Preview

High Tech Surveillance

Powerful Essays
Open Document
Open Document
3994 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
High Tech Surveillance
1 HIGH-TECH SURVEILLANCE IN THE WORKPLACE: THE PSYCHOLOGICAL CONTACT REVISITED

Crossman, Alf School of Management, University of Surrey, UK e-mail: a.crossman@surrey.ac.uk

Lee-Kelley, Liz School of Management, University of Surrey, UK e-mail: l.lee-kelley@surrey.ac.uk

Abstract This paper presents a conceptual discussion on the growing management practice of introducing surveillance technologies into the workplace. It considers the growth of surveillance in broader society (and the growing enthusiasm for watching the behaviour of others as entertainment) and relates this to the psychological contract. The paper invites debate on the impact of overt and covert surveillance policies and practices on the psychological contract, in particular on the possible violation of trust assumptions between workers and employers. It concludes by suggesting that HRM has a definite role to play in balancing control and cooperation. Keywords: Employee commitment, control, psychological contract, surveillance.

Introduction The Internet and other communication technologies build cyber-bridges across (and between) nations, cultures, communities and businesses. Verbal and visual images of world events such as the 11th September, 2001 bombings in the US (which for many is seen as a watershed and after which life may never be quite the same again), the tidal wave of Severe Acute Respiratory Syndrome (SARS) and the more recent Madrid bombing in March 2004 were communicated across the world in a matter of minutes. Likewise, it has a darker side when terrorists and other miscreants determined on undesirable or coercive behaviour are also known to have capitalised on technology’s connectivity. In the workplace, there is an increasing, almost obsessive, fear of industrial espionage and employee betrayal. Against this backdrop of rising environmental uncertainty and turbulence, Demb and Neubauer’s (1992)

2 far-sighted suggestion of a more direct approach to governance that



References: Argyris, C. (1960): Understanding Organizational Behavior. Dorsey Press Inc: Homewood. Ball, K. (2002): Elements of surveillance: a new framework and future directions. Information, Communication and Society, 5(4), 573-590. Ball, K. and Wilson, D. C. (2000): Power, control and computer-based performance monitoring: Repertoires, resistance and subjectivities. Organization Studies, 21(3) 539565. Bentham, J. (1995): The Panopticon Writings. Ed. Miran Bozovic London: Verso. Blau, P. M. (1964): Exchange and Power in Social Life, Wiley: New York. Crossman, A. (2002): Exploring the dynamics of the psychological contract. Proceedings of the British Academy of Management Conference. Davis, J. H., Schoorman, F. D. and Donaldson, L. (1997): Toward a stewardship theory of management. Academy of Management Review, 22, 20-27. Demb, A. and Neubauer, F. F. (1992): The corporate board: confronting the paradoxes. New York: Oxford University Press. Fernie, S. and Metcalf, D. (1998): (Not) hanging on the Telephone: Payments Systems in the New Sweatshops. Centre for Economic Performance, London School of Economics. Foucault, M. (1975): Surveiller et punir, naissance de la prison. Paris: Editions Gallimard. Foucault, M. (1991): Discipline and Punish: The Birth of the Prison. Harmondsworth, Penguin Books. Greengard, S. (1996): Privacy. Personnel Journal. 75(5), 74-80. Haggerty, K. D. and Ericson, R. V. (2000): The surveillance assemblage. British Journal of Sociology. 51(4),605-622. 12 Lewis, M. W. (2000): Exploring paradox: toward a more comprehensive guide. Academy of Management Review, Vol. 25, 760-776. Lyon. D. (2002): Everyday surveillance: personal data and social classifications. Information, Communication and Society. 5(2), 242-257. McLoughlin, I., Preece, D. and Dawson, P. (2000): From Essex to cyberspace: virtual (organisational) reality and real (organisational) virtuality. Proceedings of the British Academy of Management Conference. Mason, D., Button, G., Lankshear, G, Coates, S. and Sharrock, W. (2002): On the poverty of apriorism: technology, surveillance in the workplace and employee responses. Information, Communication and Society, 5(4), 555-572. Masterson, S. S. Lewis, K. Goldman, B. M. Taylor, M. S. (2000): Integrating justice and social exchange: the differing effects of fair procedures and treatment on work relationships. Academy of Management Journal, 43: 738-748. Orwell, G. (1949): Nineteen eighty-four: a novel, London: Secker and Warburg. Pecora, V. P. (2002): The culture of surveillance. Qualitative Sociology. 25(3): 345-358. Robinson SL. 1996. Trust and breach of the psychological contract. Administrative Science Quarterly. 41: 574-599. Robinson, S. L. and Rousseau, D. M. (1994): Violating the psychological contract: not the exception but the norm. Journal of Organizational Behavior, 12, 245-259. Rousseau, D. M. (1995): Psychological Contracts in Organisations: Understanding Written and Unwritten Agreements. Sage Publications: Thousand Oaks, CA. Shenk, D. (2003): Watching you: the world of high-tech surveillance. National Geographic, Nov,02-29. Stenier, C. (1974): Scripts people live: Transactional analysis of life scripts. New York, Grove Press. Sundaramurthy, C. and Lewis, M. (2003): Control and collaboration: paradoxes of governance. Academy of Management Review, 28(3), 397-415. Symons, F. (1997): Virtual departments, power, and location in different organizational settings. Economic Geography. 73: 427-444. Taylor, P. and Bain, P. (1999): ‘An assembly line in the head’: work and employee relations in the call centre. Industrial Relations Journal, 30(2), 1010117. Thomas, H. D. C. and Anderson, N. (1998): Changes in newcomers’ psychological contracts during organizational socialization: a study of recruits entering the British Army. Journal of Organizational Behavior, 19, 745-767. 13 Totalizator History. (undated): Totalizator history – memories of the company factory with photos. http://members.ozemail.com.au/~bconlon/neville.htm accessed 23/04/04.

You May Also Find These Documents Helpful

  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Technology can add many positive factors to a company but it can also add negative factors if it is not approached in the right way. A manager wants to be able to introduce technology to their employees in a positive way to avoid failure whenever technology is presented. Technology can help a company set good communications skills, keep track of what employees are doing via the internet and telephones to assure employees and being productive. Technology can also help set fourth ethical standards and a guideline as well making employees aware of what is expected from the company beforehand. In this essay, I will be discussing how companies can use technology to help set and manage ethical standards and guidelines. I will also discuss how this can shape the type of work environment or culture a company promotes. Additionally, I will discuss how using technology to perform human resources functions affects company culture. Many people within a company must work together when it comes to technology because it affects everyone within an organization.…

    • 1597 Words
    • 7 Pages
    Good Essays
  • Good Essays

    In George Orwell’s novel 1984, it begins and ends with their totalitarian regime, Big Brother is always watching the inhumane citizens. Similar to Orwell’s novel we have the NSA monitoring our calls, texts, social media accounts, and emails to prevent any terrorist attacks. Big Brother watches us inappropriately and illegally. The reason for them being under surveillance is to discourage anti-party thought, the benefits of Big Brother’s surveillance still outweigh the harms. People should care that they are under surveillance because the government abuses its power and citizen’s fourth amendment, freedom is earned, and the government’s surveillance has not stopped any terrorist attacks from occurring.…

    • 105 Words
    • 1 Page
    Good Essays
  • Good Essays

    Patriot Act Pros And Cons

    • 715 Words
    • 3 Pages

    Congressional Digest, 94(10), 8. Sun-ha, H. (2017). Criticizing surveillance and surveillance critique: Why privacy and humanism are necessary but insufficient. Surveillance & Society.…

    • 715 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Balancing the legitimate need of employers to monitor the workplace with respect for individual privacy is not difficult. The best course of action is to have a monitoring policy and follow it. Legal experts state that "apathy toward e-mail and Internet policies is the biggest mistake an employer can make." It is recommended that firms have a written policy clearly stating that any right to privacy…

    • 1403 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    In the article The Surveillance Society, the authors William E. Thompson and Joseph V. Hickey focuses on how surveillance systems are helping us, also how they are hurting us, and why they believe what they are doing is right. First the authors Thompson and Hickey explain how surveillance helps us. With the growth in surveillance systems they are able to help increase the safety of the people who live within that society, and help stop those who may threaten to have that society, stop going along the path it wishes to go and cause anarchy to those who have done nothing wrong. They also help prevent theft of someone’s private information that they do not want others to know about and, stop people from taking other personal property. Second the…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    domestic surveillance

    • 842 Words
    • 3 Pages

    When most people think of Domestic Surveillance cameras, spyware, phone tapping, protection as well as invasion of privacy are the things that comes to mind. People know that Domestic Surveillance is one way their country knows what is going on and can use the surveillance for proof of things like terrorism, thieves, etc. But does this means that having Domestic Surveillance in places is right? Does this invades people privacy? Domestic Surveillance can be watchful good for the nation but not everyone approve of this. The harm of NSA domestic surveillance outweighs the benefits. NSA spying is an ineffective tactic for anticipating terrorist attacks, reinforces long term terrorist strategies, and represents a significant violation of freedoms for Americans.…

    • 842 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Surveillance In America

    • 209 Words
    • 1 Page

    This is used as an opportunity by dictators to control the hearts and minds of their people in a dangerous form of propaganda. Violating privacy is something that destroys the very ideals that our founders fought for. Taking over the privacy of citizens under the justification of safety is a threat that is more subtle but no less dangerous than foreign enemies, fostering a rot of individuality. In addition, business, the heart of our free-market economy, suffers under surveillance. This matters to every U.S. Citizen, as the choices made about security now will change the way Americans act and how the U.S. Government treats its citizens for decades. Should the government gain the right to become evermore intrusive into the lives of Americans, it will be another step in the direction of big government. On the other hand, refusing the government and denying them the right to access our information will guarantee the freedom of not only Americans but future Americans for decades to come.…

    • 209 Words
    • 1 Page
    Good Essays
  • Good Essays

    The idea of employee rights involves many complex issues. An employee’s right to a workplace free of discrimination and harmful environmental factors is obvious. Yet, other issues surrounding privacy, personal expression, and communication monitoring are not as clear-cut. While employees may feel that they have the right to express their opinions and use business communications while working, not only may they be fooling themselves but they are acting in a way that is unethical. While businesses do not have the right to control employee behaviors outside of the workplace, they do have the right to monitor and control communications and employee actions during paid time. As such, employees have the right to reasonable expectations in terms of communication, yet cannot (within limits) ethically demand a right to privacy, private communication, or personal expression while they are utilizing business property or on business time. Workplace privacy has been a hot issue in the last decade, as more and more workplaces incorporate email and Internet-use into the office environment. Many employees now use email and the Internet daily, not to mention the telephone (Nord, McCubbins, & Nord, 2006). With high volumes of communicatio…

    • 917 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Jared Day Mr. Ruffolo Perspectives 12 20 October 2014 Surveillance It is safe to say that people live in an age where it is possible to say that one is alone and privacy doesn’t exist. People are always being watched, tracked, listened to, and investigated. In the book 1984 one of the main topics would be that “BIG BROTHER IS WATCHING YOU” ( 2). Wherever they go, they feel as if they are being watched.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ethics Of Surveillance

    • 1923 Words
    • 8 Pages

    HR at the university level, has been observed that realism is essential for being prepared to be a competent practitioner (DeGroot, Stambaugh, & Owen, 2009; Rudin, Byrd, & Fleming, 2009). Employee surveillance and email monitoring at the workplace present a number of conflicting issues regarding an employer’s need to protect its property and itself against liability and an employee’s right to privacy (Adams, Scheuing & Feely, 2000). Does private organizations have the right to monitor employee communications? The courts answer is yes, and with good reason.For example in the year 1996 an analysis by the nelson media Research Inc. of employees at IBM Corporation and Apple Computer Inc. found that employees of both the companies have visited Penthouse Magazines’ Website almost 13,000 times in just a single…

    • 1923 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    for the benefit of themelves, the community at large for purpose such as detection of fraud…

    • 1580 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Some things that the government allow may never make sense to the public eye but as a community one must dig deep and find a trusting place in their heart. Even though Mass surveillance is given a bad rep within this essay we explored the pros and the so called “cons” behind all of this information we clearly can see that mass surveillance is not a violation of our human rights and without this surveillance we wouldn't be being protected as…

    • 1014 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    This article informs us the readers on how and what forms an employer can monitor our internet usage while at work. The main reason that we see this at work is due to our advance technology at the work place. Almost all companies have access to the internet at work which entices the workers to go to websites that are not work related. This article does not debate whether it is legal or illegal. It provides information on the two basic types that employers use to monitor, internet and desktop surveillance. This article explains that they use spyware like hackers do to monitor an employee’s internet usage, website visits, emails sent, information on emails, and streaming videos. This information provides specific work or unrelated work this employee is conducting to include the time spent.…

    • 284 Words
    • 2 Pages
    Satisfactory Essays

Related Topics