Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange perspectives.

Over recent years, information technology has played an increasingly important role in the monitoring and surveillance of worker behavior in organizations. In this article, we take the position that managers, workers, and information technology professionals alike see worker-related information as a valuable organizational resource and that processes of social exchange influence how this information resource is controlled. These suppositions are woven together by joining two theories, information boundary theory, a motivational framework for examining privacy at work, and social exchange theory, which provides a perspective on social networks and social power. After discussing these two frameworks and how they might be interlaced, we analyze a corpus of semi-structured interviews with 119 managers, employees, and IT professionals that explored questions of privacy, motivation, and power in six not-for-profit organizations that were undergoing technology-driven change with potential for increased monitoring and surveillance.

[1]  Andrew Clement,et al.  Considering privacy in the development of multi-media communications , 1993, Computer Supported Cooperative Work.

[2]  Dianna L. Stone,et al.  Personnel Selection Procedures and Invasion of Privacy , 2003 .

[3]  Norhayati Zakaria,et al.  Designing and implementing culturally-sensitive IT applications: The interaction of culture values and privacy issues in the Middle East , 2003, Inf. Technol. People.

[4]  Jeffrey M. Stanton,et al.  Information technology and privacy: a boundary management perspective , 2003 .

[5]  Kirstie Ball,et al.  Surveillance Society: Monitoring Everyday Life , 2001 .

[6]  Joel Brockner,et al.  Regulatory Focus Theory: Implications for the Study of Emotions at Work , 2001 .

[7]  R. Ericson,et al.  The surveillant assemblage. , 2000, The British journal of sociology.

[8]  R. Sabatelli The Social Psychology of Groups , 2000 .

[9]  Elizabeth M. Weiss,et al.  Electronic monitoring in their own words: an exploratory study of employees' experiences with new types of surveillance , 2000 .

[10]  Virginia W. Kupritz PRIVACY IN THE WORK PLACE: THE IMPACT OF BUILDING DESIGN , 1998 .

[11]  David Preston,et al.  Business ethics and privacy in the workplace , 1998, CSOC.

[12]  Gary T. Marx,et al.  An Ethics For The New Surveillance , 1998, Inf. Soc..

[13]  Jon M. Werner,et al.  Managers as Initiators of Trust: An Exchange Relationship Framework for Understanding Managerial Trustworthy Behavior , 1998 .

[14]  Amanda E. Mujica,et al.  Sources and Consequences of Workplace Pressure: Increasing the Risk of Unethical and Illegal Business Practices , 1998 .

[15]  G. Alder Ethical Issues in Electronic Performance Monitoring: A Consideration of Deontological and Teleological Perspectives , 1998 .

[16]  Rob Kling,et al.  Human centered systems in the perspective of organizational and social informatics , 1998, CSOC.

[17]  P. Agre,et al.  Technology and privacy: The new landscape , 1998 .

[18]  E. Higgins Promotion and Prevention: Regulatory Focus as A Motivational Principle , 1998 .

[19]  Nancy Ross-Flanigan THE VIRTUES (AND VICES) OF VIRTUAL COLLEAGUES , 1998 .

[20]  Burke T. Ward,et al.  Ethical Management of Employee E-Mail Privacy , 1998, Inf. Syst. Manag..

[21]  Erik R. Eddy,et al.  THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES , 1999 .

[22]  E. Higgins,et al.  Beyond pleasure and pain. , 1997, The American psychologist.

[23]  Chun-Yen Chang Using computer simulation to manage the crowding problem in parks: a study , 1997 .

[24]  D. M. Pedersen PSYCHOLOGICAL FUNCTIONS OF PRIVACY , 1997 .

[25]  G. Stoney Alder,et al.  Electronic Performance Monitoring , 1997 .

[26]  Viktor Mayer-Schönberger,et al.  Generational development of data protection in Europe , 1997 .

[27]  R. Kling Computerization and Controversy , 1997 .

[28]  Madison Powers,et al.  A cognitive access definition of privacy , 1996 .

[29]  Jeffrey M. Stanton,et al.  Effects of electronic performance monitoring on personal control, task satisfaction, and task performance , 1996 .

[30]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[31]  Gary T. Marx,et al.  The Case of the Omniscient Organization , 1995, Computerization and Controversy, 2nd Ed..

[32]  Ina Wagner Confronting Ethical Issues of Systems Design in a Web of Social Relationships , 1996, Computerization and Controversy, 2nd Ed..

[33]  Rob Kling,et al.  Beyond Outlaws, Hackers, and Pirates: Ethical Issues in the Work of Information and Computer Science Professionals , 1995, Computerization and Controversy, 2nd Ed..

[34]  Andrew Clement Considering Privacy in the Development of Multimedia Communications , 1996, Computerization and Controversy, 2nd Ed..

[35]  Janice C. Sipior,et al.  The ethical and legal quandary of email privacy , 1995, CACM.

[36]  H. Jeff Smith,et al.  Values, personal information privacy, and regulatory approaches , 1995, CACM.

[37]  Laura B. Pincus,et al.  THE DISPARITY BETWEEN PUBLIC AND PRIVATE SECTOR EMPLOYEE PRIVACY PROTECTIONS: A CALL FOR LEGITIMATE PRIVACY RIGHTS FOR PRIVATE SECTOR WORKERS , 1995 .

[38]  Jusanne M. Vest,et al.  Factors Influencing Managerial Disclosure of AIDS Health Information to Coworkers , 1995 .

[39]  Patricia Brierley Newell Perspectives on privacy , 1995 .

[40]  B. Tepper,et al.  Does the Experience of Organizational Justice Mitigate the Invasion of Privacy Engendered by Random Drug Testing? An Empirical Investigation , 1995 .

[41]  S. Hawk The effects of computerized performance monitoring: An ethical perspective , 1994 .

[42]  Linda D. Molm,et al.  Dependence and risk: transforming the structure of social exchange , 1994 .

[43]  J. Berger,et al.  Theoretical Research Programs: Studies in the Growth of Theory , 1994 .

[44]  R. Kraut Predicting the use of technology: the case of telework , 1994 .

[45]  Christopher A. Higgins,et al.  Computerized performance monitors: are they costing you customers? , 1994 .

[46]  Anita L. Vangelisti,et al.  Family Secrets: Forms, Functions and Correlates , 1994 .

[47]  A. Rüstemli,et al.  Privacy Dimensions and Preferences Among Turkish Students , 1993 .

[48]  Jeff Smith,et al.  Privacy policies and practices: inside the organizational maze , 1993, CACM.

[49]  B. Frey Does Monitoring Increase Work Effort? The Rivalry with Trust and Loyalty , 1993 .

[50]  Lainie Friedman Ross,et al.  Privacy, Intimacy and Isolation , 1993 .

[51]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[52]  Rob Kling,et al.  Organizational Analysis in Computer Science , 1993, Inf. Soc..

[53]  Russell Cropanzano,et al.  Justice in the workplace: Approaching fairness in human resource management. , 1993 .

[54]  J. Greenberg,et al.  The social side of fairness: Interpersonal and informational classes of organizational justice. , 1993 .

[55]  Judee K. Burgoon,et al.  Status and privacy restoring communication in the workplace , 1992 .

[56]  James O. Benedict,et al.  The Relationships between Privacy and Different Components of Job Satisfaction , 1992 .

[57]  A. Westin,et al.  Two key factors that belong in a macroergonomic analysis of electronic monitoring: Employee perceptions of fairness and the climate of organizational trust or distrust. , 1992, Applied ergonomics.

[58]  S. Petronio Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples , 1991 .

[59]  Linda D. Molm,et al.  Affect and Social Exchange: Satisfaction in Power-Dependence Relations , 1991 .

[60]  Richard Bugg,et al.  Research note: Functions of privacy in Australian wilderness environments , 1991 .

[61]  Margaret McLaughlin,et al.  The psychology of tactical communication. , 1990 .

[62]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[63]  G. S. Taylor,et al.  Individual privacy and computer-based human resource information systems , 1989 .

[64]  D. Stone,et al.  Individuals' attitudes toward organizational drug testing policies and practices. , 1989, The Journal of applied psychology.

[65]  J. Rubenfeld The Right of Privacy , 1989 .

[66]  William E. Hammitt,et al.  Cognitive dimensions of wilderness privacy: a field test and further explanation. , 1989 .

[67]  Pelle Ehn,et al.  Work-oriented design of computer artifacts , 1989 .

[68]  S Klitzman,et al.  The impact of the physical environment on the psychological well-being of office workers. , 1989, Social science & medicine.

[69]  J. W. DeCew,et al.  Uneasy Access: Privacy for Women in a Free Society , 1988 .

[70]  T. Tyler,et al.  The Social Psychology of Procedural Justice , 1988 .

[71]  J. Greenberg Using diaries to promote procedural justice in performance appraisals , 1987 .

[72]  Paul Attewell,et al.  Big brother and the sweatshop: computer surveillance in the automated office , 1987 .

[73]  Dianna L. Stone,et al.  Effects of missing application-blank information on personnel selection decisions: Do privacy protection strategies bias the outcome? , 1987 .

[74]  Warren Freedman The right of privacy in the computer age , 1987 .

[75]  Jerald Greenberg,et al.  Determinants of Perceived Fairness of Performance Evaluations , 1986 .

[76]  D. Stone Relationship between Introversion/Extraversion, Values regarding Control over Information, and Perceptions of Invasion of Privacy , 1986 .

[77]  J. Greenberg,et al.  The Distributive Justice of Organizational Performance Evaluations , 1986 .

[78]  P Adler,et al.  Employee privacy: legal and research developments and implications for personnel administration. , 1985, Sloan management review.

[79]  Paul Attewell,et al.  Computing and organizations: what we know and what we don't know , 1984, CACM.

[80]  William L. Prosser Philosophical Dimensions of Privacy: Privacy [a legal analysis] , 1984 .

[81]  W. Foddy A Critical Evaluation of Altman's Definition of Privacy as a Dialectical Process , 1984 .

[82]  Samuel D. Warren,et al.  Philosophical Dimensions of Privacy: The right to privacy [the implicit made explicit] , 1984 .

[83]  William E. Hammitt,et al.  Functions of privacy in wilderness environments , 1984 .

[84]  Hal G. Gueutal,et al.  A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .

[85]  Paul D. Tolchinsky,et al.  A Survey of Employee Perceptions of Information Privacy in Organizations , 1982 .

[86]  W. Hammitt Cognitive Dimensions of Wilderness Solitude , 1982 .

[87]  S. Birnbaum,et al.  The politics of privacy: Planning for personal data systems as powerful technologies , 1982, Proceedings of the IEEE.

[88]  D. Mcadam The Politics of Privacy: Planning for Personal Data Systems as Powerful Technologies , 1981 .

[89]  Paul D. Tolchinsky,et al.  Employee perceptions of invasion of privacy: A field simulation experiment. , 1981 .

[90]  I. Altman,et al.  Dialectic Conceptions In Social Psychology: An Application To Social Penetration And Privacy Regulation , 1981 .

[91]  Wayne D. Hoyer,et al.  Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .

[92]  O. Iwata TERRITORIALITY ORIENTATION, PRIVACY ORIENTATION AND LOCUS OF CONTROL AS DETERMINANTS OF THE PERCEPTION OF CROWDING , 1980 .

[93]  R. Gavison Privacy and the Limits of Law , 1980 .

[94]  Virginia E. Schein,et al.  Individual Privacy and Personnel Psychology: The Need for a Broader Perspective , 1977 .

[95]  F. M. Hoylman THE EFFECT OF PERSONAL CONTROL AND INSTRUMENTAL VALUE ON THE EXPERIENCE OF INVASION OF PRIVACY. , 1976 .

[96]  I. Altman Privacy: A Conceptual Analysis. , 1976 .

[97]  Louis Henkin,et al.  Privacy and Autonomy , 1974 .

[98]  R. Garrett The Nature of Privacy , 1974 .

[99]  N. J. Marshall DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.

[100]  B. Schwartz The Social Psychology of Privacy , 1968, American Journal of Sociology.

[101]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[102]  W. Kirchner,et al.  A note on the effect of privacy in taking typing tests. , 1966, The Journal of applied psychology.

[103]  H. Simon,et al.  The shape of automation for men and management , 1965 .

[104]  J. S. Adams,et al.  Inequity In Social Exchange , 1965 .

[105]  E. Goffman Behavior in public places : notes on the social organization of gatherings , 1964 .

[106]  P. Blau Exchange and Power in Social Life , 1964 .

[107]  Dorwin Cartwright,et al.  Studies in Social Power. , 1960 .

[108]  J. R. French,et al.  The bases of social power. , 1959 .

[109]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[110]  L. Strickland Surveillance and trust1 , 1958 .

[111]  G. C. Homans,et al.  Social Behavior as Exchange , 1958, American Journal of Sociology.

[112]  L. Strickland Surveillance and trust. , 1958, Journal of personality.

[113]  J. French,et al.  A formal theory of social power. , 1956, Psychological review.

[114]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .