Abstract
The changing role of technology in the modern office has been accompanied by a proliferation of research activity focusing initially on the technical aspects and more recently on the social and political aspects of the diffusion process, including power and politics. This paper builds on the work of Markus on power and politics in IT, extending it to e-mail and more specifically, to the use of email for petty tyranny. We start with a review of the literature on petty tyranny and its implications to Information Technologies and e-mail The review is concluded with a series of assertions about the use of e-mail for petty tyranny. To demonstrate how these assertions can operate within an organisational context, a case study is presented. In the case, e-mail was used by a department head to manipulate, control, and coerce employees. The discussion synthesises the analysis by demonstrating that e-mail features made it amenable to political abusive tyrannical uses. The paper is concluded with a discussion of the implications from this case to e-mail research and practice.
Keywords
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Adorno, T. W., Frenkel-Brunswik, E, Levinson, D. J. and Sanford, R. N. (1950) The Authoritarian Personality, Harper and Row, New York.
Ashforth, B. E. (1994) Petty Tyranny in Organizations, Human Relations, 47, 7, 755–78.
Culnan, M. J. and Markus, M. L., (1987), Information Technologies: Electronic Media and Interorganizational Communication, In F. M. Jablin, L. L. Putnam, K. H. Roberts, and L. W. Porter (Eds.), Handbook of Organisational Communication: An Interdisciplinary Perspective, Sage Publications, Newbury Park, CA., pp. 420–43.
Eveland, J. D. and Bikson, T. K., (1988), Work Group Structures and Computer Support: A Field Experiment, ACM Transactions on Office Information Systems, 6, 4, 354–79.
Feather, N. T. (1971) Value Differences in Relation to Ethnocentrism, Intolerance of Ambiguity and Dogmatism, Personality, 2, 349–66.
Goffman, E. (1961) Asylums: Essays on the Social Situation of Mental Patients and Other Inmates, Anchor Books, New York.
Haney, C., Banks, C. and Zimbardo, P. (1973) Interpersonal Dynamics in a Simulated Prison, International Journal of Criminology and Penology, 1, 69–97.
Hofstede, G. (1978) The Poverty of Management Control Philosophy“, Academy of Management Review, 3, 450–61.
House, R. J. (1988) Power and Personality in Complex Organizations, in B. M. Staw and L. I. Cummings (Eds.) Research in Organizational Behaviour (Vol. 10 ). Greenwich, CT: JAI Press, pp. 305–57.
Janis, I. L. (1982) Decision Making Under Stress, in L. Goldberger and S. Breznitz (Eds.), Handbook of Stress: Theoretical and Clinical Aspects. New York, Free Press, pp. 69–87.
Kets de Vries, M. F. R. (1989) Prisoners of Leadership. New York, Wiley.
Kipnis, D. (1976) The Power holders. Chicago, University of Chicago Press.
Kling, R. (1978) Automated Welfare Client Tracking and Service Integration: The Political Economy of Computing, Communication of the ACM (June), 484–93.
Kling, R. (1980) Social Analysis of Computing: Theoretical Perspectives in Recent Empirical Research, Comput. Surv, 12, 1, 61–110.
Lee, R. T., and Ashforth, B. E. (1993) A Longitudinal Study of Burnout Among Supervisors and Managers: Comparisons Between Leiter and Maslach (1988) and Golembiewski et al (1986) models, Organizational Behaviour and Human Decision Processes, 54, 369–98.
Markus, M. L., (1981) Implementation Politics–Top Management Support and IS Involvement, Systems, Objectives, Solutions, pp. 203–15.
Markus, M. L. (1983) Power, Politics, and MIS Implementation, Communications of the ACM, 26, 6, 430–44.
Markus, M. L., (1994), Electronic Mail as a Medium of Managerial Choice, Organization Science, 5, 4, 502–27.
Markus, M. L. and Robey, D., (1983), The Organizational Validity of Management Information Systems, Human Relations, 36, 3, 203–26.
Markus, M. L. and Robey, D. (1988) Informational Technology and Organizational Change: Causal Structure in Theory and Research, Management Science, 34, 5 (May), 583–94.
Maslach, C. (1982) Burnout: The Cost of Caring, Prentice Hall, New York.
McGregor, D. (1960) The Human Side of Enterprise. McGraw Hill, New York.
Mintzberg, H. (1989) Mintzberg on Management: Inside Our Strange World of Organizations. Free Press, New York.
Mulder, M. De Jong, R. D., Koppelaar, L., and Verhage, J. (1986) Power, Situation, and Leaders’ Effectiveness: An Organizational Field Study, Journal of Applied Psychology, 71, 566–70.
Norton, R. W. (1975) Measurement of Ambiguity Tolerance. Journal of Personality Assessment, 39, 607–19.
Pliskin, N., (1989), Interacting with Electronic Mail can be a Dream or a Nightmare: a User’s Point of View, Interacting with Computers, 1, 3, 259–72.
Pliskin, N., Ball, L. D., and Curley, K. F., (1989), Impediments to Proliferation of Electronic Mail: A Study from the Users’ Perspective, Human Systems Management, 8, 3, 233–41.
Pliskin, N. and Romm, T., (1990), Design of Charging Mechanisms According to the Interaction between Information Technology Type and Diffusion Life cycle Phase, Database, 21, 3, 34–40.
Pliskin, N., Romm, T., Lee, A. S., and Weber, Y., (1993), Presumed versus Actual Organizational Culture: Managerial Implications for Implementation of Information Systems, The Computer Journal, 36, 2, 1–10.
Ray, J. J. (1981) Authoritarianism, Dominance, and Assertiveness. Journal of Personality Assessment, 45, 390–97.
Robey, D. (1995), Theories that Explain Contradiction: Accounting for the Contradictory Organizational Consequences of Information Technology, in Proceedings of the Sixth International Conference on Information Systems (ed. J. I. DeGross, G. Ariav, C. Beath, R. Hoyer, and C. Kemerer ), Amsterdam
Romm, C T and Pliskin, N. (1995) Virtual Politicking: Toward a Theory of E-mail Use for Political Purposes Within and Between Organisations“, forthcoming in The Handbook of Administrative Communication (Eds. J. L. Garnett and A. Kouzmin) Marcel Dekker, New York.
Romm, T, Pliskin, N., Weber, Y., and Lee, A. S., (1991) Identifying Organizational Culture Clash in
MIS Implementation: When is it Worth the Effort?, Information & Management, 21, 99–109.
Sproull, R., and Kiesler, S. (1991), (eds.), Connections: New Ways of Working in the Network, MIT Press, Cambridge, MA.
Soh, C. and Markus, M. L. (1995) How IT Creates Business Value, in Proceedings of the Sixth International Conference on Information Systems (ed. J. I. DeGross, G. Ariav, C. Beath, R. Hoyer, and C. Kemerer ), Amsterdam.
Thompson, V. A. (1960) Modern Organization. Alfred A. Knopt, New York.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Romm, C.T., Pliskin, N. (1996). The office tyrant: abuse of power through e-mail. In: Glasson, B.C., Vogel, D.R., Bots, P.W.G., Nunamaker, J.F. (eds) Information Systems and Technology in the International Office of the Future. IFIP — The International Federation for Information Processing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35085-1_19
Download citation
DOI: https://doi.org/10.1007/978-0-387-35085-1_19
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5489-6
Online ISBN: 978-0-387-35085-1
eBook Packages: Springer Book Archive