Skip to main content
Log in

Privacy and beyond: socio-ethical concerns of ‘on-the-job’ surveillance

  • Published:
Asian Journal of Business Ethics Aims and scope Submit manuscript

Abstract

Current sophisticated technologies in the workplace offer inexpensive and user-friendly devices and the means to control ‘on-the-job’ behaviour. This promises high profitability, productivity and liability alleviation. Yet, it also gives rise to a socio-ethical crisis of incessant surveillance that often overrules its anticipated benefits and motives of control and care. The dilemma is twofold: First, scholarly studies undertaken on this issue from a principally administrative and legal point of view tend to lack a moral framework and so prove unable to offer an integral understanding. Second, a majority of scholars tend to focus exclusively on individual rights, such as privacy, even at the risk of overlooking its social impact and consequences. This paper thus aims to unravel these forgotten moral and social concerns. It analyses the surveillance frameworks and the arguments for and against it; scrutinises critically the technological devices most often implemented in the workplace; examines both its individual effects (privacy) and social effects (categorising); and proposes an ethics of workplace surveillance in a framework of trust and transparency. It argues, in all these ways, for an alteration or modification of traditional organisational behaviour within a new frame of reference, situated within and going beyond questions of moral duty, principles and legal compliance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Aiello, J. R., & Svec, C. M. (1993). Computer monitoring of work performance: extending the social facilitation framework to electronic presence. Journal of Applied Social Psychology, 23(7), 537–548.

    Article  Google Scholar 

  • Albaum, G. (2014). Business-related ethical values of future business leaders in four Asia-Pacific countries. Asian Journal of Business Ethics, 3(2), 127–140.

    Article  Google Scholar 

  • Alge, B. J., & Hansen, S. D. (2014). Workplace monitoring and surveillance research since 1984: a review and agenda. In M. D. Coovert & L. F. Thompson (Eds.), The psychology of workplace technology (pp. 209–237). New York: Routledge.

    Google Scholar 

  • Alge, B. J. (2001). Effects of computer surveillance on perceptions of privacy and procedural justice. Journal of Applied Psychology, 86(4), 797–804.

    Article  Google Scholar 

  • Allen, M. W., et al. (2007). Workplace surveillance and managing privacy boundaries. Management Communication Quarterly, 21(2), 172–200.

    Article  Google Scholar 

  • Al-Rjoub, H., et al. (2008). Electronic monitoring: the employees’ point of view. Journal of Social Sciences, 4(3), 189–195.

    Article  Google Scholar 

  • American Management Association & ePolicy Institute. (2001). 2001 AMA, US News, ePolicy Institute Survey, http://www.epolicyinstitute.com/docs/ePolicyInstitute-AMA-2001Survey-SummaryFinal.pdf. Accessed 10 March 2018.

  • American Management Association & ePolicy Institute. (2005). 2005 Electronic Monitoring & Surveillance Survey http://www.epolicyinstitute.com/2005-electronic-monitoring-surveillance-survey-results. Accessed 10 March 2018.

  • American Management Association & ePolicy Institute. (2007). 2007 Electronic Monitoring & Surveillance Survey. http://www.amanet.org/training/articles/the-latest-on-workplace-monitoring-and-surveillance.aspx; http://www.epolicyinstitute.com/2007-survey-results. Accessed 10 March 2018.

  • American Management Association & ePolicy Institute. (2009). 2009 Electronic Business Communication Policies & Procedures Survey, http://www.epolicyinstitute.com/2009-electronic-business-communication-policies-procedures-survey-results. Accessed 10 March 2018.

  • Andrejevic, M. (2007). Surveillance in the digital enclosure. The Communication Review, 10(4), 295–317.

    Article  Google Scholar 

  • Baase, S. (2009). A gift of fire: social, legal, and ethical issues for computing and the internet (3rd ed.). New Jersey: Pearson Prentice Hall.

    Google Scholar 

  • Ball, K. (2003). Categorizing the workers: electronic surveillance and social ordering in the call center. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination (pp. 201–225). London: Routledge.

    Google Scholar 

  • Ball, K. (2010). Workplace surveillance: an overview. Labour History, 51(1), 87–106.

    Article  Google Scholar 

  • Başar, U., Siğri, Ü., & Basim, H. N. (2018). Ethics lead the way despite organizational politics. Asian Journal of Business Ethics, 7(1), 81–101.

    Article  Google Scholar 

  • Berggren, E., & Bernshteyn, R. (2007). Organizational transparency drives company performance. Journal of Management Development, 26(5), 411–417.

    Article  Google Scholar 

  • Bhave, D. P. (2014). The invisible eye? Electronic performance monitoring and employee job performance. Personal Psychology, 67, 605–635.

    Google Scholar 

  • Blodgett, J. G., Hill, D. J., & Tax, S. S. (1996). The effects of distributive, procedural, and interactional justice on postcomplaint behaviour. Journal of Retailing, 73(2), 185–210.

    Article  Google Scholar 

  • Bogard, W. (1996). The simulation of surveillance: hyper-control in telematic societies. Cambridge: Cambridge University Press.

    Google Scholar 

  • Botan, C., & Vorvoreanu, M. (2005). What do employees think about electronic surveillance at work? In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 123–144). Hershey: Idea Group Publishing.

    Chapter  Google Scholar 

  • Bowker, G. C., & Star, S. L. (1999). Sorting things out: classification and its consequences. Cambridge, MA: MIT Press.

    Google Scholar 

  • Bucklin, R. E., & Sismeiro, C. (2009). Click here for Internet insight: advances in clickstream data analysis in marketing. Journal of Interactive Marketing, 23(1), 35–48.

    Article  Google Scholar 

  • Ciocchetti, C. A. (2011). The eavesdropping employer: a twenty-first century framework for employee monitoring. American Business Law Journal, 48(2), 285–369.

    Article  Google Scholar 

  • Clemmer, E. C., & Schneider, B. (1996). Fair service. In S. W. Brown, D. A. Bowen, & T. Swartz (Eds.), Advances in services marketing and management, Vol. 5 (pp. 109–126). Greenwich, CT: JAI Press.

    Google Scholar 

  • Cohen, J. B., & Basu, K. (1987). Alternative models of categorization: toward a contingent processing framework. Journal of Consumer Research, 13(4), 455–472.

    Article  Google Scholar 

  • Cohn, C. (2013). 4 ways transparency can boost your business. https://www.americanexpress.com/us/small-business/openforum/articles/4-ways-transparency-can-boost-your-business/. Accessed 26 February 2015.

  • Coleman, R. (2010). Surveillance and social ordering. In D. Drake, J. Muncie, & L. Westmarland (Eds.), Criminal justice: local and global (pp. 141–176). Cullompton: Willan.

    Google Scholar 

  • Coultrup, S., & Fountain, P. D. (2012). Effects of electronic monitoring and surveillance on the psychological contract of employees: an exploratory study. Proceedings of ASBBS Conference, 19(1), 219–235.

    Google Scholar 

  • Cox, S., Goette, T., & Young, D. (2005). Workplace surveillance and employee privacy: implementing an effective computer use policy. Communications of the IIMA, 5(2), 57–66.

    Google Scholar 

  • Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science, 10(1), 104–115.

    Article  Google Scholar 

  • D’Urso, S. C. (2006). Who’s watching us at work? Toward a structural-perceptual model of electronic monitoring and surveillance in organizations. Communication Theory, 16, 281–303.

    Article  Google Scholar 

  • Deleuze, G. (1992). Postscript on the societies of control. October, 59, 3–7.

    Google Scholar 

  • Deloitte, L.L.P. (2009). Social networking and reputational risk in the workplace. Deloitte LLP 2009 ethics & workplace survey results. http://www.csrwire.com/press_releases/26972-Deloitte-s-2009-Ethics-Workplace-Survey-Examines-the-Reputation-Risk-Implications-of-Social-Networks. Accessed 10 March 2018.

  • Denning, D. E. (1999). Information warfare and security. Boston: Addison-Wesley.

    Google Scholar 

  • Doney, P. M., Cannon, J. P., & Mullen, M. R. (1998). Understanding the influence of national culture on the development of trust. Academy of Management Review, 23(3), 601–620.

    Article  Google Scholar 

  • Eisenhardt, K. M. (1989). Agency theory: an assessment and review. Academy of Management Review, 14(1), 57–74.

    Article  Google Scholar 

  • Eivazi, K. (2011). Computer use monitoring and privacy at work. Computer Law and Security Review, 27, 516–523.

    Article  Google Scholar 

  • Feinberg, T., & Robey, N. (2009). Cyberbullying: intervention and prevention strategies. National Association of School Pschologists: Communique, 38(4), 1–4.

    Google Scholar 

  • Findlay, P., & McKinlay, A. (2003). Surveillance, electronic communications technology and regulation. Industrial Relations Journal, 34(4), 305–318.

    Article  Google Scholar 

  • Fink, J. (2014). In defence of snooping employers. University of Pennsylvania Journal of Business Law, 16(2), 551–596.

    Google Scholar 

  • Firoz, N., Taghi, R., & Souckova, J. (2006). E-mails in the workplace: the electronic equivalent of ‘DNA’ evidence. Journal of American Academy of Business, 8(2), 71–78.

    Google Scholar 

  • Foucault, M. (1977). Discipline and punish: the birth of the prison, trans. Alan Sheridan (New York: Penguin Books, 1991), 201. This work was first published in 1975 as Surveiller et punir: Naissance de la prison by Éditions Gallimard. This translation was first published by Allen Lane in 1977.

  • Fukuyama, F. (1995). Trust. New York: Free Press.

    Google Scholar 

  • Furedi, F. (2002). Culture of fear: risk-taking and the morality of low expectation. London: Continuum.

    Google Scholar 

  • Gandy, O. H., Jr. (2014). Statistical surveillance: remote sensing in the digital age. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp. 125–132). Oxon: Routledge.

    Google Scholar 

  • Gebler, D. (2011). Transparency is a key to performance. http://managementhelp.org/blogs/business-ethics/2011/03/14/transparency-is-a-key-to-performance/. Accessed 22 February 2015.

  • Graham, S., & Wood, D. (2007). Digitizing surveillance: categorization, space, inequality. In S. P. Hier & J. Greenberg (Eds.), The surveillance studies reader (pp. 218–230). Berkshire, England: McGraw-Hill.

    Google Scholar 

  • Haggerty, K. D. (2008). Tear down the walls: on demolishing the panopticon. In D. Lyon (Ed.), Theorizing surveillance: the panopticon and beyond (pp. 23–45). Cullompton: Willan publishing.

    Google Scholar 

  • Heald, D. (2006). Varieties of transparency. In C. Hood & D. Heald (Eds.), Transparency—the key to better governance (pp. 25–43). New York: Oxford University Press.

    Google Scholar 

  • Hier, S. P., & Greenberg, J. (2007). Surveillance, the nation-state and social control. In S. P. Hier & J. Greenberg (Eds.), The surveillance studies reader (pp. 11–17). Berkshire, England: McGraw-Hill.

    Google Scholar 

  • Holland, P. J., Cooper, B., & Hecker, R. (2015). Electronic monitoring and surveillance in the workplace: the effects on trust in management, and the moderating role of occupational type. Personnel Review, 44(1), 161–175.

    Article  Google Scholar 

  • Hon, L. C., & Grunig, J. E. (1999). Guidelines for measuring relationships in public relations. Gainesville, FL: Institute for Public Relations.

    Google Scholar 

  • Hood, J. N. (2003). The relationship of leadership style and CEO values to ethical practices in organizations. Journal of Business Ethics, 43(4), 263–273.

    Article  Google Scholar 

  • Indiparambil, J. J. (2017). An empirical study on the detrimental effects of employee surveillance in India. International Journal of Research in Computer Application & Management, 7(12), 48–51.

    Google Scholar 

  • Jahansoozi, J. (2006). Organization-stakeholder relationships: exploring trust and transparency. Journal of Management Development, 25(10), 942–955.

    Article  Google Scholar 

  • Jenkins, R. (2014). Identity, surveillance and modernity. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies (pp. 159–166). Oxon: Routledge.

    Google Scholar 

  • Kelly, J. (2014). Cellphone data spying: it’s not just the NSA. USA Today, June 13, 2014. https://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-nsa-police/3902809/. Accessed 10 March 2018.

  • Kidwell, R. E., & Sprague, R. (2009). Electronic surveillance in the global workplace: laws, ethics, research and practice. New Technology, Work and Employment, 24(2), 194–208.

    Article  Google Scholar 

  • Kierkegaard, S. (2005). Privacy in electronic communication, watch your e-mail: your boss is snooping. Computer Law & Security Report, 21, 226–236.

    Article  Google Scholar 

  • Kizza, J. M., & Ssanyu, J. (2005). Workplace surveillance. In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 1–18). Hershey: Idea Group Publishing.

    Google Scholar 

  • Konovsky, M. A. (2000). Understanding procedural justice and its impact on business organizations. Journal of Management, 26(3), 489–511.

    Article  Google Scholar 

  • Lane, F. S., III. (2003). The naked employee: How technology is compromising workplace privacy. New York: Amacom.

    Google Scholar 

  • Landstrom, H. (1993). Agency theory and its application to small firms: evidence from the Swedish venture capital market. The Journal of Entrepreneurial Finance, 2(3), 203–218.

    Google Scholar 

  • Lee, S., & Kleiner, B. H. (2003). Electronic surveillance in the workplace. Management Research News, 26(2, 3, 4), 72–81.

    Article  Google Scholar 

  • Leventhal, G. S. (1980). What should be done with equity theory? New approaches to the study of fairness in social relationships. In K. Gergen, M. Greenberg, & R. Willis (Eds.), Social exchange: advances in theory and research (pp. 27–55). New York: Plenum Press.

    Chapter  Google Scholar 

  • Li, D. C. (2018). Do managerial ethics and legal education influence online privacy policies in greater China? Asian Journal of Business Ethics, 7(2), 117–136.

    Article  Google Scholar 

  • Lyon, D. (2001a). Surveillance society: monitoring everyday life. Buckingham: Open University Press.

    Google Scholar 

  • Lyon, D. (2001b). Facing the future: seeking ethics for everyday surveillance. Ethics and Information Technology, 3(3), 171–181.

    Article  Google Scholar 

  • Lyon, D. (2003a). Surveillance after September 11. Cambridge: Polity Press.

    Google Scholar 

  • Lyon, D. (2003b). Surveillance as social sorting: computer codes and mobile bodies. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination (pp. 13–32). London: Routledge.

    Google Scholar 

  • Lyon, D. (2007a). Everyday surveillance: personal data and social classifications. In S. P. Hier & J. Greenberg (Eds.), The surveillance studies reader (pp. 136–146). New York: McGraw-Hill.

    Google Scholar 

  • Lyon, D. (2007b). Surveillance studies: an overview. Cambridge: Polity Press.

    Google Scholar 

  • Lyon, D. (2007c). Surveillance, security and social sorting: emerging research priorities. International Criminal Justice Review, 17(3), 161–170.

    Article  Google Scholar 

  • Lyon, D. (2014). Introduction: surveillance as sorting. In K. Ball, K. D. Haggerty, & D. Lyon (Eds.), Routledge handbook of surveillance studies. London: Routledge.

    Google Scholar 

  • Martin, K., & Freeman, R. E. (2003). Some problems with employee monitoring. Journal of Business Ethics, 43, 353–361.

    Article  Google Scholar 

  • Martinez-Balleste, A., & Solanas, A. (2009). An introduction to privacy aspects of information and communication technologies. World Scientific Review, 4(5), 1–20.

    Google Scholar 

  • Marx, G. T. (1998). Ethics for the new surveillance. The Information Society, 14(3), 171–185.

    Article  Google Scholar 

  • Marx, G. T. (2002). What’s new about the “new surveillance”? Classifying for change and continuity. Surveillance and Society, 1(1), 9–29.

    Article  Google Scholar 

  • Marx, G. T. (2016). Windows into the soul: surveillance and society in an age of high technology. Chicago: University of Chicago Press.

    Book  Google Scholar 

  • Mason, D., Button, G., Lankshear, G., Coates, S., & Sharrock, W. (2002). On the poverty of apriorism: technology, surveillance in the workplace and employee responses. Information, Communication & Society, 5(4), 555–572.

    Article  Google Scholar 

  • McEvoy, S. (2002). E-mail and Internet monitoring and the workplace: do employees have a right to privacy? Communications and the Law, 24(2), 69–84.

    Google Scholar 

  • McHardy, C., Giesbrecht, T., & Brady, P. (2005). Workplace monitoring and surveillance. McCarthy Tetrault. http://www.mccarthy.ca/pubs/monitoring_and_surveillance.pdf. Accessed 30 November 2017.

  • McHardy, C. et al. (2015). Workplace monitoring and surveillance. McCarthy Tétrault. http://www.mccarthy.ca/pubs/Monitoring_and_Surveillance.pdf. Accessed 2 Oct 2018.

  • Minsky, M., Kurzweil, R., & Mann, S. (2013). The Society of Intelligent Veillance. International Symposium on Technology and Society (ISTAS).

  • Monahan, K. (2012). A review of the literature concerning ethical leadership in organizations. Emerging Leadership Journeys, 5(1), 56–66.

    Google Scholar 

  • Moor, J. H. (1990). The ethics of privacy protection. Library Trends, 39(1 & 2), 69–82.

    Google Scholar 

  • Moore, A. D. (2010). Privacy rights: moral and legal foundations. University Park, PA: Penn State University Press.

    Google Scholar 

  • Morse, J. (2017). Smartphone apps track users’ locations and sell data to third parties. Mashable. November 16, 2017. https://mashable.com/2017/11/15/thanksgiving-privacy-smartphone-apps/#sENkB5IlamqN. Accessed 15 March 2018.

  • Moussa, M. (2015). Monitoring employee behaviour through the use of technology and issues of employee privacy in America. SAGE Open, 5(2), 1–13.

    Article  Google Scholar 

  • Mujtaba, B. G. (2003). Ethical implications of employee monitoring: what leaders should consider. Journal of Applied Management and Entrepreneurship http://www.huizenga.nova.edu/Jame/articles/employee-monitoring.cfm. Accessed 5 March 2015.

  • Nelkin, D., & Andrews, L. (2003). Surveillance creep in the genetic age). In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination. London: Routledge.

    Google Scholar 

  • Nevogt, D. (2015). Employee monitoring software and tools—the top 10 options. 2015. http://blog.hubstaff.com/10-employee-monitoring-software-options-monitor-activity/. Accessed 28 September 2017.

  • Niehoff, B. P., & Moorman, R. H. (1993). Justice as a mediator of the relationship between methods of monitoring and organizational citizenship behaviour. Academy of Management Journal, 36(3), 527–556.

    Google Scholar 

  • Nielson, I. K., Jex, S. M., & Adams, G. A. (2000). Development and validation of scores on a two-dimensional workplace friendship scale. Educational and Psychological Measurement, 60, 628–643.

    Article  Google Scholar 

  • Nissenbaum, H. (2004a). Information technology and ethics. Berkshire encyclopedia of human-computer interaction (pp. 235–239). Great Barrington, MA: Berkshire Publishing Group.

    Google Scholar 

  • Nissenbaum, H. (2004b). Will security enhance trust online, or supplant it? In R. M. Kramer & K. S. Cook (Eds.), Trust and distrust in organizations: dilemmas and approaches (Vol. 7, pp. 155–188). New York: Russell Sage Foundation.

    Google Scholar 

  • Nissenbaum, H. (2010). Privacy in context: technology, policy, and the integrity of social life. Palo Alto, CA: Stanford University Press.

    Google Scholar 

  • Nord, G. D., McCubbins, T. F., & Nord, J. H. (2006). E-monitoring in the workplace: privacy, legislation, and surveillance software. Communications of the ACM, 49(8), 72–77.

    Article  Google Scholar 

  • Norris, C. (2003). From personal to digital: CCTV, the panopticon, and the technological mediation of suspicion and social control. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination (pp. 249–281). London: Routledge.

    Google Scholar 

  • Ormerod, R. J., & Ulrich, W. (2013). Operational research and ethics: a literature review. European Journal of Operational Research, 228(2), 291–307.

    Article  Google Scholar 

  • Ottensmeyer, E. J., & Heroux, M. A. (1991). Ethics, public policy, and managing advanced technologies: the case of electronic surveillance. Journal of Business Ethics, 10(7), 519–526.

    Article  Google Scholar 

  • Park, H., & Blenkinsopp, J. (2011). The roles of transparency and trust in the relationship between corruption and citizen satisfaction. International Review of Administrative Sciences, 77(2), 254–274.

    Article  Google Scholar 

  • Post, R. C. (2001). Three concepts of privacy. The Georgetown Law Journal, 89, 2087–2098.

    Google Scholar 

  • Pollach, I. (2007). What’s wrong with online privacy policies? Communications of the ACM, 50(9), 103–108.

    Article  Google Scholar 

  • Quinn, M. J. (2005). Ethics for the information age. Boston: Pearson-Addison-Wesley.

    Google Scholar 

  • Quinn, M. J. (2012). Ethics for the information age (5th ed.). Boston, MA: Pearson-Prentice Hall.

    Google Scholar 

  • Raven, B. H. (1993). The basis of power: origins and recent developments. Journal of Social Issues, 49(4), 227–251.

    Article  Google Scholar 

  • Rawlins, B. L. (2008). Measuring the relationship between organizational transparency and employee trust. The Public Relations Journal, 2(2), 1–21.

    Google Scholar 

  • Rawlins, B. L. (2009). Give the emperor a mirror: toward developing a stakeholder measurement of organizational transparency. Journal of Public Research, 21(1), 71–99.

    Article  Google Scholar 

  • Regan, P. M. (2002). Privacy as a common good in the digital world. Information, Communication and Society, 5(3), 382–405.

    Article  Google Scholar 

  • Reynolds, G. (2003). Ethics in information technology. Boston: Thompson.

    Google Scholar 

  • Reynolds, G. (2007). Ethics in information technology (2nd ed.). Boston, MA: Thomson Course Technology.

    Google Scholar 

  • Richards, N. M. (2013). The dangers of surveillance. Harvard Law Review, 126, 1934–1965.

    Google Scholar 

  • Richtel, M. (2005). Live tracking of mobile phones prompts court fights on privacy. The New York Times, December 10, 2005. http://www.nytimes.com/2005/12/10/technology/live-tracking-of-mobile-phones-prompts-court-fights-on-privacy.html. Accessed 10 March 2018.

  • Rule, J., & Brantely, P. (1992). Computerized surveillance in the workplace: forms and distributions. Sociological Forum, 7(3), 405–423.

    Article  Google Scholar 

  • Saini, D., & Sengupta, S. S. (2016). Responsibility, ethics, and leadership: an Indian study. Asian Journal of Business Ethics, 5(1–2), 97–109.

    Article  Google Scholar 

  • Sewell, G., & Wilkinson, B. (1992). “Someone to watch over me”: surveillance, discipline and the just-in-time labour process. Sociology, 26(2), 271–289.

    Article  Google Scholar 

  • Sewell, G., & Barker, J. R. (2006). Coercion versus care: using irony to make sense of organizational surveillance. Academy of Management Review, 31(4), 934–961.

    Article  Google Scholar 

  • Siegle, D. (2010). Cyberbullying and sexting: technology abuses of the 21st century. Gifted Child Today, 33(2), 14–16.

    Article  Google Scholar 

  • Simpson, K., & Byrski, M. (2010). The 21st century workplace: How personal technologies can make a difference. Asia Pacific Journal of Business and Management, 1(2), 10–20.

    Google Scholar 

  • Solove, D. J. (2008). Understanding privacy. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Stahl, B. C., Prior, M., Wilford, S., & Collins, D. (2005). Electronic monitoring in the workplace: if people don’t care, then what is the relevance? In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 50–78). Hershey: Idea Group Publishing.

    Chapter  Google Scholar 

  • Stalder, F., & Lyon, D. (2003). Electronic identity cards and social classification. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination. London: Routledge.

    Google Scholar 

  • Stanton, J. M. (2000). Traditional and electronic monitoring from an organizational justice perspective. Journal of Business and Psychology, 15(1), 129–147.

    Article  Google Scholar 

  • Stanton, J. M., & Weiss, E. M. (2000). Electronic monitoring in their own words: an exploratory study of employees’ experience with new types of surveillance. Computers in Human Behaviour, 16, 423–440.

    Article  Google Scholar 

  • Stanton, J. M., & Julian, A. L. (2002). The impact of electronic monitoring on quality and quantity of performance. Computers in Human Behaviour, 18, 85–101.

    Article  Google Scholar 

  • Stanton, J. M., & Stam, K. R. (2003). Information technology, privacy, and power within organizations: a view from boundary theory and social exchange perspectives. Surveillance and Society, 1(2), 152–190.

    Article  Google Scholar 

  • Staples, W. G. (1997). The culture of surveillance: discipline and social control in the United States. New York: St. Martin’s Press.

    Google Scholar 

  • Stoddart, E. (2011). Theological perspectives on a surveillance society: watching and being watched. Farnham, England: Ashgate.

    Google Scholar 

  • Trevino, L. K., Weaver, G. R., & Reynolds, S. J. (2006). Behavioural ethics in organizations: a review. Journal of Management, 32(6), 951–990.

    Article  Google Scholar 

  • Tschannen-Moran, M., & Hoy, W. K. (2000). A multidisciplinary analysis of the nature, meaning, and measurement of trust. Review of Educational Research, 70(4), 547–593.

    Article  Google Scholar 

  • Turner, R. (2007). Employee monitoring: an essential component of your risk management strategy. softactivity.com, deep software. http://www.softactivity.com/employee-monitoring-softactivity.pdf. Accessed 5 December 2013.

  • Tyler, T. R., & Mentovich, A. (2011). Mechanisms of legal effect: theories of procedural justice. Robert Wood Johnson Foundation: Public Health Law Research.

    Google Scholar 

  • Udani, Z. A. S., & Lorenzo-Molo, C. F. (2017). The utility of virtue: management spirituality and ethics for a secular business world. Asian Journal of Business Ethics, 6(2), 31–39.

    Google Scholar 

  • Van Dijk, S. J., Duysters, G. M., & Beulens, A. J. (2003). Transparency dilemmas, information technology and alliances in agriculture and food industry (Working paper 03.23, Eindhoven Centre for Innovation Studies). Netherlands: Eindhoven.

    Google Scholar 

  • Vassar, T. (2012). Privacy concerns regarding social networking services. Privacy issues of social networks. http://social-networks-privacy.wikidot.com/. Aaccessed 12 March 2014.

  • Venkatadurai, J., Dhyani, U., & Sharma, M. (2014). Ethics and morality beyond normative theories. Asian Journal of Business Ethics, 3(1), 35–39.

    Article  Google Scholar 

  • Wang, L., & Liang, X. (2017). Profit or legitimacy? What drives firms to prioritize social stakeholders? Asian Journal of Business Ethics, 6(1), 57–79.

    Article  Google Scholar 

  • West, J. P., & Bowman, J. S. (2016). Electronic surveillance at work: an ethical analysis. Administration and Society, 48(5), 628–651.

    Article  Google Scholar 

  • Yakowicz, W. (2015) When monitoring your employees goes horribly wrong. Inc. July 6, 2015. https://www.inc.com/will-yakowicz/drones-catch-employees-having-sex-and-other-employee-monitoring-gone-wrong.html. Accessed 10 March 2018.

  • Yerby, J. (2013). Legal and ethical issue of employee monitoring. Online Journal of Applied Knowledge Management, 1(2), 44–55.

    Google Scholar 

  • Zirkle, B. L., & Staples, W. G. (2005). Negotiating workplace surveillance. In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 79–100). Hershey: Idea Group Publishing.

    Chapter  Google Scholar 

  • Zureik, E. (2003). Theorizing surveillance: the case of the workplace. In D. Lyon (Ed.), Surveillance as social sorting: privacy, risk, and digital discrimination (pp. 31–56). London: Routledge.

    Google Scholar 

  • Zweig, D. (2005). Beyond privacy and fairness concerns: examining psychological boundary violations as a consequence of electronic performance monitoring. In J. Weckert (Ed.), Electronic monitoring in the workplace: controversies and solutions (pp. 102–122). Hershey: Idea Group Publishing.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jijo James Indiparambil.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Indiparambil, J.J. Privacy and beyond: socio-ethical concerns of ‘on-the-job’ surveillance. Asian J Bus Ethics 8, 73–105 (2019). https://doi.org/10.1007/s13520-019-00089-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13520-019-00089-0

Keywords

Navigation