Abstract Advances in information technology have boosted worker productivity while creating new security risks. In response, tools to curb these risks have been developed. There are inherent tradeoffs, though, between the new tools effectiveness and the degree to which they violate worker privacy. As corporations seek an appropriate compromise, they must also address significant legal and social changes. One purpose of this article is to increase managerial awareness of the security risk in the digital workplace. Next, the authors address the legal, ethical and practical constraints that bear on employee privacy. Finally, the authors propose a three-step process that seeks to integrate corporate response to all forms of change, while producing a win-win solution for all stakeholders.
[1]
William H. Allen.
Computer Forensics
,
2005,
IEEE Secur. Priv..
[2]
James E. Nalen.
Institute for Global Ethics
,
2001
.
[3]
R. Power.
CSI/FBI computer crime and security survey
,
2001
.
[4]
G. Sewell,et al.
Coercion Versus Care: Using Irony to Make Sense of Organizational Surveillance
,
2006
.
[5]
D. Bowen,et al.
Understanding HRM–Firm Performance Linkages: The Role of the “Strength” of the HRM System
,
2004
.
[6]
Terri L. Griffith.
Teaching Big Brother to be a team player: computer monitoring and quality
,
1993
.
[7]
Robert E. Hoskisson,et al.
Strategic Management: Competitiveness and Globalization
,
1994
.