Dataveillance: Employee Monitoring & Information Privacy Concerns in the Workplace

Information privacy concerns are a dominant concern of the information age. Such concerns emanate from the tension between the correct use of personal information and information privacy. That tension has extended to the computer-mediated work environment as employees are becoming increasingly aware of the ways in which management can employ technologies to monitor their email and Internet interactions. Such information privacy concerns have the potential to negatively impact organisational productivity and employee morale. The aim of this paper is to outline some of the major issues relating to workplace surveillance and provide a balanced perspective that identifies the emerging issues and subsequent privacy concerns from the employee’s perspective as well as the rationale underlying managements’ decision to employ monitoring technologies in the workplace. In doing so, it attempts to progress academic understanding of this issue and enhance practitioners’ understanding of the factors that influence employees’ technology-related privacy concerns.

[1]  Domenic Sculli,et al.  The role of trust, quality, value and risk in conducting e-business , 2002, Ind. Manag. Data Syst..

[2]  A. Acquisti Protecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments , 2002 .

[3]  Jeretta Horn Nord,et al.  E-monitoring in the workplace: privacy, legislation, and surveillance software , 2006, CACM.

[4]  T. Tyler,et al.  Procedural justice as a criterion in allocation decisions. , 1986 .

[5]  Tomoji Kishi,et al.  Formal verification and software product lines , 2006, CACM.

[6]  Chen Wang,et al.  Consumer privacy concerns about Internet marketing , 1998, CACM.

[7]  Jeffrey M. Stanton,et al.  Traditional and Electronic Monitoring from an Organizational Justice Perspective , 2000 .

[8]  Dag Elgesem,et al.  The structure of rights in Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data , 1999, Ethics and Information Technology.

[9]  G. Stoney Alder,et al.  Clarifying the effects of Internet monitoring on job attitudes: The mediating role of employee trust , 2006, Inf. Manag..

[10]  William J. Doll,et al.  The Collaborative Use of Information Technology: End-User Participation and Systems Success , 2001, Inf. Resour. Manag. J..

[11]  Herman T. Tavani,et al.  Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology , 2006 .

[12]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[13]  M. Selmi Privacy for the Working Class: Public Work and Private Lives , 2006 .

[14]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[15]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[16]  Jeffrey M. Stanton,et al.  Effects of electronic performance monitoring on personal control, task satisfaction, and task performance , 1996 .

[17]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[18]  S. Margulis On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .

[19]  Timothy P. McGonigle,et al.  A Meta-Analysis of the Relationship Between Procedural Justice and Distributive Justice: Implications for Justice Research , 2001 .

[20]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[21]  Christine A. Henle Predicting workplace deviance from the interaction between organizational justice and personality. , 2005 .

[22]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[23]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[24]  Roger Clarke,et al.  Internet privacy concerns confirm the case for intervention , 1999, CACM.

[25]  Paul A. Pavlou,et al.  Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..

[26]  Lucas D. Introna Privacy and the computer: why we need privacy in the information society , 1997 .

[27]  Paul E. Spector,et al.  The Role of Justice in Organizations: A Meta-Analysis , 2001 .

[28]  Jeffrey M. Stanton,et al.  Reactions to Employee Performance Monitoring: Framework, Review, and Research Directions , 2000 .

[29]  Dana Schwieger,et al.  Internet Usage Monitoring in the Workplace: Its Legal Challenges and Implementation Strategies , 2007, Inf. Syst. Manag..

[30]  P. K. Kannan,et al.  The customer economics of internet privacy , 2002 .

[31]  K. W. Mossholder,et al.  Relationships between Bases of Power and Work Reactions: The Mediational Role of Procedural Justice , 1998 .

[32]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[33]  Scott C. D'Urso,et al.  Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations , 2006 .

[34]  Bob Godfrey Electronic work monitoring: an ethical model , 2000 .

[35]  R. Mason Four ethical issues of the information age , 1986 .

[36]  J. Webster,et al.  Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .

[37]  David Mason,et al.  Advanced Topics in Information Resources Management , 2003 .

[38]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[39]  Paul R. Prabhaker,et al.  Who owns the online consumer , 2000 .

[40]  Jessica Vitak,et al.  Digital footprints: online identity management and search in the age of transparency , 2007 .

[41]  D. Rousseau,et al.  Violating the psychological contract: Not the exception but the norm , 1994 .