2009
DOI: 10.1007/s10676-009-9208-8
|View full text |Cite
|
Sign up to set email alerts
|

Securing privacy at work: the importance of contextualized consent

Abstract: The starting point of this article is that employees' chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of jobapplicants that they negotiate their privacy interests in employmen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 14 publications
0
19
0
Order By: Relevance
“…Furthermore, when subjected to observation and control, Palm (, 235) believes, individuals fail to act in concert with their true selves and at the expense of personal integrity. Rather than behave in accordance with their values and convictions, they engage in adaptive behaviors such as a “manufactured” self, anticipatory conformity, and self‐subordination, unworthy of ethical treatment (Brown ; Rosenberg , 142, 148).…”
Section: Virtue‐based Analysismentioning
confidence: 99%
“…Furthermore, when subjected to observation and control, Palm (, 235) believes, individuals fail to act in concert with their true selves and at the expense of personal integrity. Rather than behave in accordance with their values and convictions, they engage in adaptive behaviors such as a “manufactured” self, anticipatory conformity, and self‐subordination, unworthy of ethical treatment (Brown ; Rosenberg , 142, 148).…”
Section: Virtue‐based Analysismentioning
confidence: 99%
“…Eschenfelder, Glenn Howard, and Desai () have focused on Rawls's conception of civil disobedience in order to discuss practices of digital rights management software circumvention. Palm () has used the idea of just background conditions in order to normatively assess workplace surveillance practices. Finally, Rawls's idea of an overlapping consensus has also figured into discussions of ethics, information, and technology—van de Poel and Zwart () apply it in the context of research and development (R&D) whereas Hausmanninger () and Søraker () draw on it in normative discussions of the Internet (though they arrive at different conclusions).…”
Section: Applications Of Rawls To Information and Technology: Overviewmentioning
confidence: 99%
“…Privacy at the workplace has received a great deal of attention, especially with regard to the ethical challenges that arise from surveillance (Palm, ), drug testing (Persson & Hansson, ), genetic screening (DeCew, ), and background checks (Alder, Schminke, & Noel, ). However, working contracts necessarily involve restrictions on privacy, which are usually considered a matter of course rather than restrictions.…”
Section: The Trade Of Privacy and Its Limitsmentioning
confidence: 99%