Information technology and privacy: a boundary management perspective

With the rising popularity of the Internet and some widely publicized occurrences of privacy loss due to information technology, many individuals have recently become more concerned with the privacy and security of sensitive information. These concerns have special relevance within work organizations because of the substantial amounts of data that organizations typically collect about the work and non-work activities of their employees. This chapter presents a new theoretical perspective called Information Boundary Theory, that describes whether, when, and why employees care about the privacy and security of sensitive information at work. Analysis of interview data from N=25 nonmanagerial U.S. workers provided preliminary support for four of the new theory's research propositions. The chapter describes implications of the theory and the research findings for the design and deployment of information technology systems within organizations and maps a research agenda for future uses of the theory.

[1]  S. Petronio Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples , 1991 .

[2]  Wayne D. Hoyer,et al.  Variables affecting perceptions of invasion of privacy in a personnel selection situation. , 1980 .

[3]  Dianna L. Stone,et al.  A multiple stakeholder model of privacy in organizations , 1998 .

[4]  R. Lewicki,et al.  Trust And Distrust: New Relationships and Realities , 1998 .

[5]  R. H. Moorman,et al.  A meta‐analytic review and empirical test of the potential confounding effects of social desirability response sets in organizational behaviour research , 1992 .

[6]  Elizabeth M. Weiss,et al.  Electronic monitoring in their own words: an exploratory study of employees' experiences with new types of surveillance , 2000 .

[7]  Jeffrey M. Stanton,et al.  Traditional and Electronic Monitoring from an Organizational Justice Perspective , 2000 .

[8]  Burke T. Ward,et al.  Ethical Management of Employee E-Mail Privacy , 1998, Inf. Syst. Manag..

[9]  V. E. Cangelosi,et al.  Effects of open versus closed physical environment on employee perception and attitude , 1988 .

[10]  Elizabeth Wolfe Morrison,et al.  Impression Management in the Feedback-Seeking Process: A Literaturereview and Research Agenda , 1991 .

[11]  Judee K. Burgoon,et al.  Status and privacy restoring communication in the workplace , 1992 .

[12]  G. Leventhal What Should Be Done with Equity Theory? New Approaches to the Study of Fairness in Social Relationships. , 1976 .

[13]  Sandra Petronio,et al.  Privacy binds in family interactions: The case of parental privacy invasion. , 1994 .

[14]  N. Feather,et al.  From values to actions: Recent applications of the expectancy-value model , 1988 .

[15]  Hal G. Gueutal,et al.  A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations , 1983 .

[16]  James O. Benedict,et al.  The Relationships between Privacy and Different Components of Job Satisfaction , 1992 .

[17]  N. Feather Values, valences, and choice: The influences of values on the perceived attractiveness and choice of alternatives. , 1995 .

[18]  R. Bies Interactional justice : communication criteria of fairness , 1986 .

[19]  Erik R. Eddy,et al.  THE EFFECTS OF INFORMATION MANAGEMENT POLICIES ON REACTIONS TO HUMAN RESOURCE INFORMATION SYSTEMS: AN INTEGRATION OF PRIVACY AND PROCEDURAL JUSTICE PERSPECTIVES , 1999 .

[20]  Robert A. Giacalone,et al.  Applied Impression Management: How Image-Making Affects Managerial Decisions , 1991 .

[21]  B. Kahin,et al.  Borders in Cyberspace: Information Policy and the Global Information Infrastructure , 1996 .

[22]  K. Miller,et al.  Intrinsic Motivation and Self-Determination in Human Behavior , 1975, Perspectives in Social Psychology.

[23]  Fred A. Mael,et al.  ‘Don't ask—Please tell’: Selection privacy from two perspectives , 1999 .

[24]  R. Bies,et al.  The predicament of injustice: The management of moral outrage. , 1987 .

[25]  G. Stoney Alder,et al.  Electronic Performance Monitoring , 1997 .

[26]  Paul E. Spector Behavior in organizations as a function of employee's locus of control. , 1982 .

[27]  David B. Greenberger,et al.  Development and Application of a Model of Personal Control in Organizations , 1986 .

[28]  W. Kirchner,et al.  A note on the effect of privacy in taking typing tests. , 1966, The Journal of applied psychology.

[29]  Paul D. Tolchinsky,et al.  A Survey of Employee Perceptions of Information Privacy in Organizations , 1982 .

[30]  J. Greenberg,et al.  The social side of fairness: Interpersonal and informational classes of organizational justice. , 1993 .

[31]  R. H. Willis,et al.  Social Exchange: Advances In Theory And Research , 1981 .

[32]  G. Alder Ethical Issues in Electronic Performance Monitoring: A Consideration of Deontological and Teleological Perspectives , 1998 .

[33]  Laura B. Pincus,et al.  THE DISPARITY BETWEEN PUBLIC AND PRIVATE SECTOR EMPLOYEE PRIVACY PROTECTIONS: A CALL FOR LEGITIMATE PRIVACY RIGHTS FOR PRIVATE SECTOR WORKERS , 1995 .

[34]  Dianna L. Stone,et al.  Effects of missing application-blank information on personnel selection decisions: Do privacy protection strategies bias the outcome? , 1987 .

[35]  I. Altman Privacy: A Conceptual Analysis. , 1976 .