How perceptions of justice affect security attitudes: suggestions for practitioners and researchers

Purpose – Surveillance is seen as an important tool to prevent security breaches and may improve prosecutorial ability, but employees may engage in subtitle counterproductive behaviors in protest. This poses significant risks and costs to employers. The purpose of this paper is to summarize the results of a previous field study of the influences from justice perceptions as mitigation and prescribe some methods for addressing the issues that are raised.Design/methodology/approach – Drawing from protection motivation theory, the psychological contract, and the systems of organizational justice, a threat control model about surveillance attitudes is field‐tested in a randomized design.Findings – Trust and perceptions of justice mediated attitudes about surveillance practices; and threat severity and efficacy of surveillance in maintaining security moderated attitudes about corporate surveillance are founded.Originality/value – The paper illustrates the theoretical linkages between surveillance practices and ...

[1]  Meng Hsiang Hsu,et al.  An investigation of volitional control in information ethics , 2003, ICIS.

[2]  Torin Monahan,et al.  Surveillance and Security: Technological Politics and Power in Everyday Life , 2006 .

[3]  Harold W. Goldstein,et al.  The precursors and products of justice climates: Group leader antecedents and employee attitudinal consequences. , 2007 .

[4]  Charles S. Taber,et al.  Threat, Anxiety, and Support of Antiterrorism Policies , 2005 .

[5]  N. Fairweather Surveillance in Employment: The Case of Teleworking , 1999 .

[6]  Hans J. Eysenck,et al.  Creativity and personality: Word association, origence, and psychoticism , 1994 .

[7]  J. Ivancevich,et al.  Organizational behavior and management , 1985 .

[8]  Brian H. Kleiner,et al.  Electronic surveillance in the workplace , 2003 .

[9]  J. S. Adams,et al.  Inequity In Social Exchange , 1965 .

[10]  L. Cranor,et al.  Rethinking Rights and Regulations: Institutional Responses to New Communications Technologies , 2003 .

[11]  Hao Zhao,et al.  THE IMPACT OF PSYCHOLOGICAL CONTRACT BREACH ON WORK‐RELATED OUTCOMES: A META‐ANALYSIS , 2007 .

[12]  Anja J E Dirkzwager,et al.  The role of the media and media hypes in the aftermath of disasters. , 2005, Epidemiologic reviews.

[13]  D. Gefen,et al.  Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .

[14]  Kim S. Cameron,et al.  Developing management skills. , 1998, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[15]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[16]  M. A. Sey,et al.  Mobile Communication and Society: A Global Perspective (Information Revolution & Global Politics) , 2006 .

[17]  M. Goldberg,et al.  What to Convey in Antismoking Advertisements for Adolescents: The use of Protection Motivation Theory to Identify Effective Message Themes , 2003 .

[18]  Roger Clarke,et al.  Social Impacts of Transport Surveillance , 2006 .

[19]  Joel Brockner,et al.  Interactive Effects of Procedural Justice and Outcome Negativity on Victims and Survivors of Job Loss , 1994 .

[20]  Priscilla M. Regan,et al.  Surveillance and Mobilities. , 2002 .

[21]  Scott C. D'Urso,et al.  Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations , 2006 .

[22]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[23]  J. Stevens Applied Multivariate Statistics for the Social Sciences , 1986 .

[24]  Michael Workman,et al.  Fear Commerce: Inflationary Effects of Global Security Initiatives , 2008, Inf. Secur. J. A Glob. Perspect..

[25]  Daniel J. Brass,et al.  The Role of Instrumental and Expressive Social Ties in Employees' Perceptions of Organizational Justice , 2003, Organ. Sci..

[26]  David Holman,et al.  The Effects of Performance Monitoring on Emotional Labor and Well-Being in Call Centers , 2002 .

[27]  John T. Scholz Enforcement Policy and Corporate Misconduct: The Changing Perspective of Deterrence Theory , 1997 .

[28]  Detmar W. Straub,et al.  Security lapses and the omission of information security measures: A threat control model and empirical test , 2008, Comput. Hum. Behav..

[29]  Thomas M. Thomas,et al.  Network security first-step , 2004 .

[30]  Chris Argyris,et al.  Understanding organizational behavior , 1961 .

[31]  D. Davis,et al.  Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America , 2004 .

[32]  Neil Conway,et al.  Understanding psychological contracts at work: A critical evaluation of theory and research , 2006 .

[33]  Abdulrazzak Charbaji,et al.  Individuality, willingness to take risk, and use of a personal e‐card: A Lebanese study , 2005 .

[34]  Stefan Linnhoff,et al.  The Emergence of Biometrics and Its Effect on Consumers , 2005 .

[35]  Eirik Albrechtsen,et al.  A qualitative study of users' view on information security , 2007, Comput. Secur..

[36]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.

[37]  S. West,et al.  Multiple Regression: Testing and Interpreting Interactions. , 1994 .

[38]  A. D. De Lange,et al.  Psychological contract breach and job attitudes: A meta-analysis of age as a moderator , 2008 .

[39]  C. D. De Dreu,et al.  Social motives and trust in integrative negotiation : The disruptive effects of punitive capability , 1998 .

[40]  Eugene F. Stone,et al.  Clarifying some controversial issues surrounding statistical procedures for detecting moderator variables: Empirical evidence and related matters. , 1989 .

[41]  A. Bandura The self system in reciprocal determinism. , 1978 .

[42]  D. Dillman,et al.  How to conduct your own survey , 1994 .

[43]  K. Ball,et al.  The Intensification of surveillance: crime, terrorism and warfare in the information era , 2003 .

[44]  R. Rogers Cognitive and physiological processes in fear appeals and attitude change: a revised theory of prote , 1983 .

[45]  Charles Oppenheim,et al.  Legal aspects of the web , 2005, Annu. Rev. Inf. Sci. Technol..

[46]  B. Tabachnick,et al.  Using Multivariate Statistics , 1983 .

[47]  N. Noorderhaven,et al.  When Does Trust Matter to Alliance Performance , 2006 .

[48]  R. Ramanujam,et al.  EMPLOYEE SILENCE ON CRITICAL WORK ISSUES: THE CROSS LEVEL EFFECTS OF PROCEDURAL JUSTICE CLIMATE , 2008 .

[49]  John R. Aiello,et al.  Computer‐Based Work Monitoring: Electronic Surveillance and Its Effects , 1993 .

[50]  Rita Walczuch,et al.  Psychological antecedents of institution-based consumer trust in e-retailing , 2004, Inf. Manag..

[51]  R. W. Rogers,et al.  Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. , 1987, Journal of personality and social psychology.

[52]  Joy L. Hart,et al.  Workplace Surveillance and Managing Privacy Boundaries , 2007 .

[53]  Leigh Thompson,et al.  Primacy Effects in Justice Judgments: Testing Predictions from Fairness Heuristic Theory. , 2001, Organizational behavior and human decision processes.

[54]  Stuart J. Barnes,et al.  Initial trust and online buyer behaviour , 2007, Ind. Manag. Data Syst..

[55]  E. Eugene Schultz A framework for understanding and predicting insider attacks , 2002, Comput. Secur..

[56]  J. Braithwaite,et al.  Global Business Regulation , 2001 .

[57]  Rikke Frank Jørgensen,et al.  Human Rights in the Global Information Society , 2006 .