Abstract
Public discussion of the privacy concerns of individuals has focused on protecting them from criminal attacks, government spying and the manipulation of consumers by businesses. While these are important areas of concern, there is also a significant ethical and societal risk from privacy intrusion from other sources, such as employers. Many employers gather extensive and highly personal information on their staff. The availability of this information is often asymmetric, with higher status employees having correspondingly greater access to the personal data of others. This paper examines some of the risks inherent in this asymmetry and discusses to what extent existing legal and social measures are sufficient to protect individuals, organisations and society.
Chapter PDF
Similar content being viewed by others
References
ACM Code of Ethics and Professional Conduct (1992), http://www.acm.org/about/code-of-ethics
Electronic monitoring surveillance survey (2007), http://press.amanet.org/press-releases/177/2007-electronic-monitoring-surveillance-survey/
Phone Hacking Scandal (2012), http://www.bbc.co.uk/news/uk-14045952
Bork, R.H.: The Tempting of America: The Political Seduction of the Law. Sinclair-Stevenson (1991)
Cameron, D.: UK and the EU (2013), http://www.bbc.co.uk/news/uk-politics-21160684
Glassdoor and inside look at jobs and companies, http://www.glassdoor.com/
Grice, A.: Bosses told they can’t ‘fire at will’ (2012), http://www.independent.co.uk/news/uk/politics/bosses-told-they-cant-fire-at-will-theyll-have-to-pay-off-staff-instead-7836789.html
Henry, J.S.: The Price of Offshore Revisited. Tax Justice Network (2012)
Hines Jr., J.R., Hoynes, H.W., Krueger, A.B.: Another look at whether a rising tide lifts all boats. Working Paper 8412, National Bureau of Economic Research (2001)
Introna, L.: Workplace surveillance, privacy and distributive justice. Computers and Society, 33–39 (2000)
Kanagaretnam, K., Lobo, G.J., Mohammad, E.: Determinants and consequences of large CEO pay. Int. Jou. Accounting & Finance, 61–82 (2008)
Khuzami, R.S., Reisner, L.L., Lench, K.R.: Goldman Sachs to Pay Record $550 Million to Settle SEC Charges Related to Subprime Mortgage CDO (2010), http://www.sec.gov/news/press/2010/2010-123.htm
Maryland employers cannot ask for facebook passwords, http://knowledgecenter.csg.org/kc/content/maryland-employers-cannot-ask-facebook-passwords
Kochan, T.A.: Restoring trust in the Human Resource Management profession. Asia Pacific Journal of Human Resources–13 (2004)
Lammers, J., Stapel, D.A., Galinsky, A.D.: Power increases hypocrisy moralizing in reasoning, immorality in behavior. Psych. Science 21, 737–744 (2010)
Lammers, J., Stapel, D.A.: How power influences moral thinking. Personality & Social Psychology 1, 61–82 (2009)
Marmot, M.G., Smith, G.D., Stansfeld, S., Patel, C., North, F., Head, J., White, I., Brunner, E., Feeney, A.: Health inequalities among British civil servants: the Whitehall II study. Lancet 337(8754), 1387–1393 (1991)
Matthiesen, S.B., Einarsen, S.: Psychiatric distress and symptoms of PTSD among victims of bullying at work. British Journal of Guidance & Counseling 32(3), 335–356 (2004)
Mayer, G.: Union Membership Trends in the United States. Congressional Research Service (2004)
Mitrou, L., Karyda, M.: Employees’ privacy vs. employers’ security: Can they be balanced? Telematics and Informatics 23(3), 164–178 (2006)
Montgomery, S.M., Cook, D.G., Bartley, M.J., Wadsworth, M.E.: Unemployment pre-dates symptoms of depression and anxiety resulting in medical consultation in young men. International Journal of Epidemiology 28(1), 95–100 (1999)
Moore, S.: Monitoring Employee Behavior in Digital Environments is Rising (2012), http://www.gartner.com/it/page.jsp?id=2028215
FDA surveillance of scientists spreads to outside critics (2012), http://www.nytimes.com/2012/07/15/us/fda-surveillance-of-scientists-spread-to-outside-critics.html
Dr Robert Smith caustic crusader in FDA spying scandal, http://www.nytimes.com/2012/07/31/us/dr-robert-smith-caustic-crusader-in-fda-spying-scandal.html
Perelman, M.: The Invention of Capitalism: Classical Political Economy and the Secret History of Primitive Accumulation. Duke University Press (2000)
Renwick, D.: HR managers. guardians of employee wellbeing? Personnel Review, 341–359 (2003)
Retaliation rate against us company whistleblowers climbs (2012), http://blogs.reuters.com/financial-regulatory-forum/2012/09/06/retaliation-rate-against-u-s-company-whistleblowers-climbs-senior-staff-affected-survey-finds/
Simon, G.E., Barber, C., Birnbaum, H.G., Frank, R.G., Greenberg, P.E., Rose, R.M., Wang, P.S., Kessler, R.C.: Depression and work productivity: the comparative costs of treatment versus nontreatment. Occup. Environ. Med. 43, 2–9 (2001)
Starrin, B.: Unemployment, poverty and shame: Exploring the field (2002), http://www.humiliationstudies.org/documents/StarrinUnemploymentPovertyShame.pdf
Tajfel, H.: Social Identity and Intergroup Relations. CUP (1982)
Tversky, A., Kahneman, D.: Availability: A heuristic for judging frequency and probability. Cognitive Psychology 5(2), 207–232 (1973)
United Nations Office On Drugs and Crime. Current practices in electronic surveillance in the investigation of serious and organized crime (2009)
Vorvoreanu, M., Botan, C.H.: Examining electronic surveillance in the workplace: A review of theoretical perspectives and research findings. In: Int. Comm. Assoc. Conf. (2000)
Wright, C.F.: What role for trade unions in future workplace relations? ACAS (2011)
Job seekers getting asked for facebook passwords, http://finance.yahoo.com/news/job-seekers-getting-asked-facebook-080920368.html
Zimbardo, P.: The Lucifer Effect: Understanding How Good People Turn Evil. Random House (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bustard, J.D. (2013). Ethical Issues Surrounding the Asymmetric Nature of Workplace Monitoring. In: Marinos, L., Askoxylakis, I. (eds) Human Aspects of Information Security, Privacy, and Trust. HAS 2013. Lecture Notes in Computer Science, vol 8030. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39345-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-39345-7_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39344-0
Online ISBN: 978-3-642-39345-7
eBook Packages: Computer ScienceComputer Science (R0)