IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Bridging the Gap between Employee Surveillance and Privacy Protection

Bridging the Gap between Employee Surveillance and Privacy Protection
View Sample PDF
Author(s): Lilian Mitrou (University of the Aegean, Greece) and Maria Karyda (University of the Aegean, Greece)
Copyright: 2010
Pages: 19
Source title: Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Judith Symonds (AUT University, New Zealand)
DOI: 10.4018/978-1-60566-960-1.ch082

Purchase

View Bridging the Gap between Employee Surveillance and Privacy Protection on the publisher's website for pricing and purchasing information.

Abstract

This chapter addresses the issue of electronic workplace monitoring and its implications for employees’ privacy. Organizations increasingly use a variety of electronic surveillance methods to mitigate threats to their information systems. Monitoring technology spans different aspects of organizational life, including communications, desktop and physical monitoring, collecting employees’ personal data, and locating employees through active badges. The application of these technologies raises privacy protection concerns. Throughout this chapter, we describe different approaches to privacy protection followed by different jurisdictions. We also highlight privacy issues with regard to new trends and practices, such as teleworking and use of RFID technology for identifying the location of employees. Emphasis is also placed on the reorganization of work facilitated by information technology, since frontiers between the private and the public sphere are becoming blurred. The aim of this chapter is twofold: we discuss privacy concerns and the implications of implementing employee surveillance technologies and we suggest a framework of fair practices which can be used for bridging the gap between the need to provide adequate protection for information systems, while preserving employees’ rights to privacy.

Related Content

Bin Guo, Yunji Liang, Zhu Wang, Zhiwen Yu, Daqing Zhang, Xingshe Zhou. © 2014. 20 pages.
Yunji Liang, Xingshe Zhou, Bin Guo, Zhiwen Yu. © 2014. 31 pages.
Igor Bisio, Alessandro Delfino, Fabio Lavagetto, Mario Marchese. © 2014. 33 pages.
Kobkaew Opasjumruskit, Jesús Expósito, Birgitta König-Ries, Andreas Nauerz, Martin Welsch. © 2014. 22 pages.
Viktoriya Degeler, Alexander Lazovik. © 2014. 23 pages.
Vlasios Kasapakis, Damianos Gavalas. © 2014. 26 pages.
Zhu Wang, Xingshe Zhou, Daqing Zhang, Bin Guo, Zhiwen Yu. © 2014. 18 pages.
Body Bottom