Skip to main content
Log in

Ownership, Privacy and Monitoring in the Workplace: A Debate on Technology and Ethics

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

A panel held at the International Conference on Information Systems, December 5–7, 1993, addressed the importance and ethicality of several issues relating to ethics and information technology use. The substance of the debate and results of audience votes on the issues are presented in this paper as a means of initiating a broader debate on the issues, for it is with debate that we reach a group consensus on acceptable behavior and practice. With consensus, we can begin to develop codes and policies that are feasible and practical for ethical computer use.

Specific dilemmas debated involved the issues of privacy and ownership, including the ethicality of using company resources for personal use and monitoring compliance to company policies about computer use. In general, we found little consensus about ethicality of any of the types of conduct, although we found a high degree of consensus that the debated issues were important and should continue to be discussed. The final question concerned policies and codes. While policies and codes were believed to be necessary, they were also perceived as ineffective. Several suggestions for practical action to enhance the efficacy of ethical codes are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Anderson, R. E., D. G. Johnson, D. Gotterbarn and J. Perrolle: 1993, ‘Using the ACM Code of Ethics in Decision Making’, Communications of the ACM 36(2), 98–107.

    Google Scholar 

  • Betts, M.: 1994, ‘Campaign Address Computer Ethics “Void”,’ Computerworld 28(24), 33.

    Google Scholar 

  • Brown, B.: 1994, ‘In-Depth: Companies Own E-mail and Can Monitor It’, Computerworld 28(26), 135, 137.

    Google Scholar 

  • Cespedes, F. V. and H. J. Smith: 1993, ‘Database Marketing: New Rules for Policy and Practice’, Sloan Management Review 34(4), 7–22.

    Google Scholar 

  • Conger, S., K. D. Loch and B. L. Helft: 1995, ‘Ethics and Information Technology Use: A Factor Analysis of Attitudes to Computer Use’, Information Systems Journal 5, 161–184.

    Google Scholar 

  • Culnan, M.: 1993, ‘“How Did They Get My Name?”: An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use’, MIS Quarterly 17(3), 341–361.

    Google Scholar 

  • Donagan, A.: 1977, The Theory of Morality(University of Chicago Press, Chicago).

    Google Scholar 

  • Donaldson, T. and T. W. Dunfee: 1994, ‘Toward a Unified Conception of Business Ethics: Integrative Social Contracts Theory’, Academy of Management Review 19(2), 252–284.

    Google Scholar 

  • Dyson, E.: 1994, ‘The Trouble with Cyberspace’, Computerworld 28(29), 37.

    Google Scholar 

  • Facione, P. A., D. Scherer and T. Attig: 1991, Ethics and Society, 2nd edition (Prentice-Hall, Inc., Englewood Cliffs, NJ).

    Google Scholar 

  • Ferrell, O. C. and L. G. Gresham: 1985, ‘A Contingency Framework for Understanding Ethical Decision Making in Marketing’, Journal of Marketing 49, 87–96.

    Google Scholar 

  • George, J. F.: 1994, ‘Computer-Based Monitoring: Common Perceptions and Empirical Results’, working paper, College of Business, Florida State University.

  • Gilligan, C., ed.: 1989, Mapping the Moral Domain: A Contribution of Women's Thinking to Psychological Theory & Education(Harvard University Press, Cambridge, MA).

    Google Scholar 

  • Gotterbarn, D.: 1992, ‘The Use and Abuse of Computer Ethics’, Journal of Systems and Software 17(1), 75–80.

    Google Scholar 

  • Horwitt, E.: 1994, ‘Not On My Internet’, Computerworld 28(28), 57–60.

    Google Scholar 

  • Kahn, W. A.: 1990, ‘Toward an Agenda for Business Ethics Research’, Academy of Management Review 15(2), 311–328.

    Google Scholar 

  • Kohlberg, L.: 1981, The Philosophy of Moral Development(Harper & Row, San Francisco).

    Google Scholar 

  • Laudon, K.: 1993, ‘Markets and Privacy’, Proceedings of the 14th International Conference on Information Systems, Orlando, FL, pp. 65–75.

  • Loch, K. D., S. Conger and B. Helft: 1994, ‘An Exploration of Ethics and Information Technology Use: Issues, Perspectives, Consensus and Consistency’, (Under review).

  • Loch, K. D., H. H. Carr and M. E. Warkentin: 1992,’ Threats to Information Systems: Today's Reality, Yesterday's Understanding’, MIS Quarterly 16(2), 173–186.

    Google Scholar 

  • Mason, R. O.: 1986, ‘Four Ethical Issues of the Information Age’, MIS Quarterly 10(1), 4–12.

    Google Scholar 

  • Mason, J.: 1990, ‘Warning: Here Comes the Software Police’, Datamation(October), 40–45.

  • Nelson, C.: 1994, ‘In-Depth: Employers Have No Right to Snoop through Mail’, Computerworld 28(26), 135, 137.

    Google Scholar 

  • Neumann, P. G.: 1994, ‘Technology, Laws, and Society’, Communications of the ACM 37(3), 138.

    Google Scholar 

  • Oz, E.: 1992, ‘Ethical Standards for Information Systems Professionals: A Case for a Unified Code’, MIS Quarterly 16(4), 423–433.

    Google Scholar 

  • Oz., E.: 1994, Ethics for the Information age(Wm. C. Brown Communications, Inc., Dubuque, IA).

    Google Scholar 

  • Parker, D. B.: 1988, ‘Ethics for Information Systems Personnel’, Journal of Information Systems Management 5(3), 44–48.

    Google Scholar 

  • Pillar, C.: 1993, ‘Special Report on Electronic Privacy: Bosses with X-Ray Eyes’, MacWorld( July), 118–120.

  • Sipior, J. and B. Ward: 1995, ‘The Ethical and Legal Quandary of E-mail Privacy’, Communications of the ACM 38(12), 40–47.

    Google Scholar 

  • Smith, H. J.: 1994, Managing Privacy: Information Technology and Corporate America(The University of North Carolina Press, Chapel Hill, NC).

    Google Scholar 

  • Starbuck, W. H. and J. Webster: 1991, ‘When Is Play Productive?’, Accounting, Management, and Information Technology 1(1), 71–90.

    Google Scholar 

  • Straub, D. W. Jr. and R. Collins: 1990, ‘Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy’, MIS Quarterly 14(2), 143–158.

    Google Scholar 

  • Webster, J. and J. J. Martocchio: 1992, ‘Microcomputer Playfulness: Development of a Measure with Workplace Implications’, MIS Quarterly 16(2), 201–226.

    Google Scholar 

Download references

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Loch, K.D., Conger, S. & Oz, E. Ownership, Privacy and Monitoring in the Workplace: A Debate on Technology and Ethics. Journal of Business Ethics 17, 653–663 (1998). https://doi.org/10.1023/A:1005720606763

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1005720606763

Keywords

Navigation