Advertisement

Information Systems Frontiers

, Volume 12, Issue 4, pp 433–441 | Cite as

Ethical implications of internet monitoring: A comparative study

  • Frances S. GrodzinskyEmail author
  • Andra Gumbus
  • Stephen Lilley
Article

Abstract

Organizations have become increasingly concerned about employee use of the Internet for personal reasons while at work. Monitoring Internet usage has become more and more prevalent in the workplace. While there may be legitimate business functions such as employee performance appraisal that are served by monitoring, poorly designed and communicated monitoring practices can have negative effects on employee morale and may be considered an invasion of privacy. Universities are another venue where Internet monitoring occurs. This paper explores whether there was a significant difference in attitude towards Internet usage and monitoring at the university as compared to the workplace. It is the result of a comparative study.

Keywords

Internet monitoring Autonomy Fairness Workplace University 

Notes

Acknowledgement

The authors would like to thank Matthew North for his helpful comments.

References

  1. Alge, B. J., Ballinger, G. A., & Green, S. G. (2004). Remote control: predictors of electronic monitoring intensity and secrecy. Personnel Psychology, 57(2), 377–411. Durham: Summer (2004).CrossRefGoogle Scholar
  2. Anandarajan, M., Simmers, C., & Igbaria, M. (2000). An exploratory investigation of the antecedents and impact of internet usage: an individual perspective. Behavior and Information Technology, 19, 69–85.CrossRefGoogle Scholar
  3. Grodzinsky, F., & Gumbus, A. (2005). Internet and productivity: ethical perspectives on workplace behavior. Journal of Information Communication and Ethics in Society, 3, 249–256. supplement.Google Scholar
  4. Hall, L. (2004). Where to draw the line. Personnel Today. Sutton: June 1, 2004. p. 16.Google Scholar
  5. Introna, L. (2001). Workplace surveillance, privacy and distributive justice. In Spinello and Tavani (Eds.), Readings in cyberethics (pp. 418–429). Jones and BartlettGoogle Scholar
  6. Lim, V. K. G. (2002). The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675–694.CrossRefGoogle Scholar
  7. Peterson, D. K. (2002). Computer ethics: the influence of guidelines and universal moral beliefs. Information Technology & People, 15(4), 346–362. West Linn.CrossRefGoogle Scholar
  8. Petrovic-Lazarevic, S., & Sohal, A. (2004). Nature of e-business ethical dilemmas. Information Management & Computer Security, 12(2/3), 167. Bradford.CrossRefGoogle Scholar
  9. Soat, J. (2005). Spamming the globe, surfing at work. Information Week, (1039), 76. Manhasset: May 16, 2005.Google Scholar
  10. Tavani, H. (ed) (2004), Readings in cyberethics, Jones and Bartlett, p. 418–429.Google Scholar
  11. Taylor, J. S. (2000). Big business as big brother: is employee privacy necessary for a human-centered management organization? Business and Professional Ethics Journal, 19(3), 13.Google Scholar
  12. Urbaczewski, A., & Jessup, L. M. (2002). Does electronic monitoring of employee internet usage work? Communications of the ACM, 45(1), 80–84.CrossRefGoogle Scholar
  13. Van Slambrouck, P. (2000). E-mail ethics: you’ve got pink slip. Christian Science Monitor, 92(193), 1. 08827729.Google Scholar
  14. Wakefield, R. (2004). Computer monitoring and surveillance. The CPA Journal, 74(7), 52. New York: Jul 2004.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Frances S. Grodzinsky
    • 1
    Email author
  • Andra Gumbus
    • 2
  • Stephen Lilley
    • 3
  1. 1.Computer Science/Information TechnologySacred Heart UniversityFairfieldUSA
  2. 2.Welch College of BusinessSacred Heart UniversityFairfieldUSA
  3. 3.Sociology Department, Sacred Heart University,FairfieldUSA

Personalised recommendations