Dataveillance in the Workplace: Managing the Impact of Innovation

Cliona McParland 1  and Regina Connolly 1
  • 1 Dublin City University Business School, Ireland

Abstract

Background: Monitoring and surveillance are a fundamental part of the workplace environment, with employee performance and productivity as the main objects of scrutiny. However, many questions surround the ethical nature of managements’ ability to employ advanced digital technologies to monitor employee behaviour and performance while in the workplace. If unaddressed, these concerns have the potential to significantly impact the relationship between the employee and the employer, impacting trust in management resulting in negative attitudes and counterproductive behaviours.

Objectives: The goal of this paper is to present a comprehensive review of workplace surveillance whilst outlining some of the emerging issues relating to the use of employee monitoring technologies in the workplace.

Methods/Approach: A detailed review of the literature was conducted in order to identify the major issues relating to workplace surveillance. In addition, a number of practitioner-based studies were examined to extract and identify emerging trends and concerns at an industry level.

Results: Workplace surveillance is on the rise; however, empirical studies are in short supply.

Conclusions: The issue of workplace surveillance is an under-researched area, which requires much attention. There is a distinct need for clear measures and structures that govern the effective and fair use of communication technologies in the workplace.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • 1. Alder, G.S., Noel, T.W Ambrose, M.L. (2006), “Clarifying the effects of Internet Monitoring on Job Attitudes: The Mediating Role of Employee Trust”. Information and Management, Vol. 43, No. 7, pp. 894-903.

  • 2. AMA Survey 2003. Email Rules, Policies and Practices Survey [Online]. Available from http://www.amanet.org/research/pdfs/email_policies_practices.pdf (15 January 2019).

  • 3. AMA Survey (2017). Workplace Monitoring and Surveillance, available at: http://www.amanet.org/research/ (15 January 2019).

  • 4. Ambrose, M.L., Arnaud, A. (2005), “Are Procedural Justice and Distributive Justice conceptually different?”, in J. Greenberg J.A Colquitt, (Eds.), Handbook of Organisational Justice, pp. 59-84,. New Jersey Lawrence Erlbaum Associates.

  • 5. Barrett-Howard, E., Tyler, T.R. (1986). “Procedural Justice as a Criterion in Allocation Decisions”, Journal of Personality and Social Pyschology, Vol 50 No. 2, pp. 296-304.

  • 6. Beaudry, A., Pinsonneault, A. (2005), “Understanding User Responses to Information Technology: A Coping Model of User Adaptation”, MIS Quarterly, Vol. 29 No. 3, pp.493-524.

  • 7. Beaulieu R., Shamian J., Donner G. Pringle D. (1997), “Empowerment and commitment of nurses in long term care”, Nursing Economics, Vol. 15 No.1, pp.32–41.

  • 8. Bies, R.J. Moag, J.F. (1986). “Interactional Justice: Communication Criteria of Fairness”, In Lewicki, R.J., Sheppard, B.H., Bazerman, M.H., (Eds), Research on Negotiations in Organizations, Vol 1, JAI Press, pp. 43-55.

  • 9. Boxall, P Purcell, J. (2011), “Strategy and Human Resource Management, 3rd ed., Palgrave Macmillan, Basingstoke.

  • 10. Bradbury-Jones, C., Sambrook, S., Irvine, F. (2007). Empowerment and being valued: A phenomenological study of nursing students’ experiences of clinical practice. Nurse Education Today, Vol.31 No. 4, pp. 368 – 372.

  • 11. Buchanan, T., Paine, C., Joinson, A.N., Reips, U. (2007), “Development of Measures of Online Privacy Concern and Protection for Use on the Internet”, Journal of the American Society for Information Science and Technology, Vol. 58 No. 2, pp. 157-165.

  • 12. Butler, A.M. (2012), “The Effects of Organizational Justice Perceptions Associated with the use of Electronic Monitoring on Employees’ Organizational Citizenship and Withdrawal Behaviours: A Social Exchange Perspective”, Electronic Theses and Dissertations, 478, available at: http;//scholar.uwindsor.ca/etd/478 / (15 January, 2019)

  • 13. Chory, R.M., Vela, L.E., Avtgis, T.A. (2016), “Organizational Surveillance of Computer-Mediated Workplace Communication: Employee Privacy Concerns and Responses”, Employee Responsibilities and Rights Journal, Vol. 28 No. 1, pp. 23-43.

  • 14. Clarke, R.A (1988). “Information Technology and Dataveillance”, Communications of the ACM, Vol. 31 No. 5, pp. 498-512.

  • 15. Cohen-Charash, Y., Spector, P.E. (2001), “The Role of Justice in Organizations: A Meta-Analysis”, Organizational Behavior and Human Decision Processes, Vol. 86 No. 2, pp. 278-321.

  • 16. Connell, J., Ferres, N. Travalione, T. (2003), “Engendering trust in manager-subordinate relationships”, Personnel Review, Vol. 32 No. 5, pp. 569-587.

  • 17. Conway, N. Briner, R.B. (2002), “A daily diary study of affective responses to contract breach and exceeded promises”, Journal of Organizational Behaviour, Vol. 23 No. 3, pp. 287 – 302.

  • 18. Craver, C. B. (2006). “Privacy issues affecting employers, employees and labour organizations”, Louisiana Law Review, Vol. 66, pp. 1057–1078.

  • 19. Crowd Research Partners: Insider Threat Report (2017). Cyber-security Insiders, CA Technologies, Available at: https://www.ca.com/content/dam/ca/us/files/ebook/insider-threat-report.pdf (10 August 2018).

  • 20. Dietz, G. Fortin, M. (2007), “Trust and justice in the formation of joint consultation committees”, Journal of International Human Resource Management, Vol. 18 No. 7, pp. 1159-1181.

  • 21. Elie-Dit-Cosaque, C. M., Straub, D. W. (2011). Opening the black box of system usage: User adaptation to disruptive it. European Journal of Information Systems, 20, 589–607.

  • 22. Evans, L. (2007). “Monitoring technology in the American workplace: Would adopting English privacy standards better balance employee privacy and productivity?”, California Law Review, Vol. 95, pp. 1115–1149. Forbes Survey (2012). Employees really do waste time at work, Available at: https://www.forbes.com/sites/cherylsnappconner/2012/07/17/employees-really-do-waste-time-at-work/#b0461805e6da / (10 August 2018).

  • 23. Foucault, M. (1977). “Discipline and Punishment: The Birth of the Prison, Penguin Books, London.

  • 24. Gould-Williams, J. (2003). “The importance of HR practices and workplace trust in achieving superior performance: a study of public-sector organizations”, International Journal of Human Resource Management, Vol. 14 No. 1, pp. 28-54.

  • 25. Graupmann, V., Jonas, E., Meier, E., Hawelka, S., Aichhorn, M. (2012). “Reactance, the self, and its group: When threats to freedom come from the ingroup versus the outgroup”, European Journal of Social Psychology, Vol. 42 No. 2, pp. 164–173.

  • 26. Guest, D.E. (2004). “The Psychology of the employment relationship: An analysis based on the psychological contract”, Applied Psychology, Vol. 53 No. 4, pp. 541-555.

  • 27. Hauenstein, N.M.A., McGonigle, T., and Flinder, S.W. (2001), “A meta-analysis of the relationship between procedural justice and distributive justice: Implications of justice research”, Employee Responsibilities and Rights Journal, Vol. 13 No. 1, pp. 39-55.

  • 28. Helne, C.A. (2005). “Prediciting workplace deviance from the interaction between organizational justice and personality”, Journal of Managerial Issues, Vol. 17 No.20, pp. 247-263.

  • 29. Holland, P.J., Cooper, B. Hecker, R. (2015). “Electronic monitoring and surveillance in the workplace: The effects on trust in management, and the moderating role of occupational type”, Personnel Review, Vol. 44 No. 1, pp.161-175.

  • 30. IBM (2006). “Stopping insider attacks: How organizations can protect their sensitive information”, Retrieved from http://www-935.ibm.com/services/us/imc/pdf/gsw00316-usen-00-insider-threats-wp.pdf (15 August 2019)

  • 31. Jackson, T., Dawson, R., Wilson, D. (2001). The cost of email interruption (Item No. 2134/495). Loughborough University Institutional Repository, Loughborough.

  • 32. Jensen, J. M., Raver, J. L. (2012). “When self-management and surveillance collide: Consequences for employees’ trust, autonomy, and discretionary behaviors”, Group & Organization Management, Vol. 37 No. 3, pp. 308–346.

  • 33. Kanter R. (1977) Men and Women of the Corporation. Basic Books, New York, NY.

  • 34. Kanter R. (1993) Men and Women of the Corporation, 2nd edn. Basic Books, New York, NY.

  • 35. Krebs, J., Madigan, E., Tullai-McGuiness, S. (2008). The rural nurse work environment and structural empowerment. Policy, Politics and Nursing Practice, Vol. 9 No. 1, pp.28-3

  • 36. Kim, H. Kankanhalli, A. (2009). “Investigating user resistance to information systems implementation: A status quo bias perspective”, MIS Quarterly, Vol. 33 No. 3, pp. 567-582.

  • 37. Lane, F. S. (2003). “The naked employee: How technology is compromising workplace privacy”, AMACOM, New York.

  • 38. Laschinger, H.K.S., Wong, C., McMahon, L. Kaufmann, C. (1999). “Leader Behavior Impact on Staff Nurse Empowerment, Job Tension and Work Effectiveness”, Journal of Nursing Administration, Vol. 29 No. 5, pp. 28-39.

  • 39. Laschinger H.K.S., Finegan J., Shamian J. Casier S. (2000) Organizational trust and empowerment in restructured healthcare settings: effects on staff nurse commitment, Journal of Nursing Administration, Vol. 30 No. 9, pp.413–425.

  • 40. Laschinger, H.K.S., Finegan, J., Shamian, J., Wilk, P. (2001). “Impact of Structural and Psychological Empowerment on Job Strains in Nursing Work Settings: Effects on Staff Nurse Commitment”, Journal of Nursing Administration, Vol. 31 No. 5, pp. 260-272.

  • 41. Laudon, K. C., Laudon, J. P. (2001). “Essentials of management information systems: Organisation and technology in the networked enterprise”, 4th ed., Prentice Hall, Upper Saddle River.

  • 42. Lawrence, T.B., Robinson, S.L. (2007), “Ain’t Misbehaving: Workplace Deviance as Organizational Resisitance”, Journal of Management, 33, pp. 378-394.

  • 43. Leventhal, G.S. (1980). “What should be done with equity theory? New approaches to the study of fairness in social relationships”, in K.Gergen, M. Greenberg., R. Willis (Ed), Socia Exchange: Advances in Theory and Research, pp. 27-55, Plenum Press, New York.

  • 44. Martin, A. J., Wellen, J. M. Grimmer, M. R. (2016). “An eye on your work: How empowerment affects the relationship between electronic surveillance and counterproductive work behaviours”, The International Journal of Human Resource Management, Vol. 27 No. 21, pp. 2635–2651.

  • 45. Marx, G., Sherizen, S. (1991). “Monitoring on the job: How to protect privacy as well as property”, In T. Forester (Ed.), Computers in the human context: Information technology, productivity, and people, pp. 397–406, MIT Press, Cambridge.

  • 46. Mayer, R. C., Davis, J. D., Schoorman, F. D. (1995). “An integrative model of organisational trust”, Academy of Management Review, Vol. 20 No. 3, pp. 709–734.

  • 47. McFarlin, D.B., Sweeney, P.D. (1992), “Distributive and procedural justice as predictors of satisfaction with personal and organizational outcomes”, Academy of Management Journal, Vol. 35 No. 3, pp. 626-637.

  • 48. McNall, L.A., Stanton, J.M. (2011), “Private Eyes are Atching You: Reactions to Location Sensing Technologies”, Journal of Business and Pyschology, Vol. 26 No. 3, pp. 299-309.

  • 49. McParland, C., Connolly, R. (2009), “The role of dataveillance in the organsiation: Some emerging trends”, Paper presented at the Irish Academy of Management Conference. Galway, UK.

  • 50. Morrison, E.W. Robinson, S.L. (1997), “When employees feel betrayed: A model of how psychological contract violation develops”, The Academy of Management Review, Vol. 22 No. 1, pp. 226-256.

  • 51. Nelson, D., Quick, J. (2012). Principles of Organizational Behavior: Realities and Challenges. South Western, Sydney.

  • 52. Nord, G. D., McCubbins, T. F., Horn Nord, J. (2006). “Email monitoring in the workplace: Privacy, legislation, and surveillance software”, Communications of the ACM, Vol. 49 No. 8, pp. 73–77.

  • 53. Nussbaum, K., duRivage, V. (1986). “Computer monitoring: Mismanagement by remote control”, Business and Society Review, Vol. 56, pp. 16–29.

  • 54. O’Donnell, A.T., Jetten, J., Ryan, M.K. (2010). “Who is Watching Over You? The Role of Shared Identity in Perceptions of Surveillance”, European Journal of Social Psychology, Vol. 40 No. 1, pp. 135-147.

  • 55. Petronio, S. (2002). “Boundaries of Privacy: Dialectics of Disclosure”, State University of New York Press, Albany.

  • 56. Prakhaber, P. R. (2000). “Who owns the online consumer?”, Journal of Consumer Marketing, Vol. 17 No. 2, pp. 158–171.

  • 57. Purang, P. (2012). “Organisational Justice and Affective Commitment: The Mediating Role of Perceived Organisational Support”, Asian Academy of Management Journal, Vol. 16 No. 1, pp. 141-156.

  • 58. Robinson, S. L., Bennett, R. J. (1997). “Workplace deviance: Its definition, its manifestations, and its causes”, JAI Press, Greenwich.

  • 59. Rodgers, R. (1975). “A Protection Motivation Theory of Fear Appeals and Attitude Change”, The Journal of Psychology – Interdisiplinary and Applied, Vol. 91 No. 1, pp. 93 – 114.

  • 60. Saalfield, P., (2005). “Internet Misuse Costs Businesses”, Infoworld. Available at: https://www.infoworld.com/article/2671119/internet-misuse-costs-businesses--178-billion-annually.html (10 August, 2019)

  • 61. Safire, W. (2002). “The Great Unwatched”, New York Times. Available at http://query.nytimes.com/gst/fullpage.html?res=9A03E7DB1E3FF93BA25751C0A9649C8B6 3 (10 August, 2019)

  • 62. Saif, N., Saleh, A. (2013). Psychological empowerment and job satisfaction in Jordanian hospitals. International Journal of Humanities and Social Science, Vol. 3 No. 16, pp.250-257.

  • 63. Sarmiento T.P., Laschinger H.K.S. Iwasiw C. (2004) Nurse educators workplace empowerment, burnout, and job satisfaction: testing Kanters theory. Journal of Advanced Nursing, Vol. 46 No. 2, pp.134–143.

  • 64. Searle, R., Den Hartog, D.N., Weibel, A., Gillespie, N., Six, F., Hatzakis, T. Skinner, D. (2011), “Trust in the employer: the role of high-involvement work practices and procedural justice in European organizations”, The International Journal of Human Resource Management, Vol. 22 No. 5, pp. 1069-1092.

  • 65. Selmi, M. (2006). “Privacy for the working class: Public work and private lives”, Louisiana Law Review, Vol. 66, pp. 1035–1056.

  • 66. Semuels, A. (2013). Monitoring up- ends balance of power at workplace some say. Los Angeles Times. Available at: http://www.latimes.com/business/money/la-fi-mo-monitoring-upends-balance-of-power-at-work- place-20130408,0,7425573.story (15 April 2019)

  • 67. Shore, J. (2012). “Social Media Distractions Cost US Economy $650 (Infographic), Mashable UK. Available at: https://mashable.com/2012/11/02/social-media-work-productivity/?europe=true (20 April, 2019)

  • 68. Siegall, M., Gardner, S. (2000). Contextual factors of psychological empowerment. Personnel Review, Vol. 29 No. 6, pp.703-722.

  • 69. Smith, J.H., Milberg, S.J., Burke, S.J. (1996), “Information Privacy: Measuring Individuals Concerns about Organizational Practices”, MIS Quarterly, Vol.20 No. 2, pp. 167-196.

  • 70. Stanton, J. M. (2002). “Company profile of the frequent internet user: Web addict or happy employee?”, Communications of the Association for Computing Machinery, Vol. 45 No.1, pp. 55–59.

  • 71. Stanton, J., Stam, K. (2003). “Information Technology, Privacy and Power within Organizations: A View from Boundary Theory and Social Exchange Perspectives”, Surveillance and Society, Vol. 1 No. 2, pp. 152-190.

  • 72. Stanton, J., Stam, K. (2006). The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets without Compromising Employee Privacy or Trust, Information Today, Medford.

  • 73. Stanton, J. M., Weiss, E. M. (2000). “Electronic monitoring in their own words: An exploratory study of employees’ experiences with new types of surveillance”, Computers in Human Behavior, Vol. 16 No.4, pp. 423–440.

  • 74. Stein, M.K., Newell, S., Wagner, E., Galliers, R. (2015). Coping with information technology: Mixed emotions, vacillation and non-conforming use patterns. MIS Quarterly, Vol. 32 No. 2, pp.367–392.

  • 75. Synder, J.L. (2010), “E-mail Privacy in the Workplace. A Boundary Regulation Perspective”, Journal of Business Communications, Vol. 47 No. 3, pp. 266-294.

  • 76. Taddicken, M. (2010), “Measuring Online Privacy Concern and Protection in the (Social) Web: Development of the APCP and APCP-18 Scale”, Paper presented at the 60th Annual Conference of the International Communication Association, Singapore.

  • 77. Taddicken, M. (2014), “The ‘Privacy Paradox’ in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure”, Journal of Computer- Mediated Communication, Vol. 19 No.2, pp. 248-273.

  • 78. Tavani, H. T. (2004). “Ethics and technology: Ethical issues in an age of information and communication technology”, John Wiley & Sons, Chichester.

  • 79. Taylor, P., Bain, P. (1999). “An assembly line in the head’: Work and employee relations in the call centre”, Industrial Relations Journal, Vol. 30 No.2, pp. 101–117.

  • 80. Tyler, T. (2003). “Trust within organisations”, Personnel Review, Vol. 32 No. 5, pp. 556-568.

  • 81. Wagner, J., Cummings, G., Smith, D., Olson, J., Anderson, L., Warren, S. (2010), “The Relationship between structural empowerment and psychological empowerment for nurses – a systematic view”, Journal of Nursing Management, Vol. 18 No. 4, pp. 448 – 462.

  • 82. Wong, C. A., Laschinger, H. K. (2013). Authentic leadership, performance, and job satisfaction: The mediating role of empowerment. Journal of Advanced Nursing, Vol. 69 No. 4, pp. 947-959.

OPEN ACCESS

Journal + Issues

Search