Search results
1 – 10 of over 5000Roland E. Kidwell and Linda Achey Kidwell
The growth of information technology as a means of electronic surveillance has led to a great deal of research which managers need to evaluate and apply to the workplace. To aid…
Abstract
The growth of information technology as a means of electronic surveillance has led to a great deal of research which managers need to evaluate and apply to the workplace. To aid this process, managers should understand the perspectives that guide research agendas. The assumptions of the investigators influence what questions are asked about electronic surveillance, how inquiry is conducted, and how results are interpreted. Summarizes research that employs different organizational perspectives in studying electronic surveillance, and attempts to aid managers in applying this research on the job.
Details
Keywords
The development of information technologies has led to the restructuringof the boundaries within and between organizations in a number of areasof social life. Examines the impact…
Abstract
The development of information technologies has led to the restructuring of the boundaries within and between organizations in a number of areas of social life. Examines the impact of a specific form of information technology being introduced in the field of punishment and control – the electronic monitoring of sentenced offenders. Electronic surveillance and home imprisonment are features of the current restructuring of the boundaries between prison, work and family life. It is both the physical and the cultural boundaries between “home” and “prison” that are being readjusted. Over the past 200 years these two spheres of social life have been constructed around incompatible sets of values. However the complex contradictions involved in making the boundaries between these two spheres more permeable have not been fully explored in current penal discourses.
Details
Keywords
People with dementia are prone to persistent walking (also known as ‘wandering’). Walking can bring physical and psychological benefits, but people with dementia also walk because…
Abstract
People with dementia are prone to persistent walking (also known as ‘wandering’). Walking can bring physical and psychological benefits, but people with dementia also walk because of anxiety or confusion. People with dementia are at risk of becoming lost or involved in accidents, and this raises concerns for them and their carers. Electronic surveillance and tracking, as a form of safer walking technology, can be used to monitor people's whereabouts and is being used in dementia care. The technology raises a number of practical and ethical issues. This article reviews the key themes and arguments surrounding its use, with a view to raising issues for further debate. The article shows the need to carefully balance people's freedom and rights, including the right to take risks, with care and safety concerns.
Details
Keywords
Parul Gupta and Madhusudhan Margam
The purpose of this paper is to explore the potential and adoption of closed-circuit television (CCTV) surveillance-based security system (hereafter “CCTV”) for enhancing the…
Abstract
Purpose
The purpose of this paper is to explore the potential and adoption of closed-circuit television (CCTV) surveillance-based security system (hereafter “CCTV”) for enhancing the security of library materials in academic libraries of universities (central, state, deemed and private) and prestigious institutions such as Indian Institutes of Technology and Indian Institutes of Management in a developing country, i.e. India. The study also overviewed the CCTV policies of the studied libraries of universities/institutions as they relate to the ethical aspects of the surveillance system.
Design/methodology/approach
Structured questionnaire was designed and distributed among librarians of 24 academic libraries covering each zone of India in October 2019 in both physical and online manner. All 24 filled-in questionnaires were collected personally and online by the investigator were found valid eliciting a response rate of 100%. All the 24 filled-in questionnaires were included in the analysis of the interpretation of data. The response to 18 questions was analyzed in the form of tables and figures using descriptive statistical methods.
Findings
The study reveals that librarians’ found CCTV useful for security by controlling theft, unethical losses and missing items. It also helped to curb mutilation and vandalism, procurement of the rare material via the latest camera devices and night vision capturing, besides improving the service efficiency of the patron, as well as staff. The quantitative study surveyed security professionals to assess how each university/institution developed, deployed and integrated CCTV policies related to securing video data, safeguarding privacy and prevention of the potential for the unethical use of surveillance cameras. The analysis of the survey responses determined that more than 50% of the universities/institutions participating had a written CCTV policy. Further, library professionals find that the future of libraries lies in a CCTV system, so the cost should be brought down to improve return on investment by the mass adoption of this technology in a developing country such as India.
Research limitations/implications
The findings of the study showed that the potential uses of CCTV in Indian libraries are slow compared to that of the libraries of developed countries and some of the developing countries. Many of the CCTV policies that universities/institutions did have failed to include mandated training of personnel or provisions ensuring that their policies remained up-to-date. It is suggested that universities and institutions understudy should realize the benefits of CCTV systems and incorporate-related updated tools in the security and multi-purpose uses in the libraries to enhance the services for the users and security for the materials or collections.
Practical implications
The paper includes implications for libraries and their professionals to approach CCTV systems with ethical considerations for procurement of library collections, which help to detect mutilation/theft, observe the misbehavior of users, as well as staff and deployment, should not be decided merely while balancing security demands.
Social implications
The study is significant because it represents one of the earliest works to shed light on the current level of the use of CCTV system by librarians of studied libraries of universities/institutes in developing country such as India and how they are providing CCTV-based security and services, which are currently in its primitive nature. The study also suggested that select libraries are required to weigh up and balance many competing desires, demands and objectives.
Originality/value
This paper provides a concise overview of the various applications/area and uses of CCTV system including its procedures during implementation, merits and demerits while using the system described above in libraries and recommends this technology to other libraries for faster and better services for their users and security to their library materials in today’s technological advancement. It provides a set of issues that should be considered before system adoption or deployment.
Details
Keywords
This chapter demonstrates that while in most late modern societies there is a neoliberal hegemony to expand police Closed-Circuit Television (CCTV) surveillance for crime control…
Abstract
This chapter demonstrates that while in most late modern societies there is a neoliberal hegemony to expand police Closed-Circuit Television (CCTV) surveillance for crime control and antiterrorism, in Greece there is serious controversy and resistance against the post-Olympic use of more than 1,200 Olympic CCTV cameras. Drawing on the interesting politics of CCTV expansion and resistance, the chapter traces the reasons why, in the Greek context, this very expensive Olympic surveillance “dowry” has been opposed, even for traffic control. It critically attributes Greek citizens’ fear and mistrust primarily to their past police-state experience of authoritarian, thought-control surveillance.
The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press…
Abstract
Purpose
The purpose of this study is to investigate the extent of digital surveillance by Arab authorities, which face risks and threats of surveillance, and how journalists seek to press freedom by using tools and techniques to communicate securely.
Design/methodology/approach
The study used focus group discussions with 14 journalists from Syria, Saudi Arabia, Libya, Yemen, Oman, Jordan and Egypt. While in Egypt, questionnaires were distributed to 199 journalists from both independent and semi-governmental outlets to investigate how Egyptian journalists interpret the new data protection law and its implications for press freedom.
Findings
The study indicated that journalists from these countries revealed severe censorship by their respective governments, an element inconsistent with the Arab Constitution. The recommendation of the study encourages media organisations to play a more active role in setting policies that make it easier for journalists to adopt and use digital security tools, while Egyptian journalists see the law as a barrier to media independence because it allows the government to exercise greater information control through digital policy and imposes regulatory rules on journalists.
Practical implications
The study identifies practical and theoretical issues in Arab legislation and may reveal practices of interest to scientists researching the balance between data protection, the right of access to information and media research as an example of contemporary government indirect or “soft” censorship methods.
Originality/value
To the best of the authors’ knowledge, this paper is one of the first research contributions to analyse the relationships between Arab authoritarians who used surveillance to restrict freedom of the press after the Arab Spring revolutions of 2011 to keep themselves in power as long as they could. In addition, Egypt's use of surveillance under new laws allowed the regimes to install software on the journalists’ phones that enabled them to read the files and emails and track their locations; accordingly, journalists can be targeted by the cyberattack and can be arrested.
Details
Keywords
Thomas Kalischko and René Riedl
The potential applications of information and communication technologies in the workplace are wide-ranging and, especially since the COVID-19 pandemic, have increasingly found…
Abstract
Purpose
The potential applications of information and communication technologies in the workplace are wide-ranging and, especially since the COVID-19 pandemic, have increasingly found their way into the field of electronic performance monitoring (EPM) of employees. This study aims to examine the influence of EPM on individual performance considering the aspects of privacy invasion, organizational trust and individual stress within an organization. Thus, important insights are generated for academia as well as business.
Design/methodology/approach
A theoretical framework was developed which conceptualizes perceived EPM as independent variable and individual performance as dependent variable. Moreover, the framework conceptualizes three mediator variables (privacy invasion, organizational trust and individual stress). Based on a large-scale survey (N = 1,119), nine hypotheses were tested that were derived from the developed framework.
Findings
The results indicate that perception of EPM significantly increases privacy invasion, reduces organizational trust, increases individual stress and ultimately reduces individual performance. Moreover, it was found that privacy invasion reduces organizational trust and that this lowered trust increases individual stress. Altogether, these findings suggest that the use of EPM by employers may be associated with significant negative consequences.
Originality/value
This research enriches the literature on digital transformation, as well as human–machine interaction, by adopting a multidimensional theoretical and empirical perspective regarding EPM in the workplace context, in which the influence of EPM perceptions on individual performance is examined under the influence of different aspects (privacy invasion, organizational trust and individual stress) not currently considered in this combination in the literature.
Details
Keywords
The purpose of this paper is to identify customers’ needs and expectations regarding servicescape surveillance management (SSM) in order to suggest to service managers how they…
Abstract
Purpose
The purpose of this paper is to identify customers’ needs and expectations regarding servicescape surveillance management (SSM) in order to suggest to service managers how they can carefully design a service environment to ensure a high level of security while concurrently enhancing the customer service experience.
Design/methodology/approach
Given that this study is explorative in nature, it is based on a specific method of qualitative data collection: focus group interviews. Three focus group sessions were organised with 24 Italian customers of retail stores, hotels and hospitals. The multi-expectation model proposed by Parasuraman, Berry and Zeithaml, which distinguishes between what customers consider acceptable (adequate service level) and what they hope to receive (desired service level), was chosen as the reference framework to investigate customers’ needs and expectations from SSM.
Findings
Servicescape surveillance must be compatible with customer satisfaction. Customers are acceptably satisfied when servicescape surveillance offers them feelings of physical safety, psychological security, economic security and the right to privacy. They desire that surveillance also allows them to live a positive service experience in sensorial, psychological, social and temporal terms. However, customers’ expectations of adequate and desired service levels are different in terms of the presence, quantity and visibility of surveillance in the three service areas examined. Interestingly, customers expect to find more visible surveillance measures inside retail stores rather than in hotels and hospitals, but they prefer to receive invisible surveillance in the servicescape.
Practical implications
Service managers should consider surveillance not as a cost or a tool for detecting and punishing inappropriate or criminal behaviour, but rather, as an opportunity for enhancing the customer service experience. They can invest in servicescape design elements, technological surveillance solutions and continuous training of security personnel to meet their customers’ adequate and desired service levels.
Originality/value
This study provides two major contributions. From the theoretical viewpoint, it extends knowledge of the hitherto under-researched area of SSM by identifying customers’ needs and expectations of surveillance and the customer service experience, which are topics usually examined separately in the literature. In terms of managerial implications, it provides store/hotel/hospital managers with recommendations on how to design a servicescape that is both secure and pleasant.
Details
Keywords
This study aims to analyse grocery retail entrepreneurs' perceptions of the effectiveness of both informal and formal surveillance in reducing vandalism, disturbance, and…
Abstract
Purpose
This study aims to analyse grocery retail entrepreneurs' perceptions of the effectiveness of both informal and formal surveillance in reducing vandalism, disturbance, and shoplifting in their stores.
Design/methodology/approach
The present study utilizes elements of CPTED in its theoretical approach. The population for the study consisted of 946 Finnish grocery store K‐retail entrepreneurs. The data collection was carried out through an internet survey in February and March 2009. A total of 161 grocery store retailers filled in the questionnaire, yielding a response rate of 17 percent.
Findings
This study shows that, of different types of security problems, grocery store retailers view shoplifting as the most severe. To reduce this and other security problems, retailers have invested in several forms of formal and informal surveillance. Among these investments CCTV systems seem to be the most prominent. However, respondents did not view high‐tech surveillance as the most effective. Instead, this study shows that retailers view security guards and activity of the personnel as the most effective ways for reducing vandalism, disturbance, and shoplifting in their stores. Furthermore, the results emphasize the importance of store environment, e.g. clean and well‐lit premises, as an important way of reducing crime.
Research limitations/implications
Qualitative studies could reveal issues that would enable more thorough operationalization of the concepts linked to surveillance and security in the store environment.
Practical implications
The paper sensitizes retail entrepreneurs to think where informal and formal surveillance work best in the store environment.
Originality/value
Very little empirical research has evaluated the effectiveness of surveillance in store environment. The present study fills this research gap, at least to some extent.
Details