Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Importance of electronic monitoring
Surveillance technology
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Importance of electronic monitoring
“Quit Watching Me!';
Attempts to monitor employees have always existed in one form or another, from mechanical keystroke counters in the early part of the century, to the latest innovations in electronic monitoring. As technology advances, so do the monitoring possibilities in the workplace. As result of the endless possibilities in surveillance, anxiety in employee’s increase, which in most cases leads to illnesses. Studies have shown that individuals who are constantly being monitored at work suffer from inevitable effects, the majority being illnesses such as physical, emotional, and mental disorders. Employers feel they have the right to monitor their employees, however when extensive monitoring effects a employees health, then the employers has gone to far. Advance technology has lead to monitoring devices such as via computers, video surveillance, and active badges in the last decade, but as the intensity of the surveillance increases so do the negative effects on the employees.
There has been a huge increase to pass legislation’s that will regulate the employer in monitoring his employees’ by via computer. Monitoring an employee by via computer is one of the latest innovations in electronic monitoring, which is done by purchasing and installing software in the companies computer system. Once the software is installed, it will be able to do a variety of types of electronic monitoring from keystroke counting and accuracy, time how long it takes to make a transaction, and how long the computer has been on idle. This type of electronic monitoring that involves advanced technology and “the constant monitoring to measure employees’ performance creates an enormous amount of pressure and stress…the stress that is created by monitoring has caused serious physical effects'; (Ternipsede 447) on employees in the work place. Many employees have been effected from such setting in the workplace, but they are unaware of the effects since they take many years to develop fully. Another type of electronic monitoring that can damage an employee’s health is video surveillance.
Video surveillance has existed in the work place since the invention of the television. Video surveillance cameras come in all shapes and sizes, from the obvious ones to some that are small as a dime. Many employers purchase such devices to capture employees and customers who commit theft and fraud, or any other illegal activity. The increase of technology in electronic monitoring is now able to transfer images from a camera to a computer where the employer is able to zoom in and make a positive identity of the employee or customer who is committing an illegal act.
Every type of building, from a high tech research lab, to a grocery store and even private residences can gain a physical security advantage utilizing CCTV video surveillance to guard against theft and break-ins. CCTV is a great tool for the security professional. It records everything on hours of tape. All that transpires be it; a routine day, a theft or robbery, arguments between employees, irate customers etc. But with all types of CCTV systems on the market one must choose what best fits their needs. As noted by Baker & Benny (2013) “ when considering the design and selection of a video surveillance system, the physical security designer, user, or integrator needs to consider the individual needs of each use case and market with which he or she is working” (p. 123). As in the case of Stew Leonard’s Grocery store, their CCTV’s systems includes 500 cameras! That is a lot of video to review for theft investigations. In the situation concerning the monitoring of the Innsbrook Resort residential properties, the security firm wanted to reduce the amount of false alarms that were occurring and the associated time wasted responding to them (Purvis, 2012, para. 12). In both cases, the clients
Although they can be easily tracked, people overlook the invasion of privacy possibility because of the convenience they bring to every day life. Systems like OnStar installed in cars have made the tracking of stolen cars practically effortless. Similar tools are being used by law enforcement, Penenberg stated “cell phones have become the digital equivalent of Hansel and Gretel’s bread crumbs” (472). He then goes on to discuss how in Britain in 1996, authorities installed 300 cameras in East London. Although this didn’t affect the terrorism, it did affect the crime rate which fell 30 percent after the cameras were put into place. Penenberg closes his essay by mentioning that the surveillance is not only used to watch the citizens but also for citizens to keep an eye on the government. Through his organization, relevant information, and professional tone, Penenberg creates an effective
Management keeps Ehrenreich and other employees under surveillance. They monitor the behaviors of the employees for any signs of theft, drug use, sluggishness, or anything that might be concerned worse. The managers and assistant managers are what some employees’ think are “class enemy”. Most of the management is former cooks or clerks that have crossed over to the other side. Ehrenreich views those former cooks that as “corporate as opposed to human”.
In Fitbit for Bosses written by Lynn Stuart Parramore she talks about how bosses want to start monitoring their employees. Parramore shows her discomfort with this idea. She thinks that “big money seems poised to trump privacy”(Parramore). Which basically just means that for bosses is that money is over everything even privacy. Allowing bosses to monitor their employees is dishonest and manipulating.Some researchers have also found out that increasing surveillance has caused the decrease of productivity. Researchers warned them that the data can have big errors and people that look at the data that the fitbits can cherry-pick the information that supports their beliefs and ditch the rest of the information that leads to racial profiling. “Surveillance makes everyone seem suspicious, creating perceptions and expectations of dishonesty.” Workers will become dehumanized“(Parramore), it prevents them from experimenting and exercising the creativity on the job.” A woman from California filed a suit against her former employer because he forced her to to install a tracking app on her phone. She had to have it on her phone 24/7 or else she would
NLRB has ruled the issue of surveillance camera should be covered under the list of mandatory bargaining during the collective bargaining process. The reason that this subject is included is because the existence of surveillance camera is considered a material change to the employee work environment. If employees know they are under constant surveillance may experience feelings of fear or anxiety. Even though the NLRB uphold the rights of employers to install camera to reduce theft and monitor employee misconduct, it also recognizes that this issues jeopardizes job security so it should be negotiated in good faith. Since bargaining in good faith does not require agreement then the fact that it is included as a mandatory subject does not mean that the employee cannot continue to use surveillance cameras. The issue of mandatory bargaining subjects is still a flexible issue regulated by the NLRA and the court system. Mandatory subjects during the collective bargaining process provide the framework to start the negotiation process between management and
...anization cannot ensure who use telecommuter computers and what happen in remote location. It's also too difficult to ensure telecommuter follows the Non-Disclosure Agreement. There is a way that IT department can use to prevent this from happening. They can control the remote computer settings, and monitoring employee perform on the computer. The deep Freze program can be used to prevent telecommuter to change computer settings. Other than that, keystroke recorder can monitor activity telecommuter so that they engaged with the company work. The last categories of technical support is communication and logistical support. For the communication, IT department responsible to provide support for telecommuters by operating communication and groupware tools for business such as e-mail, instant messaging, and chat room that provide means of communication.
The concept of formal surveillance mainly includes the methods used by the police to detect and deter crimes (Michel H. Tonry, 2000 in the handbook of crime & Punishment p.382). However, it can be extended to the use of CCTV camera, police patrols and alarms system (Welsh and Farrington, 2003). For the purpose of this study, focus will be on the use of CCTV cameras.
Cameras are a very popular device that can be found with a lot of frequency nowadays. Most of us own a camera, a laptop with a camera, a smartphone with a camera or some other object with a camera attached to it. Most of the population own cameras to capture memories, upload images of their whereabouts to social media but cameras can be a a very useful tool to capture very many things which is why several police departments have implemented cameras to their officers uniforms to use as a tool to capture evidence amongst other things.
Employee Monitoring: Is There Privacy in the Workplace? . (6/3/2004)
Sometimes there is no middle ground. Monitoring of employees at the workplace, either you side with the employees or you believe management owns the network and should call the shots. The purpose of this paper is to tackle whether monitoring an employee is an invasion of privacy. How new technology has made monitoring of employees by employers possible. The unfairness of computerized monitoring software used to watch employees. The employers desire to ensure that the times they are paying for to be spent in their service is indeed being spent that way. Why not to monitor employees, as well as tips on balancing privacy rights of employees at the job.
One type of surveillance is employee monitoring. Many employers monitor their workers’ activities for one reason or another. Companies monitor employees using many methods. They may use access panels that requires employees to identify themselves to control entry to various area in the building, allowing them to create a log of employee movements. They may also use software to monitor attendance and work hours. Additionally, many programs allows companies to monitor activities performed on work computers, inspect employee emails, log keystrokes, etc. An emerging methods of employee monitor also include social network and search engine monitoring. Employers can find out who their employees are associated with, as well as other potentially incriminating information. (Ciocchetti)
There are an estimated 30 million surveillance cameras in the United States, proving to be a normal feature in American lives (Vlahos). This is no surprise because in the past several years, events such as the 9/11 attack and the availability of cheaper cameras have accelerated this trend. But conflicts have come with this and have ignited, concerning the safety of the people versus the violation of privacy that surveillance has. Although camera surveillance systems are intended to provide safety to the public, the violation of privacy outweighs this, especially in a democratic country like America.
Transaction Cost or Agency theory is just one of many alternatives organizations have available as a way to control employees. The findings in this comparison of external and internal labor sources suggest that when a company is unsure of what their employee is doing, it is cheaper to use surveillance as a control tactic. If a company has general product that is not complicated, it may be more advantageous to outsource since control would not be as necessary. Many companies may use a combination of both internal and externalized labor, since risks may vary according to what is sold. If given the choice most of us would pick the internal labor side, because it is secure, dependable and predictable. Organizations must way the risks with control to decide the best way a job will get done with the minimal amount of employee control.
The following memorandum written by a director of a security and safety consulting service discusses a critical issue effecting business in our economy today, that of employee theft. "Our research indicated that, over past six years, no incident of employee theft have been reported within ten of the companies that have been our clients. In analyzing the security practices of these ten companies, we have further learned that each of them requires its employees to wear photo identification badges while at work. In the future, we should recommend the uses of such identification badges to all of our clients." The issue of employee theft is a broad problem and has different labels to identify it, shrinkage for the retail industry and hidden profit loss in the technology sector are serval examples of common terms used for employee theft. The author of this memorandum presents several data points and suggests one recommendation to effect the issue of employee theft based on a sampling of the client population.
For every technological introduction or advancement, there are consequences which come with it. This excludes not those that come with introduction of management information systems in companies. The modern society is entirely depended on information systems. Failure of these systems, today, can be declared as end of humanity. Worse enough is that there is a generational shift whereby future generations will not live without information systems that manage information. However, latest evaluations of the impact of management information systems have proven that there are chances, which are very high, of ethics being abused at the work place. Both the employees and the employers, are guarded by certain cord of ethics which aim at regulating the dignity of everybody at working place; and how far one party can be influential on the other especially on matters pertaining privacy. Profit making goals should not, by any means, overlook the importance of working ethics. This paper endeavors to explore areas of major concern where working ethics are likely to be compromised or have already been compromised at the working place due to institution of management information systems. Nevertheless, this research does not underscore the importance of these systems at the working place. The aim is to expose the negative impacts that might result from misuse of management information systems. These impacts can emanate from either party that forms part of the organization. In this case, mostly, it is either from the employee or the employer.