The Effects of the Ability to Choose the Type of Human Resources System on Perceptions of Invasion of Privacy and System Satisfaction

  • Kimberly M. Lukaszewski
  • Dianna L. Stone
  • Eugene F. Stone-Romero


Using data from employed participants in two separate studies, we examined the effects of (a) the ability to choose the type of human resource system, and (b) the type of information disclosed on perceptions of invasion of privacy and satisfaction with the human resource system. Results of both studies revealed that individuals were more satisfied with human resource services and less likely to perceive that the disclosure of data was invasive of privacy when (a) they had the ability to choose the type of system through which data were disclosed, and (b) the information disclosed was non-medical as opposed to medical in nature. The results have important implications for safeguarding employee privacy, developing privacy policies in organizations, and enhancing employee satisfaction with human resource services. Implications for theory, research, and practice are discussed.


Human resource technology Privacy Satisfaction System choice 


  1. Bennett-Alexander, D. D., & Hartman, L. P. (2007). Employment law for business. Boston: McGraw-Hill/Irwin.Google Scholar
  2. Bloom, N. (2001). In search of intelligent self-service. International Association for Human Resources Information Management (IHRIM) Journal, 5, 53–61.Google Scholar
  3. Brehm, J. W. (1966). A theory of psychological reactance. New York: Academic Press.Google Scholar
  4. Cardy, R. L., & Miller, J. S. (2003). Technology: Implications for HRM. In D. Stone (Ed.), Advances in human performance and cognitive engineering research (pp. 99–118). Greenwich, CT: JAI Press.Google Scholar
  5. Cedar. (2001). Cedar 2001 human resources self-service/portal survey. Retrieved March 15, 2005 from
  6. Cedar. (2002). Cedar 2002 human resources self services/portal survey. Retrieved February 22, 2004 from
  7. Cedarcrestone. (2006). Cedarcrestone 2006 HCM Survey: Workforce Technologies and Service Delivery Approaches. Retrieved February 1, 2007 from
  8. Cohen, J., Cohen, P., West, S. G., & Aiken, L. S. (2003). Applied multiple regression/correlation analysis for the behavioral sciences. (3rd ed.). Mahwah, NJ: Lawrence Erlbaum Associates.Google Scholar
  9. Cummings, T. G., & Worley, C. G. (1997). Organizational development and change. (6th ed.). Cincinnati, OH: South-Western College Publshing.Google Scholar
  10. Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35, 982–1003.Google Scholar
  11. Dulebohn, J. H. (2003). Information technology implementation: The need for compensation system congruency. In D. Stone (Ed.), Advances in human performance and cognitive engineering research (pp. 153–186). Greenwich, CT: JAI Press.Google Scholar
  12. Dulebohn, J. H., & Marler, J. H. (2005). e-Compensation: The potential to transform practice? In H. G. Gueutal & D. L. Stone (Eds.), The brave new world of eHR: Human resources management in the digital age (pp. 166–189). San Francisco: Jossey Bass.Google Scholar
  13. Eddy, E. R., Stone, D. L., & Stone-Romero, E. F. (1999). The effects of information management policies on reactions to human resource information systems: An integration of privacy and procedural justice perspectives. Personnel Psychology, 52, 335–358.CrossRefGoogle Scholar
  14. Fusilier, M. R., & Hoyer, W. D. (1980). Variables affecting perceptions of invasion of privacy in a personnel selection situation. Journal of Applied Psychology, 65, 623–626.CrossRefGoogle Scholar
  15. Greenberg, J., & Folger, R. (1983). Procedural justice, participation, and the fair process effect in groups and organizations. In P. B. Paulus (Ed.), Basic group processes (pp. 235–256). New York: Springer-Verlag. Google Scholar
  16. Gueutal, H. G. (2003). The brave new world of eHR. In D. Stone (Ed.), Advances in human performance and cognitive engineering research (pp. 13–36). Greenwich, CT: JAI Press.Google Scholar
  17. Gueutal, H. G., & Falbe, C. M. (2005). eHR: Trends in delivery methods. In H. G. Gueutal & D. L. Stone (Eds.), The brave new world of eHR: Human resources management in the digital age (pp. 190–225). San Francisco: Jossey Bass.Google Scholar
  18. Gueutal H. G., & Stone D. L. (Eds.). (2005). The brave new world of eHR. San Francisco: Jossey BassGoogle Scholar
  19. Gutek, B. A. (1995). The dynamics of service: Reflections on the changing nature of customer/provider interactions. San Francisco: Jossey-Bass.Google Scholar
  20. Gutek, B. A., Bhappu, A. D., Liao-Troth, M. A., & Cherry, B. (1999). Distinguishing between service relationship and encounters. Journal of Applied Psychology, 84, 218–233.CrossRefGoogle Scholar
  21. Gutek, B. A., Cherry, B., Bhappu, A. D., Schneider, S., & Woolf, L. (2000). Features of service relationships and encounters. Work and Occupations, 27, 319–352.CrossRefGoogle Scholar
  22. Harris, L., & Westin, A. F. (1979). The dimensions of privacy: A national opinion research survey of attitudes toward privacy. Stevens Point, WI: Sentry Insurance Company.Google Scholar
  23. Johnson, R., Stone, D. L., & Phillips, T. A. (2005, August). African-Americans and Anglo-Americans beliefs, attitudes, & intentions to pursue careers in information technology. Paper presented at the meeting of the Academy of Management, Honolulu, HA.Google Scholar
  24. Kallman, E. A., & Smith, H. J. (1995). Privacy attitudes and practices: What the membership thinks and does. New York: Publication of the International Association for Human Resources Information Management.Google Scholar
  25. Kornblum, J. (2001, April 17). Privacy tops Americans’ list of tech concerns. Poughkeepsie Journal, 1E.Google Scholar
  26. Lederer, A. L. (1992). Handbook of HRIS. Boston: Warren Gorham Lamont.Google Scholar
  27. Linowes, D. F. (1989). Privacy in America: Is your private life in the public eye? Urbana, IL: University of Illinois Press.Google Scholar
  28. Linowes, D. F. (1996). Secret Shadows. Albany Times Union, pp. 1–2, Section B (1996, September 8).Google Scholar
  29. Marler, J. H., & Dulebohn, J. H. (2005). A model of employee self-service technology acceptance. In J. Martocchio (Ed.), Research in personnel and human resource management (pp. 137–180). Greenwich, CT: JAI Press.Google Scholar
  30. McManus, M. A., & Ferguson, M. W. (2003). Biodata, personality, and demographic differences of recruits from threes sources. International Journal of Selection and Assessment, 11, 175–183.CrossRefGoogle Scholar
  31. Parasuraman, A., Zeithaml, V. A., & Berry, L. L. (1998). SERVQUAL: A multiple-item scale for measuring consumer perceptions of service quality. Journal of Retailing, 64, 12–40.Google Scholar
  32. Piller, C. (1993). Bosses with x-rays eyes. Your employers may be using computers to keep tabs on you. MacWorld, 10, 124–130.Google Scholar
  33. Privacy Protection Study Commission (1977). Personal privacy in an information society. Washington, DC: US Government Printing Office.Google Scholar
  34. Rosenbaum, B. L. (1973). Attitude toward invasion of privacy in the personnel selection process and job applicant demographic and personality correlates. Journal of Applied Psychology, 58, 333–338.CrossRefGoogle Scholar
  35. Simmons, D. D. (1968). Invasion of privacy and judged benefit of personality test inquiry. The Journal of General Psychology, 79, 177–181.PubMedGoogle Scholar
  36. Smith, H. J. (1993). Privacy policies and practices: Inside the organizational maze. Communications of the ACM, 36, 105–122.CrossRefGoogle Scholar
  37. Society for Human Resources Management (SHRM) and West Group (2000). Workplace Privacy Survey. Retrieved January 5, 2006 from
  38. Stone, D. L. (1981). The effects of the valence of outcomes for providing data and the perceived relevance of the data requested on privacy-related behaviors, beliefs, and attitudes. Unpublished doctoral dissertation, Purdue University, West Lafayette, IN.Google Scholar
  39. Stone, D. L., Lukaszewski, K., & Eddy, E. (1998). Privacy and human resource information systems. International Association for Human resources Information Management (IHRIM) Journal, 2, 44–50.Google Scholar
  40. Stone, D. L., & Stone-Romero, E. F. (1998). A multiple stakeholder model of privacy organizations. In M. Schminke (Ed.), Managerial ethics: Morally managing people and processes (pp. 35–59). Mahwah, NJ: Lawrence Erlbaum.Google Scholar
  41. Stone, D. L., Stone-Romero, E. F., & Lukaszewski K. (2003). The functional and dysfunctional consequences of human resource information technology for organizations and their employees. In D. Stone (Ed.), Advances in human performance and cognitive engineering research (pp. 37–68). Greenwich, CT: JAI Press.Google Scholar
  42. Stone, D. L., & Williams, K. J. (1997). Implications of the American with Disabilities Act for employee selection. Human Resource Management Review, 7, 203–231.CrossRefGoogle Scholar
  43. Stone, E. F., Gueutal, H. G., Gardner, D. G., & McClure, S. (1983). A field experiment comparing information-privacy values, beliefs, and attitudes across several types of organizations. Journal of Applied Psychology, 68, 459–468.CrossRefGoogle Scholar
  44. Stone, E. F., & Stone, D. L. (1990). Privacy in organizations: Theoretical issues, research findings, protection strategies. In K. M. Rowland & G. R. Ferris (Eds.), Research in personnel and human resources management (Vol. 8, pp. 349–411). Greenwich, CT: JAI Press.Google Scholar
  45. Stone-Romero, E. F., & Rosopa, P. (2004). Inference problems with hierarchical multiple regression-based tests of mediating effects. Research in Personnel and Human Resources Management, 23, 249–290.CrossRefGoogle Scholar
  46. Stone-Romero, E. F., Stone, D. L., & Hyatt, D. (2003). Privacy and personnel selection techniques. Journal of Social Issues, 59, 343–368.CrossRefGoogle Scholar
  47. Taylor, G. S., & Davis, J. S. (1989). Individual privacy and computer-based human resources information systems. Journal of Business Ethics, 8, 569–576.CrossRefGoogle Scholar
  48. Tolchinsky, P. D., McCuddy, M., Adams, J., Ganster, D. C., Woodman, R., & Fromkin, H. L. (1981). Employee perceptions of invasion of privacy: A field simulation experiment. Journal of Applied Psychology, 66, 308–313.CrossRefGoogle Scholar
  49. Towers Perrin LLP, (2001). Towers Perrin HR Service Center Survey. Retrieved May 22, 2002 from
  50. Trist, E., & Bamforth, K. (1951). Some social and psychological consequences of the longwall method of coal getting. Human Relations, 4, 3–38.CrossRefGoogle Scholar
  51. Ulrich, D. (2001). From e-Business to e-HR. International Association for Human resources Information Management (IHRIM) Journal, 5, 90–97.Google Scholar
  52. Walker, A. J. (1993). Handbook of human resource information systems. New York: McGraw-Hill.Google Scholar
  53. Walker, A. J. (2001). The state of HR technology: Is it time for a measurement system? International Association for Human resources Information Management (IHRIM) Journal, 5, 49–52.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Kimberly M. Lukaszewski
    • 1
  • Dianna L. Stone
    • 2
  • Eugene F. Stone-Romero
    • 2
  1. 1.State University of New York at New PaltzNew PaltzUSA
  2. 2.University of Texas at San AntonioSan AntonioUSA

Personalised recommendations