2006
DOI: 10.1348/096317905x52607
|View full text |Cite
|
Sign up to set email alerts
|

Examining employee compliance with organizational surveillance and monitoring

Abstract: Although the prevalence of employee monitoring and surveillance technologies (MSTs; e.g. e‐mail monitoring) is increasing, very little research has explored the question of whether employees simply accept these systems (compliance) or enact strategies for thwarting them (resistance). In the present study, we proposed a framework based on the theory of planned behaviour and ethical decision making research to predict employees' MST compliance and resistance intentions. We proposed that organizational commitment… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
66
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(67 citation statements)
references
References 53 publications
1
66
0
Order By: Relevance
“…Control  Provides the observer a sense of security or protection (Ball, 2010) in knowing that the interests of the observer are guarded through compliance with observer's expectations (Spitzmuller & Stanton, 2006).…”
Section: Process Visibilitymentioning
confidence: 99%
“…Control  Provides the observer a sense of security or protection (Ball, 2010) in knowing that the interests of the observer are guarded through compliance with observer's expectations (Spitzmuller & Stanton, 2006).…”
Section: Process Visibilitymentioning
confidence: 99%
“…Herath (2008), for example, used the theory of planned behavior as one component in the development of integrated protection, motivation, and deterrence model of IT security policy compliance (p. xiii). Spitzmuller and Stanton (2006) used the theory as part of a framework for predicting compliance and resistance to monitoring and surveillance technologies, such as e-mail monitoring.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
“…The TPB has been used in several studies to explain compliance or resistance by employees to adhere to security policies (Booker & Kitchens, 2010;Booker, Rebman, & Kitchens, 2009;Bulgurcu, Cavusoglu, & Benbasat, 2010;Dinev & Hu, 2007;Herath & Rao, 2009). Because the majority of research on teleworkers and data security have been conducted on federal agencies, several case studies that examined problems of security in federal agencies will be reviewed (Baginsky, 2004;Denscombe, 2001;Farmer, 2005;Gross, 2008;Hayes, 2008;Hines, 2007;Maier & Sametinger, 2004;Regan, 2003;Spitzmuller & Stanton, 2006;Thibodeau, 2007;Vijayan, 2009). …”
Section: Research Review and Synthesismentioning
confidence: 99%
See 2 more Smart Citations