IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Bridging the Gap between Employee Surveillance and Privacy Protection

Bridging the Gap between Employee Surveillance and Privacy Protection
View Sample PDF
Author(s): Lilian Mitrou (University of the Aegean, Greece)and Maria Karyda (University of the Aegean, Greece)
Copyright: 2010
Pages: 19
Source title: Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Judith Symonds (AUT University, New Zealand)
DOI: 10.4018/978-1-60566-960-1.ch082

Purchase

View Bridging the Gap between Employee Surveillance and Privacy Protection on the publisher's website for pricing and purchasing information.

Abstract

This chapter addresses the issue of electronic workplace monitoring and its implications for employees’ privacy. Organizations increasingly use a variety of electronic surveillance methods to mitigate threats to their information systems. Monitoring technology spans different aspects of organizational life, including communications, desktop and physical monitoring, collecting employees’ personal data, and locating employees through active badges. The application of these technologies raises privacy protection concerns. Throughout this chapter, we describe different approaches to privacy protection followed by different jurisdictions. We also highlight privacy issues with regard to new trends and practices, such as teleworking and use of RFID technology for identifying the location of employees. Emphasis is also placed on the reorganization of work facilitated by information technology, since frontiers between the private and the public sphere are becoming blurred. The aim of this chapter is twofold: we discuss privacy concerns and the implications of implementing employee surveillance technologies and we suggest a framework of fair practices which can be used for bridging the gap between the need to provide adequate protection for information systems, while preserving employees’ rights to privacy.

Related Content

Venkatesh Raju. © 2024. 32 pages.
A. Gayathiri, S. Sabitha, G. Sathiya, P. Sumitra, M. Sathiya, George Ghinea. © 2024. 25 pages.
Guru Prasad M. S., Praveen Gujjar J., Raghavendra M Devadas, Bhavya B. S., Amith K. Jain, A. Suresh Kumar. © 2024. 16 pages.
Praveen Gujjar J., Guru Prasad M. S., Harold Andrew Patrick, M. H. Sharieff, Naveen Kumar H. N.. © 2024. 15 pages.
Annamalai Selvarajan, Sangeetha Nagamani, Suresh Kumar A., Tejavarma Dommaraju, Harsha Vardhan Gandhodi, Dimitrios A. Karras. © 2024. 38 pages.
Raghavendra M. Devadas, Vani Hiremani, Praveen Gujjar J.. © 2024. 26 pages.
S. Radha, C. Visali, C. Aparna, C. Aarthi, R. Logambal. © 2024. 22 pages.
Body Bottom