SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Electronic monitoring, privacy and trust: A
workplace related triad
by
Robert Orzanna
Student ID: 2902913
Submitted to the Faculty of Management
in the paper Individuals, Behaviour & Work
The University of Auckland
Auckland, New Zealand
September 2011
Abstract
This essay analyses the use of electronic monitoring in today organisations
and contrasts possible benefits and risks. Furthermore it outlines the interfer-
ence with the individual right to privacy and eventually attempts to understand
the influence of trust in this workplace related triad. It is finally suggested that
organisations should use a balanced monitoring policy which itself is supported
by a strong organisational trust culture. Research findings of the last years
will be thereby used to emphasise the overall importance of both, electronic
monitoring and trust.
i
Introduction
The last decades were dominated by an immense progress in technological develop-
ment that led to a paradigm shift induced through the era of computerisation. The
internet and other technologies that make use of it have a wide influence on different
facets of people’s present life. However, not only individual life has been changing but
also organisational life and culture is challenged through the new technological oppor-
tunities of governance and control (Mello, 2003). Nowadays especially organisations
in bureaucratic western cultures often cannot be imagined without comprehensive
electronic monitoring policies, such as if individual privacy and organisational trust
do not matter. How far should or can monitoring be taken in order to not sensibly
interfere privacy and to demolish the foundation for organisation-wide trust?
This essay analyses the concepts and implications of electronic monitoring, the
individual right to privacy and trust in the context of a workplace related triad.
Mainpart
The practise of monitoring is not a new phenomenon and its chances for organisations
have been acknowledged since the early decades of the 20th century where monitor-
ing was used to supervise individuals according to their productivity (Robertson,
1999). However, due to the rapid growth of technology and constant cost decreases
for those technologies in the past decades the possibilities and use completely have
been changing towards the new form of electronic monitoring. Electronic monitoring
refers to certain practices and policies undertaken by organisational management to
store, analyse and report information about individual workplace behaviour with the
use of computer technologies (Mishra and Crampton, 1998). In contrast to personal
monitoring through a supervisor electronic monitoring is rather impersonal, often
imperceptible and far more extensive with the possibility to gather almost all infor-
mation on individual workplace behaviour. Actual examples for monitoring practices
1
range from eavesdropping, internet monitoring, video surveillance, the interception
of voice and electronic mail, to location tracking within the organisation (Flanagan,
1994). Albeit the majority of electronic monitoring systems have been developed over
the recent years, the total use of monitoring practices is extensive. Referring to figures
from the Centre of Business Ethics1
for the year 2003 indicate that approximately 92
per cent of the surveyed organisations use at least one or more forms of electronic
monitoring and 20 per cent do not have a formal written monitoring policy. These
figures indicate that such an increased organisational interest for control may result
in ethical implications, primarily the loss of privacy for the individual who is likely
to pay the burden. This demonstrates the importance of a consensus on a proper use
of monitoring practices.
To begin with, the important question arises what possible benefits organisa-
tions perceive through to the use of electronic monitoring. According to King (2003)
thereby three fields of benefits can be differentiated.
− Measuring work performance. It is often argued that not only shareholders
but the overall organisation and even society have an incentive that organisational
members perform according their possible capabilities. A common assumption is that
improved performance of the individual leads to better goods and services that con-
sumers benefit from (i.e. the society), which positively impacts the revenues of the
organisation and eventually let the individual earn his laurels by benefiting from the
success of the organisations with regard to reduced likelihood of dismissal and in-
creased wages or noncash rewards. It is argued that by applying monitoring practices
organisational members are able to review their actual work performance and reveal
their deficits. Hence, from an individual perspective electronic monitoring may be
used as a performance evaluation and training component to improve the individual
skills (Greenlaw and Prundeanu, 1997). From an organisational perspective human
1
See survey “You’ve Got Mail...And the Boss Knows.”, Centre of Business Ethics at Bentley
College (2003).
2
resource management may be enabled to better consider work performance in their
decision-making, i.e. to discharge unproductive workforce.
− Non-work related surveillance. There are not only chances for work related
objectives. In many cases organisations monitor individuals by installing systems such
as video cameras to prevent thefts, protect organisational secrets and to ensure that
organisational resources are used for nothing but work related tasks (Green, 1997).
This becomes particularly relevant to organisations since individuals engage in non-
work activities on the internet, generally known as cyberslacking. However, those
activities often not only relate to personal use within the law but also to illegal inter-
net abuse with regard to pornography or copyright infringements (Rosenberg, 1999).
Without considering the reasons for individuals to cyberslack, from a perspective of
the posed damages, there could be argued in favour of surveillance as a chance to
protect the organisation and its stakeholders as well as other affected third parties
from possible damage.
− Information storage and retrieval. Electronic monitoring is often consid-
ered as useful and important with regard to the possibility to retrieve information
and data which have been deleted by organisational members, regardless of whether
this was done accidentally or on purpose (Leahy, 2002).
“Privacy is the condition of not having undocumented personal knowledge about
one possessed by others.” This definition from Parent (1992) points out that equally
which of the incentives above drive an organisation to use electronic monitoring sys-
tems and how legitimate the purpose may be viewed from the perspective of an or-
ganisation, eventually they all interfere with the individual privacy in the workplace.
Thereby the decision about the scale of electronic monitoring used by organisations
refers to an ethical problem. If privacy is seen as a universal and inviolable hu-
man right such as constituted by law2
, then there is no tolerance for any monitoring
2
see The Universal Declaration of Human Rights, Article 12.
3
practice as long as the individual does not accept it by choice.
Apart from the general issue of the interference of privacy, especially in practice,
electronic monitoring bears another risk. Where is the sensible data stored and how
is the access authorisation defined? Organisations that apply electronic monitoring
should respond to these issues with a information storage policy that strictly defines
permissions and saves logged data securely. However, in the popular race for cost
leadership it is not unusual for organisations to outsource their information technol-
ogy to reduce costs and let the infrastructure be managed by specialised technology
corporations. It is questionable whether a confiding handling of sensitive information
can be guaranteed when the provided data is stored on servers provided by external
organisations or even in a virtual cloud where access rules are rather unclear than
obvious.
With regard to the chances and risks it is suggested for organisations to establish
balanced monitoring practices that serve a protective function, not only for the organ-
isation and the wider society but also bearing in mind the individual member’s right
to privacy and the freedom to evolve. Establishing too strict monitoring controls,
however, has a lot more consequences. Research shows that too strict monitoring
rules induces stress and tensions for an individual as he has to be more concerned
his work progress and whether he works according to his specifications (see Tabak
and Smith, 2005). Whilst increased monitoring may be positively correlated with
productivity increases on short-term, it causes psychological and physiological health
problems, lowers morale and increases dissatisfaction on a long-term perspective as
individuals perceive an existent environment of distrust (Tabak and Smith, 2005).
When the perceived control over the own work diminishes, eventually also creativ-
ity may extenuate. Individuals will not bear the risk to think creatively as creative
thinking can lead to failures which are then punished through performance orientated
monitoring. That is, what was prior related to the chance for work performance and
4
its measurability is certainly a controversial field as monitoring attempts to measure
performance by objectifying the individual work (Worsnop, 1993). Practical examples
are the measurement of keystrokes or the time that the computer remains idle. Such
objectivity, one the one hand an unbiased performance evaluation, however, on the
other hand may not reflect the actual value of an individual work and eventually neg-
atively impacts the motivation of an individual to do high-quality non-measurable
work (Lund, 1992). An organisation which relies on such performance indicators
gained through monitoring may not be able to take proper decisions when its general
decision-making is solely based on such performance indicators.
So far the chances and risks and the resulting need for a proper balance between
them were outlined. However, it is also important to consider the circumstances un-
der that electronic monitoring are be practised by an organisation. First of all, what
if an organisational member does not even know that he is being monitored? Figures
for the U.S. show that about 20 per cent of the surveyed organisations do not inform
organisational members about their monitoring practices3
. Hence, secret monitoring
may not be a seldom practise at all. And it may be attracting at first glance. As
long as individuals are not informed about the monitoring practices in an organisa-
tion, increased stress and tensions are likely to not occur. However, to intrude into
the privacy of an individual without his awareness is an ethical issue and it raises
critical thoughts about the legal provision of countries such as the United States
whose Electronic Communication Privacy Act (ECPA) does not explicitly forbid se-
cret monitoring as long as no wire, oral or electronic communication is intercepted
(King, 2003). In other countries such as Germany, secret monitoring is prohibited
and organisations must inform organisational members that they are being monitored
in the workplace and by accepting a job offer, the individual gives his consent to the
monitoring policies (Rothstein, 2000). It may then be argued that the overall organ-
3
See footnote 1.
5
isation mutually agreed on corporate monitoring practices. Nevertheless it may still
be problematical. What if special circumstances forces an individual to accept that
he is being monitored although it does not align with his perceived value of privacy
and conviction? Individual circumstances such as sudden dismissal as well as societal
circumstances such as economic recession or high unemployment may have left him
no other choice to accept the intrusion into his privacy.
The arguments above consider the right and possibility to enforce monitoring
practices on the side of the management of organisations. However, eventually the
generational change may have the largest impact on whether organisations are actu-
ally able to establish monitoring practices or not. Since the invention of the internet a
new generation grew up who essentially differentiate themselves from previous gener-
ations. The so-called NetGen, grown up with the further development of the internet,
define the young working class from today who have different values, attitudes and
beliefs which are reflected in their workplace behaviour. These young individuals
tend to say what they think, are against hierarchical systems, disloyal in the sense
that they do not want to bound themselves lifelong to a particular organisation and
are often rebellious (Burke and Ng, 2006). A lot of them are well educated that
make them valuable for organisation to cope the entrepreneurial challenges that they
are faced with. Rather than being depended of the organisation the opposite may
be true and organisations therefore have to be concerned about the own attraction
as an employer (Burke and Cooper, 2006). Thus, it is questionable whether and to
what extent monitoring is practised can be decided solely by management without
considering the voice of the workforce.
Culture and trust, two factors that itself are strongly interrelated, influence whether
and to what extent electronic monitoring is practised in organisations. Whilst bu-
reaucratic cultures such as the U.S. prefer electronic monitoring for its control and
6
performance reasons, supportive cultures such as Japan most often disagree to an ex-
tensive use of monitoring practices as they perceive it as a want of confidence (Stoney,
2001).
It is important to understand therefore how trust is formed and how it influences
the acceptance of monitoring practices. In general trust is viewed as the interpersonal,
willingness to belief and depend on another party (Mayer and Schoorman, 1995). Ac-
cording to Tabak and Smith (2005) individuals categorise other individuals into either
trustworthy or not trustworthy depending on three factors: (1) Their experiences in
the current organisation, (2) their past experiences in other organisations and (3)
their fundamental disposition to trust. Depending on the categorisation processed
by management and organisational members will eventually influence the extent of
the use and the acceptance of monitoring systems. As stated above, a management
that perceives others as not trustworthy is likely to control more whereas individuals
perceiving management as not trustworthy will not see monitoring practices soley as
for their own benefit but perceive a loss of privacy and are likely to respond with
turnovers or lower commitment.
Conclusion
“Trust, but verify.”, a quote in the range of politics that may be also applied by
organisations. As stated above, trust has an enormous influence on how electronic
monitoring is perceived and whether certain practises are applied or not. However,
trust and control must be balanced as in general too much trust is encroached and
too much control results in financial and personal losses. Overall the practise of
electronic monitoring in the workplace is a controversial issue. There are chances
that inexorably interfere with the risk for the individual loss of privacy. But still
monitoring may be sensible as long as it is serviceable for the whole thing, guided by
monitoring policies for reasonable business purposes such as for the benefit and safety
of an individual within an organisation, when it is deployed as a feedback or training
7
module with the voluntary approval of the individual in work tasks which benefit
from it such as in the helpline industry to analyse and improve customer interaction.
On the contrary, monitoring individuals on the purpose of storing sensible data
such as the individual time spent on the lavatory or information about possible love
affairs of individuals are hard to justify.4
They bear the risk that the experienced
loss of the democratic foundation and values in the political sphere in many western
democratic countries becomes eventually also part of our working life. It is certainly
worth to think whether this further shift towards a total surveillance society is an
appreciated step in human life.
4
These forms of electronic monitoring became public in 2008 and refer to one of the largest
scandals of employee surveillance undertaken by the German supermarket chain Lidl.
8
References
R. Burke and C. Cooper. The human resource revolution. Elsevier, Oxford, 2006.
R. Burke and E. Ng. The changing nature of work and organizations: Implications
for human resource managment. Human Resource Management Review, 16:86–94,
2006.
J. Flanagan. Restricting electronic monitoring in the private workplace. Duke Law
Journal, 43(6):1256–1281, 1994.
G. Green. Occupational Crime. Nelson-Hall, Chicago, 2nd. edition, 1997.
P. Greenlaw and C. Prundeanu. The impact of federal legislation to limit electronic
monitoring. Public Personnel Management, 26:227–244, 1997.
N. King. Electronic monitoring to promote national security impacts workplace pri-
vacy. Employee Responsibilities and Rights Journal, 15:127–147, 2003.
M. Leahy. Recovery and reconstruction of electronic email as evidence. American
Jurisprudence Proof of Facts, 41(3d.):1, 2002.
J. Lund. Electronic performance monitoring: A review of the research issues. Applied
Ergonomics, 23(1):54–58, 1992.
D. J. Mayer, R.C. and F. Schoorman. An integrative model of organizational trust.
Academy of Management Review, 20:709–734, 1995.
J. Mello. The evolving nature of employment relationship: Reconsidering employee
responsibilities and rights. Employee Responsibilities and Rights Journal, 15:99–
101, 2003.
J. Mishra and S. Crampton. Employee monitoring: privacy in the workplace? Society
for the Advancement of Management, v68(n3), 1998.
P. Parent. “Privacy.” Philosophical Issues in Journalism. Oxford University Press,
New York, 1992.
P. Robertson. Authority and control in modern industry: theoretical and empirical
perspectives. Routledge, London, 1999.
R. Rosenberg. The workplace on the verge of the 21st century. Journal of Business
Ethics, 22:3–14, 1999.
L. Rothstein. Privacy or dignity: Electronic monitoring in the workplace. New York
Law Journal of International and Comparative Law, 19:379, 2000.
A. Stoney. Employee reactions to electronic performance monitoring: A consequence
of organizational culture. Journal of High Technology Management Research, 12:
323–342, 2001.
9
F. Tabak and W. Smith. Privacy and electronic monitoring in the workplace: A model
of managerial cognition and relational trust development. Employee Responsibilites
and Rights Journal, 17(3):173–189, 2005.
R. Worsnop. Privacy in the workplace. CQ Researcher, pages 1011–1025, 1993.
10

Más contenido relacionado

La actualidad más candente

A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2IAEME Publication
 
Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...
	Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...	Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...
Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...inventionjournals
 
Research insights - state of network security
Research insights - state of network securityResearch insights - state of network security
Research insights - state of network securityMiguel Mello
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloJohn Intindolo
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
SafeguardsintheworkplaceAdam Richards
 
Security and ethical challenges of it
Security and ethical challenges of itSecurity and ethical challenges of it
Security and ethical challenges of itPraveen Choursiya
 
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMA DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMIAEME Publication
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
2010 survey on information security business
2010 survey on information security business2010 survey on information security business
2010 survey on information security businessHai Nguyen
 
Mit csail-tr-2007-034
Mit csail-tr-2007-034Mit csail-tr-2007-034
Mit csail-tr-2007-034vafopoulos
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threatmilliemill
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technologyAditya
 
Ethics in an information society
Ethics in an information societyEthics in an information society
Ethics in an information societyPrakash Raval
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 

La actualidad más candente (20)

softwss
softwsssoftwss
softwss
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2
 
Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...
	Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...	Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...
Benefit Mediation Effect to Influence Perception of Benefits, Perception of ...
 
Research insights - state of network security
Research insights - state of network securityResearch insights - state of network security
Research insights - state of network security
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
ISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_IntindoloISSC481_Term_Paper_John_Intindolo
ISSC481_Term_Paper_John_Intindolo
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
Safeguardsintheworkplace
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Security and ethical challenges of it
Security and ethical challenges of itSecurity and ethical challenges of it
Security and ethical challenges of it
 
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMA DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
 
2010 survey on information security business
2010 survey on information security business2010 survey on information security business
2010 survey on information security business
 
Mit csail-tr-2007-034
Mit csail-tr-2007-034Mit csail-tr-2007-034
Mit csail-tr-2007-034
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threat
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
Ethics in an information society
Ethics in an information societyEthics in an information society
Ethics in an information society
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 

Similar a Electronic monitoring, privacy and trust in the workplace

Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...IJECEIAES
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Karlos Svoboda
 
Running head Ethical concerns in ComputingEthical concerns in C.docx
Running head Ethical concerns in ComputingEthical concerns in C.docxRunning head Ethical concerns in ComputingEthical concerns in C.docx
Running head Ethical concerns in ComputingEthical concerns in C.docxcharisellington63520
 
Ethics Research Paper-Employee Surveillance
Ethics Research Paper-Employee SurveillanceEthics Research Paper-Employee Surveillance
Ethics Research Paper-Employee Surveillanceitsika
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
IntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxIntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxnormanibarber20063
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxmakdul
 
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...IRJET Journal
 
Examining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toExamining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toAli Zeinoddini Meymand
 
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCERIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCEVARUN KESAVAN
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Managementijitcs
 
Privacy and Personal Data Protection in Electronic Voting: Factors and Measures
Privacy and Personal Data Protection in Electronic Voting: Factors and MeasuresPrivacy and Personal Data Protection in Electronic Voting: Factors and Measures
Privacy and Personal Data Protection in Electronic Voting: Factors and MeasuresTELKOMNIKA JOURNAL
 

Similar a Electronic monitoring, privacy and trust in the workplace (20)

Case study 7
Case study 7Case study 7
Case study 7
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...Survey of accountability, trust, consent, tracking, security and privacy mech...
Survey of accountability, trust, consent, tracking, security and privacy mech...
 
Review questions
Review questionsReview questions
Review questions
 
Running head Ethical concerns in ComputingEthical concerns in C.docx
Running head Ethical concerns in ComputingEthical concerns in C.docxRunning head Ethical concerns in ComputingEthical concerns in C.docx
Running head Ethical concerns in ComputingEthical concerns in C.docx
 
Ethics Research Paper-Employee Surveillance
Ethics Research Paper-Employee SurveillanceEthics Research Paper-Employee Surveillance
Ethics Research Paper-Employee Surveillance
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
IntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docxIntroductionIT has revolutionized the entire scope of work env.docx
IntroductionIT has revolutionized the entire scope of work env.docx
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
 
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...
IRJET- Deterrence Theory for Evaluating Information Security Factors in E-Hea...
 
Examining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toExamining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related to
 
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCERIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Management
 
Privacy and Personal Data Protection in Electronic Voting: Factors and Measures
Privacy and Personal Data Protection in Electronic Voting: Factors and MeasuresPrivacy and Personal Data Protection in Electronic Voting: Factors and Measures
Privacy and Personal Data Protection in Electronic Voting: Factors and Measures
 

Más de Or Schiro

Business Opportunities in Advancing Sustainable Lifestyles in Greater Boston
Business Opportunities in Advancing Sustainable Lifestyles in Greater BostonBusiness Opportunities in Advancing Sustainable Lifestyles in Greater Boston
Business Opportunities in Advancing Sustainable Lifestyles in Greater BostonOr Schiro
 
Slides for video presentation
Slides for video presentationSlides for video presentation
Slides for video presentationOr Schiro
 
Deulingo (Arbeitssystem Deutsch als Fremdsprache): Kursstufe A1 / Kapitel 1 /...
Deulingo (Arbeitssystem Deutsch als Fremdsprache): Kursstufe A1 / Kapitel 1 /...Deulingo (Arbeitssystem Deutsch als Fremdsprache): Kursstufe A1 / Kapitel 1 /...
Deulingo (Arbeitssystem Deutsch als Fremdsprache): Kursstufe A1 / Kapitel 1 /...Or Schiro
 
Sheets To Succeed.today
Sheets To Succeed.todaySheets To Succeed.today
Sheets To Succeed.todayOr Schiro
 
A1 Deutsch Einführung Vorbereitung auf das Zertifikat A1
A1 Deutsch Einführung Vorbereitung auf das Zertifikat A1A1 Deutsch Einführung Vorbereitung auf das Zertifikat A1
A1 Deutsch Einführung Vorbereitung auf das Zertifikat A1Or Schiro
 
247270522-Taxation-and-Risk-Taking-with-Multiple-Tax-Rates
247270522-Taxation-and-Risk-Taking-with-Multiple-Tax-Rates247270522-Taxation-and-Risk-Taking-with-Multiple-Tax-Rates
247270522-Taxation-and-Risk-Taking-with-Multiple-Tax-RatesOr Schiro
 
246983849-Agroforestry-An-adaptation-measure-for-sub-Saharan-African-food-sys...
246983849-Agroforestry-An-adaptation-measure-for-sub-Saharan-African-food-sys...246983849-Agroforestry-An-adaptation-measure-for-sub-Saharan-African-food-sys...
246983849-Agroforestry-An-adaptation-measure-for-sub-Saharan-African-food-sys...Or Schiro
 
Lead market potential for mbr in China
Lead market potential for mbr in ChinaLead market potential for mbr in China
Lead market potential for mbr in ChinaOr Schiro
 
246009242-New-entrant-firm-s-survival-and-market-niche-creation-within-the-mo...
246009242-New-entrant-firm-s-survival-and-market-niche-creation-within-the-mo...246009242-New-entrant-firm-s-survival-and-market-niche-creation-within-the-mo...
246009242-New-entrant-firm-s-survival-and-market-niche-creation-within-the-mo...Or Schiro
 
255229697-The-Role-of-Subversive-Humour-at-the-Workplace
255229697-The-Role-of-Subversive-Humour-at-the-Workplace255229697-The-Role-of-Subversive-Humour-at-the-Workplace
255229697-The-Role-of-Subversive-Humour-at-the-WorkplaceOr Schiro
 

Más de Or Schiro (10)

Business Opportunities in Advancing Sustainable Lifestyles in Greater Boston
Business Opportunities in Advancing Sustainable Lifestyles in Greater BostonBusiness Opportunities in Advancing Sustainable Lifestyles in Greater Boston
Business Opportunities in Advancing Sustainable Lifestyles in Greater Boston
 
Slides for video presentation
Slides for video presentationSlides for video presentation
Slides for video presentation
 
Deulingo (Arbeitssystem Deutsch als Fremdsprache): Kursstufe A1 / Kapitel 1 /...
Deulingo (Arbeitssystem Deutsch als Fremdsprache): Kursstufe A1 / Kapitel 1 /...Deulingo (Arbeitssystem Deutsch als Fremdsprache): Kursstufe A1 / Kapitel 1 /...
Deulingo (Arbeitssystem Deutsch als Fremdsprache): Kursstufe A1 / Kapitel 1 /...
 
Sheets To Succeed.today
Sheets To Succeed.todaySheets To Succeed.today
Sheets To Succeed.today
 
A1 Deutsch Einführung Vorbereitung auf das Zertifikat A1
A1 Deutsch Einführung Vorbereitung auf das Zertifikat A1A1 Deutsch Einführung Vorbereitung auf das Zertifikat A1
A1 Deutsch Einführung Vorbereitung auf das Zertifikat A1
 
247270522-Taxation-and-Risk-Taking-with-Multiple-Tax-Rates
247270522-Taxation-and-Risk-Taking-with-Multiple-Tax-Rates247270522-Taxation-and-Risk-Taking-with-Multiple-Tax-Rates
247270522-Taxation-and-Risk-Taking-with-Multiple-Tax-Rates
 
246983849-Agroforestry-An-adaptation-measure-for-sub-Saharan-African-food-sys...
246983849-Agroforestry-An-adaptation-measure-for-sub-Saharan-African-food-sys...246983849-Agroforestry-An-adaptation-measure-for-sub-Saharan-African-food-sys...
246983849-Agroforestry-An-adaptation-measure-for-sub-Saharan-African-food-sys...
 
Lead market potential for mbr in China
Lead market potential for mbr in ChinaLead market potential for mbr in China
Lead market potential for mbr in China
 
246009242-New-entrant-firm-s-survival-and-market-niche-creation-within-the-mo...
246009242-New-entrant-firm-s-survival-and-market-niche-creation-within-the-mo...246009242-New-entrant-firm-s-survival-and-market-niche-creation-within-the-mo...
246009242-New-entrant-firm-s-survival-and-market-niche-creation-within-the-mo...
 
255229697-The-Role-of-Subversive-Humour-at-the-Workplace
255229697-The-Role-of-Subversive-Humour-at-the-Workplace255229697-The-Role-of-Subversive-Humour-at-the-Workplace
255229697-The-Role-of-Subversive-Humour-at-the-Workplace
 

Electronic monitoring, privacy and trust in the workplace

  • 1. Electronic monitoring, privacy and trust: A workplace related triad by Robert Orzanna Student ID: 2902913 Submitted to the Faculty of Management in the paper Individuals, Behaviour & Work The University of Auckland Auckland, New Zealand September 2011
  • 2. Abstract This essay analyses the use of electronic monitoring in today organisations and contrasts possible benefits and risks. Furthermore it outlines the interfer- ence with the individual right to privacy and eventually attempts to understand the influence of trust in this workplace related triad. It is finally suggested that organisations should use a balanced monitoring policy which itself is supported by a strong organisational trust culture. Research findings of the last years will be thereby used to emphasise the overall importance of both, electronic monitoring and trust. i
  • 3. Introduction The last decades were dominated by an immense progress in technological develop- ment that led to a paradigm shift induced through the era of computerisation. The internet and other technologies that make use of it have a wide influence on different facets of people’s present life. However, not only individual life has been changing but also organisational life and culture is challenged through the new technological oppor- tunities of governance and control (Mello, 2003). Nowadays especially organisations in bureaucratic western cultures often cannot be imagined without comprehensive electronic monitoring policies, such as if individual privacy and organisational trust do not matter. How far should or can monitoring be taken in order to not sensibly interfere privacy and to demolish the foundation for organisation-wide trust? This essay analyses the concepts and implications of electronic monitoring, the individual right to privacy and trust in the context of a workplace related triad. Mainpart The practise of monitoring is not a new phenomenon and its chances for organisations have been acknowledged since the early decades of the 20th century where monitor- ing was used to supervise individuals according to their productivity (Robertson, 1999). However, due to the rapid growth of technology and constant cost decreases for those technologies in the past decades the possibilities and use completely have been changing towards the new form of electronic monitoring. Electronic monitoring refers to certain practices and policies undertaken by organisational management to store, analyse and report information about individual workplace behaviour with the use of computer technologies (Mishra and Crampton, 1998). In contrast to personal monitoring through a supervisor electronic monitoring is rather impersonal, often imperceptible and far more extensive with the possibility to gather almost all infor- mation on individual workplace behaviour. Actual examples for monitoring practices 1
  • 4. range from eavesdropping, internet monitoring, video surveillance, the interception of voice and electronic mail, to location tracking within the organisation (Flanagan, 1994). Albeit the majority of electronic monitoring systems have been developed over the recent years, the total use of monitoring practices is extensive. Referring to figures from the Centre of Business Ethics1 for the year 2003 indicate that approximately 92 per cent of the surveyed organisations use at least one or more forms of electronic monitoring and 20 per cent do not have a formal written monitoring policy. These figures indicate that such an increased organisational interest for control may result in ethical implications, primarily the loss of privacy for the individual who is likely to pay the burden. This demonstrates the importance of a consensus on a proper use of monitoring practices. To begin with, the important question arises what possible benefits organisa- tions perceive through to the use of electronic monitoring. According to King (2003) thereby three fields of benefits can be differentiated. − Measuring work performance. It is often argued that not only shareholders but the overall organisation and even society have an incentive that organisational members perform according their possible capabilities. A common assumption is that improved performance of the individual leads to better goods and services that con- sumers benefit from (i.e. the society), which positively impacts the revenues of the organisation and eventually let the individual earn his laurels by benefiting from the success of the organisations with regard to reduced likelihood of dismissal and in- creased wages or noncash rewards. It is argued that by applying monitoring practices organisational members are able to review their actual work performance and reveal their deficits. Hence, from an individual perspective electronic monitoring may be used as a performance evaluation and training component to improve the individual skills (Greenlaw and Prundeanu, 1997). From an organisational perspective human 1 See survey “You’ve Got Mail...And the Boss Knows.”, Centre of Business Ethics at Bentley College (2003). 2
  • 5. resource management may be enabled to better consider work performance in their decision-making, i.e. to discharge unproductive workforce. − Non-work related surveillance. There are not only chances for work related objectives. In many cases organisations monitor individuals by installing systems such as video cameras to prevent thefts, protect organisational secrets and to ensure that organisational resources are used for nothing but work related tasks (Green, 1997). This becomes particularly relevant to organisations since individuals engage in non- work activities on the internet, generally known as cyberslacking. However, those activities often not only relate to personal use within the law but also to illegal inter- net abuse with regard to pornography or copyright infringements (Rosenberg, 1999). Without considering the reasons for individuals to cyberslack, from a perspective of the posed damages, there could be argued in favour of surveillance as a chance to protect the organisation and its stakeholders as well as other affected third parties from possible damage. − Information storage and retrieval. Electronic monitoring is often consid- ered as useful and important with regard to the possibility to retrieve information and data which have been deleted by organisational members, regardless of whether this was done accidentally or on purpose (Leahy, 2002). “Privacy is the condition of not having undocumented personal knowledge about one possessed by others.” This definition from Parent (1992) points out that equally which of the incentives above drive an organisation to use electronic monitoring sys- tems and how legitimate the purpose may be viewed from the perspective of an or- ganisation, eventually they all interfere with the individual privacy in the workplace. Thereby the decision about the scale of electronic monitoring used by organisations refers to an ethical problem. If privacy is seen as a universal and inviolable hu- man right such as constituted by law2 , then there is no tolerance for any monitoring 2 see The Universal Declaration of Human Rights, Article 12. 3
  • 6. practice as long as the individual does not accept it by choice. Apart from the general issue of the interference of privacy, especially in practice, electronic monitoring bears another risk. Where is the sensible data stored and how is the access authorisation defined? Organisations that apply electronic monitoring should respond to these issues with a information storage policy that strictly defines permissions and saves logged data securely. However, in the popular race for cost leadership it is not unusual for organisations to outsource their information technol- ogy to reduce costs and let the infrastructure be managed by specialised technology corporations. It is questionable whether a confiding handling of sensitive information can be guaranteed when the provided data is stored on servers provided by external organisations or even in a virtual cloud where access rules are rather unclear than obvious. With regard to the chances and risks it is suggested for organisations to establish balanced monitoring practices that serve a protective function, not only for the organ- isation and the wider society but also bearing in mind the individual member’s right to privacy and the freedom to evolve. Establishing too strict monitoring controls, however, has a lot more consequences. Research shows that too strict monitoring rules induces stress and tensions for an individual as he has to be more concerned his work progress and whether he works according to his specifications (see Tabak and Smith, 2005). Whilst increased monitoring may be positively correlated with productivity increases on short-term, it causes psychological and physiological health problems, lowers morale and increases dissatisfaction on a long-term perspective as individuals perceive an existent environment of distrust (Tabak and Smith, 2005). When the perceived control over the own work diminishes, eventually also creativ- ity may extenuate. Individuals will not bear the risk to think creatively as creative thinking can lead to failures which are then punished through performance orientated monitoring. That is, what was prior related to the chance for work performance and 4
  • 7. its measurability is certainly a controversial field as monitoring attempts to measure performance by objectifying the individual work (Worsnop, 1993). Practical examples are the measurement of keystrokes or the time that the computer remains idle. Such objectivity, one the one hand an unbiased performance evaluation, however, on the other hand may not reflect the actual value of an individual work and eventually neg- atively impacts the motivation of an individual to do high-quality non-measurable work (Lund, 1992). An organisation which relies on such performance indicators gained through monitoring may not be able to take proper decisions when its general decision-making is solely based on such performance indicators. So far the chances and risks and the resulting need for a proper balance between them were outlined. However, it is also important to consider the circumstances un- der that electronic monitoring are be practised by an organisation. First of all, what if an organisational member does not even know that he is being monitored? Figures for the U.S. show that about 20 per cent of the surveyed organisations do not inform organisational members about their monitoring practices3 . Hence, secret monitoring may not be a seldom practise at all. And it may be attracting at first glance. As long as individuals are not informed about the monitoring practices in an organisa- tion, increased stress and tensions are likely to not occur. However, to intrude into the privacy of an individual without his awareness is an ethical issue and it raises critical thoughts about the legal provision of countries such as the United States whose Electronic Communication Privacy Act (ECPA) does not explicitly forbid se- cret monitoring as long as no wire, oral or electronic communication is intercepted (King, 2003). In other countries such as Germany, secret monitoring is prohibited and organisations must inform organisational members that they are being monitored in the workplace and by accepting a job offer, the individual gives his consent to the monitoring policies (Rothstein, 2000). It may then be argued that the overall organ- 3 See footnote 1. 5
  • 8. isation mutually agreed on corporate monitoring practices. Nevertheless it may still be problematical. What if special circumstances forces an individual to accept that he is being monitored although it does not align with his perceived value of privacy and conviction? Individual circumstances such as sudden dismissal as well as societal circumstances such as economic recession or high unemployment may have left him no other choice to accept the intrusion into his privacy. The arguments above consider the right and possibility to enforce monitoring practices on the side of the management of organisations. However, eventually the generational change may have the largest impact on whether organisations are actu- ally able to establish monitoring practices or not. Since the invention of the internet a new generation grew up who essentially differentiate themselves from previous gener- ations. The so-called NetGen, grown up with the further development of the internet, define the young working class from today who have different values, attitudes and beliefs which are reflected in their workplace behaviour. These young individuals tend to say what they think, are against hierarchical systems, disloyal in the sense that they do not want to bound themselves lifelong to a particular organisation and are often rebellious (Burke and Ng, 2006). A lot of them are well educated that make them valuable for organisation to cope the entrepreneurial challenges that they are faced with. Rather than being depended of the organisation the opposite may be true and organisations therefore have to be concerned about the own attraction as an employer (Burke and Cooper, 2006). Thus, it is questionable whether and to what extent monitoring is practised can be decided solely by management without considering the voice of the workforce. Culture and trust, two factors that itself are strongly interrelated, influence whether and to what extent electronic monitoring is practised in organisations. Whilst bu- reaucratic cultures such as the U.S. prefer electronic monitoring for its control and 6
  • 9. performance reasons, supportive cultures such as Japan most often disagree to an ex- tensive use of monitoring practices as they perceive it as a want of confidence (Stoney, 2001). It is important to understand therefore how trust is formed and how it influences the acceptance of monitoring practices. In general trust is viewed as the interpersonal, willingness to belief and depend on another party (Mayer and Schoorman, 1995). Ac- cording to Tabak and Smith (2005) individuals categorise other individuals into either trustworthy or not trustworthy depending on three factors: (1) Their experiences in the current organisation, (2) their past experiences in other organisations and (3) their fundamental disposition to trust. Depending on the categorisation processed by management and organisational members will eventually influence the extent of the use and the acceptance of monitoring systems. As stated above, a management that perceives others as not trustworthy is likely to control more whereas individuals perceiving management as not trustworthy will not see monitoring practices soley as for their own benefit but perceive a loss of privacy and are likely to respond with turnovers or lower commitment. Conclusion “Trust, but verify.”, a quote in the range of politics that may be also applied by organisations. As stated above, trust has an enormous influence on how electronic monitoring is perceived and whether certain practises are applied or not. However, trust and control must be balanced as in general too much trust is encroached and too much control results in financial and personal losses. Overall the practise of electronic monitoring in the workplace is a controversial issue. There are chances that inexorably interfere with the risk for the individual loss of privacy. But still monitoring may be sensible as long as it is serviceable for the whole thing, guided by monitoring policies for reasonable business purposes such as for the benefit and safety of an individual within an organisation, when it is deployed as a feedback or training 7
  • 10. module with the voluntary approval of the individual in work tasks which benefit from it such as in the helpline industry to analyse and improve customer interaction. On the contrary, monitoring individuals on the purpose of storing sensible data such as the individual time spent on the lavatory or information about possible love affairs of individuals are hard to justify.4 They bear the risk that the experienced loss of the democratic foundation and values in the political sphere in many western democratic countries becomes eventually also part of our working life. It is certainly worth to think whether this further shift towards a total surveillance society is an appreciated step in human life. 4 These forms of electronic monitoring became public in 2008 and refer to one of the largest scandals of employee surveillance undertaken by the German supermarket chain Lidl. 8
  • 11. References R. Burke and C. Cooper. The human resource revolution. Elsevier, Oxford, 2006. R. Burke and E. Ng. The changing nature of work and organizations: Implications for human resource managment. Human Resource Management Review, 16:86–94, 2006. J. Flanagan. Restricting electronic monitoring in the private workplace. Duke Law Journal, 43(6):1256–1281, 1994. G. Green. Occupational Crime. Nelson-Hall, Chicago, 2nd. edition, 1997. P. Greenlaw and C. Prundeanu. The impact of federal legislation to limit electronic monitoring. Public Personnel Management, 26:227–244, 1997. N. King. Electronic monitoring to promote national security impacts workplace pri- vacy. Employee Responsibilities and Rights Journal, 15:127–147, 2003. M. Leahy. Recovery and reconstruction of electronic email as evidence. American Jurisprudence Proof of Facts, 41(3d.):1, 2002. J. Lund. Electronic performance monitoring: A review of the research issues. Applied Ergonomics, 23(1):54–58, 1992. D. J. Mayer, R.C. and F. Schoorman. An integrative model of organizational trust. Academy of Management Review, 20:709–734, 1995. J. Mello. The evolving nature of employment relationship: Reconsidering employee responsibilities and rights. Employee Responsibilities and Rights Journal, 15:99– 101, 2003. J. Mishra and S. Crampton. Employee monitoring: privacy in the workplace? Society for the Advancement of Management, v68(n3), 1998. P. Parent. “Privacy.” Philosophical Issues in Journalism. Oxford University Press, New York, 1992. P. Robertson. Authority and control in modern industry: theoretical and empirical perspectives. Routledge, London, 1999. R. Rosenberg. The workplace on the verge of the 21st century. Journal of Business Ethics, 22:3–14, 1999. L. Rothstein. Privacy or dignity: Electronic monitoring in the workplace. New York Law Journal of International and Comparative Law, 19:379, 2000. A. Stoney. Employee reactions to electronic performance monitoring: A consequence of organizational culture. Journal of High Technology Management Research, 12: 323–342, 2001. 9
  • 12. F. Tabak and W. Smith. Privacy and electronic monitoring in the workplace: A model of managerial cognition and relational trust development. Employee Responsibilites and Rights Journal, 17(3):173–189, 2005. R. Worsnop. Privacy in the workplace. CQ Researcher, pages 1011–1025, 1993. 10