Page 471 - Fundamentals of Management Myths Debunked (2017)_Flat
P. 471

470    Part 5   •  Controlling
                Endnotes


                  1.  “Domino’s Delivered Free Piz-  29,  2003,  R1–R8;  P.  Magnusson,   Data Went  out Wireless  Door,”   Ingram,  “Performance Monitor-
                    zas,” Springfield, Missouri News-  “Your Jitters Are Their Lifeblood,”   Wall Street Journal, May 4, 2007,   ing:  Guidance for the  Modern
                    Leader, April 3, 2009, p. 3B.  Business Week, April 14, 2003, 41;   A1+; and B. Stone, “Firms Fret   Workplace,” Supervision, January
                  2.  H. Peterson, “Target  Workers   and T. Purdum, “Preparing for the   as Office E-Mail Jumps Security   2011, 16–22;  T. Harbert, “When
                    Claim  ‘Walk  of  Shame’  That   Worst,”  Industry Week, January   Walls,”  New York  Times  Online,   IT Is Asked to Spy”; D. Searcey,
                    Allegedly Led to a Suicide Is   2003, 53–55.         January 11, 2007.          “Employers  Watching  Workers
                    a  Widespread Practice,” http://   13.  A. Dalton, “Rapid Recovery,” In-   25.  SmartPulse, “How  Well Do   Online Spurs Privacy Debate,”
                    www.businessinsider.com/target-  dustry Week, March 2005, 70–71.  You Give Difficult Feedback?”   Wall Street Journal, April  23,
                    workers-claim-walk-of-shame-   14.  B. Nelson, “Long-Distance Rec-  Smart  Brief on Leadership,   2009, A13; D. Darlin, “Software
                    is-widespread-2015-2, February   ognition,”   Workforce,  August  www.smartbrief.com/leadership,   That Monitors Your Work, Wher-
                    6,  2015; H.  Peterson,  “Target   2000, 50–52.        December 3, 2014.        ever You  Are,”  New York  Times
                    Cashier Jumped to His Death    15.  D.  Auerbach,  “Watch  for  Work-   26.  E. R. Iselin, J. Sands, and L. Mia,   Online, April 12, 2009; S. Boehle,
                    after Managers  Allegedly Sub-  place  Productivity  Killers,”  “Multi-Perspective Performance   “They’re  Watching You,”  Train-
                    jected Him to ‘Walk of Shame,’”   Springfield, Missouri, News-Lead-  Reporting Systems, Continuous   ing (September 2008): 23+; S.
                    http://www.businessinsider.com/  er, July 13, 2014, 1G.  Improvement Systems, and Orga-  Shellenbarger, “Work at Home?
                    mother-blames-target-for-sons-   16.  S. Kerr, “On the Folly of Re-  nizational  Performance,”  Journal   Your Employer May Be Watching
                    suicide-2015-1, January 27, 2015;   warding A, While Hoping for B,”   of General Management (Spring   You,” Wall Street Journal, July 30,
                    and ABC7  News  Staff,  “Lawsuit   Academy of Management Journal   2011): 19–36; L. Elmore, “The   2008, D1+; J. Jusko, “A Watchful
                    Claims Pasadena  Target Em-  (December 1975): 769–83; and   Balanced Business,”  Women in   Eye,” Industry Week, May 7, 2001,
                    ployee Committed Suicide after   N. F. Piercy, D.  W. Cravens, N.   Business, Spring 2011, 14–16; D.   9; “Big Brother Boss,” U.S. News
                    Being Shamed,” http://abc7.com/  Lane, and D. W. Vorhies, “Driv-  Agostino and M. Arnaboldi, “How   and World Report, April 30, 2001,
                    news/lawsuit-pasadena-target-  ing Organizational Citizenship   the BSC Implementation Process   12; and L. Guernsey, “You’ve Got
                    employee-killed-self-after-being-  Behaviors and Salesperson In-  Shapes Its Outcome,”  Interna-  Inappropriate E-Mail,”  New York
                    shamed/488247/,  January  23,  Role Behavior Performance: The   tional Journal of Productivity &   Times, April 5, 2000, C1+.
                    2015.                     Role of Management Control and   Performance Management (Janu-   31.  A. R. Carey and P. Trap, “Wasting
                  3.  B. Hagenbaugh, “State Quarters   Perceived Organizational Sup-  ary 2011): 99–114; R. S. Kaplan   Work Time Online?” USA Today,
                    Extra Leaf Grew Out of Lunch   port,” Journal of the Academy of   and D. P. Norton, “How to Imple-  October 18, 2014, 1A.
                    Break,”  USA Today, January 20,   Marketing Science (Spring 2006):   ment a New Strategy without    32.  “2007 Electronic Monitoring &
                    2006, 1B.                 244–62.                    Disrupting  Your  Organization,”   Surveillance Survey,”  American
                  4.  D. E. Sanger and J. H. Davis,    17.  From the Past to the Present box   Harvard Business Review, March   Management Association,  www
                    “Data Breach Linked to China Ex-  based on H. Min and H. Min,   2006, 100–09; L. Bassi and D.   .amanet.org.
                    poses Millions of Workers,”  New   “Benchmarking the Service Qual-  McMurrer, “Developing Measure-   33.  S.  Armour, “Companies Keep an
                    York Times Online, June 4, 2015.  ity of Fast-Food Restaurant Fran-  ment Systems for Managers in the   Eye on  Workers’ Internet Use,”
                  5.  J. R. Emshwiller, “Managers   chises  in the USA,”  Benchmark-  Knowledge Era,”  Organizational   USA Today, February 21, 2006, 2B.
                    Blamed in Nuclear Leak,”  Wall   ing:  An International Journal   Dynamics, May 2005, 185–96;    34.  B.  White,  “The  New Workplace
                    Street Journal, April 25, 2014, A6.  (April 2011): 282–300; R. Pear,   G. M. J. DeKoning, “Making the   Rules: No Video-Watching,” Wall
                 6. Reuters,  “McDonald’s  Japan  “A.M.A. to Develop Measure of   Balanced Scorecard  Work (Part   Street Journal, March 4, 2008,
                    Apologizes after  Tooth, Plastic   Quality  of Medical  Care,”  New   1),”  Gallup Brain, www.brain   B1+.
                    Found in Food,”  New York Times   York Times  Online, February 21,   .gallup.com (July 8, 2004); G. M.    35.  Ibid.
                    Online, January 7, 2015.  2006; and A. Taylor III, “Double   J.  DeKoning,  “Making  the  Bal-   36.  N. Lugaresi, “Electronic Privacy
                  7.  M.  Murphy  and  S.  Chaudhuri,   Duty,”  Fortune,  March 7,  2005,   anced Scorecard  Work (Part 2),”   in  the Workplace:  Transparency
                    “Carnival to Step Up Maintenance   104–10; C. Bogan and D. Cal-  Gallup Brain, www.brain.gallup   and Responsibility,” Internation-
                    after Mishaps,”  Wall Street Jour-  lahan, “Benchmarking in Rapid   .com (August 12, 2004); K. Gra-  al Review of Law, Computers, &
                    nal, March 16–17, 2013, B3.  Time,”  Industrial  Management,   ham, “Balanced Scorecard,”  New   Technology, July 2010, 163–73;
                  8.  E. A. Harris, “Error Creates Deals   March–April 2001, 28–33; and   Zealand  Management, March   P.-W.  Tam,  E. White,  N. Wing-
                    Too Good to Be True on Walmart’s   L.  D.  McNary,  “Thinking  about   2003, 32–34; K. Ellis, “A Ticket to   field,  and  K. Maher,  “Snooping
                    Site,” New York Times Online, No-  Excellence and Benchmarking,”   Ride: Balanced Scorecard,” Train-  E-Mail by Software Is Now a
                    vember 6, 2013.           Journal for Quality and Participa-  ing (April 2001): 50; and T. Leahy,   Workplace Norm,”  Wall Street
                  9.  C. Timberlake, R. Dudley, and C.   tion (July–August 1994).  “Tailoring the Balanced Score-  Journal, March 9, 2005, B1+;
                    Burritt, “Don’t Even Think about    18.  H. Koontz and R.  W. Bradspies,   card,”  Business Finance, August   D. Hawkins, “Lawsuits Spur
                    Returning This Dress,” Bloomberg   “Managing through Feedforward   2000, 53–56.  Rise in Employee Monitoring,”
                    BusinessWeek, September 30–Oc-  Control,” Business Horizons, June    27.  W. H. Newman,  Constructive   U.S. News & World Report, Au-
                    tober 6, 2013, 29–31.     1972, 25–36.               Control: Design and Use of Con-  gust 13, 2001, 53; and L. Guern-
                 10.  B. Horovitz, “Gross Photo with    19.  M. Helft, “The Human Hands be-  trol Systems (Upper Saddle River,   sey, “You’ve Got Inappropriate
                    Wendy’s Frosty Is Latest to Go   hind the Google Money Machine,”   NJ: Prentice Hall, 1975), 33.  Mail,”  New York Times, April  5,
                    Viral,”  USA  Today, June  14,   New York  Times  Online, June 2,    28.  J.  Yaukey and C. L. Romero,   2000, C1+.
                    2013, 2B; and S. Clifford, “Video   2008.              “Arizona Firm Pays Big for    37.  S.  Armour, “More Companies
                    Prank at Domino’s Taints Brand,”    20.  J.  Yang and S. Music, “Micro-  Workers’  Digital Downloads,”   Keep Track of Workers’ E-Mail,”
                    New York Times Online, April 16,   managing,” USA Today, August 8,   Associated  Press,  Springfield,   USA Today, June 13, 2005, 4B;
                    2009.                     2014, 1B.                  Missouri, News-Leader, May 6,   and E. Bott, “Are You Safe? Pri-
                 11.  SmartPulse, “Where Does the    21.  B. Caulfield, “Shoot to Kill,”   2002, 6B.  vacy Special Report,” PC Comput-
                    Biggest  Threat to  Your Orga-  Forbes, January 7, 2008, 92–96.   29.  Information  on  Hoovers On-  ing, March 2000, 87–88.
                    nizations Come From?” www    22.  T. Laseter and L. Laseter, “See   line,   www.hoovers.com  (June   38.  A. M. Bell and D. M. Smith,
                    .smartbrief.com/leadership, May   for Yourself,”  Strategy+Business,   17, 2011); and N. Shirouzu and   “Theft and Fraud May Be an In-
                    12, 2015.                 www.strategy-business.com (No-  J. Bigness, “7-Eleven Operators   side Job,” Workforce Online, www
                 12.  J. F.  Van Niekerk and R.  Von   vember 29, 2007).  Resist System to Monitor Manag-  .workforce.com (December 3,
                    Solms,  “Information Security    23.  2015 Data Breach Investi-  ers,” Wall Street Journal, June 16,   2000).
                    Culture: A Management Perspec-  gations  Report,  http://www   1997, B1.     39.  C. C. Verschoor, “New Evidence
                    tive,”  Computers & Security,   .verizonenterprise.com/DBIR/    30.  Technology and the Manager’s   of Benefits from Effective Ethics
                    June 2010, 476–86; T. Vinas and   2015/, May 31, 2015.  Job box based on C. A. Ciocchetti,   Systems,” Strategic Finance, May
                    J. Jusko “5  Threats  That Could    24.  B. Grow, K. Epstein, and C.-C.   “The Eavesdropping Employer:   2003, 20–21; and E. Krell, “Will
                    Sink Your  Company,”  Industry   Tschang, “The New E-Spionage   A Twenty-First-Framework  for   Forensic  Accounting Go Main-
                    Week, September 2004, 52–61;   Threat,” Business Week, April 21,   Employee Monitoring,”  Ameri-  stream?” Business Finance, Octo-
                    “Workplace Security: How  Vul-  2008, 32–41; S. Leibs, “Firewall   can Business Law Journal (Sum-  ber 2002, 30–34.
                    nerable Are You?” special section   of Silence,” CFO, April 2008, 31–  mer 2011): 285–369; G. M.    40.  B. Mirza, “Combat Costly Dis-
                    in Wall Street Journal, September   35; J. Pereira, “How Credit-Card   Amsler, H. M. Findley, and E.   crimination, Employee Fraud,
   466   467   468   469   470   471   472   473   474   475   476