Journal of Business Ethics

, Volume 142, Issue 1, pp 139–154 | Cite as

An Ethical Perspective on Emerging Forms of Ubiquitous IT-Based Control

Article

Abstract

The goal of this paper is to investigate the ethical implications of emerging forms of control that have developed along with the use of ubiquitous information technology (IT). Because it can be exerted at a distance, almost anytime and anywhere, IT-based control has become more subtle, indirect, and almost invisible, with many negative side effects. Yet the issues raised by this new form of control have rarely been interpreted, treated, and framed as ethical issues in business ethics literature. Thus, a more comprehensive inquiry rooted in ethical concerns is necessary to improve understanding of this more subtle form of control, its ethical consequences, and the way ethical considerations can be taken into consideration and acted on by management. This article addresses this goal with a qualitative, exploratory case study of a telecommunications company, in which salespeople have been equipped with ubiquitous technology. The findings specify the characteristics and consequences of ubiquitous IT-based control, thereby inviting a rethinking of the ethical issues related to the privacy, autonomy, human dignity, and health of salespeople. In particular, this article highlights four ethical issues raised by the use of ubiquitous IT at work: the ambivalence of this use of ubiquitous IT at work, the subtlety of the control exerted by ubiquitous IT, the invasiveness of ubiquitous IT, and the self-reinforcement of ubiquitous IT-based control. Such issues are not often taken into account, suggesting that ethical considerations fail to enter into managerial decision making. This study directly raises questions about the intentions, responsibilities, and divisions across different categories of organizational members who participate in such control systems. It also provides useful insights into employees’ perceptions and offers guidance to managers who want to apply a professional code of ethics to the uses of ubiquitous IT.

Keywords

Autonomy Control Ethics Information technology Monitoring, privacy Stress Ubiquitous technology 

References

  1. Alder, G. S. (1998). Ethical issues in electronic performance monitoring: A consideration of deontological and teleological perspectives. Journal of Business Ethics, 17(7), 729–743.CrossRefGoogle Scholar
  2. Alder, G. S., Schminke, M., Noel, T. W., & Kuenzi, M. (2008). Employee reactions to internet monitoring: The moderating role of ethical orientation. Journal of Business Ethics, 80(3), 481–498.CrossRefGoogle Scholar
  3. Arnold, M. (2003). On the phenomenology of technology: The Janus-faces of mobile phones. Information and Organization, 13(4), 231–256.CrossRefGoogle Scholar
  4. Ashforth, B. E., Rogers, K. M., Pratt, M. G., & Pradies, C. (2014). Ambivalence in organizations: A multilevel approach. Organization Science, 25(5), 1453–1478.CrossRefGoogle Scholar
  5. Baskerville, R. (1999). Investigating information systems with action research. Communications of the AIS, 2(1), 1–32.Google Scholar
  6. Beauchamp, T. L., & Bowie, N. E. (1993). Ethical theory and business. Englewood Cliffs, NJ: Prentice Hall.Google Scholar
  7. Chen, T. Y. (2001). Ethics control mechanisms: A comparative observation of Hong Kong companies. Journal of Business Ethics, 30(4), 391–400.CrossRefGoogle Scholar
  8. Clegg, S. R. (1990). Modern organizations: Organization studies in the postmodern world. London: Sage.Google Scholar
  9. Cousins, C. K., & Robey, D. (2005). Human agency in a wireless world: Patterns of technology use in nomadic computing environments. Information and Organization, 15(2), 151–180.CrossRefGoogle Scholar
  10. Davis, G. B. (2002). Considering the implications and consequences of the always-connected lifestyle. Communications of the ACM, 45(12), 67–73.CrossRefGoogle Scholar
  11. DeGeorge, R. T. (1986). Business ethics. New York: Macmillan.Google Scholar
  12. Deleuze, G. (1992). Postscript on the societies of control (pp. 3–7). Cambridge, MA: MIT Press.Google Scholar
  13. Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review, 14(4), 532–550.Google Scholar
  14. Forester, T., & Morrison, Perry. (1991). Computer ethics: Cautionary tales and ethical dilemmas in computing. Cambridge, MA: MIT Press.Google Scholar
  15. Garson, B. (1988). The electronic sweatshop. New York: Simon & Schuster.Google Scholar
  16. Goffman, E. (1959). The presentation of self in everyday life. New York: Doubleday Anchor Books.Google Scholar
  17. Grant, R., & Higgins, C. (1989). Monitoring service workers via computer: The effect on employees, productivity and service. Natural Productivity Review, 8, 101–112.CrossRefGoogle Scholar
  18. Gratz, J. E. (1984). The ethics of subliminal communication. Journal of Business Ethics, 3(3), 181–184.CrossRefGoogle Scholar
  19. Hawk, S. R. (1994). The effects of computerized performance monitoring: An ethical perspective. Journal of Business Ethics, 13(12), 949–957.CrossRefGoogle Scholar
  20. Hislop, D., & Axtell, C. (2011). Mobile phones during work and non-work time: A case study of mobile, non-managerial workers. Information and Organization, 21(1), 41–56.CrossRefGoogle Scholar
  21. Hodson, T. J., Englander, F., & Englander, V. (1999). Ethical, legal and economic aspects of employer monitoring of employee electronic mail. Journal of Business Ethics, 19(1), 99–108.CrossRefGoogle Scholar
  22. Jarveenpa, S. L., & Lang, K. R. (2005). Managing the paradoxes of mobile technology. IS Management, 22(4), 7–23.Google Scholar
  23. Jouët, J. (1993). Pratiques de communication et figures de la médiation. Réseaux, 60, 99–120.CrossRefGoogle Scholar
  24. Langford, D. (1995). Practical computer ethics. Upper Saddle River, NJ: Prentice Hall.Google Scholar
  25. Lyon, D. (1993). An electronic panopticon? A sociological critique of surveillance society. Sociological Review, 41, 653–678.CrossRefGoogle Scholar
  26. Lyon, D. (1994). The rise of surveillance society. Cambridge, UK: Polity.Google Scholar
  27. Lyon, D., & Bauman, Z. (2012). Liquid surveillance: A conversation. Polity, UK: PCVS-Polity Conversations Series.Google Scholar
  28. Maguire, S. (1999). The discourse of control. Journal of Business Ethics, 19(1), 109–114.CrossRefGoogle Scholar
  29. Martin, K., & Freeman, R. E. (2003). Some problems with employee monitoring. Journal of Business Ethics, 43(4), 353–361.CrossRefGoogle Scholar
  30. Marx, G., & Sherinzen, S. (1986). Monitoring on the job. Technology Review, 89, 63–72.Google Scholar
  31. Mazmanian, M. A., Orlikowski, W. J., & Yates, J. (2005). Crackberries: The social implications of ubiquitous wireless e-mail devices. In C. Sorensen, Y. Yoo, K. Lyytinen, & J. J. Degross (Eds.), Designing ubiquitous information environments: Socio-technical issues and challenges (pp. 337–344). New York: Springer.CrossRefGoogle Scholar
  32. Middleton, C. A., & Cukier, W. (2006). Is mobile email functional or dysfunctional? Two perspectives on mobile email usage. European Journal of Information Systems, 15(3), 252–260.CrossRefGoogle Scholar
  33. Miles, M., & Huberman, M. (1994). Qualitative data analysis. Beverly Hills: Sage.Google Scholar
  34. Miller, S., & Weckert, J. (2000). Privacy, the workplace and the Internet. Journal of Business Ethics, 28(3), 255–265.CrossRefGoogle Scholar
  35. Mintzberg, H. (1994). Rounding out the manager’s job. Sloan Management Review, 36(1), 11–26.Google Scholar
  36. Ottensmeyer, E. J., & Heroux, M. A. (1991). Ethics, public policy, and managing advanced technologies: The case of electronic surveillance. Journal of Business Ethics, 10(7), 519–526.CrossRefGoogle Scholar
  37. Poster, M. (1990). The mode of information: Poststructuralism and social context. Cambridge, UK: Polity.Google Scholar
  38. Prasopoulou, E., Pouloudi, A., & Panteli, N. (2006). Enacting new temporal boundaries: The role of mobile phones. European Journal of Information Systems, 15(3), 277–284.CrossRefGoogle Scholar
  39. Robey, D., Lyytinen, K., Varshney, U., Davis, G., Ackerman, M. S., Avital, M., et al. (2004). Surfing the next wave: Design and implementation challenges of ubiquitous computing environments. Communications of the AIS, 13(1), 697–716.Google Scholar
  40. Severson, R. (1997). The principles of information ethics. Armonk, NY: ME Sharp.Google Scholar
  41. Sewell, G., & Barker, J. R. (2001). Neither good, nor bad, but dangerous: Surveillance as an ethical paradox. Ethics and Information Technology, 3(3), 181–194.CrossRefGoogle Scholar
  42. Sewell, G., & Wilkinson, B. (1992). Someone to watch over me: Surveillance, discipline and the just-in-time labour process. Sociology, 26(2), 271–289.CrossRefGoogle Scholar
  43. Sorensen, C., & Gibson, D. (2004). Ubiquitous visions and opaque realities: Professionals talking about mobile technologies. Journal of Policy, Regulation and Strategy for Telecommunications, 63, 188–196.CrossRefGoogle Scholar
  44. Strategy Analytics (2013). Has BYOD been found out? Sales of corporate-owned smartphones surge in Q3 2013 December 10, Retrieved October 05, 2014, from http://www.strategyanalytics.com/default.aspx?mod=pressreleaseviewer&a0=5450.
  45. Urry, J. (2005). Sociologie des mobilites, une nouvelle frontière pour la sociologie?. Paris: Armand Collin, Collection U.Google Scholar
  46. Varshney, U. (2003). Mobile and wireless information systems: Applications: Networks, and research problems. Communications of the AIS, 12(11), 155–166.Google Scholar
  47. Webster, J. (1995). Networks of collaboration or conflict? Electronic data interchange and power in the supply chain. Journal of Strategic Information Systems, 4(1), 31–42.CrossRefGoogle Scholar
  48. Wiredu, G. O., & Sorensen, C. (2006). The dynamics of control and mobile computing in distributed activities. European Journal of Information Systems, 15(3), 307–319.CrossRefGoogle Scholar
  49. Yin, R. (2003). Case study research (3rd ed.). Thousand Oaks, CA: Sage.Google Scholar
  50. Zuboff, S. (1988). In the age of the smart machine. New York: Basic Books.Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2015

Authors and Affiliations

  1. 1.IESEG School of Management, LEM CNRS 9221LilleFrance

Personalised recommendations