版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
Chapter07-EthicalDecision-Making:TechnologyandPrivacyintheWorkplace
PAGE
Copyright?McGraw-HillEducation.Allrightsreserved.NoreproductionordistributionwithoutthepriorwrittenconsentofMcGraw-HillEducation.
IMChapter7:
EthicalDecision-Making:TechnologyandPrivacyintheWorkplace
ChapterObjectives
Afterreadingthischapter,youshouldbeableto:
Explainanddistinguishthetwodefinitionsofprivacy.
Describetheethicalsourcesofprivacyasafundamentalvalue.
Identifythelegalsourcesofprivacyprotection,includingtheconceptofa“reasonableexpectationofprivacy.”
Discussrecentdevelopmentinconnectionwithemployeemonitoring.
Identifyandexplaintherisksinvolvedinafailuretounderstandtheimplicationsoftechnologyanditsuse.
Enumeratethereasonswhyemployerschoosetomonitoremployees’work.
Discusstheethicsofmonitoringasitappliestodrugtesting.
Discusstheethicsofmonitoringasitappliestopolygraphs,genetictesting,andotherformsofsurveillance.
Explaintheinterestsofanemployerinregulatinganemployee’sactivitiesoutsideofwork.
Discusstheimplicationsofworldevents,likerecentimmigrationpolicychanges,onbusinessdecisionsaboutprivacy.
OpeningDecisionPoint
BeingSmartAboutSmartphones
ThisDecisionPointchallengesstudentstoimaginethemselvesinthepositionofanemployeewhousesasmartphonetotakenotesduringameetingwithanimportantclient.Theclient’sCFOispresentatthemeetingandmisinterpretsthisbehavior,assumingthattheemployeeis“fiddlingaroundwiththeirphone.”TheCFOcomplainstotheemployee’ssupervisor.Whileinthesupervisor’sofficetodiscusstheproblem,theemployee’sphonevibrateswithacallfromanotherimportantclient.Theclientdoesnotliketobekeptwaitingandtheemployeeisawarethatafterthreevibratingalerts,thephoneissettoring.
Studentsareaskedtoidentifyasmanyethicalissuesraisedbytheuseofsmartphonesintheworkplaceastheycan,thenconsiderthefollowingquestions:
Pleaselistasmanyethicalissuesasyoucanidentifythatareraisedbytheuseofsmartphonesintheworkplace.
Didyoudoanythingwrongthismorninginthemeeting?
Recallthat,clearly,yourclientwasoffended.Atwhatpointdoesimpolitebehavior—forinstance,actionsthatmightoffendothers,suchasansweringe-mailsduringameetingorevenplayinggames—crossthelineintounethicalbehavior?
Whattypeofpolicywouldyousuggestforanorganizationregardingtheuseofsmartphonesintheworkplace,ifany?
Shouldtherulesbedifferentforusingsmartphonesduringin-housemeetings,ononehand,andduringmeetingswithclientsorsuppliers,ontheother?
Howmightyouhaveacteddifferentlyduringthemeetingdescribedheretohaveachievedadifferentresultwithyourclient?
Whatareyouabouttosaytoyourboss?
Introduction
FlatWorld:ThomasFriedman’sbook,TheWorldisFlat,describesthehasteningpaceofglobalizationandhowsignificantlythebusiness,economicandpoliticallandscapehaschangedinjustthefirstdecadeofthe21stcentury.
Theimageofa“flatworld”isusedtoconveytheideathatdistance,time,geography,andnationalboundariesnolongercreateartificialbarrierstobusinessandtrade.
Infact,9ofthe10forcesthatFriedmanidentifiesascreatingthisflatworldarethedirectresultofcomputerandInternet-relatedtechnologies.
Reference:RealityCheck“PrivacyoftheFuture-Itisnow!”
GlobalBusinessWorld:Thetechnicalrevolutionisnodoubtlargelyresponsiblefortoday’sglobaleconomy,thoughitcomeswithchallengesliketheimpactofemployeeandconsumerprivacy.
Privacy:Privacyissuesintheworkplaceraiseethicalissuesinvolvingindividualrightsaswellasthoseinvolvingutilitarianconsequences.
Workplaceprivacyissuesevokeaninherentconflictbetweentherightsofemployerstoprotecttheirinterests,andtherightsofemployeestobefreefromwrongfulintrusionsintotheirpersonalaffairs.
Conflictscanariseintheworkplaceenvironmentthroughtheregulationofpersonaactivitiesorpersonalchoices,orthroughvariousformsofmonitoring.
Monitoring:Contrastingutilitarianargumentscanbeofferedontheethicsofmonitoringemployees.
TheRighttoPrivacy
ProtectionofPrivacyRights:Withthetremendousincreaseincomputertechnologyinrecentdecades,callsforgreaterprotectionofprivacyrightshaveincreased.
Thereiswidespreadconfusionconcerningthenature,extent,andvalueofprivacy.
SomeWesterncountriesdonotacknowledgealegalrighttoprivacyasitisrecognizedintheUnitedStates(thoughrecallthattheU.S.Constitutionmakesnoexplicitmentionoftherighttoprivacy),whileothersseemfarmoresophisticatedintheircentralizedandconsistentapproachestopersonalprivacyissues.
DefiningPrivacy:
*ChapterObjective1AddressedBelow*
Twogeneralandconnectedunderstandingsofprivacyare:
Privacyasarighttobe“l(fā)eftalone”withinapersonalzoneofsolitude.
Privacyastherighttocontrolinformationaboutoneself.
Privacyisimportantbecauseitestablishestheboundarybetweenindividualsandtherebyservestodefineone’sindividuality.
Therighttocontrolcertainextremelypersonaldecisionsandinformationhelpsdeterminethekindofpersonweareandthepersonwebecome.
ConflictingBeliefsaboutPrivacy:
Manypeoplebelievethatarighttobeletaloneismuchtoobroadtoberecognizedasamoralright.(i.e.employeesataworkplacearenotgoingtobeleftalone)
Othershaveconcludedthatabetterunderstandingfocusesonprivacyasinvolvingthecontrolofpersonalinformation.
Fromthisperspective,theclearestcaseofaninvasionofprivacyoccurswhenotherscometoknowpersonalinformationaboutus,aswhenastrangerreadsyoure-mailoreavesdropsonapersonalconversation.
Yet,theclaimthatarightofprivacyimpliesarighttocontrolallpersonainformationmightalsobetoobroad.
PhilosophicalArgument:PhilosopherGeorgeBrenkerthasarguedthattheinformationalsenseofprivacyinvolvesarelationshipbetweentwoparties,AandB,andpersonalinformationXaboutA.
PrivacyisonlyviolatedwhenBcomestoknowXandnorelationshipexistsbetweenAandBthatwouldjustifyBknowingX.
Limitingaccessofpersonalinformationonlytothosewithwhomonehasapersonalrelationshipisoneimportantwaytopreserveone’sownpersonalintegrityandindividuality.
Itisperhapsthatchoiceoflimitationorcontrolthatisthesourceofone’ssenseofprivacy.
**TeachingNote:Todrivehometherelevanceofprivacytotoday’sstudents,sometimesitisimportanttofindtopicsonwhichtheyfeelvulnerable.Oneofthosetopicsmightbehowlongsomethingcanfollowthemintothefuture.Considerdiscussingwhetherauniversityshouldidentifythereasonbehindadismissal(expulsion)ofastudentifitwasforacademicintegrityreasons.Shouldauniversitydisclosethisinformationonthestudent’stranscriptsuchthatitwouldfollowherorhimtherestoftheirlives?
EthicalSourcesofaRighttoPrivacy:
*ChapterObjective2DiscussedBelow*
SocialContract:Therighttoprivacyisfoundedintheindividual’sfundamental,universalrighttoautonomy.Thisrightisrestricted,byasocialcontractinourculturethatpreventsusfrominfringingonsomeoneelse’srighttoherorhispersonalautonomy.
PhilosopherPatriciaWerhanedescribesthisboundaryasa“reciprocalobligation”;thatis,foranindividualtoexpectrespectforherorhispersonalautonomy,thatindividualhasareciprocalobligationtorespecttheautonomyofothers.
Appliedtotheworkplace:reciprocalobligationimpliesthat,whileanemployeehasanobligationtorespectthegoalsandpropertyoftheemployer,theemployerhasreciprocalobligationtorespecttherightsoftheemployeeaswell,includingtheemployee’srighttoprivacy.
Kantlinksthemoralworthofindividualsto“thesupremevalueoftheirrationalcapacitiesfornormativeself-determination”andconsidersprivacyacategoricalmoralimperative.
Hypernorms:EthicistsThomasDonaldsonandThomasDunfeehavedevelopedanapproachtoethicalanalysisthatseekstodifferentiatebetweenthosevaluesthatarefundamentalacrosscultureandtheory,“hypernorms,”andthosevaluesthataredeterminedwithin“moralfreespace”andthatarenothypernorms.
Theyproposethatwelooktotheconvergenceofreligious,cultural,andphilosophicalbeliefsaroundcertaincoreprinciplesasacluetotheidentificationofhypernorms.(Examples:therighttopersonalfreedom,therighttoinformedconsent)
Individualprivacyisatthecoreofmanyofthesebasicminimalrightsandisanecessaryprerequisitetomanyofthem.Ultimately,thefailuretoprotectprivacymayleadtoaninabilitytoprotectpersonalfreedomandautonomy.
AdiscussionofprivacyinthecontextoflibertyandautonomymaybejustNorth-Americanbased.AEuropeanfoundationwouldbebasedontheprotectionofhumandignity.
*Reference:RealityCheck“Privacy:EuropeComparedtotheUnitedStates”
PropertyRights:Legalanalysisofprivacyusingapropertyrightsperspectiveyieldsinsightintopersonalfreedomsandrights.
“Property”isanindividual’slifeandallnonprocreativederivatives,suchasthoughts,ideasandpersonalinformation,ofherorhislife.
Theconceptofpropertyrightsinvolvesadeterminationofwhomaintainscontrolovertangiblesandintangibles,includingpersonalinformation.
Propertyrightsrelatingtopersonalinformationthusdefineactionsthatindividualscantakeinrelationtootherindividualsregardingtheirpersonalinformation.
Privatepropertyrightsdependupontheexistenceandenforcementofasetofrulesthatdefinewhohasarighttoundertakewhichactivitiesontheirowninitiativeandhowthereturnsfromthoseactivitieswillbeallocated.
LegalSourcesofaRighttoPrivacyintheUnitedStates:
*ChapterObjective3AddressedBelow*
Thelawhasnotyetcaughtupwiththetechnologyinvolvedinemployeeprivacy.Asaresult,thisisoneareawheresimplyobeyingthelawmayfallfarshortofresponsiblemanagementpractice.(i.e.Whilethelawmaybeveryclearwithregardtotappingaworker’stelephone,itislessclearwithmonitoringaworker’se-mailortextmessagesonahandhelddevice)
PrivacycanbelegallyprotectedintheUnitedStatesinthreeways:bytheconstitution(federalorstate),byfederaland/orstatestatutes,andbythecommonlaw.
Commonlawreferstothebodyoflawcomprisedofthedecisionhandeddownbycourts,ratherthanspecifiedinanyparticularstatutesorregulations.
TheU.S.Constitution’sFourthAmendmentprotectionagainstanunreasonablesearchandseizuregovernsonlythepublicsectorworkplacebecausetheConstitutionappliesonlytostateaction.Therefore,unlesstheemployeristhegovernmentorotherrepresentativeofthestate,theConstitutiongenerallywillnotapply.
Statutesalsoofferlittle,ifany,protectionfromworkplaceintrusions.
TheElectronicCommunicationsPrivacyActof1986(ECPA)prohibitsthe"interception"orunauthorizedaccessofstoredcommunications.
Thecourtshaverulethat“interception”appliesonlytomessagesintransitandnottomessagesthathaveactuallyreachedcompanycomputers.ThereforetheimpactofECPAistopunishelectronicmonitoringonlybythirdpartiesandnotbyemployers.
TheECPAallowsinterceptionwhereconsenthasbeengranted.AfirmthatsecuresemployeeconsenttomonitoringatthetimeofhireisimmunefromECPAliability.
*Reference:“RealityCheck–EyesintheSky”*
Somestatesrelyonstatutoryprotectionsratherthancommonlaw.Othersprovideconstitutionalrecognitionandprotectionofprivacyrights.
InallstatesexceptCalifornia,applicationofthisprovisiontoprivatesectororganizationsislimited,uncertain,ornotincludedatall.
“Intrusionintoseclusion”isaninvasionofprivacylegalviolationoccurswhensomeoneintentionallyintrudesontheprivateaffairsofanotherwhentheintrusionwouldbe“highlyoffensivetoareasonableperson.”
EXAMPLE:InCityofOntariov.Quon(2010),theU.S.SupremeCourtaddressedtheissueofemployermonitoringforthefirsttime.
TwoCaliforniapoliceofficersweredisciplinedafteranauditoftextmessagesoncity-issuesdevicesfoundthatmanyoftheofficers'textswerepersonalinnature.Thoughtheofficershadbeenassuredbytheirsupervisorthatanauditwouldnotbeperformed,theCourtdeterminedthattheauditwaspermissiblenonethelessbecausethereviewofthemessageswasreasonably"work-related."
However,relyingontheQuoncaseasprecedentforprotectioninregardstoelectronicsurveillanceofemployeesisadouble-edgedsword.
UndertheQuonprecedent,howmuchprotectionforelectroniccommunicationstheFourthAmendmentwillprovidetoemployeesremainsunclear.
Aswell,thoseprotectionsdonotextendtotheprivatesector.RememberthattheemployerinQuonwasagovernmentagency.
Inasubsequentcase,Rileyv.California,theU.S.SupremeCourtunanimouslyfoundexplicitprotectionundertheFourthAmendmentofcellphonesandothersimilardevices.
Employersmaywishtoconsidermorecarefullythenatureandextentofsearchestheymayconductonthesedevices,butalsowhethertheirpoliciesaredraftedclearlyenoughtoalertemployeesofthepotentialscopeofsuchsearchesandthelevelofprivacyemployeescanexpect.
Notice:ManyrecentU.S.courtprivacydecisionsseemtodependonwhethertheworkerhadnoticethatthemonitoringmightoccur.
Anemployee’slegitimateandreasonableexpectationofprivacyisthebasisforfindinganinvasionofprivacy.Ifanemployeehasactualnotice,thentheretrulyisnorealexpectationofprivacy.
ThisconclusionwassupportedinK-Martv.Trotti,wherethecourtheldthatsearchofanemployee’scompany-ownedlockerwasunlawfulinvasionsincetheemployeeusedhisownlock.However,inSmythv.Pillsbury,thecourtheldthatmonitoringisallowedevenwhenafirmpromisednottomonitor.
Evidenceoftheimpactofthisdecisionisthefactthatonlytwostates,ConnecticutandDelaware,requireemployerstonotifyworkerswhentheyarebeingmonitored.
Increasingly,however,statesareenactinglawstolimitemployermonitoringpowers.Asof2018,26states(plusGuam)prohibitemployersfromobtainingsocialmediapasswordsfromprospectiveorcurrentemployees.
*ReferenceTable7.1Here*
GlobalApplications:TheunpredictableregimeofprivacyprotectionisallthemoreproblematictomaintainwhenoneconsiderstheimplicationsoftheEuropeanUnion’sGeneralDataProtectionRegulation(GDPR).
TheGDPRprovidesthatpersonalinformationcannotbecollectednorsharedbycompanieswithoutindividuals’permission.Informationaboutwhoisusingthedataandforwhatpurposeitisbeingcollectedmustbeprovidedinaclear,easilyunderstandablemanner.Further,consumershavetherighttoreviewthedata,correctinaccuraciesandrequestthattheybeerased.
Allcompanies–regardlessoftheirsizeorlocation–arerequiredtocomplywithGDPRiftheyofferfreeorpaidgoodsorservicestoEUresidentsandcollecttheconsumer'spersonalinformation.(i.e.evensmallcompaniesbasedintheU.S.canstillbesubjecttothislaw)
TheEuropeanUniondoesnotallowthetransferofdataonitscitizensoutsideofthecountryunlessthecountryisdeemedtohaveadequatedataprivacylaws.Unfortunately,theEUhasdeemedthattheUSdoesnothaveadequatedataprivacylaws,butorganizationscannavigatethisbyadheringsomethingcalledthe"PrivacyShield.Underthisagreement,U.S.companiesmustadheretoadetailedsetofstandards,whichsurpasswhatU.S.lawtypicallyrequires.
*Reference:Table7.2here*
LegalUncertainty:Ethicsisperhapstheonlysourceofananswertothelegaluncertaintyorinstabilityconcerningthechallengingareasofinformationgathering.
BusinessImplications:Whataretheimplicationsofthisunderstandingofprivacyforbusinessesandforbusinessethicsanalysis?
Onewouldarguethatpersonalinformationshouldremainprivateunlessarelationshipexistsbetweenthebusinessandtheindividualthatlegitimatescollectingandusingpersonalinformationaboutthatindividual.
Thenatureoftheemploymentrelationshiphelpsdeterminetheappropriateboundarybetweenemployersandemployeesandthereforetheinformationthatoughttoremainrightfullyprivatewithintheworkplace.
Ifweadoptsomethinglikeacontractualmodelofemployment,wheretheconditionsandtermsofemploymentaresubjecttothemutualandinformedconsentofbothparties,thenemployeeconsentwouldbecomeonemajorconditiononwhatinformationemployerscancollect.
Employeeprivacyisviolatedwhenever:
Employersinfringeuponpersonaldecisionthatarenotrelevanttotheemploymentcontract(whetherthecontractisimpliedorexplicit)
Personalinformationthatisnotrelevanttothatcontractiscollected,stored,orusedwithouttheinformedconsentoftheemployee.
Theburdenofproof:restsontheemployertoestablishtherelevancyofpersonaldecisionsandinformationatissue.
DecisionPoint
InquiringEmployersWanttoKnow
ThisDecisionPointaddressestheboundariesofprivacywithinanemploymentapplication.Thefollowinginformationissometimesrequestedonstandardemploymentapplications,thoughcandidatesmightconsidersomeofittobeprivateorpersonal.Whichofthefollowingitemsaboutanemployeemightanemployerhavealegitimateclaimtoknow,andwhy?Whatinformationmightleadtounreasonableintrusionsordiscriminatorypractices,andwhy?
Ajobapplicant’ssocialsecuritynumber
Anapplicant’sarrestrecord
Anemployee’smedicalrecords
Anemployee’smaritalstatus
Whetherajobapplicantsmokes
Anemployee’spoliticalaffiliation
Anemployee’ssexualorientation
Anemployee’screditrating
Anemployee’spriorsalary
Studentsshouldconsiderthefollowingquestionsintheirassessmentofthisscenario:
Whatfactsarerelevanttoyourdecisions?
Whatwouldtheconsequencesbeofrefusingtoansweranyquestionsonanemploymentapplication?
Areyoubasingyourdecisiononparticularrightsoftheemployeeortheemployer?
Aretherepeopleotherthantheemployerandemployeewhomighthaveastakeinwhatinformationisreleasedtoemployers?
LinkingtheValueofPrivacytotheEthicalImplicationsofTechnology
ChallengingPrivacy:Theadventofnewtechnologychallengesprivacyinwayswecouldneverbeforeimagine.Considertheimplicationstechnologyhasfor:
Employeeandemployerexpectationsregardingtheuseoftime.
Thedistinctionbetweenworkuseandpersonaluseoftechnology.
Theprotectionofproprietaryinformation.
Performancemanagement.
Privacyinterests.
Accessibilityissuesrelatedtothedigitaldivide.
IncreasedOpportunitiesandChallenges:
Technologyallowsforin-homeoffices,raisingextraordinaryopportunitiesaswellaschallenges,issuesofsafety,andprivacyconcerns.
Becausetechnologyallowseachofustobemoreproductive,itprovidesusbenefitsandallowsemployerstoaskmoreofeachemployee.
Advancesintechnologyseemtoblurboundariesbetweenleisureandworktime,aswellasbetweenourplacesofworkandourhomes.
ValueJudgments:Newtechnologydoesnotnecessarilyimpactourvaluejudgmentsbutinsteadsimplyprovidesnewwaystogathertheinformationonwhichtobasethem.
ConsidertheattacksofSeptember11,2001,onaU.S.employer’sdecisiontosharepersonalemployeeinformationorcustomerinformationwithlawenforcement.Privatefirmsmaybemorewilling,orlesswilling,todaytoshareprivateinformationthantheywouldhavebeenpreviously.
NewTechnologyMeansNewChallenges:Firmsoftenexperience,andfindthemselvesill-preparedfor,unanticipatedchallengesstemmingfromnewtechnology.
EXAMPLE:AnemployeeatPhoneDog,acompanythatprovidesmobiledevicenewsandreviews,createdawork-relatedTwitteraccountthatamassed17,000followers.Whenheleftthecompany,hekeptcontroloftheaccountanduseditashispersonalaccount.Thecompanysued,buttheemployeeclaimedthattheaccountbelongedtohim.Thecaseisongoing,butregardlessoftheoutcome,itillustratesthedangersoffailingtoestablishclearpoliciesgoverningtheusenewtechnologiesastheyariseintheworkplace.
NewEthicsforaNewEconomy?
Thesamevaluesoneheldunderpreviouscircumstances,iftheyaretrueandjustified,shouldpermeateandrelatetolatercircumstances.
Perspectivesareimpactedbytheunderstandinganduseofnewtechnology.
Aneconomist,AntonioArgandona,cautionsaboutthechangeinvaluesthatmaybecausedbyopportunitiescreatedbytechnology,buthealsopointstothegoodthatnewtechnologycoulddo,includingdevelopingdepressedareas,defendinghumanrights,andincreasingcitizenshipparticipation.
InformationandPrivacy:
Businessesneedtobeabletoanticipatetheperceptionsofitsstakeholdersinordertobeabletomakethemosteffectivedecisionsforitslong-termsustainability.Newtechnologycanbeconfusingforthepublicsoithelpstoplanaheadfortechnologicalchanges.
Trustisthekeyissuewiththeintroductionofnewtechnology.
EXAMPLE:ThemottoatGoogle,theInternet-basedsearchengine,is“don’tbeevil”(originallyusedasitscoremotto,nowretainedasthelastsentenceofitsCodeofConduct).Thecompanyissensitivetostakeholderconcernsasitdevelopsnewtechnology(suchasachoicenottoallowgunads.)
Whenconsumersrelyontechnologyprovidedbyabusiness,theymighteasilyassumethatthebusinesswillrespecttheirprivacy.Theywouldliketobelievethatthoseresponsibleforthetechnologyare,themselves,accountabletotheuser.
*ReferenceDecisionPoint:“TechnologyDilemmas”
DecisionPoint
TechnologyDilemmas
ThisDecisionPointaddressesquestionsaboutusingtechnologyfor“good”or“evil”raisedbyananonymousWebpostingbyanemployeewhohasbeendirectedbymanagementtouseacomputerprogramtospyonacolleague.Theemployeeseeksgeneralthoughtsandadviceregardinglegalprotectionagainstliabilityforfollowingthisdirective.
Studentsshouldconsiderthefollowingquestionsinassessingthisscenario:
Whatarethekeyfactsrelevanttoyourresponse?
Whatistheethicalissueinvolvedinpeerspyingintheworkplace?
Whoarethestakeholders?
Whatalternativeswouldyousuggesttothisindividual,andwhatalternativesexistforemployerswhowishtogatherinformationaboutemployeessurreptitiously?
Howdothealternativescompare;howdothealternativesaffectthestakeholders?
ShouldMoralRequirementsBeImposed?
EconomistAntonioArgandonacontendsthatifnewtechnologyisdependentonandhasasitssubstanceinformationanddata,thensignificantmoralrequirementsshouldbeimposedonthatinformation.Hesuggeststhefollowingnecessaryelements:
Truthfulnessandaccuracy:Thepersonprovidingtheinformationmustensurethatitistruthfulandaccurate,atleasttoareasonabledegree.
Respectforprivacy:Thepersonreceivingoraccumulatinginformationmusttakeintoaccounttheethicallimitsofindividuals’(andorganizations’)privacy.Thiswouldincludeissuesrelatingtocompanysecrets,espionage,andintelligencegathering.
Respectforpropertyandsafetyrights:Areasofpotentialvulnerability,includingnetworksecurity,sabotage,theftofinformationandimpersonation,areenhancedandmustthereforebeprotected.
Accountability:Technologyallowsforgreateranonymityanddistance,requiringaconcurrentincreasedexigencyforpersonalresponsibilityandaccountability.
Howmightfirmsrespondtothiscallforresponsibilityinthedevelopment,manufacture,marketingandservicerelatedtonewproductionorothercorporateactivities?Whatethicalissuesdoesthisproposalraise?
ManagingEmployeesthroughMonitoring
*ChapterObjective4AddressedBelow*
MonitoringintheWorkplace:Oneofthemostprevalentformsofinformationgatheringintheworkplaceisemployermonitoringofemployees’work;andtechnologyhasaffordedemployersenormousabilitiestodothiseffectivelyatlowcosts.
DATA:Accordingtoonesurvey,88percentofemployeesusesocialmediaatleastonceduringtheworkdayand18percentcheckmorethan10timeseachday.
DATA:Thereisanincreasingtrendwithinmid-tolarge-sizedU.S.firmswithregardtoemployeee-mailandinternetmonitoring.
AsurveyconductedbytheAmericanAcademyofManagementfoundthatnearly80percentoflargecompaniesmonitortheiremployees’useofemail,internet,andphone.Thatnumberrisesto90percentforfirmsinparticularlysensitiveindustries.
Productivityisaprimaryconcernforemployerswhofeeltheiremployeesbringtoomuchoftheirpersonallivestotheworkplace.OneCareerBsurveyfoundthat41percentofworkersnamed"theInternet"asthelargestproductivitykilleratwork,while37percentnamed"socialmedia.
Employeemonitoringhasevencrossedthethresholdfromcomputerusetobodyautonomy.
Biotrackingtechnologyallowemployerstorecordthenumberofstepsthatemployeestakesinaday,theirheartrate,whattheyeatanddrink,howmuchsleeptheygetand
eventheirhormonelevels.Theinformationgatheredfromthistechnologyoftenisincorporatedintoemployeewellnessprograms.Oneemployerhasevenbeguntestingtrackingimplantsinemployees.
*ChapterObjective5AddressedBelow*
HiddenEthicalIssues:Manyoftheethicalissuesthatariseintheareaofmanaginginformationarenotreadilyvisible.
Whenwedonotcompletelyunderstandthetechnology,wemightnotunderstandtheethicalimplicationsofourdecisionsandwearenotableeffectivelytoprotectourowninformation.
Whenwemistakenlybelievethatnooneiswatching,wemayengageinactivitiesthatwewouldotherwiserefrainfromdoing,suchasdeletingane-mailmessagethatwedonotwantanyonetoread.
Aknowledgegapexistsbetweenpeoplewhounderstandthetechnologyandotherswhoareunabletoprotectthemselvesbecausetheydonotunderstand.
Access:Technologyallowsforaccesstoinformationthatwasneverbeforepossible.
Accesscantakeplaceunintentionally,suchasasupervisordiscoveringpersonalinformationduringaroutinebackgroundcheck.
Technologyallowsustoworkfromalmostanywhereontheplanet,sowea
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024年張李合作創(chuàng)業(yè)協(xié)議版
- 2024年房產(chǎn)交易居間服務(wù)個人協(xié)議版
- 個人簡易抵押合同模板
- 2024年供應(yīng)商合作型集中采購協(xié)議版
- 租賃加盟合同模板
- 非標設(shè)備合同模板
- 采購原料合同模板
- 建設(shè)餐廳合同模板
- 鋼筋代購合同模板
- 采購裝修材料合同模板
- 處置群體性上訪事件的應(yīng)急預(yù)案
- 2016-2022年全氟聚醚油產(chǎn)業(yè)市場研究及發(fā)展前景預(yù)測分析報告
- 醫(yī)院護理培訓(xùn)課件:《用藥錯誤案例分析之RCA根本原因分析法》
- 江西省吉安市2023-2024學(xué)年七年級上學(xué)期月考數(shù)學(xué)試題
- 項目雨季施工監(jiān)理實施細則
- 高通量測序技術(shù)簡介
- 安全生產(chǎn)知識與管理能力考核合格證申請表(安全生產(chǎn)管理人員)
- 護理人員分層管理檔案
- “白玉蘭獎”屋面做法照片
- 水洗機安全操作規(guī)程
- 工傷賠償后的協(xié)議書
評論
0/150
提交評論