Search results

1 – 10 of over 35000
Article
Publication date: 2 July 2020

Hemin Jiang, Aggeliki Tsohou, Mikko Siponen and Ying Li

Internet monitoring in organizations can be used to monitor risks associated with Internet usage and information systems in organizations, such as employees' cyberloafing behavior…

1683

Abstract

Purpose

Internet monitoring in organizations can be used to monitor risks associated with Internet usage and information systems in organizations, such as employees' cyberloafing behavior and information security incidents. Extant research has mainly discussed the effect of Internet monitoring in achieving the targeted goals (e.g. mitigating cyberloafing behavior and information security incidents), but little attention has been paid to the possible side effects of Internet monitoring. Drawing on affective events theory, the authors attempt to reveal that Internet monitoring may cause side effects on employees' Internet usage policy satisfaction, intrinsic work motivation and affective organizational commitment.

Design/methodology/approach

The authors conducted a field experiment in a software development company. In total, 70 employees participated in the study. Mann–Whitney U test was employed to analyze the data.

Findings

The results suggest that Internet monitoring decreased employees' satisfaction with the Internet usage policy, intrinsic work motivation, as well as affective organizational commitment.

Originality/value

This study contributes to the literature by examining the side effects of Internet monitoring on employees. It also has implications for organizations to make appropriate decisions regarding whether to implement Internet monitoring.

Article
Publication date: 11 November 2014

Ina Fourie, Constance Bitso and Theo J.D. Bothma

The purpose of this paper is to raise awareness of the importance for library and information services (LIS) to take the responsibility to find a manageable way to regularly…

2401

Abstract

Purpose

The purpose of this paper is to raise awareness of the importance for library and information services (LIS) to take the responsibility to find a manageable way to regularly monitor internet censorship in their countries, and to suggest a framework for such monitoring and to encourage manageable on-going small scale research projects.

Design/methodology/approach

The paper follows on contract research for the IFLA Committee on Freedom of Access to Information and Freedom of Expression on country specific trends in internet censorship. Based on an extensive literature survey (not fully reflected here) and data mining, a framework is suggested for regular monitoring of country specific negative and positive trends in internet censorship. The framework addresses search strategies and information resources; setting up alerting services; noting resources for data mining; a detailed break-down and systematic monitoring of negative and positive trends; the need for reflection on implications, assessment of need(s) for concern (or not) and generation of suggestions for actions; sharing findings with the LIS community and wider society; and raising sensitivity for internet censorship as well as advocacy and lobbying against internet censorship. Apart from monitoring internet censorship, the framework is intended to encourage manageable on-going small scale research.

Findings

A framework of internet censorship monitoring can support the regular, systematic and comprehensive monitoring of known as well as emerging negative and positive trends in a country, and can promote timely expressions of concerns and appropriate actions by LIS. It can support sensitivity to the dangers of internet censorship and raise LIS’ levels of self-efficacy in dealing with internet censorship and doing manageable, small scale research in this regard.

Originality/value

Although a number of publications have appeared on internet censorship these do not offer a framework for monitoring internet censorship and encouraging manageable on-going small scale research in this regard.

Details

Library Hi Tech, vol. 32 no. 4
Type: Research Article
ISSN: 0737-8831

Keywords

Book part
Publication date: 26 September 2005

Micheal T. Stratton

This conceptual chapter introduces an interdisciplinary model of emotional ambivalence using an adapted framework based on the Affective Events Theory (AET). Given the…

Abstract

This conceptual chapter introduces an interdisciplinary model of emotional ambivalence using an adapted framework based on the Affective Events Theory (AET). Given the preoccupation in the current literature with studying affective disposition and discrete emotions, there is opportunity for researchers to explore the presence and influence of conflicting emotions. I use the organizational context of Personal Web Usage (PWU) monitoring to set the stage for a hypothetical discussion of the AET-based model of emotional ambivalence. The likelihood of conflict in the cultural norms and values associated with both monitoring activity and employee behavior presents an opportune setting to study emotional ambivalence. After an in-depth description of the model and its application to the PWU-based monitoring context, I conclude with a brief discussion of potential areas for future research.

Details

The Effect of Affect in Organizational Settings
Type: Book
ISBN: 978-0-76231-234-4

Article
Publication date: 1 August 1998

H. Joseph Wen and Binshan Lin

With the explosion of interest in the Internet, deploying desktop Internet access for corporations is becoming common place. Corporate managers are dealing with issues of blocking…

4115

Abstract

With the explosion of interest in the Internet, deploying desktop Internet access for corporations is becoming common place. Corporate managers are dealing with issues of blocking objectionable material and limiting the viewing of leisure sites that can impede employee productivity. The concerns are two‐fold: corporations need to block and monitor any elements deemed unfit for employees on the Internet, which can include references to issues such as sex, violence, nudity, racism and pornography, just to mention a few; curb the amount of time employees spend on the Web surfing sports and personal leisure sites when they should be working. Useful guidelines do exist for managers looking to evaluate employee productivity in the Internet‐based world. It largely consists of taking a systematic approach to the exploration of broad‐gauged questions about Internet access issues, blocking and monitoring, and the nature of your corporate culture or policies.

Details

Management Decision, vol. 36 no. 6
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 8 November 2011

Leila Canaan Messarra, Silva Karkoulian and Richard McCarthy

The subject of cyber‐slacking has prompted many organizations to respond by enforcing or implementing policies that restrict internet access. The purpose of this paper is to…

1417

Abstract

Purpose

The subject of cyber‐slacking has prompted many organizations to respond by enforcing or implementing policies that restrict internet access. The purpose of this paper is to empirically examine the impact of four internet monitoring policies on cyber‐slacking and work satisfaction.

Design/methodology/approach

Employees working in medium‐size organizations in Lebanon were surveyed. Chi‐square tests, correlation, ANOVA, and regression analysis were used to test the hypothesis.

Findings

Results indicated that having a free internet access had a positive relation with cyber‐slacking, leading to an increase in work satisfaction. The survey also indicated relationship with demographic factors.

Research limitations/implications

Although the research provides useful insight on cyber‐slacking and monitoring policies, it is nevertheless restricted to Lebanese companies.

Originality/value

This paper adds to the literature on cyber‐slacking by empirically testing the effect of different monitoring policies.

Details

Education, Business and Society: Contemporary Middle Eastern Issues, vol. 4 no. 4
Type: Research Article
ISSN: 1753-7983

Keywords

Article
Publication date: 24 August 2010

Pablo Zoghbi‐Manrique‐de‐Lara and Arístides Olivares‐Mesa

Despite the use in companies of policy and control mechanisms to tackle cyberloafing, these practices are still popular among employees. The purpose of this paper is to suggest…

2237

Abstract

Purpose

Despite the use in companies of policy and control mechanisms to tackle cyberloafing, these practices are still popular among employees. The purpose of this paper is to suggest that control systems alone are unable to deter cyberloafing because they are eventually perceived as a sort of “ineffectual dog that may bark a lot, but ultimately does not bite.” Instead, control systems are only expected to deter cyberloafing if employees view them as leading to punitive consequences.

Design/methodology/approach

First, given the easy visibility of cyberloafing activities, the paper proposes a design for control systems that not only includes perceptions of organizational control (monitoring), but also perceptions of the supervisor's physical proximity (proximity). Data are collected from university administration and services personnel, whose main working tool is the computer. They all have internet access and individual e‐mail, a stable physical location at work, and a supervisor. Multiple hierarchical regressions are used to test whether in reality proximity and monitoring are unable to decrease cyberloafing unless they interact together with employees' fear of formal punishment (punishment).

Findings

Only by interacting together and with punishment are proximity and monitoring able to deter cyber loafers from engaging in cyberloafing.

Research limitations/implications

The study could suffer from mono‐method/source bias, and the university that supplied the sample has certain job conditions similar to those of the public sector, thus raising concerns about the generalizability of the results.

Practical implications

The results suggest that organizational managers should not only ensure that control systems are able to discover incidents and identify the perpetrators, but they should also follow them up with punitive consequences. Only if control systems are implemented together with punishment are they effective in eliciting perceived certainty among cyber loafers of being caught and sanctioned, and hence in “bringing them back on the right track.”

Originality/value

Despite the extensive use of control systems to deter cyberloafing, there are no previous empirical studies that have examined and supported the negative interacting effects of proximity, monitoring, and punishment on cyberloafing.

Details

Industrial Management & Data Systems, vol. 110 no. 7
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 31 May 2005

Jengchung V. Chen and Yangil Park

Many office workers use computers and the Internet not only to get their daily jobs done but also to deal with their personal businesses. Therefore employers nowadays monitor

Abstract

Many office workers use computers and the Internet not only to get their daily jobs done but also to deal with their personal businesses. Therefore employers nowadays monitor their employees electronically to prevent the misuse of the company resources. The use of electronic monitoring in organizations causes issues of trust and privacy. This study is dedicated to developing a conceptual model on the two issues under electronic monitoring. Control, considered as the essence of the definition of privacy as well as the foundation of the control model in the theory of procedural justice, plays an important role to people’s privacy concerns and trust. People’s perceived‐self, as essential in the group‐value model in the theory of procedural justice and in the cultural studies, also plays an important role to people’s privacy concerns and trust. This study presents research hypotheses on trust and privacy under electronic surveillance based on the two models of the theory of procedural justice, social identity theory, and cultural studies.

Details

Journal of Information, Communication and Ethics in Society, vol. 3 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 February 2002

Geoff Watson

Examines the utilisation of e‐mail scanning and surveillance technology by the management consulting business in the UK. Uses a questionnaire of UK management consulting firms to…

2330

Abstract

Examines the utilisation of e‐mail scanning and surveillance technology by the management consulting business in the UK. Uses a questionnaire of UK management consulting firms to determine the uptake and substance of e‐mail policies, and the extent and nature of e‐mail monitoring implementation. Investigates the attitudes of management consulting employees towards e‐mail surveillance in a survey of work colleagues. Also considers e‐mail monitoring issues. Concludes that forms of workplace e‐mail monitoring are becoming more widespread. Awareness of the ramifications for worker privacy is growing, due partly to recent Government legislation. Finds that e‐mail policy adoption rates among management consultancies are comparatively low, as are levels of e‐mail scanning/surveillance software installation. Predicts that maintaining a fair balance between conflicting business and employee interests will be the key to determining the future direction of workplace e‐mail monitoring.

Details

Aslib Proceedings, vol. 54 no. 1
Type: Research Article
ISSN: 0001-253X

Keywords

Article
Publication date: 23 November 2017

Christian Fuchs and Daniel Trottier

This paper aims to present results of a study that focused on the question of how computer and data experts think about Internet and social media surveillance after Edward…

3139

Abstract

Purpose

This paper aims to present results of a study that focused on the question of how computer and data experts think about Internet and social media surveillance after Edward Snowden’s revelations about the existence of mass-surveillance systems of the Internet such as Prism, XKeyscore and Tempora. Computer and data experts’ views are of particular relevance because they are confronted day by day with questions about the processing of personal data, privacy and data protection.

Design/methodology/approach

The authors conducted two focus groups with a total of ten experts based in London. As London is considered by some as the surveillance capital of the world, and has a thriving Internet industry, it provided a well-suited context.

Findings

The focus group discussions featured three topics that are of crucial importance for understanding Internet and social media surveillance: the political economy surveillance in general; surveillance in the context of the Snowden revelations; and the question what the best political reactions are to the existence of a surveillance-industrial complex that results in political and economic control of the Internet and social media. The focus groups provided indications that computer and data experts are pre-eminently informed on how Internet surveillance works, are capable of critically assessing its implications for society and have ideas about on what should be done politically.

Originality/value

Studies of privacy and surveillance after Edward Snowden’s revelations have taken on a new dimension: Large-scale covert surveillance is conducted in a collaborative endeavour of secret services, private communications corporations and security companies. It has become evident that a surveillance-industrial Internet surveillance complex exists, in which capitalist communications and security corporations and state institutions collaborate.

Details

Journal of Information, Communication and Ethics in Society, vol. 15 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 25 July 2020

Saravanan S. and Sudhakar P.

Telemedicine is delivered to patient anywhere during emergency treatment care, and medical information is transferred from one site of patient to another site of specialist…

Abstract

Purpose

Telemedicine is delivered to patient anywhere during emergency treatment care, and medical information is transferred from one site of patient to another site of specialist doctors by using mobile internet communication. Some rural areas have slow internet speed because of weak internet signal propagation from mobile towers. A good design of antenna is needed to improve mobile internet speed for big medial data transmission in telemedicine application. Hence, this paper aims to propose economically low-cost design of antenna.

Design/methodology/approach

Telemedicine recommended to design the satellite frequency modulation dish (SAT FMD) antenna ( where in FM radio antenna, dish antenna are combined ) to improve the internet speed at Telemedicine system and Hospitals for purpose of Telemedicine communication and information for emergency treatment.

Findings

In the proposed system, designed SAT FMD satellite-based antenna improved internet speed is achieved at 90.6% accuracy in this research method. Finding latitude and longitude angles to identify the patient location, nearest hospitals location and finding distance, shortest path routing between patient and hospital. Finding elevation, Azimuth, latitude, longitude, skew for alignment dish to focus satellite and mobile cell tower to improve internet speed at telemedicine area and hospitals and reduced transmission delay and nodal delay of big medical data.

Social implications

The social awareness among people can be shared information of accident patient to communicate Hospital and Ambulance driver by internet mobile app tools and help find nearest hospitals to emergency treatment for accident people.

Originality/value

This paper presents SAT FMD antenna model based on satellite dish antenna consisting of FM radio receiver antenna and dish antenna for telemedicine communication.

Details

International Journal of Pervasive Computing and Communications, vol. 17 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of over 35000