Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Relationship between technology and ethics
Ethics in Information Technology
Relationship between technology and ethics
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Relationship between technology and ethics
With increased technology development, employee monitoring has become a controversial topic over the past few decades. Traditional employee action and management changed during this time. Misuse of company property, decreased productivity, and workplace violence are the main reasons for monitoring employees. Additionally, the rising need and use of technology fostered the need of monitoring daily activities and heightened the pressure between the employee privacy and management rights of the employers. Despite posing both legal and ethical issues, employee monitoring functions to protect both employees and employers.
Workplace surveillance can involve different forms of monitoring. Some businesses may opt to simply monitor phone calls and e-mail. While other businesses opt for video surveillance of company property, including the employees working on site. Whatever the form, employee monitoring gives rise to many issues and some employees simply do not agree with the process. It is important for both employers and employees alike to understand the negative and positive effects of employee monitoring. Understanding these effects can lead to more employee support
…show more content…
"Electronic monitoring has deep ethical implications with respect to workplace outcomes such as employee perceptions of privacy rights, fairness judgments, quality of work-life, and stress-related illness." (Alder, Schminke, Noel, Kuenzi, 2008, p. 481). Most of the ethical implications of employee monitoring fall under an employee's idea of morality. An employee may feel that it is unethical to invade their privacy, even though that employee is using company property. "A common reaction to the suggestion that employers may monitor such internal (to the firm) communications is that this is an abridgement of the constitutional right to free speech guaranteed by the first amendment." (Hodson, Englander, & Englander, 1999, para
In Fitbit for Bosses written by Lynn Stuart Parramore she talks about how bosses want to start monitoring their employees. Parramore shows her discomfort with this idea. She thinks that “big money seems poised to trump privacy”(Parramore). Which basically just means that for bosses is that money is over everything even privacy. Allowing bosses to monitor their employees is dishonest and manipulating.Some researchers have also found out that increasing surveillance has caused the decrease of productivity. Researchers warned them that the data can have big errors and people that look at the data that the fitbits can cherry-pick the information that supports their beliefs and ditch the rest of the information that leads to racial profiling. “Surveillance makes everyone seem suspicious, creating perceptions and expectations of dishonesty.” Workers will become dehumanized“(Parramore), it prevents them from experimenting and exercising the creativity on the job.” A woman from California filed a suit against her former employer because he forced her to to install a tracking app on her phone. She had to have it on her phone 24/7 or else she would
The Social Contract Theory would apply in preservation of ethics in the workplace as it considers an action to be good if it is accepted by collective group of rational people and is therefore considered binding (Nielsen, 2013). The Social Contract theory would be used to collectively determine whether GPS tracking of employees is ethical. Employees and employers would be required to collectively agree on the benefits of tracking such as increased productivity, efficiency, cost reduction and better accountability all of which would translate to more profits for the company and bonuses for the employees. The employees would consent to GPS tracking and monitoring during office hours while the employer would be required to forego tracking and monitoring during lunch breaks and outside working hours, otherwise the employer would be in violation of the collective agreement. Employees would also be required to abide by their duties and responsibilities during working hours to avoid violation of the agreement. The Social contract theory would also include consequences in the instance of violation for both the employer and employee
Employee Monitoring: Is There Privacy in the Workplace? . (6/3/2004)
In Module 1, Kindred Todd faced quite a few ethical dilemmas that included her values and technical ineptness. The first predicament was tested her personal morals and ethics. According to, Cumming and Worley, OD practitioners are dealing more and more with value conflicts with powerful outside groups (Cummings & Worley, 2008). Kindred was immediately faced with the issue of knowing what was ethically correct but being told the unethical approach was the best in order to benefit the client and her job security. Although compromising is one of the many skills of organization developers there are still morals that should be followed on each assignment. Kindred, know that deceiving the clients was unethical, took the first step to working on behalf of the client and immediately involved her superior, Larry, to resolve a potential conflict In the project. While her actions went in vain when she told her boss to remove her from the project and provide the client with a more qualified resource, Kindred did what she thought to be the best approach.
Sometimes there is no middle ground. Monitoring of employees at the workplace, either you side with the employees or you believe management owns the network and should call the shots. The purpose of this paper is to tackle whether monitoring an employee is an invasion of privacy. How new technology has made monitoring of employees by employers possible. The unfairness of computerized monitoring software used to watch employees. The employers desire to ensure that the times they are paying for to be spent in their service is indeed being spent that way. Why not to monitor employees, as well as tips on balancing privacy rights of employees at the job.
One type of surveillance is employee monitoring. Many employers monitor their workers’ activities for one reason or another. Companies monitor employees using many methods. They may use access panels that requires employees to identify themselves to control entry to various area in the building, allowing them to create a log of employee movements. They may also use software to monitor attendance and work hours. Additionally, many programs allows companies to monitor activities performed on work computers, inspect employee emails, log keystrokes, etc. An emerging methods of employee monitor also include social network and search engine monitoring. Employers can find out who their employees are associated with, as well as other potentially incriminating information. (Ciocchetti)
As you can see, there are a lot of issues related to computer privacy in the workplace. I will continue researching the topic and present a full report with recommendations to your by the end of the month.
David Brin in The Transparent Society warns us of the future of privacy that is on the horizon. With millions of cameras recording our every public move, who should have control of the information: companies and governments or we the citizens? If we take a look at Brin's vision of our future, his solution to the problem, the role of ICTs and the Kelley Cam at IU, we can come to a conclusion that our privacy is on the line and we as citizens must act soon in order to keep our country's foundational liberties.
2) It is getting ever easier to record anything, or everything, that you see. This opens fascinating possibilities-and alarming ones.”
Certain states have laws that make sure employers tell potential employees that they survey the internet at the business. The state of Connecticut law “Conn. Gen. Stat. 31-48d†requires employers that monitor any electronics to “give prior written notice to all employees who may be affected, informing them of the types of monitoring which may occur.†States are taking action to be able to protect their businesses while also warning employees that it’s happening, which seems like a good idea. Those states should be a role model for the federal government to
Transaction Cost or Agency theory is just one of many alternatives organizations have available as a way to control employees. The findings in this comparison of external and internal labor sources suggest that when a company is unsure of what their employee is doing, it is cheaper to use surveillance as a control tactic. If a company has general product that is not complicated, it may be more advantageous to outsource since control would not be as necessary. Many companies may use a combination of both internal and externalized labor, since risks may vary according to what is sold. If given the choice most of us would pick the internal labor side, because it is secure, dependable and predictable. Organizations must way the risks with control to decide the best way a job will get done with the minimal amount of employee control.
When the internet was considered a global information system in 1995 millions of Americans participated in virtual communication. People began to communicate with each other and personal information began to be placed online by the stroke of the fingertips to their own computer. So the question is the privacy of individuals trusted online? Can people snoop around and see personal information? Of course people can if guidelines are not set in place to protect them. Public and private information can be complex when some individual(s) do not expect their communication to be read outside of their online community. What will be discussed are some ethical responsibilities that need to take place in the United States. Respecting the individual privacy and honor confidentiality is a must in this country.
Fearing the potential threat of an Orwellian dystopia, many people are having second thoughts about the government’s surveillance programs to thwart terrorism. Although the practice of surveillance by the National Security Agency (NSA) and PRISM has halted potential terrorist attacks, American citizens have recently learned in the summer of 2013 that their individual lives are no longer private. The United States Government is covertly tracking text messages, telephone conversations, web communications, online purchases, and locations of individuals all over the world. With programs like NSA and PRISM, these networks of surveillance programs are only a small portion of the largest surveillance system in history. Through this system, the government can acquire information, such as where people have traveled, their current location, and where they plan to go, under total secrecy. These programs were brought to light when former NSA employee, Edward Snowden, disclosed documents depicting the large-scale data collection. Altogether, surveillance is a crucial aspect of modern society, but with privacy intrusions, covert data collection, deficient restrictions, and lack of transparency, it can be more detrimental than beneficial.
Employees must also be made aware of the duty of loyalty they owe their employers, and how sharing information about their employer through social media might violate this duty. According to Warren and Pedowitz (2011), employees, as agents of their employer, owe their employers a duty of loyalty. Section 387 of the Restatement (Second) of Agency provides that “an agent is subject to a duty to his principal to act solely for the benefit of the principal in all matter connected with his agency” (Restatement (Second) of Agency § 387, 1958); and this principle is frequently apply by the courts – with employers recovering employee gains, rewards, or profits obtained while committing the disloyalty, including paid wages (Warren & Pedowitz, 2011).
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...