Skip to main content

ORIGINAL RESEARCH article

Front. Psychol., 27 December 2016
Sec. Organizational Psychology

The Information and Communication Technology User Role: Implications for the Work Role and Inter-Role Spillover

  • 1Management & Human Resources, University of Wisconsin–Oshkosh, Oshkosh, WI, USA
  • 2Management, California State University (CSU), Fullerton, CA, USA
  • 3Information Systems and Decision Sciences, California State University (CSU), Fullerton, CA, USA
  • 4Management, Drexel University, Philadelphia, PA, USA

Management and organization research has traditionally focused on employees’ work role and the interface between their work and family roles. We suggest that persons assume a third role in modern society that is relevant to work and organizations, namely the Information and Communication Technology User (ICTU) role. Based on role theory and boundary theory, we develop propositions about the characteristics of this role, as well as how ICTU role characteristics are related to boundary spanning activity, inter-role spillover with the work role, and work role performance. To this end, we first conceptualize the ICTU role and its associations with work and family roles. We then apply identity theory and boundary management theory to advance our understanding of how the ICTU role is related to criteria that are important to individuals and to organizations, namely self-selection into certain types of work roles and positive and negative inter-role spillover. The implications of this role for theory, research, and practice in management and organizations are discussed.

Introduction

Information and communication technologies (ICTs) such as smartphones and laptop computers are a part of life in modern society. Many use ICTs for both work and personal purposes (Sproull, 2000). Population surveys indicate that use of personal computers and the Internet at home is increasing (Skinner et al., 2003; File, 2013) and information technology is weaved into daily life from a young age (Willoughby, 2008; Calamaro et al., 2009) and into organizations and organizational processes (Orlikowski and Scott, 2008; Orlikowski, 2010). Many people have access and use ICTs from various places, including home, on the road and work (Xu et al., 2012; Ollier-Malaterre et al., 2013; Tarafdar et al., 2015; Qahri-Saremi and Turel, 2016; Turel, 2016).

Recent research in management and information systems has also focused on the role of ICTs in life in modern society, such as in managing role identity boundaries (Pauleen and Yoong, 2001; Kossek et al., 2006; Golden and Geisler, 2007; Hislop and Axtell, 2011). For instance, Carter and Grover (2015, p. 932) introduced the concept of the information technology identity, defined as “the extent to which an individual views use of an information technology as integral to his or her sense of self,” and have called for more research to understand its relationship with other life identities. Nevertheless, the use of technology has not yet been conceptualized and analyzed as a role in the management and organization literature. This is an important gap to address as conceptualizing information and communication technology user (ICTU) role allows researchers and practitioners to rely on theories and evidence-based knowledge related to individuals’ roles, identities, role salience, and inter-role associations for better understanding how people decide on and interact with ICTs at work and in the personal life domain.

As such, the key over-arching premise of our paper is that many individuals in modern society develop an ICTU role and that acknowledging this role can have important theoretical and practical implications. Specifically, such a conceptualization is essential to understand ICTU role related behavior and how this behavior is related to social structures and processes (Merton, 1957; Katz and Khan, 1978), and may provide a framework for research to better understand the mechanisms through which ICTs impact the way people work and live. ICTs have the potential not only to act as a communication medium, but also to shape social interactions and experiences (Altheide, 1995; Meyrowitz, 1997). The use of ICTs can even create functional (Meshi et al., 2015) and structural (Kanai et al., 2012) changes in people’s brains. ICTs impact individuals’ self-perceptions and self-concept (Orlikowski, 1992), which would suggest that individuals who use ICTs might develop an ICTU role identity based on their interaction with the technology (Reeves and Nass, 1996). Role identities are a key component of a role (Stryker and Burke, 2000).

Understanding role identities is essential to scholarship about roles, role performance, and cross-domain relationships between roles (Greenhaus and Beutell, 1985; Stryker and Burke, 2000). In order to fully understand the effects of the increased prevalence of ICTs on the management of roles, we must explore how individuals identify with and experience ICTs themselves. Recent research focused on the use of ICTs in and out of the work domain shows that the effects of ICT use on individual outcomes such as emotional exhaustion and role conflict vary across individuals (e.g., Derks et al., 2016; Piszczek, 2016). Employees can become stressed when they are threatened by new ICT, when the ICT they have does not meet their needs and desires, and when they cannot access their desired IT (Tarafdar et al., 2015). ICT use is also related to work role performance (Fenner and Renn, 2010) and possibly to collisions of personal and professional identities (Ollier-Malaterre et al., 2013). The ICTU role may help explain variation in the use and experience of ICTs in and out of the workplace.

Drawing on research on the work–family role interface, this article provides first strides toward an integrated treatment of the ICTU role as related to the work role, including positive and negative inter-role spillover with the work role. We first define the ICTU role using role theory and identity theory; we in essence show that the ICTU role exhibits all the characteristics that define a role and we provide preliminary evidence that this role can be salient, at least among some employees. Second, we explain the boundary characteristics of the ICTU role based on concepts from border/boundary management theory. Finally, we integrate these perspectives to develop testable propositions about the ICTU role and its implications for the work role and inter-role spillover. We believe this is important given the paucity of research on how technologies impact boundary management (Golden et al., 2006; Golden and Geisler, 2007; Day et al., 2010; O’Driscoll et al., 2010). Although it would be beyond the scope of the current paper to develop propositions about inter-role spillover with the family role, we see this as an important area for future research.

The Information and Communication Technology User Role

In the social psychology literature, a role is a mental schema of behavioral expectations people assume within a social system (Katz and Khan, 1978). Put differently and perhaps more simply, a role is defined by a set of prescribed behaviors in a given social situation (Jackson, 1965). Through socialization processes of role sending and compliance, people learn the different roles they may play and the expected behaviors, norms, rights, and duties in each role. Role sending consists of offering information and support for some activities, but not others, influencing an individual’s beliefs of what behavior is appropriate in a role, while compliance consists of behaving in the manner perceived as appropriate to that role as determined through role sending (Katz and Khan, 1978; Chiaburu and Harrison, 2008). All of these become part of a mental schema or cognitive framework for understanding a role and prescribed behaviors (Merton, 1957). Individuals enact and alternate between multiple roles over time (Solomon et al., 1985) and sometimes enact multiple roles simultaneously.

Two important roles discussed in the management literature are work and family roles (Greenhaus and Beutell, 1985). In this article, we argue that many persons, including employees in modern organizations, may develop a third pertinent life role, namely the ICTU role. As we explain later, this role is related in important ways to the work role, and can be enacted in various work situations, in parallel to or disjointedly from the work role. We define the ICTU role as the requirements, benefits, and behaviors expected of an ICT user in a given social situation.

That is, persons who use ICTs might assume the ICTU role, and with this they develop an ICTU role identity and are confronted with role expectations that are unique to that role, based on the circumstances of their particular social situation or context at any given time. Some roles, such as that of a sick person (Mechanic and Volkart, 1961) or an ICT user, can be temporary and their expressions will vary according to the situation an individual is in.

Since beliefs regarding ICT-related requirements, benefits and behaviors likely differ from one person to another, people will have an ICTU role which is composed of different components that might be present in their self-schema or identity and may be unique to them. Possible components or manifestations of this role include explicit and implicit attitudes toward ICT, beliefs regarding how fast one needs to respond to messages on their ICT, how psychologically attached they are to their ICT (Turel and Serenko, 2012; Turel et al., 2014), how modern, innovative, “cool” they are with the ICT, how socially e-involved they are, how resilient and self-efficacious they are to new task demands (work or personal) that require the use of ICT, how innovative they are with ICT, what is considered appropriate utilization of the ICT (e.g., is it ok to email a person at midnight? Or make a socially objectionable joke?), can they control the use of ICT and attribution of this control (is it up to them or others), how high is the need for ICT use ranked in their ladder of needs (e.g., is this something they do before eating or instead of having intimate relationships), etc. Note that given the embryonic stage of this conceptualization of the ICTU role, more manifestations and unique facets of this role will likely emerge in the future and the above list is certainly not constant nor is it exhaustive.

These ideas are consistent with key propositions from role theory. Role theory is multidisciplinary and accordingly has multiple conceptualizations (Biddle, 1979, p. 9). Theory and research are clear, however, that a role is defined by role expectations, role identities, and role-related behavior (Biddle, 1979, p. 8). All of these apply to ICT as demonstrated in the next sections. Key propositions from role theory are that: roles are formed when behavior is patterned; individuals are aware of roles and of expectations for these roles (including behavioral norms, expectations of others, etc.); roles persist because of their outcomes or functions (Biddle, 1979). We address each of these aspects of the ICTU role in the sections below. First, we focus on role expectations and role identities. We also consider role boundaries, based largely on boundary theory, which is a more recent advancement in role theory (e.g., Clark, 2000; Golden and Geisler, 2007). Further, we consider the outcomes and functions of the ICTU role as related to the work role and thus inter-role spillover with the work role. We contend that because the ICTU role has these properties, i.e., expectations, identities and role-related outcomes, ICTs can be much more than artifacts that allow one to enact the work role: information and communication technology use, for some, can become a role.

ICTU Role Expectations

Role expectations are a key aspect of any role (Biddle, 1979). Role expectations are defined as “internalized beliefs and attitudes about (a) the personal relevance of a role, (b) the standards for performance in that role, and (c) the manner in which personal resources (i.e., time, money, and energy) are to be committed to performance of that role (Amatea et al., 1986). There is evidence that many individuals identify as ICT users and are aware of norms and expectations around ICT use in different social situations (Sheldon et al., 2011). Based on key tenets of role theory, this suggests that individuals likely develop an ICTU role. Similar to other roles, there are often general social norms and expectations regarding the ICTU role in and out of organizations (D’Arcy et al., 2009). Through the role sending process, which can occur at different levels of analysis, such as from the organization to the individual or between individuals, these expectations are signaled to ICT users (Anderson et al., 1993). For example, an ICT user must know when ICT use is socially inappropriate, such when conversing with colleagues (Turel and Bechara, 2016). There are norms and expectations regarding specific task–technology combinations such as cell phone use (Judes and Stevens, 2007), Internet use (Whitty and Carr, 2006), and appropriate behaviors in online communities (De Cindio et al., 2003) that apply across nearly all aspects of ICT use. Role expectations are also created by organizations (Lapointe and Rivard, 2005; Barki et al., 2008). ICT use demands and duties are common in many organizations that enforce the use of certain systems (Hartwick and Barki, 1994). For example, hospitals can have technology use norms and expectations such as use of charting software or pagers (Berner et al., 2005; Scott et al., 2005). More generally, many employees experience organizational expectations to use technology to work from home and may suffer workplace consequences when compliance with these role expectations is low (Fenner and Renn, 2010). Research based on role theory has documented role expectations are related to the role stressors, such as inter-role conflict, and to psychological and/or physical strain (e.g., Cooke and Rousseau, 1984). As such, ICT use norms, implicit or implicit, can drive work-family conflict (Turel et al., 2011a) and technology related stress (D’Arcy et al., 2014).

The ICTU Role and Other Life Roles

We argue that the management and organization literature can benefit from understanding the ICTU role and its interactions with the work role. While we later focus on the interaction of the ICTU role with the work role, considering the intersection between the ICTU and family roles is informative to our arguments and important for developing an understanding of how ICTU and work roles are related. Figure 1 depicts an integrated view that amalgamates these three key life roles and visualizes how the ICTU role interacts with work and family roles.

FIGURE 1
www.frontiersin.org

FIGURE 1. Life roles in modern society.

Figure 1 demonstrates how the ICTU role may overlap with other life roles, and that it has its own life domain as well. The literature on the work-family interface (e.g., Frone et al., 1992; Adams et al., 1996; Heller and Watson, 2005) has focused on area 2. This literature is informative in demonstrating characteristics of the work role boundary and how the work role interacts with other roles. For example, not only can an employee’s mood at work, as affected by the family role, influence job performance, but also job-related phenomena can influence one’s family domain (Carlson et al., 2011). Though it is becoming an increasingly popular area of research, fewer studies have sought to explore the role of technology in this interface; i.e., focused on area 5 (the intersection of work, family, and ICTU roles). Such studies focus mostly on organizational ICT that is used in the family domain (e.g., Golden and Geisler, 2007; Hislop and Axtell, 2011) and rarely on personal technology, such as social media, which is used in the work domain (Ollier-Malaterre et al., 2013) and do not conceptualize technology from a role identity framework. It is important to understand how work pressures are related to ICT use and the ICTU role because employers can require employees to use technology for work purposes off-site (Jacobs and Gerson, 1998). Thus, area 5 potentially encompasses a complex set of triadic influences, which is largely underexplored and beyond the scope of this work.

Areas 4, 6, and 7 have been covered to some extent in the literature. Area 6 represents the intersection of the ICTU role with the family role. These situations can involve physical or psychological interactions with an ICT during family time; or alternatively, family related tasks or thoughts invoked while or instead of physically or psychologically interacting with an ICT. Similarly, area 7 covers the ICT technology user role itself and its behaviors, separate from family and work roles (e.g., while driving, meeting friends, or being away from one’s family) (Bhattacherjee, 2001; Choi and Kim, 2004; Barnett and Coulson, 2010). Persons can still, though, assume this role while at work or with their families or when alone (away from work and their families). It involves the use of ICT for mostly hedonic purposes which are intrinsically rewarding and can require the immersion of the ICTU user in ICT matters, such as solving a technology or installation problem, downloading an app or content which have nothing to do with work or family life (e.g., fitness tracking, games, music, e-books, news) or simply engaging in intrinsically rewarding activities that do not contribute or influence family and work life, such as playing videogames or reading news after all family members have fallen asleep. Assuming this role, for instance, during work time can be, for example, in the form of taking a break from work and using one’s Facebook account to see what his or her friends have been up to.

While areas 6 and 7 (family–ICT intersection, and ICT domains) do not directly relate to the work role, there still may be a spillover from these areas to the working environment. For instance, the use of ICTs in these roles can elicit both positive and negative emotions (Deng and Poole, 2010) as well as influencing sleep patterns (Thomée et al., 2012), which in turn, can influence the work role (Carlson et al., 2011). For example, a person who uses a tablet before going to bed, e.g., just to check the news (area 7) may, by doing so, suppress the release of melatonin, a hormone signaling the body on sleep onset (Wood et al., 2013) and consequently may underperform in the work role due to sleep deprivation (Barnes and Spreitzer, 2015). Such processes are largely understudied, especially among working adults, and merit further research (Tarafdar et al., 2013).

Area 4 covers the interplay between the technology and work domains, which is the focus of this article. The area of work-ICT interaction has been studied quite extensively, but without considering the ICTU role, its characteristics, and its integration with other roles. For example, the fit between ICTs and tasks can influence job performance (Dennis et al., 2008) and ICTs can facilitate online collaboration and virtual team processes and outcomes (Majchrzak et al., 2000; Maznevski and Chudoba, 2000; Colquitt et al., 2002; Martins et al., 2004; Schiller and Mandviwalla, 2007). Research related to the integration of the ICTU and work domains is arguably lacking (Orlikowski and Scott, 2008; Orlikowski, 2010).

ICTU Role Identity and Identity Salience

Role identity is a composition of meaning that individuals apply to the roles that they occupy (Stryker and Burke, 2000). Role identity is defined as “the meanings people attribute to themselves while in a role” (Stets, 2010). The concept of a role identity is based on a symbolic interactionist perspective rooted in Mead (1934), whose work can be summarized as: society shapes self, which shapes social behavior. In other words, social structures shape how individuals view themselves and how they behave socially (Stryker, 1980). A salient role identity is “conceptualized as being positioned at the top of the [identity] hierarchy” (Callero, 1985, p. 203). In other words, it is defined by how important that identity is to an individual as compared to other identities (Stryker and Serpe, 1982), and has been operationalized as one’s dedication to a role in terms of investing in the role (e.g., Amatea et al., 1986), or “the likelihood that the identity will be invoked in diverse situations” (Hogg et al., 1995, p. 257). In other words, for any given role, for example the work role, individuals will develop an identity or set of meanings associated with that role; that role identity will vary in its salience or importance within the individual vis-a-vis other role identities. For instance, for some individuals their work role identity is more salient than their family role identity (and vice versa for other individuals). In this case, individuals will be more dedicated to the work role, and the work role identity will be more likely to be invoked across different situations. Role identity salience is determined, in part, by the number of relational ties supported by the role and the perceived importance of these ties to the individual (Stryker and Serpe, 1994; Stryker and Burke, 2000).

There is evidence that ICT use can shape an individual’s self-concept, that individuals develop their own sense of how to behave vis-a-vis ICTs and that they develop an identity around the ICTU role (Venkatesh and Morris, 2000; Cyr et al., 2009), all of which would support the over-arching existence of the ICTU role (Biddle, 1979). We acknowledge that not everyone interacts with ICTs, and thus some people may not develop an ICTU role. That said, most adults generally have moderate to extensive exposure to the use of ICTs, at home, work, or both (File, 2013). Notably, those who are familiar with ICTs in society but do not use them still form an ICTU role identity, but they may identify as non-users or incapable users.

Management and information systems research indirectly supports the existence of the ICTU role and consequently of an ICTU role identity (Carter and Grover, 2015). ICT users develop role identities based on their IT role affiliations, e.g., as an organizational user or as a service provider (Gefen and Ridings, 2003), including beliefs about technology skills, opportunities and constraints to use technology, the importance of technology, and motivation to use technology (Goode, 2010). Human-technology interaction research delineates the role of a technology user as an important role (Carter and Grover, 2015) that can become incorporated into users’ daily experiences and actually change perceptions of self-identity and shape interactions with others (Schlosser, 2002). For example, updating one’s Facebook profile can influence one’s impressions of the self (Gonzales and Hancock, 2011) and be driven by social norms, expectations and rules regarding what is acceptable behavior (Lowry et al., 2011). Such ICT use can be fulfilling on its own and be driven by pure intrinsic gains (Davis et al., 1992). Research has also shown that ICT use is related to self-esteem (Gonzales and Hancock, 2011) and to social self-concept (Gil-Or et al., 2015). ICTs can change the way individuals interact with others, the way they respond to stress, and can even affect their brain structures (Kuehn et al., 2011, 2014; Kuehn and Gallinat, 2014). Once a role identity is established, the salience of that role vis-a-vis other life roles becomes defined, and awareness of the subjectively perceived centrality of this role is formed.

The management information systems literature supports variation in ICTU role salience. Individuals vary in the extent to which ICTs are important to them (Limayem et al., 2007), the extent to which they want to interact with ICTs (Compeau and Higgins, 1995), and their interest in engaging with ICTs in new and different ways (Agarwal and Prasad, 1998), all of which would suggest that individuals might attribute varying levels of importance and centrality to their ICTU role identity (e.g., Gefen and Ridings, 2003; Turel et al., 2011a). This literature further implies that interpersonal differences in ICTU identity can be rooted in individual differences in innovativeness (Yi et al., 2006), computer self-efficacy (Marakas et al., 2007), beliefs and perceptions regarding technologies (Venkatesh, 2000), social pressures to use technologies (Titah and Barki, 2009), impression management (Turel et al., 2010), and adherence to ICT related policies (Warkentin et al., 2011).

Generally, we do not expect the ICTU role to be more salient than major life roles such as work and family. However, in extreme cases a person may place the ICTU role high in the role salience hierarchy (Turel et al., 2011b) and at times become cognitively absorbed in ICT use (Saade and Bahli, 2005; Lin, 2009) to the point that this role overrides other life roles in terms of salience (Charlton and Danforth, 2007). This can lead to addiction-like symptoms among ICT users (American Psychiatric Association, 2013) which means that in some cases the ICTU role may dominate other life roles more fully (Kuss et al., 2013). Recent neuroscience evidence suggests that the use of ICTs can reinforce incentive rewards, making the ICTU role central to one’s identity, i.e., a higher ICTU identity salience (Meshi et al., 2013).

ICTU Role Boundaries

As part of the sociocognitive role formation process, individuals form mental role boundaries between roles in the mind. Role boundaries cognitively constructed heuristic perimeters around a role that determine their scope, typically in terms of time or space (Ashforth et al., 2000). These boundaries vary in terms of flexibility and permeability. The ability of ICTs to be used as tools to enact roles across domains (e.g., answering work e-mails while at home) is related to its fairly unique role boundary permeability and flexibility. The permeability of a role boundary is the extent to which the boundary allows thoughts, behaviors, attitudes, or emotions associated with another role to enter (e.g., Ashforth et al., 2000; Clark, 2000). Boundary flexibility is the degree to which a role can be enacted outside of typical or prescribed spatial and temporal boundaries of the role (Ashforth et al., 2000; Clark, 2000). The ICTU role is highly flexible and permeable and therefore can be engaged in many locations and at any time because of the mobility of ICTs. Because of this, enactment of the ICTU role may overlap in time and space with the enactment of other roles. For example, checking one’s social media accounts at work may engage the ICTU role in the physical and temporal space of the work domain. This rapid transition between roles can lead to the blurring of the ICTU role with other roles and to inter-role influences (Turel et al., 2011a).

The ICTU role boundary is flexible and permeable in relation to the work role because it regularly expands to accommodate work-related behavior. For instance, if an individual receives a work-related call while commuting on a train to work, the ICTU role becomes activated, but the individual has some choice in terms of whether to take the call or not. This is important, in part, because it implies that individuals can choose, with varying degrees of freedom, depending on certain circumstances and constraints, the extent to which ICTs are utilized across situations, including at work. This choice can be to holistically adapt ICT use beyond its original intent, e.g., from the social domain to the work domain (Ashforth et al., 2014). As with other roles, engagement of materials or tools that are related to a particular role is unnecessary for a role identity to be activated. For instance, one does not need to be caring for a child for the family role to be activated, nor does ICT use need to occur for the ICTU role to be active. Some ICT users report anxiety called “fear of missing out” when ICTs are not readily accessible (Przybylski et al., 2013). That said, the use of materials and tools related to a role can, of course, activate that role psychologically and behaviorally and the permeability and flexibility of ICT boundaries make this particularly likely for the ICTU role.

Another important factor relating to role boundaries is the desired levels of role segmentation or integration with other roles. According to boundary theory and related research (Nippert-Eng, 1996; Ashforth et al., 2000) individuals vary in their general preference to integrate or segment roles, i.e., to simultaneously or disparately enact roles, respectively. Roles that are permeable and flexible are easier to integrate because their boundaries expand to encompass behaviors associated with other roles. The high degrees of role boundary flexibility and permeability may make the ICTU role seem relatively nebulous as compared to other roles, namely work and family roles, especially because ICTs can be used to enact these roles (e.g., to call a family member). That said, cognitive sociological theory argues that individuals form role boundaries around people, places, things, and ideas by “lumping” together those that occur together and “splitting” those that do not (Zerubavel, 1993). If ICT use appears across multiple domains, individuals will be less likely to associate ICTs with another life domain and instead form boundaries around the ICTU role itself. Consistent with arguments above, the more domains ICT use appears in, the more social ties it generates and the less likely a person will lump ICTs into another role domain. As a result, as ICT use becomes more ubiquitous in society individuals will be more likely to form a discrete ICTU role. We argue that, into the future as ICT use becomes more prevalent, individuals will, in general, be more likely to recognize the ICTU role as a distinct and important life role.

Now that we have established the concept of, and potential value of, the notion of an ICTU role, its attributes and its interface with other life roles studied in the management and organization literature, we further leverage theory to develop the concept of this role in terms of its implications for work role-related behavior. We develop propositions about the ICTU role and its characteristics; role boundaries and the ICTU role; and inter-role spillover between the ICTU role and the work role. These propositions are illustrated in Figure 2.

FIGURE 2
www.frontiersin.org

FIGURE 2. Conceptual model of ICT and work role interactions.

Implications for Inter-Role Spillover with Work

Now that we have established the concept and potential value of the ICTU role, we further leverage concepts explained above from identity theory, boundary theory, and spillover theory to develop the concept of the ICTU role in terms of its implications for work role-related behavior. We develop propositions about the ICTU role and its characteristics; role boundaries and the ICTU role; and inter-role spillover between the ICTU role and the work role. These propositions are illustrated in Figure 1.

Role Characteristics and ICTU Role Behavior

Role Identity Salience

As noted above, role identity salience is related to the felt importance of a particular role identity, as well as involvement and commitment in a role (Amatea et al., 1986). Different identities vary in their salience within individuals. The salience of each is hierarchically ordered within individuals. Some individuals will feel that the use of ICTs is important to them to the extent it represents an important aspect of who they are and be more committed to the ICTU role and role-related behaviors, such as ICT use.

When an identity is more salient, it is more likely to be considered, diffused into and enacted across situations and social interactions (Stryker, 1968; Burke and Reitzes, 1981). Consequently, more social ties or stronger social ties across other roles facilitated by ICT use should be associated with a greater distinction between the ICTU role and other life roles, thus increasing its salience in the mind of the individual (Utz, 2010). Identities are more salient when sacrificing the identity means sacrificing social relationships, especially those that are important to the individual (Stryker, 1968). In other words, salience is higher when the number or the intensity of dependent relationships is relatively high for a given identity. Identity salience is important because it predicts the likelihood that an individual will behave in a way that is consistent with that identity (Wiley, 1991). The larger the number of persons an individual perceives he or she is connected to because of his or her ICTU role, or the more important those individuals are to the individual, the more salient the role identity will be.

Proposition 1: (a) The number of one’s network ties via the ICTU role is positively related to one’s ICTU role salience, and (b) the importance of these network ties to the individual is positively related to ICTU role salience.

Role Boundary Characteristics and the ICTU Role

Because a key characteristic of the ICTU role is its highly flexible and permeable boundaries, there can be significant individual variation in its enactment across other role domains. For example, individuals who prefer role integration may be more willing to perform work outside the typical work role domain using ICTs (Ollier-Malaterre et al., 2013). Role boundary flexibility and permeability are associated with role integration and blurred role boundaries and facilitate the enactment of the ICTU and work roles that allow or require ICT use (Ashforth et al., 2000).

Role identity salience may help explain when and why individuals engage in optional ICTU role enactment. When a role identity is more salient, role-relevant behavior is more likely (Wiley, 1991); individuals seek to act in ways that confirm their role identities (Stryker, 1980). Because work roles can often facilitate ICT use, we propose that role salience is an important predictor of the extent to which individuals attempt to find overlap or consistencies between the ICTU role and work role. This proposition is based on the person-job fit literature, which suggests that individuals are attracted to jobs that expect behavior consistent with their individual characteristics and preferences (Edwards, 1991). As such, individuals with a relatively salient ICTU identity should be more likely to search for and engage in work roles consistent with their ICTU identity. For instance, an individual with a relatively high ICTU role salience will be more likely to seek work that requires the use of ICTs for work-related purposes. This is consistent with research on role theory, which has shown that a more salient role identity for a given role is related to more activity in that role as compared to other roles (e.g., Greenhaus and Powell, 2003). This is also consistent with research on applicant attraction and job choice, which has consistently shown that perceived fit with the work role is related to attraction and, hence, to job choice (e.g., Chapman et al., 2005). That said, we would suggest that role identity salience is only one among perhaps many factors in self-selecting into work roles with varying levels of ICT use and to ICT use in the work role.

Occupying a work role with high ICT use expectations is not necessary to enact the ICTU role. Individuals with salient ICTU role identities are also more likely to use ICTs as a substantive means of communication, even in a work role that does not require it or that facilitates other means of communication (Guo et al., 2010). In other words, those with high ICTU role salience generally choose to use ICTs to facilitate work when possible, even when other circumstances do not allow them to self-select into a work role that requires heavy ICT use. For example, some students are more inclined than others to engage in ICT-mediated learning (Liang et al., 2011) and employees may innovate with ICT to avoid manual work (Hopkins and Brynjolfsson, 2010). Although this is, in part, a function of certain individual differences, preferences and experiences (see Fenner and Renn, 2004, 2010), we suggest that this is also a function of ICTU role salience.

Proposition 2: Information and Communication Technology User role salience is positively related to (a) self-selecting into work roles with high ICT use expectations, as well as (b) using ICTs in the work role.

Inter-Role Spillover between the ICTU Role and the Work Role

To develop propositions about spillover between the ICTU and work roles, we draw upon research on spillover between the work and family roles. Research on work and family roles and their intersection has been influenced greatly by a spillover perspective (Geurts and Demerouti, 2002), which suggests that what happens in one role has implications for and can affect what happens in another. The literature has focused on two types of spillover: negative spillover and positive spillover. The literature has focused largely on the former and has therefor defined inter-role spillover as “a within-person, across-domains transition of strain from one area of life to another” (Bakker and Demerouti, 2013). That said, spillover can be either negative or positive, and thus involve spillover of not only conflict but also enrichment. Negative spillover—or inter-role conflict—between roles, is defined as “pressures arising from one role are incompatible with pressures arising in another role” (Greenhaus and Beutell, 1985). Inter-role conflict occurs between two roles when meeting the demands of one role makes it more difficult to meet the demands of the other role (Greenhaus and Beutell, 1985). Positive spillover—also known as enrichment—between roles is defined as “the extent to which experiences in one role improve the quality of life in the other role” (Greenhaus and Powell, 2006).

A seminal paper by Greenhaus and Beutell (1985) proposed three types of inter-role conflict or negative spillover (specific to work and family): behavior-, time-, and strain-based, each of which has been studied and supported in the literature. Behavior-based conflict occurs when behaviors expected in one role are inconsistent with behaviors expected in a different role. Time-based inter-role conflict occurs when time required or spent in one role detracts from time necessary to perform another role. Strain-based inter-role conflict occurs when one role causes psychological strain, which spills over into another role, affecting the latter role in an adverse way (e.g., role satisfaction or performance). This perspective has occupied much of the literature on work-family conflict and meta-analyses of work-family conflict tend to leverage this perspective (e.g., Michel et al., 2010).

We expect that inter-role spillover also occurs between the ICTU and work roles. While we expect this influence to be bidirectional, we focus on spillover from the ICTU role to the work role because it demonstrates how the ICTU role can have important implications for the workplace. We identify several factors that affect how employees experience their ICTU and work roles and the intersections between these roles in terms of both positive and negative spillover: the degree to which the work role and the ICTU role are inconsistent, an individual’s preference to integrate the ICTU role into the work role, and ICTU role salience. We propose that individuals can experience both positive and negative spillover between the ICTU role and the work role depending on the level of consistency and inconsistency in these roles, respectively. That is, when work role expectations around the use of ICTs are consistent with one’s preferred level of use based on their ICTU role identity salience, positive spillover is more likely to occur. When work role expectations are inconsistent with one’s preferred level of use based on their ICTU role identity salience, then negative spillover is more likely. We also expect that boundary management strategies are important such that there are differences between segmenters and integrators when it comes to how inconsistencies between roles are related to negative inter-role spillover. These broad propositions are developed and explained in more detail below in terms of more specific, testable propositions.

Negative Inter-Role Spillover

We argue above that those with highly salient ICTU role identities will seek to enact this role by seeking work that allows ICT use and will be more likely to use ICTs for work. But what happens if, for instance, such a person ends up in a work role that does not facilitate the enactment of ICTU role behaviors? The degree to which the ICTU role can be integrated into the work role will depend on the match between an individual’s ICTU identity salience and work role expectations. Both Ashforth et al. (2000) and Clark (2000) propose that the similarity between roles is related to spillover between them. For some individuals, the ICTU role and the work role may be very similar and easily integrated. This is the case, for instance, when one’s ICTU role is highly salient and the work role requires a high degree of ICT use. For others, the roles may be very dissimilar, requiring different types of behaviors, and are thus less easily integrated. This is likely the case for individuals whose ICTU identity salience is relatively low but whose work role requires extensive use of ICTs. If an individual’s ICTU role identity is relatively more (less) salient, then the proscribed (prescribed) use of technology for work purposes may cause behavior- and strain-based conflict between the ICTU role and the work role. Behavior-based conflict may occur because expected ICT use behavior in the work role is inconsistent with the ICTU role. Strain-based conflict may occur because the individual is relatively unable to behave in a way that is consistent with a role that is important to the individual, in this case the work role.

For instance, an individual with low ICTU role salience attributes little importance to the ICTU role, does not view the role as a central part of the self-concept, and may prefer not to communicate via ICTs. If an individual with low ICTU role salience is in a job with high ICT use expectations (e.g., to communicate via instant messaging) he or she is likely to experience behavior- and strain-based conflict between the two roles because the behaviors expected by the work role are inconsistent with the individual’s ICTU role identity. Relative to individuals who have a salient ICTU identity, this will tend to cause stress for this worker because use of information and communication technologies is uncomfortable. This is consistent with the work-family literature: role demands are more strongly related to negative spillover or inter-role conflict when role identity salience is higher (Greenhaus and Beutell, 1985). The greater the differences between one’s work role expectations and ICTU identity salience, the more likely the individual will experience behavior- and strain based inter-role conflict. In other words:

Proposition 3: Information and communication technology use in the work role is positively related to negative spillover between the ICTU role and work role for persons with a less salient ICTU role identity, and is negatively related to negative spillover between the ICTU role and work role for persons with a more salient ICTU role identity.

Even if a person’s ICTU role salience and work role are consistent with each other, a person might not desire to integrate them. As Clark (2000) asserts, there is no ideal state in terms of segmentation vs. integration of roles: the effect on the individual depends on his or her desire for segmentation or integration, and well-being can be achieved through either approach. Research has shown that a consistency between an individual’s preference for segmentation or integration of work and family roles, for instance, and actual segmentation or integration is related to higher job and family satisfaction and less depression and stress (e.g., higher job and family satisfaction, lower depression and stress, Edwards and Rothbard, 1999; Kreiner et al., 2009).

Likewise, we expect that a consistency (inconsistency) between an individual’s preferred boundary management strategy and one’s expected or prescribed level of work role ICT use is related to relatively lower (higher) inter-role conflict (holding salience constant). ICTs can be used in a variety of ways, i.e., mostly for work, mostly for non-work, or in a more integrated fashion (Golden and Geisler, 2007), and individuals vary according to their preferences in this sense. It is important to understand the extent to which an individual’s work role is consistent with his or her preferences for boundary management with the ICTU role. Individuals who prefer to segment (integrate) ICTU and work roles will find a particular work role more stressful when it prescribes a high (low) level of the use of ICTs. Consistency between work role requirements in terms of ICT use and an individual’s preference for segmentation or integration of the ICTU and work roles will therefore be negatively related to behavior-based inter-role conflict.

Proposition 4: Information and communication technology use in the work role is positively related to behavior-based negative spillover between the ICTU role and the work role for those who prefer to segment the ICTU role from the work role, and is negatively related to behavior-based negative spillover between the ICTU role and the work role for those who prefer to integrate the ICTU role with the work role.

Positive Inter-Role Spillover

In contrast to a resource scarcity perspective, which suggests that negative spillover occurs because different roles compete for the same resources, a role accumulation perspective suggests that occupying multiple roles is related to an increase in rewards and resources (Sieber, 1974). As with other roles, the ICTU role can be related to certain rewards (e.g., self-esteem), resources (e.g., valuable skills), and demands (e.g., attending to electronic notifications). What is perhaps particularly interesting about the ICTU role is that resources allocated to this role, such as time, do not necessarily detract from resources devoted to other life roles, such as work, as is usually found with work and family roles because individuals regularly engage with technology to get tasks done in other roles, such as the work role (Dennis et al., 2008). In other words, due to its flexible and permeable boundaries, the ICTU role can potentially facilitate the enactment of other roles.

If identity salience is related to investment in a role, then ICTU role salience should be related to motivation around use of ICTs, which can potentially facilitate the completion of certain work tasks. This would suggest that successful task performance via ICTs may be influenced by the way in which the person engages psychologically with the technology as a relatively more (or less) important aspect of self, that is, their ICTU role identity. Whereas dissatisfaction with one role may normally cause persons to seek satisfaction from other life roles (Champoux, 1978), satisfaction with the ICTU role may be related to increased satisfaction with the work role. We accordingly expect that positive spillover, e.g., positive emotions or moods, will occur when engaged in work roles that can be facilitated by the use of ICTs for individuals with a relatively salient ICTU identity. Whereas before we argued that inconsistency between roles creates negative spillover, here we argue that consistency between roles creates positive spillover.

Proposition 5: The relationship between ICT use in the work role and positive inter-role spillover between the ICTU role and the work role is positive for persons whose ICTU role identity is relatively high in salience and negative for persons whose ICTU role identity is relatively low in salience.

Discussion

Information and communication technologies have the power to diminish boundaries between persons and groups of persons, as well as between physical and social environments (Meyrowitz, 1997). Cerulo (1997) contends that the ability to reproduce and share internal thoughts and experiences with others via ICTs changes the human experience and social interactions, and that more social-scientific research is needed to understand the impact of technology on the self, behavior, and social interaction. This was a major purpose of this paper: to understand the impact of technology not only on behavior such as the use of ICTs in the work role, but also on identity itself and how it relates to both psychological (i.e., inter-role conflict) and behavioral (i.e., self-selection into work roles) outcomes. Role behavior is sometimes difficult to predict, in part, because the self is complex and differentiated based on multiple role identities (Stets and Harrod, 2004; Riketta and Nienaber, 2007) and because technology can contribute to a more differentiated sense of self (Evans, 1995) and help in enacting other roles. Individuals in modern society occupy a number of roles which, of course, makes for an interesting if not complicated self and way of life, perhaps especially for working persons facing multiple and varied demands, sometimes conflicting, from multiple life roles (Williams et al., 1991).

Implications for Theory and Research

The ICTU Role

An overarching assertion developed in this article is that individuals often occupy a role of ICT user (ICTU) to some degree, which can become an important aspect of the self with the potential to impact, both positively and negatively, other life roles, and particularly the work role (Ahuja et al., 2007; Innstrand et al., 2008). The ICTU role identity varies in salience across individuals. Unfortunately, the ICTU role has not yet received significant attention in the management and organization literature, although it has been implied that people develop role identities related to their ICT use preferences and affiliations. Identifying and investigating this role is important, we argue, because doing so has implications for our understanding of the work role, inter-role spillover, and ultimately work role performance. It also allows researchers to conceptualize and study the interaction between the use of ICTs and work related outcomes from a role theory perspective. This is valuable because role theory is useful for understanding organizational behaviors and processes (Reichers, 1985; Eagly et al., 1995; Singh, 2000), and we argue, also the way individuals interact with technologies at work.

ICTU Role Identity and Identity Salience

This article developed the concept of an ICTU role identity and leveraged identity theory (Stryker and Burke, 2000) and boundary theory (Nippert-Eng, 1996; Ashforth et al., 2000) to explain the development of the role identity and its likely role characteristics. We argued that individuals develop an identity as an ICT user based not only on ICT use, but on interactions with others while engaged in the ICTU role as well as the reactions of others, their expectations for role behavior, and the individual’s internalization of these reactions and expectations. The ICTU role identity becomes more salient due to social circumstances as well: the number and strength of one’s network ties associated with the ICTU role will increase the salience of the role. Today, this likely happens over the life course as individuals are bombarded with ICTs from a young age (Sproull, 2000; Calamaro et al., 2009). These propositions suggest that one’s social context helps to shape one’s role identity salience, which is consistent with the broader literature on role identities (Wiley, 1991; Zerubavel, 1993, 1996), which we hope has laid the groundwork for scholars to further understand the ways in which one’s social environment might shape the ICTU role and role related behavior. For instance, it might be helpful to understand how coworker role expectations about ICTs are related to individuals’ use of ICTs in the work role and how this is influenced by one’s ICTU role identity salience. It would also be useful to study if enactment of the ICTU role identity could trigger enactment of other life roles, such as the work role.

It is important to understand the salience of the ICTU role, in part, because of its implications for the work role. Based on an integration of perspectives from identity theory and boundary theory, we proposed that ICTU role salience is related to self-selection into work roles that involve use of ICTs, as well as the use of ICTs in the work role more generally. While there is no direct evidence in support of this proposition, as the ICTU role is a new concept, it is reasonable to expect so based on the stress (Lazarus and Folkman, 1984) and technology-related stress (Tarafdar et al., 2015) literatures. Both streams suggest, for example, that when a person has too many ICT demands which presumably do not match their ICTU role salience (stressors), they will cope with such stressors through various maladaptive coping strategies such as avoidance (not selecting a job), disengagement (avoiding ICT use on the job) or more adaptive strategies, such as adjusting ICTU role salience, for instance through taking ICT courses. ICTU role salience can affect primary appraisals of ICT stressors (e.g., new ICT may be more stressful for employees with low ICTU role salience) as well as secondary appraisals relating to one’s ability to cope with the stressors (e.g., the perceived ability may be lower for employees with low ICTU role salience). Recent research also finds that ICTs can be a job resource and thus help reduce stress when it grants employees control over their role boundaries (Piszczek, 2016). This research also suggests that the ability of employees to draw boundary control from ICTs depends on individual characteristics such as ICTU role salience. This also suggests that for some individuals, the inability to use ICTs (e.g., if one’s smartphone breaks or the organization adopts a policy prohibiting after-work e-mails) may be particularly difficult. As such, the magnitude of stress reactions resulting from the ICTU role and its management likely vary substantially across individuals.

These appraisals, as influenced by ICTU role salience, can lead to employment choices as a means to cope with the ICT-related stressors in one’s environment. While ICTU role salience may not always elicit an extreme reaction such as self-selection into a job, is likely to have many practical organizations implications. An individual with low ICTU role salience may, for example, be less responsive to e-mail communications in general if they prefer to communicate in person. Such individuals may not respond to work communications at all outside of the workplace because they are not likely to be engaged in ICT use. Such proposition illustrates the potential relevance of ICT role salience, though, validating them requires further research.

The functional and adaptive uses of ICTs in work roles are increasingly important across a variety of jobs and occupations (Nolan and McFarlan, 2005; Harris et al., 2013; Raviola and Norback, 2013). Thus it is important to be able to understand the characteristics of individuals that predict such use beyond more general attitudes toward technology; ICTU role salience is such a factor that can be assessed by employers. This has implications for the literatures on person-environment fit, personnel selection, and performance management. We believe it will be increasingly important for management and organization scholars to understand and leverage the features of the ICTU role when developing theory about the ways in which individuals are best suited to their jobs, how performance in rapidly changing work roles can be most effectively managed, and how technology can be most effectively integrated into various work roles.

Boundary Management

We further proposed that boundary management strategies explain the relationship between work-role ICT use and negative spillover between the ICTU and work roles. We know that individuals vary in their preferences for engaging with ICTs in general and in the work role (e.g., Turel and Serenko, 2012). Differences in such preferences may be related to differences in attitudes towards different types of roles. We suggest a key to understanding how effective ICTs are across different persons in work roles is their ICTU identity and how their ICTU identity might be expressed at work based on boundary management preferences. To be sure, even if a particular individual has a salient ICTU role identity, this same individual may want to keep this part of the ICTU role relatively separate or segmented from work. We feel this is an important contribution, in part, because of the lack of research on how technologies are related to boundary management (Golden and Geisler, 2007). This would be exemplified by two persons who, for instance, are connected to many of their friends and family through technology, who have relatively salient ICTU identities and consider themselves avid information and communication technology users, and who may even be so “techy” that they help friends and family with technology problems. Yet, one individual prefers to keep this identity separate from the work role (e.g., not talking about this part of oneself much) and the other prefers to fully integrate this with the work role (e.g., bringing this up at work and trying to excel through his or her ICT expertise).

Inter-Role Spillover

Information and Communication Technology User role experiences—expectations, demands and so on—can crossover to other life roles in both negative and positive ways. Based on a role accumulation perspective (Sieber, 1974) and consistent with research on work-family enrichment (Greenhaus and Powell, 2006), we proposed that work role ICT use and ICTU role salience are relevant simultaneously as to positive inter-role spillover such that consistency between work role ICT use and ICTU role salience is related to positive spillover between roles. In this sense, experiences in the ICTU role can enrich experiences in the work role. If persons’ ICTU role is a central aspect of their identity, they will be more likely to have positive experiences with ICTs in the work role, e.g., they might be quicker and/or more successful in adapting to the implementation of new information technologies in a given work role. This is an important conceptual integration of propositions from the literatures on identity and positive inter-role spillover, and we hope that future research will consider how consistency between individuals’ work roles and their ICTU identities is related to positive implications for the work role, such as job performance.

Organizational Context

Individuals seek to behave in a way that is consistent with their role expectations and the norms of the group within which they are embedded (Swann et al., 1992). Cerulo et al. (1992) suggest that communication technologies are relevant for collective identities, in the sense that they can create a sense of community or unity among persons. Organizational context can be an important higher-level determinant of employee attitudes, behaviors, and outcomes (Oldham and Cummings, 1996; Somers, 2001; Korsgaard et al., 2002). It can also be a source for self-identity formation (Hogg and Terry, 2000) through self-verification processes (Swann et al., 1992). We therefore expect that when organizational contexts involve and support ICT use, self-verification of ICTU roles will be enhanced, and employees will behave more consistently with the ICTU role as a means to self-verify their ICTU and work identities. This is important because improper use of ICTs in organizations is growing (D’Arcy and Hovav, 2009; Tarafdar et al., 2015), and this problem can be tackled through architecting and reinforcing desired ICTU roles through organizational contexts. Thus, organizational context can serve as a boundary condition for forming, maintaining, and re-shaping ICTU identities. One key area for future research is the function of organizational context in the development and enactment of the ICTU role.

Overall, more research, conceptual and empirical, should be conducted to better understand how the ICTU role is related to the work role. Such studies can also inform related research on work and family roles. Further research should examine the nature of the ICTU role itself as well as the potentially complex, yet important, set of interactions among family, ICTU, and work roles. Given the growing prevalence, and presumed salience of the ICT role (Turel and Serenko, 2010), such research can help us better understand and find means to improve the delicate balance many employees maintain nowadays, among work, family and ICT use.

Implications for Practice

The propositions point to several interesting avenues of managerial action. For example, ICTU role identity seems to be an important driver of conflict with the work role. Thus, under permissible regulations, it can be assessed in recruitment processes, and used as a basis for employee placement. Alternatively, it can be leveraged for increasing employee productivity by letting employees shape their ICT user role (e.g., by participating in technology implementation projects). A second example stems from the proposition that individuals with similarly salient ICTU and work role identities who are presented with a situation where there is no clear behavioral response consistent with only one role, may experience stress, which in turn will impair their performance. To mitigate such situations, appropriate behavioral responses should be developed, and employees could be provided with training regarding how to react with the appropriate behavioral responses in such situations.

Boundary management preferences can be assessed during recruitment or employee development processes, and be used for hiring and placement decisions. When the provided boundaries do not match employees’ expectations or preferences, employees’ performance is likely to diminish. Lastly, organizational contexts can be re-shaped (e.g., by providing technical training and support) so as to try to impact individuals’ ICTU identities. It could also be used (e.g., by means of flexible IT use policy) to improve the fit between employees desired and actual ICTU-to-work segmentation (or integration). The merits of such measures, though, require further research.

Conclusion

The role theory perspective we advance is important given the paucity of research taking into account how complex socio-technical systems are related to role performance (Orlikowski, 1992, 2010; Avgerou and McGrath, 2007; Orlikowski and Scott, 2008). Role and boundary management theories have been developed to explain how identities and role demands are related to important role-related behavior, such as job performance (Katz and Khan, 1978; Solomon et al., 1985; Kossek et al., 1999, 2006; Golden and Geisler, 2007; Gal et al., 2008). By applying these relatively well-developed theories to a relatively new, yet pertinent, role of ICTU, scholars can better understand the complex relationships between technology use and behavior in the ICTU and work roles. Although previous research has focused on how technology per se is related to job performance (Gallupe et al., 1994; Straus and McGrath, 1994), our contribution is more specific to how role identities surrounding technology, not technology per se, are related to role behavior.

Author Contributions

MP and OT came up with the original idea for the ICTU role and thus the manuscript in consultation with JG. SP lead the literature review in coordination with the other three co-authors. MP lead on revisions of the manuscript after presentations at the Academy of Management and Work-Family Researchers Network, and JG helped edit the manuscript as well and focus the paper in terms of contributions to theory and research.

Conflict of Interest Statement

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

Adams, G. A., King, L. A., and King, D. W. (1996). Relationships of job and family involvement, family social support, and work-family conflict with job and life satisfaction. J. Appl. Psychol. 81, 411–420. doi: 10.1037/0021-9010.81.4.411

CrossRef Full Text | Google Scholar

Agarwal, R., and Prasad, J. (1998). A conceptual and operational definition of personal innovativeness in the domain of information technology. Inform. Syst. Res. 9, 204–215. doi: 10.1287/isre.9.2.204

CrossRef Full Text | Google Scholar

Ahuja, M. K., McKnight, D. H., Chudoba, K. M., George, J. F., and Kacmar, C. J. (2007). IT road warriors: balancing work-family conflict, job autonomy, and work overload to mitigate turnover intentions. MIS Q. 31, 1–17.

Google Scholar

Altheide, D. L. (1995). An Ecology of Communication: Cultural Formats of Control. New York, NY: Aldine de Gruyter.

Google Scholar

Amatea, E. S., Cross, E. G., Clark, J. E., and Bobby, C. L. (1986). Assessing the work and family role expectations of career-oriented men and women: the life role salience scales. J. Marriage Fam. 48, 831–838. doi: 10.2307/352576

CrossRef Full Text | Google Scholar

American Psychiatric Association (2013). “Internet gaming disorder,” in Diagnostic and Statistical Manual of Mental Disorders, 5th Edn (Arlington, VA: American Psychiatric Publishing), 795–798.

Anderson, R. E., Johnson, D. G., Gotterbarn, D., and Perrolle, J. (1993). Using the new ACM code of ethics in decision making. Commun. ACM 36, 98–107. doi: 10.1145/151220.151231

CrossRef Full Text | Google Scholar

Ashforth, B. E., Kreiner, G. E., and Fugate, M. (2000). All in a day’s work: boundaries and micro role transitions. Acad. Manage. Rev. 25, 472–491.

Google Scholar

Ashforth, B. E., Rogers, K. M., Pratt, M. G., and Pradies, C. (2014). Ambivalence in organizations: a multilevel approach. Organ. Sci. 25, 1453–1478. doi: 10.1287/orsc.2014.0909

CrossRef Full Text | Google Scholar

Avgerou, C., and McGrath, K. (2007). Power, rationality, and the art of living through socio-technical change. MIS Q. 31, 295–315.

Google Scholar

Bakker, A. B., and Demerouti, E. (2013). “The spillover-crossover model,” in New Frontiers in Work and Family Research, eds J. Grzywacs and E. Demerouti (Hove: Psychology Press), 54–70.

Google Scholar

Barki, H., Pare, G., and Sicotte, C. (2008). Linking IT implementation and acceptance via the construct of psychological ownership of information technology. J. Inform. Technol. 23, 269–280. doi: 10.1057/jit.2008.12

CrossRef Full Text | Google Scholar

Barnes, C. M., and Spreitzer, G. (2015). Why Sleep Is a Strategic Resource. MIT Sloan Manage. Rev. 56, 19–21.

Google Scholar

Barnett, J., and Coulson, M. (2010). Virtually real: a psychological perspective on massively multiplayer online games. Rev. Gen. Psychol. 14, 167–179. doi: 10.1037/a0019442

CrossRef Full Text | Google Scholar

Berner, E. S., Detmer, D. E., and Simborg, D. (2005). Will the wave finally break? A brief view of the adoption of electronic medical records in the United States. J. Am. Med. Inform. Assoc. 12, 3–7. doi: 10.1197/jamia.M1664

PubMed Abstract | CrossRef Full Text | Google Scholar

Bhattacherjee, A. (2001). Understanding information systems continuance: an expectation-confirmation model. MIS Q. 25, 351–370. doi: 10.2307/3250921

CrossRef Full Text | Google Scholar

Biddle, B. J. (1979). Role Theory: Expectations, Identities, and Behaviors. New York: Academic Press.

Google Scholar

Burke, P. J., and Reitzes, D. C. (1981). The link between identity and role performance. Soc. Psychol. Q. 44, 83–92. doi: 10.2307/3033704

CrossRef Full Text | Google Scholar

Callero, P. L. (1985). Role-identity salience. Soc. Psychol. Q. 48, 203–215.

Google Scholar

Calamaro, C. J., Mason, T. B. A., and Ratcliffe, S. J. (2009). Adolescents living the 24/7 lifestyle: effects of caffeine and technology on sleep duration and daytime functioning. Pediatrics 123, E1005–E1010. doi: 10.1542/peds.2008-3641

PubMed Abstract | CrossRef Full Text | Google Scholar

Carlson, D., Kacmar, K. M., Zivnuska, S., Ferguson, M., and Whitten, D. (2011). Work-family enrichment and job performance: a constructive replication of affective events theory. J. Occup. Health Psychol. 16, 297–312. doi: 10.1037/a0022880

PubMed Abstract | CrossRef Full Text | Google Scholar

Carter, M., and Grover, V. (2015). Me, my self, and I(T): conceptualizing information technology identity and its implications. MIS Q. 39, 931–957.

Google Scholar

Cerulo, K. A. (1997). Re-framing sociological concepts for a brave new (virtual?) world. Sociol. Inq. 67, 48–58. doi: 10.1111/j.1475-682X.1997.tb00428.x

CrossRef Full Text | Google Scholar

Cerulo, K. A., Ruane, J. M., and Chayko, M. (1992). Technological ties that bind: media generated primary groups. Commun. Res. 19, 109–129. doi: 10.1177/009365092019001005

CrossRef Full Text | Google Scholar

Champoux, J. E. (1978). A preliminary examination of some complex job scope- growth need strength interactions. Acad. Manage. Proc. 38, 59–63. doi: 10.5465/AMBPP.1978.4976486

CrossRef Full Text | Google Scholar

Chapman, D. S., Uggerslev, K. L., Carroll, S. A., Piasentin, K. A., and Jones, D. A. (2005). Applicant attraction to organizations, and job choice: a meta-analytic review of the correlates of recruiting outcomes. J. Appl. Psychol. 90, 928–944. doi: 10.1037/0021-9010.90.5.928

PubMed Abstract | CrossRef Full Text | Google Scholar

Charlton, J. P., and Danforth, I. D. W. (2007). Distinguishing addiction and high engagement in the context of online game playing. Comput. Hum. Behav. 23, 1531–1548. doi: 10.1016/j.chb.2005.07.002

CrossRef Full Text | Google Scholar

Chiaburu, D. S., and Harrison, D. A. (2008). Do peers make the place? Conceptual synthesis and meta-analysis of coworker effects on perceptions, attitudes, OCBs, and performance. J. Appl. Psychol. 93, 1082–1103. doi: 10.1037/0021-9010.93.5.1082

PubMed Abstract | CrossRef Full Text | Google Scholar

Choi, D. S., and Kim, J. (2004). Why people continue to play Online games: in search of critical design factors to increase customer loyalty to online contents. Cyberpsychol. Behav. 7, 11–24. doi: 10.1089/109493104322820066

PubMed Abstract | CrossRef Full Text | Google Scholar

Clark, S. C. (2000). Work/family border theory: a new theory of work/family balance. Hum. Relat. 53, 747–770. doi: 10.1177/0018726700536001

CrossRef Full Text | Google Scholar

Colquitt, J. A., Hollenbeck, J. R., Ilgen, D. R., LePine, J. A., and Sheppard, L. (2002). Computer-assisted communication and team decision-making performance: the moderating effect of openness to experience. J. Appl. Psychol. 87, 402–410. doi: 10.1037/0021-9010.87.2.402

PubMed Abstract | CrossRef Full Text | Google Scholar

Compeau, D. R., and Higgins, C. A. (1995). Computer Self-Efficacy: development of a measure and initial test. MIS Q. 19, 189–211. doi: 10.2307/249688

CrossRef Full Text | Google Scholar

Cooke, R. A., and Rousseau, D. M. (1984). Stress and strain from family roles and work-role expectations. J. Appl. Psychol. 69, 252–260. doi: 10.1037/0021-9010.69.2.252

PubMed Abstract | CrossRef Full Text | Google Scholar

Cyr, D., Head, M., Larios, H., and Pan, B. (2009). Exploring human images in website design: a multi-method approach. MIS Q. 33, 539–566.

Google Scholar

D’Arcy, J., Gupta, A., Tarafdar, M., and Turel, O. (2014). Reflecting on the “Dark Side” of information technology use. Commun. Assoc. Inform. Syst. 35, 109–118.

Google Scholar

D’Arcy, J., and Hovav, A. (2009). Does one size fit all? Examining the differential effects of is security countermeasures. J. Bus. Ethics 89, 59–71. doi: 10.1007/s10551-008-9909-7

CrossRef Full Text | Google Scholar

D’Arcy, J., Hovav, A., and Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inform. Syst. Res. 20, 79–98. doi: 10.1287/isre.1070.0160

CrossRef Full Text | Google Scholar

Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. (1992). Extrinsic and intrinsic motivation to use computers in workplace. J. Appl. Soc. Psychol. 22, 1111–1132. doi: 10.1111/j.1559-1816.1992.tb00945.x

CrossRef Full Text | Google Scholar

Day, A., Scott, N., and Kelloway, E. K. (2010). “Information and communication technology: implications for job stress and employee well-being,” in New Developments in Theoretical and Conceptual Approaches to Job Stress (Research in Occupational Stress and Well-Being), eds P. L. Perrewé and D. C. Ganster (Bingley: Emerald Group Publishing), 317–350.

Google Scholar

De Cindio, F., Gentile, O., Grew, P., and Redolfi, D. (2003). Community networks: rules of behavior and social structure. Inform. Soc. 19, 395–406. doi: 10.1080/01972240390241529

CrossRef Full Text | Google Scholar

Deng, L. Q., and Poole, M. S. (2010). Affect in web interfaces: a study of the impacts of web page visual complexity and order. MIS Q. 34, 711–730.

Google Scholar

Dennis, A. R., Fuller, R. M., and Valacich, J. S. (2008). Media, tasks, and communication processes: a theory of media synchronicity. MIS Q. 32, 575–600.

Google Scholar

Derks, D., Bakker, A. B., Peters, P., and van Wingerden, P. (2016). Work-related smartphone use, work-family conflict and family role performance: the role of segmentation preference. Hum. Relat. 69, 1045–1068. doi: 10.1177/0018726715601890

CrossRef Full Text | Google Scholar

Eagly, A. H., Karau, S. J., and Makhijani, M. G. (1995). Gender and the effectiveness of leaders: a metaanlysis. Psychol. Bull. 117, 125–145. doi: 10.1037/0033-2909.117.1.125

PubMed Abstract | CrossRef Full Text | Google Scholar

Edwards, J. R. (1991). Person-Job Fit: A Conceptual Integration, Literature Review, and Methodological Critique. Chichester: John Wiley & Sons.

Google Scholar

Edwards, J. R., and Rothbard, N. P. (1999). Work and family stress and well-being: an examination of person-environment fit in the work and family domains. Organ. Behav. Hum. Decis. Process. 77, 85–129. doi: 10.1006/obhd.1998.2813

PubMed Abstract | CrossRef Full Text | Google Scholar

Evans, T. (1995). Matters of modernity, late modernity and self-identity in distance education. Eur. J. Psychol. Educ. 10, 169–180. doi: 10.1007/BF03172914

CrossRef Full Text | Google Scholar

Fenner, G. H., and Renn, R. W. (2004). Technology-assisted supplemental work: construct definition and a research framework. Hum. Resour. Manage. 43, 179–200. doi: 10.1002/hrm.20014

CrossRef Full Text | Google Scholar

Fenner, G. H., and Renn, R. W. (2010). Technology-assisted supplemental work and work-to-family conflict: the role of instrumentality beliefs, organizational expectations and time management. Hum. Relat. 63, 63–82. doi: 10.1177/0018726709351064

CrossRef Full Text | Google Scholar

File, T. (2013). Computer and Internet use in the United States. Current Population Survey Reports. Washington, DC: US Census Bureau.

Google Scholar

Frone, M. R., Russell, M., and Cooper, M. L. (1992). Antecedents and outcomes of work family conflict – Testing a model of the work family interface. J. Appl. Psychol. 77, 65–78. doi: 10.1037/0021-9010.77.1.65

CrossRef Full Text | Google Scholar

Gal, U., Lyytinen, K., and Yoo, Y. J. (2008). The dynamics of IT boundary objects, information infrastructures, and organisational identities: the introduction of 3D modelling technologies into the architecture, engineering, and construction industry. Eur. J. Inform. Syst. 17, 290–304. doi: 10.1057/ejis.2008.13

CrossRef Full Text | Google Scholar

Gallupe, R. B., Cooper, W. H., Grise, M. L., and Bastianutti, L. M. (1994). Blocking electronic brainstorms. J. Appl. Psychol. 79, 77–86. doi: 10.1037//0021-9010.79.1.77

PubMed Abstract | CrossRef Full Text | Google Scholar

Gefen, D., and Ridings, C. (2003). IT acceptance: managing user – IT group boundaries. Data Base Adv. Inform. Syst. 34, 25–40. doi: 10.1145/937742.937746

CrossRef Full Text | Google Scholar

Geurts, S. A. E., and Demerouti, E. (2002). “Work/non-work interface: a review of theories and findings,” in The Handbook of Work and Health Psychology, 2nd Edn, eds M. J. Schabracq, J. A. M. Winnubst, and C. L. Cooper (Chichester: John Wiley & Sons Ltd). doi: 10.1002/0470013400.ch14

CrossRef Full Text | Google Scholar

Gil-Or, O., Levi-Belz, Y., and Turel, O. (2015). The “Facebook-self”: characteristics and psychological predictors of false self-presentation on Facebook. Front. Psychol. 6:99. doi: 10.3389/fpsyg.2015.00099

PubMed Abstract | CrossRef Full Text | Google Scholar

Golden, A. G., and Geisler, C. (2007). Work-life boundary management and the personal digital assistant. Hum. Relat. 60, 519–551. doi: 10.1177/0018726707076698

CrossRef Full Text | Google Scholar

Golden, T. D., Veiga, J. F., and Simsek, Z. (2006). Telecommuting’s differential impact on work-family conflict: is there no place like home? J. Appl. Psychol. 91, 1340–1350. doi: 10.1037/0021-9010.91.6.1340

PubMed Abstract | CrossRef Full Text | Google Scholar

Gonzales, A. L., and Hancock, J. T. (2011). Mirror, mirror on my facebook wall: effects of exposure to facebook on self-esteem. Cyberpsychol. Behav. Soc. Netw. 14, 79–83. doi: 10.1089/cyber.2009.0411

PubMed Abstract | CrossRef Full Text | Google Scholar

Goode, J. (2010). The digital identity divide: how technology knowledge impacts college students. New Media Soc. 12, 497–513. doi: 10.1177/1461444809343560

CrossRef Full Text | Google Scholar

Greenhaus, J. H., and Beutell, N. J. (1985). Sources of conflict between work and family roles. Acad. Manage. Rev. 10, 76–88.

Google Scholar

Greenhaus, J. H., and Powell, G. N. (2003). When work and family collide: deciding between competing role demands. Organ. Behav. Hum. Decis. Process. 90, 291–303. doi: 10.1016/S0749-5978(02)00519-8

CrossRef Full Text | Google Scholar

Greenhaus, J. H., and Powell, G. N. (2006). When work and family are allies: a theory of work-family enrichment. Acad. Manage. Rev. 31, 72–92. doi: 10.5465/AMR.2006.19379625

CrossRef Full Text | Google Scholar

Guo, Z., Tan, F. B., Turner, T., and Xu, H. (2010). Group norms, media preferences, and group meeting success: a longitudinal study. Comput. Hum. Behav. 26, 645–655. doi: 10.1016/j.chb.2010.01.001

CrossRef Full Text | Google Scholar

Harris, K. J., Lambert, A., and Harris, R. B. (2013). HRM effectiveness as a moderator of the relationships between abusive supervision and technology work overload and job outcomes for technology end users. J. Appl. Soc. Psychol. 43, 1686–1695. doi: 10.1111/jasp.12122

CrossRef Full Text | Google Scholar

Hartwick, J., and Barki, H. (1994). Explaining the role of user participation in information-systems use. Manage. Sci. 40, 440–465. doi: 10.1287/mnsc.40.4.440

CrossRef Full Text | Google Scholar

Heller, D., and Watson, D. (2005). The dynamic spillover of satisfaction between work and marriage: the role of time and mood. J. Appl. Psychol. 90, 1273–1279. doi: 10.1037/0021-9010.90.6.1273

PubMed Abstract | CrossRef Full Text | Google Scholar

Hislop, D., and Axtell, C. (2011). Mobile phones during work and non-work time: a case study of mobile, non-managerial workers. Inform. Organ. 21, 41–56. doi: 10.1016/j.infoandorg.2011.01.001

CrossRef Full Text | Google Scholar

Hogg, M. A., and Terry, D. J. (2000). Social identity and self-categorization processes in organizational contexts. Acad. Manage. Rev. 25, 121–140.

Google Scholar

Hogg, M. A., Terry, T. J., and White, K. M. (1995). A tale of two theories: a critical comparison of identity theory with social identity theory. Soc. Psychol. Q. 58, 255–269. doi: 10.2307/2787127

CrossRef Full Text | Google Scholar

Hopkins, M. S., and Brynjolfsson, E. (2010). The four ways it is revolutionizing innovation. MIT Sloan Manage. Rev. 51, 51–56.

Google Scholar

Innstrand, S. T., Langballe, E. M., Espnes, G. A., Falkum, E., and Aasland, O. G. (2008). Positive and negative work-family interaction and burnout: a longitudinal study of reciprocal relations. Work Stress 22, 1–15. doi: 10.1080/02678370801975842

CrossRef Full Text | Google Scholar

Jackson, D. D. (1965). The study of the family. Fam. Process 4, 1–20. doi: 10.1111/j.1545-5300.1965.00001.x

CrossRef Full Text | Google Scholar

Jacobs, J. A., and Gerson, K. (1998). Who are the overworked Americans? Rev. Soc. Econ. 56, 442–459. doi: 10.1080/00346769800000044

PubMed Abstract | CrossRef Full Text | Google Scholar

Judes, L., and Stevens, M. (2007). Bursting the bubble – Mobile phone etiquette on public transport. J. Commun. Netw. 6, 13–16.

Google Scholar

Kanai, R., Bahrami, B., Roylance, R., and Rees, G. (2012). Online social network size is reflected in human brain structure. Proc. R. Soc. B Biol. Sci. 279, 1327–1334. doi: 10.1098/rspb.2011.1959

PubMed Abstract | CrossRef Full Text | Google Scholar

Katz, D., and Khan, R. L. (1978). The Social Psychology of Organizations. New York, NY: Wiley.

Google Scholar

Korsgaard, M. A., Brodt, S. E., and Whitener, E. M. (2002). Trust in the face of conflict: the role of managerial trustworthy behavior and organizational context. J. Appl. Psychol. 87, 312–319. doi: 10.1037/0021-9010.87.2.312

PubMed Abstract | CrossRef Full Text | Google Scholar

Kossek, E. E., Lautsch, B. A., and Eaton, S. C. (2006). Telecommuting, control, and boundary management: correlates of policy use and practice, job control, and work-family effectiveness. J. Vocat. Behav. 68, 347–367. doi: 10.1016/j.jvb.2005.07.002

CrossRef Full Text | Google Scholar

Kossek, E. E., Noe, R. A., and DeMarr, B. J. (1999). Work-family role synthesis: individual and organizational determinants. Int. J. Conf. Manag. 10, 102–129. doi: 10.1108/eb022820

CrossRef Full Text | Google Scholar

Kreiner, G. E., Hollensbe, E. C., and Sheep, M. L. (2009). Balancing borders and bridges: negotiating the work-home interface via boundary work tactics. Acad. Manage. J. 52, 704–730. doi: 10.5465/AMJ.2009.43669916

CrossRef Full Text | Google Scholar

Kuehn, S., and Gallinat, J. (2014). Amount of lifetime video gaming is positively associated with entorhinal, hippocampal and occipital volume. Mol. Psychiatry 19, 842–847. doi: 10.1038/mp.2013.100

PubMed Abstract | CrossRef Full Text | Google Scholar

Kuehn, S., Gleich, T., Lorenz, R. C., Lindenberger, U., and Gallinat, J. (2014). Playing Super Mario induces structural brain plasticity: gray matter changes resulting from training with a commercial video game. Mol. Psychiatry 19, 265–271. doi: 10.1038/mp.2013.120

PubMed Abstract | CrossRef Full Text | Google Scholar

Kuehn, S., Romanowski, A., Schilling, C., Lorenz, R., Moersen, C., Seiferth, N., et al. (2011). The neural basis of video gaming. Transl. Psychiatry 1:e53. doi: 10.1038/tp.2011.53

PubMed Abstract | CrossRef Full Text | Google Scholar

Kuss, D. J., Griffiths, M. D., and Binder, J. F. (2013). Internet addiction in students: prevalence and risk factors. Comput. Hum. Behav. 29, 959–966. doi: 10.1016/j.chb.2012.12.024

CrossRef Full Text | Google Scholar

Lapointe, L., and Rivard, S. (2005). A multilevel model of resistance to information technology implementation. MIS Q. 29, 461–491.

Google Scholar

Lazarus, R. S., and Folkman, S. (1984). Stress, Appraisal, and Coping. New York, NY: Springer.

Google Scholar

Liang, J. C., Wu, S. H., and Tsai, C. C. (2011). Nurses’ Internet self-efficacy and attitudes toward web-based continuing learning. Nurse Educ. Today 31, 768–773. doi: 10.1016/j.nedt.2010.11.021

PubMed Abstract | CrossRef Full Text | Google Scholar

Limayem, M., Hirt, S. G., and Cheung, C. M. K. (2007). How habit limits the predictive power of intention: the case of information systems continuance. MIS Q. 31, 705–737.

Google Scholar

Lin, H.-F. (2009). Examination of cognitive absorption influencing the intention to use a virtual community. Behav. Inform. Technol. 28, 421–431. doi: 10.1080/01449290701662169

CrossRef Full Text | Google Scholar

Lowry, P. B., Cao, J. W., and Everard, A. (2011). Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures. J. Manage. Inform. Syst. 27, 163–200. doi: 10.2753/mis0742-1222270406

CrossRef Full Text | Google Scholar

Majchrzak, A., Rice, R. E., Malhotra, A., King, N., and Ba, S. L. (2000). Technology adaptation: the case of a computer-supported inter-organizational virtual team. MIS Q. 24, 569–600. doi: 10.2307/3250948

CrossRef Full Text | Google Scholar

Marakas, G. M., Johnson, R. D., and Clay, P. F. (2007). The evolving nature of the Computer Self-Efficacy construct: an empirical investigation of measurement construction, validity, reliability and stability over time. J. Assoc. Inform. Syst. 8, 16–46.

Google Scholar

Martins, L. L., Gilson, L. L., and Maynard, M. T. (2004). Virtual teams: what do we know and where do we go from here? J. Manage. 30, 805–835. doi: 10.1016/j.jm.2004.05.002

CrossRef Full Text | Google Scholar

Maznevski, M. L., and Chudoba, K. M. (2000). Bridging space over time: global virtual team dynamics and effectiveness. Organ. Sci. 11, 473–492. doi: 10.1287/orsc.11.5.473.15200

CrossRef Full Text | Google Scholar

Mead, G. H. (ed.) (1934). Mind, Self, and Society: From the Standpoint of a Social Behaviorist. Chicago, IL: University of Chicago Press.

Google Scholar

Mechanic, D., and Volkart, E. H. (1961). Stress, illness behavior, and the sick role. Am. Sociol. Rev. 26, 51–58. doi: 10.2307/2090512

CrossRef Full Text | Google Scholar

Merton, R. K. (1957). Social Theory and Social Structure. New York, NY: Free Press.

Google Scholar

Meshi, D., Morawetz, C., and Heekeren, H. R. (2013). Nucleus accumbens response to gains in reputation for the self relative to gains for others predicts social media use. Front. Hum. Neurosci. 7:439. doi: 10.3389/fnhum.2013.00439

PubMed Abstract | CrossRef Full Text | Google Scholar

Meshi, D., Tamir, D. I., and Heekeren, H. R. (2015). The emerging neuroscience of social media. Trends Cogn. Sci. 19, 771–782. doi: 10.1016/j.tics.2015.09.004

PubMed Abstract | CrossRef Full Text | Google Scholar

Meyrowitz, J. (1997). Shifting worlds of strangers: medium theory and changes in “them” versus “us.” Sociol. Inq. 67, 59–71. doi: 10.1111/j.1475-682X.1997.tb00429.x

CrossRef Full Text | Google Scholar

Michel, J. S., Mitchelson, J. K., Pichler, S., and Cullen, K. L. (2010). Clarifying relationships among work and family social support, stressors, and work-family conflict. J. Vocat. Behav. 76, 91–104. doi: 10.1016/j.jvb.2009.05.007

CrossRef Full Text | Google Scholar

Nippert-Eng, C. (1996). Home and Work. Chicago, IL: University of Chicago Press.

Google Scholar

Nolan, R., and McFarlan, F. W. (2005). Information technology and the board of directors. Harv. Bus. Rev. 83, 96–106.

Google Scholar

O’Driscoll, M. P., Brough, P., Timms, C., and Sawang, S. (2010). “Engagement with information and communication technology and psychological well-being,” in New Developments in Theoretical and Conceptual Approaches to Job Stress (Research in Occupational Stress and Well-Being), eds P. L. Perrewé and D. C. Ganster (Bingley: Emerald Group Publishing), 269–316.

Google Scholar

Oldham, G. R., and Cummings, A. (1996). Employee creativity: personal and contextual factors at work. Acad. Manage. J. 39, 607–634. doi: 10.2307/256657

CrossRef Full Text | Google Scholar

Ollier-Malaterre, A., Rothbard, N. P., and Berg, J. (2013). When worlds collide in cyberspace: how boundary work in online social networks impacts professional relationships. Acad. Manage. Rev. 38, 645–669. doi: 10.5465/amr.2011.0235

CrossRef Full Text | Google Scholar

Orlikowski, W. J. (1992). The duality of technology: rethinking the concept of technology in organizations. Organ. Sci. 3, 398–427. doi: 10.1287/orsc.3.3.398

CrossRef Full Text | Google Scholar

Orlikowski, W. J. (2010). The sociomateriality of organisational life: considering technology in management research. Cambridge J. Econ. 34, 125–141. doi: 10.1093/cje/bep058

CrossRef Full Text | Google Scholar

Orlikowski, W. J., and Scott, S. V. (2008). Sociomateriality: challenging the separation of technology, work and organization. Acad. Manag. Ann. 2, 433–474. doi: 10.1080/19416520802211644

CrossRef Full Text | Google Scholar

Pauleen, D. J., and Yoong, P. (2001). Relationship building and the use of ICT in boundary-crossing virtual teams: a facilitator’s perspective. J. Inform. Technol. 16, 205–220. doi: 10.1080/02683960110100391

CrossRef Full Text | Google Scholar

Piszczek, M. M. (2016). Boundary control and controlled boundaries: organizational expectations for technology use at the work-family interface. J. Organ. Behav. 1–20.

Google Scholar

Przybylski, A. K., Murayama, K., DeHaan, C. R., and Gladwell, V. (2013). Motivational, emotional, and behavioral correlates of fear of missing out. Comput. Hum. Behav. 29, 1841–1848. doi: 10.1016/j.chb.2013.02.014

CrossRef Full Text | Google Scholar

Qahri-Saremi, H., and Turel, O. (2016). School engagement, information technology use, and educational development: An empirical investigation of adolescents. Comput. Educ. 102, 65–78. doi: 10.1016/j.compedu.2016.07.004

CrossRef Full Text | Google Scholar

Raviola, E., and Norback, M. (2013). Bringing technology and meaning into institutional work: making news at an Italian business newspaper. Organ. Stud. 34, 1171–1194. doi: 10.1177/0170840613492077

CrossRef Full Text | Google Scholar

Reeves, B., and Nass, C. (1996). The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Places. Cambridge: Cambridge University Press.

Google Scholar

Reichers, A. E. (1985). A review and reconceptualization of organizational commitment. Acad. Manage. Rev. 10, 465–476. doi: 10.2307/258128

PubMed Abstract | CrossRef Full Text | Google Scholar

Riketta, M., and Nienaber, S. (2007). Multiple identities and work motivation: the role of perceived compatibility between nested organizational units. Br. J. Manag. 18, S61–S77. doi: 10.1111/j.1467-8551.2007.00526.x

CrossRef Full Text | Google Scholar

Saade, R., and Bahli, B. (2005). The impact of cognitive absorption on perceived usefulness and perceived ease of use in on-line learning: an extension of the technology acceptance model. Inform. Manag. 42, 317–327. doi: 10.1016/j.im.2003.12.013

CrossRef Full Text | Google Scholar

Schiller, S. Z., and Mandviwalla, M. (2007). Virtual team research – An analysis of theory use and a framework for theory appropriation. Small Group Res. 38, 12–59. doi: 10.1177/1046496406297035

CrossRef Full Text | Google Scholar

Schlosser, F. K. (2002). So, how do people really use their handheld devices? An interactive study of wireless technology use. J. Organ. Behav. 23, 401–423. doi: 10.1002/job.146

CrossRef Full Text | Google Scholar

Scott, J. T., Rundall, T. G., Vogt, T. M., and Hsu, J. (2005). Kaiser Permanente’s experience of implementing an electronic medical record: a qualitative study. Br. Med. J. 331, 1313–1316. doi: 10.1136/bmj.38638.497477.68

PubMed Abstract | CrossRef Full Text | Google Scholar

Sheldon, K. M., Abad, N., and Hinsch, C. (2011). Two-process view of facebook use and relatedness need-satisfaction: disconnection drives use, and connection rewards it. J. Pers. Soc. Psychol. 100, 766–775. doi: 10.1037/a0022407

PubMed Abstract | CrossRef Full Text | Google Scholar

Sieber, S. D. (1974). Toward a theory of role accumulation. Am. Sociol. Rev. 39, 567–578. doi: 10.2307/2094422

CrossRef Full Text | Google Scholar

Singh, J. (2000). Performance productivity and quality of frontline employees in service organizations. J. Mark. 64, 15–34. doi: 10.1509/jmkg.64.2.15.17998

PubMed Abstract | CrossRef Full Text | Google Scholar

Skinner, H., Biscope, S., and Poland, B. (2003). Quality of internet access: barrier behind internet use statistics. Soc. Sci. Med. 57, 875–880. doi: 10.1016/s0277-9536(02)00455-0

PubMed Abstract | CrossRef Full Text | Google Scholar

Solomon, M. R., Surprenant, C., Czepiel, J. A., and Gutman, E. G. (1985). A role theory perspective and dyadic interactions: the service encounter. J. Mark. 49, 99–111. doi: 10.2307/1251180

CrossRef Full Text | Google Scholar

Somers, M. J. (2001). Ethical codes of conduct and organizational context: a study of the relationship between codes of conduct, employee behavior and organizational values. J. Bus. Ethics 30, 185–195. doi: 10.1023/a:1006457810654

CrossRef Full Text | Google Scholar

Sproull, L. S. (2000). “Computers in U.S. households since 1977,” in A Nation Transformed by Information, eds A. D. J. Chandler and J. W. Cortada (London: Oxford University Press), 257–280.

Google Scholar

Stets, J. (2010). “Role identity,” in Encyclopedia of Identity, eds R. Jackson and M. A. Hogg (Thousand Oaks, CA: SAGE Publications, Inc.), 649–651.

Google Scholar

Stets, J. E., and Harrod, M. M. (2004). Verification across multiple identities: the role of status. Soc. Psychol. Q. 67, 155–171. doi: 10.1177/019027250406700203

CrossRef Full Text | Google Scholar

Straus, S. G., and McGrath, J. E. (1994). Does the medium matter? the interaction of task type and technology on group-performance and member reactions. J. Appl. Psychol. 79, 87–97. doi: 10.1037/0021-9010.79.1.87

PubMed Abstract | CrossRef Full Text | Google Scholar

Stryker, S. (1968). Identity salience and role performance. J. Marriage Fam. 30, 558–564. doi: 10.2307/349494

CrossRef Full Text | Google Scholar

Stryker, S. (1980). Symbolic Interactionism: A Social Structural Version. Menlo Park, CA: Benjamin Cummings.

Google Scholar

Stryker, S., and Burke, P. J. (2000). The past, present, and future of an identity theory. Soc. Psychol. Q. 63, 284–297. doi: 10.2307/2695840

CrossRef Full Text | Google Scholar

Stryker, S., and Serpe, R. T. (1982). “Commitment, identity salience, and role behavior: theory and research example” in Personality, Roles, and Social Behavior, eds W. Ickes and E. S. Knowles (New York, NY: Springer-Verlag), 199–218.

Google Scholar

Stryker, S., and Serpe, R. T. (1994). Identity salience and psychological centrality: equivalent, overlapping, or complementary concepts? Soc. Psychol. Q. 57, 16–35. doi: 10.2307/2786972

CrossRef Full Text | Google Scholar

Swann, W. B., Steinseroussi, A., and Giesler, R. B. (1992). Why people self-verify. J. Pers. Soc. Psychol. 62, 392–401. doi: 10.1037//0022-3514.62.3.392

CrossRef Full Text | Google Scholar

Tarafdar, M., D’Arcy, J., Turel, O., and Gupta, A. (2015). The dark side of information technology. MIT Sloan Manage. Rev. 56, 600–623.

Google Scholar

Tarafdar, M., Gupta, A., and Turel, O. (2013). The dark side of information technology use. Inform. Syst. J. 23, 269–275. doi: 10.1111/isj.12015

CrossRef Full Text | Google Scholar

Thomée, S., Härenstam, A., and Hagberg, M. (2012). Computer use and stress, sleep disturbances, and symptoms of depression among young adults–a prospective cohort study. BMC Psychiatry 12:176. doi: 10.1186/1471-244X-12-176

PubMed Abstract | CrossRef Full Text | Google Scholar

Titah, R., and Barki, H. (2009). Nonlinearities between attitude and subjective norms in information technology acceptance: a negative synergy? MIS Q. 33, 827–844.

Google Scholar

Turel, O. (2016). Untangling the complex role of guilt in rational decisions to discontinue the use of a hedonic Information System. Eur. J. Inf. Syst. 25, 432–447. doi: 10.1057/s41303-016-0002-5

CrossRef Full Text | Google Scholar

Turel, O., and Bechara, A. (2016). A triadic reflective-impulsive-interoceptive awareness model of general and impulsive information system use: behavioral tests of neuro-cognitive theory. Front. Psychol. 7:601. doi: 10.3389/fpsyg.2016.00601

PubMed Abstract | CrossRef Full Text | Google Scholar

Turel, O., He, Q., Xue, G., Xiao, L., and Bechara, A. (2014). Examination of neural systems sub-serving Facebook “addiction”. Psychol. Rep. 115, 675–695. doi: 10.2466/18.PR0.115c31z8

PubMed Abstract | CrossRef Full Text | Google Scholar

Turel, O., and Serenko, A. (2010). Is mobile email addiction overlooked? Commun. ACM 53, 41–43. doi: 10.1145/1735223.1735237

CrossRef Full Text | Google Scholar

Turel, O., and Serenko, A. (2012). The benefits and dangers of enjoyment with social networking websites. Eur. J. Inf. Syst. 21, 512–528. doi: 10.1057/ejis.2012.1

CrossRef Full Text | Google Scholar

Turel, O., Serenko, A., and Bontis, N. (2010). User acceptance of hedonic digital artifacts: a theory of consumption values perspective. Inform. Manag. 47, 53–59. doi: 10.1016/j.im.2009.10.002

CrossRef Full Text | Google Scholar

Turel, O., Serenko, A., and Bontis, N. (2011a). Family and work-related consequences of addiction to organizational pervasive technologies. Inform. Manag. 48, 88–95. doi: 10.1016/j.im.2011.01.004

CrossRef Full Text | Google Scholar

Turel, O., Serenko, A., and Giles, P. (2011b). Integrating technology addiction and use: An empirical investigation of online auction sites. MIS Q. 35, 1043–1061.

Google Scholar

Utz, S. (2010). Show me your friends and I will tell you what type of person you are: How one’s profile, number of friends, and type of friends influence impression formation on social network sites. J. Comput. Mediat. Commun. 15, 314–335. doi: 10.1111/j.1083-6101.2010.01522.x

CrossRef Full Text | Google Scholar

Venkatesh, V. (2000). Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Inform. Syst. Res. 11, 342–365. doi: 10.1287/isre.11.4.342.11872

CrossRef Full Text | Google Scholar

Venkatesh, V., and Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Q. 24, 115–139. doi: 10.2307/3250981

CrossRef Full Text | Google Scholar

Warkentin, M., Johnston, A. C., and Shropshire, J. (2011). The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. Eur. J. Inform. Syst. 20, 267–284. doi: 10.1057/ejis.2010.72

CrossRef Full Text | Google Scholar

Whitty, M. T., and Carr, A. N. (2006). New rules in the workplace: applying object-relations theory to explain problem Internet and email behaviour in the workplace. Comput. Hum. Behav. 22, 235–250. doi: 10.1016/j.chb.2004.06.005

CrossRef Full Text | Google Scholar

Wiley, M. G. (1991). Gender, work and stress: the potential impact of role-identity salience and commitment. Sociol. Q. 32, 495–510. doi: 10.1111/j.1533-8525.1991.tb00150.x

CrossRef Full Text | Google Scholar

Williams, K. J., Suls, J., Alliger, G. M., Learner, S. M., and Wan, C. K. (1991). Multiple role juggling and daily mood states in working mothers: an experience sampling study. J. Appl. Psychol. 76, 664–674. doi: 10.1037//0021-9010.76.5.664

PubMed Abstract | CrossRef Full Text | Google Scholar

Willoughby, T. (2008). A short-term longitudinal study of internet and computer game use by adolescent boys and girls: prevalence, frequency of use, and psychosocial predictors. Dev. Psychol. 44, 195–204. doi: 10.1037/0012-1649.44.1.195

PubMed Abstract | CrossRef Full Text | Google Scholar

Wood, B., Rea, M. S., Plitnick, B., and Figueiro, M. G. (2013). Light level and duration of exposure determine the impact of self-luminous tablets on melatonin suppression. Appl. Ergon. 44, 237–240. doi: 10.1016/j.apergo.2012.07.008

PubMed Abstract | CrossRef Full Text | Google Scholar

Xu, Z. C., Turel, O., and Yuan, Y. F. (2012). Online game addiction among adolescents: motivation and prevention factors. Eur. J. Inf. Syst. 21, 321–340. doi: 10.1057/ejis.2011.56

CrossRef Full Text | Google Scholar

Yi, M. Y., Fiedler, K. D., and Park, J. S. (2006). Understanding the role of individual innovativeness in the acceptance of IT-based innovations: comparative analyses of models and measures. Decis. Sci. 37, 393–426. doi: 10.1111/j.1540-5414.2006.00132.x

CrossRef Full Text | Google Scholar

Zerubavel, E. (1993). The Fine Line: Making Distinctions in Everyday Life. Chicago, IL: University of Chicago Press.

Google Scholar

Zerubavel, E. (1996). Lumping and splitting: notes on social classification. Sociol. Forum 11, 421–433. doi: 10.1007/BF02408386

CrossRef Full Text | Google Scholar

Keywords: identity, roles, spillover, technology, information systems

Citation: Piszczek MM, Pichler S, Turel O and Greenhaus J (2016) The Information and Communication Technology User Role: Implications for the Work Role and Inter-Role Spillover. Front. Psychol. 7:2009. doi: 10.3389/fpsyg.2016.02009

Received: 11 August 2016; Accepted: 12 December 2016;
Published: 27 December 2016.

Edited by:

Guendalina Graffigna, Catholic University of the Sacred Heart, Italy

Reviewed by:

Chia-Yen (Chad) Chiu, University of South Australia, Australia
Jeffrey Robert Bentley, California State University-Long Beach, USA

Copyright © 2016 Piszczek, Pichler, Turel and Greenhaus. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Shaun Pichler, spichler@fullerton.edu

These authors shared the first authorship for this manuscript.

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.