Verified Document

Protecting Personal Information Employee Monitoring Research Paper

In particular, employees can feel as though they have a lack of privacy and that they are constantly being micro-managed. Studies have shown that workers who are monitored through outlets such as call centres have elevated levels of depression and anxiety (Holman, 2002). As the worker loses their autonomy, it is also common for them to lose a substantial degree of intrinsic motivation. Another negative consequence of employee monitoring is that workers often lose trust in the organization and feel that the company does not support them. In some cases, there may be an invasion of privacy as the worker's private information becomes visible to data monitoring systems. In order to avoid worker dissatisfaction, it is imperative that companies implement communication strategies that ensure that workers feel supported and do not expose confidential information. When hiring an employee, a company should clearly explain all employee monitoring strategies utilized and justify why they are necessary (Alder, Noel, Ambrose, 2006). Companies should also go to extreme lengths to make their workers feel supported as this will increase employee trust and intrinsic...

Employers are often not fond of technology because it provides more outlets for workers to deviate from their necessary tasks. Meanwhile, employees do not care for technology because it enables them to be more easily micro-managed by their workplace superiors (Ciocchetti, 2011). Ultimately, employee monitoring is an unavoidable component of the modern-day workplace environment, but companies must remain transparent about their procedures and the justification behind them.
References

Alder, G.S., Noel, T.W., & Ambrose, M.L. (2006). Clarifying the effects of Internet monitoring on job attitudes: The mediating role of employee trust. Information and Management, 43(7), 894-903.

Ciocchetti, C.A. (2011). The eavesdropping employer: A twenty-first century framework for employee monitoring. American Business Law Journal, 48(2), 285-369.

Holman, D. (2002). Employee well-being in call centres. Human Resource Management Journal, 12(4), 35-50.

Sources used in this document:
References

Alder, G.S., Noel, T.W., & Ambrose, M.L. (2006). Clarifying the effects of Internet monitoring on job attitudes: The mediating role of employee trust. Information and Management, 43(7), 894-903.

Ciocchetti, C.A. (2011). The eavesdropping employer: A twenty-first century framework for employee monitoring. American Business Law Journal, 48(2), 285-369.

Holman, D. (2002). Employee well-being in call centres. Human Resource Management Journal, 12(4), 35-50.
Cite this Document:
Copy Bibliography Citation

Related Documents

Challenges of Protecting Personal Information
Words: 2593 Length: 9 Document Type: Research Paper

Protecting Personal Information When considering the ever-changing and highly competitive global landscape of business today, large firms must be able to effectively globalize their operations in order to reach a greater potential client base, stay at the cutting edge of their respective fields and sustain profitability in the long-term. With the current exponential growth of technology and computerization of business and learning, consumers have become much more connected to the

Employee Privacy Torts
Words: 7119 Length: 25 Document Type: Research Paper

Employee Privacy Torts Issues relating to employee privacy have been at the forefront of businesses for many years. This has been fuelled by the dynamic workplace which changes constantly and also by employees and employers being more litigation-conscious. Technology has also spurred on employee privacy issues with e-mail and the internet being related to heightened concerns about vulnerability of employers to litigation. Many employers have thus exacerbated their concerns relating to

Employee Privacy Torts
Words: 8246 Length: 25 Document Type: Research Paper

Employee Privacy Torts History of Employee Privacy Changing Trends of Employee Privacy Impact of Innovative Technology on Employee Privacy Role of Social Media towards Employee Privacy Impact of Changing Community/Society on Employee Privacy Adaptation to the new Environment pertaining to Employee Privacy Employee Monitoring and Surveillance Laws and Employer Policies for Text Messaging and Social Media Electronic Communication Privacy Act Monitoring of Employee Conversations over Telephone & Email Recommendations for creating Effective Policies Future Implications of Employee Privacy As years have passed and

Information Systems & Information Technology
Words: 3130 Length: 10 Document Type: Essay

The company's consistent top line revenue growth also illustrates it has been successful in transforming its supplier network into one that operates more on knowledge, less on purely price or product decisions. As a result the company is capable of competing more at the process level and less at the purely price-driven one (Reese, 2007). In terms of the company's factors for success, the greater opportunities is to move into

Employee Handbook Privacy Section ABC Widget Company:
Words: 1173 Length: 4 Document Type: Term Paper

Employee Handbook Privacy Section ABC Widget Company: Employee Handbook Privacy Section What privacy rights issues should be addressed? In the Age of Information, there are increasing concerns being voiced about what can legitimately be expected to be kept private, and how these issues affect employees' rights in the workplace. According to Hayden, Hendricks and Novak (1990, most adults spend approximately one-half of their waking hours in the workplace today, and it is therefore

Information Security Training Program
Words: 3414 Length: 12 Document Type: Research Paper

Federal Information Security Management Act (FISMA) The Federal Information Security Management Act places emphasis on the importance of training and awareness program and states under section 3544 (b).(4).(A), (B) that "security awareness training to inform personnel, including contractors and other users of information systems that support the operations and assets of the agency of- information security risks associated with their activities; and their responsibilities in complying with agency policies and procedures

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now