To What Do I Owe This Visit? The Drawbacks and Benefits of In-Role and Non-Role Intrusions

John T. Bush, Michael D. Baer, David T. Welsh, Ryan Outlaw, Niharika Garud, Hudson Sessions

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

Workplace intrusions—unexpected encounters initiated by another person that disrupt an individual’s work—are generally characterized as negative experiences that deplete resources, increase role and information overload, and promote strain. In contrast, our research argues that intrusions may also provide benefits to the employees who are intruded upon. Taking a multistudy approach, we investigate how intrusions impact the extent to which employees engage in their own work—work engagement—and the extent to which they engage in work with others—collaboration. We also investigate the indirect effects of intrusions on employees’ task-focused and person-focused citizenship behavior through these mechanisms. We tested our predictions with a within-person experimental critical incident study (Study 1), an experiment (Study 2), and an experience-sampling methodology study with a sample of scientists involved in research and development (Study 3). Our research investigates the dynamics of various types of workplace intrusions, with results suggesting that intrusions may lead to beneficial employee outcomes in addition to the adverse outcomes previously demonstrated in the literature. Given the ubiquitous nature of intrusions in organizations, our findings have both theoretical and practical significance.

Original languageEnglish (US)
Pages (from-to)1888-1917
Number of pages30
JournalJournal of Management
Volume48
Issue number7
DOIs
StatePublished - Sep 2022

Keywords

  • collaboration
  • engagement
  • experience sampling methodology
  • interruptions
  • intrusions

ASJC Scopus subject areas

  • Finance
  • Strategy and Management

Fingerprint

Dive into the research topics of 'To What Do I Owe This Visit? The Drawbacks and Benefits of In-Role and Non-Role Intrusions'. Together they form a unique fingerprint.

Cite this