Litz, 1997). This answers the question of why there is such a lack of family firm research and a failure to answer the questions that are not easily discussed (Dees and Starr, 1992). But, what is still missing is a plausible explanation why family businesses have such a noted penchant for privacy.

One primary issue facing upper management in family firms is balancing responsibilities between the family and those to the business (Frieswick, 1996; Chrisman, Chua & Sharma, 1996). One responsibility is managing and controlling interactions with any external persons or organizations. If most communication flows through the founding family member(s) and/or upper management, then they ultimately control what information flows both in and out of the business (Kelly, Athanassiou, & Crittenden, 2001). Family firms also tend to have an inward orientation, and as such, founders and/or upper management often avoid being held accountable to any outside entities (Daily & Dollinger, 1991).

Family values and the founders' personal goals help shape family firm strategy, and that can lead to family harmony and employment being valued more than firm performance and profitability (Gersick, Davis, McCollom, & Lansberg, 1997; Trostel & Nichols, 1982). Family goals and needs often play major roles in decisions regarding the location of the business, financial strategy, and business strategy (Kahn & Henderson, 1992; Mishra & McConaughy, 1999). In some instances, family business owners are forced to choose between what is best for the family versus what is best for the business, which is obviously a very difficult reality facing family firms and their owners (Brockhaus, 1994). In fact, Gomez-Mejia, Nunez-Nickel, and Gutierrez (2001) suggest that family firms may incur higher agency costs than non-family firms, since family members in upper management may be unwilling to fire an incompetent family member.

Beyond a family founders' preference for privacy, it is also suggested that family business owners seem to have a disinterest in academic studies, and even if they commit, their discontinuance rate is high, especially for more longitudinal studies (Brockhaus, 1994).

CASE IN POINT

To provide a concrete example of family firms' preference for privacy, the authors have elected to share their experiences in trying to conduct a research project on how psychological contracts work in family firms. It is important to note that we adhered to Brockhaus' (1994) advice on conducting research with family firms. He states that researchers should fully disclose the nature and purpose of the study, state how the information will be compiled, make a guarantee of confidentiality, provide the benefits of participation in the study, and describe their time commitments.

As professors, we hold various ranks in our school, one assistant professor, one associate professor, and one full professor. Together, we have 27 publications in peer-reviewed journals, in addition to numerous conference presentations and proceeding publications. This information is presented to illustrate that we have the requisite experience, knowledge, and skills needed to successfully complete empirical research projects.

Additionally, we adhered to the original research model and survey on psychological contracts, which are individual beliefs in a reciprocal obligation between the individual and the organization (Rousseau, 1989). A psychological contract includes a perceived promise, a valued payment, and acceptance of the exchange ENRfu(Rousseau, 1995). This model and survey has resulted in successful data collection and empirical journal publications over the past 17 years (Rousseau, 1989; Rousseau, 1990; Rousseau & McLean-Parks, 1993; Robinson & Kraatz, 1994; Shore & Tetrick, 1994; Robinson, 1995; Rousseau, 1995; Robinson, 1996; Morrison & Robinson, 1997; Turnley & Feldman, 1999; Dabos & Rousseau, 2004; Raja, Johns, & Ntalainis, 2004; and Rousseau, 2004). In an attempt to introduce the concept of psychological contracts to the family firm literature the authors engaged in a research project described in the rest of this section.

Drawing upon Inc. 500 lists for 2004 and 2005, we contacted approximately 225 firms using an on-line survey methodology. The purpose of this "Phase One" of the research study was to determine whether a firm was family-owned, the extent of family-ownership, and whether the firm would be interested in participating in "Phase Two," in which surveys would be sent to both owners and employees, both family and non-family. We fully disclosed the purpose of the research as being to investigate the relationships between employers and employees in family-owned businesses and that we were researching "psychological contracts," trust and fairness, and business performance. Further, we stated that any information provided for the research would be kept completely confidential and no firms would be identified by name in any publication of the research results. We also said that all surveys would be destroyed after the completion of the study. Additionally, we provided the following statement regarding individual participants:
 Procedures to preserve your anonymity and confidentially are in
 place and have been approved by the Institutional Review Board of
 [this university]. No responses will be traceable to you; your
 responses will be aggregated (combined) with all others. Results
 from all companies will be aggregated so that responses from a
 specific company cannot be identified by any person other than the
 investigators and research secretary. Participating companies will
 be sent final, aggregated results of the research. Because of the
 nature of this survey, the researchers do not foresee that you will
 experience any risks as a result of your participation. Nor will
 you receive any direct, personal benefit as a result of your
 participation. However, your participation will allow researchers
 to better understand family-owned business employment relationships
 and practices.


In terms of time commitments, the Phase One survey took less than five minutes to complete. The letter that accompanied the Phase One survey stated that the Phase Two owner survey would take 10-15 minutes to complete, and the employee survey would take 20-25 minutes to complete. Again, the main purpose of Phase One was to determine their willingness to participate in Phase Two.

We received 23 responses. Of these, only four stated that they would be interested in participating in Phase Two (less than 2% of the original number). We sent two reminder e-mails to the non-responding firms without success (except a few requests to be removed from the mailing list). Within two weeks of contact by the "yes" firms, we mailed Phase Two surveys (along with cover letters reminding participants of the purpose of the research and assuring anonymity) for both owners and employees of each. The number of surveys mailed ranged from 20 to 80 per firm.

As we awaited these Phase Two surveys to be returned, we discussed why the response rate was so low to the Phase One inquiry and concluded that one reason might be the on-line methodology itself being off-putting. We decided to use a different approach to find more family firms willing to participate. In our revised approach, we used Fortune's "Fastest Growing Companies in 2006" list and mailed the Phase One inquiry survey to 99 firms via standard mail. We received no replies.

We moved on to more lists that might yield additional family firms. We used Family Business Magazine's lists of "America's 150 Largest Family Businesses" and, somewhat later, "America's 150 Oldest Family Businesses." From the former list, the CEO/owner of a very large firm responded that he would like his firm to participate in Phase Two. Because of the size of the firm (many thousands of employees), we realized that we would need to use a vendor to set up a Phase Two survey that could be completed on-line anonymously and easily by employees and owners. One of the authors worked with the vendor to refine an on-line version of the Phase Two survey as well as kept in direct contact with the CEO to assure continuance in the project. We also contacted potential participants via yet another list, Forbe's "Largest Private Companies for 2006" (360 companies). From this list, two responded that they would like to continue with Phase Two. One was large enough to utilize the on-line method for Phase Two and we established and maintained contact with the CEO of this firm as well. For the second firm, due to its relatively smaller size, we mailed approximately 800 hard-copy surveys. Also, during this general time frame, we mailed Phase One inquiry surveys to companies on Fortune's list of the 100 "Fasting Growing Small Public Companies." We received one "no" response and no others. Also, another of the authors, through a research colleague, established contact with yet another group of family firms, eight of which agreed to participate.

Surveys from the very first effort (that yielded only four companies willing to participate in Phase Two) had earlier trickled in from only two of the four companies. We never heard from the other two. From the two participating firms, we received two owner surveys and 36 employee surveys combined.

As we continued to work with the Phase Two on-line vendor, we were contacted by the firm to which we had sent 800 hard-copy surveys. Upon receiving the surveys, the firm decided not to participate and subsequently mailed the surveys back. At this point, we decided that the nature of the research itself--essentially exploring elements of trust, fairness, and promise-keeping--might be a contributing factor to lack of response. We could not afford to have the on-line vendor move forward with the Phase Two survey if the two firms would also decide not to participate after all. The author who had been maintaining contact with these two larger firms contacted them again, submitting the surveys for the CEO/owners to peruse. Both now declined to participate further.

As of this writing, a year after the original on-line Phase One step, we have contacted approximately 1,030 firms. We have received only six surveys from owners and 43 from employees. This has forced us to really consider why there is such a noted unwillingness of these family firms to participate, especially since there was initial commitment to participate by several firms. However, upon seeing the survey questions or being provided information about specific elements of psychological contracts (i.e. trust, fairness, promise-keeping), they chose to withdraw from the study.

COMMUNICATION BOUNDARY MANAGEMENT THEORY

Based on the experience described in the aforementioned case in point, the authors began researching privacy issues in family firms, going beyond what is currently available in business literature and into family psychology literature. Communication Boundary Management Theory (CBM) offers an explanation of how communication barriers are established to regulate ownership of private information (Petronio, 1991; 2000). CBM theory focuses on (1) how boundaries are structured--who and who does not have access to information; and (2) a rule of management system--the factors that govern decisions about what private information to reveal or conceal (Petronio, 2000).

Communication boundary structures have four interrelated dimensions: ownership, control, permeability, and levels. Ownership refers to a family member's right to govern whether private information about them is revealed to or concealed from others. Therefore, each family member owns this control over his or her own words, behaviors, and attitudes. Control takes into account the dimension of ownership in addition to risk. The amount of risk associated with revealing different types of information varies. The amount of risk also affects who has access to that information. Permeability refers to how open the information is within the family. The more people within the family who have access to specific information, the more likely it will be exposed outside the family. The final dimension is levels, which takes into account different family member roles. Some information may only be known and discussed by family members of a certain generation, and not disseminated to family members in later generations. In other cases, the information may be spread to only one side of the family (in marital relations), or perhaps certain information is only shared among members of a certain gender. This results in subgroups of a family having access to information kept secret from other subgroups.

The rule of management system is the second component of CBM theory. This is an internal system used to control who has access to certain information and when it should be protected. This can include who is told, how much is told, what kind if information is revealed, and even reasons behind why certain information is disclosed, while other information is concealed.

In the family psychology literature, CBM theory has been used to better understand the disclosure of private information between marital couples (Petronio, 1991); to compare boundaries across different family forms (Caughlin, Golish, Olson, Sargent, Cook & Petronio; 2000); to uncover motivations underlying topic avoidance in close relationships (Afifi & Guerrero, 2000); and to analyze parental privacy invasion in family interactions (Petronio, 1994), among other different types of family relationships and issues.

The theory of Communication Boundary Management has also been applied in the information technology and e-commerce literature to better understand privacy issues. For example, with the rising popularity of the Internet, people are becoming more concerned with the privacy and security of sensitive information. Stanton (2003) developed a new theoretical perspective (based on Petronio's theory) called Information Boundary Management Theory, that describes whether, when, and why employees care about the privacy and security of sensitive information at work. Likewise, Metzger (2007) applied CBM to understand the tension between information disclosure and privacy within e-commerce relationships.

In this paper we use Communication Boundary Management Theory to offer a new theoretical explanation called Family Firm Boundary Management Theory (FFBM) to help explain why it is so difficult to access the information needed to truly further our understanding of family firms.

FAMILY FIRM BOUNDARY MANAGEMENT THEORY

As mentioned in the literature review, in the minds of family business members, disclosing firm-specific information is virtually indistinguishable from disclosing family-specific information (Hoy & Vesper, 1994). The family and the firm systems are isomorphic and virtually impossible to separate. This is why it is so difficult to tap into how family firms make certain decisions (Handler, 1992); issues of ethics, principles, and values (Ackoff, 1987; Wilson, 1980; Chrisman & Fry, 1982); or issues of family firm mismanagement (Dees & Starr, 1992). Instead, most research focuses on how family businesses contribute to the GNP and employment (Brockhaus, 1994); or the firm's reputation among customers and suppliers (Litz, 1997); as well as broader issues of family firm strategy and succession planning.

In this section, the original Communication Boundary Management Theory components and dimensions (Petronio, 1991; 2000) are discussed in terms of how they may play into preference for privacy issues and FFBM theory resulting in a lack of academic research. The authors contend that this is helpful for researchers of family firms to understand when faced with the collection of more sensitive data or information that is not readily available.

Ownership

Assume that family member A views family member B as having a bias against non-family member employees. Regardless of that opinion, and even if certain factual evidence may exist, "ownership" suggests that family member A does not have the right to choose whether that information is revealed to or concealed from outside entities; only family member B would have that right. Family member A would find answering the survey very difficult, especially if it contained sensitive or controversial information. That is, a family member might easily answer a survey with questions pertaining only to them, but have difficulty answering questions about more broad management issues or anything he or she observes in the behaviors of other family members. As a result, the amount of information that can be shared, according to the dimension of ownership, can be very restrictive.

Control

This dimension adds the variable of risk into the equation. Revealing how much the family firm has grown over that past five years may be considered low risk. Revealing how the firm views social responsibility may be considered moderately risky. Revealing how non-family members in the firm are evaluated and promoted versus family members may be considered high risk, as now you are tapping into how decisions are made and possibly issues of ethics, values, fairness, and trust. As such, family firm management may prefer tighter control over that type of information. The second aspect relates to who has access. While information may be provided to a board of advisors, the same information may not be offered to academic researchers because of the risk associated with a lack of perceived control over what will actually be done with the data (even if there is a statement of confidentiality and so forth). Additionally, they choose who is on the board, whereas in most cases, they have not chosen or initiated a relationship with academic researchers.

Permeability

How open the family is with information in the family firm is important to consider. The more people within the firm who have access to specific information, the better chance it will be leaked to outside entities. This taps back into the concept of risk. In some cases, very risky information may be shared with certain family members, but not with other family members. For example, the founding member may know the firm is in serious trouble for one reason or another. He may decide to share that information with his brother, who is a co-founder, but not his daughter, who is first in line to take over the family firm. So, in some cases closely guarded information may remain fairly impermeable, whereas in other cases, the free exchange of information leads to a more permeable communication boundary. The more impermeable, the more likely there are intra-family secrets. This is different from information that is merely kept private from external entities, as family members who hold this information tend to keep it more closely guarded (Bok, 1983; Vangelisti, 1994). Therefore, the more impermeable a family firm is in regard to internal operations, the less likely any information will be available to the academic researcher.

Levels

The final dimension is levels, which takes into account hierarchical roles. Some information may only be privy to upper level management, and not disseminated to family members in lower level positions within the firm. In other cases, the information may be spread through all levels in the business, but only to family members. This can result in certain family members having access to information kept secret from non-family members occupying higher-level positions in the firm. This could include decisions about the business that put family values and interests above profitability and performance. If any of this type of information is kept from any party within the business, it will most certainly be kept from academic researchers.

The rule of management system is the second component of CBM theory, which is an internal system used to control who has access to certain information and when it should be protected. As mentioned in the literature review, the founding members and/or upper management tend to control information flowing both in and out of the family firm (Kelly, Athanassiou, & Crittenden, 2001). Therefore, it is plausible to assume that they create and maintain the rule of management system. So, not only will academic researchers not get the information they need for research, they may also not know or understand the rule of management system(s) within the firms in their prospective participant pools. The rule of management system will likely be different from firm to firm, causing even more confusion and varying results.

CONCLUSIONS

Deepening our understanding of the "family side" of family firms is crucial if we are going to increase the number of studies conducted in the field. It is oftentimes easier to choose other types of research projects, rather than deal with the privacy issues in family firm research. Our take is that the family firm is as much, if not more, about the family as it is about the business. Therefore, we sought out theories and empirical studies from the family psychology literature to further our own understanding of how communication barriers are established to regulate ownership of private information (Communication Boundary Management Theory: Petronio, 1991; 2000).

This paper's contribution is the introduction of Family Firm Boundary Management Theory to help researchers not only understand why family firms prefer privacy, but with the hope that this understanding will help them better plan for and develop research projects in the field. We also hope that this paper will inspire others to look further into the family psychology literature for other theories and empirical studies that may help develop our knowledge base and thus strengthen the family firm literature.

Although communication boundaries are metaphorical (Altman, 1976; Petronio, 1991), the stable nature of them is an excellent indicator of why academic researchers have been relatively unsuccessful in acquiring necessary information to appropriately develop family firm literature. Drawing from the family psychology literature to understand how families view and communicated with outside entities is an important step in family firm research.

This paper focuses on one theory from this body of literature, Communication Boundary Management Theory (Petronio, 1991; 2000), which has been used to help understand different family forms, marital relationships, and other types of family interactions. Using the foundation of the two components (boundary structures and the rule of management system) and four dimensions (ownership, control, permeability, and levels) of CBM, the authors offer Family Firm Boundary Management Theory to help family firm researchers better plan their approach to collect information, select accessible topics for research, and deepen their understanding of family firms' preference for privacy. Not all dimensions may be at play in all research projects, or some dimensions may be more dominant. For example, in our research project on psychological contracts, it appears that issues of control and ownership are most prevalent in preventing owners from allowing employees to share their perceptions. Once employees' perceptions of promise keeping, fairness, and trust leave the organization, true ownership and control over how it might be used and communicated is lost. Permeability and levels may not being playing as large of a role, because employees have various perceptions of management and operations even if they are not privy to all information. It is important for researchers to consider which of the four dimensions might affect their project, and always remember the rule of management system as a factor.

Since family firms appear to be as much, if not more, about the family as they are about the business, we suggest that more family firm researchers look to the family psychology literature at other theories and empirical studies to help further our understanding of family firms.

REFERENCES

Ackoff, R. (1987). Business ethics and the entrepreneur. Journal of Business Venturing, 2, 185-191.

Afifi, W.A., & Guerrero, L.K. (2000). Motivations underlying topic avoidance in close relationships. In. S. Petronio, Balancing the secrets of private disclosures. 165-180.

Altman, I. (1976). Privacy: A conceptual analysis. Environment & Behavior, 8, 7-29. 47 Brockhaus, R.H. (1994). Entrepreneurship and family business research: Comparison, critiques, and lessson. Entrepreneurship Theory & Practice, 19(1), 25-38.

Bok, S. (1983). Secrets: On the ethics of concealment and revelation. New York: Vintage Books. Caughlin, J. P., Golish, T. D., Olson, L. N., Sargent, J. E., Cook, J. S., & Petronio, S. (2000). Family secrets in various family configurations: A Communication Boundary Management perspective. Communication Studies, 51, 116134.

Chrisman, J.J. & Fry, F. (1982). Public versus business expectations: Two views on social responsibility for small business. Journal of Small Business Management, 20, 19-26.

Chrisman, J.J., Chua, J.H., & Sharma, P. (1996). A review and annotated bibliography of family business studies. Norwell: MA: Kluwer Academic Publishers.

Dabos, G.E., & Rousseau, D.M. (2004). Mutuality and reciprocity in the psychological contracts of employees and employers. Journal of Applied Psychology, 89(1): 52-72.

Daily, C.M. & Dollinger, M.J. (1991). Family firms are different. Review of Business, 2, 3-5.

Dees, J.G. & Starr, J.A. (1992). Entrepreneurship through an ethical lense: Dilemmas and issues for research and practice. In D.L.Sexton & R. Smilor (Eds.), The state of entrepreneurship, 89-116. Boston: PWS-Kent.

Dyer, W.G. (2003). The family: The missing variable in organizational research. Entrepreneurship Theory and Practice, 27 (4), 401-416.

Frieswick, K. (1996). Mixing progeny and profits. Industrial Distribution, 85, 44-49.

Gersick, K.E., Davis, J.A., McCollom. H.M. & Lansberg, I. (1997). Generation to generation: Life cycles of the family business. Boston: Harvard Business School Press.

Gomez-Mejia, L.R., Nunez-Nickel, M. & Gutierrez, I. (2001). The role of family ties in agency contracts. Academy of Management Journal, 44(1), 81-95.

Handler, W.C. (1992). The succession experience of the next generation. Family Business Review, 5(3), 283-308.

Hoy, F. & Vesper, T. (1994). Emerging business, emerging field: Entrepreneurship and the family firm. Entrepreneurship Theory & Practice, 19(1), 9-23.

Kahn, J.A. & Henderson, D.A. (1992). Location preferences of family firms: Strategic decision of "home sweet home"? Family Business Review, 5(3), 271-282.

Kelly, L., Athanassiou, N., and Crittenden, W. (2001). Founder centrality & strategy in the family owned firm". Entrepreneurship Theory and Practice, 25, 27-42.

Litz, R. (1997). The family firm's exclusion from business school research: explaining the void; addressing the opportunity. Entrepreneurship Theory and Practice, 22(2), pp.55-71.

Metzger, M. J. (2007). Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12(2) 1.

Mishra, C.S. & McConaughy, D.L. (1999). Founding family control and capital structure: The risk of loss of control and the aversion to debt. Entrepreneurship Theory & Practice, 23(4), 53-64.

Morrison, E. W., & Robinson, S.L. (1997). When employees feel betrayed: A model of how psychological contract violation develops. Academy of Management Review, 22(1): 226-256.

Petronio, S. (1991). Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Communication Theory 1 (4), 311-335.

Petronio, S. (1994). Privacy binds in family interactions. The case of parental privacy invasion. In W.R. of private disclosures, 37-49. Mahwah, NJ: Erlbaum.

Petronio, S. (2000). Balancing the secrets of private disclosures. Laurance Erlbaum Associates. Raja, U., Johns, G., & Ntalianis, F. (2004). The impact of personality on psychological contracts. Academy of Management Journal, 47 (3), 350-367.

Robinson, S. L., Kraatz, M.S., & Rousseau, D.M. (1994). Changing obligations and the psychological contract: A longitudinal study. Academy of Management Journal, 37: 137-152.

Robinson, S. L. (1995). Violation of psychological contracts: Impact on employee attitudes. In L. E. Tetrick, & Barling, J. (Ed.), Changing employment relations: Behavioral and social perspectives: 91-108. Washington D.C.: American Psychological Association.

Robinson, S. L. (1996). Trust and breach of the psychological contract. Administrative Science Quarterly, 41(4): 574-599.

Rousseau, D. M. (1989). Psychological and implied contracts in organizations. Employee Responsibilities and Rights Journal, 2: 121-139.

Rousseau, D. M. (1990). New hire perceptions of their own and employer's obligations: A study of psychological contracts. Journal of Organizational Behavior, 11: 389-400.

Rousseau, D. M., & McLean-Parks, J. (1993). The contracts of individuals and organizations. In L. L. C. B. M. Staw (Ed.), Research in organizational behavior, 15. Greenwich, CT: JAI Press.

Rousseau, D. M. (1995). Psychological contracts in organizations: Understanding written and unwritten agreements. Thousand Oaks, CA: Sage Publications.

Rousseau, D. M. (2004). Psychological contracts in the workplace: Understanding the ties that motivate, Academy of Management Executive, 18 (1), 120-127.

Shanker, M.C. & Astrachan, J.H. (1996). Myths and realities: Family businesses' contributions to the U.S. economy. Family Business Review, 9(2), 107-119.

Shore, L. M., & Tetrick, L.E. (1994). The psychological contract as an explanatory framework in the employment relationship. In C. L. Cooper, & Rousseau, D.M. (Ed.), Trends in Organizational Behavior, 1, 91-109: John Wiley and Sons.

Stanton, J.M. (2003). Information technology and privacy: A boundary management perspective. In socio-technical and human cognition elements of information systems, 79-103, IGA Publishing: Hersey, PA.

Trostel, A.O. & Nichols, M.L. (1982). Privately-held and publicly-held companies: A comparison of strategic choices and management processes. Academy of Management Journal, 25, 47-62.

Turnley, W.H., & Feldman, D.C. (1999). The impact of psychological contract violations on exit, voice, loyalty, and neglect. Human Relations, 52(7), 895-922.

Vangelisti, A.L. (1994). Family secrets: Forms, functions, and correlates. Journal of Social and Personal Relationships, 11, 113-135.

Ward, J. (1997). Keeping the family business healthy: How to plan for continued growth, profitability, and family leadership. San Francisco: Josey-Bass.

Whisler, T.L. (1988). The role of the board in the threshold firm. Family Business Review, 1 (5), 143-154.

Wilson, E. (1980). Social responsibility of business; what are the small business perspective? Journal of Small Business Management, 20, 11-18.

Brooke R. Envick, St. Mary's University

Margaret Langford, St. Mary's University

Stephanie G. Ward, St. Mary's University
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有