Abstract
This paper examines workplace surveillance and monitoring. It is argued that privacy is a moral right, and while such surveillance and monitoring can be justified in some circumstances, there is a presumption against the infringement of privacy. An account of privacy precedes consideration of various arguments frequently given for the surveillance and monitoring of employees, arguments which look at the benefits, or supposed benefits, to employees as well as to employers. The paper examines the general monitoring of work, and the monitoring of email, listservers and the World Wide Web. It is argued that many of the common justifications given for this surveillance and monitoring do not stand up to close scrutiny.
Similar content being viewed by others
References
ACM Code of Ethics and Professional Conduct: 1992, Section 1.7. http://www.acm.org/constitution/ code.html (Read 25 July, 1998).
Aiello, John R. and Kathryn, J. Kolb: 1996, 'Electronic Performance Monitoring: A Risk Factor for Workplace Monitoring', in S. L. Sauter and L. R. Murphy, (eds.), Organisational Risk Factors for Job Stress(American Psychological Association), pp. 163–179.
ALA Policy Manual: 1996, Section Two (Position and Public Policy Statements), 52.4 Confidentiality of Library Records, gopher://ala1.ala.org:70/00/ alagophviii/policy.hb (Read 25 July 1998).
Barroso Asenjo, P.: 1997, 'Key Ethical Concepts for the Internet and for Ethical Codes of Computer Professionals', Australian Computer Journal 29, 2–5.
Benn, S. A.: 1988, Theory of Freedom(Cambridge University Press, Cambridge).
Bewayo, E.: 1996, 'Electronic Management: Its Downside Especially in Small Business', in J. Kizza (ed.), Social and Ethical Effects of the Computer Revolution(McFarland and Co., Jefferson, NC), pp. 186–199.
Black, Henry Campbell: 1990, Black's Law Dictionary, 6th edition (West Publishing Co., St. Paul, MN), p. 1566.
Cutler, P. G.: 1998, 'E-mail: Employees and Liability', Chemistry in Australia(March, 1), 30–31.
DeTienne, K. B.: 1993, 'Big Brother or Friendly Coach', Futurist 27, 33–37.
Direct Marketing: 1993, 'Telephone Monitoring Heads to Congress', (August 6), 6. Quoted in M. Levy, 'Electronic Monitoring in the Workplace: Power Through the Panopticon', http://bliss.berkeley. edu/impact/students/mike/mike_ paper.html (Read 25 July 1998).
Fenner, Deborah B. and F. Javier Lerch: 1993, 'The Impact of Computerized Performance Monitoring and Prior Performance Knowledge on Performance Evaluation', Journal of Applied Social Psychology 23, 573–601.
Forester, Tom and Perry Morrison: 1991, Computer Ethics: CautionaryTales and Ethical Dilemmas in Computing(MIT Press, Cambridge, MA).
Garson, Barbara: 1988, The Electronic Sweatshop(Simon and Schuster, New York).
Hawk, Stephen, R.: 1994, Journal of Business Ethics 13, 949–957.
Johnson, Deborah G.: 1994, Computer Ethics, Second edition (Prentice Hall, Upper Saddle River, NJ).
Langford, Duncan: 1995, Practical Computer Ethics(McGraw-Hill, Maidenhead, Berkshire).
Loch, Karen D., Sue Conger and Effy Oz: 1998, 'Ownership, Privacy and Monitoring in the Workplace: A Debate on Technology and Ethics', Journal of Business Ethics 17, 653–663.
Lund, J.: 1992, 'Electronic Performance Monitoring: A Review of the Research Issues', Applied Ergonomics 23, 54–58.
Magney, J.: 1996, 'Computing and Ethics: Control and Surveillance Versus Cooperation and Empowerment', in J. Kizza (ed.), Social and Ethical Effects of the Computer Revolution(McFarland and Co., Jefferson, NC), pp. 200–209.
Miller, S.: 1997 'Privacy and the Internet', Australian Computer Journal 29, 12–15, for a similar discussion of the notion of privacy.
Million, A. C. and K. N. Fisher: 1986, 'Library Records: A Review of Confidentiality Laws and Policies', Journal of Academic Librarianship 11, 346–349.
Nussbaum, Karen: 1991, 'Computer Monitoring a Threat to the Right to Privacy?', reprinted in Roy Dejoie, George Fowler and David Paradice, Ethical Issues in Information Systems(Boyd and Fraser Publishing Company, Boston).
Parent, P. “Privacy”: 1992, in E. E. Cohen (ed.), Philosophical Issues in Journalism(Oxford University Press, New York), pp. 90–99.
Parker, Donn B., Susan Swope and Bruce N. Baker: 1990, Ethical Conflicts In Information and Computer Science, Technology, and Business(QED Information Sciences, Inc., Wellesley, MA).
Perrolle, Judith A.: 1996, 'Privacy and Surveillance in Computer-Supported Cooperative Work', in Seumas Miller and John WeckertDavid Lyon and Elia Zureik (eds.), Computers, Surveillance, and Privacy(University of Minnesota Press, Minneapolis), 47–65.
Rule, James, B.: 1996, 'High-Tech Workplace Surveillance: What's Really New?', in David Lyon and Elia Zureik (eds.), Computers, Surveillance, and Privacy(University of Minnesota Press, Minneapolis), pp. 66–76.
Severson, Richard J.: 1997, The Principles of Information Ethics(M.E. Sharp, Armonk, NY).
Warren, S. and L. Brandeis: 1890, 'The Right to Privacy', Harvard Law Review 4, 193–220.
Weckert, J. and D. Adeney: 1997, Computer and Information Ethics(Greenwood Publishing Group, Westport, Conn.).
Zuboff, Shoshana: 1988, In the Age of the Smart Machine: The Future of Work and Power(Basic Books, New York).
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Miller, S., Weckert, J. Privacy, the Workplace and the Internet. Journal of Business Ethics 28, 255–265 (2000). https://doi.org/10.1023/A:1006232417265
Issue Date:
DOI: https://doi.org/10.1023/A:1006232417265