Skip to main content

Privacy Policy, Training and Adaption of Employee Monitoring Technology to Curtail Workplace Harassment in Organizations: An Application of TAM

  • Conference paper
  • First Online:
Computational Intelligence in Information Systems (CIIS 2021)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1321))

Abstract

Digital technology is becoming more sophisticated and so are organizational monitoring technologies implemented to enhance business efficiencies. Some employees may accept such changes effortlessly, but some will resist to adopt to the digitization and monitoring technologies’ implementation because of several concerns including the concerns of privacy violation. This gives rise to a research question about the adaption of the monitoring technologies that is the main theme of this research. A survey of various categories of employees has been conducted in Brunei’s economy using a questionnaire, designed based on Technology Adaption Model has been disseminated widely. The response rate was fair, however, 17% of all responses have been rejected based on various deficiencies and only 179 responses have been used for analysis. The study has tried to find the answer about the behavioral intention to use the employee monitoring technology by employees by considering various organizational, contextual and individual factors. Data analysis has used Cronbach’s alpha, correlation, and linear regression. Questionnaire consistency has been found to hold. In order to establish the statistically significant causation in the proposed model hypothesis, few iterations are required. Privacy policy and training of employees enhance understanding of technology. Perceived usefulness, which is affected by ease of use but not directly from the understanding variable. Subjective norms variable has an impact on intention to use where the main determinant of usage behavior, which has come up statistically significant, is workplace harassment reduction feature of the monitoring technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aïmeur, E., Lawani, O., Dalkir, K.: When changing the look of privacy policies affects user trust: an experimental study. Comput. Hum. Behav. 58, 368–379 (2016). https://doi.org/10.1016/j.chb.2015.11.014

    Article  Google Scholar 

  2. Al-Emran, M., Mezhuyev, V., Kamaludin, A.: Technology acceptance model in m-learning context: a systematic review. Comput. Educ. 125, 389–412 (2018). https://doi.org/10.1016/j.compedu.2018.06.008

    Article  Google Scholar 

  3. Alder, G.S., Noel, T.W., Ambrose, M.L.: Clarifying the effects of internet monitoring on job attitudes: the mediating role of employee trust. Inform. Manag. 43, 894–903 (2006). https://doi.org/10.1016/j.im.2006.08.008

    Article  Google Scholar 

  4. Ariss, S.S.: Computer monitoring: benefits and pitfalls facing management. Inform. Manag. 39(7), 553–558 (2002). https://doi.org/10.1016/S0378-7206(01)00121-5

    Article  Google Scholar 

  5. Baldree, J.: Fraud Risk Management: A Guide To Good Practice. Chart. Inst. Manag. Accountants

    Google Scholar 

  6. Bierstaker, J.L., Brody, R.G., Pacini, C.: Accountants’ perceptions regarding fraud detection and prevention methods. Manag. Auditing J. 21(5), 520–535 (2006). https://doi.org/10.1108/02686900610667283

    Article  Google Scholar 

  7. Capistrano, E.P.S., Chen, J.V.: Information privacy policies: the effects of policy characteristics and online experience. Comput. Stan. Interfaces 42, 24–31 (2015). https://doi.org/10.1016/j.csi.2015.04.001

  8. Chang, S.E., Liu, A.Y., Lin, S.: Exploring privacy and trust for employee monitoring. Ind. Manag. Data Syst. 115(1), 88–106 (2015). https://doi.org/10.1108/IMDS-07-2014-0197

    Article  Google Scholar 

  9. Chang, Y., Wong, S.F., Libaque-Saenz, C.F., Lee, H.: The role of privacy policy on consumers’ perceived privacy. Gov. Inform. Q. 35(3), 445–459 (2018). https://doi.org/10.1016/j.giq.2018.04.002

    Article  Google Scholar 

  10. Constantin, E.C., Baias, C.C.: Employee voice - key factor in internal communication. Procedia – Soc. Behav. Sci. 191, 975–978 (2015). https://doi.org/10.1016/j.sbspro.2015.04.319

    Article  Google Scholar 

  11. Eivazi, K.: Computer use monitoring and privacy at work. Comput. Law Secur. Rev. 27(5), 516–523 (2011). https://doi.org/10.1016/j.clsr.2011.07.003

    Article  Google Scholar 

  12. Faisal, F.: Former bank employee jailed for fraud. Borneo Bulletin (2017)

    Google Scholar 

  13. Gan, M.F., Chua, H.N., Wong, S.F.: Privacy enhancing technologies implementation: an investigation of its impact on work process and employee perception. Telematics Inform. 38, 13–29 (2019). https://doi.org/10.1016/j.tele.2019.01.002

    Article  Google Scholar 

  14. Guritno, S., Siringoringo, H.: Perceived usefulness, ease of use, and attitude towards online shopping usefulness towards online airlines ticket purchase. Procedia – Soc. Behav. Sci. 81, 212–216 (2013). https://doi.org/10.1016/j.sbspro.2013.06.415

    Article  Google Scholar 

  15. Ella, V.J.: Employee monitoring and workplace privacy law. In: Lewis, P.C.J. American Bar Association Section of Labor and Employment Law National Symposium on Technology in Labor & Employment Law, vol. 14 (2016)

    Google Scholar 

  16. Mitrou, L., Karyda, M.: Employees privacy vs. employers security : can they be balanced? Telematics Inform. 23, 164–178 (2006). https://doi.org/10.1016/j.tele.2005.07.003

  17. Moussa, M.: Monitoring employee behavior through the use of technology and issues of employee privacy in america. SAGE Open. 5(2), 1–13 (2015). https://doi.org/10.1177/2158244015580168

    Article  Google Scholar 

  18. Mugo, D., Njagi, K., Chemwei, B., Motanya, J.O.: The Technology Acceptance Model (TAM) and its application to the utilization of mobile learning technologies. Br. J. Math. Comput. Sci. 20(4), 1–8 (2017). https://doi.org/10.9734/BJMCS/2017/29015

    Article  Google Scholar 

  19. Samaranayake, V., Gamage, C.: Employee perception towards electronic monitoring at work place and its impact on job satisfaction of software professionals in Sri Lanka. Telematics Inform. 29(2), 233–244 (2012). https://doi.org/10.1016/j.tele.2011.08.003

    Article  Google Scholar 

  20. Sarra, R.: How Employees’ Monitoring Perceptions Affect Organizational Trust: The Moderating Role Of Organizational Justice. Doctorate Dissertation (2016)

    Google Scholar 

  21. Steinfeld, N.: “i agree to the terms and conditions”: (How) do users read privacy policies online? An eye-tracking experiment. Comput. Hum. Behav. 55(Part B), 992–1000 (2016). https://doi.org/10.1016/j.chb.2015.09.038

  22. Suh, J.B., Shim, H.S., Button, M.: Exploring the impact of organizational investment on occupational fraud: mediating effects of ethical culture and monitoring control. Int. J. Law Crime Justice 53, 46–55 (2018). https://doi.org/10.1016/j.ijlcj.2018.02.003

    Article  Google Scholar 

  23. Taherdoost, H.: A review of technology acceptance and adoption models and theories. Procedia Manuf. 22, 960–967 (2018). https://doi.org/10.1016/j.promfg.2018.03.137

    Article  Google Scholar 

  24. The Chartered Institute of Public Finance and Accountancy (CIPFA): Fraud Definition and Examples. Chart. Inst. Public Finance Account (2010)

    Google Scholar 

  25. Thiel, C.E., Macdougall, A.E., Bagdasarov, Z.: Big (Benevolent) brother: overcoming the drawbacks of employee monitoring through ethical administration. Organ. Dyn. 48(2), 19–28 (2018). https://doi.org/10.1016/j.orgdyn.2018.08.001

    Article  Google Scholar 

  26. Tomczak, D.L., Lanzo, L.A., Aguinis, H.: Evidence-based recommendations for employee performance monitoring. Bus. Horiz. 61(2), 251–259 (2018). https://doi.org/10.1016/j.bushor.2017.11.006

    Article  Google Scholar 

  27. Yerby, J.: Legal and ethical issues of employee monitoring. Online J. Appl. Knowl. Manag. 1(2), 44–55 (2013)

    Google Scholar 

  28. Yue, C.A., Men, L.R., Ferguson, M.A.: Bridging transformational leadership, transparent communication, and employee openness to change: the mediating role of trust. Pub. Relat. Rev. 45(3), 101779 (2019). https://doi.org/10.1016/j.pubrev.2019.04.012

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shahid Anjum .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ismail, Z., Anjum, S. (2021). Privacy Policy, Training and Adaption of Employee Monitoring Technology to Curtail Workplace Harassment in Organizations: An Application of TAM. In: Suhaili, W.S.H., Siau, N.Z., Omar, S., Phon-Amuaisuk, S. (eds) Computational Intelligence in Information Systems. CIIS 2021. Advances in Intelligent Systems and Computing, vol 1321. Springer, Cham. https://doi.org/10.1007/978-3-030-68133-3_9

Download citation

Publish with us

Policies and ethics