Mine or ours: email privacy expectations, employee attitudes, and perceived work environment characteristics

In spite of the growing importance of ethical and privacy concerns in the information age, there is a surprising paucity of academic literature on the subject. The research reported in this paper attempts to address this gap by focusing on privacy perceptions related to email. We adopt a behavioral perspective on the use of email in that we treat email policy as an embodiment of managerial beliefs and values about the employer-employee relationship and the role of communication in the workplace. Specifically, we examine employee attitudes towards email, their perceptions and expectations regarding the privacy and ownership of email, and a variety of work environment characteristics. Drawing upon prior theoretical work in organizational behavior and the use of email in work contexts, we propose a variety of research hypotheses. Data gathered from a sample of 193 respondents which includes email users from two different national contexts with different email policies in the host organizations is used to test the hypotheses. While we do not examine the effects of a specific policy in this study, our results nonetheless have interesting implications for organizations desirous of constructing an email policy. Theoretical implications as well as guidelines for practicing managers are offered.

[1]  Jeff Smith,et al.  Privacy policies and practices: inside the organizational maze , 1993, CACM.

[2]  J CulnanMary How did they get my name , 1993 .

[3]  M. Aiken,et al.  Organizational Alienation: A Comparative Analysis , 1966 .

[4]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[5]  C. Muhl Workplace E-mail and Internet Use: Employees and Employers Beware. , 2003 .

[6]  Clare M. Sproule The effect of the USA Patriot Act on workplace privacy , 2002 .

[7]  Henk Sol,et al.  Proceedings of the 54th Hawaii International Conference on System Sciences , 1997, HICSS 2015.

[8]  Fred D. Davis,et al.  Motivating critical computer systems operators: job characteristics, controls, and relationships , 1997 .

[9]  Kenneth A. Kovach,et al.  The Balance Between Employee Privacy And Employer Interests , 2000 .

[10]  Lee Sproull,et al.  Reducing social context cues: electronic mail in organizational communication , 1986 .

[11]  J. Rubenfeld The Right of Privacy , 1989 .

[12]  J. Hackman,et al.  A New Strategy for Job Enrichment , 1975 .

[13]  J. Cappel A study of individuals' ethical beliefs and perceptions of electronic mail privacy , 1995 .

[14]  K. B. DeTienne Big brother is watching: computer monitoring and communication , 1994 .

[15]  Laura P. Hartman Ethics: The Rights and Wrongs of Workplace Snooping , 1998 .

[16]  Brian H. Kleiner,et al.  How organisations manage the issue of employee privacy today , 2003 .

[17]  Joey F. George,et al.  Computer-Based Monitoring: Common Perceptions and Empirical Results , 1996, MIS Q..

[18]  Hall Adams,et al.  E-Mail Monitoring in the Workplace: The Good, the Bad and the Ugly , 2000 .

[19]  Bruce A. Reinig,et al.  Managing user perceptions of email privacy , 1995, CACM.

[20]  Richard T. Pascale,et al.  The Paradox of “Corporate Culture”: Reconciling Ourselves to Socialization , 1985 .

[21]  H C Triandis,et al.  Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[22]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[23]  Brian H. Kleiner,et al.  How to monitor electronic mail to discover sexual harassment , 2000 .

[24]  Marlene E. Turner,et al.  The Organizational Behavior Reader , 1991 .

[25]  Alan D. Smith,et al.  E-Mail Workplace Privacy Issues in an Information-And Knowledge-Based Environment , 2001 .

[26]  Magid Igbaria,et al.  Development of a Measure of Personal Web Usage in the Workplace , 2004, Cyberpsychology Behav. Soc. Netw..

[27]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[28]  Kirsten E. Martin,et al.  Some Problems with Employee Monitoring , 2003 .

[29]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[30]  Maggie Johnson,et al.  Putting out the flames: the etiquette and law of e-mail , 1991 .

[31]  G. Hofstede Motivation, leadership, and organization: Do American theories apply abroad? , 1980 .

[32]  L. Porter,et al.  The Measurement of Organizational Commitment. , 1979 .

[33]  John Weckert,et al.  Privacy, the Workplace and the Internet , 1999, WebNet.

[34]  Raymond A. Katzell,et al.  Work motivation: Theory and practice. , 1990 .

[35]  JoAnn Greco PRIVACY WHOSE RIGHT IS IT ANYHOW , 2001 .

[36]  J Willwerth,et al.  "Hello? I'm home alone ..." Up to 10 million U.S. children are latchkey kids; hot lines are helping them battle fear and loneliness. , 1993, Time.