Electronic monitoring in the workplace: if people don’t care, then what is the relevance?

This paper will start with a discussion of three different pieces of research concerning surveillance. The first study looks at the perception of surveillance by some of those people who supervise and implement it, namely by information systems or information technology professionals. The next study investigates students' perception of surveillance in their university while the last one is an in-depth study of two organisations with regard to surveillance. The combining factor of these three studies is that the subjects do not necessarily see surveillance as problematic. Given this surprising finding the paper will recount the arguments for and against surveillance as found in the literature. This will lead to a discussion of the reasons why individuals often do not seem to mind surveillance despite good evidence that it may be psychologically, morally, socially, and even economically harmful. The paper will end with a discussion of what these findings can mean for people interested in surveillance.

[1]  Edward J. O'Boyle,et al.  An ethical decision-making process for computing professionals , 2002, Ethics and Information Technology.

[2]  J. Stanton,et al.  Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange perspectives. , 2002 .

[3]  G. Armstrong,et al.  The Maximum Surveillance Society: The Rise of CCTV , 1999 .

[4]  D. Langford Internet Ethics , 2003 .

[5]  Duncan Langford Business Computer Ethics , 1999 .

[6]  T. Bynum Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing , 1991 .

[7]  Lucas D. Introna Workplace surveillance is unethical and unfair , 2002 .

[8]  M. Ronald Buckley,et al.  The Hypothesized Relationship Between Accountability and Ethical Behavior , 2001 .

[9]  John Weckert,et al.  Computer and Information Ethics , 1997 .

[10]  Raymond R. Panko,et al.  Monitoring for pornography and sexual harassment , 2002, CACM.

[11]  Richard A. Spinello,et al.  Cyberethics: Morality and Law in Cyberspace , 2001 .

[12]  M. Castells,et al.  The Hacker Ethic and the Spirit of the Information Age , 2001 .

[13]  J. Rubenfeld The Right of Privacy , 1989 .

[14]  Luiz Antonio Joia,et al.  IT-based management : challenges and solutions , 2003 .

[15]  Laura P. Hartman,et al.  Technology and Ethics: Privacy in the Workplace , 2001 .

[16]  David Lyon,et al.  Surveillance Studies: understanding visibility, mobility and the phenetic fix. , 2002 .

[17]  Lucas D. Introna Workplace surveillance, privacy and distributive justice , 2000, CSOC.

[18]  R. Solomon,et al.  Building Trust: In Business, Politics, Relationships, and Life , 2001 .

[19]  C. Ess Philosophical Perspectives on Computer-Mediated Communication , 1996 .

[20]  Richard G. Vedder,et al.  Privacy and security , 1996, CSOC.

[21]  Deborah G. Johnson Computer Ethics , 1985 .

[22]  M. Velasquez Business Ethics: Concepts and Cases , 1982 .

[23]  Mary J. Culnan,et al.  "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..

[24]  Bruce A. Reinig,et al.  Managing user perceptions of email privacy , 1995, CACM.

[25]  Keng Siau,et al.  Acceptable internet use policy , 2002, CACM.

[26]  Richard J. Severson,et al.  The Principles of Information Ethics , 1997 .

[27]  Jacques N. Catudal Censorship, the Internet, and the child pornography law of 1996: A critique , 2004, Ethics and Information Technology.

[28]  G. Gumpert,et al.  The Demise of Privacy in a Private World: From Front Porches to Chat Rooms , 1998 .

[29]  Gary T. Marx,et al.  What’s new about the “new surveillance”?: Classifying for change and continuity , 2004 .

[30]  Rasool Azari,et al.  Current Security Management & Ethical Issues of Information Technology , 2003 .

[31]  Stewart T. Fleming Biometrics: past, present and future , 2003 .

[32]  Leonard M. Jessup,et al.  Does electronic monitoring of employee internet usage work? , 2002, CACM.

[33]  J. Rachels Why privacy is important , 1985 .

[34]  M. Castells The Information Age: Economy, Society and Culture , 1999 .

[35]  M. Foucault,et al.  Surveiller et punir: Naissance de la prison , 1993 .

[36]  Philip Brey,et al.  Disclosive computer ethics , 2000, CSOC.

[37]  Donald Gotterbarn,et al.  Using the new ACM code of ethics in decision making , 1993, CACM.

[38]  Paul Thompson Fantasy Island: a Labour Process critique of the 'age of surveillance'. , 2002 .

[39]  H. Arendt,et al.  The Human Condition , 1960 .

[40]  Herman T. Tavani,et al.  Readings in Cyberethics , 2001 .

[41]  Reagan M. Ramsower,et al.  Cyberethics: Social and Moral Issues in the Computer Age , 2000 .

[42]  A. Adam Cyberstalking and Internet pornography: Gender and the gaze , 2002, Ethics and Information Technology.

[43]  Herman T. Tavani,et al.  Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.

[44]  R. Gavison Privacy and the Limits of Law , 1980 .

[45]  William S. Brown Ontological Security, Existential Anxiety and Workplace Privacy , 2000 .

[46]  D. Nye,et al.  The 'Privacy in Employment' Critique: A Consideration of Some of the Arguments for 'Ethical' HRM Professional Practice , 2002 .

[47]  Wes Sharrock,et al.  On the poverty of apriorism: Technology, surveillance in the workplace and employee responses , 2002 .

[48]  Norman E. Bowie,et al.  Book Review , 2001, Business Ethics Quarterly.

[49]  Marc Rotenberg,et al.  Communications privacy: implications for network design , 1993, CACM.

[50]  Nick Taylor,et al.  State Surveillance and the Right to Privacy. , 2002 .

[51]  Göran Collste Ethics in the Age of Information Technology , 2000 .

[52]  K. Ball The Labours of Surveillance , 2002 .

[53]  H. Nissenbaum Toward an Approach to Privacy in Public: Challenges of Information Technology , 1997 .

[54]  Robert Boncella Internet Privacy: At Home and At Work , 2001, Commun. Assoc. Inf. Syst..

[55]  James B. Rule,et al.  Preserving individual autonomy in an information-oriented society , 1991 .

[56]  Benjamin J. Goold,et al.  Public Area Surveillance and Police Work: the impact of CCTV on police behaviour and autonomy , 2002 .

[57]  Jeroen van den Hoven,et al.  Computer Ethics and Moral Methodology , 1997 .

[58]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[59]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[60]  Gregory J. Walters,et al.  Privacy and security: an ethical analysis , 2001, CSOC.

[61]  R. Posner Philosophical Dimensions of Privacy: An economic theory of privacy , 1984 .

[62]  Simon Rogerson Ethical Aspects of Information Technology: Issues for Senior Executives , 1998 .

[63]  R. Mason Four ethical issues of the information age , 1986 .

[64]  Dag Elgesem,et al.  The structure of rights in Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data , 1999, Ethics and Information Technology.

[65]  Deborah G. Johnson,et al.  Computers, ethics & social values , 1995 .

[66]  Amit Pinchevski,et al.  Ethics on the line , 2003 .

[67]  Lucas D. Introna Privacy and the computer: why we need privacy in the information society , 1997 .

[68]  R. Spinello Case studies in information and computer ethics , 1996 .

[69]  T. Forester,et al.  Computer ethics: Cautionary tales and ethical dilemmas in computing , 1990 .

[70]  Marjorie Ann Jerrard,et al.  A Case Study of How Technology and Trust Enable the Projectized Team-Based Organization , 2003 .

[71]  Michael J. Gallivan,et al.  Trust, control and the role of interorganizational systems in electronic partnerships , 2003, Inf. Syst. J..

[72]  W. Block Cyberslacking, Business Ethics and Managerial Economics , 2011 .