Advertisement

Journal of Business Ethics

, Volume 160, Issue 2, pp 339–361 | Cite as

Is Employee Technological “Ill-Being” Missing from Corporate Responsibility? The Foucauldian Ethics of Ubiquitous IT Uses in Organizations

  • Aurélie Leclercq-VandelannoitteEmail author
Original Paper

Abstract

The ethical issues introduced by excessive uses of ubiquitous information technology (IT) at work have received little attention, from either practitioners or ethics scholars. This article suggests the concept of technological ill-being and explores the ethical issues arising from such ill-being, according to the individual and collective responsibilities associated with their negative effects. This article turns to the philosopher Michel Foucault and proposes a renewed approach of the relationship among IT, ethics, and responsibility, based on the concepts of practical rationality, awareness, and self-engagement. This article reports a case study of an international automotive company actively engaged in both corporate social responsibility (CSR) and ubiquitous IT deployment. Technological ill-being is an expression of the tension between an individual’s social attributes and aspirations when using modern IT and a system of norms, rules, and values imposing constraints on him or her. We identify the reasons for the lack of consideration of technological ill-being in CSR through identification of the inclusionexclusion principle. The resulting critical, comprehensive approach to corporate responsibilities and IT uses incorporates the ethical implications of the latter, highlights the practical rationality of their relationship, and demands both individual and collective responses, through a call for collective ethical awareness and self-engagement. The findings prompt a Foucauldian ethics of IT use in organizations, which emerges in a mutually constitutive relationship between the self, as a moral subject of own actions, and broader organizational principles, in which CSR appears as a techne (i.e., a practical rationality governed by conscious aims).

Keywords

Ethics Ubiquitous information technology Corporate responsibility Technological ill-being Michel Foucault Inclusion–exclusion principle 

Notes

Compliance with Ethical Standards

Ethical Approval

This article does not contain any studies with animals performed by any of the authors.

Informed Consent

Informed consent was obtained from all individual participants included in the study.

References

  1. Acquier, A., & Gond, J.-P. (2007). Aux sources de la responsabilité sociale de l’entreprise: (Re)lecture et analyse d‘un ouvrage fondateur: Social responsibilities of the businessman d‘Howard Bowen (1953). Finance Contrôle Stratégie,10(2), 5–35.Google Scholar
  2. Addas, S., & Pinsonneault, A. (2015). The many faces of IT interruptions: A taxonomy and preliminary investigation of their performance effects. Information Systems Journal,25, 231–273.CrossRefGoogle Scholar
  3. Agence France-Presse. (2016). French workers win legal right to avoid checking work email out-of-hours. Retrieved December 31, 2016 from https://www.theguardian.com/money/2016/dec/31/french-workers-win-legal-right-to-avoid-checking-work-email-out-of-hours.
  4. Arnold, M. (2003). On the phenomenology of technology: The “Janus-faces” of mobile phones. Information and Organization,13(4), 231–256.CrossRefGoogle Scholar
  5. Ayyagari, R., Grover, V., & Purvis, R. (2011). Technostress: Technological antecedents and implications. MIS Quarterly,35(4), 831–858.CrossRefGoogle Scholar
  6. Banerjee, S. B. (2008). Corporate social responsibility: The good, the bad and the ugly. Critical Sociology,34(1), 51–79.CrossRefGoogle Scholar
  7. Barley, S. R., Meyerson, D. E., & Grodal, S. (2011). E-mail as a source and symbol of stress. Organization Science,22(4), 887–906.CrossRefGoogle Scholar
  8. Bauman, Z., & Lyon, D. (2013). Liquid surveillance: A conversation. New York: Wiley.Google Scholar
  9. Bellotti, V., et al. (2005). Quality versus quantity: E-mail-centric task management and its relation with overload. Human–Computer Interaction,20(1), 89–138.CrossRefGoogle Scholar
  10. Booth, F. (2014). How to do a digital detox. Forbes. Retrieved June 13, 2014 from https://www.forbes.com/sites/francesbooth/2014/06/13/how-to-do-a-digital-detox/#5d6eaa9c65a4.
  11. Borgman, A. (1992). Crossing the postmodern divide. Chicago: University of Chicago Press.CrossRefGoogle Scholar
  12. Braverman, H. (1998 [1974]). Labor and monopoly capital: The degradation of work in the twentieth century. New York: Monthly Review Press.Google Scholar
  13. Buchholz, R., & Rosenthal, S. (2002). Technology and business: Rethinking and moral dilemma. Journal of Business Ethics,41, 45–50.CrossRefGoogle Scholar
  14. Burkus, D. (2016). Why Atos Origin is striving to be a zero-email company. Forbes. Retrieved July 12, 2016 from https://www.forbes.com/sites/davidburkus/2016/07/12/why-atos-origin-is-striving-to-be-a-zero-email-company/#56f2fee08d0f.
  15. Burrell, G. (1988). Modernism, post modernism and organizational analysis 2: The contribution of Michel Foucault. Organization Studies,9(2), 221–235.CrossRefGoogle Scholar
  16. Capra, R., Khanova, J., & Ramdeen, S. (2013). Work and personal e-mail use by university employees: PIM practices across domain boundaries. Journal of the American Society for Information Science and Technology,64(5), 1029–1044.CrossRefGoogle Scholar
  17. Cordeiro, W. P. (1997). Suggested management responses to ethical issues raised by technological change. Journal of Business Ethics,16, 1393–1400.CrossRefGoogle Scholar
  18. Cousteaux, A. S., PanKéShon, J. L., & Jacobs, A. (2010). Is ill-being gendered? Suicide, risk for suicide, depression and alcohol dependence. Revue Française de Sociologie,51, 3–40.CrossRefGoogle Scholar
  19. Crane, A., Knights, D., & Starkey, K. (2008). The conditions of our freedom: Foucault, organization, and ethics. Business Ethics Quarterly,18(3), 299–320.CrossRefGoogle Scholar
  20. Cunha, J., Carugati, A., & Leclercq-Vandelannoitte, A. (2015). The dark side of computer-mediated control. Information Systems Journal,25(4), 319–354.CrossRefGoogle Scholar
  21. D’Arcy, J., Gupta, A., Tarafdar, M., & Turel, O. (2014). Reflecting on the “dark side” of information technology use. Communications of the Association for Information Systems,35(1), 109–118.Google Scholar
  22. Davies, P. W. F. (1995). Managing technology: Some ethical preliminaries. Business Ethics,4(3), 130–138.CrossRefGoogle Scholar
  23. Davies, P. W. F. (1997). Technology and business ethics theory. Business Ethics: A European Perspective,6(2), 76–80.CrossRefGoogle Scholar
  24. Davis, K., & Blomstrom, R. L. (1966). Business and its environment. New York: McGraw-Hill.Google Scholar
  25. De George, R. T. (1999). Business ethics and the information age. Business and Society Review,104(3), 261–278.CrossRefGoogle Scholar
  26. De George, R. T. (2000). Ethics and the challenge of the information age. Business Ethics Quarterly,10(1), 63–72.CrossRefGoogle Scholar
  27. Dery, K., Kolb, D., & MacCormick, J. (2014). Working with connective flow: How smartphone use is evolving in practice. European Journal of Information Systems,23, 558–570.CrossRefGoogle Scholar
  28. Dey, P., & Steyaert, C. (2016). Rethinking the space of ethics in social entrepreneurship: Power, subjectivity and practices of freedom. Journal of Business Ethics,133(4), 627–641.CrossRefGoogle Scholar
  29. Drake, B., Yuthas, K., & Dillard, J. F. (2000). It’s only words: Impacts of information technology on moral dialogue. Journal of Business Ethics,23(1), 41–59.CrossRefGoogle Scholar
  30. Dubois, A., & Gadde, L.-E. (2002). Systematic combining: An abductive approach to case research. Journal of Business Research,55(7), 553–560.CrossRefGoogle Scholar
  31. Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review,14(4), 532–550.CrossRefGoogle Scholar
  32. Ellul, J. (1980). The ethics of non-power. In M. Kranzberg (Ed.), Ethics in an age of pervasive technology (pp. 204–212). Boulder, CO: Westview Press.Google Scholar
  33. Factor, R., Oliver, A. L., & Montgomery, K. (2013). Beliefs about social responsibility at work: Comparisons between managers and non-managers over time and cross-nationally. Business Ethics: A European Review,22(2), 143–158.CrossRefGoogle Scholar
  34. Foucault, M. (1965). Madness and civilization. New York: Pantheon.Google Scholar
  35. Foucault, M. (1970). The order of things. An archaeology of the human sciences. London: Tavistock Publications.Google Scholar
  36. Foucault, M. (1973). The birth of the clinic. An archaeology of medical perception. London: Routledge.Google Scholar
  37. Foucault, M. (1978). The history of sexuality. An introduction (Vol. 1). New York: Pantheon Books.Google Scholar
  38. Foucault, M. (1979). Discipline and punish. Harmondsworth: Penguin.Google Scholar
  39. Foucault, M. (1983). The subject and power. In H. Dreyfus & P. Rabinow (Eds.), Michel Foucault: Beyond structuralism and hermeneutics (2nd ed., pp. 208–228). Chicago: University of Chicago Press.Google Scholar
  40. Foucault, M. (1984a). Space, knowledge and power. In Paul Rabinow (Ed.), The Foucault reader (pp. 239–256). New York: Pantheon.Google Scholar
  41. Foucault, M. (1984b). The ethics of the concern for self as a practice of freedom. In P. Rabinow (Ed.), Ethics, subjectivity and truth (pp. 281–301). New York: The New Press.Google Scholar
  42. Foucault, M. (1985a). The use of pleasure: The history of sexuality (Vol. 2). New York: Pantheon Books.Google Scholar
  43. Foucault, M. (1985b). The care of the self: The history of sexuality (Vol. 3). New York: Pantheon Books.Google Scholar
  44. Foucault, M. (1997). Ethics: Subjectivity and truth. London: Allen Lane.Google Scholar
  45. Foucault, M. (2008). The birth of biopolitics. London: Palgrave Macmillan.Google Scholar
  46. Gond, J.-P., & Moon, J. (2011). Corporate social responsibility in retrospect and prospect: Exploring the life-cycle of an essentially contested concept. In J.-P. Gond & J. Moon (Eds.), Corporate social responsibility: A reader (Vol. 1, pp. 1–28). New York: Routledge.Google Scholar
  47. Gond, J.-P., Palazzo, G., & Basu, K. (2009). Reconsidering instrumental corporate social responsibility through the mafia metaphor. Business Ethics Quarterly,19(1), 57–85.CrossRefGoogle Scholar
  48. Harnish, V. (2014). Five ways to liberate your team from email overload. Fortune,8, 52.Google Scholar
  49. Herschel, R. T., & Andrews, P. H. (1997). Ethical implications of technological advances on business communications. Journal of Business Communication,34(2), 160–170.CrossRefGoogle Scholar
  50. Hinings, C. R., & Greenwood, R. (2002). Disconnects and consequences in organization theory. Administrative Science Quarterly,47(3), 411–421.CrossRefGoogle Scholar
  51. Ibarra-Colado, E., Clegg, S., Rhodes, K., & Kornberger, M. (2006). The ethics of managerial subjectivity. Journal of Business Ethics,64, 45–55.CrossRefGoogle Scholar
  52. Johnson, D. G. (2015). Technology with no human responsibility? Journal of Business Ethics,127(4), 707–715.CrossRefGoogle Scholar
  53. Jonas, H. (1984). The imperative of responsibility: In search of an ethics for the technological age. Chicago: University of Chicago Press.Google Scholar
  54. Koehn, D. (1999). Ethics in a technological age. Business and Society Review,104(1), 57–90.CrossRefGoogle Scholar
  55. Kolb, D., Caza, A., & Collins, P. (2012). States of connectivity: New questions and new directions. Organization Studies,33(2), 267–273.CrossRefGoogle Scholar
  56. Laval, C. (2015). Du “zéro email” à la “social collaboration”. Journal du Net. Retrieved May 04, 2015 from https://www.journaldunet.com/solutions/expert/60798/du–zero-email–a-la–social-collaboration.shtml.
  57. Leclercq-Vandelannoitte, A. (2011). Organizations as discursive constructions: A Foucauldian approach. Organization Studies,32(9), 1247–1271.CrossRefGoogle Scholar
  58. Leclercq-Vandelannoitte, A., & Bertin, E. (2018). Who governs IT nowadays? From sovereign IT governance to liberal IT governmentality: A Foucauldian analogy. European Journal of Information Systems,27(3), 326–346.CrossRefGoogle Scholar
  59. Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly,33(1), 71–90.CrossRefGoogle Scholar
  60. Loacker, B., & Muhr, S. L. (2009). How can I become a responsible subject? Towards a practice-based ethics of responsiveness. Journal of Business Ethics,90, 265–277.CrossRefGoogle Scholar
  61. MacCormick, J., Dery, K., & Kolb, D. (2012). Engaged or just connected? Smartphones and employee engagement. Organizational Dynamics,41(3), 194–201.CrossRefGoogle Scholar
  62. Markus, M. L. (1994). Electronic mail as the medium of managerial choice. Organization Science,5(4), 502–527.CrossRefGoogle Scholar
  63. Marshall, K. P. (1999). Has technology introduced new ethical problems? Journal of Business Ethics,19(1), 81–90.CrossRefGoogle Scholar
  64. Martin, K., & Freeman, R. E. (2003). Some problems with employee monitoring. Journal of Business Ethics,43(4), 353–361.CrossRefGoogle Scholar
  65. Martin, K., & Freeman, R. E. (2004). The separation of technology and ethics in business ethics. Journal of Business Ethics,53, 353–364.CrossRefGoogle Scholar
  66. Martin, K., Shilton, K., & Smith J. (2017). Call for papers, special issue of the Journal of Business Ethics, technology, ethics, and corporate responsibility. Retrieved from http://static.springer.com/sgw/documents/1584272/application/pdf/Special+Issue+-+Martin+et+al+Technology%2C+Ethics%2C+and+Corporate+Responsibility.pdf.
  67. Mazmanian, M., Orlikowsi, W. J., & Yates, J. (2013). The autonomy paradox: The implications of mobile devices for knowledge professionals. Organization Science,24(5), 1337–1357.CrossRefGoogle Scholar
  68. McLuhan, M. (1967). Understanding media: The extension of man. London: Sphere Books.Google Scholar
  69. Miles, M., & Huberman, M. (1994). Qualitative data analysis. Beverly Hills, CA: Sage.Google Scholar
  70. O’Farrell, C. (2005). Michel Foucault. London: Sage.Google Scholar
  71. Ogburn, W. F. (1966). Social change with regard to cultural and original nature. New York: B. W. Huebsch.Google Scholar
  72. Ottensmeyer, E. J., & Heroux, M. A. (1991). Ethics, public policy, and managing advanced technologies: The case of electronic surveillance. Journal of Business Ethics,10(7), 519–526.CrossRefGoogle Scholar
  73. Petroff, A., & Cornevin, O. (2017). France gives workers ‘right to disconnect’ from office email. Retrieved January 2, 2017 from http://money.cnn.com/2017/01/02/technology/france-office-email-workers-law/index.html.
  74. Pinsonneault, A., & Rivard, S. (1998). Information technology and the nature of managerial work: From the productivity paradox to the Icarus paradox? MIS Quarterly,22, 287–311.CrossRefGoogle Scholar
  75. Pope, S., & Waeraas, A. (2016). CSR-washing is rare: A conceptual framework, literature review, and critique. Journal of Business Ethics,137(1), 173–193.CrossRefGoogle Scholar
  76. Powell, W. W., & Colyvas, J. (2008). Microfoundations of institutional theory. In R. Greenwood, C. Oliver, K. Sahlin, & R. Suddaby (Eds.), The Sage handbook of organizational institutionalism (pp. 276–298). London: Sage.CrossRefGoogle Scholar
  77. Rabinow, P. (Ed.). (1984). The Foucault reader. Harmonsdsworth: Penguin.Google Scholar
  78. Ragu-Nathan, T. S., Tarafdar, M., Ragu-Nathan, B. S., & Tu, Q. (2008). The consequences of technostress for end users in organizations: Conceptual development and empirical validation. Information Systems Research,19(4), 417–433.CrossRefGoogle Scholar
  79. Rasche, A., Morsing, M., & Moon, J. (2017). Corporate social responsibility: Strategy, communication, governance. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  80. Richards, L. (2005). Handling qualitative data: A practical guide. London: Sage.Google Scholar
  81. Serenko, A., & Turel, O. (2015). Integrating technology addiction and use: An empirical investigation of facebook users. AIS Transactions on Replication Research,1(2), 1–18.CrossRefGoogle Scholar
  82. Serres, M. (2015). Le gaucher boiteux: Puissance de la pensée. Paris: Edition le Pommier.Google Scholar
  83. Sewell, G., & Taskin, L. (2015). Out of sight, out of mind in a new world of work? Autonomy, control, and spatiotemporal scaling in telework. Organization Studies,36(11), 1507–1529.CrossRefGoogle Scholar
  84. Solomon, R. C., & Hanson, K. (1985). It’s good business. New York: Harper & Row.Google Scholar
  85. Soror, A. A., Hammer, B. I., Steelman, Z. R., Davis, F. D., & Limayem, M. M. (2015). Good habits gone bad: Explaining negative consequences associated with the use of mobile phones from a dual-systems perspective. Information Systems Journal,25, 403–427.CrossRefGoogle Scholar
  86. Soror, A. A., Steelman, Z. R., & Limayem, M. (2012). Discipline yourself before life disciplines you: Deficient self-regulation and mobile phone unregulated use. In 45th Hawaii International Conference on System Science (pp. 849–858).Google Scholar
  87. Spira, J. B. (2011). Overload! How too much information is hazardous to your organization. New York: Wiley.Google Scholar
  88. Srivastava, S. C., Chandra, S., & Shirish, A. (2015). Technostress creators and job outcomes: Theorising the moderating influence of personality traits. Information Systems Journal,25, 355–401.CrossRefGoogle Scholar
  89. Stake, R. E. (2003). Case studies. In N. K. Denzin & Y. Lincoln (Eds.), Strategies of qualitative inquiry (pp. 134–164). London: Sage.Google Scholar
  90. Starkey, K., & Hatchuel, A. (2002). The long detour: Foucault’s history of desire and pleasure. Organization,9(4), 641–656.CrossRefGoogle Scholar
  91. Steelman, Z., Soror, A., Limayem, M., & Worrell, D. (2012). Obsessive compulsive tendencies as predictors of dangerous mobile phone usage. In AMCIS 2012 Proceedings 9. http://aisel.aisnet.org/amcis2012/proceedings/HCIStudies/9.
  92. Tarafdar, M., D’Arcy, J., Turel, O., & Gupta, A. (2015). The dark side of information technology. MIT Sloan Management Review,56(2), 61–70.Google Scholar
  93. Tarafdar, M., Gupta, A., & Turel, O. (2013). The dark side of information technology use. Information Systems Journal,23(3), 269–275.CrossRefGoogle Scholar
  94. Tarafdar, M., Pullins, E. B., & Ragu-Nathan, T. S. (2014). Techno-stress: Negative effect on performance and possible mitigations. Information Systems Journal,25(2), 103–132.CrossRefGoogle Scholar
  95. Tarafdar, M., Tu, Q., Ragu-Nathan, B. S., & Ragu-Nathan, T. S. (2007). The impact of technostress on role stress and productivity. Journal of Management Information Systems,24(1), 301–328.CrossRefGoogle Scholar
  96. Turel, O., Serenko, A., & Giles, P. (2011). Integrating technology addiction and use: An empirical investigation of online auction users. MIS Quarterly,34, 1043–1061.CrossRefGoogle Scholar
  97. Vogel, D. (2005). The market for virtue. The potential and limits of corporate social responsibility. Washington, DC: Brookings institution Press.Google Scholar
  98. Weaver, G. R., Treviño, L. K., & Cochran, P. L. (1999). Integrated and decoupled corporate social performance: Management commitments, external pressures, and corporate ethics practices. Academy of Management Journal,42(5), 539–552.Google Scholar
  99. Willcocks, L. (2004). Foucault. Power/knowledge and information systems: Reconstructing the present. In J. Mingers & L. Willcocks (Eds.), Social theory and philosophy for information systems. New York: Wiley.Google Scholar
  100. Windsor, D. (2006). Corporate social responsibility: Three key approaches. Journal of Management Studies,43(1), 93–114.CrossRefGoogle Scholar
  101. Wood, D. J. (1991). Corporate social performance revisited. Academy of Management Review,16(4), 691–718.CrossRefGoogle Scholar

Copyright information

© Springer Nature B.V. 2019

Authors and Affiliations

  1. 1.IÉSEG School of Management, CNRSUniv. Lille, LEM UMR 9221LilleFrance

Personalised recommendations