Open Access

Dataveillance in the Workplace: Managing the Impact of Innovation


Cite

1. Alder, G.S., Noel, T.W Ambrose, M.L. (2006), “Clarifying the effects of Internet Monitoring on Job Attitudes: The Mediating Role of Employee Trust”. Information and Management, Vol. 43, No. 7, pp. 894-903.10.1016/j.im.2006.08.008Search in Google Scholar

2. AMA Survey 2003. Email Rules, Policies and Practices Survey [Online]. Available from http://www.amanet.org/research/pdfs/email_policies_practices.pdf (15 January 2019).Search in Google Scholar

3. AMA Survey (2017). Workplace Monitoring and Surveillance, available at: http://www.amanet.org/research/ (15 January 2019).Search in Google Scholar

4. Ambrose, M.L., Arnaud, A. (2005), “Are Procedural Justice and Distributive Justice conceptually different?”, in J. Greenberg J.A Colquitt, (Eds.), Handbook of Organisational Justice, pp. 59-84,. New Jersey Lawrence Erlbaum Associates.Search in Google Scholar

5. Barrett-Howard, E., Tyler, T.R. (1986). “Procedural Justice as a Criterion in Allocation Decisions”, Journal of Personality and Social Pyschology, Vol 50 No. 2, pp. 296-304.10.1037/0022-3514.50.2.296Search in Google Scholar

6. Beaudry, A., Pinsonneault, A. (2005), “Understanding User Responses to Information Technology: A Coping Model of User Adaptation”, MIS Quarterly, Vol. 29 No. 3, pp.493-524.10.2307/25148693Search in Google Scholar

7. Beaulieu R., Shamian J., Donner G. Pringle D. (1997), “Empowerment and commitment of nurses in long term care”, Nursing Economics, Vol. 15 No.1, pp.32–41.Search in Google Scholar

8. Bies, R.J. Moag, J.F. (1986). “Interactional Justice: Communication Criteria of Fairness”, In Lewicki, R.J., Sheppard, B.H., Bazerman, M.H., (Eds), Research on Negotiations in Organizations, Vol 1, JAI Press, pp. 43-55.Search in Google Scholar

9. Boxall, P Purcell, J. (2011), “Strategy and Human Resource Management, 3rd ed., Palgrave Macmillan, Basingstoke.10.1007/978-1-137-40765-8_1Search in Google Scholar

10. Bradbury-Jones, C., Sambrook, S., Irvine, F. (2007). Empowerment and being valued: A phenomenological study of nursing students’ experiences of clinical practice. Nurse Education Today, Vol.31 No. 4, pp. 368 – 372.10.1016/j.nedt.2010.07.008Search in Google Scholar

11. Buchanan, T., Paine, C., Joinson, A.N., Reips, U. (2007), “Development of Measures of Online Privacy Concern and Protection for Use on the Internet”, Journal of the American Society for Information Science and Technology, Vol. 58 No. 2, pp. 157-165.10.1002/asi.20459Search in Google Scholar

12. Butler, A.M. (2012), “The Effects of Organizational Justice Perceptions Associated with the use of Electronic Monitoring on Employees’ Organizational Citizenship and Withdrawal Behaviours: A Social Exchange Perspective”, Electronic Theses and Dissertations, 478, available at: http;//scholar.uwindsor.ca/etd/478 / (15 January, 2019)Search in Google Scholar

13. Chory, R.M., Vela, L.E., Avtgis, T.A. (2016), “Organizational Surveillance of Computer-Mediated Workplace Communication: Employee Privacy Concerns and Responses”, Employee Responsibilities and Rights Journal, Vol. 28 No. 1, pp. 23-43.10.1007/s10672-015-9267-4Search in Google Scholar

14. Clarke, R.A (1988). “Information Technology and Dataveillance”, Communications of the ACM, Vol. 31 No. 5, pp. 498-512.10.1145/42411.42413Search in Google Scholar

15. Cohen-Charash, Y., Spector, P.E. (2001), “The Role of Justice in Organizations: A Meta-Analysis”, Organizational Behavior and Human Decision Processes, Vol. 86 No. 2, pp. 278-321.10.1006/obhd.2001.2958Search in Google Scholar

16. Connell, J., Ferres, N. Travalione, T. (2003), “Engendering trust in manager-subordinate relationships”, Personnel Review, Vol. 32 No. 5, pp. 569-587.10.1108/00483480310488342Search in Google Scholar

17. Conway, N. Briner, R.B. (2002), “A daily diary study of affective responses to contract breach and exceeded promises”, Journal of Organizational Behaviour, Vol. 23 No. 3, pp. 287 – 302.10.1002/job.139Search in Google Scholar

18. Craver, C. B. (2006). “Privacy issues affecting employers, employees and labour organizations”, Louisiana Law Review, Vol. 66, pp. 1057–1078.Search in Google Scholar

19. Crowd Research Partners: Insider Threat Report (2017). Cyber-security Insiders, CA Technologies, Available at: https://www.ca.com/content/dam/ca/us/files/ebook/insider-threat-report.pdf (10 August 2018).Search in Google Scholar

20. Dietz, G. Fortin, M. (2007), “Trust and justice in the formation of joint consultation committees”, Journal of International Human Resource Management, Vol. 18 No. 7, pp. 1159-1181.10.1080/09585190701391867Search in Google Scholar

21. Elie-Dit-Cosaque, C. M., Straub, D. W. (2011). Opening the black box of system usage: User adaptation to disruptive it. European Journal of Information Systems, 20, 589–607.10.1057/ejis.2010.23Search in Google Scholar

22. Evans, L. (2007). “Monitoring technology in the American workplace: Would adopting English privacy standards better balance employee privacy and productivity?”, California Law Review, Vol. 95, pp. 1115–1149. Forbes Survey (2012). Employees really do waste time at work, Available at: https://www.forbes.com/sites/cherylsnappconner/2012/07/17/employees-really-do-waste-time-at-work/#b0461805e6da / (10 August 2018).Search in Google Scholar

23. Foucault, M. (1977). “Discipline and Punishment: The Birth of the Prison, Penguin Books, London.Search in Google Scholar

24. Gould-Williams, J. (2003). “The importance of HR practices and workplace trust in achieving superior performance: a study of public-sector organizations”, International Journal of Human Resource Management, Vol. 14 No. 1, pp. 28-54.10.1080/09585190210158501Search in Google Scholar

25. Graupmann, V., Jonas, E., Meier, E., Hawelka, S., Aichhorn, M. (2012). “Reactance, the self, and its group: When threats to freedom come from the ingroup versus the outgroup”, European Journal of Social Psychology, Vol. 42 No. 2, pp. 164–173.10.1002/ejsp.857Search in Google Scholar

26. Guest, D.E. (2004). “The Psychology of the employment relationship: An analysis based on the psychological contract”, Applied Psychology, Vol. 53 No. 4, pp. 541-555.10.1111/j.1464-0597.2004.00187.xSearch in Google Scholar

27. Hauenstein, N.M.A., McGonigle, T., and Flinder, S.W. (2001), “A meta-analysis of the relationship between procedural justice and distributive justice: Implications of justice research”, Employee Responsibilities and Rights Journal, Vol. 13 No. 1, pp. 39-55.10.1023/A:1014482124497Search in Google Scholar

28. Helne, C.A. (2005). “Prediciting workplace deviance from the interaction between organizational justice and personality”, Journal of Managerial Issues, Vol. 17 No.20, pp. 247-263.Search in Google Scholar

29. Holland, P.J., Cooper, B. Hecker, R. (2015). “Electronic monitoring and surveillance in the workplace: The effects on trust in management, and the moderating role of occupational type”, Personnel Review, Vol. 44 No. 1, pp.161-175.10.1108/PR-11-2013-0211Search in Google Scholar

30. IBM (2006). “Stopping insider attacks: How organizations can protect their sensitive information”, Retrieved from http://www-935.ibm.com/services/us/imc/pdf/gsw00316-usen-00-insider-threats-wp.pdf (15 August 2019)Search in Google Scholar

31. Jackson, T., Dawson, R., Wilson, D. (2001). The cost of email interruption (Item No. 2134/495). Loughborough University Institutional Repository, Loughborough.Search in Google Scholar

32. Jensen, J. M., Raver, J. L. (2012). “When self-management and surveillance collide: Consequences for employees’ trust, autonomy, and discretionary behaviors”, Group & Organization Management, Vol. 37 No. 3, pp. 308–346.10.1177/1059601112445804Search in Google Scholar

33. Kanter R. (1977) Men and Women of the Corporation. Basic Books, New York, NY.Search in Google Scholar

34. Kanter R. (1993) Men and Women of the Corporation, 2nd edn. Basic Books, New York, NY.Search in Google Scholar

35. Krebs, J., Madigan, E., Tullai-McGuiness, S. (2008). The rural nurse work environment and structural empowerment. Policy, Politics and Nursing Practice, Vol. 9 No. 1, pp.28-310.1177/1527154408316255Search in Google Scholar

36. Kim, H. Kankanhalli, A. (2009). “Investigating user resistance to information systems implementation: A status quo bias perspective”, MIS Quarterly, Vol. 33 No. 3, pp. 567-582.10.2307/20650309Search in Google Scholar

37. Lane, F. S. (2003). “The naked employee: How technology is compromising workplace privacy”, AMACOM, New York.Search in Google Scholar

38. Laschinger, H.K.S., Wong, C., McMahon, L. Kaufmann, C. (1999). “Leader Behavior Impact on Staff Nurse Empowerment, Job Tension and Work Effectiveness”, Journal of Nursing Administration, Vol. 29 No. 5, pp. 28-39.10.1097/00005110-199905000-00005Search in Google Scholar

39. Laschinger H.K.S., Finegan J., Shamian J. Casier S. (2000) Organizational trust and empowerment in restructured healthcare settings: effects on staff nurse commitment, Journal of Nursing Administration, Vol. 30 No. 9, pp.413–425.10.1097/00005110-200009000-00008Search in Google Scholar

40. Laschinger, H.K.S., Finegan, J., Shamian, J., Wilk, P. (2001). “Impact of Structural and Psychological Empowerment on Job Strains in Nursing Work Settings: Effects on Staff Nurse Commitment”, Journal of Nursing Administration, Vol. 31 No. 5, pp. 260-272.10.1097/00005110-200105000-00006Search in Google Scholar

41. Laudon, K. C., Laudon, J. P. (2001). “Essentials of management information systems: Organisation and technology in the networked enterprise”, 4th ed., Prentice Hall, Upper Saddle River.Search in Google Scholar

42. Lawrence, T.B., Robinson, S.L. (2007), “Ain’t Misbehaving: Workplace Deviance as Organizational Resisitance”, Journal of Management, 33, pp. 378-394.10.1177/0149206307300816Search in Google Scholar

43. Leventhal, G.S. (1980). “What should be done with equity theory? New approaches to the study of fairness in social relationships”, in K.Gergen, M. Greenberg., R. Willis (Ed), Socia Exchange: Advances in Theory and Research, pp. 27-55, Plenum Press, New York.10.1007/978-1-4613-3087-5_2Search in Google Scholar

44. Martin, A. J., Wellen, J. M. Grimmer, M. R. (2016). “An eye on your work: How empowerment affects the relationship between electronic surveillance and counterproductive work behaviours”, The International Journal of Human Resource Management, Vol. 27 No. 21, pp. 2635–2651.10.1080/09585192.2016.1225313Search in Google Scholar

45. Marx, G., Sherizen, S. (1991). “Monitoring on the job: How to protect privacy as well as property”, In T. Forester (Ed.), Computers in the human context: Information technology, productivity, and people, pp. 397–406, MIT Press, Cambridge.Search in Google Scholar

46. Mayer, R. C., Davis, J. D., Schoorman, F. D. (1995). “An integrative model of organisational trust”, Academy of Management Review, Vol. 20 No. 3, pp. 709–734.10.5465/amr.1995.9508080335Search in Google Scholar

47. McFarlin, D.B., Sweeney, P.D. (1992), “Distributive and procedural justice as predictors of satisfaction with personal and organizational outcomes”, Academy of Management Journal, Vol. 35 No. 3, pp. 626-637.10.2307/256489Search in Google Scholar

48. McNall, L.A., Stanton, J.M. (2011), “Private Eyes are Atching You: Reactions to Location Sensing Technologies”, Journal of Business and Pyschology, Vol. 26 No. 3, pp. 299-309.10.1007/s10869-010-9189-ySearch in Google Scholar

49. McParland, C., Connolly, R. (2009), “The role of dataveillance in the organsiation: Some emerging trends”, Paper presented at the Irish Academy of Management Conference. Galway, UK.Search in Google Scholar

50. Morrison, E.W. Robinson, S.L. (1997), “When employees feel betrayed: A model of how psychological contract violation develops”, The Academy of Management Review, Vol. 22 No. 1, pp. 226-256.10.2307/259230Search in Google Scholar

51. Nelson, D., Quick, J. (2012). Principles of Organizational Behavior: Realities and Challenges. South Western, Sydney.Search in Google Scholar

52. Nord, G. D., McCubbins, T. F., Horn Nord, J. (2006). “Email monitoring in the workplace: Privacy, legislation, and surveillance software”, Communications of the ACM, Vol. 49 No. 8, pp. 73–77.10.1145/1145287.1145290Search in Google Scholar

53. Nussbaum, K., duRivage, V. (1986). “Computer monitoring: Mismanagement by remote control”, Business and Society Review, Vol. 56, pp. 16–29.Search in Google Scholar

54. O’Donnell, A.T., Jetten, J., Ryan, M.K. (2010). “Who is Watching Over You? The Role of Shared Identity in Perceptions of Surveillance”, European Journal of Social Psychology, Vol. 40 No. 1, pp. 135-147.10.1002/ejsp.615Search in Google Scholar

55. Petronio, S. (2002). “Boundaries of Privacy: Dialectics of Disclosure”, State University of New York Press, Albany.Search in Google Scholar

56. Prakhaber, P. R. (2000). “Who owns the online consumer?”, Journal of Consumer Marketing, Vol. 17 No. 2, pp. 158–171.10.1108/07363760010317213Search in Google Scholar

57. Purang, P. (2012). “Organisational Justice and Affective Commitment: The Mediating Role of Perceived Organisational Support”, Asian Academy of Management Journal, Vol. 16 No. 1, pp. 141-156.Search in Google Scholar

58. Robinson, S. L., Bennett, R. J. (1997). “Workplace deviance: Its definition, its manifestations, and its causes”, JAI Press, Greenwich.Search in Google Scholar

59. Rodgers, R. (1975). “A Protection Motivation Theory of Fear Appeals and Attitude Change”, The Journal of Psychology – Interdisiplinary and Applied, Vol. 91 No. 1, pp. 93 – 114.10.1080/00223980.1975.9915803Search in Google Scholar

60. Saalfield, P., (2005). “Internet Misuse Costs Businesses”, Infoworld. Available at: https://www.infoworld.com/article/2671119/internet-misuse-costs-businesses--178-billion-annually.html (10 August, 2019)Search in Google Scholar

61. Safire, W. (2002). “The Great Unwatched”, New York Times. Available at http://query.nytimes.com/gst/fullpage.html?res=9A03E7DB1E3FF93BA25751C0A9649C8B6 3 (10 August, 2019)Search in Google Scholar

62. Saif, N., Saleh, A. (2013). Psychological empowerment and job satisfaction in Jordanian hospitals. International Journal of Humanities and Social Science, Vol. 3 No. 16, pp.250-257.Search in Google Scholar

63. Sarmiento T.P., Laschinger H.K.S. Iwasiw C. (2004) Nurse educators workplace empowerment, burnout, and job satisfaction: testing Kanters theory. Journal of Advanced Nursing, Vol. 46 No. 2, pp.134–143.10.1111/j.1365-2648.2003.02973.xSearch in Google Scholar

64. Searle, R., Den Hartog, D.N., Weibel, A., Gillespie, N., Six, F., Hatzakis, T. Skinner, D. (2011), “Trust in the employer: the role of high-involvement work practices and procedural justice in European organizations”, The International Journal of Human Resource Management, Vol. 22 No. 5, pp. 1069-1092.10.1080/09585192.2011.556782Search in Google Scholar

65. Selmi, M. (2006). “Privacy for the working class: Public work and private lives”, Louisiana Law Review, Vol. 66, pp. 1035–1056.Search in Google Scholar

66. Semuels, A. (2013). Monitoring up- ends balance of power at workplace some say. Los Angeles Times. Available at: http://www.latimes.com/business/money/la-fi-mo-monitoring-upends-balance-of-power-at-work- place-20130408,0,7425573.story (15 April 2019)Search in Google Scholar

67. Shore, J. (2012). “Social Media Distractions Cost US Economy $650 (Infographic), Mashable UK. Available at: https://mashable.com/2012/11/02/social-media-work-productivity/?europe=true (20 April, 2019)Search in Google Scholar

68. Siegall, M., Gardner, S. (2000). Contextual factors of psychological empowerment. Personnel Review, Vol. 29 No. 6, pp.703-722.10.1108/00483480010296474Search in Google Scholar

69. Smith, J.H., Milberg, S.J., Burke, S.J. (1996), “Information Privacy: Measuring Individuals Concerns about Organizational Practices”, MIS Quarterly, Vol.20 No. 2, pp. 167-196.10.2307/249477Search in Google Scholar

70. Stanton, J. M. (2002). “Company profile of the frequent internet user: Web addict or happy employee?”, Communications of the Association for Computing Machinery, Vol. 45 No.1, pp. 55–59.10.1145/502269.502297Search in Google Scholar

71. Stanton, J., Stam, K. (2003). “Information Technology, Privacy and Power within Organizations: A View from Boundary Theory and Social Exchange Perspectives”, Surveillance and Society, Vol. 1 No. 2, pp. 152-190.10.24908/ss.v1i2.3351Search in Google Scholar

72. Stanton, J., Stam, K. (2006). The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets without Compromising Employee Privacy or Trust, Information Today, Medford.Search in Google Scholar

73. Stanton, J. M., Weiss, E. M. (2000). “Electronic monitoring in their own words: An exploratory study of employees’ experiences with new types of surveillance”, Computers in Human Behavior, Vol. 16 No.4, pp. 423–440.10.1016/S0747-5632(00)00018-2Search in Google Scholar

74. Stein, M.K., Newell, S., Wagner, E., Galliers, R. (2015). Coping with information technology: Mixed emotions, vacillation and non-conforming use patterns. MIS Quarterly, Vol. 32 No. 2, pp.367–392.10.25300/MISQ/2015/39.2.05Search in Google Scholar

75. Synder, J.L. (2010), “E-mail Privacy in the Workplace. A Boundary Regulation Perspective”, Journal of Business Communications, Vol. 47 No. 3, pp. 266-294.10.1177/0021943610369783Search in Google Scholar

76. Taddicken, M. (2010), “Measuring Online Privacy Concern and Protection in the (Social) Web: Development of the APCP and APCP-18 Scale”, Paper presented at the 60th Annual Conference of the International Communication Association, Singapore.Search in Google Scholar

77. Taddicken, M. (2014), “The ‘Privacy Paradox’ in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure”, Journal of Computer- Mediated Communication, Vol. 19 No.2, pp. 248-273.10.1111/jcc4.12052Search in Google Scholar

78. Tavani, H. T. (2004). “Ethics and technology: Ethical issues in an age of information and communication technology”, John Wiley & Sons, Chichester.Search in Google Scholar

79. Taylor, P., Bain, P. (1999). “An assembly line in the head’: Work and employee relations in the call centre”, Industrial Relations Journal, Vol. 30 No.2, pp. 101–117.10.1111/1468-2338.00113Search in Google Scholar

80. Tyler, T. (2003). “Trust within organisations”, Personnel Review, Vol. 32 No. 5, pp. 556-568.10.1108/00483480310488333Search in Google Scholar

81. Wagner, J., Cummings, G., Smith, D., Olson, J., Anderson, L., Warren, S. (2010), “The Relationship between structural empowerment and psychological empowerment for nurses – a systematic view”, Journal of Nursing Management, Vol. 18 No. 4, pp. 448 – 462.10.1111/j.1365-2834.2010.01088.xSearch in Google Scholar

82. Wong, C. A., Laschinger, H. K. (2013). Authentic leadership, performance, and job satisfaction: The mediating role of empowerment. Journal of Advanced Nursing, Vol. 69 No. 4, pp. 947-959.10.1111/j.1365-2648.2012.06089.xSearch in Google Scholar

eISSN:
1847-9375
Language:
English