Skip to main content
main-content
Top

Hint

Swipe to navigate through the articles of this issue

Published in: Asian Journal of Business Ethics 1/2019

29-04-2019

Privacy and beyond: socio-ethical concerns of ‘on-the-job’ surveillance

Author: Jijo James Indiparambil

Published in: Asian Journal of Business Ethics | Issue 1/2019

Login to get access
share
SHARE

Abstract

Current sophisticated technologies in the workplace offer inexpensive and user-friendly devices and the means to control ‘on-the-job’ behaviour. This promises high profitability, productivity and liability alleviation. Yet, it also gives rise to a socio-ethical crisis of incessant surveillance that often overrules its anticipated benefits and motives of control and care. The dilemma is twofold: First, scholarly studies undertaken on this issue from a principally administrative and legal point of view tend to lack a moral framework and so prove unable to offer an integral understanding. Second, a majority of scholars tend to focus exclusively on individual rights, such as privacy, even at the risk of overlooking its social impact and consequences. This paper thus aims to unravel these forgotten moral and social concerns. It analyses the surveillance frameworks and the arguments for and against it; scrutinises critically the technological devices most often implemented in the workplace; examines both its individual effects (privacy) and social effects (categorising); and proposes an ethics of workplace surveillance in a framework of trust and transparency. It argues, in all these ways, for an alteration or modification of traditional organisational behaviour within a new frame of reference, situated within and going beyond questions of moral duty, principles and legal compliance.
Literature
go back to reference Aiello, J. R., & Svec, C. M. (1993). Computer monitoring of work performance: extending the social facilitation framework to electronic presence. Journal of Applied Social Psychology, 23(7), 537–548. CrossRef Aiello, J. R., & Svec, C. M. (1993). Computer monitoring of work performance: extending the social facilitation framework to electronic presence. Journal of Applied Social Psychology, 23(7), 537–548. CrossRef
go back to reference Albaum, G. (2014). Business-related ethical values of future business leaders in four Asia-Pacific countries. Asian Journal of Business Ethics, 3(2), 127–140. CrossRef Albaum, G. (2014). Business-related ethical values of future business leaders in four Asia-Pacific countries. Asian Journal of Business Ethics, 3(2), 127–140. CrossRef
go back to reference Alge, B. J., & Hansen, S. D. (2014). Workplace monitoring and surveillance research since 1984: a review and agenda. In M. D. Coovert & L. F. Thompson (Eds.), The psychology of workplace technology (pp. 209–237). New York: Routledge. Alge, B. J., & Hansen, S. D. (2014). Workplace monitoring and surveillance research since 1984: a review and agenda. In M. D. Coovert & L. F. Thompson (Eds.), The psychology of workplace technology (pp. 209–237). New York: Routledge.
go back to reference Alge, B. J. (2001). Effects of computer surveillance on perceptions of privacy and procedural justice. Journal of Applied Psychology, 86(4), 797–804. CrossRef Alge, B. J. (2001). Effects of computer surveillance on perceptions of privacy and procedural justice. Journal of Applied Psychology, 86(4), 797–804. CrossRef
go back to reference Allen, M. W., et al. (2007). Workplace surveillance and managing privacy boundaries. Management Communication Quarterly, 21(2), 172–200. CrossRef Allen, M. W., et al. (2007). Workplace surveillance and managing privacy boundaries. Management Communication Quarterly, 21(2), 172–200. CrossRef
go back to reference Al-Rjoub, H., et al. (2008). Electronic monitoring: the employees’ point of view. Journal of Social Sciences, 4(3), 189–195. CrossRef Al-Rjoub, H., et al. (2008). Electronic monitoring: the employees’ point of view. Journal of Social Sciences, 4(3), 189–195. CrossRef
go back to reference Andrejevic, M. (2007). Surveillance in the digital enclosure. The Communication Review, 10(4), 295–317. CrossRef Andrejevic, M. (2007). Surveillance in the digital enclosure. The Communication Review, 10(4), 295–317. CrossRef
go back to reference Baase, S. (2009). A gift of fire: social, legal, and ethical issues for computing and the internet (3rd ed.). New Jersey: Pearson Prentice Hall. Baase, S. (2009). A gift of fire: social, legal, and ethical issues for computing and the internet (3rd ed.). New Jersey: Pearson Prentice Hall.
go back to reference Ball, K. (2003). Categorizing the workers: electronic surveillance and social ordering in the call center. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination (pp. 201–225). London: Routledge. Ball, K. (2003). Categorizing the workers: electronic surveillance and social ordering in the call center. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination (pp. 201–225). London: Routledge.
go back to reference Ball, K. (2010). Workplace surveillance: an overview. Labour History, 51(1), 87–106. CrossRef Ball, K. (2010). Workplace surveillance: an overview. Labour History, 51(1), 87–106. CrossRef
go back to reference Başar, U., Siğri, Ü., & Basim, H. N. (2018). Ethics lead the way despite organizational politics. Asian Journal of Business Ethics, 7(1), 81–101. CrossRef Başar, U., Siğri, Ü., & Basim, H. N. (2018). Ethics lead the way despite organizational politics. Asian Journal of Business Ethics, 7(1), 81–101. CrossRef
go back to reference Berggren, E., & Bernshteyn, R. (2007). Organizational transparency drives company performance. Journal of Management Development, 26(5), 411–417. CrossRef Berggren, E., & Bernshteyn, R. (2007). Organizational transparency drives company performance. Journal of Management Development, 26(5), 411–417. CrossRef
go back to reference Bhave, D. P. (2014). The invisible eye? Electronic performance monitoring and employee job performance. Personal Psychology, 67, 605–635. Bhave, D. P. (2014). The invisible eye? Electronic performance monitoring and employee job performance. Personal Psychology, 67, 605–635.
go back to reference Blodgett, J. G., Hill, D. J., & Tax, S. S. (1996). The effects of distributive, procedural, and interactional justice on postcomplaint behaviour. Journal of Retailing, 73(2), 185–210. CrossRef Blodgett, J. G., Hill, D. J., & Tax, S. S. (1996). The effects of distributive, procedural, and interactional justice on postcomplaint behaviour. Journal of Retailing, 73(2), 185–210. CrossRef
go back to reference Bogard, W. (1996). The simulation of surveillance: hyper-control in telematic societies. Cambridge: Cambridge University Press. Bogard, W. (1996). The simulation of surveillance: hyper-control in telematic societies. Cambridge: Cambridge University Press.
go back to reference Botan, C., & Vorvoreanu, M. (2005). What do employees think about electronic surveillance at work? In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 123–144). Hershey: Idea Group Publishing. CrossRef Botan, C., & Vorvoreanu, M. (2005). What do employees think about electronic surveillance at work? In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 123–144). Hershey: Idea Group Publishing. CrossRef
go back to reference Bowker, G. C., & Star, S. L. (1999). Sorting things out: classification and its consequences. Cambridge, MA: MIT Press. Bowker, G. C., & Star, S. L. (1999). Sorting things out: classification and its consequences. Cambridge, MA: MIT Press.
go back to reference Bucklin, R. E., & Sismeiro, C. (2009). Click here for Internet insight: advances in clickstream data analysis in marketing. Journal of Interactive Marketing, 23(1), 35–48. CrossRef Bucklin, R. E., & Sismeiro, C. (2009). Click here for Internet insight: advances in clickstream data analysis in marketing. Journal of Interactive Marketing, 23(1), 35–48. CrossRef
go back to reference Ciocchetti, C. A. (2011). The eavesdropping employer: a twenty-first century framework for employee monitoring. American Business Law Journal, 48(2), 285–369. CrossRef Ciocchetti, C. A. (2011). The eavesdropping employer: a twenty-first century framework for employee monitoring. American Business Law Journal, 48(2), 285–369. CrossRef
go back to reference Clemmer, E. C., & Schneider, B. (1996). Fair service. In S. W. Brown, D. A. Bowen, & T. Swartz (Eds.), Advances in services marketing and management, Vol. 5 (pp. 109–126). Greenwich, CT: JAI Press. Clemmer, E. C., & Schneider, B. (1996). Fair service. In S. W. Brown, D. A. Bowen, & T. Swartz (Eds.), Advances in services marketing and management, Vol. 5 (pp. 109–126). Greenwich, CT: JAI Press.
go back to reference Cohen, J. B., & Basu, K. (1987). Alternative models of categorization: toward a contingent processing framework. Journal of Consumer Research, 13(4), 455–472. CrossRef Cohen, J. B., & Basu, K. (1987). Alternative models of categorization: toward a contingent processing framework. Journal of Consumer Research, 13(4), 455–472. CrossRef
go back to reference Coleman, R. (2010). Surveillance and social ordering. In D. Drake, J. Muncie, & L. Westmarland (Eds.), Criminal justice: local and global (pp. 141–176). Cullompton: Willan. Coleman, R. (2010). Surveillance and social ordering. In D. Drake, J. Muncie, & L. Westmarland (Eds.), Criminal justice: local and global (pp. 141–176). Cullompton: Willan.
go back to reference Coultrup, S., & Fountain, P. D. (2012). Effects of electronic monitoring and surveillance on the psychological contract of employees: an exploratory study. Proceedings of ASBBS Conference, 19(1), 219–235. Coultrup, S., & Fountain, P. D. (2012). Effects of electronic monitoring and surveillance on the psychological contract of employees: an exploratory study. Proceedings of ASBBS Conference, 19(1), 219–235.
go back to reference Cox, S., Goette, T., & Young, D. (2005). Workplace surveillance and employee privacy: implementing an effective computer use policy. Communications of the IIMA, 5(2), 57–66. Cox, S., Goette, T., & Young, D. (2005). Workplace surveillance and employee privacy: implementing an effective computer use policy. Communications of the IIMA, 5(2), 57–66.
go back to reference Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science, 10(1), 104–115. CrossRef Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science, 10(1), 104–115. CrossRef
go back to reference D’Urso, S. C. (2006). Who’s watching us at work? Toward a structural-perceptual model of electronic monitoring and surveillance in organizations. Communication Theory, 16, 281–303. CrossRef D’Urso, S. C. (2006). Who’s watching us at work? Toward a structural-perceptual model of electronic monitoring and surveillance in organizations. Communication Theory, 16, 281–303. CrossRef
go back to reference Deleuze, G. (1992). Postscript on the societies of control. October, 59, 3–7. Deleuze, G. (1992). Postscript on the societies of control. October, 59, 3–7.
go back to reference Denning, D. E. (1999). Information warfare and security. Boston: Addison-Wesley. Denning, D. E. (1999). Information warfare and security. Boston: Addison-Wesley.
go back to reference Doney, P. M., Cannon, J. P., & Mullen, M. R. (1998). Understanding the influence of national culture on the development of trust. Academy of Management Review, 23(3), 601–620. CrossRef Doney, P. M., Cannon, J. P., & Mullen, M. R. (1998). Understanding the influence of national culture on the development of trust. Academy of Management Review, 23(3), 601–620. CrossRef
go back to reference Eisenhardt, K. M. (1989). Agency theory: an assessment and review. Academy of Management Review, 14(1), 57–74. CrossRef Eisenhardt, K. M. (1989). Agency theory: an assessment and review. Academy of Management Review, 14(1), 57–74. CrossRef
go back to reference Eivazi, K. (2011). Computer use monitoring and privacy at work. Computer Law and Security Review, 27, 516–523. CrossRef Eivazi, K. (2011). Computer use monitoring and privacy at work. Computer Law and Security Review, 27, 516–523. CrossRef
go back to reference Feinberg, T., & Robey, N. (2009). Cyberbullying: intervention and prevention strategies. National Association of School Pschologists: Communique, 38(4), 1–4. Feinberg, T., & Robey, N. (2009). Cyberbullying: intervention and prevention strategies. National Association of School Pschologists: Communique, 38(4), 1–4.
go back to reference Findlay, P., & McKinlay, A. (2003). Surveillance, electronic communications technology and regulation. Industrial Relations Journal, 34(4), 305–318. CrossRef Findlay, P., & McKinlay, A. (2003). Surveillance, electronic communications technology and regulation. Industrial Relations Journal, 34(4), 305–318. CrossRef
go back to reference Fink, J. (2014). In defence of snooping employers. University of Pennsylvania Journal of Business Law, 16(2), 551–596. Fink, J. (2014). In defence of snooping employers. University of Pennsylvania Journal of Business Law, 16(2), 551–596.
go back to reference Firoz, N., Taghi, R., & Souckova, J. (2006). E-mails in the workplace: the electronic equivalent of ‘DNA’ evidence. Journal of American Academy of Business, 8(2), 71–78. Firoz, N., Taghi, R., & Souckova, J. (2006). E-mails in the workplace: the electronic equivalent of ‘DNA’ evidence. Journal of American Academy of Business, 8(2), 71–78.
go back to reference Foucault, M. (1977). Discipline and punish: the birth of the prison, trans. Alan Sheridan (New York: Penguin Books, 1991), 201. This work was first published in 1975 as Surveiller et punir: Naissance de la prison by Éditions Gallimard. This translation was first published by Allen Lane in 1977. Foucault, M. (1977). Discipline and punish: the birth of the prison, trans. Alan Sheridan (New York: Penguin Books, 1991), 201. This work was first published in 1975 as Surveiller et punir: Naissance de la prison by Éditions Gallimard. This translation was first published by Allen Lane in 1977.
go back to reference Fukuyama, F. (1995). Trust. New York: Free Press. Fukuyama, F. (1995). Trust. New York: Free Press.
go back to reference Furedi, F. (2002). Culture of fear: risk-taking and the morality of low expectation. London: Continuum. Furedi, F. (2002). Culture of fear: risk-taking and the morality of low expectation. London: Continuum.
go back to reference Gandy, O. H., Jr. (2014). Statistical surveillance: remote sensing in the digital age. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp. 125–132). Oxon: Routledge. Gandy, O. H., Jr. (2014). Statistical surveillance: remote sensing in the digital age. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp. 125–132). Oxon: Routledge.
go back to reference Graham, S., & Wood, D. (2007). Digitizing surveillance: categorization, space, inequality. In S. P. Hier & J. Greenberg (Eds.), The surveillance studies reader (pp. 218–230). Berkshire, England: McGraw-Hill. Graham, S., & Wood, D. (2007). Digitizing surveillance: categorization, space, inequality. In S. P. Hier & J. Greenberg (Eds.), The surveillance studies reader (pp. 218–230). Berkshire, England: McGraw-Hill.
go back to reference Haggerty, K. D. (2008). Tear down the walls: on demolishing the panopticon. In D. Lyon (Ed.), Theorizing surveillance: the panopticon and beyond (pp. 23–45). Cullompton: Willan publishing. Haggerty, K. D. (2008). Tear down the walls: on demolishing the panopticon. In D. Lyon (Ed.), Theorizing surveillance: the panopticon and beyond (pp. 23–45). Cullompton: Willan publishing.
go back to reference Heald, D. (2006). Varieties of transparency. In C. Hood & D. Heald (Eds.), Transparency—the key to better governance (pp. 25–43). New York: Oxford University Press. Heald, D. (2006). Varieties of transparency. In C. Hood & D. Heald (Eds.), Transparency—the key to better governance (pp. 25–43). New York: Oxford University Press.
go back to reference Hier, S. P., & Greenberg, J. (2007). Surveillance, the nation-state and social control. In S. P. Hier & J. Greenberg (Eds.), The surveillance studies reader (pp. 11–17). Berkshire, England: McGraw-Hill. Hier, S. P., & Greenberg, J. (2007). Surveillance, the nation-state and social control. In S. P. Hier & J. Greenberg (Eds.), The surveillance studies reader (pp. 11–17). Berkshire, England: McGraw-Hill.
go back to reference Holland, P. J., Cooper, B., & Hecker, R. (2015). Electronic monitoring and surveillance in the workplace: the effects on trust in management, and the moderating role of occupational type. Personnel Review, 44(1), 161–175. CrossRef Holland, P. J., Cooper, B., & Hecker, R. (2015). Electronic monitoring and surveillance in the workplace: the effects on trust in management, and the moderating role of occupational type. Personnel Review, 44(1), 161–175. CrossRef
go back to reference Hon, L. C., & Grunig, J. E. (1999). Guidelines for measuring relationships in public relations. Gainesville, FL: Institute for Public Relations. Hon, L. C., & Grunig, J. E. (1999). Guidelines for measuring relationships in public relations. Gainesville, FL: Institute for Public Relations.
go back to reference Hood, J. N. (2003). The relationship of leadership style and CEO values to ethical practices in organizations. Journal of Business Ethics, 43(4), 263–273. CrossRef Hood, J. N. (2003). The relationship of leadership style and CEO values to ethical practices in organizations. Journal of Business Ethics, 43(4), 263–273. CrossRef
go back to reference Indiparambil, J. J. (2017). An empirical study on the detrimental effects of employee surveillance in India. International Journal of Research in Computer Application & Management, 7(12), 48–51. Indiparambil, J. J. (2017). An empirical study on the detrimental effects of employee surveillance in India. International Journal of Research in Computer Application & Management, 7(12), 48–51.
go back to reference Jahansoozi, J. (2006). Organization-stakeholder relationships: exploring trust and transparency. Journal of Management Development, 25(10), 942–955. CrossRef Jahansoozi, J. (2006). Organization-stakeholder relationships: exploring trust and transparency. Journal of Management Development, 25(10), 942–955. CrossRef
go back to reference Jenkins, R. (2014). Identity, surveillance and modernity. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp. 159–166). Oxon: Routledge. Jenkins, R. (2014). Identity, surveillance and modernity. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp. 159–166). Oxon: Routledge.
go back to reference Kidwell, R. E., & Sprague, R. (2009). Electronic surveillance in the global workplace: laws, ethics, research and practice. New Technology, Work and Employment, 24(2), 194–208. CrossRef Kidwell, R. E., & Sprague, R. (2009). Electronic surveillance in the global workplace: laws, ethics, research and practice. New Technology, Work and Employment, 24(2), 194–208. CrossRef
go back to reference Kierkegaard, S. (2005). Privacy in electronic communication, watch your e-mail: your boss is snooping. Computer Law & Security Report, 21, 226–236. CrossRef Kierkegaard, S. (2005). Privacy in electronic communication, watch your e-mail: your boss is snooping. Computer Law & Security Report, 21, 226–236. CrossRef
go back to reference Kizza, J. M., & Ssanyu, J. (2005). Workplace surveillance. In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 1–18). Hershey: Idea Group Publishing. Kizza, J. M., & Ssanyu, J. (2005). Workplace surveillance. In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 1–18). Hershey: Idea Group Publishing.
go back to reference Konovsky, M. A. (2000). Understanding procedural justice and its impact on business organizations. Journal of Management, 26(3), 489–511. CrossRef Konovsky, M. A. (2000). Understanding procedural justice and its impact on business organizations. Journal of Management, 26(3), 489–511. CrossRef
go back to reference Lane, F. S., III. (2003). The naked employee: How technology is compromising workplace privacy. New York: Amacom. Lane, F. S., III. (2003). The naked employee: How technology is compromising workplace privacy. New York: Amacom.
go back to reference Landstrom, H. (1993). Agency theory and its application to small firms: evidence from the Swedish venture capital market. The Journal of Entrepreneurial Finance, 2(3), 203–218. Landstrom, H. (1993). Agency theory and its application to small firms: evidence from the Swedish venture capital market. The Journal of Entrepreneurial Finance, 2(3), 203–218.
go back to reference Lee, S., & Kleiner, B. H. (2003). Electronic surveillance in the workplace. Management Research News, 26(2, 3, 4), 72–81. CrossRef Lee, S., & Kleiner, B. H. (2003). Electronic surveillance in the workplace. Management Research News, 26(2, 3, 4), 72–81. CrossRef
go back to reference Leventhal, G. S. (1980). What should be done with equity theory? New approaches to the study of fairness in social relationships. In K. Gergen, M. Greenberg, & R. Willis (Eds.), Social exchange: advances in theory and research (pp. 27–55). New York: Plenum Press. CrossRef Leventhal, G. S. (1980). What should be done with equity theory? New approaches to the study of fairness in social relationships. In K. Gergen, M. Greenberg, & R. Willis (Eds.), Social exchange: advances in theory and research (pp. 27–55). New York: Plenum Press. CrossRef
go back to reference Li, D. C. (2018). Do managerial ethics and legal education influence online privacy policies in greater China? Asian Journal of Business Ethics, 7(2), 117–136. CrossRef Li, D. C. (2018). Do managerial ethics and legal education influence online privacy policies in greater China? Asian Journal of Business Ethics, 7(2), 117–136. CrossRef
go back to reference Lyon, D. (2001a). Surveillance society: monitoring everyday life. Buckingham: Open University Press. Lyon, D. (2001a). Surveillance society: monitoring everyday life. Buckingham: Open University Press.
go back to reference Lyon, D. (2001b). Facing the future: seeking ethics for everyday surveillance. Ethics and Information Technology, 3(3), 171–181. CrossRef Lyon, D. (2001b). Facing the future: seeking ethics for everyday surveillance. Ethics and Information Technology, 3(3), 171–181. CrossRef
go back to reference Lyon, D. (2003a). Surveillance after September 11. Cambridge: Polity Press. Lyon, D. (2003a). Surveillance after September 11. Cambridge: Polity Press.
go back to reference Lyon, D. (2003b). Surveillance as social sorting: computer codes and mobile bodies. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination (pp. 13–32). London: Routledge. Lyon, D. (2003b). Surveillance as social sorting: computer codes and mobile bodies. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination (pp. 13–32). London: Routledge.
go back to reference Lyon, D. (2007a). Everyday surveillance: personal data and social classifications. In S. P. Hier & J. Greenberg (Eds.), The surveillance studies reader (pp. 136–146). New York: McGraw-Hill. Lyon, D. (2007a). Everyday surveillance: personal data and social classifications. In S. P. Hier & J. Greenberg (Eds.), The surveillance studies reader (pp. 136–146). New York: McGraw-Hill.
go back to reference Lyon, D. (2007b). Surveillance studies: an overview. Cambridge: Polity Press. Lyon, D. (2007b). Surveillance studies: an overview. Cambridge: Polity Press.
go back to reference Lyon, D. (2007c). Surveillance, security and social sorting: emerging research priorities. International Criminal Justice Review, 17(3), 161–170. CrossRef Lyon, D. (2007c). Surveillance, security and social sorting: emerging research priorities. International Criminal Justice Review, 17(3), 161–170. CrossRef
go back to reference Lyon, D. (2014). Introduction: surveillance as sorting. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies. London: Routledge. Lyon, D. (2014). Introduction: surveillance as sorting. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies. London: Routledge.
go back to reference Martin, K., & Freeman, R. E. (2003). Some problems with employee monitoring. Journal of Business Ethics, 43, 353–361. CrossRef Martin, K., & Freeman, R. E. (2003). Some problems with employee monitoring. Journal of Business Ethics, 43, 353–361. CrossRef
go back to reference Martinez-Balleste, A., & Solanas, A. (2009). An introduction to privacy aspects of information and communication technologies. World Scientific Review, 4(5), 1–20. Martinez-Balleste, A., & Solanas, A. (2009). An introduction to privacy aspects of information and communication technologies. World Scientific Review, 4(5), 1–20.
go back to reference Marx, G. T. (1998). Ethics for the new surveillance. The Information Society, 14(3), 171–185. CrossRef Marx, G. T. (1998). Ethics for the new surveillance. The Information Society, 14(3), 171–185. CrossRef
go back to reference Marx, G. T. (2002). What’s new about the “new surveillance”? Classifying for change and continuity. Surveillance and Society, 1(1), 9–29. CrossRef Marx, G. T. (2002). What’s new about the “new surveillance”? Classifying for change and continuity. Surveillance and Society, 1(1), 9–29. CrossRef
go back to reference Marx, G. T. (2016). Windows into the soul: surveillance and society in an age of high technology. Chicago: University of Chicago Press. CrossRef Marx, G. T. (2016). Windows into the soul: surveillance and society in an age of high technology. Chicago: University of Chicago Press. CrossRef
go back to reference Mason, D., Button, G., Lankshear, G., Coates, S., & Sharrock, W. (2002). On the poverty of apriorism: technology, surveillance in the workplace and employee responses. Information, Communication & Society, 5(4), 555–572. CrossRef Mason, D., Button, G., Lankshear, G., Coates, S., & Sharrock, W. (2002). On the poverty of apriorism: technology, surveillance in the workplace and employee responses. Information, Communication & Society, 5(4), 555–572. CrossRef
go back to reference McEvoy, S. (2002). E-mail and Internet monitoring and the workplace: do employees have a right to privacy? Communications and the Law, 24(2), 69–84. McEvoy, S. (2002). E-mail and Internet monitoring and the workplace: do employees have a right to privacy? Communications and the Law, 24(2), 69–84.
go back to reference Minsky, M., Kurzweil, R., & Mann, S. (2013). The Society of Intelligent Veillance. International Symposium on Technology and Society (ISTAS). Minsky, M., Kurzweil, R., & Mann, S. (2013). The Society of Intelligent Veillance. International Symposium on Technology and Society (ISTAS).
go back to reference Monahan, K. (2012). A review of the literature concerning ethical leadership in organizations. Emerging Leadership Journeys, 5(1), 56–66. Monahan, K. (2012). A review of the literature concerning ethical leadership in organizations. Emerging Leadership Journeys, 5(1), 56–66.
go back to reference Moor, J. H. (1990). The ethics of privacy protection. Library Trends, 39(1 & 2), 69–82. Moor, J. H. (1990). The ethics of privacy protection. Library Trends, 39(1 & 2), 69–82.
go back to reference Moore, A. D. (2010). Privacy rights: moral and legal foundations. University Park, PA: Penn State University Press. Moore, A. D. (2010). Privacy rights: moral and legal foundations. University Park, PA: Penn State University Press.
go back to reference Moussa, M. (2015). Monitoring employee behaviour through the use of technology and issues of employee privacy in America. SAGE Open, 5(2), 1–13. CrossRef Moussa, M. (2015). Monitoring employee behaviour through the use of technology and issues of employee privacy in America. SAGE Open, 5(2), 1–13. CrossRef
go back to reference Nelkin, D., & Andrews, L. (2003). Surveillance creep in the genetic age). In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination. London: Routledge. Nelkin, D., & Andrews, L. (2003). Surveillance creep in the genetic age). In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination. London: Routledge.
go back to reference Niehoff, B. P., & Moorman, R. H. (1993). Justice as a mediator of the relationship between methods of monitoring and organizational citizenship behaviour. Academy of Management Journal, 36(3), 527–556. Niehoff, B. P., & Moorman, R. H. (1993). Justice as a mediator of the relationship between methods of monitoring and organizational citizenship behaviour. Academy of Management Journal, 36(3), 527–556.
go back to reference Nielson, I. K., Jex, S. M., & Adams, G. A. (2000). Development and validation of scores on a two-dimensional workplace friendship scale. Educational and Psychological Measurement, 60, 628–643. CrossRef Nielson, I. K., Jex, S. M., & Adams, G. A. (2000). Development and validation of scores on a two-dimensional workplace friendship scale. Educational and Psychological Measurement, 60, 628–643. CrossRef
go back to reference Nissenbaum, H. (2004a). Information technology and ethics. Berkshire encyclopedia of human-computer interaction (pp. 235–239). Great Barrington, MA: Berkshire Publishing Group. Nissenbaum, H. (2004a). Information technology and ethics. Berkshire encyclopedia of human-computer interaction (pp. 235–239). Great Barrington, MA: Berkshire Publishing Group.
go back to reference Nissenbaum, H. (2004b). Will security enhance trust online, or supplant it? In R. M. Kramer & K. S. Cook (Eds.), Trust and distrust in organizations: dilemmas and approaches (Vol. 7, pp. 155–188). New York: Russell Sage Foundation. Nissenbaum, H. (2004b). Will security enhance trust online, or supplant it? In R. M. Kramer & K. S. Cook (Eds.), Trust and distrust in organizations: dilemmas and approaches (Vol. 7, pp. 155–188). New York: Russell Sage Foundation.
go back to reference Nissenbaum, H. (2010). Privacy in context: technology, policy, and the integrity of social life. Palo Alto, CA: Stanford University Press. Nissenbaum, H. (2010). Privacy in context: technology, policy, and the integrity of social life. Palo Alto, CA: Stanford University Press.
go back to reference Nord, G. D., McCubbins, T. F., & Nord, J. H. (2006). E-monitoring in the workplace: privacy, legislation, and surveillance software. Communications of the ACM, 49(8), 72–77. CrossRef Nord, G. D., McCubbins, T. F., & Nord, J. H. (2006). E-monitoring in the workplace: privacy, legislation, and surveillance software. Communications of the ACM, 49(8), 72–77. CrossRef
go back to reference Norris, C. (2003). From personal to digital: CCTV, the panopticon, and the technological mediation of suspicion and social control. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination (pp. 249–281). London: Routledge. Norris, C. (2003). From personal to digital: CCTV, the panopticon, and the technological mediation of suspicion and social control. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination (pp. 249–281). London: Routledge.
go back to reference Ormerod, R. J., & Ulrich, W. (2013). Operational research and ethics: a literature review. European Journal of Operational Research, 228(2), 291–307. CrossRef Ormerod, R. J., & Ulrich, W. (2013). Operational research and ethics: a literature review. European Journal of Operational Research, 228(2), 291–307. CrossRef
go back to reference Ottensmeyer, E. J., & Heroux, M. A. (1991). Ethics, public policy, and managing advanced technologies: the case of electronic surveillance. Journal of Business Ethics, 10(7), 519–526. CrossRef Ottensmeyer, E. J., & Heroux, M. A. (1991). Ethics, public policy, and managing advanced technologies: the case of electronic surveillance. Journal of Business Ethics, 10(7), 519–526. CrossRef
go back to reference Park, H., & Blenkinsopp, J. (2011). The roles of transparency and trust in the relationship between corruption and citizen satisfaction. International Review of Administrative Sciences, 77(2), 254–274. CrossRef Park, H., & Blenkinsopp, J. (2011). The roles of transparency and trust in the relationship between corruption and citizen satisfaction. International Review of Administrative Sciences, 77(2), 254–274. CrossRef
go back to reference Post, R. C. (2001). Three concepts of privacy. The Georgetown Law Journal, 89, 2087–2098. Post, R. C. (2001). Three concepts of privacy. The Georgetown Law Journal, 89, 2087–2098.
go back to reference Pollach, I. (2007). What’s wrong with online privacy policies? Communications of the ACM, 50(9), 103–108. CrossRef Pollach, I. (2007). What’s wrong with online privacy policies? Communications of the ACM, 50(9), 103–108. CrossRef
go back to reference Quinn, M. J. (2005). Ethics for the information age. Boston: Pearson-Addison-Wesley. Quinn, M. J. (2005). Ethics for the information age. Boston: Pearson-Addison-Wesley.
go back to reference Quinn, M. J. (2012). Ethics for the information age (5th ed.). Boston, MA: Pearson-Prentice Hall. Quinn, M. J. (2012). Ethics for the information age (5th ed.). Boston, MA: Pearson-Prentice Hall.
go back to reference Raven, B. H. (1993). The basis of power: origins and recent developments. Journal of Social Issues, 49(4), 227–251. CrossRef Raven, B. H. (1993). The basis of power: origins and recent developments. Journal of Social Issues, 49(4), 227–251. CrossRef
go back to reference Rawlins, B. L. (2008). Measuring the relationship between organizational transparency and employee trust. The Public Relations Journal, 2(2), 1–21. Rawlins, B. L. (2008). Measuring the relationship between organizational transparency and employee trust. The Public Relations Journal, 2(2), 1–21.
go back to reference Rawlins, B. L. (2009). Give the emperor a mirror: toward developing a stakeholder measurement of organizational transparency. Journal of Public Research, 21(1), 71–99. CrossRef Rawlins, B. L. (2009). Give the emperor a mirror: toward developing a stakeholder measurement of organizational transparency. Journal of Public Research, 21(1), 71–99. CrossRef
go back to reference Regan, P. M. (2002). Privacy as a common good in the digital world. Information, Communication and Society, 5(3), 382–405. CrossRef Regan, P. M. (2002). Privacy as a common good in the digital world. Information, Communication and Society, 5(3), 382–405. CrossRef
go back to reference Reynolds, G. (2003). Ethics in information technology. Boston: Thompson. Reynolds, G. (2003). Ethics in information technology. Boston: Thompson.
go back to reference Reynolds, G. (2007). Ethics in information technology (2nd ed.). Boston, MA: Thomson Course Technology. Reynolds, G. (2007). Ethics in information technology (2nd ed.). Boston, MA: Thomson Course Technology.
go back to reference Richards, N. M. (2013). The dangers of surveillance. Harvard Law Review, 126, 1934–1965. Richards, N. M. (2013). The dangers of surveillance. Harvard Law Review, 126, 1934–1965.
go back to reference Rule, J., & Brantely, P. (1992). Computerized surveillance in the workplace: forms and distributions. Sociological Forum, 7(3), 405–423. CrossRef Rule, J., & Brantely, P. (1992). Computerized surveillance in the workplace: forms and distributions. Sociological Forum, 7(3), 405–423. CrossRef
go back to reference Saini, D., & Sengupta, S. S. (2016). Responsibility, ethics, and leadership: an Indian study. Asian Journal of Business Ethics, 5(1–2), 97–109. CrossRef Saini, D., & Sengupta, S. S. (2016). Responsibility, ethics, and leadership: an Indian study. Asian Journal of Business Ethics, 5(1–2), 97–109. CrossRef
go back to reference Sewell, G., & Wilkinson, B. (1992). “Someone to watch over me”: surveillance, discipline and the just-in-time labour process. Sociology, 26(2), 271–289. CrossRef Sewell, G., & Wilkinson, B. (1992). “Someone to watch over me”: surveillance, discipline and the just-in-time labour process. Sociology, 26(2), 271–289. CrossRef
go back to reference Sewell, G., & Barker, J. R. (2006). Coercion versus care: using irony to make sense of organizational surveillance. Academy of Management Review, 31(4), 934–961. CrossRef Sewell, G., & Barker, J. R. (2006). Coercion versus care: using irony to make sense of organizational surveillance. Academy of Management Review, 31(4), 934–961. CrossRef
go back to reference Siegle, D. (2010). Cyberbullying and sexting: technology abuses of the 21st century. Gifted Child Today, 33(2), 14–16. CrossRef Siegle, D. (2010). Cyberbullying and sexting: technology abuses of the 21st century. Gifted Child Today, 33(2), 14–16. CrossRef
go back to reference Simpson, K., & Byrski, M. (2010). The 21st century workplace: How personal technologies can make a difference. Asia Pacific Journal of Business and Management, 1(2), 10–20. Simpson, K., & Byrski, M. (2010). The 21st century workplace: How personal technologies can make a difference. Asia Pacific Journal of Business and Management, 1(2), 10–20.
go back to reference Solove, D. J. (2008). Understanding privacy. Cambridge, MA: Harvard University Press. Solove, D. J. (2008). Understanding privacy. Cambridge, MA: Harvard University Press.
go back to reference Stahl, B. C., Prior, M., Wilford, S., & Collins, D. (2005). Electronic monitoring in the workplace: if people don’t care, then what is the relevance? In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 50–78). Hershey: Idea Group Publishing. CrossRef Stahl, B. C., Prior, M., Wilford, S., & Collins, D. (2005). Electronic monitoring in the workplace: if people don’t care, then what is the relevance? In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 50–78). Hershey: Idea Group Publishing. CrossRef
go back to reference Stalder, F., & Lyon, D. (2003). Electronic identity cards and social classification. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination. London: Routledge. Stalder, F., & Lyon, D. (2003). Electronic identity cards and social classification. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination. London: Routledge.
go back to reference Stanton, J. M. (2000). Traditional and electronic monitoring from an organizational justice perspective. Journal of Business and Psychology, 15(1), 129–147. CrossRef Stanton, J. M. (2000). Traditional and electronic monitoring from an organizational justice perspective. Journal of Business and Psychology, 15(1), 129–147. CrossRef
go back to reference Stanton, J. M., & Weiss, E. M. (2000). Electronic monitoring in their own words: an exploratory study of employees’ experience with new types of surveillance. Computers in Human Behaviour, 16, 423–440. CrossRef Stanton, J. M., & Weiss, E. M. (2000). Electronic monitoring in their own words: an exploratory study of employees’ experience with new types of surveillance. Computers in Human Behaviour, 16, 423–440. CrossRef
go back to reference Stanton, J. M., & Julian, A. L. (2002). The impact of electronic monitoring on quality and quantity of performance. Computers in Human Behaviour, 18, 85–101. CrossRef Stanton, J. M., & Julian, A. L. (2002). The impact of electronic monitoring on quality and quantity of performance. Computers in Human Behaviour, 18, 85–101. CrossRef
go back to reference Stanton, J. M., & Stam, K. R. (2003). Information technology, privacy, and power within organizations: a view from boundary theory and social exchange perspectives. Surveillance and Society, 1(2), 152–190. CrossRef Stanton, J. M., & Stam, K. R. (2003). Information technology, privacy, and power within organizations: a view from boundary theory and social exchange perspectives. Surveillance and Society, 1(2), 152–190. CrossRef
go back to reference Staples, W. G. (1997). The culture of surveillance: discipline and social control in the United States. New York: St. Martin’s Press. Staples, W. G. (1997). The culture of surveillance: discipline and social control in the United States. New York: St. Martin’s Press.
go back to reference Stoddart, E. (2011). Theological perspectives on a surveillance society: watching and being watched. Farnham, England: Ashgate. Stoddart, E. (2011). Theological perspectives on a surveillance society: watching and being watched. Farnham, England: Ashgate.
go back to reference Trevino, L. K., Weaver, G. R., & Reynolds, S. J. (2006). Behavioural ethics in organizations: a review. Journal of Management, 32(6), 951–990. CrossRef Trevino, L. K., Weaver, G. R., & Reynolds, S. J. (2006). Behavioural ethics in organizations: a review. Journal of Management, 32(6), 951–990. CrossRef
go back to reference Tschannen-Moran, M., & Hoy, W. K. (2000). A multidisciplinary analysis of the nature, meaning, and measurement of trust. Review of Educational Research, 70(4), 547–593. CrossRef Tschannen-Moran, M., & Hoy, W. K. (2000). A multidisciplinary analysis of the nature, meaning, and measurement of trust. Review of Educational Research, 70(4), 547–593. CrossRef
go back to reference Tyler, T. R., & Mentovich, A. (2011). Mechanisms of legal effect: theories of procedural justice. Robert Wood Johnson Foundation: Public Health Law Research. Tyler, T. R., & Mentovich, A. (2011). Mechanisms of legal effect: theories of procedural justice. Robert Wood Johnson Foundation: Public Health Law Research.
go back to reference Udani, Z. A. S., & Lorenzo-Molo, C. F. (2017). The utility of virtue: management spirituality and ethics for a secular business world. Asian Journal of Business Ethics, 6(2), 31–39. Udani, Z. A. S., & Lorenzo-Molo, C. F. (2017). The utility of virtue: management spirituality and ethics for a secular business world. Asian Journal of Business Ethics, 6(2), 31–39.
go back to reference Van Dijk, S. J., Duysters, G. M., & Beulens, A. J. (2003). Transparency dilemmas, information technology and alliances in agriculture and food industry (Working paper 03.23, Eindhoven Centre for Innovation Studies). Netherlands: Eindhoven. Van Dijk, S. J., Duysters, G. M., & Beulens, A. J. (2003). Transparency dilemmas, information technology and alliances in agriculture and food industry (Working paper 03.23, Eindhoven Centre for Innovation Studies). Netherlands: Eindhoven.
go back to reference Venkatadurai, J., Dhyani, U., & Sharma, M. (2014). Ethics and morality beyond normative theories. Asian Journal of Business Ethics, 3(1), 35–39. CrossRef Venkatadurai, J., Dhyani, U., & Sharma, M. (2014). Ethics and morality beyond normative theories. Asian Journal of Business Ethics, 3(1), 35–39. CrossRef
go back to reference Wang, L., & Liang, X. (2017). Profit or legitimacy? What drives firms to prioritize social stakeholders? Asian Journal of Business Ethics, 6(1), 57–79. CrossRef Wang, L., & Liang, X. (2017). Profit or legitimacy? What drives firms to prioritize social stakeholders? Asian Journal of Business Ethics, 6(1), 57–79. CrossRef
go back to reference West, J. P., & Bowman, J. S. (2016). Electronic surveillance at work: an ethical analysis. Administration and Society, 48(5), 628–651. CrossRef West, J. P., & Bowman, J. S. (2016). Electronic surveillance at work: an ethical analysis. Administration and Society, 48(5), 628–651. CrossRef
go back to reference Yerby, J. (2013). Legal and ethical issue of employee monitoring. Online Journal of Applied Knowledge Management, 1(2), 44–55. Yerby, J. (2013). Legal and ethical issue of employee monitoring. Online Journal of Applied Knowledge Management, 1(2), 44–55.
go back to reference Zirkle, B. L., & Staples, W. G. (2005). Negotiating workplace surveillance. In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 79–100). Hershey: Idea Group Publishing. CrossRef Zirkle, B. L., & Staples, W. G. (2005). Negotiating workplace surveillance. In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 79–100). Hershey: Idea Group Publishing. CrossRef
go back to reference Zureik, E. (2003). Theorizing surveillance: the case of the workplace. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination (pp. 31–56). London: Routledge. Zureik, E. (2003). Theorizing surveillance: the case of the workplace. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination (pp. 31–56). London: Routledge.
go back to reference Zweig, D. (2005). Beyond privacy and fairness concerns: examining psychological boundary violations as a consequence of electronic performance monitoring. In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 102–122). Hershey: Idea Group Publishing. Zweig, D. (2005). Beyond privacy and fairness concerns: examining psychological boundary violations as a consequence of electronic performance monitoring. In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 102–122). Hershey: Idea Group Publishing.
Metadata
Title
Privacy and beyond: socio-ethical concerns of ‘on-the-job’ surveillance
Author
Jijo James Indiparambil
Publication date
29-04-2019
Publisher
Springer Netherlands
Published in
Asian Journal of Business Ethics / Issue 1/2019
Print ISSN: 2210-6723
Electronic ISSN: 2210-6731
DOI
https://doi.org/10.1007/s13520-019-00089-0

Other articles of this Issue 1/2019

Asian Journal of Business Ethics 1/2019 Go to the issue

Premium Partner