Search results

1 – 10 of over 5000
Article
Publication date: 1 February 1996

Roland E. Kidwell and Linda Achey Kidwell

The growth of information technology as a means of electronic surveillance has led to a great deal of research which managers need to evaluate and apply to the workplace. To aid…

1802

Abstract

The growth of information technology as a means of electronic surveillance has led to a great deal of research which managers need to evaluate and apply to the workplace. To aid this process, managers should understand the perspectives that guide research agendas. The assumptions of the investigators influence what questions are asked about electronic surveillance, how inquiry is conducted, and how results are interpreted. Summarizes research that employs different organizational perspectives in studying electronic surveillance, and attempts to aid managers in applying this research on the job.

Details

Industrial Management & Data Systems, vol. 96 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 March 1994

Ann Aungles and David Cook

The development of information technologies has led to the restructuringof the boundaries within and between organizations in a number of areasof social life. Examines the impact…

2011

Abstract

The development of information technologies has led to the restructuring of the boundaries within and between organizations in a number of areas of social life. Examines the impact of a specific form of information technology being introduced in the field of punishment and control – the electronic monitoring of sentenced offenders. Electronic surveillance and home imprisonment are features of the current restructuring of the boundaries between prison, work and family life. It is both the physical and the cultural boundaries between “home” and “prison” that are being readjusted. Over the past 200 years these two spheres of social life have been constructed around incompatible sets of values. However the complex contradictions involved in making the boundaries between these two spheres more permeable have not been fully explored in current penal discourses.

Details

Information Technology & People, vol. 7 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 March 2008

Rhidian Hughes

People with dementia are prone to persistent walking (also known as ‘wandering’). Walking can bring physical and psychological benefits, but people with dementia also walk because…

2824

Abstract

People with dementia are prone to persistent walking (also known as ‘wandering’). Walking can bring physical and psychological benefits, but people with dementia also walk because of anxiety or confusion. People with dementia are at risk of becoming lost or involved in accidents, and this raises concerns for them and their carers. Electronic surveillance and tracking, as a form of safer walking technology, can be used to monitor people's whereabouts and is being used in dementia care. The technology raises a number of practical and ethical issues. This article reviews the key themes and arguments surrounding its use, with a view to raising issues for further debate. The article shows the need to carefully balance people's freedom and rights, including the right to take risks, with care and safety concerns.

Details

Journal of Assistive Technologies, vol. 2 no. 1
Type: Research Article
ISSN: 1754-9450

Keywords

Article
Publication date: 16 October 2020

Parul Gupta and Madhusudhan Margam

The purpose of this paper is to explore the potential and adoption of closed-circuit television (CCTV) surveillance-based security system (hereafter “CCTV”) for enhancing the…

649

Abstract

Purpose

The purpose of this paper is to explore the potential and adoption of closed-circuit television (CCTV) surveillance-based security system (hereafter “CCTV”) for enhancing the security of library materials in academic libraries of universities (central, state, deemed and private) and prestigious institutions such as Indian Institutes of Technology and Indian Institutes of Management in a developing country, i.e. India. The study also overviewed the CCTV policies of the studied libraries of universities/institutions as they relate to the ethical aspects of the surveillance system.

Design/methodology/approach

Structured questionnaire was designed and distributed among librarians of 24 academic libraries covering each zone of India in October 2019 in both physical and online manner. All 24 filled-in questionnaires were collected personally and online by the investigator were found valid eliciting a response rate of 100%. All the 24 filled-in questionnaires were included in the analysis of the interpretation of data. The response to 18 questions was analyzed in the form of tables and figures using descriptive statistical methods.

Findings

The study reveals that librarians’ found CCTV useful for security by controlling theft, unethical losses and missing items. It also helped to curb mutilation and vandalism, procurement of the rare material via the latest camera devices and night vision capturing, besides improving the service efficiency of the patron, as well as staff. The quantitative study surveyed security professionals to assess how each university/institution developed, deployed and integrated CCTV policies related to securing video data, safeguarding privacy and prevention of the potential for the unethical use of surveillance cameras. The analysis of the survey responses determined that more than 50% of the universities/institutions participating had a written CCTV policy. Further, library professionals find that the future of libraries lies in a CCTV system, so the cost should be brought down to improve return on investment by the mass adoption of this technology in a developing country such as India.

Research limitations/implications

The findings of the study showed that the potential uses of CCTV in Indian libraries are slow compared to that of the libraries of developed countries and some of the developing countries. Many of the CCTV policies that universities/institutions did have failed to include mandated training of personnel or provisions ensuring that their policies remained up-to-date. It is suggested that universities and institutions understudy should realize the benefits of CCTV systems and incorporate-related updated tools in the security and multi-purpose uses in the libraries to enhance the services for the users and security for the materials or collections.

Practical implications

The paper includes implications for libraries and their professionals to approach CCTV systems with ethical considerations for procurement of library collections, which help to detect mutilation/theft, observe the misbehavior of users, as well as staff and deployment, should not be decided merely while balancing security demands.

Social implications

The study is significant because it represents one of the earliest works to shed light on the current level of the use of CCTV system by librarians of studied libraries of universities/institutes in developing country such as India and how they are providing CCTV-based security and services, which are currently in its primitive nature. The study also suggested that select libraries are required to weigh up and balance many competing desires, demands and objectives.

Originality/value

This paper provides a concise overview of the various applications/area and uses of CCTV system including its procedures during implementation, merits and demerits while using the system described above in libraries and recommends this technology to other libraries for faster and better services for their users and security to their library materials in today’s technological advancement. It provides a set of issues that should be considered before system adoption or deployment.

Details

Global Knowledge, Memory and Communication, vol. 70 no. 4/5
Type: Research Article
ISSN: 2514-9342

Keywords

Book part
Publication date: 29 February 2008

Minas Samatas

This chapter demonstrates that while in most late modern societies there is a neoliberal hegemony to expand police Closed-Circuit Television (CCTV) surveillance for crime control…

Abstract

This chapter demonstrates that while in most late modern societies there is a neoliberal hegemony to expand police Closed-Circuit Television (CCTV) surveillance for crime control and antiterrorism, in Greece there is serious controversy and resistance against the post-Olympic use of more than 1,200 Olympic CCTV cameras. Drawing on the interesting politics of CCTV expansion and resistance, the chapter traces the reasons why, in the Greek context, this very expensive Olympic surveillance “dowry” has been opposed, even for traffic control. It critically attributes Greek citizens’ fear and mistrust primarily to their past police-state experience of authoritarian, thought-control surveillance.

Details

Surveillance and Governance: Crime Control and Beyond
Type: Book
ISBN: 978-0-7623-1416-4

Abstract

Details

The Emerald Handbook of Work, Workplaces and Disruptive Issues in HRM
Type: Book
ISBN: 978-1-80071-780-0

Article
Publication date: 7 March 2023

Miral Sabry AlAshry

The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press…

Abstract

Purpose

The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press freedom by using tools and techniques to communicate securely.

Design/methodology/approach

The study used focus group discussions with 14 journalists from Syria, Saudi Arabia, Libya, Yemen, Oman, Jordan and Egypt. While in Egypt, questionnaires were distributed to 199 journalists from both independent and semi-governmental outlets to investigate how Egyptian journalists interpret the new data protection law and its implications for press freedom.

Findings

The study indicated that journalists from these countries revealed severe censorship by their respective governments, an element inconsistent with the Arab Constitution. The recommendation of the study encourages media organisations to play a more active role in setting policies that make it easier for journalists to adopt and use digital security tools, while Egyptian journalists see the law as a barrier to media independence because it allows the government to exercise greater information control through digital policy and imposes regulatory rules on journalists.

Practical implications

The study identifies practical and theoretical issues in Arab legislation and may reveal practices of interest to scientists researching the balance between data protection, the right of access to information and media research as an example of contemporary government indirect or “soft” censorship methods.

Originality/value

To the best of the authors’ knowledge, this paper is one of the first research contributions to analyse the relationships between Arab authoritarians who used surveillance to restrict freedom of the press after the Arab Spring revolutions of 2011 to keep themselves in power as long as they could. In addition, Egypt's use of surveillance under new laws allowed the regimes to install software on the journalists’ phones that enabled them to read the files and emails and track their locations; accordingly, journalists can be targeted by the cyberattack and can be arrested.

Details

Digital Policy, Regulation and Governance, vol. 25 no. 3
Type: Research Article
ISSN: 2398-5038

Keywords

Open Access
Article
Publication date: 22 August 2023

Thomas Kalischko and René Riedl

The potential applications of information and communication technologies in the workplace are wide-ranging and, especially since the COVID-19 pandemic, have increasingly found…

3611

Abstract

Purpose

The potential applications of information and communication technologies in the workplace are wide-ranging and, especially since the COVID-19 pandemic, have increasingly found their way into the field of electronic performance monitoring (EPM) of employees. This study aims to examine the influence of EPM on individual performance considering the aspects of privacy invasion, organizational trust and individual stress within an organization. Thus, important insights are generated for academia as well as business.

Design/methodology/approach

A theoretical framework was developed which conceptualizes perceived EPM as independent variable and individual performance as dependent variable. Moreover, the framework conceptualizes three mediator variables (privacy invasion, organizational trust and individual stress). Based on a large-scale survey (N = 1,119), nine hypotheses were tested that were derived from the developed framework.

Findings

The results indicate that perception of EPM significantly increases privacy invasion, reduces organizational trust, increases individual stress and ultimately reduces individual performance. Moreover, it was found that privacy invasion reduces organizational trust and that this lowered trust increases individual stress. Altogether, these findings suggest that the use of EPM by employers may be associated with significant negative consequences.

Originality/value

This research enriches the literature on digital transformation, as well as human–machine interaction, by adopting a multidimensional theoretical and empirical perspective regarding EPM in the workplace context, in which the influence of EPM perceptions on individual performance is examined under the influence of different aspects (privacy invasion, organizational trust and individual stress) not currently considered in this combination in the literature.

Details

Digital Transformation and Society, vol. 3 no. 1
Type: Research Article
ISSN: 2755-0761

Keywords

Article
Publication date: 10 October 2016

Angelo Bonfanti

The purpose of this paper is to identify customers’ needs and expectations regarding servicescape surveillance management (SSM) in order to suggest to service managers how they…

2465

Abstract

Purpose

The purpose of this paper is to identify customers’ needs and expectations regarding servicescape surveillance management (SSM) in order to suggest to service managers how they can carefully design a service environment to ensure a high level of security while concurrently enhancing the customer service experience.

Design/methodology/approach

Given that this study is explorative in nature, it is based on a specific method of qualitative data collection: focus group interviews. Three focus group sessions were organised with 24 Italian customers of retail stores, hotels and hospitals. The multi-expectation model proposed by Parasuraman, Berry and Zeithaml, which distinguishes between what customers consider acceptable (adequate service level) and what they hope to receive (desired service level), was chosen as the reference framework to investigate customers’ needs and expectations from SSM.

Findings

Servicescape surveillance must be compatible with customer satisfaction. Customers are acceptably satisfied when servicescape surveillance offers them feelings of physical safety, psychological security, economic security and the right to privacy. They desire that surveillance also allows them to live a positive service experience in sensorial, psychological, social and temporal terms. However, customers’ expectations of adequate and desired service levels are different in terms of the presence, quantity and visibility of surveillance in the three service areas examined. Interestingly, customers expect to find more visible surveillance measures inside retail stores rather than in hotels and hospitals, but they prefer to receive invisible surveillance in the servicescape.

Practical implications

Service managers should consider surveillance not as a cost or a tool for detecting and punishing inappropriate or criminal behaviour, but rather, as an opportunity for enhancing the customer service experience. They can invest in servicescape design elements, technological surveillance solutions and continuous training of security personnel to meet their customers’ adequate and desired service levels.

Originality/value

This study provides two major contributions. From the theoretical viewpoint, it extends knowledge of the hitherto under-researched area of SSM by identifying customers’ needs and expectations of surveillance and the customer service experience, which are topics usually examined separately in the literature. In terms of managerial implications, it provides store/hotel/hospital managers with recommendations on how to design a servicescape that is both secure and pleasant.

Article
Publication date: 22 February 2011

Sami Kajalo and Arto Lindblom

This study aims to analyse grocery retail entrepreneurs' perceptions of the effectiveness of both informal and formal surveillance in reducing vandalism, disturbance, and…

2513

Abstract

Purpose

This study aims to analyse grocery retail entrepreneurs' perceptions of the effectiveness of both informal and formal surveillance in reducing vandalism, disturbance, and shoplifting in their stores.

Design/methodology/approach

The present study utilizes elements of CPTED in its theoretical approach. The population for the study consisted of 946 Finnish grocery store K‐retail entrepreneurs. The data collection was carried out through an internet survey in February and March 2009. A total of 161 grocery store retailers filled in the questionnaire, yielding a response rate of 17 percent.

Findings

This study shows that, of different types of security problems, grocery store retailers view shoplifting as the most severe. To reduce this and other security problems, retailers have invested in several forms of formal and informal surveillance. Among these investments CCTV systems seem to be the most prominent. However, respondents did not view high‐tech surveillance as the most effective. Instead, this study shows that retailers view security guards and activity of the personnel as the most effective ways for reducing vandalism, disturbance, and shoplifting in their stores. Furthermore, the results emphasize the importance of store environment, e.g. clean and well‐lit premises, as an important way of reducing crime.

Research limitations/implications

Qualitative studies could reveal issues that would enable more thorough operationalization of the concepts linked to surveillance and security in the store environment.

Practical implications

The paper sensitizes retail entrepreneurs to think where informal and formal surveillance work best in the store environment.

Originality/value

Very little empirical research has evaluated the effectiveness of surveillance in store environment. The present study fills this research gap, at least to some extent.

Details

Journal of Small Business and Enterprise Development, vol. 18 no. 1
Type: Research Article
ISSN: 1462-6004

Keywords

1 – 10 of over 5000