Search results
1 – 10 of over 51000Samantha Lee and Brian H. Kleiner
Spotlights on the conflict between employees and employers over electronic surveillance and the workplace. Stresses that between the help that advanced technology has aided firms…
Abstract
Spotlights on the conflict between employees and employers over electronic surveillance and the workplace. Stresses that between the help that advanced technology has aided firms and workers, has also come the feeling that employees’ rights of privacy have been invaded by employers’ constant monitoring. Comments on companies’ liabilities and confidential information, along with employees’ privacy and the effects of monitoring. Concludes that employers need to clearly define to what extent they intend to monitor the workforce.
Details
Keywords
More and more organizations have resorted to the employment of monitoring software to keep track of employees’ everyday performance and task completion. The current paper aims to…
Abstract
Purpose
More and more organizations have resorted to the employment of monitoring software to keep track of employees’ everyday performance and task completion. The current paper aims to outline the capabilities, pros and cons of monitoring for employees. Several recommendations for Human Resources (HR) professionals are outlined to inform best practice.
Design/methodology/approach
This paper summarizes recent literature and trends on electronic monitoring aimed at remote workers, focusing specifically on trends observed in the UK and the USA.
Findings
The number of pros and cons, as well as the resulting recommendations for HR professionals, outline how technology may aid – but also undermine – performance.
Originality/value
The summary of capabilities, pros and cons represents a snapshot of current monitoring practices. The recommendations will give readers an overview of all the aspects and factors that ought to be considered when monitoring software and related tools are selected.
Details
Keywords
This conceptual article outlines the known effects of employee monitoring on employees who are working remotely. Potential implications, as well as practitioner suggestions, are…
Abstract
Purpose
This conceptual article outlines the known effects of employee monitoring on employees who are working remotely. Potential implications, as well as practitioner suggestions, are outlined to identify how practitioners can create more supportive employee experiences as well as apply these to workplace health management scenarios.
Design/methodology/approach
This overview is based on a selective and practically oriented review of articles that hitherto considered the health implications of remote workers being monitored electronically over the last two years. This overview is subsequently complemented by a discussion of more recent findings that outline the potential implications of monitoring for remote employees, employees' work experience and workplace health management.
Findings
Several practitioner-oriented suggestions are outlined that can pave the way to a more supportive employee experience for remote workers, who are monitored electronically by their employers. These include the various health and social interventions, greater managerial awareness about factors that influence well-being and more collaboration with health professionals to design interventions and new workplace policies. Organizations would also benefit from using audits and data analytics from monitoring tools to inform their interventions, while a rethink about work design, as well as organizational reviews of performance and working conditions further represent useful options to identify and set up the right conditions that foster both performance as well as employee well-being.
Originality/value
The article outlines practitioner-oriented suggestions that can directly and indirectly support employee well-being by recognizing the various factors that affect performance and experience.
Details
Keywords
Graeme Lockwood and Vandana Nath
The purpose of this paper is to examine the practical and legal complexities associated with tele-homeworking arrangements in light of the recent COVID-19 pandemic. In particular…
Abstract
Purpose
The purpose of this paper is to examine the practical and legal complexities associated with tele-homeworking arrangements in light of the recent COVID-19 pandemic. In particular, the study focusses on organisational practices and outcomes relating to the monitoring and surveillance of employees. Drawing on relevant UK legislation and illustrative case law examples, the study demonstrates the challenges and legal implications associated with tele-homeworking.
Design/methodology/approach
This study is based on a review of the literature and an examination of the EU and UK laws applicable to various employer and employee concerns that stem from tele-homeworking.
Findings
Tele-homeworking can be advantageous to both employers and employees, however, there are a number of growing concerns surrounding the monitoring of such workers. Developing technologies can act as a catalyst for legal disputes and the advances in workforce monitoring and surveillance reveal the complex challenges faced by both employers and employees. The indiscriminate monitoring of staff can result in claims of violations to the privacy rights of workers, breach of contract and discrimination claims. Several policy implications associated with monitoring tele-homeworkers surface from the analysis, including the need to ensure that any proposed surveillance is legitimate, proportionate and transparent.
Originality/value
The paper is beneficial in providing legal insights into the topical and continuing complexities associated with the monitoring of tele-homeworkers. The exogenous shock of COVID-19 has demanded the reorganisation of work. The extensive and developing capabilities that employers have at their disposal to engage in employee monitoring, give rise to a greater possibility of legal challenges by workers. The study serves to draw attention to various surveillance concerns and highlights the importance of employers undertaking an evaluation of their monitoring practices and complying with the legal framework.
Details
Keywords
Zauwiyah Ahmad, Thian Song Ong, Tze Hui Liew and Mariati Norhashim
The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security…
Abstract
Purpose
The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security assurance behaviour represents employees’ intentional and effortful actions aimed towards protecting information systems. The behaviour is highly desired as it tackles the human factor within the information security framework. The authors posited that security assurance behaviour is a learned behaviour that can be enhanced by the implementation of information security monitoring.
Design/methodology/approach
Theoretical framework underlying this study with six constructs, namely, subjective norm, outcome expectation, information security monitoring, information security policy, self-efficacy and perceived inconvenience, were identified as significant in determining employees’ security assurance behaviour (SAB). The influence of these constructs on SAB could be explained by social cognitive theory and is empirically supported by past studies. An online questionnaire survey as the main research instrument is adopted to elicit information on the six constructs tested in this study. Opinion from industry and academic expert panels on the relevance and face validity of the questionnaire were obtained prior to the survey administration.
Findings
Findings from this research indicate that organisations will benefit from information security monitoring by encouraging security behaviours that extend beyond the security policy. This study also demonstrates that employees tend to abandon security behaviour when the behaviour is perceived as inconvenient. Hence, organisations must find ways to reduce the perceived inconvenience using various security automation methods and specialised security training. Reducing perceived inconvenience is a challenge to information security practitioners.
Research limitations/implications
There are some limitations in the existing work that could be addressed in future studies. One of them is the possible social desirability bias due to the self-reported measure adopted in the study. Even though the authors have made every effort possible to collect representative responses via anonymous survey, it is still possible that the respondents may not reveal true behaviour as good conduct is generally desired. This may lead to a bias towards favourable behaviour.
Practical implications
In general, the present research provides a number of significant insights and valuable information related to security assurance behaviour among employees. The major findings could assist security experts and organisations to develop better strategies and policies for information security protection. Findings of this research also indicate that organisations will benefit from information security monitoring by encouraging security behaviours that extend beyond the security policy.
Social implications
In this research, the social cognitive learning theory is used to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour; the finding implies that monitoring emphases expected behaviours and helps to reinforce organisational norms. Monitoring may also accelerate learning when employees become strongly mindful of their behaviours. Hence, it is important for organisations to communicate the monitoring practices implemented, even more imperative whenever security monitoring employed is unobtrusive in nature. Nonetheless, care must be taken in this communication to avoid resentment and mistrust among employees.
Originality/value
This study is significant in a number of ways. First, this study highlights significant antecedents of security assurance behaviour, which helps organisations to assess their current practices, which may nurture or suppress information security. Second, using users’ perspective, this study provides recommendations pertaining to monitoring as a form of information security measure. Third, this study provides theoretical contribution to the existing information security literature via the application of the social cognitive learning theory.
Details
Keywords
Maryam Al-Hitmi and Karma Sherif
This paper aims to explore Internet of Things (IoT)-enabled monitoring in a multi-national petrochemical organization in Qatar and finds that the technology does not negatively…
Abstract
Purpose
This paper aims to explore Internet of Things (IoT)-enabled monitoring in a multi-national petrochemical organization in Qatar and finds that the technology does not negatively influence employee perceptions of fairness, challenging current propositions on monitoring and highlighting the emerging role of culture, competition and paradoxical leadership in moderating the relationship between IoT-enabled monitoring and perceptions of fairness.
Design/methodology/approach
The authors adopted qualitative research as the methodological premise to explore the relationship between IoT-enabled monitoring and perceptions of fairness. They collected data from an oil and gas organization in Qatar to test the validity of the proposed hypotheses.
Findings
While I0T-enabled monitoring was perceived as pervasive, tracking every move and recording conversations, the diffusion of the technology throughout Qatar desensitized employees who felt it was the new reality around workspaces. The following three important factors reshaped employees’ perceptions toward IoT-enabled monitoring: a culture that is driven by productivity and strongly adheres by policies and standards to reach set goals; a highly competitive job market; and a paradoxical leadership who balances between the competition and lucrative rewards.
Research limitations/implications
The limitation of this research is that the authors conducted a case study in similar organizations within the oil and gas industry in the State of Qatar to refute the theory that electronic monitoring of employees in the workspace elicits perceptions of unfairness. Future research can conduct quantitative surveys of employee perceptions in different industries within different cultures to be able to generalize and evolve a universal theory.
Practical implications
The research findings shed light on the escalating pressure global competition exerts on employees that nervousness about pervasive monitoring systems is replaced with fear of job loss and analytics on monitoring data is welcomed as a means of readjusting behavior to meet performance expectations.
Originality/value
The case study is the first to highlight the desensitization of employees to monitoring and the increasing pressure competition plays in motivating them to exceed expectations.
Details
Keywords
Jeng‐Chung Victor Chen and William H. Ross
In recent years, electronic performance monitoring (EPM) has increased dramatically. The managerial decision to implement an EPM system is important for it has significant…
Abstract
In recent years, electronic performance monitoring (EPM) has increased dramatically. The managerial decision to implement an EPM system is important for it has significant implications for an organization. Even so, little attention has been paid by researchers to this decision. The present paper reviews the published research on EPM and identifies factors that probably impact this decision. A model is offered to help researchers identify relevant psychological and organizational variables that may impact the decision to implement an EPM system. Psychologically, issues of trust, privacy, social facilitation, justice beliefs and stress reactions must be considered. Organizationally, a firm's Human Resource strategy, organizational culture, and anticipated consequences of EPM (i.e., increasing performance, reducing theft) are also discussed.
Details
Keywords
Kristen Bell De Tienne and G. Stoney Alder
Employee evaluation and monitoring have been common in America since colonial times. With industrialization, employers have implemented increasingly creative ways to monitor…
Abstract
Employee evaluation and monitoring have been common in America since colonial times. With industrialization, employers have implemented increasingly creative ways to monitor employees. For example, in the early part of this century, Ford Motor Company employed investigators to enter employees' homes to verify that employees were not overly drinking and that their homes were clean
Shuchih Ernest Chang, Anne Yenching Liu and Sungmin Lin
– The purpose of this paper is to evaluate privacy boundaries and explores employees’ reactions in employee monitoring.
Abstract
Purpose
The purpose of this paper is to evaluate privacy boundaries and explores employees’ reactions in employee monitoring.
Design/methodology/approach
The research used the metaphor of boundary turbulence in the Communication Privacy Management (CPM) theory to demonstrate the psychological effect on employees. The model comprised organizational culture, CPM, trust, and employee performance in employee monitoring to further investigated the influence exerted by organizational culture and how employees viewed their trust within the organization when implementing employee monitoring. Variables were measured empirically by administrating questionnaires to full-time employees in organizations that currently practice employee monitoring.
Findings
The findings showed that a control-oriented organizational culture raised communication privacy turbulence in CPM. The communication privacy turbulence in CPM mostly had negative effects on trust in employee monitoring policy, but not on trust in employee monitoring members. Both trust in employee monitoring policy and trust in employee monitoring members had positive effects on employee commitment and compliance to employee monitoring.
Research limitations/implications
This research applied the CPM theory in workplace privacy to explore the relationship between employees’ privacy and trust. The results provide insights of why employees feel psychological resistance when they are forced to accept the practice of employee monitoring. In addition, this study explored the relationship between CPM and trust, and offer support and verification to prior studies.
Practical implications
For practitioners, the findings help organizations to improve the performance of their employees and to design a more effective environment for employee monitoring.
Originality/value
A research model was proposed to study the impacts of CPM on employee monitoring, after a broad survey on related researches. The validated model and its corresponding study results can be referenced by organization managers and decision makers to make favorable tactics for achieving their goals of implementing employee monitoring.
Details
Keywords
The purpose of this paper is to propose a model to understand how and when employees’ perceived privacy violations and procedural injustice interact to predict intent to leave in…
Abstract
Purpose
The purpose of this paper is to propose a model to understand how and when employees’ perceived privacy violations and procedural injustice interact to predict intent to leave in the context of the use of social networking sites (SNSs) monitoring.
Design/methodology/approach
This study was conducted in a field setting of Facebook to frame the hypotheses in a structural equation model with partial least squares-structural equation modeling. Variables were measured empirically by administering questionnaires to full-time employed Facebook users who had experienced SNS monitoring.
Findings
The results showed that when an employee believed that he/she had more ability to control his/her SNS information, he/she was less likely to perceive that his/her privacy had been invaded; and when an employee believed that the transparency of the SNS data collection process was higher, he or she was more likely to perceive procedural justice in SNS monitoring.
Research limitations/implications
This research draws attention to the importance of intent to leave in the absence of perceived procedural justice under SNS monitoring, and the partial mediation of the perception of justice or injustice by perceived privacy violations.
Practical implications
For employers, the author recommends that employers come to know how to conduct SNS monitoring and data collection with limited risk of employee loss.
Social implications
For employees, the author suggests that SNS users learn how to control their SNS information and make sure to check their privacy settings on the SNS that they use frequently.
Originality/value
This study provided an initial examination and bridged the gap between employer use of SNS monitoring and employee reactions by opening a mediating and moderating black box that has rarely been assessed.
Details