2007
DOI: 10.1177/0893318907306033
|View full text |Cite
|
Sign up to set email alerts
|

Workplace Surveillance and Managing Privacy Boundaries

Abstract: According to communication privacy management (CPM) theory, people manage the boundaries around information that they seek to keep private. How does this theory apply when employees are monitored electronically? Using data from 154 face-to-face interviews with employees from a range of organizations, the authors identified various ways organizations, employees, and coworkers describe electronic surveillance and the privacy expectations, boundaries, and turbulence that arise. Privacy boundaries are established … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
60
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 109 publications
(61 citation statements)
references
References 35 publications
1
60
0
Order By: Relevance
“…A co-worker's attempt to be a part of a colleague's Facebook collective boundary might cause a form of turbulence for the working professional if the request is seen as privacy invasion or a surveillance attempt (Agre, 1994;Allen et al, 2007;Petronio, 1994). Facebook users can avert breakdowns in the management of their private information through adapting their privacy rules in light of evolving concerns .…”
Section: Working Professionals' Facebook Use and Privacy Management Pmentioning
confidence: 98%
See 3 more Smart Citations
“…A co-worker's attempt to be a part of a colleague's Facebook collective boundary might cause a form of turbulence for the working professional if the request is seen as privacy invasion or a surveillance attempt (Agre, 1994;Allen et al, 2007;Petronio, 1994). Facebook users can avert breakdowns in the management of their private information through adapting their privacy rules in light of evolving concerns .…”
Section: Working Professionals' Facebook Use and Privacy Management Pmentioning
confidence: 98%
“…For example, IBM provides employees laptops and adopts policies supportive of utilizing instant messenger technology for greater colleague interactions and information sharing practices (DiMicco et al, 2008). Other organizations engage in heavy surveillance of technology use by organizational members and deter co-worker communication and interaction through technology among its members (Allen et al, 2007;Stanton & Stam, 2003). CPM theory suggests that an organization's values socialized among members about open co-worker communication may influence the degree to which individuals think, feel and act toward coworker social media connections.…”
Section: Organizational Privacy Norms and Co-worker Facebook Friend Rmentioning
confidence: 98%
See 2 more Smart Citations
“…According to Allen et al [2007], Sewell and Barker [2006], Petronio [2002], surveillance is more accepted in the USA than in Germany and Great Britain for instance. One can also wonder if resistance to new IT technologies and surveillance is mainly due to resistance to new technologies or to lack of trust in their hierarchy.…”
Section: On Ethical Aspects and User-acceptancementioning
confidence: 99%