Whalen and Gates (2010), define monitoring differently in their article. They define it as a method and procedure of examining the workers in an organization and study their constant events intended to guarantee that together the protection of employees and requirements of the employer are met. Nearly all companies nowadays take videos of their employees, they read their emails and monitor their Web surfing. This can be done surreptitiously and some organizations are honest about it Chan et al. (2005).
Privacy is one of the most important things that are immensely fitting to be something of the past. In general companies are permitted to observe employee activities by the courts. Private companies have been setting rules in situations when employees are taken into service for instance contracts that affirm that they will be monitoring employees’ use of the Internet or any company tools (Chieh and Kleiner, 2003). Efforts have been made in arrangement for laws that protect business and the employees, regrettably most current court cases have been deceiving evidence in the eyes of the magistrates thus confidentiality or privacy laws have been unsuccessful for employees.
It has been recommended that government, big firms and industries and health care systems should have the capability to tape and study workers activities as it is a benefit to research and development for several years. Most legislation is the same opinion that laws should be set in place even though the breach of human rights forbid them from approaching the issue to a law level (Welebir and Kleiner, 2005). Sadly, comprehensible defenses of privacy opposed to security may never be evident from the view point of the law. Employers’ main apprehension is the decrease in productivity, virus attacks/ damaged equipment (i.e. computers), legal charges and loss of classifies data. Employees’ major worry is incursion of their privacy, mistreatment of control and precision in their work.
References: Ahmed, S.( 2007). Analysis of Workplace Surveillance In a Quest for an Ethical Stance. Journal of Business Systems, Governance and Ethics, Vol 2,No.4. Almeida, F. (2012).Web 2.0 Technologies and Social Networking Security Fears in Enterprises’’, International Journal of Advanced Computer Science and Applications,Vol.3, No.2, Amicus Guide http://www.amicustheunion.org/pdf/PrivacyatWork.pdf Arnesen, D.W and Weis, W.L.(2007) Chen, J.V and Park, Y.(2005) "The role of control and other factors in the electronic surveillance workplace", Journal of Information, Communication and Ethics in Society, Vol. 3 Iss: 2, pp.79 – 90. Cox, S; Goette, T. and Young, D.(2005). Workplace Surveillance and Employee Privacy: Implementing an Effective Computer Use Policy, Volume 5 Issue 2. Dubbeld, L. (2004) "Limits on surveillance: Frictions, fragilities and failures in the operation of camera surveillance", Journal of Information, Communication and Ethics in Society, Vol. 2 Iss: 1, pp.9 – 19. Guha, M.(2008)."The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets without Compromising Employee Privacy or Trust", Library Review, Vol. 57 Iss: 9, pp.746 – 747 Hechanova, R.M Kierkegaard, S.(2005). Privacy in Electronic Communication. Watch your e-mail: your boss is snooping. Computer Law & Security Report,”Vol. 21 Iss: 3, pp.226-236. Lee, S. and Kleiner, B.H.(2003). "Electronic surveillance in the workplace", Management Research News, Vol. 26 Iss: 2/3/4, pp.72 – 81. Mei-ShaChieh, C Petrovic-Lazarevic, S. and Sohal, A.S.(2004). "Nature of e-business ethical dilemmas", Information Management & Computer Security, Vol. 12 Iss: 2, pp.167 – 177. Rustad, M.L. and Paulsson, S.R. (2005). Monitoring Employee e-mail and Internet Usage: Avoiding the Omniscient. Electronic Sweatshop: Insights from Europe. U. Pa. Journal of LaborAnd Employment Law, Vol. 7:4. Saunders, M., Lewis, P, and Thornhill A. (2006) Research Methods for Business students.4th edition .UK: Prentice Hall. Strategic Direction.(2009) "Social networking and the workplace: Making the most of web 2.0 technologies",Vol. 25 Iss: 8, pp.20 – 23. The Register.(2000). Xerox fires 40 in porn site clampdown.Document Company staffs get caught shuffling more than just paper. Trim, P.R.J.(2005). "Managing computer security issues: preventing and limiting future threats and disasters", Disaster Prevention and Management, Vol. 14 Iss: 4, pp.493 – 505 Vorvoreanu,M http://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2001-32.pdf Warren, A.(2002) "Right to privacy? The protection of personal data in UK public organisations", New Library World, Vol Warren, M.J.(2002). "Security practice: survey evidence from three countries", Logistics Information Management, Vol. 15 Iss: 5/6, pp.347 – 35. Watson, G. (2002)."E-mail surveillance in the UK workplace-a management consulting case study", Aslib Proceedings, Vol. 54 Iss: 1 pp. 23 – 40. Welebir, B. and Kleiner,B.H.(2005),"How to write a proper Internet usage policy", Journal of Management ResearchNews, Vol. 28 Iss: 2 pp. 80 – 87. Whalen, T. and Gates, C.(2010),"Watching the watchers: "voluntary monitoring" of infosec employees", Journal of Information Management & Computer Security, Vol. 18 Iss: 1 pp.14 – 25. Moghe, V. (2003) "Privacy management – a new era in the Australian business environment", Journal of Information Management & Computer Security, Vol. 11 Iss: 2, pp.60 – 66 Ying-Tzu Lu, Brian H Jardine-Tweedie, L. and Phillip C. Wright, (1998) "Workplace drug testing: avoiding the testing addiction", Journal of Managerial Psychology, Vol. 13 Iss: 8, pp.534 – 543 Chan, M; Woon, I Chieh, C.M. and Kleiner, B.H. (2003), "How organisations manage the issue of employee privacy today", Journal of Management Research News, Vol. 26 Iss: 2 pp. 82 – 88 Bibliography Gritzalis, S. (2004). "Enhancing Web privacy and anonymity in the digital era", Journal of Information Management & Computer Security, Vol. 12 Iss: 3, pp.255 – 287. Griffiths, M. (2010),"Internet abuse and internet addiction in the workplace", Journal of Workplace Learning, Vol. 22 Iss: 7 pp. 463 - 472 Morgan, C Jardine-Tweedie, L. and Phillip C. Wright, (1998) "Workplace drug testing: avoiding the testing addiction", Journal of Managerial Psychology, Vol. 13 Iss: 8, pp.534 - 543 Appendices