the techniques and rationale fo e-surveillance practices in business organizations

10
ZENITH International Journal of Multidisciplinary Research Vol.2 Issue 2, February 2012, ISSN 2231 5780 www.zenithresearch.org.in 281 THE TECHNIQUES AND RATIONALE OF E- SURVEILLANCE PRACTICES IN ORGANIZATIONS DR.AISHA M.SHERIFF*; MRS. GEETHA RAVISHANKAR** *Professor, Department of Studies in Business Administration, University Mysore. **Faculty, MBA Department, RJS Institute of Management Studies, Koramangala, Bangalore. ABSTRACT The conceptual paper entitled –“The Techniques and Rationale of e-Surveillance Practices in Organizations” elucidates some of the key ethical issues arising out of the use of surveillance technology in the workplace. Information age is steering the organizations towards increased use of online workforce. This has led to the extensive dependence on internet in the organizations. The advent of Web 2.0 applications have acted as facilitating factors for cyber loafing of online workforce. Since Web 2.0 applications induce interactive information sharing, interoperability and collaboration on the World Wide Web, employees are provoked to indulge in mailing, chatting, entering virtual world, social networking blogging, podcasting, Net-surfing, online trading and the like. This leads to loss of productivity and loss of work-time in organizations. To regulate such unethical practices of using organizational technology for employees‟ personal indulgences, most of the organizations across the globe have adopted work place surveillance systems to monitor erring employees with the help of surveillance devices and gadgets. Employees consider surveillance or monitoring system as intrusion into their privacy and unethical. They also claim that it is an indication of lack of trust in them. This paper discusses about some of the e-techniques used for employee surveillance in organizations and the rationale behind e-monitoring it. KERWORDS: Cyber bludging, Cyber loafing, Cyber slacking, e-Surveillance, Rich Internet Applications (RIA)., Web 2.0 applications ,Workplace Surveillance techniques. ______________________________________________________________________________ INTRODUCTION The recent strides in information technology has enabled use of several web 2.0 applications which are luring ,employees to indulge in Cyber slacking activities like sending personal emails, podcasting, blogging, chatting on Social Networking Sites(SNS) like face book, LinkedIn ,twitter orkut and others. Besides these, they also involve in unofficial browsing, online trading, shopping, gamming, checking stock prices, gambling, moonlighting and a host of other e-loafing activities. As a consequence, organizations are facing a slump in the productivity of their workforce. In order to enhance productivity and to discourage cyber loafing, most of the business organizations have instituted systematic and continuous scrutinizing in the workplace through electronic surveillance system.

Upload: bub

Post on 05-Feb-2023

0 views

Category:

Documents


0 download

TRANSCRIPT

ZENITH

International Journal of Multidisciplinary Research

Vol.2 Issue 2, February 2012, ISSN 2231 5780

ww

w.z

enit

hre

sear

ch.o

rg.in

2

81

THE TECHNIQUES AND RATIONALE OF E- SURVEILLANCE

PRACTICES IN ORGANIZATIONS

DR.AISHA M.SHERIFF*; MRS. GEETHA RAVISHANKAR**

*Professor, Department of Studies in Business Administration,

University Mysore.

**Faculty, MBA Department,

RJS Institute of Management Studies,

Koramangala, Bangalore.

ABSTRACT

The conceptual paper entitled –“The Techniques and Rationale of e-Surveillance Practices in

Organizations” elucidates some of the key ethical issues arising out of the use of surveillance

technology in the workplace. Information age is steering the organizations towards increased use

of online workforce. This has led to the extensive dependence on internet in the organizations.

The advent of Web 2.0 applications have acted as facilitating factors for cyber loafing of online

workforce. Since Web 2.0 applications induce interactive information sharing, interoperability

and collaboration on the World Wide Web, employees are provoked to indulge in mailing,

chatting, entering virtual world, social networking blogging, podcasting, Net-surfing, online

trading and the like. This leads to loss of productivity and loss of work-time in organizations. To

regulate such unethical practices of using organizational technology for employees‟ personal

indulgences, most of the organizations across the globe have adopted work place surveillance

systems to monitor erring employees with the help of surveillance devices and gadgets.

Employees consider surveillance or monitoring system as intrusion into their privacy and

unethical. They also claim that it is an indication of lack of trust in them. This paper discusses

about some of the e-techniques used for employee surveillance in organizations and the rationale

behind e-monitoring it.

KERWORDS: Cyber bludging, Cyber loafing, Cyber slacking, e-Surveillance, Rich Internet

Applications (RIA)., Web 2.0 applications ,Workplace Surveillance techniques.

______________________________________________________________________________

INTRODUCTION

The recent strides in information technology has enabled use of several web 2.0 applications

which are luring ,employees to indulge in Cyber slacking activities like sending personal emails,

podcasting, blogging, chatting on Social Networking Sites(SNS) like face book, LinkedIn

,twitter orkut and others. Besides these, they also involve in unofficial browsing, online trading,

shopping, gamming, checking stock prices, gambling, moonlighting and a host of other e-loafing

activities. As a consequence, organizations are facing a slump in the productivity of their

workforce. In order to enhance productivity and to discourage cyber loafing, most of the business

organizations have instituted systematic and continuous scrutinizing in the workplace through

electronic surveillance system.

ZENITH

International Journal of Multidisciplinary Research

Vol.2 Issue 2, February 2012, ISSN 2231 5780

ww

w.z

enit

hre

sear

ch.o

rg.in

2

82

OPERATIONAL DEFINITIONS

1.’CYBER SLACKING,’ „CYBER LOAFING,’ AND ‘CYBER BLUDGING’ are terms used

to describe the activities involved in wasting time on the internet while people are supposedly at

work. Cyber slacking is recreational web surfing on the job or using the internet at work for one's

own purposes. This often leads to productivity loss, bandwidth degradation and exhaustive use of

organizational resources. It may also result in legal liability to the employers and might expose to

viruses spyware and malware .Posting defamatory content in chat rooms and news groups and

sending emails under employer‟s domain can lead to legal liability to the employer.

2. WORKPLACE SURVEILLANCE is a means by which organizations monitor the activities

of the employees with the help of Information technology (IT) enabled tools and devices. When

IT applications are used in workplace monitoring it is known as e-surveillance. (Refer figure-2

for e-surveillance techniques).

3. E-Surveillance Techniques

E-surveillance techniques refer to all those IT enabled surveillance techniques used in business

establishments‟, shopping malls and Government organizations for the purpose of facilitating

effective monitoring and surveillance. These techniques are mostly used- to avoid misuse of

enterprise resources, to secure organizations against legal liability, to enhance productivity and to

avoid loss of work time due to e-loafing practices.

Checking stock

Prices

Cyber slacking

activities

In workplace

Uploading and

downloading content

Unofficial

Browsing

Online

Trading/Shopping

Gamming and

Gambling

Sending personal

mails

Social

Networking

Blogging

&Podcasting

FIGURE-1: CYBER SLACKING ACTIVITIES OF EMPLOYEES IN WORKPLACE

ZENITH

International Journal of Multidisciplinary Research

Vol.2 Issue 2, February 2012, ISSN 2231 5780

ww

w.z

enit

hre

sear

ch.o

rg.in

2

83

The surveillance tools are generally called as web sleuths, spy agents, shadows or silent

watchers. Some of the e-surveillance techniques used in organizations to monitor employees

include –

Packet Sniffers, a diagnostic software programme that is used to scrutinize all the

information that passes through the network to which it is connected. Packet sniffers can

be setup with or without filters. They can monitor online activities like the sites visited,

mails sent and received internet telephony and audio, video or textual downloads. They

help in determining the work time lost due to cyber slacking.

Desktop Monitoring Devices are installed on the computer at the assembly level. They

can intercept the signals and can replicate what the user is seeing or typing on the

employer‟s desktop. Desktop monitoring software can be physically installed by someone

or can be remotely installed by sending Trojan horse through email attachment. Hackers

also use desktop monitors to record keystrokes and to steal personal data.

Log Files System Administrator will help to track and determine the websites visited by

the employees‟ .It also detects emails sent and received and files downloaded. The log

files can be retrieved even after deleting them. They can be found in operating systems,

emails, web browsers and applications as back ups.

Closed Circuit Cameras are used in the workplace to monitor employees‟ activities. They

are mainly used for security, training and monitoring purposes. More than 78% of US

companies use CCTVs to monitor their workers. CCTVs will combat personal uses of

office technology and devices. It saves time and money and enhances productivity of the

organization.

Telephone tapping or Recording is done for quality assessment and for enhancing the

telephonic skills of the employees. Telephone tapping helps the companies to prevent

personal use of telephones.

Email filters Email filters are used as monitoring tools to filter and process both incoming

and outgoing mails of employees in the workplace

Packet Sniffers

Desktop monitors

Log Files System Administrator

CCTVs

Telephone tapping or monitoring

E-mail filters

Surf Controllers

Activity Monitors

FIGURE-2: E-SURVEILLANCE TECHNIQUES

ZENITH

International Journal of Multidisciplinary Research

Vol.2 Issue 2, February 2012, ISSN 2231 5780

ww

w.z

enit

hre

sear

ch.o

rg.in

2

84

Surf controllers will monitor, inspect and control billions of Web sites visited by

employees‟ everyday in the workplace. It will also inspect their emails and other Internet-

based communications periodically and provides web security against malware, spyware

and viruses.

Activity Monitors are powerful employee monitoring tools that consist of server and

client parts. Server can be installed on any computers in the entire Local Area Network

(LAN) and the activities of employees on such computers can be spied and monitored

4. WEB 2.0 APPLICATIONS/RICH INTERNET APPLICATIONS (RIA)

Web 2.0 applications or Rich Internet Applications refer to all those web applications that

facilitate participatory information sharing, interoperability, and collaboration on the World

Wide Web. A Web 2.0 site allows users to interact and collaborate with each other in a social

media dialogue as creators (prosumers) of user-generated content in a virtual community, in

contrast to websites where users (consumers) are limited to the passive viewing of content that

was created for them. Examples of Web 2.0 include social networking sites, blogs, wikis, video

sharing sites, hosted services, web applications, podcasts, micro blogs, tags ,social bookmarks,

RSS feeds, mashups and folksonomies.

Web 2.0 can be used for socialization, information sharing or distribution and for application

purposes. There are so many online communities like HR forum, Wiz IQ,Authorstream,MTC

,etc. which provide a platform for sharing knowledge and information among like minded people

or people belonging to same profession.

Social Networking Sites like Face book, Twitter, Orkut, Skype, LinkedIn and similar other sites

link people together irrespective of their interests and professions. On these sites people can post

widgets, blog, micro blog, Upload or download content in the form of documents, photos, music

and videos .Registered members can even tag photos, express their likes or dislikes about any

postings, give RSS feeds ,book mark pages and do many more things.

Apart from all these it also has many technical applications like working virtually without

physical presence, grid housing, content replication and the like.

ZENITH

International Journal of Multidisciplinary Research

Vol.2 Issue 2, February 2012, ISSN 2231 5780

ww

w.z

enit

hre

sear

ch.o

rg.in

2

85

FIGURE-3 INDICATES SOME OF THE APPLICATIONS OF WEB 2.0 FACILITATING

CYBER SLACKING IN ORGANIZATIONS-

WEB 2.0 APPLICATIONS FACILITATING CYBER BLUDGING

FIGURE-3: WEB 2.0 APPLICATIONS FACILITATING CYBER

SLACKING IN ORGANIZATIONS

Community

Forums

Blogs

Wikis

Q&A

IM/Chat

Social Networking

Sites (SNS)

Face book

Orkut

Twitter

Skype

Linked In

Participation

Open Add-ons

Content

contribution

Gestures

Collaboration

Socialization

Distribution

Application

Open Aplications

REST

SOAP

JSON

RSS

Others

Widgets

Badges

Web

widgets

Gadgets

Net Vibes

SNS

Syndication

RSS

ATOM

Book

marking

Galleries

Market places

Database

MY SQL

Postgre SQL

Oracle

Others

Application Tier

Gralls

Content

Python

Java-J2EE

Others

Miscellaneous

Virtual Works

Grid housing

PaaS

Content

Replication

Mobile

ZENITH

International Journal of Multidisciplinary Research

Vol.2 Issue 2, February 2012, ISSN 2231 5780

ww

w.z

enit

hre

sear

ch.o

rg.in

2

86

Employees‟ perspective of e-monitoring.

Employees find e-surveillance as an intrusion into their privacy at workplace. They feel

that surfing net during free time shouldn‟t be treated as cyber loafing. It leads to

relaxation and rejuvenation.

Monitoring leads to stress and increased blood pressure since employees feel that every

action of theirs is continuously monitored

E-monitoring injects suspicion and hostility in the workplace which may in turn lead to

employee resentment and Counter Productive Behaviour.

Employers should seek prior consent of the employees to monitor them as per the

Electronic Communications Privacy Act(ECPA) of 1986

E-surveillance can strain the relationship between an employee and an employer.

It demoralizes the employees and this may lead to a decline in their productivity

THE RATIONALE OF E-SURVEILLANCE

Despite the employees‟ concerns and some setbacks, more than 75 percent of the companies in

USA are adopting e- surveillance techniques to monitor their employees in order to discourage

them from using internet, telephone and other workplace tools for personal works. The

employers quote some valid reasons for e-monitoring in workplace. Some of them include-

To ensure that employees will not divulge with company trade secrets and intellectual

property during their communication with others.

To prevent employees from making any defamatory or derogatory remarks against the

company in their electronic correspondence.

Positive Negative

Productivity enhancement Privacy Intrusion

Security leads to stress

Legal Liability Hostility and resentment

To prevent data loss and theft Employee Turnover

Performance Review Loss of Trust

FIGURE 4: IMPLICATIONS OF E-SURVEILLANCE

ZENITH

International Journal of Multidisciplinary Research

Vol.2 Issue 2, February 2012, ISSN 2231 5780

ww

w.z

enit

hre

sear

ch.o

rg.in

2

87

To stop employees from using their work time and technology for personal use.

To prevent criminal activities in workplace

The Electronic Communications Privacy Act (ECPA) passed in 1986 as an extension of

the wiretap laws, permits employers to monitor electronic communications, such as e-

mails, in two situations: where the employee has consented to the monitoring, and where

the employer can show a legitimate business purpose for monitoring the employee e-

mails. Not surprisingly, it is this second instance that garners the most legal attention.

It can be used as a proactive measure to head off problematic employee behaviour before

it gets to a point where the company‟s business interests are affected.

To ensure data security while employees are engaged in social networking and while

using web 2.0 applications.

To prevent workplace inefficiencies, malware, data loss and viruses as the main threats

caused by insecure use of Web 2.0 applications like social networking, blogs and wikis.

Since the company owns the equipment and the office space, it has a right to monitor its

employees to prevent misuse of that equipment and space.

To have total control over the networked computers. Start or terminate remote processes,

run commands, copy files from remote systems or to even turn the computer off or restart

it, not to mention logging off the current user

To track possible file thefts by employees on their flash drives.

The employees should not expect privacy while using company email/internet facilities.

The employer‟s ownership of resources naturally entitles them to monitor the way they

want.

Considering all the above factors, e-surveillance system has become indispensible for

successful functioning of business organizations. It should become inherent policy in all

companies across the globe since the benefits or outcomes of workplace monitoring are

innumerable. Though initial resistance to monitoring is most likely to pop up, employees

must be sensitized about the increasing need for it in greater interest of the organization.

PERCEIVED BENEFITS OF E-SURVEILLANCE TO EMPLOYERS

It increases personnel productivity by eliminating personal use of internet, email,

social networks and by preventing employees wasting work time

It protects the company from intellectual property and trade secret theft.

Protects the company from indulging in fraudulent activities

ZENITH

International Journal of Multidisciplinary Research

Vol.2 Issue 2, February 2012, ISSN 2231 5780

ww

w.z

enit

hre

sear

ch.o

rg.in

2

88

Useful to maintain a record of organizations electronic communication to meet the

regulatory compliance requirements

E-surveillance facilitates the performance review of the employees based on their

telephone skills and communication skills

It also helps to determine the deficiencies of the employees and helps to identify their

training needs

It is useful for legal compliance and to meet the legal liability

Useful for quality control and improvement in the delivery of services

CONCLUSION

Both employees and employers have valid reasons to justify their claims but Firms should be

prudent while electronically monitoring employee e-mails and Internet activities. They should be

mindful of the delicate issues of trust and loyalty that should be addressed for smooth

functioning of the organization. E-surveillance requires proper planning; clear policies, and

detailed procedures.

Both opponents and proponents of monitoring agree that organizations need clear and definitive

policies on electronic surveillance, and that these policies should be frequently and clearly

communicated to employees. They also agree that employees should undergo formal training on

e-mail and Internet policies, proper usage, and conduct. Given the potential liability facing

organizations as a result of the misuse of technology and resources of the organization by the

employees, steps must be taken by managers and IT departments alike to mitigate the risks

involved in allowing employees unfettered access to the Internet and company email systems. e-

Surveillance system is indispensible in organizations since it secures the resources of the

organization against any external legal liability and also enhances productivity by avoiding

wastage of time through cyber bludging. Each and every organization in today‟s globalized era

has to implement e-surveillance for effective monitoring and control of their workforce.

References

1. Adams, H., S. Scheuing, & S. Feeley, (2000)” E-Mail Monitoring in the Workplace: The

Good, the Bad and the Ugly.” Defense Counsel Journal. 1, pg (32-46).

2. Agarwal, R., & F. Rodhain, (2002).” Mine or Ours: Email Privacy Expectations,

Employee Attitudes, and Perceived Work Environment Characteristics”. Proceedings of

the 35th Hawaii International Conference on System Sciences, Hawaii.

3. American Heritage Dictionary. 3rd Ed. (2000). Houghton Mifflin Company. Boston.

4. Arendt, L. (2004). Keeping an Eye on Employees. Corporate Report Wisconsin, 19,

pg(32-35).

ZENITH

International Journal of Multidisciplinary Research

Vol.2 Issue 2, February 2012, ISSN 2231 5780

ww

w.z

enit

hre

sear

ch.o

rg.in

2

89

5. August, R., G. Ferrera, S. Lichtenstein, Reder, M., & W. Schiano, (2001). Cyber law

Cincinnati, OH: South-Western College Publishing

6. Armstrong, Larry," Someone to Watch 0ver You," Business Week, ro, 689, July 10,2000,

pp. I 9-190,

7. Blakey v. Continental Airlines, Inc. (1998). 2 F. Supp. 2d 598, 603 (D.N.J. 1998).

8. Bouke v. Nissan Motor Co. (1993).No. B068705 (Cal. Court of App., 2nd Dist., July 26,

1993)

9. Chieh, C., & B. Kleiner, (2003). How Organizations Manage the Issue of Employee

Privacy

10. Today. Management Research News, 26, 82-88.

11. CIO Magazine. (1997). Pushing It. May 1, Retrieved April 10, 2005, from:

12. Evers, J. (2005). Panel paints grim picture of cybercrime battle. News.com, June 1.

13. Greenlaw, Paul S., and Prudeanu, Cornelia. "The Impact of Federal Legislation to Limit

Electronic Monitoring." Public Personnel Management 26, 2 (June 22, 1997) p. 227.

14. Hodson, T., F. Englander, & V. Englander, (1999). Ethical, Legal, and Economic Aspects

of Employee Monitoring of Employee Email. Journal of Business Ethics, 1, 99-108.

15. Information Week Online. (2000). Push Technology Matures – And Makes A Comeback.

July 10, Retrieved April 10, 2005, from:

http://www.informationweek.com/794/portal.htm

16. Juline E.Miles & Bo Hu & Srikanth Beldona & Joan Clay “Cyberslacking! A Liability

issue for Wired Workplaces:The Internet has brought more than distraction to the

workplace.Employee”,Cornell Hotel & Restaurant Administration Quarterly, Oct-

Nov,2001

17. Kovach, K., J. Jordon, K. Tansey, & E. Framinan, (2000). The Balance Between

Employee Privacy and Employer Interests. Business and Society Review, 2, 289-298.

18. Lichtash, A., (2004). Inappropriate Use of E-mail and the Internet in the Workplace: The

Arbitration Picture. Dispute Resolution Journal, 59, 26-36.

19. Liebert, M., (2004). Development of a Measure of Personal Web Usage in the Workplace

CyberPsychology & Behavior, 7, 93-104.

20. Manning, Rita C. "Liberal and Communitarian Defenses of Workplace Privacy." Journal

of Business Ethics 6, 8 (June 1997) p. 817.

ZENITH

International Journal of Multidisciplinary Research

Vol.2 Issue 2, February 2012, ISSN 2231 5780

ww

w.z

enit

hre

sear

ch.o

rg.in

2

90

21. Martin, K., & R. Freeman, (2003). Some Problems with Employee Monitoring. Journal

of Business Ethics. 4, 353 –361.

22. Miller, S., & J. Weckert, (2000). Privacy, the Workplace and the Internet Journal of

Business Ethics, 28, 255-265

23. Morris, F., (2003). The Electronic Platform: Email and Other Privacy Issues in the

Workplace Computer and Internet Lawyer, 20, 1-9.

24. Muhl, C., (2003). Workplace e-mail and Internet use: employees and employers beware.

Monthly Labor Review. 2, 36-45.

25. Patton, S. (2004). Privacy is Your Business. CIO, June 1.

26. Policy, S., (2000). Employer monitoring of employee Internet and email use: An

Effective Litigation Avoidance Tool. Computer and Internet Law, 17, 21-23.

27. Richman, D (2005). E-mails sent at work anything but private. (March 9) The Seattle

Post-Intellgencerhttp://seattlepi.nwsource.com/business/215147_email09.html

28. Segarnick, K. (2002). Courts Say It‟s Ok: Peep away. CIO, June 1.

29. Smith, A., & R. Faley, (2001). Email Workplace Privacy Issues in an Information-and

Knowledge-based Environment Southern Business Review, 27, 8-22.